Try our new research platform with insights from 80,000+ expert users

F5 Advanced WAF Valuable Features

RS
Senior Network Consultant at Visionet Systems Inc.

It's pretty smooth. Whichever load we put on it, we've observed minimal chances of the WAF exploiting the memory or sessions hanging. 

The bot protection aspect works perfectly fine. All the solutions and features are renewed and they're working well. I don't see anything that can be improved.

We also leveraged AI initiatives. 

View full review »
reviewer2641242 - PeerSpot reviewer
Global Channel Alliances Lead at a tech vendor with 10,001+ employees

F5 Advanced WAF provides two different licensing models. The subscription-based model offers competitive pricing, making it easier for me to see ROI. However, the perpetual license, despite an initial higher cost, lacks transparency regarding support expiration. Due to the subscription, I can compare it with other tools, but as a perpetual buyer, I am unaware of support expiration until after the purchase, allowing indicative ROI calculations but not actual ones. 

Furthermore, F5 Advanced WAF offers features not available in other products, though I suggest consulting a technical expert for specific features.

View full review »
reviewer2000166 - PeerSpot reviewer
Senior Security Engineer at a financial services firm with 1,001-5,000 employees

The solution's most valuable features include application DDoS protection, bot blocking, and HTTP header verifications. The solution protects against seven types of DDoS attacks. 

View full review »
Buyer's Guide
F5 Advanced WAF
June 2025
Learn what your peers think about F5 Advanced WAF. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
859,579 professionals have used our research since 2012.
Ahmed Moamen - PeerSpot reviewer
Senior Security Solutions Architect at Orange

F5 offers a versatile solution that can be integrated with APM in cases where integration with an external IDB is needed. It is useful for authentication backup if the on-prem directory service is unavailable. 

Additionally, its WAF functionality is valuable for protecting applications from attacks. It is a versatile and strong solution that's easy to understand and deploy.

View full review »
Amr Shawky - PeerSpot reviewer
Security & Infra Technology Specialist at BARQ Systems

The AOF solution provides numerous security features. It protects applications from various threats, including SQL injection, and ensures that the application behavior is from a human, not a bot. It includes DDoS protection which has been enhanced after migrating from SDM. 

The solution is very effective as it includes security features important for financial applications where protection is necessary to avoid potential financial loss or penalties. It helps protect the core and backend of applications.

View full review »
Abdul Azim - PeerSpot reviewer
Network Security Engineer at IIPL
  • Bot Protection: Mitigates automated attacks like credential stuffing.

  • API Security: Safeguards APIs against exploitation.

  • Advanced Threat Detection: Protects against OWASP Top 10 vulnerabilities and zero-day threats.

  • DDoS Mitigation: Ensures application availability during attacks.

  • Behavioral Analytics: Detects and mitigates anomalous traffic patterns.

  • Granular Policy Control: Enables precise security policy customization.

  • Threat Intelligence Integration: Offers real-time updates for proactive protection.

  • View full review »
    Mirseyid M - PeerSpot reviewer
    Cyber Security Engineer at AzInTelecom

    F5 Advanced WAF provides valuable features like signature-based protection, which includes up-to-date threat signatures for common attacks such as SQL injections and DoS protection. It also supports a load balancer for enhanced security and traffic management.

    View full review »
    RoiNahari - PeerSpot reviewer
    CEO at CyberApp

    The whole mechanism of F5 Advanced WAF is effective. It contains the logic of both negative and positive security combined, providing added value to the company I work with to protect their applications.

    View full review »
    EK
    Import Comliance Specialist at Silicon21

    F5 Advanced WAF is a comprehensive community platform with a strong commitment, making it valuable for businesses. The capabilities on GitHub are highly appreciated, allowing me to count on F5 for reliability.

    View full review »
    Usama Nasir - PeerSpot reviewer
    Network Security Engineer at IIPL

    The traffic learning feature stands out as the most valuable. When an app is accessed, the log generated in F5 Advanced WAF provides suggestions on what actions to take. This feature is particularly beneficial in new vulnerability scenarios, offering guidance based on learned data. 

