Overview:
What’s Inside
- Unify Global Access and Security
- Simplify Identity Federation and Consolidate Infrastructure
- Streamline Virtual Application Access
- Enhance Visibility and Reporting
- Centralize Dynamic Access Control
- Secure Web Gateway Services
- Unparalleled Flexibility, High Performance, and Scalability
F5 BIG-IP Access Policy Manager (APM) is a secure, flexible, high-performance solution that provides unified global access to your network, cloud, and applications. With a single management interface, it converges and consolidates remote, mobile, network, virtual desktops, and web access. BIG-IP APM enables the creation and enforcement of simple, easy-to-manage, intelligent access policies.
Key Benefits
Centralize identity and access control
Simplify access management with identity, context, and application-aware policies.
Unify access controls
Consolidate remote, mobile, network, virtual desktop infrastructure (VDI), and web access in one interface with adaptive identity federation, single sign-on (SSO), and multi-factor authentication (MFA).
Reduce costs
Replace proxy tiers with an integrated solution for VMware Horizon/Workspace ONE, Citrix XenApp, Microsoft Exchange, and others.
Defend the weak links
Protect against data loss, malware, and rogue device access with comprehensive endpoint posture and security checks.
Secure web access
Control access to suspicious web content and apply intelligent Forcepoint technology to defend against highly complex web threats.
Do it all at scale
No performance trade-offs for security, even in the most demanding environments.
Features:
Whether running as a BIG-IP platform module or on a VIPRION chassis blade, BIG-IP APM is based on the intelligent, modular F5 TMOS® operating system. TMOS delivers insight, flexibility, and control to help you better enable application, network, and cloud access.
BIG-IP APM features include:
- Portal access, app tunnel, and network access
- Granular access policy enforcement
- Advanced Visual Policy Editor (VPE)
- IP geolocation agent (in Visual Policy Editor)
- AAA server authentication and high availability
- Step-up authentication, including multi-factor authentication (MFA)
- DTLS mode for delivering and securing applications
- Microsoft ActiveSync and Outlook Anywhere support with client-side NTLM
- Simplified access management for Citrix XenApp and XenDesktop, and support for Citrix StoreFront
- Native client support for Microsoft RDP client and Java RDP client
- PCoIP, Blast, and Blast Extreme proxy support for VMware Horizon, including support for Linux desktops
- SSO from smart cards for VMware Horizon deployments
- Local client drive and USB redirection support for VMware Horizon
- Launch Microsoft RDP native client from Webtop
- Seamless Microsoft Exchange mailbox migration L7 access control list (ACL)
- Protected workspace support and encryption
- Credential caching and proxy for SSO
- Java patching (rewrite) for secure access
- Flexible deployment in virtual VMware environments
- SAML 2.0 identity federation
- Support for OAuth 2.0 authorization protocol
- Integration with Oracle Access Manager (OAM)
- SSO with support for Kerberos, header-based authentication, credential caching, and SAML 2.0
- Support for SAML-based authentication using BIG-IP Edge Client for Android and BIG-IP Edge Client for iOS
- SAML-artifact binding support
- SAML ECP profile support
- Simplified identity federation for applications with multi-valued attributes
- Context-based authorization with dynamic L4/L7 ACLs
- Windows machine certificate support
- Windows Credential Manager integration
- External logon page support
- Access control support to BIG-IP LTM virtual server
- Out-of-the-box configuration wizards
- Scales up to 2 million concurrent access sessions
- Policy routing Export and import of access policies via BIG-IQ Centralized Management
- Configurable timeouts
- Health check monitor for RADIUS accounting
- Landing URI variable support
- DNS cache/proxy support
- SSL VPN remote access
- Always connected access (with BIG-IP Edge Client and F5 Access)
- Establish an always-on VPN tunnel with Windows OS login and BIG-IP Edge Client for Windows
- Broad client platform support: Supports several client platforms (see F5 BIG-IP APM Client Compatibility Matrices for each BIG-IP release)
- Browser support: Supports several browsers (See F5 BIG-IP APM Client Compatibility Matrices for each BIG-IP release)
- Support for endpoint security and VPN without web browser plug-ins
- Site-to-site IPsec encryption
- Application tunnels
- Dynamic Webtops based on user identity
- Integration with leading IAM vendor products (Ping Identity, Okta, VMware)
- Web filtering, URL categorization, real-time web malware detection and protection, and cloudbased detection of new and emerging advanced threats with F5 Secure Web Gateway Services
