Big Ip Advanced Firewall Manager Datasheet
Big Ip Advanced Firewall Manager Datasheet
4 Network DDoS Protection F5 BIG-IP Advanced Firewall Manager (AFM) is a high-performance, full-proxy network security
solution designed to protect networks and data centers against incoming threats that enter
5 In-depth Infrastructure
Protection the network on the most widely deployed protocols. Built on F5’s industry-leading Application
Delivery Controller (ADC), BIG-IP AFM gives service providers a scalable, subscriber-aware
12 Features and Specifications
platform that delivers the flexibility, performance, and control needed to mitigate aggressive
13 Platforms and Services distributed denial-of-service (DDoS) and protocol attacks before they overwhelm and
degrade services.
15 More Information
Unlike traditional firewalls, BIG-IP AFM is built on the full-proxy architecture. Incoming connections
are fully terminated, inspected for possible security threats, and only then forwarded to the
server—assuming no threats are present.
With these full-proxy capabilities, BIG-IP AFM has in-depth understanding of the most commonly
used inbound protocols such as HTTP/S, DNS, Diameter, GTP, SSH, ICMP, and TCP, and supports
a rich set of services that expand beyond traditional stateful firewall capabilities. Additionally, this
security enables deep visibility into connections, allowing data to be manipulated and modified
before it’s sent to servers or otherwise.
Gone are the days of mapping applications to zones or scouring through spreadsheets of firewall
policies to distinguish attacks on specific applications or to identify the IP address for a particular
application server.
Unlike most network security solutions, BIG-IP AFM security policies are logically aligned with
the applications in specific traffic flows—streamlining security operations and heightening
security effectiveness. However, similar to web application firewall solutions, BIG-IP AFM
attaches network security policies to application objects. Details about the application
parameters, including server addressing, SSL offload, and access policies, can be grouped
together with security parameters, including policies, SSL inspection, and logging. This includes
information on which layer 7 protocols are permitted for specific application port access.
F5’s app-centric approach provides increased efficiency in addressing app concerns and more
accuracy in threat detection and policy effectiveness.
Further, since the configuration for an application is unified with an associated network security
policy, deprovisioning of applications is also streamlined. When an application is deprovisioned,
the obsolete security rules are simultaneously deprovisioned. BIG-IP AFM helps ensure the
effectiveness of application deployment and simplifies policy assurance above rigid zone-based
or segment-based constructs.
The full-proxy architecture of BIG-IP AFM helps to ensure the application infrastructure is protected
using advanced capabilities to mitigate DoS and DDoS attacks. The out-of-the-box functionality
includes a comprehensive set of signatures that enable organizations to defend against, track,
and report a breadth of well-known network DDoS attacks and methodologies. Admins can
automatically or manually set DDoS threshold values. Furthermore, you can configure packet limits,
percentage increases for thresholds, and set absolute rate limits of packets used in attack vectors.
Using DoS profiles, BIG-IP AFM performs a variety of checks and mitigates a multitude of attacks,
including flood, sweep, teardrop, and smurf attacks, while protecting protocols like SIP and DNS.
BIG-IP AFM also helps to ensure clean pipes for inbound traffic. Using remotely triggered black
hole filtering (RTBH), BIG-IP AFM stops attack traffic even before it leaves the ISP network realm.
When activated, BIG-IP AFM automatically broadcasts malicious IPs to upstream routers to
enforce denylisting through participating ISP routers, ensuring that only good traffic is routed to
the data center network and applications within. RTBH functionality leverages the BIG-IP AFM
BIG-IP AFM USES HARDWARE- IP shun category denylist that uniquely identifies and blocks malicious L3–L7 attack sources in
BASED DDOS MITIGATION hardware until feed lists are updated. BIG-IP AFM can also signal and redirect traffic to
THAT SCALES TO PREVENT F5 Silverline for DDoS Protection service. Silverline’s DDoS defense can be either reactive or
HIGH-VOLUME, TARGETED, proactive hybrid DDoS defense—ensuring always-up services by rerouting attacks away from
NETWORK FLOOD ATTACKS— the data center for cloud-based mitigation.
