Learn what your peers think about F5 BIG-IP Advanced Firewall Manager (AFM). Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
Senior Security Engineer at a tech services company with 201-500 employees
Real User
Dec 4, 2019
We use three main features. The first one is access control. The second feature we use is called IP intelligence. Finally, we have a DDoS safety feature.
Senior Security Engineer at a tech services company with 201-500 employees
Real User
Dec 4, 2019
We use three main features. The first one is access control. The second feature we use is called IP intelligence. Finally, we have a DDoS safety feature.
F5 BIG-IP Advanced Firewall Manager provides robust network protection with advanced DDoS features and efficient load balancing. Its design prioritizes scalability and ease of management, catering to securing data centers and applications. F5 BIG-IP Advanced Firewall Manager is a strategic choice for combating cyber threats, including DDoS attacks. With powerful network defenses, integrated WAF, and adaptable capabilities, it efficiently handles web services on-premise and in the cloud....
CGNAT is one of its strong areas.
It excels in preventing downtime and maintaining application performance, which is crucial for our clients' security and operational continuity.
F5 BIG-IP Advanced Firewall Manager's most valuable feature is load balance. It is readily available and uncomplicated.
The product’s most valuable features are LTM and WAF.
The solution is easily deployable and has great functionality.
The most valuable feature of F5 BIG-IP AFM is the iRules where I can customize the configuration.
The setup and functionality are fairly straightforward.
The protection is very useful.
Its performance and ease of use are valuable.
The most valuable features of F5 BIG-IP Advanced Firewall Manager (AFM) are the web gateway, load balancing, services, and applications available.
The most valuable feature of this solution is that the blocking of IP's.
The decryption is great.
The decryption is great.
The solution is very straightforward. The usability is great.
The solution is very straightforward. The usability is great.
We use three main features. The first one is access control. The second feature we use is called IP intelligence. Finally, we have a DDoS safety feature.
We use three main features. The first one is access control. The second feature we use is called IP intelligence. Finally, we have a DDoS safety feature.
This product excells in every aspect from installation and the interface to providing superior network security.
This product excells in every aspect from installation and the interface to providing superior network security.
It blocks various attacks and mitigates disasters from occurring.
It blocks various attacks and mitigates disasters from occurring.
I find the signature base is very helpful to see traffic
I find the signature base is very helpful to see traffic