Listing Thumbnail

    F5 Advanced WAF with LTM, IPI, and Threat Campaigns (PAYG, 3Gbps)

     Info
    Sold by: F5, Inc. 
    Deployed on AWS
    Free Trial
    F5 Advanced WAF (AWF) is an industry leading Web Application Firewall (WAF) that delivers the most innovative capabilities for application protection. Key features include anti-bot, DDoS Mitigation, Behavioral App Protection, Application Vulnerability Protection, and more.
    4.4

    Overview

    Play video

    This offering includes a free, full featured 30-day trial as well as access to F5 premium support.

    The F5 Advanced WAF is an industry-leading web application firewall providing comprehensive protection for your websites, mobile apps, and APIs. Leveraging behavioral analytics, automated learning capabilities, and risk-based policies, the F5 Advanced WAF secures applications against threats including application-layer DoS attacks, malicious bot traffic, all OWASP top 10 threats and API protocol vulnerabilities.

    In addition to attack mitigation, powerful reporting capabilities allow for easy, real-time analysis of attacks allowing you to quickly make informed security decisions.

    This offering includes load balancing, IP Intelligence threat feed, and Threat Campaigns.

    Combining BIG-IP VE with F5 Container Ingress Services (free & open-source) delivers advanced application services to container environments including Kubernetes.

    Additionally, F5 has made it faster and easier to deploy and configure BIG-IP VE via the following mechanisms that can be integrated with all common automation and CI/CD tools:

    Consult the following topics for implementation details:

    For sales inquiries, contact our sales organization at here.  and for all other general inquiries, email F5 at tellaskf5@f5.com .

    Highlights

    • Proactive Bot Protection - Using fingerprinting and challenge/response techniques in combination with behavioral analysis, Advanced WAF blocks automated attacks like account takeover, web/content scraping, and vulnerability recon.
    • Advanced Application Protection - Combining machine learning and threat intelligence, Advanced WAF protects against OWASP Top 10 threats, application-layer DoS attacks, malware-infected browsers, and more.
    • Includes an IP Intelligence threat feed to block traffic from and to malicious IPs. Also, includes regular updates to Threat Campaigns signatures.

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    CentOs 7.3

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free for 30 days according to the free trial terms set by the vendor. Usage-based pricing is in effect for usage beyond the free trial terms. Your free trial gets automatically converted to a paid subscription when the trial ends, but may be canceled any time before that.

    F5 Advanced WAF with LTM, IPI, and Threat Campaigns (PAYG, 3Gbps)

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time. Alternatively, you can pay upfront for a contract, which typically covers your anticipated usage for the contract duration. Any usage beyond contract will incur additional usage-based costs.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (100)

     Info
    • ...
    Dimension
    Cost/hour
    m5.xlarge
    Recommended
    $5.16
    m4.xlarge
    $5.16
    c5n.9xlarge
    $5.16
    m5.12xlarge
    $5.16
    r5.2xlarge
    $5.16
    m3.xlarge
    $5.16
    r7i.2xlarge
    $5.16
    m5.24xlarge
    $5.16
    m5n.xlarge
    $5.16
    m6in.16xlarge
    $5.16

    Vendor refund policy

    For the hourly licensed AMI, F5 does not offer refunds, you may cancel at any time.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Additional details

    Usage instructions

    Before deploy: Create a key pair and VPC (if none exists).

    After deploy: Wait approximately 6 minutes before logging in. SSH (login w/ your ssh key as username 'admin') to the instance and run these tmsh commands to set the admin password (GUI User, not SSH): modify auth user admin password save sys config.

    Log into the Config utility web page: If only one NIC was present during deploy, use https://[eth0-IP]:8443. If more than one NIC was present during deploy, use https://[eth0-IP]:443. Ensure your security groups allow access to the required port.

    For details, see: http://clouddocs.f5.com/cloud/public/v1/aws_index.html  https://support.f5.com/csp/knowledge-center/cloud/Public%20Cloud/Amazon%20Web%20Services 

    Support

    Vendor support

    You can open a support case in the F5 WebSupport Portal , review additional F5 technical support documentation here  or contact F5 support directly (24x7x365):

    • North America: 1-888-882-7535
    • Outside North America: +800 11 ASK 4 F5 (800 1127 5435)