    Additionally, I appreciate the way F5 Advanced WAF builds policies by configuring a basic policy and queuing it in learning mode. The solution learns from logs, and based on that learning, I configure ASM signatures.

    View full review »
    HR
    Systems Engineer at Sify Technologies

    The product is used to secure web applications and has the ability to use API templates and bot protection features, such as blocking requests or presenting CAPTCHA pages to end users. We also implement Swagger files for API security and use custom profiles for device ID threshold management.

    View full review »
    YUSUF  TAIWO - PeerSpot reviewer
    Founder roverupgrades.com.ng at 22 TEAM RESOURCES LIMITED

    F5's user-friendly interface and seamless integration stand out as the most valuable features for us. The intuitive interface streamlines tasks, providing a straightforward experience. F5's adaptability in diverse environments sets it apart, especially when compared to alternatives like FortiGate. Despite being pricier, the ease of integration and user-friendly design make F5 Advanced WAF our preferred choice for securing web applications. F5's commitment to customer engagement, exemplified by hosting a certification event in Nigeria, further shows its support and involvement in our region.

    View full review »
    HU
    Freelancer at Freelance

    The most valuable feature of F5 Advanced WAF is its grand unity of the implementation, where you have the freedom to configure based on how it affects your use case or your organization. With the default setting of implicit deny, you can gradually start defining and deploying the tool to align with your environment, whether it is outdated, recent, or futuristic. This allows you to customize the solution to protect you from threat actors. You have the ability to define what the advanced threat act should do - whether it should alert, deny, or both - and it will deliver based on your configuration. Unlike other online solutions, F5 Advanced WAF provides flexibility to deliver to your unique environment the way you want.

    View full review »
    reviewer2586870 - PeerSpot reviewer
    Senior Network Engineer at a comms service provider with 11-50 employees

    The most valuable feature of F5 Advanced WAF is its extensive set of capabilities for application protection, including DDoS prevention, and its ability to work with Pentesters and external scanners to observe user activity and eliminate false positives. This comprehensive approach to application security enables an organization to protect its web applications from diverse web threats effectively.

    View full review »
    Özden-Aydın - PeerSpot reviewer
    Technology Consultant at Netwiser

    The web attack signatures are very important for detecting attacks, and the bot detection capability is an important feature that works well with F5 Advanced WAF.

    View full review »
    Phani Sundar Mandarapu - PeerSpot reviewer
    Enterprise Architect at Collins Aerospace

    It's a valuable tool to protect web servers exposed to the external network. With numerous web applications running on Apache or IIS servers, the F5 Advanced WAF's threat detection capabilities protect the network before traffic reaches those servers.

    It's a fairly easy-to-use and user-friendly tool. My administrators and team also like its ability to customize the rules per the requirements. 

    View full review »
    GM
    SOC Analyst at a financial services firm with 1,001-5,000 employees

    The most valuable feature of F5 Advanced WAF is its ability to have a pool of resources that can distribute your traffic, and that is a plus for me. My company tried to look into a competitor, Imperva, but it was lacking that capability, so F5 Advanced WAF outperforms Imperva.

    View full review »
    Richard Polyak - PeerSpot reviewer
    Sr. Architect at NBC Universal

    The most valuable features of F5 Advanced WAF are the easy identification of events and customization. We can pinpoint our settings.

    View full review »
    ME
    Network Security Consultant at GBM

    It is very powerful to be able to enable database security integration for an administrator or customers.

    The integration between modules is good. You can license the APM policy manager, integrate, and make security posters for VPN clients. You can natively integrate the login pages to ensure client machines and websites are protected. 

    The solution includes the typical load balancing offered by other vendors but has enhanced security compliance features that are powerful and easy to configure.

    It is easy to obtain dashboard compliance because security policy views are included.  

    View full review »
    Richard Polyak - PeerSpot reviewer
    Sr. Architect at NBC Universal

    Identification, ease of use, and ease of modifying it to most of our needs are valuable.

    View full review »
    Mohamed Fouad - PeerSpot reviewer
    Cybersecurity Team Leader at Summit Technology Solution

    F5 Advanced WAF helps our engineers to learn the complete configuration, including fundamental and advanced policies.

