CONNECT TO THE EXTENDED ENTERPRISE WITH CONFIDENCE AND SECURITY
Applications are the gateways to your critical and sensitive data. And, today, your apps can be hosted anywhere – on premises, co-located, or in a public or private cloud. Secure access to your applications continues to be a necessity. But ensuring that your users have secure, authenticated access anytime, anywhere, to only the applications that they are authorized to access is becoming difficult to maintain. There are different methods of application access with which to deal. There are various means of ensuring authorized user identity, as well as different methods of single signon (SSO) and federation, all in an attempt to simplify the user access experience.KEY BENEFITS
• Simplify accessSIMPLIFY ACCESS
BIG-IP APM combines centralized network access control, federated identity, SSO, and adaptive authentication into a single flexible, scalable application delivery solution, simplifying and consolidating your access infrastructure.Identity federation and SSO
SAML-based authentication reduces user dependency on passwords, increasing security and improving both user experience and productivity.Address hybrid Office 365 deployments
BIG-IP APM delivers secure identity federation and SSO for hybrid deployments. For instance, if you have deployed Office 365 and maintain Exchange mailboxes on premises, BIG-IP APM provides a seamless user experience by enabling SSO to Office 365 as well as to on-premises email, while ensuring appropriate authentication. If you have deployed Office 365, migrated your email, and have chosen to use Microsoft Azure Active Directory for authentication, BIG-IP APM can proxy ActiveSync and encrypt user credentials before sending them to Office 365, delivering additional security for your most important user data. Integration with leading mobile device management (MDM) and enterprise mobility management (EMM) solutions helps policies to be consistently applied to mobile access, too.Automatically synchronize Exchange services
With BIG-IP APM, you can synchronize email, calendar, and contacts with Microsoft Exchange on mobile devices that use the Microsoft ActiveSync protocol. By eliminating the need for an extra tier of authentication gateways to accept Microsoft Outlook Web Access, ActiveSync, and Outlook Anywhere connections, BIG-IP APM helps consolidate infrastructure and maintain user productivity. When migrating to Exchange 2010, this solution works with Active Directory to facilitate seamless mailbox migration over time. When migration is complete, BIG-IP APM provides managed access to Exchange with single URL access—regardless of the user, device, or network.Adaptive authentication and infrastructure consolidation
BIG-IP APM provides you with seamless user access to web applications in a highly available and heterogeneous environment, which in turn improves business continuity and boosts user productivity for your organization. It supports and integrates with AAA servers and user credential stores—including Active Directory, Lightweight Directory Access Protocols, RADIUS, and Native RSA SecurID—to deliver high availability through the intelligent traffic management capabilities of BIG-IP® Local Traffic Manager™ (LTM). In addition, BIG-IP APM recognizes when an RSA SecurID software token is installed on a user’s Windows or Mac device, prompting the user for an RSA PIN, seamlessly authenticating them. It also supports Google reCAPTCHA V2 for authentication and contextual authentication.Intelligent integration with identity and access management
F5 partners with leading on-premises and cloud-based identity and access management (IAM) vendors, such as Okta, VMware, and Ping Identity. This integration enables local and remote user SSO via SAML to applications based on premises or in a data center. For organizations that do not wish to replicate their user credential store in the cloud with IDaaS or cloud-based IAM offerings, BIG-IP APM works with F5’s IAM vendor partners to help these organizations maintain control of on-premises user credentials. This is accomplished by creating a bridge between the IAM vendor’s offering and the local authentication services. This bridge, or identity provider chain, leverages SAML to federate the user identity.UNIFY ACCESS
Today’s workforce is mobile, with users demanding access to applications—anywhere, from any device, and often over unsecured networks. Ensuring always-connected users have fast and secure access to applications, whether on premises or in the cloud, remains a challenge for many organizations. By implementing policy-based access decisions, BIG-IP APM strengthens corporate compliance with security standards, corporate controls, and industry and government regulations.A single solution for all access
BIG-IP APM is positioned between your applications and your users, providing a strategic application access control point. It protects your public-facing applications by providing granular policy for identity- and context-aware external user access, while consolidating your access infrastructure. It secures remote and mobile access to your corporate resources from all networks and devices. BIG-IP APM converges and consolidates all access—network, cloud, and application—within a single management interface. It also enables and simplifies the creation of dynamic access policies that are easy to manage.
