Try our new research platform with insights from 80,000+ expert users
ChiefSecd99d - PeerSpot reviewer
Chief Security Architect at a tech services company with 10,001+ employees
Real User
It is a central point of entry for our user base providing user authentication
Pros and Cons
  • "It has made it a single entry point for all users, verging across all the VPCs. It is more of an SSO solution versus multitier user loggin."
  • "We would like to have integration into encryption and PKI integration with SafeNet. That is probably the key component in using External PKIs, letting people bring their PKIs with them."

What is our primary use case?

We use it for brokering services.

How has it helped my organization?

It has made it a single entry point for all users, verging across all the VPCs. It is more of an SSO solution versus multitier user loggin.

What is most valuable?

  • Central point of entry for our user base.
  • User authentication
  • PPI
  • Integration with our website.

What needs improvement?

We would like to have integration into encryption and PKI integration with SafeNet. That is probably the key component in using External PKIs, letting people bring their PKIs with them. On the back-end, we have a SafeNet component. They are going to bring additional features in, so allowing integration with encryption and PKI, and tying it back into Microsoft AD in the back with an LDAP lookup for users.

Buyer's Guide
F5 BIG-IP Local Traffic Manager (LTM)
March 2025
Learn what your peers think about F5 BIG-IP Local Traffic Manager (LTM). Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,422 professionals have used our research since 2012.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

The stability seems fine. We provide fault tolerance with HA, so we have two of them up and running. We have built in integration. Therefore, we do not worry about workload issues

What do I think about the scalability of the solution?

It seems very scalable now. We have 200 users, going to about 10,000 within the next year. There are multiple VPCs and multiple AWS accounts.

How was the initial setup?

The integration and configuration of the product in our AWS environment seems to be pretty straightforward. There doesn't seem to be anything complex. We haven't needed anything additional, like Professional Services.

What about the implementation team?

We did use technical support on the original engineering.

What was our ROI?

We have seen ROI because we are not hosting it. We moved this to the cloud for our ingest, so our workload is moving to the cloud and Amazon.

What's my experience with pricing, setup cost, and licensing?

Purchasing through the AWS Marketplace was good. We chose to go through the AWS Marketplace because everything that we needed was a soft appliance. We needed something to work in Amazon, and this product was available there.

We have found the pricing and licensing on AWS to be competitive.

Which other solutions did I evaluate?

We looked at F5, Citrix, and VMware. We chose F5 because it has a better market name, seemed to be vendor-agnostic for providing capabilities that others didn't, and its reputation.

What other advice do I have?

Use F5. It has a good reputation. We experienced easy implementation and had an overall good experience.

We use it only on AWS.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Network Security Engineer at Data Consult
Real User
One box with many features including LTM, ASM, and GTM
Pros and Cons
    • "They need to develop the reporting tools further."

    What is our primary use case?

    F5 delivers a full range of solutions that simplify service providers’ security architectures while mitigating threats. The full proxy architecture of F5 solutions also allows service providers to attain extensive visibility and control throughout layers 4 through 7. This enables granular control of all connections, more extensive security functionality, and comprehensive end-to-end protection against DDoS and other attacks. F5 solutions protect targeted network elements, the DNS infrastructure, devices, and applications with features that include application health monitoring, a robust web application firewall, web access controls, TCP optimization, web acceleration, L7 DDoS protection, and broad SSL support, including SSL inspection and offload.

    How has it helped my organization?

    I installed F5 on the DMZ zone of the firewall. The traffic will come to the virtual server of the F5. F5 will decrypt the traffic and offload the traffic to the firewall as clear.
    This way, we can mitigate many attacks from the F5 and from the firewall.

    What is most valuable?

    Protection of published website. When using ASM, we can have a layer 7 protection in order to prevent the website from attacks.

    What needs improvement?

    F5 should improve or develop the reporting tools further.
    They should improve the management policies on the BOX.

    For how long have I used the solution?

    Three to five years.

    What do I think about the stability of the solution?

    It's a stable product.

    What do I think about the scalability of the solution?

    They have one box and you can implement many features with it like LTM, ASM, GTM. So it is scalable. And they have a virtual edition and an appliance edition.

    How is customer service and technical support?

    Technical support is a seven out of 10. They provide quick solutions and they reply to us very fast.

    How was the initial setup?

    Straightforward.

    What's my experience with pricing, setup cost, and licensing?

    It's fair, it's not too expensive. Maybe just a little high.

    What other advice do I have?

