For additional information or assistance regarding Section 508, please contact the Section 508 Office at This entry is not (currently) permitted to be used under any circumstances. Section 508 compliance may be reviewed by the Section 508 Office and appropriate remedial action required if necessary. The product will soon be reviewed by our informers. The most popular version of this product among our users is 1.0.
![big ip edge client download big ip edge client download](https://s3-ap-northeast-1.amazonaws.com/peatix-files/pod/10011870/cover-Download-Big-Ip-Edge-Client-For-Mac.jpeg)
Big ip edge client download software#
and is used by 164 users of Software Informer. The Implementer of this technology has the responsibility to ensure the version deployed is 508-compliant. BIG-IP Edge Client Components is developed by F5 Networks, Inc. This technology has not been assessed by the Section 508 Office. Prior to use of this technology, users should check with their supervisor, Information Security Officer (ISO), Facility Chief Information Officer (CIO), or local Office of Information and Technology (OI&T) representative to ensure that all actions are consistent with current VA policies and procedures prior to implementation. Users must ensure sensitive data is properly protected in compliance with all VA regulations. Users must ensure their use of this technology/standard is consistent with VA policies and standards, including, but not limited to, VA Handbooks 61 VA Directives 6004, 6513, and 6517 and National Institute of Standards and Technology (NIST) standards, including Federal Information Processing Standards (FIPS). Please note that there is not a specific website for this product. This entry only applies to the Desktop edition of the software.
![big ip edge client download big ip edge client download](https://techdocs.f5.com/content/dam/projects/techdocs/edge-client-7-1-8/bigip/images/secure-access-client.png)
The BIG-IP Edge Client is a Virtual Private Network (VPN) technology which provides Windows logon integration, endpoint protection, client inspection, network and application access.
![big ip edge client download big ip edge client download](https://www.lib.washington.edu/help/images/OnNet1.png)
More information on the proper use of the TRM can be found on the Technologies must be operated and maintained in accordance with Federal and Department security and