    F5 support centers are strategically located for partners and customers in APAC, Japan, EMEA and North America. Regionally located support centers enable F5 to provide support in a number of languages through native-speaking engineers who are available when you are.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    1 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Web Application Firewall
    Comprehensive protection for websites, mobile apps, and APIs using behavioral analytics and automated learning capabilities
    Threat Detection
    Advanced protection against OWASP Top 10 threats, application-layer DoS attacks, and malicious bot traffic using machine learning and threat intelligence
    Bot Protection
    Proactive defense using fingerprinting, challenge/response techniques, and behavioral analysis to block automated attacks like account takeover and web scraping
    IP Intelligence
    Integrated threat feed to block traffic from and to malicious IP addresses with regular signature updates
    Container Integration
    Advanced application services deployment for container environments, including native support for Kubernetes through Container Ingress Services
    Web Application Threat Protection
    Comprehensive ruleset covering OWASP Top 10 web application threats including SQL Injection, Cross Site Scripting, and Known Exploits
    Security Signature Updates
    Regular threat information updates from FortiGuard Labs to maintain current protection signatures
    Malicious Traffic Detection
    Protection against malicious bots and common vulnerabilities and exposures (CVE)
    Configurable Security Response
    Flexible configuration options to log, alert, and block detected web application threats
    Attack Vector Coverage
    Comprehensive security rules targeting multiple web application attack vectors including general and known exploits
    Web Application Threat Protection
    Comprehensive ruleset targeting OWASP Top 10 Web Application Threats with low false-positive rate
    Vulnerability Mitigation
    Managed rules addressing code injection techniques including SQLi, NoSQLi, OScommandi, XSS, and directory traversal
    Technology-Specific Protection
    Specialized rules for web technologies like Apache Struts2, Apache Tomcat, Oracle WebLogic, WordPress, Drupal, and Joomla
    Cyber Threat Intelligence
    Regularly updated rulesets incorporating latest threat intelligence and security alerts
    Compliance Support
    Security rules designed to help meet compliance standards such as PCI-DSS

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.4
    29 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    28%
    66%
    7%
    0%
    0%
    6 AWS reviews
    |
    23 external reviews
    External reviews are from G2  and PeerSpot .
    Pawan Thakur

    Advanced protection has strengthened our security posture and supports accurate threat detection

    Reviewed on Dec 09, 2025
    Review provided by PeerSpot

    What is our primary use case?

    Our primary use cases for F5 Advanced WAF  in our system include F5 LTM, F5 WAF , and F5 DNS GTM for one of our applications.

    What is most valuable?

    The features of F5 Advanced WAF  that I find most valuable include advanced WAF  capabilities, bot detection, DDoS features, and all the top ten attacks we have configured with the WAF.

    Machine learning and automated threat detection features have helped our security strategy because we initially used them during our application learning mode. It provides us with one hundred percent accurate application learning to reduce false positives, and it has been very helpful.

    What needs improvement?

    In terms of additional features I would like to see from them in the future, I think the GTM is a bit complicated to configure, which I observed. Otherwise, LTM and WAF are straightforward. I faced problems during the GTM configuration. The LTM and ASM are very simple to configure and manage. There is excellent clarity in the LTM and the WAF. Whenever something goes wrong or we have to whitelist anything, it clearly indicates where to go and where I have to make modifications. It is very simple and we get comprehensive information.

    For how long have I used the solution?

    I have been working with this solution for three to four years.

    How are customer service and support?

    My experience with the technical support from F5 is that on the technical side, we sometimes face issues with reachability and availability. Regarding technical support overall, I am not completely satisfied with F5. We are facing problems. I would rate the technical support at five out of ten.

    Both response time and availability need to be improved. Technical skill on the support side also needs improvement.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I switched from Radware to F5 Advanced WAF after COVID, which was two to three years ago.

    Overall, I believe it has been a good decision to switch because I do not think any other product available on the market can compete with F5 at this time.

    How was the initial setup?

    The initial setup of F5 Advanced WAF is very straightforward.

    What's my experience with pricing, setup cost, and licensing?

    Regarding the price, I think the cost is a bit higher compared to others. Earlier we were using Radware, and compared to Radware, it is very high. However, it is providing more features than Radware. The WAF side is very familiar and we can easily understand it. It is not complicated, and the features are at a very granular level compared to Radware and other WAF solutions.

    What other advice do I have?

    To assess the effectiveness of DDoS mitigation in F5 Advanced WAF, we checked internally using JMeter , on which we wrote a script and tried multiple users at the same time. The DDoS feature blocked all that traffic according to our threshold. We tested this internally.

    The ability to enforce granular policy adjustments has helped my organization with compliance adherence because in the last three to four months, we put our application in blocking mode. We have not configured granular level settings; we have configured at a high level currently. Going forward, we will be planning to add additional security in the WAF.

