Advanced protection has reduced web attacks and improves application performance and operations
What is our primary use case?
F5 Rules for AWS WAF provides advanced protection for web applications hosted on AWS against application layer attacks. I primarily use these rules to detect and block common threats such as SQL injection, cross-site scripting, remote code execution attempts, and other OWASP Top 10 vulnerabilities. F5 Rules for AWS WAF managed rule sets enhance AWS WAF's native capabilities by providing continuously updated threat intelligence and more granular signature-based detection.
In addition, I use these rules to handle automated and bot-driven attacks and traffic by identifying suspicious request patterns and reducing the unwanted traffic reaching the origin. This helps improve both security and application performance. From an operational perspective, the rules are initially deployed in count mode to analyze the traffic behavior, followed by tuning and gradual enforcement in block mode to minimize false positives and avoid business impact.
How has it helped my organization?
One of the key outcomes was a 35 to 45% reduction in malicious application layer traffic reaching the origin, particularly from SQL injection, XSS, and automated bot attackers. This significantly reduced the load on backend systems. I also noticed an improvement in application stability with fewer performance degradation incidents during attack spikes.
In some cases, response times improved due to reduced unnecessary traffic hitting the application layer. From an operational standpoint, the use of managed rule sets helped to reduce manual effort by approximately 25 to 35%, as many common attack patterns were automatically detected and mitigated without requiring constant rule creation. Additionally, by properly tuning the rules, I was able to keep false positives at a minimal level while maintaining strong protection, which improved the overall user experience and reduced support tickets related to access issues. Overall, these improvements contributed to a better security posture, improved performance, and more efficient day-to-day operations.
What is most valuable?
One of the best features of F5 Rules for AWS WAF is the advanced, continuously updated threat intelligence provided by F5. F5 Rules for AWS WAF rule sets are highly effective in detecting and mitigating OWASP Top 10 attacks such as SQL injection, XSS, and command injection, which significantly strengthens application security. Another key feature is the ease of integration with AWS WAF, allowing organizations to deploy enterprise-grade protection without additional infrastructure.
F5 Rules for AWS WAF can be quickly enabled and tested in count mode, which helps in safely evaluating their impact before enforcing them in block mode. F5 Rules for AWS WAF flexibility in tuning and customization is also a major advantage. Security teams can create exclusions, adjust the sensitivity, and combine F5 Rules for AWS WAF with custom AWS WAF rules to align with application-specific requirements and reduce false positives. Additionally, the visibility provided through AWS WAF logging and metrics helps in identifying attack patterns and making data-driven security decisions.
What needs improvement?
One area where F5 Rules for AWS WAF can be improved is in simplifying the tuning process. While F5 Rules for AWS WAF is powerful, fine-tuning it to match specific application behavior can sometimes be complex and time-consuming, especially for teams without deep WAF expertise. Another improvement could be enhanced visibility and reporting.
Although AWS WAF provides logs, having more intuitive and built-in dashboards or clearer categorization of rule triggers would make it easier to quickly identify and analyze attack patterns. Additionally, expanding the capabilities around bot management and behavior analysis would be beneficial compared to some dedicated bot management solutions. More advanced detection techniques could further strengthen the protection against sophisticated automated traffic. Finally, providing more predefined templates or best practice recommendations for different application types would help speed up the deployment and reduce the initial configuration effort.
For how long have I used the solution?
I have been using F5 Rules for AWS WAF for around one year in enterprise environments.
What do I think about the stability of the solution?
F5 Rules for AWS WAF is highly stable in my experience. Since F5 Rules for AWS WAF operates within AWS managed infrastructure, I have not observed any major disruption or performance issues related to the rule sets themselves. F5 Rules for AWS WAF is consistently updated and applied without impacting application availability, and it handles high traffic volumes effectively, even during attack scenarios.
Additionally, once properly tuned, F5 Rules for AWS WAF runs reliably with minimal intervention, which further contributes to operational stability. Overall, F5 Rules for AWS WAF has proven to be dependable for enterprise-level deployments.
What do I think about the scalability of the solution?
F5 Rules for AWS WAF is highly scalable, as it operates on top of AWS's native infrastructure. Since AWS WAF itself is designed to automatically scale with the incoming traffic, F5 Rules for AWS WAF inherited the capability without requiring any manual intervention. In my experience, F5 Rules for AWS WAF handles traffic spikes and high request volumes efficiently, including during attack scenarios such as bot surges or application layer attacks.
There is no need for additional capacity planning or hardware provisioning, which makes it very suitable for dynamic and growing environments. Overall, the scalability is seamless and aligns well with cloud-native architectures, making it ideal for enterprise applications with variable traffic patterns.
How are customer service and support?
My customer support experience has been generally positive, especially when working through F5 and AWS together. For critical issues, the response time is quite good, and the support teams are knowledgeable in handling rule tuning, false positives, and other security-related incidents. One of the strengths is the availability of detailed documentation and predefined rule sets, which reduce the dependency on support for most common use cases.