WHILE ALLOWING LEGITIMATE
TRAFFIC TO FLOW BIG-IP AFM offers more granularity and visibility into traffic and DDoS attacks than most solutions,
WITHOUT COMPROMISING with detailed logging and reporting of attack detection and mitigation. It also delivers increased
PERFORMANCE. SYN cookie protections, per-server granular DDoS policies, IP reputation intelligence, and custom
allowlist and denylist support. BIG-IP AFM uses hardware-based DDoS mitigation that scales to
prevent high-volume, targeted, network flood attacks—while allowing legitimate traffic to flow
without compromising performance.
Dynamic Denylisting
Attackers are continually changing their tactics in order to circumvent security controls. One of the
more useful evasive tactics used by attackers is changing different IP addresses. By changing their IP
addresses and associated domain names they can avoid being blocked and continue their attacks.
BIG-IP AFM provides IP denylisting capabilities that help organizations to minimize enforcement time
of dynamic security controls that guard against known malicious IPs. IP denylisting complements
existing IP intelligence services. It facilitates more immediate filtering of malicious traffic until
intelligence feeds containing denylisted IP addresses are updated. Up to 100,000 entries can be
denylisted almost instantaneously to enable temporary, immediate blocking (or allowlisting) of
malicious IPs. IP denylisting reduces time-to-enforcement and increases speed of mitigation based
on real-time intelligence from BIG-IP AFM, other BIG-IP modules, and third-party monitoring systems.
Organizations today are exposed to a variety of potentially malicious attacks from rapidly
changing IP addresses. A major advantage in your network protection scheme is the ability to
anticipate, detect, and respond to threats before they hit the data center. BIG-IP AFM integrates
with F5 IP Intelligence Services for stronger context-based security that strategically guards
against evolving threats at the earliest point in the traffic flow.
IP Intelligence Services minimizes the threat window and enhances BIG-IP AFM DDoS and
network defense with up-to-date network threat intelligence for stronger, context-based
security. It maintains information on more than one million malicious URL and IP addresses, and
can effectively block connections to and from those addresses. To minimize the threat window
and keep an organization’s data and reputation safe, the IP Intelligence Services database of
addresses is refreshed every five minutes from the cloud. Administrators can assign default
classes and behaviors to feed lists, allowing more control for each IP intelligence category by
specifying response actions and default logging for each policy. IP Intelligence Services reduces
risk and increases data center efficiency—eliminating the effort to process bad traffic.
BIG-IP AFM uniquely controls operations in the SSH channel and helps prevent data breaches,
malware distribution, and compliance failures. When deployed in front of SSH servers, BIG-IP
AFM acts as a man-in-the-middle SSH proxy—filtering SSH traffic, and controlling access to files,
BIG-IP AFM BENEFITS databases, and system information by limiting task users can perform. Unlike leading firewalls,
FROM THE EXTENSIBILITY SSH policies limit permissible actions per user or per virtual server to strengthen security on SSH
OF F5 IRULES, ALLOWING channels—tracking usage and preventing misuse of SSH channels by employees and contractors
ADMINISTRATORS TO EXPAND and stopping east-west attacks that move throughout the infrastructure. Additionally, BIG-IP AFM
FUNCTIONALITY AND DEPLOY
prevents SSH sessions from remaining open indefinitely and ensures effective and continuous
CUSTOM RULES THAT
SSH key management for tighter security and compliance.
PROTECT AGAINST COMPLEX
AND MULTI-LEVEL ATTACKS. Unsurpassed Flexibility and Extensibility
Rapid response is vital in minimizing risk imposed by uncommon attacks. Many firewalls fail to
secure the perimeter when faced with less common attacks like Heartbleed. As a component
of the F5 BIG-IP® platform, BIG-IP AFM benefits from the extensibility of F5 iRules®, allowing
administrators to expand functionality and deploy custom rules that protect against complex
and multi-level attacks.
WHILE CONSOLIDATING subscribers while consolidating network infrastructure without compromising flexibility.