    View full review »
    Muhammad Salahuddin - PeerSpot reviewer
    Unit Head - Network and Security Solutions at FPM Solutions

    F5 products are highly stable, top-notch solutions, and we have also the expertise to deploy and design the F5 and Palo Alto product lines. I have more than 10 years of experience with F5 and Palo Alto. I have deployed around F5 products for around seven or eight customers of F5.

    View full review »
    Saeid Khanipour Ghobani - PeerSpot reviewer
    IT Manager at Technology Evaluation Center

    The solution uses AI to protect against botnet attacks. 

    The solution has a vCMP-like feature that allows you to visualize more than two  TMOS at the same time on your hardware. This feature is not available with other solutions. 

    View full review »
    Quoc Nguyen - PeerSpot reviewer
    F5 Product Manager at Westcon-Comstor

    The most valuable features of F5 Advanced WAF are the security features and the protection.

    In the future, I would like to see F5 include AI in the hardware of F5 Advanced WAF.

    View full review »
    KL
    Head of Presales at a tech vendor with 10,001+ employees

    The threat intelligence function is great. Nowadays, there is more awareness on the security side. They'd have a real-time update from F5. It provides peace of mind on the security side for the customer.

    It is an add-on module to protect the web application.

    The solution can scale with planning.

    The solution is stable.

    Support is helpful.

    View full review »
    Chee Young Tan - PeerSpot reviewer
    Director at ST Electronics

    It's flexible and powerful, and the users can input their own rules to the system.

    View full review »
    Bonieber  Orofeo - PeerSpot reviewer
    IT Manager at Chong Hua Hospital

    The most valuable features of F5 Advanced WAF are the overall capabilities, there is not a comparable solution on the market.

    View full review »
    reviewer1908099 - PeerSpot reviewer
    Territory Manager at a computer software company with 51-200 employees

    The most valuable features of F5 Advanced WAF are the balancer and you can change policies very easily.

    View full review »
    reviewer1877577 - PeerSpot reviewer
    Information Security Officer at a computer software company with 11-50 employees

    The most valuable features of the F5 Advanced WAF are the enhanced ASM and the performance. Additionally, the usability and effectiveness are very good.

    View full review »
    Özden-Aydın - PeerSpot reviewer
    Technology Consultant at Netwiser

    Web attack signatures are very important for detecting web attacks. The bot detection feature is also crucial in reducing bot attacks.

    View full review »
    EhabAli - PeerSpot reviewer
    Sr. Cybersecurity Solutions Architect at BMB

    Customers find the load balancer feature as the most valuable.

    View full review »
    SH
    Information Security Manager at a financial services firm with 1,001-5,000 employees

    The most valuable features of F5 Advanced WAF are SSL uploading, signature, and anomaly detection. It is overall a high-quality solution.

    View full review »
    MK
    Security Specialist at Saman Electronic Payment (SEP)

    I like the solution for ASM. There is an online update certification, but access is locked so we couldn't use it.

    View full review »
    reviewer1374657 - PeerSpot reviewer
    Executive Director IT Security at a printing company with 501-1,000 employees

    The features I think are the most valuable starts with the IP intelligence component. That is separately licensed and it is definitely one component that we have made heavy use of. Geo-blocking is another — which can be done without a WAF because you do not necessarily need a WAF to do it — but the F5 WAF has those capabilities.  

    The signature-based controls that F5 has are another one of the heavier-used components that Advanced WAF has. We do not have to worry about updating signatures, et cetera. WAF will automatically update the signatures for us. I think that is a nice feature.  

    Those are the biggest things that we are making use of month-to-month.  

    View full review »
    JD
    Network Engineer at a tech services company with 11-50 employees

    In terms of F5 Advanced WAF's most valuable features, I would definitely say its stability. F5 is one of the most stable products. Either as the load balancer or the web application firewall, it is very stable.

    Additionally, the method it uses to block attacks and the logging and support are very good. You can see anything you want in the logging and reporting section of the device, it is very detailed. These are two valuable features from F5.

