F5 BIG-IP Valuable Features

Thomas Hejula
Senior IT Engineer at Lumeris
* iRules * Simplicity I was able to simply and quickly set up the WAF rules and security, and also set up easily complex policies and rules which gave me some great features to redirect. So, I had to integrate API Gateway into our WAF, because we're a healthcare company, and we have to maintain security. Therefore, they didn't want to have public endpoints that had not been inspected. The policy features inside the WAF rules were really easy for me to set up. What I thought was going to take me two months, I had done in about two weeks. Between Googling and F5 having great information, so instead of using traditional iRules, I used a policy thing that they recommended. It was much simpler and cleaner, and seemed to execute faster. It was a great feature. The configuration and implementation of what I thought I was going to have to do was a lot simpler than I expected it to be. That was a plus. View full review »
Technical Product Manager at a tech services company with 11-50 employees
It has so many features. First of all, it has a full proxy architecture, it has multiple modules. The best feature is the WAF, the web application firewall module. It also has cashing type capabilities. It has all kinds of load-balancing algorithms based on your IT requirements. So the WAF and load balancing. Both are core features of BIG-IP. In every environment, you have a Web application firewall, you have internet firewalls. Then, traffic comes into your datacenter so that you have datacenter firewalls. F5 has everything. It provides first-tier firewalling, for you application. And it provides server load-balancing, it provides optimization, and it provides a proxy feature, where your users cannot directly access your server. It acts as a fully proxy architecture. It has client-side and server-side connections, both, and they're separate. It also has an AVR feature: application, visibility, and recording. It's good for customers looking for what is actually happening in their network and where the latency is. If I'm using iDirect, the bank branch is connecting to my core banking application, but if the clients are finding that the application is slow, it has TCP LAN and WAN optimization features. It has has caching. View full review »
Solutions Architect at a tech services company with 5,001-10,000 employees
We had a problem where customers were doing transactions in our system, pulling health records, and the system had to be shut down for maintenance. Unfortunately, we wouldn't know that the system was being shut down, and we would lose that information. Then, the customer would get upset. Using the F5, we were able to build rules to detect that the shutdown was occurring, then begin to route people elsewhere, so we didn't have any outages or downtime. This made customers a lot happier, and it made us a lot happier. View full review »
Find out what your peers are saying about F5, Citrix, HAProxy and others in Application Delivery Controllers. Updated: February 2020.
399,540 professionals have used our research since 2012.
Director Technology Solutions with 11-50 employees
It is very intuitive, easy to deploy, and manage. The solution's capabilities has been most instrumental in supporting our customers. I find it reliable. Once it is configured, and up and running, then there usually is no downtime. In terms of performance, we have seen a drastic difference without F5, then with it. If you run the same application from users to the server when there wasn't F5, there were delays. With F5, users can see a remarkable performance difference from a qualitative sense. View full review »
Network Presales Manager at a comms service provider with 201-500 employees
F5 BIG-IP is used with good applications and functions as an application firewall with additional features. I've been building F5 BIG-IP. We will not use any feature or any service unless there is a business case and there is a need for business implementation. View full review »
Eric Foote
Managing Director at Deloitte
* Flexibility * Capacity * Reputation in the market. View full review »
Aliaksei Shyshkou
Lead Network Engineer at a financial services firm with 10,001+ employees
We are using the Big-IP, LTM, ASM, and GTM modules. * The Local Traffic Manager (LTM) provides a simple low balance and SSL decryption, in addition to some TCP parameters, for incoming and outgoing traffic to redirect appropriate traffic patterns to appropriate servers. * We are using Application Security Manager (ASM) as a web application firewall, where there is a security signature to avoid a web level breach. * We are using global traffic manager (GTM). Its main use cases is for application firewall modules, therefore we are not using it yet, but we are going to implement it for DDoS protection on some of our web services. View full review »
Erez Bar On
IT Manager at Priority Software
The most helpful thing is that it's open-source. It's very easy to program and customize. View full review »
Robert Smith
DevOps Manager at TaxAct
* The detail that you have available when setting up iRules. * How the traffic routing works in F5. View full review »
Chief Security Architect at Northrop Grumman
* Central point of entry for our user base. * User authentication * PPI * Integration with our website. View full review »
Joshua Cruz
Associate Systems Engineer at Frontline Education
The most valuable feature is being able to manipulate the iRules, so you can send traffic to different avenues. View full review »
Network Engineer with 1,001-5,000 employees
I really like the ease of use of it in general. If I were to choose one in particular, perhaps it would be the iRule feature. It’s a really versatile tool. View full review »
Guojun Jin
Staff Engineer at a manufacturing company with 11-50 employees
Still not clear why our IT decided to switch to F5 BIG-IP after two years experience. It appears as if there may be some advantage (possibly) related to security concerns (more secure?). View full review »
Bachir Elsitt
Network Security Engineer at Data Consult
Protection of published website. When using ASM, we can have a layer 7 protection in order to prevent the website from attacks. View full review »
Security Governance at a comms service provider with 1,001-5,000 employees
Along with load balancing, we perform a lot of packet inspections, URL rewriting, and SSL interceptions via iRule. View full review »
Samar Choudhury
Assistant Vice President at Nagarro
I have Big-IP change and control manager, which give me the roll back option. Therefore, I can view the last things which happened on the device. View full review »
Luis Henriquez
Hewlett Packard Enterprise Solution Architect at a tech services company with 11-50 employees
* Application security * Automation * Orchestration * It is a fast and available solution. View full review »
Technical Team Leader at a tech services company with 1-10 employees
* The web application firewall. * The configuration and integration into the AWS environment was pretty easy. View full review »
Director Public Sector at Smart Tronix Inc
We have found the consistency of the application always being the way it is supposed to be as its most valuable feature. View full review »
Developer at Zix
* Load balancing * Being able to adjust headers. * Request response headers. * Patching issues in the load balancer that we don't want in the application layer. View full review »
Network Security Administrator at a tech services company with 1,001-5,000 employees
Most important is that it stops very common attacks which can be performed by a simple hacker, and up to the advanced level. View full review »
Sathiya Shunmugasundaram
Site Reliability Engineer at Apple
* Routing * Load balancing View full review »
Inderjeet Singh
Senior Network Engineer at a financial services firm with 1,001-5,000 employees
DDOS protection. View full review »
ACT Solutions Architect at a venture capital & private equity firm with 51-200 employees
Beyond the basic balancing function, other modules are important to us. In particular, a web application firewall, application security module, and a remote access module for customer applications. View full review »
Sr. Advisor at a healthcare company with 10,001+ employees
* Cloud templates * Declarative onboarding * API service gateway * Policy-based security management. View full review »
Valuable features include Link Controller and Server Load Balancer with cloud support and application enhancement security. View full review »
Kay Jackels
Technology Manager with 1-10 employees
* The automatic inspection of, e.g., SSL (TLS) traffic. * It is an easy way to build application policies (graphical). View full review »
Girisha R
Associate Manager - IT Operations at Collabera
I found the most valuable feature to be the SSL VPN. View full review »
Find out what your peers are saying about F5, Citrix, HAProxy and others in Application Delivery Controllers. Updated: February 2020.
399,540 professionals have used our research since 2012.