NETWORK INFRASTRUCTURE
In mobile networks, BIG-IP AFM forms the basis of the F5 S/Gi firewall solution. Deployed at the
WITHOUT COMPROMISING
Gi interface of 3G networks and the SGi interface of 4G/LTE networks, the S/Gi firewall solution
FLEXIBILITY.
enforces network perimeters, protects the mobility infrastructure and subscribers. It gives service
providers the scalability and flexibility for advanced protocol and service enforcement. The S/Gi
firewall solution takes advantage of F5’s intelligent services framework, meaning service providers
can consolidate additional network and security functions such as carrier-grade NAT (CGNAT)and
subscriber traffic visibility—all on a single platform. The F5 iSeries and VIPRION platforms have
built-in Telco-grade dependability to ensure consistent service operation under heavy workloads.
For encryption/decryption, both the iSeries and VIPRION are FIPS-140 certified to ensure the
highest level of protection for subscriber traffic.
CGNAT
The worldwide proliferation of wireless and Internet-enabled devices has led to the rapid
depletion of IPv4 addresses. All of the five Regional Internet Registries (RIR) has exhausted
its IPv4 allocations, and final pool exhaustion happened in November 2020; meanwhile, IPv6
adoption continues to grow. Service providers need a solution that will help them manage IPv4
address depletion and increase network optimization by seamlessly migrating to IPv6.
DNS Security
DNS servers are critical to any mobile or fixed line network operator. Security is paramount to
operations, as the DNS protocol serves as the basis for internet infrastructure mapping of the
BIG-IP DNS DELIVERS AN web domains that subscribers access. BIG-IP® DNS delivers an intelligent and scalable DNS
INTELLIGENT AND SCALABLE infrastructure that gives mobile users faster access and service response. This makes it easy for
DNS INFRASTRUCTURE service providers to optimize, monetize, and secure their DNS infrastructures. F5 DNS provides
THAT GIVES MOBILE USERS carrier-grade, high-performance LDNS caching and resolving, and is a hyper-scale authoritative
FASTER ACCESS AND SERVICE
DNS solution that handle business growth and sudden demand spikes.
RESPONSE. THIS MAKES IT
EASY FOR SERVICE PROVIDERS BIG-IP AFM shields the DNS infrastructure from malicious attacks designed to reduce DNS
TO OPTIMIZE, MONETIZE, and service performance, launched by infected subscribers from undesired DNS queries and
AND SECURE THEIR DNS responses. F5’s intelligent protection of DNS services inspects and validates traffic adherence
INFRASTRUCTURES. to the DNS protocol while dropping invalid requests or refusing to accept unsolicited responses.
BIG-IP AFM is an ICSA Labs certified network firewall with DDoS threshold alerting that hyper-
scales across many devices using IP Anycast for DDoS absorption. It mitigates threats by blocking
access to malicious IP domains.
Service provider networks operate a number of protocols that enable fixed and mobile subscriber
connectivity. These protocols have weak or non-existent built-in security and can be exploited by
an attacker to steal information or impact services. Protecting them is a must in order to deliver an
experience that meets customers’ expectations in a competitive marketplace.
BIG-IP AFM Intrusion Prevention System (IPS) delivers deep packet inspection and visibility for
incoming network traffic. BIG-IP AFM IPS engine performs Layer 5-7 traffic inspection for security
incidents, protocol/application violations and exploits to take appropriate action for prevention.
It reviews traffic for adherence to 25+ protocol standards and matches against hundreds of known
attack signatures and exploits.
For Mobility service providers, BIG-IP AFM IPS performs traffic inspection and protocol adherence
for SS7, Diameter (FS.19 compliance checks), HTTP/2, GTP (FS.20 compliance checks), SCTP and
SIP to ensure that these application servers are not attacked or exploited.
BIG-IP AFM IPS is architected upon the F5 BIG-IP platform, and designed for native multi-threaded
processing, for ease of scalability—enabling it to handle traffic spikes or planned growth without
compromising services. The multi-threaded architecture ensures high-availability and enables
hit-less upgrades to enable non-stop business operations and risk exposure.
BIG-IP AFM IPS’s architecture supports rapid visibility of threats via a BIG-IQ dashboard. High-speed
logging for near real-time visibility and control is also supported to third-party SIEM platforms.