- Authentication methods: form, certificate, Kerberos SSO, SecurID, basic, RSA token, smart card, N-factor
- Supports Google reCAPTCHA v2 for authentication and contextual authentication
- Endpoint inspection: More than a dozen endpoint posture and security checks
- IPv6 ready
- Virtual keyboard support
- Style sheets for customized logon page
- Windows Mobile package customization
- Centralized advanced reporting with Splunk
- Virtual Clustered Multiprocessing (vCMP)
TMOS features include:
- SSL offload
- Caching
- Compression
- TCP/IP optimization
- Advanced rate shaping and quality of servic
- F5 IPv6 Gateway
- IP/port filtering
- F5 iRules scripting language
- VLAN support through a built-in switch
- Resource provisioning
- Route domains (virtualization)
- Remote authentication
- Report scheduling
- Full proxy
- Key management and failover handling
- SSL termination and re-encryption to web servers
- VLAN segmentation
- Denial-of-service (DoS) protection
- System-level security protections
- BIG-IP APM and BIG-IP ASM layering
- F5 Enterprise Manager support
Unify Global Access and Security:
As your workforce grows more mobile, users need access to their applications—anywhere from any device, and often over unsecured networks. Ensuring these always-connected users have fast and secure access to applications, on-premises or in the cloud, continues to be a challenge for many organizations. By implementing policy-based access decisions, BIG-IP APM can strengthen corporate compliance with security standards, corporate controls, and industry and government regulations.
One solution for all access
BIG-IP APM is positioned between your applications and your users, delivering a strategic application access control point. It protects your public-facing applications by providing granular policy for identity- and context-aware external user access, while consolidating your access infrastructure. It also provides secure remote and mobile access to corporate resources from all networks and devices. BIG-IP APM converges and consolidates access within a single management interface. It also enables and simplifies the creation of policies that are easy to manage.
BIG-IP APM consolidates and manages access to all applications, networks, and clouds.
“Always connected” remote and mobile access
BIG-IP APM can be used with its optional client to enable secure remote and mobile access to applications wherever they reside, as well as networks and clouds. The integrated BIG-IP Edge Client provides location awareness and zone determination to deliver secure, persistent, policy-based access.
BIG-IP APM with BIG-IP Edge Client delivers secure, identity-, context-, and applicationaware remote access via SSL VPN for today’s remote and mobile workforce. For remote connections, it offers a Datagram Transport Layer Security (DTLS) mode, which secures and tunnels applications that are delay sensitive. For traffic between branch offices or data centers, IPsec encryption is enabled. By using BIG-IP APM’s VPN, your organization gains end-to-end security across your entire global infrastructure and beyond.
BIG-IP Edge Client helps ensure continued productivity whether a user is attempting to access corporate apps from home over a wireless network, giving a presentation over the corporate wireless network, in a café on guest WiFi, or docked on a LAN connection in the office. BIG-IP Edge Client automatically detects domains and reconnects even after losing a VPN connection, or it can automatically disconnect when a LAN connection is detected. You can also enable users to use their Microsoft Windows operating system login to establish an always-on VPN tunnel via the BIG-IP Edge Client on Windows.
BIG-IP APM extends managed access for remote and mobile users to support a wide range of mobile devices. The BIG-IP Edge Portal application facilitates secure remote access to enterprise web applications and is available for all Apple iOS and Google Android devices. Full SSL VPN is available for Apple Mac, iPhone, and iPad devices; Microsoft Windows and Windows Phone devices; Linux platforms; and Google Android devices. The new F5 Access app is also available, empowering enterprises to deliver secure remote access via BIG-IP APM’s SSL VPN capabilities for Google Chrome OS, and popular corporate devices such as Chromebooks.
When deployed with leading mobile device management (MDM) and enterprise mobility management (EMM) offerings, BIG-IP APM augments their mobile and remote access gateway support—increasing access scalability, consolidating access gateways, and decreasing access infrastructure for enterprises deploying those solutions. BIG-IP APM also enables per-app VPN access from mobile devices managed by VMware AirWatch, IBM MaaS360, and other EMM solutions—without requiring user intervention.