“Always connected” access
Robust endpoint security
BIG-IP APM inspects and assesses users’ endpoint devices, examining their security posture and determining if the device is part of the corporate domain. Based on the results, BIG-IP APM will apply dynamic access control lists (ACLs) to deploy context-based user, application, network/ cloud, and threat/vulnerability security. BIG-IP APM includes preconfigured, integrated endpoint inspection checks, including checks for OS type, antivirus software, firewall, file, process, registry value validation and comparison (Windows only), as well as device MAC address, CPU ID, and HDD ID. For mobile devices running iOS or Android, BIG-IP APM’s endpoint inspection checks the mobile device UDID and jailbroken or rooted status.Secure application tunnels
If an endpoint doesn’t comply with your defined security posture policy, an application tunnel can provide access to a specific application without the security risk of opening a full network access tunnel. For example, users may simply click their Microsoft Outlook clients to get secure access to their email, from anywhere in the world. Application tunnels are also WAN optimized to more efficiently deliver content to users.STREAMLINE VIRTUAL APPLICATION ACCESS
Virtual desktop and application deployments must scale to meet the needs of thousands of users and hundreds of connections per second. BIG-IP APM serves as a gateway for virtual application environments. It includes native support for Microsoft Remote Desktop Protocol (RDP), native secure web proxy support for Citrix XenApp and XenDesktop, and security proxy access for VMware Horizon. Administrators gain control over the delivery and security components of enterprise virtualization solutions via BIG-IP APM’s unified access, security, and policy management. These scalable, high-performance capabilities simplify user access and control in hosted virtual desktop environments. BIG-IP APM delivers simple, broad virtual application and desktop support.Simplify VMware virtual application access
BIG-IP APM provides a single, scalable solution for remote and local network access policy and control. The solution can be extended to other applications, providing a simple, low-cost, highly scalable enterprise infrastructure. BIG-IP APM supports the latest versions of VMware Horizon, ensuring maximum performance, availability, and scalability for VMware End User Computing (EUC) implementations.Streamline Microsoft RDP access
BIG-IP APM, when integrated with the Microsoft RDP protocol, enables the remote desktop access needed to install client-side components or run Java. It allows Microsoft RDP to be available for use on new platforms, such as Apple iOS and Google Android devices. It also enables native RDP clients on non-Windows platforms such as Mac OS and Linux, where previously only a Java-based client was supported.Consolidate Citrix infrastructure
BIG-IP APM supports Citrix XenApp and XenDesktop simultaneously, as well as Citrix StoreFront, further consolidating support for Citrix desktop and application virtualization infrastructure. For instance, in a typical Citrix XenApp or XenDesktop implementation, an administrator can save significant cost by replacing Citrix authentication management, Secure Ticket Authority (STA), NetScaler, and XenApp Services sites (required for Citrix sourced enterprise deployment) with BIG-IP APM.Flexible remote desktop access
As web browser plug-ins become more difficult to support due to rapid changes, lockout, and abandonment of specific plug-in technologies, BIG-IP APM continues to enable simple remote desktop protocol (RDP) that adapts to your organization’s deployment and user experience requirements.CENTRALIZE DYNAMIC ACCESS CONTROL
By enabling the creation and enforcement of user, application, network/cloud, and threat/ vulnerability context-based dynamic access decisions, BIG-IP APM strengthens corporate compliance with security standards—and industry and government regulations—while ensuring users stay productive with appropriate, authenticated, secure application access.Advanced Visual Policy Editor
Through its advanced graphical Visual Policy Editor (VPE), BIG-IP APM makes designing and managing granular access control policies on an individual or group basis fast and simple. With VPE, you can efficiently create and edit entire dynamic access policies in just a few clicks.Dynamic access control
BIG-IP APM enforces access authentication using ACLs and authorizes users with dynamically applied layer 4 and layer 7 ACLs on a session. Both L4 and L7 ACLs are supported based on endpoint posture as a policy enforcement point. Individual and group access to approved applications and networks is allowed by BIG-IP APM using dynamic, per-session L7 (HTTP) ACLs. The VPE in BIG-IP APM can be used to quickly and easily create, modify, and manage ACLs.Granular access policies