    View full review »
    Rajnish Niraj - PeerSpot reviewer
    Founder at Fencesense

    It is a very flexible solution. iRules is quite appealing when it comes to F5, and they apply it throughout their solution. BIG-IP is a known platform, and it is a part of F5 now. Application delivery or web application firewalls, F5 understands these terms and then suggests better data policies. But you have to do the work on your application's performance first. You have to look in the logs and understand the total attack you should prevent when we put it in the circuit protection mode, which works perfectly well.

    iRules truly excites me because it has the ability to prevent the end-user and infrastructure from external threats.

    Even if the F5’s default signatures and the default behavior are unable to help you, you can customize iRules to reach the objectives.

    View full review »
    AhmedIsmael - PeerSpot reviewer
    Network & Telecom Manager at a retailer with 1,001-5,000 employees

    F5 Advanced WAF's best feature is that it's a combination of LTM and ASM in one license.

    View full review »
    GM
    SOC Analyst at a financial services firm with 1,001-5,000 employees

    My favorite feature of F5 is the ability to play around with the ciphers. I also like the ability to have an immediate display of the support IDs when a real blockage occurs. The protection offered is great.

    View full review »
    reviewer1774098 - PeerSpot reviewer
    Head Of Information Security (CISO) at a financial services firm with 1,001-5,000 employees

    There are a lot of good features.

    View full review »
    reviewer1212621 - PeerSpot reviewer
    Product Manager at a comms service provider with 501-1,000 employees

    The most valuable feature of F5 Advanced WAF is its ability to mitigate attacks: DDoS and DNS, or layer seven application attacks, OWASP, and email.

    View full review »
    Sherif Ghareeb - PeerSpot reviewer
    Presales Senior Network Consultant at Diverse

    The product has valuable features for load balancing, monitoring tools, and HPXpress services.

    View full review »
    GS
    Security Consultant at a tech services company with 501-1,000 employees

    There are two main features that we love on F5.

    The first is the hardware itself. It's extremely stable and reliable. We never face any issues with it and performance is never affected. 

    The second is the features on offer. Feature-wise, they are always cutting edge and up-to-date. Many features aren't available via competitors. There's always a lot of enhanced critical features that just aren't available through anyone else, or, if they are, are too lightweight. They're the leaders in the space.

    View full review »
    reviewer1017291 - PeerSpot reviewer
    Head of Information Security and Infrastructure Dept. at a tech services company with 201-500 employees

    What I found most valuable in F5 Advanced WAF is its automatic policy feature.

    View full review »
    NI
    Deputy Manager at Saraswat Bank

    We're in a banking environment and the signature update is a good feature. It's also very easy to implement WAF. The product works well for us. 

    View full review »
    HN
    Solutions Specialist at FPT

    The most valuable features of this solution are the WAF protection, Data Safe, and the seven-layer DDoS.

    View full review »
    IK
    Security team leader at a aerospace/defense firm with 10,001+ employees

    The web application firewall itself is most valuable. It provides positive security and negative security. In negative security, it blocks a task such as cross-site scripting, code injection, etc. In positive security, it lets you specify and enforce things, such as the parameters allowed in username and password fields and the number of characters allowed in a field.

    It also has antivirus and DDoS mitigation capabilities. We have enabled these features. 

    It is also quite intuitive and user-friendly. They have several webinars that are actually like labs. You can use these webinars to learn about how to use all features of the product.

    View full review »
    PM
    Solution Architect at Softcell Technologies Limited

    The valuable features vary from customers to customers. Some customers are okay with the basic features of the WAF, and some customers use advanced WAF with a few other features.

    View full review »
    reviewer1394661 - PeerSpot reviewer
    Senior Technical Specialist | Cloud Platforms at a financial services firm with 5,001-10,000 employees

    I like all of the features, but the main one is the attack signatures.

    View full review »
    reviewer1057971 - PeerSpot reviewer
    Senior Engineer at a tech services company with 51-200 employees

    With F5 Advanced WAF, it was protection for online publications and for our customers that caused us to choose the platform. It was integrated by our company and not the dealer. 