To further help service providers keep up with evolving attacks and hacks, BIG-IP AFM IPS has
incorporated a traffic learning capability that deeply monitors traffic and auto-develops policies.
WHEN BIG-IP AFM IS DEPLOYED The Traffic Learning capability suggests rules based on traffic patterns that can be accepted or
IN A SERVICE PROVIDER'S denied manually or automatically to easily add protection without expertise or overhead.
NETWORK, IT FEATURES
KEY DIFFERENCES WHEN IoT Protection
COMPARED TO TRADITIONAL
The Internet of things (IoT) comes in all shapes and sizes: from three-ton automobiles to clothing to
NETWORK FIREWALLS, MAKING
under-the-skin blood sugar monitors and even entire homes. With IoT, communication across the
IT MORE EFFECTIVE FOR IOT
internet is enabled by services from service provider mobile and fixed-line networks. Managing
SERVICES.
IoT traffic does not come without its challenges. Threats to service provider networks and data
centers must be addressed in order for IoT services to be successful.
When BIG-IP AFM is deployed in a service provider's network, it features key differences when
compared to traditional network firewalls, making it more effective for IoT services. BIG-IP AFM
provides device-aware, application-centric security policies. This allows service providers to offer
IoT security services without the need to host the IoT application in their data centers, or directly
manage the IoT application.
BIG-IP AFM as an IoT firewall mitigates threats by stopping DDoS and application-layer attacks
which may disrupt the integrity and availability of the service provider’s network. BIG-IP AFM also
ensures that devices are only connecting to ‘safe’ locations and prevents devices from connecting
to unknown services. This reduces the chances of devices being compromised through malware
and blocks malicious ‘ThingBot’ C&C (command and control) communication to stop devices from
being exploited remotely.
The explosion of applications within the data center, in the cloud, and out at the edge
infrastructure creates a challenge in protecting the data from theft or hack attacks. Enabling and
managing encryption and decryption on each application is prohibitive due to operational and
infrastructure costs. Yet, encrypting and decrypting traffic between different application hosts and
clients spread across networks and remote locations is critical to protecting data and ensuring
application integrity.
BIG-IP AFM integrated IPSEC encryption and decryption enables secure data connectivity
between hosts and networks to eliminate risk of data theft and application attacks. AFM supports
IPsec ESP and AH connections to create secure connections for data transmission.
BIG-IP AFM Virtual Edition (VE) supports running in both public and private cloud environments
WITH ADVANCED LOGGING and provides protection that readily secures container-based applications by off-loading the
AND INTELLIGENT THREAT “North/South” decryption and encryption of traffic to and from container-based application
REPORTING CAPABILITIES, environments. BIG-IP AFM also monitors and provides visibility for non-volumetric attacks on
BIG-IP AFM LOGS MILLIONS container-based applications and enables fast development of protection via iRules.
OF RECORDS IN REAL TIME,
PROVIDING GRANULAR Deep Visibility and Reporting
VISIBILITY INTO DDOS ATTACKS
IT and security teams struggle to collect enough threat intelligence, and analyze enough data, to
FOR IN-DEPTH ANALYSIS OF
implement the right security measures. BIG-IP AFM gives organizations deep insight into attacks
SECURITY EVENTS.
and mitigation techniques, enabling them to make more informed decisions that increase overall
security effectiveness.
With advanced logging and intelligent threat reporting capabilities, BIG-IP AFM logs millions of
records in real time, providing granular visibility into DDoS attacks for in-depth analysis of security
events. BIG-IP AFM reports provide clear, concise, and actionable information highlighting attacks
and trends with drill-down and page-view capabilities. These offer comprehensive details into
attacks, threat progression, and firewall BIG-IP AFM health.
Large organizations face a growing challenge in managing a consistent and effective security
posture across an ever-expanding number of firewall devices. Too often, security administrators must
F5 BIG-IQ CENTRALIZED independently manage each device, reducing operational scalability and increasing overhead costs.