BIG-IP APM lets you design access policies for authentication and authorization, and, as an option, endpoint security checks, enforcing user compliance with corporate policies and industry regulations. You can define one access profile for all connections coming from any device, or you can create multiple access profiles for different access methods from various devices. For example, you can create a policy for application access authentication or dynamic ACL connections. Authorized, appropriate application, network, or cloud access is based on who the user is, how and when the user is attempting access, from where the use is attempting access, what the user is attempting to access, and the network or cloud conditions at the time access is requested.Context-based authorization
BIG-IP APM drives user identity into the network, creating a simplified, central point of control for user access. When tens of thousands of users access your applications, network, or clouds, BIG-IP APM will offload SSL encryption processing to the BIG-IP platform, provides authentication and authorization services, and optionally creates a single secure SSL connection to the application server. Authorization based on user, application, network/cloud, and threat/vulnerability context enables dynamic, secure, policy-based control over users’ application, network, and cloud access.Centralize access policy management
If you have multiple BIG-IP APM deployments, F5 BIG-IQ® Centralized Management will help you to efficiently manage them. It can manage policies for up to 100 BIG-IP APM instances, enabling you to import, compare, edit, and update granular access policies across multiple user devices.API AND CREDENTIAL PROTECTION
APIs and user credentials are two of the most exploited threat vectors. APIs are the connective tissue in modern application architectures. Attackers are leveraging APIs to launch attacks, because they are ripe for exploitation: Many organizations expose APIs to the public and their supply chain partners, or they inadvertently leave them unprotected. User credentials are like the keys to the kingdom: All an attacker has to do is steal one set of user credentials, and they enjoy unfettered access to your organization’s network, clouds, and apps. BIG-IP APM delivers protection for both APIs and user credentials.Protecting APIs
While attackers are exploiting APIs to launch myriad attacks, organizations can ensure API security via authentication, especially if it’s adaptable and protected by consistent, flexible authentication and authorization policies. BIG-IP APM enables secure authentication for REST or SOAP APIs. It also ensures appropriate authorization actions are taken. BIG-IP APM integrates existing OpenAPI, or “swagger” files, saving you time, human resources, and cost when developing API protection policies, while ensuring accurate API protection policies are in place.Protecting credentials
User credentials need to be protected at all times because, unfortunately, all it takes is for an attacker to steal your credentials once, and they can access your network, cloud, devices, and apps. BIG-IP APM’s credential protection, as part of an optional license of BIG-IP DataSafe™, secures credentials from theft and reuse. It protects against Man-in-the-Browser attacks with realtime, adaptable login encryption, and obfuscates user credentials entered into its Webtop. BIG-IP APM, in conjunction with BIG-IP DataSafe, renders the credentials unreadable and unusable, even in the unlikely event an attacker successfully steals them. BIG-IP APM also ensures login security for all applications associated via federation.ENHANCE VISIBILITY AND REPORTING
An in-depth view of logs and events provides access policy session details. With reports available through BIG-IQ Centralized Management, BIG-IP APM helps you gain greater visibility into application access and traffic trends, aggregate data for long-term forensics, accelerate incident responses, and identify issues and unanticipated problems before users can experience them.Centralize reporting and logging
BIG-IP APM integrates with BIG-IQ Centralized Management to provide enhanced visibility through access reports and logs. It delivers analytical reports and logs based on devices and groups, so you can increase your insight into user access and analysis. It also helps you take quick action if required, including the termination of specific access sessions. In addition, it provides a CSV export of BIG-IP APM report data, so it’s accessible for customized reports.