Eliminate browser plug-ins
Some web browsers have employed limits on the number and type of browser plug-ins that may be enabled. F5 BIG-IP APM removes the need for web browser plug-ins while still providing a friendly end user experience. This plug-in free solution can still support endpoint posture checks and network access (VPN) from web browsers.
Secure application tunnels
If an endpoint doesn’t comply with your defined security posture policy, an application tunnel can provide access to a specific application without the security risk of opening a full network access tunnel. For example, users can simply click their Microsoft Outlook clients to get secure access to their email, from anywhere in the world. Application tunnels are also WAN optimized to more efficiently deliver content to users.
Robust endpoint security
BIG-IP APM can enable an inspection of the user’s endpoint device through a web browser or through BIG-IP Edge Client to examine its security posture and determine if the device is part of the corporate domain. Based on the results, it can assign dynamic Access Control Lists (ACLs) to deploy identity-, context-, and application-aware security
BIG-IP APM includes more than a dozen preconfigured, integrated endpoint inspection checks, including OS type, antivirus software, firewall, file, process, registry value validation and comparison (Windows only), as well as device MAC address, CPU ID, and HDD ID. For mobile devices running Apple iOS or Google Android, BIG-IP APM’s endpoint inspection checks the mobile device UDID and jailbroken or rooted status.
BIG-IP Edge Client and F5 Access integrate with leading EMM solutions—including VMware AirWatch and IBM MaaS360—to perform device security and integrity checks. Contextaware policies are then assigned based on the device’s security state. These policies can enable, modify, or disable application, network, and cloud access from a user’s device. Administrators can map hardware attributes to a user’s role to enable additional decision points for access control. A browser cache cleaner automatically removes any sensitive data at the end of a user’s session.
Simplify access to authorized applications
BIG-IP APM’s dynamic Webtop displays a web-based launch pad with all the applications available to a user. The content of BIG-IP APM’s Webtop is dynamic, showing only those applications and resources a user is authorized to access. Webtop is customizable based on a user’s identity, context, and group membership. Webtops can be set up with identity federation via Security Assertion Markup Language (SAML) and are SSO enabled, delivering a seamless user experience.
Simplify Identity Federation and Consolidate Infrastructure:
BIG-IP APM simplifies and consolidates your infrastructure. The flexibility and scalability helps you to combine network access controls, identity federation, SSO, and adaptive authentication into a single application delivery solution.
Identity federation and single sign-on (SSO)
BIG-IP APM supports SSO and Kerberos ticketing across multiple domains, enabling additional types of authentication, such as U.S. Federal Government Common Access Cards (CACs) and the use of Active Directory authentication for all applications. Users are automatically signed on to back-end applications and services that are part of a Kerberos realm. This provides a seamless authentication flow after a user has been authenticated through a supported user-authentication mechanism. BIG-IP APM also delivers smart card support with credential providers, so that users can connect their devices to the network before signing in.
BIG-IP APM simplifies mobile access to protected resources by enabling remote access (VPN) authentication and authorization from Microsoft Windows, Apple Mac OS, Apple iOS, and Google Android devices—as well as devices running Chrome OS via SAML (such as Google Chromebooks). SAML-based authentication increases security, reduces user dependencies on passwords, and improves both the user experience and productivity.
SAML 2.0 further enhances BIG-IP APM identity federation and SSO options by supporting connections initiated by both SAML identity providers (IdPs) and service providers. This functionality extends identity federation, as well as SSO capabilities to cloud-based applications and offers identity federation across an organization’s BIG-IP products. It also empowers administrators to centrally disable user access to all identity-enabled applications, regardless of where they reside, saving time and boosting administrative productivity.
BIG-IP APM can serve as a translator, enabling SSO via SAML to applications that support SAML, as well as to those that are not SAML-enabled. For applications that do not accept SAML, BIG-IP APM can convert the authentication access to the appropriate authentication for that application. This ensures users can utilize SSO to applications—regardless of whether these apps support SAML, are on-premises, or in the cloud.
BIG-IP APM secures the transport of SAML messages by supporting SAML artifact binding, reducing the flow of SAML messages through browsers, addressing certain browser restrictions, and extending identity federation and SSO support to automatically submitted forms that do not support JavaScript. BIG-IP APM also extends identity federation via SAML to client-based applications and other browserless environments—including desktop applications and server code in web apps—and streamlines user workflow by supporting SAML Enhanced Client or Proxy (ECP) profiles.
