F5 BIG-IP Standard Series 4000 License
The mid-range platform of the BIG-IP i4000 ADC series, designed and manufactured in two models i4600 and i4800, offers exceptional performance. This solution can easily meet most of the needs of small and medium enterprise applications and security services. After the esteemed customer specifies the required model of his organization, various modules and licenses are determined based on the computing power of the chosen model.
The F5 BIG-IP Standard Series 4000 License provides twice the capacity at Layer 4, 2.8 times the concurrent Layer 4 connections and 2.2 times the SSL TPS compared to previous models.
Enabling automation and orchestration is key to taking advantage of cloud and software-defined architectures and scaling application services as needed. The F5 platforms offer many ways to program the fabric and network of application services, allowing organizations to automate delivery, respond to events in real time, and easily integrate with orchestration systems.
BIG-IQ Centralized Management
F5 BIG-IQ Centralized Management is the management and orchestration platform for F5. It provides a single point of control for F5’s physical and virtual appliances and the application delivery and security services running on them. BIG-IQ Centralized Management is available as Virtual Edition and F5 Appliance. It simplifies management, helps ensure compliance, and gives you the visibility and reporting you need to troubleshoot and respond to security issues and attacks. BIG-IQ Centralized Management manages policies, licenses, SSL certificates, images, and settings for F5 appliances and the following BIG-IP software modules:
- F5 WebSafe and F5 MobileSafe (monitor only)
- BIG-IP Application Security Manager (ASM)
- BIG-IP Advanced Firewall Manager (AFM)
- BIG-IP Access Policy Manager (APM)
- BIG-IP Local Traffic Manager (LTM)
- F5 Secure Web Gateway Services
- BIG-IP DNS
BIG-IQ Centralized Management supports BIG-IP appliances, VIPRION chassis/blades, and BIG-IP Virtual Editions (VEs), whether running on-premises or in the cloud. It is ideal for organizations that need centralized management of F5 devices and modules, BIG-IP VE license management, or centralized reporting and notification of application availability, performance, and security.
Simplified and Improved Troubleshooting and Diagnostics
The BIG-IP iSeries appliances include a Baseboard Management Controller (BMC) and support for the Intelligent Platform Management Interface (IPMI) protocol. With BMC firmware and Always-On Management (AOM), F5 customers can gain deeper access to internal sensor data to monitor the system, including multiple temperature, airflow and voltage readings.
Out-of-band alerts for hardware-level issues are possible without a TMOS instance running. Get remote system console access to BMC and AOM functions through the same TMOS management port IP address, eliminating the need for a dedicated or separate network. BIG-IP iSeries devices can also display system information such as sensor readings for troubleshooting on their color LCD touchscreens.
Large-Scale FIPS Compliance
The Federal Information Processing Standards (FIPS) specify the requirements for cryptographic modules. FIPS compliance is required by many government agencies and industries such as financial services and healthcare that require the highest standards of data, application and information security.
F5 offers a wide range of FIPS-certified hardware devices that support an implementation of FIPS 140-2 Level 2 for the generation, use and protection of RSA cryptographic keys. Keys generated or imported into a hardware security module (HSM) of a BIG-IP system cannot be extracted in plain text format. BIG-IP hardware devices with embedded HSMs also have tamper-resistant seals with a hardened epoxy coating that renders the card unusable if removed. For added protection, the BIG-IP 10350v-F supports a FIPS 140-2 Level 3 implementation of the internal HSM (PCI card). This security rating means that the 10350v-F HSM card adds tamper security, which is a means of detection in addition to Level 2 tamper-resistant methods, as well as a response to physical attempts to access or the use or tampering of the cryptographic module.