Real-time access to health data
UNPARALLELED FLEXIBILITY, HIGH PERFORMANCE, AND SCALABILITY
BIG-IP APM delivers flexible application, network, and cloud access, keeping your users productive and enabling your organization to scale quickly and cost-effectively.Out-of-the-box configuration wizards
BIG-IP APM helps reduce administrative costs by making it easy to quickly configure and deploy authentication and authorization services. The configuration wizard includes a set of pre-built application access and local traffic virtual device wizards. With step-by-step configuration and context-sensitive help, review, and summary, setting up authentication and authorization services on BIG-IP APM is simple and fast.Supported platforms and licensing option
BIG-IP APM can be deployed a variety of ways to meet differing access needs. It may be:Application firewall
With the efficient, multi-faceted BIG-IP platform, you can add application protection without sacrificing access performance. BIG-IP APM and BIG-IP Application Security Manager™ (ASM)—F5’s agile, scalable web application firewall—together on a BIG-IP appliance protect applications from attack while providing flexible, layered, and granular access control. Attacks are filtered immediately to ensure application availability, security, and an optimum user experience. This integrated solution ensures compliance with local and regional regulations, including PCI DSS, so you can minimize non-compliance fine payouts and protect your organization from data loss. And, since there is no need to introduce a new appliance to the network, you save costs with an all-in-one solution.Unprecedented performance and scale
BIG-IP APM offers SSL offload at network speeds and supports up to 3,000 logins per second. For organizations with an ever-growing base of web application users, this solution scales quickly and cost-effectively. BIG-IP APM use is based on two types of user sessions: access sessions and concurrent connection use (CCU) sessions. Access sessions apply to authentication sessions, VDI, and similar situations. CCU is applicable for network access, such as full VPN access, application tunnels, or web access. The BIG-IP platform and the VIPRION platform—both of which supportF5 Virtual Clustered Multiprocessing
BIG-IP APM is available on a chassis platform and on all BIG-IP appliances. It supports the F5 Virtual Clustered Multiprocessing™ (vCMP) environment. The vCMP hypervisor provides the ability to run multiple instances of BIG-IP APM, resulting in multi-tenancy and effective separation. With vCMP, network administrators can virtualize while achieving a higher level of redundancy and control.BIG-IP APM FEATURES
Whether running as a BIG-IP platform module or on a VIPRION chassis blade, BIG-IP APM is based on the intelligent, modular F5 TMOS® operating system. TMOS delivers insight, flexibility, and control to help you better enable application, network, and cloud access.BIG-IP APM features include:
TMOS features include:
Specifications | i5600 | i5800 |
---|---|---|
Intelligent Traffic Processing: |
L7 requests per second: 1M L4 connections per second: 500K L4 HTTP requests per second: 6M Maximum L4 concurrent connections: 40M Throughput: 60 Gbps/35 Gbps L4/L7 |
L7 requests per second: 1.8 M L4 connections per second: 800K L4 HTTP requests per second: 12M Maximum L4 concurrent connections: 40M Throughput: 60 Gbps/35 Gbps L4/L7 |
Hardware Offload SSL/TLS: | ECC†: 13K TPS (ECDSA P-256) RSA: 20K TPS (2K keys) 15 Gbps bulk encryption* |
ECC†: 20K TPS (ECDSA P-256) RSA: 35K TPS (2K Keys) 20 Gbps bulk encryption* |
FIPS SSL: | N/A | N/A |
Hardware Compression: | N/A | 20 Gbps |
Hardware DDoS Protection: | 25M SYN cookies per second | 50M SYN cookies per second |
TurboFlex™ Performance Profiles | N/A | Tier 3 (2x bandwidth) |
Software Compression: | 12 Gbps | N/A |
Software Architecture: | 64-bit TMOS | 64-bit TMOS |
On-Demand Upgradable: | Yes | N/A |
Virtualization (Maximum Number of vCMP® Guests): | N/A | 8 |