BIG-IP APM supports the OAuth 2.0 open-standard for authorization. It can serve as a client for social networking logins, as an authorization delegate for SaaS applications, and can enhance protection for and authorization of application programmable interfaces (APIs) for web services.
Address Hybrid Office 365 deployments
BIG-IP APM delivers secure identity federation and SSO for hybrid deployments. For instance, if you have deployed Office 365 and maintain Exchange mailboxes onpremises, BIG-IP APM provides a seamless user experience by enabling SSO to Office 365, as well as to their on-premises email, while ensuring appropriate authentication.
If you have deployed Office 365, migrated your email, and have chosen to use Microsoft Azure Active Directory for authentication, BIG-IP APM can proxy ActiveSync and encrypt user credentials before sending them to Office 365, delivering additional security for your most important user data. Integration with leading EMM helps policies to be consistently applied to mobile access as well.
Automatically synchronize Exchange services
BIG-IP APM supports the synchronization of email, calendar, and contacts with Microsoft Exchange on mobile devices that use the Microsoft ActiveSync protocol. By eliminating the need for an extra tier of authentication gateways to accept Microsoft Outlook Web Access (OWA), ActiveSync, and Outlook Anywhere connections, BIG-IP APM helps you consolidate infrastructure and maintain user productivity. When migrating to Exchange 2010, BIG-IP APM works with Active Directory to facilitate seamless mailbox migration over time. When migration is complete, BIG-IP APM provides managed access to Exchange with single URL access—regardless of the user, device, or network.
Adaptive authentication and infrastructure consolidation
By delivering seamless user access to web applications in a highly available and heterogeneous environment, BIG-IP APM improves business continuity and saves your organization from decreased user productivity. BIG-IP APM supports and integrates with AAA servers and user credential stores—including Active Directory, Lightweight Directory Access Protocols (LDAP), RADIUS, and Native RSA SecurID—and delivers high availability through the intelligent traffic management capabilities of BIG-IP LTM.
In addition, BIG-IP APM recognizes when an RSA SecurID software token is installed on a user’s Windows or Mac device, prompting the user for an RSA PIN and seamlessly authenticating that user. BIG-IP APM also supports Google reCAPTCHA V2 for authentication and contextual authentication.
BIG-IP APM can help your organization deploy MFA. BIG-IP APM includes one-time password (OTP) authentication, via email or Short Messaging Service (SMS). Through F5’s extensive partner ecosystem, BIG-IP APM also integrates with most leading MFA solutions, including Identity-as-a-Service (IDaaS) offerings. By integrating with your existing authentication solution, you can enjoy adaptive authentication, enabling various forms of single-factor or multi-factor authentication to be employed based on user identity, context, and the application being accessed.
BIG-IP APM enables you to enforce step-up authentication. You can insert a stronger form of authentication or revalidate authentication per request within an access session—for example, when a user attempts to access additional sensitive web URIs or extend an existing session. BIG-IP APM supports step-up authentication for single- and multi-factor authentication. Any session variable may be used to trigger step-up authentication, and you can utilize additional authentication capabilities or chose from wide selection of our partner offerings. In addition, any session variable may be part of access policy branching (such as URL branching) per request policy.
Many authentication solutions use application coding, separate web server agents, or specialized proxies, which can present significant management, cost, and scalability issues. With AAA control, BIG-IP APM enables you to apply customized access policies across many applications and gain centralized visibility of your authorization environment. You can consolidate your AAA infrastructure, eliminate redundant tiers, and simplify management to reduce capital and operating expenses.
Intelligent integration with identity and access management
F5 works with leading on-premises and cloud-based identity and access management (IAM) vendors, such as Ping Identity, Okta, and VMware. This integration enables on-premises and remote-user SSO—via SAML—to on-premises or data center-based applications. For organizations that do not wish to replicate their user credential store in a cloud-based application, BIG-IP APM works with IAM vendor partners to help these organizations maintain control of user credentials on-premises. This is accomplished by creating a bridge between the IAM vendor’s offering and the local authentication services. This bridge, or Identity Provider chain, leverages SAML to federate the user identity.