    I have not used advanced analytics and traffic insights features. I also have not used vulnerability management features, as we have different solutions for that.

    From my perspective, whatever we have used of F5 Advanced WAF, I do not think it needs improvement because I am currently satisfied with the features provided. We just need to work more on the WAF. If there is anything that needs attention, we will definitely let you know.

    Currently, ten to twelve people are using it in my company. I would rate this solution an eight out of ten.

    RoiNahari

    Bot protection capabilities enhance application security

    Reviewed on Apr 16, 2025
    Review provided by PeerSpot

    What is our primary use case?

    I am working with an integration and security company that collaborates with various vendors. I am currently dealing with F5 Advanced WAF .

    What is most valuable?

    The whole mechanism of F5 Advanced WAF  is effective. It contains the logic of both negative and positive security combined, providing added value to the company I work with to protect their applications.

    What needs improvement?

    I do not have anything in mind right now that needs improvement. Generally, it works well. If we need any specific feature, we approach F5 directly.

    For how long have I used the solution?

    I have probably used it for ten years or so.

    How are customer service and support?

    I do not need them much because my team is professional. If there is a bug, the support is usually understanding and resolves issues.

    How would you rate customer service and support?

    Neutral

    What's my experience with pricing, setup cost, and licensing?

    The price is affordable and satisfactory.

    What other advice do I have?

    One of the best features is the bot protection capabilities. I rate the product eight out of ten.

    Computer Software

    F5 VPN is for secure remote access

    Reviewed on Mar 24, 2025
    Review provided by G2
    What do you like best about the product?
    The think I like best about F5 VPN is it is secure for remote access and useful for long term connections.
    What do you dislike about the product?
    Sometimes it is slow and strukc in the middle shows connection issue error.
    What problems is the product solving and how is that benefiting you?
    F5 VPN is used for secure remote access. Keeps personal data private for long term.
    Computer Software

    F5 vpn usage

    Reviewed on Mar 12, 2025
    Review provided by G2
    What do you like best about the product?
    We use F5 Vpn in my workplace to filter traffic
    What do you dislike about the product?
    We use high internet speeds to use the internet
    What problems is the product solving and how is that benefiting you?
    There Is no problem in using f5vpn
    reviewer2641242

    Enables flexible licensing and clear ROI evaluation

    Reviewed on Feb 24, 2025
    Review from a verified AWS customer

    What is our primary use case?

    I use F5 Advanced WAF  to manage enterprise clients, focusing on licensing and support flexibility to accommodate various customer segments, including enterprises and mid-market customers.

    What is most valuable?

    F5 Advanced WAF  provides two different licensing models. The subscription-based model offers competitive pricing, making it easier for me to see ROI. However, the perpetual license, despite an initial higher cost, lacks transparency regarding support expiration. Due to the subscription, I can compare it with other tools, but as a perpetual buyer, I am unaware of support expiration until after the purchase, allowing indicative ROI calculations but not actual ones.

    Furthermore, F5 Advanced WAF  offers features not available in other products, though I suggest consulting a technical expert for specific features.

    What needs improvement?

    F5 Advanced WAF  sells perpetual licenses as perpetual assets during sales without informing me that support ends after a few years. I find out later and am required to pay for support without receiving updated versions. Deployment training for F5 Advanced WAF is lacking and restricts growth by being inaccessible and costly for partners.

    For how long have I used the solution?

    I provide the feedback based on my recent experience and judgment.

    How are customer service and support?

    I have interacted with F5's support, and while I have no major complaints, they could improve. I rate them eight out of ten.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    Deployment is easy for me, but enablement training is not easily available, accessible, or sufficiently supported.

    What was our ROI?

    I find it difficult to compute ROI for perpetual licenses due to the lack of upfront information about support expiry. Subscription models offer clearer ROI due to a more competitive pricing scheme.

    What's my experience with pricing, setup cost, and licensing?

    Subscription models have competitive pricing, while perpetual licenses involve an upfront higher cost, leading to ambiguity regarding support cessation.

    Additional costs for deployment and training further impact my cost considerations.

    Which other solutions did I evaluate?

    I am interested in how F5 Advanced WAF features and pricing compare to alternatives like Fortinet and Check Point.

    What other advice do I have?

    I rate F5 Advanced WAF eight out of ten.

    Despite a few issues, F5 Advanced WAF is performing well for me. Improving engagement and enablement for partners would enhance its value to GSI partners and service providers.

    Overall, I see potential positive development for the product.

    View all reviews