Processor: | One 4-Core Intel Xeon processor (total 8 hyperthreaded logical processor cores) | One 4-Core Intel Xeon processor (total 8 hyperthreaded logical processor cores) |
Memory: | 48 GB DDR4 | 48 GB DDR4 |
Hard Drive: | 1x 480 GB Enterprise Class SSD | 1x 480 GB Enterprise Class SSD |
Gigabit Ethernet CU Ports: | Optional SFP | Optional SFP |
Gigabit Fiber Ports (SFP): | Optional SFP+ (SX or LX) | Optional SFP+ (SX or LX) |
10 Gigabit Fiber Ports (SFP+): | 8 SR/LR (sold separately); optional 10G copper direct attach | 8 SR/LR (sold separately); optional 10G copper direct attach |
40 Gigabit Fiber Ports (QSFP+): | 4 SR4/LR4 (sold separately); QSFP + optical breakout cable assemblies available to convert to 10 gigabit ports |
4 SR4/LR4 (sold separately) (QSFP+ optical breakout cable assemblies available to convert to 10 gigabit ports) |
Power Supply: | 1x 650W Platinum AC PSU (Additional PSU optional, 2x 650W DC PSU optional) | 1x 650W Platinum AC PSU (Additional PSU optional, 2x 650W DC PSU optional) |
Typical Consumption: | 265W (single power supply, 110V input)** | 265W (single power supply, 110V input)** |
Input Voltage: | 100–240 VAC +/- 10% auto switching, 50/60hz | 100-240 VAC +/- 10% auto switching, 50/60hz |
Typical Heat Output: | 905 BTU/hour (single power supply, 110V input)** | 905 BTU/hour (single power supply, 110V input)** |
Dimensions: | 1.72” (4.37 cm) H x 17.4” (44.2 cm) W x 30.6” (77.72 cm) D 1U industry standard rack-mount chassis |
1.72″ (4.37 cm) H x 17.4″ (44.2 cm) W x 30.6″ (77.72 cm) D 1U industrial standard rack-mount chassis |
Weight: | 26 lbs. (11.8 kg) (dual power supply) | 26 lbs. (11.8 kg) (dual power supply) |
Operating Temperature: | 32° to 104° F (0° to 40° C) | 32° to 104° F (0° to 40° C) |
Operational Relative Humidity: | 5 to 85% at 40º C | 5 to 85% at 40° C |
Safety Agency Approval: | ANSI/UL 60950-1-2014 CSA 60950-1-07, including A1:2011+A2:2014 IEC 60950-1:2005, A1:2009+A2:2013 EN 60950-1:2006+A11:2009+A1:2010+A12:2011+A2:2013 |
ANSI/UL 60950-1-2014 CSA 60950-1-07, including A1:2011+A2:2014 IEC 60950-1:2005, A1:2009+A2:2013 EN 60950-1:2006+A11:2009+A1:2010+A12:2011+A2:2013 |
Certifications/ Susceptibility Standards: |
ETSI EN 300 386 V1.6.1 (2012) EN 55032:2012 Class A; EN 61000-3-2:2014 EN 61000-3-3:2013; EN 55024:2010 FCC Class A (Part 15), IC Class A, VCCI Class A |
ETSI EN 300 386 V1.6.1 (2012) EN 55032:2012 Class A; EN 61000-3-2:2014 EN 61000-3-3:2013; EN 55024:2010 FCC Class A (Part 15), IC Class A, VCCI Class A |
*Maximum throughput.
**Please refer to the Platform Guide: i5000 Series for the latest power ratings for your specific configurations (dual power supplies, highline input voltage, DC, etc.).
Notes: Performance-related numbers are based on local traffic management services only. Only optics provided by F5 are supported. SFP+ ports in i10800, i10600, i7800, i7600, i5800, and i5600
are compatible with F5 SFP modules.
† ECDHE-ECDSA-AES128-SHA256 cipher string tested.
BIG-IP iSeries Hardware Platforms
BIG-IP 2000 iSeries | BIG-IP 4000 iSeries | BIG-IP 5000 iSeries |
![]() |
![]() |
![]() |
BIG-IP 7000 iSeries | BIG-IP 10000 iSeries | BIG-IP 11000 iSeries |
![]() |
![]() |
![]() |
BIG-IP Standard Hardware Platforms
BIG-IP 2000 Series | BIG-IP 4000 Series | BIG-IP 5000 Series |
![]() |
![]() |
![]() |
BIG-IP 7000 Series | BIG-IP 10000 Series | BIG-IP 12000 Series |
![]() |
![]() |
![]() |
VIPRION 2200 | VIPRION 2400 | VIPRION 4480 |
![]() |
![]() |
![]() |
VIPRION 4800 | VIPRION 2000 Series Blades | VIPRION 4000 Series Blades |
![]() |
![]() |
![]() |
Virtual Editions
Professional Services
We offer enterprise class F5 Professional Services / Consulting & Support around the LTM, GTM / DNS, AFM, APM, & ASM F5 BIG-IP modules. From quick on demand iRule development & support with short time-lines, to very large complex load balancing implementations, our engineering team will go above and beyond to meet & exceed your expectations. Our primary vendor focus is F5 Networks, though over the years our client migrations to F5 Networks have drove us to master all the major players in in the industry.