    It's a good product to use. It has many features so can use it to secure your environment. I'm satisfied with the product.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    F5 BIG-IP Local Traffic Manager (LTM)
    March 2025
    Learn what your peers think about F5 BIG-IP Local Traffic Manager (LTM). Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
    839,422 professionals have used our research since 2012.
    MahesaPutra - PeerSpot reviewer
    Presales at Efficient IT Systems Ltd
    Reseller
    Top 5
    With good technical support in place, the tool also ensures stability and allows for scalability
    Pros and Cons
    • "Stability-wise, I rate the solution a ten out of ten."
    • "The solution's initial setup process was quite complex. I"

    What is our primary use case?

    F5 BIG-IP Local Traffic Manager (LTM) has EC, WAF, firewall, network firewall, and CGNAT in one platform.

    What is most valuable?

    I like the combination of ADC and WAN in the solution. F5 BIG-IP Local Traffic Manager (LTM) could be a bit better in regards to the pricing.

    What needs improvement?

    Kemp Loadmaster is cheaper compared to F5 BIG-IP Local Traffic Manager (LTM). Also, the solution's UI needs improvement.

    For how long have I used the solution?

    I have been using F5 BIG-IP Local Traffic Manager (LTM) for three years.

    What do I think about the stability of the solution?

    Stability-wise, I rate the solution a ten out of ten.

    What do I think about the scalability of the solution?

    The solution's scalability is good. Scalability-wise, I rate the solution a ten out of ten. Around 50-100 of our customers use the solution.

    How are customer service and support?

    The technical support is very good.

    How was the initial setup?

    The solution's initial setup process was quite complex. It took around a month to two for the deployment process.

    Regarding the deployment process, we have to do an assessment first because it's very complex. There are so many parameters that we have to count the deployments. So, an assessment could be better before the deployment process. We have a manager and a person in charge of technical maintenance, but we usually talk to security and work with the network team.

    What was our ROI?

    Though I have not seen a return on investment, I can say that it is a good solution.

    What's my experience with pricing, setup cost, and licensing?

    Our company pays for the licensing cost on a yearly basis. Also, there are no extra costs in addition to the standard licensing fees.

    What other advice do I have?

    Before choosing the solution, I suggest others check their requirements to ensure work and protect your data. I rate the overall solution a ten out of ten. 

    Disclosure: My company has a business relationship with this vendor other than being a customer:
    PeerSpot user
    PeerSpot user
    Security Governance at a comms service provider with 1,001-5,000 employees
    Real User
    Along with load balancing, we perform a lot of packet inspections, URL rewriting, and SSL interceptions via iRule
    Pros and Cons
    • "It is a very good, flexible solution. It helps us to catch up on flaws in our partner solutions on top of its load balancing feature."
    • "Along with load balancing, we perform a lot of packet inspections, URL rewriting, and SSL interceptions via iRule."
    • "Needs to provide a visual interface to follow a customer's activity (from client to BIG-IP to SNAT IP to the chosen server, then back). Today, we are still performing packet captures."

    What is our primary use case?

    We are using it primarily for load balancing. We also make great use of SSL interception (offloading and onloading), packet inspection, rewriting, and DNS wide IP.

    How has it helped my organization?

    It is a very good, flexible solution. It helps us to catch up on flaws in our partner solutions on top of its load balancing feature.

    What is most valuable?

    Along with load balancing, we perform a lot of packet inspections, URL rewriting, and SSL interceptions via iRule. 

    What needs improvement?

    I would recommend that the cost be lowered.

    User tracking: Needs to provide a visual interface to follow a customer's activity (from client to BIG-IP to SNAT IP to the chosen server, then back). Today, we are still performing packet captures.

    For how long have I used the solution?

    Three to five years.

    What do I think about the stability of the solution?

    Not so far.

    What do I think about the scalability of the solution?

    Not so far.

    How are customer service and technical support?

    So far, we have not had to contact them.

    Which solution did I use previously and why did I switch?

    We previously used Cisco ACE, which has very limited features.

    How was the initial setup?

    The initial setup is straightforward. The GUI interface is user-friendly.

    Software upgrades have been performed by F5 teams.

    What about the implementation team?

    The initial migration was done by our technical team. 

    The last implementation was done by the F5 team. I would rate them as a nine out of 10. I am not giving a 10 because we encountered some difficulties with the software upgrade from version 11 to version 12.

    What was our ROI?

    ROI is four years.

    What's my experience with pricing, setup cost, and licensing?

    If you are planning to use security features, better to go for strong hardware and the best bundle license, which is great for web security.

    Which other solutions did I evaluate?