MANAGEMENT PROVIDES
CONSOLIDATED, F5 BIG-IQ® Centralized Management enables administrators to easily manage and orchestrate
CUSTOMIZABLE, AND F5 devices and the services they deliver, including the security services of BIG-IP AFM. F5 BIG-IQ
BIG-IP AFM is also easily automated into production via integrations with third party integrations.
F5 has built solution templates for AWS, Azure, and Google public cloud environments and API
integration with third-party automation tools such as Ansible and Terraform.
BIG-IP AFM delivers the scalability and performance to tackle the most demanding firewall
requirements with outstanding speed and throughput. A single F5 platform BIG-IP AFM uses
F5 ScaleN™ with Virtual Clustered Multiprocessing™ (vCMP) enabled systems to give cloud and
communications service providers, as well as enterprises, the most cost-effective approach for
managing their large-scale firewall deployments.
With vCMP, administrators can easily consolidate multiple firewalls onto a single device and
allocate BIG-IP AFM resources in a more flexible and isolated manner than with firewalls for
different customers, groups, applications, and services. vCMP supports high-density firewall
isolation and guest firewall clustering for easier administration and maintenance and to ensure
consistency throughout the firewall infrastructure.
BIG-IP AFM is a core component of F5’s solutions for application protection, which combines
network security capabilities with traffic management, application security, and DNS security.
These solutions can be consolidated onto a single BIG-IP platform, reducing management
complexity and overhead, while offering superior performance and scalability. Building upon
BIG-IP® Local Traffic Manager™ (LTM), the consolidated protection delivers deep application
fluency for the most widely deployed enterprise applications and service provider protocols.
This makes it the ideal platform for security standardization for protecting Internet-facing data
center and distributed edge applications.
BIG-IP
VE
F5’s solutions for application protection are made up of the following BIG-IP modules:
• BIG-IP AFM—This advanced network security solution forms the core of the F5 application
protection solution. It provides full SSL visibility at scale, as well as network-layer and
session-layer DDoS mitigation.
• BIG-IP DNS—Hyperscales and secures the DNS infrastructure during DDoS attacks and
keeps global applications online.
BIG-IP AFM is a stateful, full-proxy security solution that provides advanced network protection
and capabilities that exceed traditional firewalls.
* - licensed separately
** - IPv4 and IPv6 supported
BIG-IP AFM is available with other modules to enable specific infrastructure, protocol and
application security use cases, as follows.
Note: All BIG-IP AFM licenses include protocol security, routing, and maximum SSL. IP Intelligence and Geolocation are available add-ons for all bundles.
BIG-IP AFM is available as an add-on module for integration with BIG-IP Local Traffic Manager on any BIG-IP platform. For detailed physical specifications,
please refer to the BIG-IP System Hardware Data sheet.
BIG-IP LTM Virtual Edition (VE) is a version of the BIG-IP system that runs as a virtual machine.
BIG-IP AFM can be deployed on a virtual edition. BIG-IP VEs include all features of BIG-IP
devices running on the standard F5 TMOS, except as noted in release notes and product
documentation. BIG-IP AFM VE’s can be optimized against DDoS attacks and for SSL/TLS
processing with Intel SmartNIC and Quick-assist Technology (QAT). Intel SmartNIC includes a
FPGA which pre-processes DDoS attacks out of the traffic before it hits the Intel x86 core CPU
for processing. For SSL/TLS decryption/encryption, the Intel QAT processor is supported for
off-loading this intensive processing from the core CPU for improved performance.
VIPRION Platforms
BIG-IP AFM is also available as an add-on module to BIG-IP Local Traffic Manager on the modular F5
VIPRION® platform. This chassis and blade architecture enable simple scalability as your Application
infrastructure grows. The VIPRION platform is NEBS Level 1 and FIPS 140-2 Level 2 compliant to
ensure adherence to industry standards and compliance. See the VIPRION Data sheet for details.
BIG-IP Platforms
F5’s next-generation, cloud-ready ADC platform provides DevOps-like agility with the scale,
security depth, and investment protection needed for both established and emerging apps.