With Ping Identity, BIG-IP APM can work with both PingAccess and PingFederate. This enables agent-less interaction and proxy consolidation, reduces infrastructure complexity, and delivers superior scalability while maintaining the roles and responsibilities between infrastructure security and secure IAM.
Streamline Virtual Application Access:
Virtual desktop and application deployments must scale to meet the needs of thousands of users and hundreds of connections per second. BIG-IP APM serves as a gateway for virtual application environments. It includes native support for Microsoft Remote Desktop Protocol (RDP), native secure web proxy support for Citrix XenApp and XenDesktop, and security proxy access for VMware Horizon. BIG-IP APM helps administrators gain control over the delivery and security components of enterprise virtualization solutions, enabling them to benefit from BIG-IP APM’s unified access, security, and policy management. The scalable, high-performance capabilities of BIG-IP APM provide simplified access and control to users in hosted virtual desktop environments. Through these capabilities, F5 continues to deliver simple, broad virtual application and desktop support.
Simplify access to VMware virtual applications
BIG-IP APM provides a single, scalable access control solution that includes both remote and local network access policy and control. The solution can be extended to other applications to deliver a simple, low-cost, highly scalable enterprise infrastructure. BIG-IP APM supports the latest versions of VMware Horizon, ensuring maximum performance, availability, and scalability of VMware End User Computing (EUC) implementations.
Enterprises can use single sign-on (SSO) from smartcards with BIG-IP APM and VMware View Connection Server, enabling gateway consolidation for VMware EUC deployments. BIG-IP APM supports two-factor authentication via RSA SecureID and RADIUS through the native client for VMware EUC deployments. On-demand validation is available for mobile clients, as well as zero clients.
BIG-IP APM provides single sign-on (SSO) to VMware Identity Manager (vIDM), enforcing authentication and access policies. SSO is enabled via WebSSO and native VMware Horizon client support using PCoIP and Blast Extreme. The native client is launched from vIDM and establishes proxy connections through BIG-IP APM. Citrix ICA Proxy is also supported enabling BIG-IP APM to publish Citrix apps to the VMware vIDM portal. BIG-IP APM also delivers data loss protection by controlling USB redirection and client-drive mapping for VMware Horizon desktops via context-based policies.
Streamline Microsoft RDP access
BIG-IP APM integrates with the Microsoft RDP protocol, enabling Microsoft RDP access without the need to install client-side components or run Java. BIG-IP APM makes Microsoft RDP available to use on new platforms, such as Apple iOS and Google Android devices. It also enables native RDP clients on non-Windows platforms such as Apple Mac OS and Linux, where previously only a Java-based client was supported.
The Microsoft RDP native client can also be launched directly from the BIG-IP APM dynamic Webtop. Webtop shows only the applications available to a user based on their identity and context—regardless if the applications are on-premises or in the cloud. BIG-IP APM’s Microsoft RDP support works with any Microsoft, Apple, Apple iOS, Google Android web browser, or RDP app installed.
Consolidate Citrix infrastructure
BIG-IP APM supports Citrix XenApp and XenDesktop simultaneously, as well as Citrix StoreFront. This further consolidates support for the Citrix desktop and application virtualization infrastructure. For instance, in a typical Citrix XenApp or XenDesktop implementation, an administrator may save significant cost by replacing Citrix authentication management, Secure Ticket Authority (STA), NetScaler, and XenApp Services sites (required for Citrix sourced enterprise deployment) with BIG-IP APM.
Flexible remote desktop access
As web browser plug-ins become more difficult to support due to rapid changes, lockout, or abandonment of specific plug-in technologies, BIG-IP APM continues to enable simple remote desktop protocol (RDP) that adapts to your organization’s deployment and user experience requirements.
While ActiveX- and Java-based plug-ins are disappearing or left unsupported by web browsers, native Java RDP applications must be updated or they risk incompatibilities. In addition, support for device or operating system-specific RDP remote access clients can be labor-intensive and time-consuming. To address these challenges, BIG-IP APM supports client-less, browser-based RDP access. It serves as the single point of administration, while enabling universal remote access from any browser, without installation or clients.
BIG-IP APM supports a Java-based, platform-independent RDP client. The client is dynamically downloadable from BIG-IP APM with support for SSO, the ability to support up to sixteen parallel monitors, and with no administration rights required on endpoint devices.
