Network access controls with F5 BIG-IP Access Policy Manager
February 13, 2024

Network access controls with F5 BIG-IP Access Policy Manager

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with F5 BIG-IP Access Policy Manager (APM)

I am using F5 BIG-IP Access Policy Manager (APM) for authentication services for distributors and end customer and this will give authentication and access based on profiles, also for network access control in place for organizational level
  • access based on user levels
  • Network access controls
  • Difficult to route the traffic on clusters due to policy verification as the traffic will rote to node after completion of access policy
  • resource constrains and localized authentication services

Do you think F5 BIG-IP Access Policy Manager (APM) delivers good value for the price?

Yes

Are you happy with F5 BIG-IP Access Policy Manager (APM)'s feature set?

Yes

Did F5 BIG-IP Access Policy Manager (APM) live up to sales and marketing promises?

Yes

Did implementation of F5 BIG-IP Access Policy Manager (APM) go as expected?

Yes

Would you buy F5 BIG-IP Access Policy Manager (APM) again?

Yes

F5 BIG-IP Access Policy Manager (APM) is used for Authentication servers as well as Network control access