Network access controls with F5 BIG-IP Access Policy Manager
February 13, 2024
Network access controls with F5 BIG-IP Access Policy Manager
Score 8 out of 10
Vetted Review
Verified User
Overall Satisfaction with F5 BIG-IP Access Policy Manager (APM)
I am using F5 BIG-IP Access Policy Manager (APM) for authentication services for distributors and end customer and this will give authentication and access based on profiles, also for network access control in place for organizational level
- access based on user levels
- Network access controls
- Difficult to route the traffic on clusters due to policy verification as the traffic will rote to node after completion of access policy
- resource constrains and localized authentication services
Do you think F5 BIG-IP Access Policy Manager (APM) delivers good value for the price?
Yes
Are you happy with F5 BIG-IP Access Policy Manager (APM)'s feature set?
Yes
Did F5 BIG-IP Access Policy Manager (APM) live up to sales and marketing promises?
Yes
Did implementation of F5 BIG-IP Access Policy Manager (APM) go as expected?
Yes
Would you buy F5 BIG-IP Access Policy Manager (APM) again?
Yes