Try our new research platform with insights from 80,000+ expert users

A10 Networks Thunder SSLi vs F5 BIG-IP Local Traffic Manager (LTM) comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

A10 Networks Thunder SSLi
Average Rating
9.0
Number of Reviews
3
Ranking in other categories
SSL/TLS Decryption (4th)
F5 BIG-IP Local Traffic Man...
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
120
Ranking in other categories
Application Delivery Controllers (ADC) (2nd)
 

Mindshare comparison

A10 Networks Thunder SSLi and F5 BIG-IP Local Traffic Manager (LTM) aren’t in the same category and serve different purposes. A10 Networks Thunder SSLi is designed for SSL/TLS Decryption and holds a mindshare of 23.7%, down 24.6% compared to last year.
F5 BIG-IP Local Traffic Manager (LTM), on the other hand, focuses on Application Delivery Controllers (ADC), holds 15.4% mindshare, down 15.9% since last year.
SSL/TLS Decryption
Application Delivery Controllers (ADC)
 

Featured Reviews

CC
The SSL decryption successfully decrypts at a rate that has minimal to no impact on our end users
With the Thunder SSLi, we're better protected. We can stop use of VPN and proxies. We are better protected against dirty traffic coming back to our schools. Having a secure decrypt zone with the equipment lowers the chances that our security infrastructure could possibly miss an attack. It gives us insight into the actual traffic that a student is following. What's the value of identifying possible risks or possible intent based on unencrypted traffic where you have insight to what the student's intent may be? E.g., anonymous bully reporting. It's invaluable to be able to leverage that insight and data to maybe bring help or avert a possible bad circumstance. It's something that's very important to us that this type of system gives us insight into that. For terms of ease of use, it's fairly simple. My analysts tell me that they don't mind getting in there. It was something new that we had to throw on their plate. Every time you add a new element and a new level of complexity, your analysts will look at you like you're crazy, Our plan was originally to use our native firewalls to do the decryption. Unfortunately, that was a feature set which was added on afterward. It just ended up bogging down our system. That is the reason why we had to add the extra hardware. Once the team understood that, the UI was intuitive and a huge help. We use the solution’s Harmony analytics and visibility controller. We have been able to proactively engage and deescalate situations with it. We love Harmony’s traffic management capabilities because it is centralized management. It has a rich analytics capability. This allows us insight into the aggregate performance of all the boxes. so we can possibly leverage any resources available to enhance the environment. We love the single pane of glass traffic management. Single pane of glass is huge, centralized logging. It is the buzzword that everyone is talking about right now, except what nobody seems to take into consideration, is that an analyst only has two eyes. The administration piece of it is huge. It allows us to not just look and get the information, but also cipher it, which is actionable. Looking at logs all day is great, but you can stare in the matrix so long before you want to get in the game. This single pane of glass allows us to look at information that's actionable.
Mahmoud-Yassin - PeerSpot reviewer
You can fully automate disaster recovery
LTM's cloud capabilities could be improved. Cloud providers all offer load balancing, but you can't get the same level of security. F5's cloud service is still not on par with its on-prem service. F5 acquired multiple companies a few years ago, but they still haven't integrated those solutions. For example, F5 acquired Shape Security, which had an excellent solution for detecting bots and automated login attacks, but F5 offers the solution in an inflexible way. It is only available as a cloud-based solution. It isn't zone-based. Some companies are restricted from sending financial data outside the country because of GDPR in Europe or other national regulations. Here in the UAE, we can't send host data out.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We have several proxies in our environment, so we localized internet traffic between these proxies. Instead of getting a really huge proxy box, according to our size, we can use three boxes and share the traffic with A10's load-balancer feature."
"With the Thunder SSLi, we're better protected. We can stop use of VPN and proxies. We are better protected against dirty traffic coming back to our schools. Having a secure decrypt zone with the equipment lowers the chances that our security infrastructure could possibly miss an attack."
"Its most valuable feature is its ability to do its job accurately, effectively, and very quickly. The amount of traffic that we have going through our system is astounding... The delay with the SSL decryption turned on is almost unnoticeable."
"We have found the consistency of the application always being the way it is supposed to be as its most valuable feature."
"The feature I find the most valuable is the support infrastructure."
"In my team, we work in a very agile environment and the solutions from BIG-IP, including BIG-IP WAF, suit us well when developing and serving our applications."
"It is very intuitive, easy to deploy, and manage."
"BIG-IP can do anything. It's like a Swiss Army knife."
"Great load balancing."
"LTM's most valuable features include application security, data collection, and parameter-level rules."
"There is a lot of documentation available."
 

