IT Security Specialist at a educational organization with 201-500 employees
Real User
Top 5
2024-09-10T08:34:02Z
Sep 10, 2024
I use the tool to manage user access. We're connected to Active Directory and previously used SAML, but now mainly use Citrix. I use F5 BIG-IP Access Policy Manager for VPN access for the IT group, with two-factor authentication using Google Authenticator.
Associate Network Engineer at a computer software company with 11-50 employees
Real User
Top 5
2024-03-18T15:23:50Z
Mar 18, 2024
The use case depends entirely on the client's specific requirements. We configure the APM accordingly. For instance, in some scenarios, we've used F5 for VPN purposes. In others, we've deployed F5 BIG-IP primarily as a load balancer. The choice depends on the enterprise's needs. They might want application load balancing, network traffic load balancing, or something else entirely. It's often used for VPN-like functionality.
We primarily use it to create WAFs and wide IP (virtual server) configurations. Additionally, we leverage Global Server Load Balancing (GSLB) when we need to define access policies or create web application firewalls (WAFs). In those scenarios, F5 is our go-to solution. Let's say we have servers in the DMZ or back-end that shouldn't communicate directly with the outside world or receive unwanted traffic. F5 comes in with virtual IPs to act as a middleman. Daily traffic gets routed according to our policies, like round robin. With four servers, F5 sends queries one by one to each, checking if they're healthy and ready to serve clients. That's a typical use case. Additionally, if we need to inspect or modify packets (e.g., for SSL decryption), we can install tools on F5 to handle that offloading and send the traffic onward transparently to the back-end. These are some of the key features I use regularly. And if we need to modify packets on the fly, like the certificates within the traffic, we can install them on the F5, perform traffic manipulation and offloading, and then send the traffic decrypted or encrypted to the backend in plain text. These are all capabilities we're quite familiar with.
Learn what your peers think about F5 BIG-IP Access Policy Manager (APM). Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
Cyber Security Solution Architect at a tech consulting company with 1,001-5,000 employees
Real User
2020-08-19T07:57:00Z
Aug 19, 2020
Due to COVID-19, almost all of our customers are buying the virtual edition now. Our customers use this solution for connecting people from home to the office. APM is security encrypted and allows them to create an SSO (through a third-party) so they can access just about anything they could from their office computer, under normal circumstances. Everything is in one portal, including your SAS application and on-premise application.
F5 BIG-IP Access Policy Manager (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access.
BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support...
I use the tool to manage user access. We're connected to Active Directory and previously used SAML, but now mainly use Citrix. I use F5 BIG-IP Access Policy Manager for VPN access for the IT group, with two-factor authentication using Google Authenticator.
The use case depends entirely on the client's specific requirements. We configure the APM accordingly. For instance, in some scenarios, we've used F5 for VPN purposes. In others, we've deployed F5 BIG-IP primarily as a load balancer. The choice depends on the enterprise's needs. They might want application load balancing, network traffic load balancing, or something else entirely. It's often used for VPN-like functionality.
We primarily use it to create WAFs and wide IP (virtual server) configurations. Additionally, we leverage Global Server Load Balancing (GSLB) when we need to define access policies or create web application firewalls (WAFs). In those scenarios, F5 is our go-to solution. Let's say we have servers in the DMZ or back-end that shouldn't communicate directly with the outside world or receive unwanted traffic. F5 comes in with virtual IPs to act as a middleman. Daily traffic gets routed according to our policies, like round robin. With four servers, F5 sends queries one by one to each, checking if they're healthy and ready to serve clients. That's a typical use case. Additionally, if we need to inspect or modify packets (e.g., for SSL decryption), we can install tools on F5 to handle that offloading and send the traffic onward transparently to the back-end. These are some of the key features I use regularly. And if we need to modify packets on the fly, like the certificates within the traffic, we can install them on the F5, perform traffic manipulation and offloading, and then send the traffic decrypted or encrypted to the backend in plain text. These are all capabilities we're quite familiar with.
We use F5 BIG-IP APM to control and monitor device access based on MAC addresses.
We use the product for load balancing. We use it to read, understand, and direct traffic.
Our primary use case for this solution is remote access VPN and VPI integration with VMware, and we deploy the solution on-premises.
I use F5 BIG-IP APM to connect to my company's private network and access the tools that I need.
I primarily used the solution for portal access. It was scalable. The solution is stable and reliable.
The primary use cases of F5 BIG-IP Access Policy Manager are straightforward for what we wanted to do.
We primarily use the solution for access management.
Due to COVID-19, almost all of our customers are buying the virtual edition now. Our customers use this solution for connecting people from home to the office. APM is security encrypted and allows them to create an SSO (through a third-party) so they can access just about anything they could from their office computer, under normal circumstances. Everything is in one portal, including your SAS application and on-premise application.