Try our new research platform with insights from 80,000+ expert users

A10 Networks Thunder SSLi vs F5 BIG-IP Local Traffic Manager (LTM) comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

A10 Networks Thunder SSLi
Average Rating
9.0
Number of Reviews
3
Ranking in other categories
SSL/TLS Decryption (4th)
F5 BIG-IP Local Traffic Man...
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
121
Ranking in other categories
Application Delivery Controllers (ADC) (2nd)
 

Mindshare comparison

A10 Networks Thunder SSLi and F5 BIG-IP Local Traffic Manager (LTM) aren’t in the same category and serve different purposes. A10 Networks Thunder SSLi is designed for SSL/TLS Decryption and holds a mindshare of 25.0%, up 22.2% compared to last year.
F5 BIG-IP Local Traffic Manager (LTM), on the other hand, focuses on Application Delivery Controllers (ADC), holds 15.6% mindshare, down 15.9% since last year.
SSL/TLS Decryption
Application Delivery Controllers (ADC)
 

Featured Reviews

CC
The SSL decryption successfully decrypts at a rate that has minimal to no impact on our end users
With the Thunder SSLi, we're better protected. We can stop use of VPN and proxies. We are better protected against dirty traffic coming back to our schools. Having a secure decrypt zone with the equipment lowers the chances that our security infrastructure could possibly miss an attack. It gives us insight into the actual traffic that a student is following. What's the value of identifying possible risks or possible intent based on unencrypted traffic where you have insight to what the student's intent may be? E.g., anonymous bully reporting. It's invaluable to be able to leverage that insight and data to maybe bring help or avert a possible bad circumstance. It's something that's very important to us that this type of system gives us insight into that. For terms of ease of use, it's fairly simple. My analysts tell me that they don't mind getting in there. It was something new that we had to throw on their plate. Every time you add a new element and a new level of complexity, your analysts will look at you like you're crazy, Our plan was originally to use our native firewalls to do the decryption. Unfortunately, that was a feature set which was added on afterward. It just ended up bogging down our system. That is the reason why we had to add the extra hardware. Once the team understood that, the UI was intuitive and a huge help. We use the solution’s Harmony analytics and visibility controller. We have been able to proactively engage and deescalate situations with it. We love Harmony’s traffic management capabilities because it is centralized management. It has a rich analytics capability. This allows us insight into the aggregate performance of all the boxes. so we can possibly leverage any resources available to enhance the environment. We love the single pane of glass traffic management. Single pane of glass is huge, centralized logging. It is the buzzword that everyone is talking about right now, except what nobody seems to take into consideration, is that an analyst only has two eyes. The administration piece of it is huge. It allows us to not just look and get the information, but also cipher it, which is actionable. Looking at logs all day is great, but you can stare in the matrix so long before you want to get in the game. This single pane of glass allows us to look at information that's actionable.
Bonieber  Orofeo - PeerSpot reviewer
Identifying compromised traffic and securing data has been a significant advantage
One of the most beneficial features of F5 BIG-IP Local Traffic Manager (LTM) ( /products/f5-big-ip-local-traffic-manager-ltm-reviews ) is its ability to identify compromised traffic and its capabilities in authentication. Additionally, the security aspect of it provides a significant advantage as it helps us secure our data, which is a major investment and benefit for us. Before using this system, we had difficulties in storing our data and managing the traffic that comes in and out.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Its most valuable feature is its ability to do its job accurately, effectively, and very quickly. The amount of traffic that we have going through our system is astounding... The delay with the SSL decryption turned on is almost unnoticeable."
"With the Thunder SSLi, we're better protected. We can stop use of VPN and proxies. We are better protected against dirty traffic coming back to our schools. Having a secure decrypt zone with the equipment lowers the chances that our security infrastructure could possibly miss an attack."
"We have several proxies in our environment, so we localized internet traffic between these proxies. Instead of getting a really huge proxy box, according to our size, we can use three boxes and share the traffic with A10's load-balancer feature."
"I've worked a little bit with iRules and it is amazing."
"The solution is very easy to use and easy to understand. It's quite an intuitive system."
"Initial setup is easy and pretty standard."
"It has made it a single entry point for all users, verging across all the VPCs. It is more of an SSO solution versus multitier user loggin."
"The most valuable features are the WAF and the big IP."
"It is a very good, flexible solution. It helps us to catch up on flaws in our partner solutions on top of its load balancing feature."
"It improves the overall performance of applications by decreasing the burden on servers associated with managing and maintaining applications and network sessions, as well as by performing application-specific tasks."
"Stable and scalable network traffic management solution for applications. It has good performance."
 