Cons

"There is one thing I would like to see changed. In their features for setting things up, there is a templating system that would normally assist clients. However, we had a better time setting up the device either through the command line or through the interface and not using the templates that were pre-installed. So there is room for improvement to the templates for initial installation."
"It would be great if it supported SSL operations according to Active Directory users. For example, if we want to bypass one of the servers or a client's internet access for SSL interception, we have to do it according to the IP address. It would be better if we could do it according to the Active Directory username. A10 says they kind of support that but we haven't tested it."
"I would like them to have a better UI (better universal design)."
"Initial setup is tricky, if you do not understand the design of this product."
"The solution's initial setup process was quite complex. I"
"It's a very expensive solution."
"In terms of what could be improved, I would expect more integration with different platforms and more integration with the backend systems. Additionally, in the next release, I would like a more secure version."
"The management interface is unclear, complex, and not concise. I would like a better user interface."
"Logging is a bit of a problem. Logging and monitoring are only in plain text. You have to search and you have to know what you are searching for to find anything. So of course, monitoring and getting alerts for abnormal situations is hard. There are no tools for monitoring and alerts"
"It requires a particular skill or training before being able to manage it."
"The web interface could be better."
 

Pricing and Cost Advice

"When you purchase the equipment, you purchase the licensing and warranty. It's all fairly standard. We haven't been caught with anything surprising."
"We always pay for support. Any organization of our size who doesn't is asking for problems."
"Our licensing costs, yearly, are just under $15,000. Your initial cost of acquisition is obviously going to be more than $15,000..."
"It is a bit expensive product. Kemp Loadmaster is much cheaper than F5. Its licensing is on a yearly basis. It can be for one year or three years."
"If your IT budget is good, go for it."
"It's fair, it's not too expensive. Maybe just a little high."
"The solution is quite expensive if we compare it with the competition."
"It is quite expensive as a product. Because it is very stable, it is also expensive."
"It's not a cheap product, but there are no other replacements for what we do with it."
"F5 is more expensive than other solutions, so you have to be sure F5 is the best solution to fit the requirements."
"There are a few licensing options available for F5 BIG-IP LTM. You can have a perpetual license which is a lifetime license. You then only need to renew the support, if you choose to open a ticket with the support."
report
Use our free recommendation engine to learn which SSL/TLS Decryption solutions are best for your needs.
838,713 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
19%
Government
14%
Manufacturing Company
11%
Computer Software Company
10%
Financial Services Firm
17%
Computer Software Company
14%
Government
9%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What needs improvement with F5 BIG-IP?
There are no specific areas for improvement as it is already well-resolved and doesn't require further enhancements.
What is your primary use case for F5 BIG-IP?
The primary use case includes load balancing to serve application servers and basic web application firewall solutions. Our customers use it for that purpose.
 

Also Known As

Thunder SSLi
F5 BIG-IP, BIG-IP LTM, F5 ASM, Viprion, F5 BIG-IP Virtual Edition , Crescendo Networks Application Delivery Controller, BIG IP
 

Overview

 

Sample Customers

Klein Independent School District
Riken, TransUnion, Tepco Systems Administration, Daejeon University, G&T Bank, Danamon, CyberAgent Inc.
Find out what your peers are saying about Broadcom, Fidelis Security, Gigamon and others in SSL/TLS Decryption. Updated: February 2025.
838,713 professionals have used our research since 2012.