    No.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    it_user858369 - PeerSpot reviewer
    Assistant Vice President at Nagarro
    Consultant
    With the roll back option, I can view the last things which happened on the device
    Pros and Cons
    • "I have Big-IP change and control manager, which give me the roll back option. Therefore, I can view the last things which happened on the device."
    • "I would like there to be more device security. I would like the tool to support SSL links, along with SSL and TLS."

    What is our primary use case?

    We have around 12 data centers. On average, in every data center, we have 14 to 15 F5 load balancers. We manage everything from a central location, then we deploy policy for use, giving us a place for our control managers.

    What is most valuable?

    I have Big-IP change and control manager, which give me the roll back option. Therefore, I can view the last things which happened on the device.

    What needs improvement?

    In future, I would like there to be more device security. I would like the tool to support SSL links, along with SSL and TLS. It also needs to disable the old cipher suite, which is a very old. There are ciphers, like D5, still available on the device.

    For how long have I used the solution?

    Three to five years.

    What do I think about the stability of the solution?

    We have faced security stability issues, but we work around it.

    What do I think about the scalability of the solution?

    It is very scalable.

    How are customer service and technical support?

    F5 tech support is helpful. I would rate the technical support with an eight out of 10.

    Which solution did I use previously and why did I switch?

    We used to have Cisco, then we have Citrix NetScaler. The Citrix NetScaler is just a load balancer. It did not me the complete ADC features. That is why F5 is the king of load balancing.

    How was the initial setup?

    The initial setup was pretty straightforward; not complex.

    What's my experience with pricing, setup cost, and licensing?

    Security should be involved in any base license. When you bring on F5, you only have default license. Then, the ASM product license has to be purchased. It would be great if F5 could include the ASM in the base license. 

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    it_user744186 - PeerSpot reviewer
    Lead Network Engineer at a financial services firm with 10,001+ employees
    Real User
    Local Traffic Manager load balances our web applications, does SSL decryption, and application adjusting
    Pros and Cons
    • "The Local Traffic Manager (LTM) provides a simple low balance and SSL decryption, in addition to some TCP parameters, for incoming and outgoing traffic to redirect appropriate traffic patterns to appropriate servers."
    • "We are using Application Security Manager (ASM) as a web application firewall, where there is a security signature to avoid a web level breach."
    • "I would like to see F-5 implement a regular routing like in other Linux-based devices. When we try and integrate in some complex networks, we have to use some additional routing scenarios from a Layer 3 perspective, then we have some problems. It would be great if this were fixed somehow."

    What is our primary use case?

    There is more than one use case. The most important is the Local Traffic Manager (LTM). We are using it to load balance our web applications, SSL decryption and application adjusting, along with some TCP features. We are also load balancing traffic between appropriate back-ends for risk. 

    How has it helped my organization?

    We can use it for load balancing purposes on an HA proxy software. However, hardware load balancing is the best way due to some hardware flaws for incoming traffic. We are not using CPU resources for a load balancing SSL decryption and adjusting some parameters for incoming and outgoing traffic. F-5 has a lot of appliances, which can be used for appropriate tasks, e.g., for big tasks, we can use Vipiron devices. As well, we have a lot of software blades, which can be divided into virtual clusters, multi-purposes, etc.

    What is most valuable?

    We are using the Big-IP, LTM, ASM, and GTM modules.

    • The Local Traffic Manager (LTM) provides a simple low balance and SSL decryption, in addition to some TCP parameters, for incoming and outgoing traffic to redirect appropriate traffic patterns to appropriate servers. 
    • We are using Application Security Manager (ASM) as a web application firewall, where there is a security signature to avoid a web level breach. 
    • We are using global traffic manager (GTM). Its main use cases is for application firewall modules, therefore we are not using it yet, but we are going to implement it for DDoS protection on some of our web services.

    What needs improvement?

    I would like to see F-5 implement a regular routing like in other Linux-based devices. We know the F-5 is not a router, but can be used for traffic forwarding, so it's not the same as other devices if we compare it with Citrix-based devices. It is a simple Linux-based routing software. I don't have any problems with it. However, in F-5, when we try and integrate in some complex networks, we have to use some additional routing scenarios from a Layer 3 perspective, then we have some problems. It would be great if this were fixed somehow.

    We have to keep in mind features when we deploy an F-5 solution. Designing the same approach in Citrix can often be simpler. I have written syntax in F-5 which were complicated; not straightforward. For example, in a Citrix device, we have a lot of predefined patterns, and it's much simpler to implement.

    For how long have I used the solution?

    Three to five years.