However, for more advanced tuning or complex scenarios, I occasionally rely on vendor support, and they have been responsive and helpful. Overall, the support is reliable, but having more proactive recommendations or faster turnaround for complex cases would make it even better.
Which solution did I use previously and why did I switch?
Prior to using F5 Rules for AWS WAF, I was primarily relying on the default AWS managed rule sets and some custom WAF rules for application protection. While this provided a basic level of security, I found that they lacked the depth and advanced threat intelligence needed to effectively handle more sophisticated attacks and evolving threat patterns.
I switched to F5 managed rules to enhance my detection capabilities, especially for OWASP Top 10 vulnerabilities and more complex attack signatures. The continuous updates and better coverage helped me to improve my security posture. Additionally, using F5 Rules for AWS WAF reduced the need for frequent manual rule creation and tuning, making operations more efficient and scalable for enterprise environments.
How was the initial setup?
I purchased and deployed F5 Rules for AWS WAF through AWS Marketplace, which made the onboarding and integration process straightforward and efficient.
What about the implementation team?
The implementation was carried out in-house, leveraging my existing team with experience in AWS services and security.
What was our ROI?
I have seen a clear return on investment after implementing F5 Rules for AWS WAF. From a security perspective, I observed around 35 to 45% reduction in malicious application layer traffic reaching the origin, which helped protect the backend systems and reduce risk exposure. In terms of operational efficiency, the use of managed rules reduced manual effort by approximately 35 to 45% as many common threats were automatically detected and mitigated without requiring continuous rule creation and monitoring.
This also translated into time savings for the security team, allowing them to focus more on proactive security improvements rather than reactive incident handling. Additionally, by reducing unnecessary traffic and attack load, I saw improvements in application stability and performance, indirectly contributing to better user experience and reduced downtime risk. Overall, the combination of reduced manual effort, improved security posture, and better application performance has delivered a strong return on investment.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing and licensing has been generally positive. Since F5 Rules for AWS WAF is available through the AWS Marketplace, the licensing model is straightforward and aligns well with AWS's pay-as-you-go approach. There is no significant setup cost involved, as it is a managed service that can be quickly integrated into the existing AWS WAF configuration without additional infrastructure.
This makes the initial deployment cost-effective and easy to manage. From a pricing perspective, while it may appear slightly premium compared to basic rule sets, the value it provides in terms of advanced threat protection, reduced manual effort, and improved application stability justifies the cost. Overall, the pricing is reasonable for enterprise environments, especially when considering the security benefits and operational efficiency it delivers.
Which other solutions did I evaluate?
Before choosing F5 Rules for AWS WAF, I evaluated multiple options, including the default AWS managed rule sets, other AWS Marketplace alternatives, and other third-party WAF solutions such as Cloudflare and Akamai. The default AWS rules were easy to use but lacked the advanced threat coverage and depth in detection. Other third-party solutions provided strong capabilities, but integrating them into my existing AWS native architecture required additional effort and complexity.
I chose F5 Rules for AWS WAF because it offered a good balance between advanced threat intelligence, seamless integration with AWS WAF, and ease of deployment through AWS Marketplace. This allowed me to enhance security without adding operational overhead or changing my existing architecture significantly.
What other advice do I have?
I would advise not relying only on the default rule sets in blocking mode immediately. It is better to start in monitoring or count mode, analyze the traffic patterns, then gradually move to enforcement. Additionally, I recommend investing time in proper rule tuning, especially for critical applications such as login, APIs, or payment flows because false positives can impact business functionality if not handled carefully. Finally, ensure that logging and visibility are properly enabled from day one, so you can continuously improve the rule set based on real traffic and evolving threats. I would rate this solution as an 8 out of 10.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Application layer protection has improved traffic control and supports my initial security testing
What is our primary use case?
I have been using F5 Rules for AWS WAF for a short time and want to discover more about it.
My main use case with F5 Rules for AWS WAF is testing it out.
I don't have a quick specific example of what I'm testing at this moment.
For now, I don't have anything else to add about my testing experience so far.
What is most valuable?
The best features F5 Rules for AWS WAF offers, from what I've seen or read so far, are application layer protection.
I am referring to application layer protection with F5 Rules for AWS WAF, which stands out to me as using something similar to iRules to protect applications.
F5 Rules for AWS WAF has positively impacted our organization for security through the implementation of traffic rules in our application.
I have noticed specific benefits such as easy management with F5 Rules for AWS WAF, but I think that it's too early to provide a definitive assessment because I started using it only a few days ago.
What needs improvement?
I don't know how F5 Rules for AWS WAF can be improved because I have only been using it for a few days.
I don't have anything to add about the needed improvements for F5 Rules for AWS WAF at this time.
For how long have I used the solution?
I have been working in my current field for about two years.
What do I think about the stability of the solution?
F5 Rules for AWS WAF is stable in my experience so far.