Enhance Visibility and Reporting:
An in-depth view of logs and events provides access policy session details. With reports available from F5 BIG-IQ Centralized Management, BIG-IP APM helps you gain visibility into application access and traffic trends, aggregate data for long-term forensics, accelerate incident responses, and identify unanticipated problems before users experience them.
BIG-IP APM can customize reports with granular data and statistics for intelligent reporting and analysis. Examples include detailed session reports by:
- Access failures
- Users
- Resources accessed
- Group usage
- IP geolocation
Custom reports provide granular data and statistics for intelligent analysis.
Centralize reporting and logging
BIG-IP APM integrates with BIG-IQ Centralized Management to provide visibility through access reports and logs. BIG-IQ Centralized Management delivers analytical reports and logs based on devices and groups, so you can increase your insight into user access and analysis. It also helps you take quick actions if required, including the termination of specific access sessions. In addition, it provides a CSV export of BIG-IP APM report data, so it’s accessible for customized reports.
BIG-IQ Centralized Management provides a comprehensive dashboard for BIG-IP APM and user access. This dashboard view can help you better envision trends and relationship contexts more easily. This improves your response time should issues arise. Through this holistic view of application and network access, you can better understand the effectiveness of the policies you’ve established, find and best address weak points, and enhance response to issues and concerns.
The BIG-IQ Centralized Management comprehensive dashboard for BIG-IP APM helps you better view trends and relationship contexts.
Out-of-the-box configuration wizards
BIG-IP APM helps reduce administrative costs by making it easy to quickly configure and deploy authentication and authorization services. The configuration wizard includes a set of pre-built application access and local traffic virtual device wizards. With step-by-step configuration and context-sensitive help, review, and summary, setting up authentication and authorization services on BIG-IP APM is simple and fast.
Real-time access health data
In addition to the access dashboard available through BIG-IQ Centralized Management for BIG-IP APM, the access policy dashboard on the BIG-IP system gives you a fast overview of access health. You can view the default template of active sessions, network access throughput, new sessions, and network access connections, or create customized views using the dashboard windows chooser. By dragging and dropping the desired statistics onto the window pane, you gain a real-time understanding of access health.
Centralize Dynamic Access Control:
By enabling identity-, context-, and application-aware, policy-based access decisions, BIG-IP APM strengthens corporate compliance with security standards—and industry and government regulations—while ensuring users stay productive with appropriate application access.
Advanced Visual Policy Editor
The advanced, GUI-based Visual Policy Editor (VPE) in BIG-IP APM makes it fast and simple for you to design and manage granular access control policies on an individual or group basis. With the VPE, you can efficiently create or edit entire dynamic access policies with just a few clicks.
For example, you can design an authentication server policy integrated with RADIUS, assign resources for access once authorization is complete, or deny access for failure to comply with policy. A geolocation agent provides automatic lookup and logging. This simplifies the configuration process and helps you customize user access rules according to your organization’s geolocation policy.
The BIG-IP APM VPE can define rules per URL path. For example, policies can restrict application, network, and cloud access based on IP address. These restrictions can also be based on a specific day, time of day, or other identity-, context-, and applicationbased attributes. By centralizing and simplifying the management of contextual policies, you can efficiently and cost-effectively manage access.
The BIG-IP APM advanced Visual Policy Editor makes it fast and easy to create, modify, and manage granular identity-, context-, and application-aware access policies.
Dynamic access control
BIG-IP APM provides access authentication using access control lists (ACLs) and authorizes users with dynamically applied layer 4 and layer 7 ACLs on a session. Both L4 and L7 ACLs are supported based on endpoint posture as a policy enforcement point (PEP). BIG-IP APM allows individual and group access to approved applications and networks using dynamic, per-session L7 (HTTP) ACLs. You can use the BIG-IP APM Visual Policy Editor to quickly and easily create, modify, and manage ACLs.
BIG-IP APM also dynamically enforces step-up authentication to additional singleor multi-factor authentication methods. Step-up policies can be based on applications, secure portions of applications, sensitive web URIs, extending sessions, or any session variable.
Granular access policies
BIG-IP APM lets you design access policies for authentication and authorization, as well as optional endpoint security checking, to enforce user compliance with corporate policies and industry regulations. You can define one access profile for all connections coming from any device, or you can create multiple profiles for different access methods from varying devices, each with their own access policy. For example, you can create a policy for application access authentication or dynamic ACL connections. With policies in place, your network becomes identity-, context-, and application-aware: It understands who the user is, how and when the user is attempting application access, where the use is attempting to access the application from, what application the user is attempting to access, and the current network conditions at the time access is requested.