    What do I think about the stability of the solution?

    We have not had issues with the stability, though we have experienced issues with the flexibility.

    How are customer service and technical support?

    The support of F-5 is fine. In comparison with Citrix, F-5 technical support is much better.

    Which solution did I use previously and why did I switch?

    We previously used Citrix NetScaler

    • Citrix NetScaler SDX, which can be divided in multiple instances.
    • Citrix VPX.

    What's my experience with pricing, setup cost, and licensing?

    The licensing strategy for F5 is good.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Kodanda Ramji C.S - PeerSpot reviewer
    Manager | Engineering | Cloud Managed Services at Sify Technologies
    Real User
    Top 5
    The product is secure, robust, and reliable, but it is very expensive
    Pros and Cons
    • "The solution is robust and reliable."
    • "The product is expensive."

    What is our primary use case?

    We are using the solution for our internal and client purposes. We are a cloud service provider.

    What is most valuable?

    The solution provides good application delivery and network optimization features. We use all the features provided by the solution. It fulfills our requirements. All our infrastructure is set up with high availability through hardware and virtualization in all flavors and levels based on the customer requirements.

    What needs improvement?

    The pricing must be more flexible. We get billed for firewalls based on the usage. It will be helpful if the solution provides such flexibility.

    For how long have I used the solution?

    I have been using the solution for many years.

    What do I think about the stability of the solution?

    The tool is stable.

    What do I think about the scalability of the solution?

    The tool is scalable. It meets the requirements.

    How are customer service and support?

    We have contacted the technical support team. The team is customer-friendly and knowledgeable.

    How was the initial setup?

    The initial setup is straightforward. The deployment takes just one minute because we use scripts. We need one technical person for the deployment.

    What was our ROI?

    The solution is robust and reliable. It provides us with security.

    What's my experience with pricing, setup cost, and licensing?

    The product is expensive. We pay a yearly licensing fee.

    What other advice do I have?

    We recommend the product to others. It is scalable and reliable. Overall, I rate the solution a seven out of ten.

    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    PeerSpot user
    reviewer1552263 - PeerSpot reviewer
    Sr. SAP Portfolio Architect at a manufacturing company with 10,001+ employees
    Real User
    Capable of handling huge workloads, good stability, and good scalability
    Pros and Cons
    • "One of the greatest things about F5 Load Balancer is that it provides additional capability for handling huge workloads and routing them to an SAP or non-SAP application. It is capable of supporting a large amount of user workload and application connectivity workload. This was the main reason why we chose F5."
    • "It is a hardware load balancer, and its installation procedure is more complex than a software load balancer. There are pros and cons of using hardware load balancing. You have to have specific hardware deployed in your data center to activate this load balancer. They never came up with any software-based load balancing solution. It is all hardware-based."

    What is our primary use case?

    We use it for load balancing any kind of HTTP and HTTPS traffic coming from users or other systems.

    What is most valuable?

    One of the greatest things about F5 Load Balancer is that it provides additional capability for handling huge workloads and routing them to an SAP or non-SAP application. It is capable of supporting a large amount of user workload and application connectivity workload. This was the main reason why we chose F5.

    What needs improvement?

    It is a hardware load balancer, and its installation procedure is more complex than a software load balancer. There are pros and cons of using hardware load balancing. You have to have specific hardware deployed in your data center to activate this load balancer. They never came up with any software-based load balancing solution. It is all hardware-based.

    For how long have I used the solution?

    I have been using this solution for a couple of years.

    What do I think about the stability of the solution?

    Its stability is good.

    What do I think about the scalability of the solution?

    It is scalable. We have around 2,000 plus users.

    How are customer service and technical support?

    Their technical support is fine. 

    How was the initial setup?

    It is a hardware load balancer, so its installation procedure is more complex than a software load balancer. You need specific hardware to install this load balancer.

    Which other solutions did I evaluate?

    We had evaluated a few SAP solutions, but we found F5 to be more suitable at that time.

    What other advice do I have?

    I would recommend this solution. We have been using it for such a long time, and we are quite happy with it as an organization. It is awesome, and we plan to keep using it till we are on-prem. It has been good for our on-prem setup. 

    I would rate this solution an eight out of ten. I am quite satisfied with this solution.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Download our free F5 BIG-IP Local Traffic Manager (LTM) Report and get advice and tips from experienced pros sharing their opinions.
    Updated: March 2025
    Buyer's Guide
    Download our free F5 BIG-IP Local Traffic Manager (LTM) Report and get advice and tips from experienced pros sharing their opinions.