    View full review »
    NR
    Snr. Technical ADN Consulting Architect at ADN Consultants & Architects (PTY) Ltd

    F5 is one of the best products. We use it for multiple segments within our organization and applications. It is a central point of all the applications being scrubbed and checked.

    View full review »
    reviewer2155350 - PeerSpot reviewer
    Application Security Engineer at a financial services firm with 10,001+ employees

    Protection from attacks is the best feature of this product. 

    View full review »
    reviewer1627089 - PeerSpot reviewer
    Chief Technology Officer at a tech company with 11-50 employees

    I like the security features, especially against SQL injection.

    View full review »
    it_user1568430 - PeerSpot reviewer
    Information Security Coordinator at a non-tech company with 5,001-10,000 employees

    We can monitor IP locations, but we have constraints from each country. It has a replication feature. Licenses can be shared, taking turns with each license.

    View full review »
    it_user1558746 - PeerSpot reviewer
    Key account manager

    It is easy to use, and it's also easy to configure. 

    The most valuable feature is that it is secure.

    View full review »
    reviewer1334088 - PeerSpot reviewer
    Head of IT Security at a financial services firm with 201-500 employees

    The product is very easy to use and they provide great support. I like the dashboard and reporting. 

    View full review »
    reviewer1139526 - PeerSpot reviewer
    Technical Team Leader at a tech services company with 201-500 employees

    This solution is an enterprise-class firewall that provides both load-balancing and security.  Once it's deployed, it works smoothly and without issue.

    View full review »
    it_user1066509 - PeerSpot reviewer
    Cyber & Security Application Delivery Expert at Hewlett Packard Enterprise

    The anti-bot protection is the solution's most valuable feature. Safe-guard or credential staffing are also useful features.

    View full review »
    GD
    Works at a financial services firm with 10,001+ employees

    This solution inspects your traffic and based on that, automatically create distinct qualities for you, so you can add this to the policy already created. That's what I like most.

    View full review »
    it_user820011 - PeerSpot reviewer
    Head IT Infrasrtucture at ActivEdge

    The DCI feature is very valuable. The solution is very robust, and I like the setup.

    With this solution, you can set distinct perimeters that you can monitor. You can go very granular, which makes it possible to set up very specific perimeters that you are then able to secure.

    View full review »
    reviewer1046964 - PeerSpot reviewer
    IT Engineer at a tech vendor with 51-200 employees

    The features I find most valuable is the behavior analysis and the additional subscription for global threats. It's an additional feature, which I haven't seen in another solution. I also like the DDos protection behavior too, because some DDos are quite a problem and we have problems with it.

    I am very happy with the interface, the dashboard, and the reports. Whenever I see a malicious request, I can see if I blocked it and then I can decide if I want to accept or decline. I am therefore completely happy with the ability to report and so on. 

    View full review »
    it_user1066509 - PeerSpot reviewer
    Cyber & Security Application Delivery Expert at Hewlett Packard Enterprise

    The anti-bot protection has been the most valuable.

    View full review »
    reviewer898881 - PeerSpot reviewer
    Security Specialist at a energy/utilities company with 51-200 employees

    The most valuable feature is network detection intelligence and the ability to get extra internal access. I don't have knowledge about all the functions but, because it is a fully automatic process, the devices scan a lot of traffic. It is automatically set up to protect our web.

    View full review »
    reviewer1708575 - PeerSpot reviewer
    Network Engineer at a computer software company with 11-50 employees

    The WAF and APM are very useful. I like the modules.

    The solution has been mostly stable and reliable.

    It can scale.

    View full review »
    reviewer1721355 - PeerSpot reviewer
    Security Technical Manager at a tech services company with 51-200 employees

    One of the most valuable features is the Local Traffic Manager.

    View full review »
    technica696483 - PeerSpot reviewer
    Technical Product Manager at a tech services company with 11-50 employees

    We have found the accessibility feature most valuable. For example, the solution is easily accessible on mobile and laptop devices and allows you to send and receive money from anyone.

    View full review »
    Buyer's Guide
    F5 Advanced WAF
    June 2025
    Learn what your peers think about F5 Advanced WAF. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
    859,579 professionals have used our research since 2012.