Connect & learn in our hosted community
The latest threat intel and research to help protect your apps
Your key to everything F5, including support, registration keys, and subscriptions
Research and support for partners
Guidance, insights, and how to use F5 products
Talk to an F5 sales representative
Talk to a support professional in your region
Get help to optimize your F5 solution
Talk to an expert about F5 Distributed Cloud Services
Get a tailored experience with exclusive enterprise capabilities including API security, bot defense, edge compute, and multi-cloud networking.
Get consistent application services across clouds.
Scale, observe, secure, and govern your APIs from edge to cloud.
Scale, observe, secure, and govern Kubernetes apps—on premises, in the cloud, or at the edge.
Learn the lingo. Find definitions and learn about the general application of common industry terms as they are used on this website.
ActiveX ›
Account Takeover (ATO) ›
Adaptive applications ›
Advanced compression ›
AJAX (Asynchronous JavaScript and XML) ›
Anti-phishing ›
API security ›
Application acceleration ›
Application accelerator ›
Application delivery ›
Application delivery controller ›
Application firewall ›
Application intelligence ›
Application layer firewall ›
Application layer gateway ›
Application layer security ›
Application security ›
Application services ›
Application traffic manager ›
Asymmetric deployment ›
Bandwidth ›
Bot management, mitigation, and protection ›
Bots ›
Bot mitigation ›
Bot security ›
Brute force attack ›
Buffer overflow ›
Business Email Compromise (BEC) ›
Caching ›
CDN (Content Delivery Network) ›
CIFS SMB ›
Clientless remote access ›
Connection flood ›
Cookie poisoning ›
Credential Stuffing ›
Cross-site scripting ›
Cyberattacks ›
Cybersecurity ›
Data integrity ›
Data layer security ›
Delivery networking ›
Denial of service ›
Diameter edge agent (DEA) ›
Diameter interfaces ›
Diameter load balancer ›
Diameter protocol ›
Diameter routing agent (DRA) ›
Disaster recovery/business continuity ›
DDoS (Distributed Denial-of-Service) ›
DDoS Mitigation ›
DMZ (Demilitarized Zone) ›
DNS flood: NXDOMAIN flood ›
DNS flood: query flood ›
DNS Load Balancing ›
DTLS (Datagram Transport Layer Security) ›
Edge AI ›
Endpoint security ›
Extensible Markup Language (XML) ›
Extranet access control ›
File server consolidation ›
Firewall Security ›
Fraud Detection ›
Fully Qualified Domain Name (FQDN) ›
Generative AI ›
GET flood ›
Global namespace ›
Hash DoS attack ›
Hypertext Transfer Protocol (HTTP) ›
Hybrid Cloud ›
Hybrid Cloud Networking ›
Hybrid Cloud Security ›
ICMP flood, Ping flood, Smurf attack ›
Intelligent compression ›
Internet traffic management ›
Infrastructure as code (IAC) ›
IPsec (Internet Protocol Security) ›
IPv6 (Internet Protocol Version 6) ›
IMS (IP Multimedia Subsystem) ›
IWF (Interworking Function) ›
IP QoS ›
IPsec VPN ›
IPv6 gateway ›
IPv6 proxy ›
Java ›
Latency ›
Load balancer ›
MIB (Management Information Base) ›
Microsegmentation ›
Multi-Cloud ›
Multi-Cloud Network Architecture ›
Multi-Cloud Security ›
Multi-Cloud Strategies ›
Multi-Homing ›
NAS (Network Attached Storage) ›
Network availability ›
Network traffic management ›
NFS (Network File System) ›
NMS (Network Management Station) ›
OID (Object Identifier) ›
Open Banking ›
OWASP ›
OWASP API Security Top 10 Overview & Best Practices ›
OWASP Automated Threats ›
PCI (Payment Card Industry Data Security Standard) ›
Policy enforcement ›
PUSH and ACK flood ›
QoS (Quality of Service) ›
Rate shaping ›
Replication ›
Reverse proxy ›
RFC 3588 ›
RFC 6733 ›
RPO (Recovery Point Objective) ›
RTO (Recovery Time Objective) ›
RTSP (Real-Time Streaming Protocol) ›
SCTP (Stream Control Transmission Protocol) ›
Secure application delivery ›
Secure remote access ›
Security breaches ›
SIP (Session Initiation Protocol) ›
SIP proxy ›
SIP proxy server ›
SIP VoIP gateway ›
SLA (Service-Level Agreement) ›
SNMP (Simple Network Management Protocol) ›
SOA (Service Oriented Architecture) ›
SOAP (Simple Object Access Protocol) ›
SQL injection ›
SSL acceleration ›
SSL bridging ›
SSL decryption ›
SSL flood and SSL renegotiation attacks ›
SSL offloading ›
SSL termination ›
SSL/TLS encryption ›
SSL VPN ›
SSRF ›
SYN flood ›
Teardrop attack ›
Telecommunications industry organizations ›
Threat Stack ›
Traffic management ›
Traffic shaping ›
UDP flood ›
Universal access controller ›
Universal access manager ›
Virtual private network (VPN) ›
WAF (Web application firewall) ›
WAN acceleration ›
Web 2.0 ›
Web acceleration ›
Web App and API Protection ›
Web application performance ›
Web application security ›
Web performance ›
Web server performance ›
Wireless network security ›
XML (Extensible Markup Language) ›
XML firewall ›
Zero Trust ›