What do I think about the scalability of the solution?
From what I've seen, F5 Rules for AWS WAF's scalability is stable for now.
How are customer service and support?
I have not had any experience with customer support for F5 Rules for AWS WAF yet.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I did not previously use a different solution.
How was the initial setup?
I had a great experience with the pricing, setup cost, and licensing.
What about the implementation team?
My company does not have a business relationship with this vendor other than being a customer.
What was our ROI?
It's too early to talk about a return on investment with F5 Rules for AWS WAF.
What's my experience with pricing, setup cost, and licensing?
I had a great experience with the pricing, setup cost, and licensing.
Which other solutions did I evaluate?
I did not evaluate other options before choosing F5 Rules for AWS WAF as it was my first time.
What other advice do I have?
It's too early to provide my experience or advice to others looking into using F5 Rules for AWS WAF.
I don't have any additional thoughts about F5 Rules for AWS WAF before we wrap up.
I found this interview at AWS re:Invent.
I gave this review a rating of 8.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Evaluating the Effectiveness of F5 BIG-IP Advanced WAF ln Enhancing Application Security
What do you like best about the product?
its real-time threat intelligence integration, leveraging F5's Security Operations Center (SOC) and global threat intelligence network. This integration ensures that the firewall remains constantly updated with the latest threat trends, enabling it to proactively defend against emerging threats. Additionally, the Advanced WAF allows for extensive customization options, empowering organizations to tailor their security policies to the unique requirements of their applications.
What do you dislike about the product?
WAF is relatively high, positioning it as a more suitable option for larger enterprises rather than smaller organizations with budget constraints
Configuring and managing the Advanced WAF requires a certain level of expertise, which could result in inefficiencies or misconfigurations if not properly addressed.
What problems is the product solving and how is that benefiting you?
It enables organizations to customize security policies based on their specific application requirements. This flexibility allows for fine-tuning and optimizing security measures, reducing false positives and negatives while maintaining an optimal balance between security and application performance.
All in one feature set
What do you like best about the product?
A single appliance has all the features which require a webserver service, WAF, Server load balancer, GSLB
It has iRule feature, where I can script my custom requirements where it does not support by default.
What do you dislike about the product?
For the advance reporting stuff, need to procure an additional system call BIG-IQ, which is not coming out of the box with BIG-IP.
What problems is the product solving and how is that benefiting you?
I have deployed many Advance WAF solutions. it is ready grate. Server load balancing and WAF requirements.
F5 Big-IP ASM solution is rock solid.
What do you like best about the product?
Stability, support and scalability capabilities makes it more productive and seamless.
What do you dislike about the product?
Licensing policy is little bit tough after changing the perpetual license to per CPU costs, and ofcourse the tutorial of configurations that is not available anywhere except you have done the f5 certificates. Also at initial level anyone need expertise and as you spend time it gets easier.
What problems is the product solving and how is that benefiting you?
Protecting the web applications in very secured manner for eg pro active bot defense, ip intelligence to block traffic from geo locations, and protect from all the top ten OWASP.
F5 Advanced Web Application Firewall - Meet to all the WebApp Security features
What do you like best about the product?
The overall experience is good with WAF. The web API is easy to understand and deploy in the production network. When there is a need to support, The support team understands the products and provides very helpful info.
What do you dislike about the product?
Nothing much. I am still exploring the features and will add them as I go along.
What problems is the product solving and how is that benefiting you?
Limitation with current WAF solution and requirements for product which overcome limitations, support detection for all type of web attacks, support high number of web requests and SSL connections.
Recommendations to others considering the product:
F5 AWAF has all features required for Web Application Security from standard keywords-based / signature-based detection, profile creation, DDOS protection, API security, Client-Side Protection (Data Safe feature). Tech team has required expertise in evaluating our requirements, environment study, and recommended solution and deployment strategy.
Its a very amazing product with so much granularity
What do you like best about the product?
Application Layer Encryption, API Inspection, and Behavior Analytics.
What do you dislike about the product?
Development/Testing license expiry after only 3 months
What problems is the product solving and how is that benefiting you?
Bot Mitigation and Web Application level attacks
F5 has the ability to protect most of the vulnerability's over internet
What do you like best about the product?
Regular updates for attack signature's ,protection against owasp top10
What do you dislike about the product?
Tmos commond line utility, false positive, traffic learning suggestion
What problems is the product solving and how is that benefiting you?
We don't need separate load balancer if we have f5 awaf . It prevent most of the internet facing vulnerability s
Recommendations to others considering the product:
It has the ability to protect most of the internet vulnerabilities. It improves the organization standard
It is very strong application to use which protect your environment from lots of attacks
What do you like best about the product?
Instant alerts , monitoring aspects and suggestions
What do you dislike about the product?
Nothing much costing as compared to other providers
What problems is the product solving and how is that benefiting you?
Ddos attacks , identify the request based on region
Recommendations to others considering the product:
Yes I will