Cons

"I would like them to have a better UI (better universal design)."
"There is one thing I would like to see changed. In their features for setting things up, there is a templating system that would normally assist clients. However, we had a better time setting up the device either through the command line or through the interface and not using the templates that were pre-installed. So there is room for improvement to the templates for initial installation."
"It would be great if it supported SSL operations according to Active Directory users. For example, if we want to bypass one of the servers or a client's internet access for SSL interception, we have to do it according to the IP address. It would be better if we could do it according to the Active Directory username. A10 says they kind of support that but we haven't tested it."
"Native support for containers should be added to future releases, as this is the future of load balancing."
"Bugs are the part of program and they are fixed with every release, as with any vendor."
"We need best-practice information. They have something called DevCentral and a blog. But we want something from F5 itself regarding how to tackle the false-positive configurations. If you go into detail with so many configurations it will find so many false positives from the moment it is enabled that it will quickly impact your applications, and it will not work."
"The solution's initial setup process was quite complex. I"
"Cloud native integration should be provided."
"I would like them to have more flexible models."
"It would be good to have better traffic and better data. It would be nice to have more granularity to see packets in terms of the header details, the analytics, etc. It would be nice if that was also part of it and to have analytics added to the traffic."
"The synchronization does works fairly well. However, if I were to make changes, I would make it easier to start the sync process."
 

Pricing and Cost Advice

"Our licensing costs, yearly, are just under $15,000. Your initial cost of acquisition is obviously going to be more than $15,000..."
"When you purchase the equipment, you purchase the licensing and warranty. It's all fairly standard. We haven't been caught with anything surprising."
"We always pay for support. Any organization of our size who doesn't is asking for problems."
"Check other vendors like Cisco, Citrix or A10 Networks. There are plenty in the market with which you can achieve same thing."
"Though functionality is high, its cost can be considered slightly higher than its competitors​."
"I found F5 BIG-IP Local Traffic Manager (LTM) an expensive product. The costs would depend on the appliance and infrastructure size. However, my company didn't have to pay extra to use additional features."
"Great product for the money. But they can get really expensive, so get what meets your needs."
"The solution is quite expensive if we compare it with the competition."
"In my view, the cost is somewhat on the higher side. There are discounts available, but I wouldn't say it's overpriced. It's not cheap either, and the value for money is a bit higher from that perspective."
"The licensing model of F5 BIG-IP LTM is highly complex. The operation cost of the solution is high. The overall cost is high."
"I use a yearly subscription, which is the most expensive one now compared to its competitors."
report
Use our free recommendation engine to learn which SSL/TLS Decryption solutions are best for your needs.
848,989 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
18%
Manufacturing Company
14%
Government
11%
Computer Software Company
8%
Financial Services Firm
17%
Computer Software Company
14%
Government
9%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What needs improvement with F5 BIG-IP?
The price needs improvement as it is quite costly.
What is your primary use case for F5 BIG-IP?
We're using F5 BIG-IP Local Traffic Manager (LTM) ( /products/f5-big-ip-local-traffic-manager-ltm-reviews ) for our applications and for managing our incoming and outgoing traffic.
 

Also Known As

Thunder SSLi
F5 BIG-IP, BIG-IP LTM, F5 ASM, Viprion, F5 BIG-IP Virtual Edition , Crescendo Networks Application Delivery Controller, BIG IP
 

Overview

 

Sample Customers

Klein Independent School District
Riken, TransUnion, Tepco Systems Administration, Daejeon University, G&T Bank, Danamon, CyberAgent Inc.
Find out what your peers are saying about Broadcom, Fidelis Security, Gigamon and others in SSL/TLS Decryption. Updated: April 2025.
848,989 professionals have used our research since 2012.