Identity-, context-, and application-based authorization
BIG-IP APM drives identity into the network, creating a simplified, central point of control over user access. When tens of thousands of users access an application, BIG-IP APM offloads SSL encryption processing, provides authentication and authorization services, and optionally creates a single secure SSL connection to the application server. Identity-, context-, and application-based authorization delivers complete, secure, policy-based control over users’ application, network, and cloud navigation.
Centralize access policy management
If you have multiple BIG-IP APM deployments, BIG-IQ Centralized Management can help you to efficiently manage them. It can manage policies for up to 100 BIG-IP APM instances, enabling you to import, compare, edit, and update granular access policies across multiple user devices.
With BIG-IQ Centralized Management and BIG-IP APM, you can import configurations from a master “source” BIG-IP APM instance, simplifying access policy distribution. You may also edit device or location-specific objects directly on BIG-IQ Centralized Management and have them propagate throughout your BIG-IP APM deployment. In addition, you can easily view the differences between current and proposed access configurations.
BIG-IQ Centralized Management enables the import, comparison, editing, and updating of access policies across multiple devices from a single interface.
Secure Web Gateway Services:
It’s vital to ensure corporate and regulatory compliance for Internet use. F5 Secure Web Gateway Services can enforce secure web access for on-premises, remote, and mobile users. It also helps protect against web-borne malware, targeted attacks, and other insidious dangers lurking on the web.
URL filtering
URL filtering helps to ensure appropriate usage policies. Using the extensive Forcepoint database, URL filtering in Secure Web Gateway Services controls access to websites, web-based applications, protocols, and videos. Secure Web Gateway Services also filters search results based on your policy, preventing the display of offensive search results or images. URL filtering is customizable, and it helps reduce and mitigate corporate exposure to web-based threats and data leakage. BIG-IP APM provides flexibility for enterprises to allow, block, or “confirm and continue” access for certain users to the Internet, specific websites, and web applications.
URL categorization database
Secure Web Gateway Services leverages the powerful Forcepoint URL categorization engine and database that is constantly classifying tens of millions of URLs across the Internet. URL categorization is contextually-aware and applies real-time classification information against known web pages—assessing new web pages and URLs using advanced machine learning. This minimizes false positives and improves URL classification.
Web security
Secure Web Gateway Services also detects and blocks malware or malicious scripts within web pages by scanning return HTTP/HTTPS traffic. The malware engine contains web malware analytics, signatures, and heuristic detection engines that identify and eradicate general and specialized threats.
When a remote user accesses the web through a per-app VPN tunnel in BIG-IP APM, Secure Web Gateway Services protects the session as though the user was on the corporate network. Authentication, URL filtering, and malware scanning polices are applied.
Secure Web Gateway Services can also bypass or block SSL websites (based on inspection) for privacy and compliance purposes—enabling flexible control for access to SSL-encrypted websites.
Real-time threat intelligence
Leveraging the Forcepoint cloud-based threat intelligence infrastructure to deliver constant, up-to-date security information, Secure Web Gateway Services detects threats within web and social networking content. It synchronizes with Forcepoint cloud-based threat intelligence on a user-configurable schedule.
User identification
Secure Web Gateway Services keeps track of the mapping between user identity and network addresses while enabling transparent, user-based security policies through the F5 User Identity Agent. The User Identity Agent runs on a Windows-based server and pulls information from Active Directory domain controllers, enabling Secure Web Gateway Services to fully track a user’s web activity by user identity or group membership.
Graphical security reporting and comprehensive logging
The graphical user interface within Secure Web Gateway Services lets system administrators view and export various security analytics reports. These reports empower administrators with total visibility of outbound and inbound web traffic, Internet use, and policy enforcement. Logs may be published through the F5 log publisher to wellknown security information and event management (SIEM) solutions, including ArcSight and Splunk for longer-term storage and analytics.
Managing up to 100 Secure Web Gateway Services appliances (running with BIG-IP APM), BIG-IQ Centralized Management enables you to centrally view and manage the devices and their policies. BIG-IQ generates reports for Secure Web Gateway Services, including reports on the top blocked users, websites, categories, host names, client IPs, applications, and application families. It also enables you to track your Secure Web Gateway Services subscriptions. Data can be exported in .csv files so you may build your own reports and correlate data in other tools.