The new BIG-IP® iSeries appliances deliver quick and easy programmability, ecosystem-friendly
orchestration, and record breaking, software-defined hardware performance. The F5 BIG-IP iSeries
Network Traffic
15K is Application
designed specifically DDoS requirements SSL
to meet service providers’ performance in a 1U platform. DN
Firewall Management Security
As a result, customers can accelerate Protection
private clouds and secure critical dataInspection
at scale while lowering Secu
TCO and future-proofing their application infrastructures. F5 solutions can be rapidly deployed via
integrations with open source configuration management tools and orchestration systems.
In addition to the BIG-IP iSeries, F5 offers VIPRION modular chassis and blade systems
designed specifically for performance and for true on-demand linear scalability without business
disruption. A single F5 platform scales to handle up to 576 million concurrent connections, 640
Gbps of throughput, and 8 million connections per second to mitigate even the largest volumetric
attacks. VIPRION systems use F5’s ScaleN clustering technology to add blades without
reconfiguration or rebooting.
See the BIG-IP System Hardware, VIPRION, and Virtual Edition data sheets for more details.
For information about specific module support for each platform, see the latest release notes on
AskF5. For the full list of supported hypervisors, refer to the VE Supported Hypervisors Matrix.
Business-aligned Licensing
Meeting your applications’ needs in a dynamic environment has never been easier. F5 BIG-IP AFM
is available via F5’s Good, Better, Best licensing that provides you with the flexibility to provision
advanced modules on demand, at the best value.
• Provision modules needed to run your applications with F5’s Good, Better, Best offerings
• Implement complete application flexibility with the ability to deploy your modules on a
virtual or physical platform
BIG-IP AFM VE can be utilized in accordance with business operational needs. F5 VE’s can be
purchased via Subscription, Enterprise License Agreement, Perpetual for on-premises and/or
public multi-cloud architectures. Public cloud ‘pay-as-you-go’ (PAYG) is also supported.
F5 Professional Services
F5 Global Services offers world-class support, training, and consulting to help you get the most
from your F5 investment. Whether it’s providing fast answers to questions, training internal teams,
or handling entire implementations from design to deployment, F5 Global Services can help
ensure your applications are always secure, fast, and reliable. For more information about F5
Global Services, contact consulting@f5.com or visit f5.com/support.
F5 Global Services helps you deliver your applications with the availability, performance and
security users expect. With deep expertise in F5 application services, as well as the ecosystems
that they operate in, our teams can help you support new business initiatives including
automation, migrating apps to the cloud, ensuring consistent security and deploying new
application architectures.
F5 provides the services, support, and training you need to ensure success across the lifecycle
of your deployments, from implementation to maintenance to optimization. We help you speed
deployment, drive operational efficiencies and get to market as quickly as possible.
The F5 Service Provider Essentials technical services program (SPE) offers a specialized level of
service designed for, and exclusively available to, our service provider customers in almost every
country. It provides service provider operations teams with the specialized support they need to
effectively manage their F5 application delivery estate. F5 SPE combines high-quality, service
provider-specific technical assistance including a dedicated service provider network support
team, consulting hours inside the maintenance contract, and high-urgency incident management.
Learn more at f5.com/SPE.
Premium Plus
Premium Plus customers receive priority status at F5, with fast, easy access to remote assistance
from a dedicated team of senior-level, F5-certified Network Support Engineers and a Service
Delivery Manager. You also get proactive support for planned maintenance, advance RMA
replacement, software upgrades, and help with F5 iRules scripts. Your Premium Plus team will
also work with you to create an IT environment that addresses your business goals. Learn more
at www.f5.com/services/support.
MORE INFORMATION
To learn more about BIG-IP AFM and complimentary solutions, visit f5.com to find these and
other resources:
Data sheets
BIG-IP Advanced WAF
IP Intelligence Services
Access Policy Manager
Web pages
F5 BIG-IP AFM
Additional resources
Intelligent DNS Firewall for Service Providers
Diameter Security
Near Real-Time DNS Reporting Attack Mitigation Case Study
Carrier-Grade NAT for Service Providers
Key Use Cases for GTP
©2020 F5 Networks, Inc. All rights reserved. F5, F5 Networks, and the F5 logo are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com.
Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, expressed or implied, claimed by F5.
DC1120 | DS-SP-551986256