Our Certified Engineers are not only experts in F5 Networks, we deeply understand Citrix Netscalers, A10 Networks AX series, Cisco CSS / Local Directors, & cloud Load Balancing technologies like Amazon Web Service (AWS) – Elastic Load Balancing & Route 53. Though we will not sell and support other ADC technologies, you can rest assured our experts are trained to dissect their configurations for migrations to the next level ADC F5 Networks provides.
Design & Planning | ● New Environments Need an architect’s guidance on exactly how to migrate your environment to the next level in Application Delivery Technology? Let our Engineers guide you through the exciting world of Application Delivery and help you design an architecture that is in line with your applications and organizations goals. ● Existing Environments Already have some Application Delivery Technology in place? We can help Document your current Network, and identify opportunities to improve and optimize your existing architecture. |
Implementations | ● New Installs We’ll discuss and capture all your requirements and provide you with detailed documentation on exactly how we’re going to reach your goals. ● Upgrades / Downgrades Upgrading and Downgrading hardware can be very risky if proper procedures are not followed. Let us follow our proven strategies for successful upgrades to get you to that next level of code and or new Hardware. ● Migrations Lab Staging -We can stage your changes in our lab to overcome any hurdles prior to implementation.Back out Strategies – Full back out strategies and scripts are provided to ensure a smooth cut back if needed. |
Configuration Optimization & Audits |
Ensure your environment is running as efficient and as securely as possible. Studying the surrounding network and picking your configurations apart line by line we’ll provide you with a full analysis report identifying open risks and opportunities for improvements. |
Application Deployment | When deploying new applications significant consideration needs to be taken around the load balancing technology available. Let us interface your application team to ensure your new application is taking advantage of all the features & resiliency your Application Delivery Controllers offer. |
Consulting Services
The best onsite or remote consulting services for F5 Networks Products.
Our dedicated team of professionals is available to provide you with the best security solution available. We offer (onsite or remote) hourly contract consultative assistance services.
Services Include:
Shipping
Orders placed before 4:15pm (PST) Monday through Friday will be shipped out the day they were placed. Orders placed after 4:15pm (PST) Monday through Thursday will be shipped out the next day. Orders placed after 4:15pm (PST) on Friday will be shipped out the following Monday. Orders placed on a holiday will be shipped out the following non-holiday business day.
Orders are shipped primarily by UPS and FedEx, but we may use DHL, USPS or other freight carrier at our discretion. In addition, we may use any available service to ship orders if delivery time is not negatively affected (example: A customer who is located near our warehouse orders an item via 2nd day shipping, but it is shipped via ground because it will take 2 days or less for the ground package to arrive.)
We charge flat rates for domestic orders placed on our website; however, if a shipment is unusually heavy, the charge of shipping may be increased. In the event of a shipping charge increase, the customer will be contacted first and a shipping price will be negotiated. Please note that some items may be shipped out of different locations, and Ground delivery times may vary.
The above rates do not apply to international orders. Please contact us when placing an international order to obtain a shipping quote. You may provide us with your own shipping account number and designated shipping carrier .
If your shipment arrives late, you must notify us within 14 days (including non-business days) of delivery in order to be eligible for a refund. Please note that because other factors may play a part in delayed shipments, shipping refunds are approved on a case-by-case basis.
Certain products may be available for electronic delivery via email. These products include software activation codes and license keys. Certain restrictions may apply.
Return Policy
Return Policy Notice |
By placing an order on this web site, you indicate that you have read and agree to the following return policies and conditions. |
Returns Must Meet ALL Applicable Criteria:
- If your returned product does not match all applicable criteria listed below, it will be rejected by our Returns Warehouse and returned back to you at your cost. Consequently, your RMA will be nullified, any credit request will be denied, replacement orders will not be made, and you will be charged for all shipping to and from our Returns Warehouse that may be incurred by Virtual Graffiti, Inc. By requesting an RMA and/or shipping a return in violation of this policy you hereby agree to accept our shipment of the return back to you and to the payment of all shipping costs to and from our Returns Warehouse. Our arrangements with our suppliers and manufacturers allow us no room to make exceptions.