Flexible licensing and deployment options
Secure Web Gateway Services has two licensing options available. One subscription is for the URL filtering service that controls access to websites or web applications based on the categories and risks associated with the intended URLs. The second subscription includes in-line scanning of web content to detect and block threats and malware. Each is available as a one-year or three-year subscription.
Creating custom URL categories to enforce outbound web traffic access control does not require either a URL filtering or Secure Web Gateway services subscription. For malware scanning and full-scale URL filtering, however, a full Secure Web Gateway Services license, along with BIG-IP APM, is necessary. Secure Web Gateway Services can be flexibly deployed through explicit proxy and transparent proxy modes.
Unparalleled Flexibility, High Performance, and Scalability:
BIG-IP APM delivers flexible application, cloud, and network access and performance. It keeps your users productive and enables your organization to scale quickly and costeffectively.
Deployment options
BIG-IP APM can be deployed three different ways to meet a variety of access needs. It may be deployed as an add-on module for BIG-IP LTM to protect publicfacing applications; it can be delivered as a standalone appliance; and it can run on a BIG-IP LTM Virtual Edition (VE) to deliver flexible application access in virtualized environments.
Application firewall
With the efficient, multi-faceted BIG-IP platform, you can add application protection without sacrificing access performance. BIG-IP APM and BIG-IP Access Policy Manager (ASM)—F5’s agile, scalable web application firewall (WAF)—run together on a BIG-IP appliance to protect applications from attack while providing flexible, layered, and granular access control. Attacks are filtered immediately to ensure application availability, security, and an optimum user experience. This integrated solution helps ensure compliance with local and regional regulations, including PCI DSS, so you can minimize non-compliance fine payouts and protect your organization from data loss. And since there is no need to introduce a new appliance to the network, you save costs with an all-in-one solution.
Unprecedented performance and scale
BIG-IP APM offers SSL offload at network speeds and supports up to 3,000 logins per second. For organizations with an ever-growing base of web application users, BIG-IP APM scales quickly and cost-effectively.
BIG-IP APM use is based on two types of user sessions: access sessions and concurrent connection use (CCU) sessions. Access sessions apply to authentication sessions, VDI, and similar situations. CCU is applicable for network access, such as full VPN access, application tunnels, or web access. The BIG IP platform and the F5 VIPRION platform, which support BIG IP APM, handles exponentially more access sessions than CCU sessions in use cases such as authentication, SAML, SSO, Secure Web Gateway Services, and forward proxy. This means that if you intend to use BIG-IP APM for authentication, VDI, and the like, the number of sessions supported on a VIPRION platform can be up to two million, and a BIG-IP platform can support up to one million.
F5 Virtual Clustered Multiprocessing
BIG-IP APM is available on a chassis platform and on all BIG-IP appliances, and it supports the F5 Virtual Clustered Multiprocessing (vCMP) environment. The vCMP hypervisor provides the ability to run multiple instances of BIG-IP APM, resulting in multitenancy and effective separation. With vCMP, network administrators can virtualize while achieving a higher level of redundancy and control.
BIG-IP Platforms:
Only F5’s next-generation, cloud-ready ADC platform provides DevOps-like agility with the scale, security depth, and investment protection needed for both established and emerging apps. The new BIG-IP iSeries appliances deliver quick and easy programmability, ecosystem-friendly orchestration, and record-breaking, software-defined hardware performance. As a result, customers can accelerate private clouds and secure critical data at scale while lowering TCO and future-proofing their application infrastructures. F5 solutions can be rapidly deployed via integrations with open source configuration management tools and orchestration systems.
In addition to the iSeries, F5 offers VIPRION modular chassis and blade systems designed specifically for performance and for true on-demand linear scalability without business disruption. VIPRION systems leverage F5’s ScaleN clustering technology so you can add blades without reconfiguring or rebooting.
Virtual editions of BIG-IP software run on commodity servers and support the range of hypervisors and performance requirements. These virtual editions provide agility, mobility, and fast deployment of app services in software-defined data centers and cloud environments.
BIG-IP iSeries Appliances
VIPRION Chassis
BIG-IP Virtual Editions