Basic Criteria:
All returns must include the following:
- Original packaging (manufacturer's box, styrofoam, plastic bags, etc.)
- Original intact UPC barcode. Do not cut out the UPC code (for rebates) until you have examined and tested the product to your satisfaction. Removal of the UPC code voids any possibility of return regardless of RMA or credit request status.
- Valid Return Merchandise Authorization (RMA).
- Original packing slip. Do not mail or dispose of the packing slip (for rebates) until you have examined and tested the product to your satisfaction.
- The return must be complete and include all accessories (transformers, antennas, remote controls, batteries, software disks, etc.)
- Manufacturer documentation (manuals, warranty cards, registration information, etc.)
- The RMA number must not be written on the original manufacturer's packaging or box. Please write the RMA number on the label used to return the item or the brown shipping box. Items received with any writing on the original manufacturer's packaging or box will be refused and returned to you at your cost and without credit approval.
Basic Return Policy:
- Unless otherwise stated below, you have 30 days from the date your product left the warehouse (regardless of when you actually took delivery of the product) to get a valid RMA from our website and get your product to a shipper to return back to us. It does not have to be back in our warehouse within 30 days, but it does have to be in the possession of the shipper (along with the valid RMA). RMAs must be valid, unexpired, and issued for the product being returned. Only one RMA is issued per return. When it expires, you may no longer return your product.
- If you are ineligible for an RMA, contact the manufacturer directly or check any applicable warranty you might have. See the Manufacturer Contact List at the bottom of this page.
- Except as provided for verified defective products (See Special Returns Policy for Defective Products below), you will be responsible for all shipping charges for returns sent to our Returns Warehouse.
- All products are subject to a 15% restocking fee (except where prohibited by law) if returned opened or in a non-factory sealed box, provided that there is no restocking fee for defective products (see Special Returns Policy for Defective Products below).
- Upon our acceptance of the merchandise in like new condition in strict conformance with the basic criteria and basic returns policy, the purchase price will be credited to the credit card used for the original purchase.
- Please allow up to fourteen days from shipment for your return to arrive at our Returns Warehouse, delivery times vary based on shipper selected. Your return will be processed within 5-7 business days (excluding Saturdays, Sundays, and holidays) after receipt of the item.
- Many of the items we sell have Special Return Policies. See the appropriate policy below to see if items you purchase are affected.
- The risk of loss for the product being returned shall be with you at all times during the shipment of such product to the returns center and with respect to any shipments from the returns center back to you, the original distributor or manufacturer, or any buyer through the liquidation process. Title to the product being returned will remain with you at all times and transfer from you to the original distributor, or a third party in the case of a liquidation of the return, only upon receipt of the products by such distributors or buyers.
Defective Products:
- Defective products can only be returned in exchange for the exact same product, or at the sole discretion of Virtual Graffiti, Inc, the purchase price will be credited to the credit card used for the original purchase. Defective products may only be returned within 30 days of the date your product left the warehouse (regardless of when you actually took delivery of the product).
- Once your return is processed, and is verified to meet the basic criteria above and to be defective, your replacement order will be sent to fulfillment. How quickly your replacement product ships after that depends on product availability.
- For products that we verify to be defective, we will reimburse you for your original shipping expenses, provided that your defective return must be shipped via ground shipment only. If you return your product via a faster, more expensive shipper, you incur the expenses yourself and any request for reimbursement will be denied.
Virtual Graffiti, Inc in its sole and absolute discretion shall be the sole determiner of whether a product is in fact defective.
Manufacturer Only Returns (Direct Returns):
- Due to manufacturer's policies, certain items sold on our website may only be returned directly to the manufacturer.
- Contact the manufacturer directly to arrange the return. Be prepared to provide the manufacturer with the following information: Date of purchase, Serial number, manufacturer part number.
Opened Software, Registered Licensing:
- Software and License downloads are not returnable. All sales are final when software has been registered, activated or used. Exceptions must be approved prior to a return being authorized.