Glossary

6rd

6rd is an IPv6 migration technology, where the access network of the service provider is running IPv4.
Read more

Active Directory Federation Services (ADFS)

Active Directory Federation Services (ADFS) allows the sharing of identity authentication between two trusted partners beyond the boundaries of their respective Active Directory (AD) forests. This feature is available within Windows servers and provides users with Single Sign-On access to systems and applications across organizational boundaries.
Read more

aFleX

aFleX is a scripting tool that is built into the Thunder and AX Series of New Generation Server Load Balancers. aFleX is based on a standard scripting language, TCL, enabling the load balancer to perform Layer 7 deep-packet inspection (DPI). Information in the header or data portion of the packet can then be erased, changed or manipulated as needed, or the packet can be dropped or redirected based on the information.
Read more

aFleX Advanced Scripting

Application delivery controllers (ADCs) have become an essential part of the network, ensuring applications are highly available, accelerated, and secure. ADCs provide a broad range of features and the management tools needed to meet advanced requirements.
Read more

Application Acceleration

Application Acceleration consists of methods that can be used to improve the performance of applications over networks to ensure that application data is delivered as quickly as possible. Application acceleration techniques also reduce the computational overhead on the servers providing the data. 
Read more

Application Bandwidth Management

Application Bandwidth Management consists of a set of Quality of Service (QoS) tools used to handle and prioritize data traffic by application type. In doing so, bandwidth-intensive applications, such as peer-to-peer applications (for example, BitTorrent), can be prevented from crowding out legitimate business traffic.
Read more

Application Delivery Controllers

Application Delivery Controllers are networking devices that reside in the data center and serve as a key part of an application delivery network. With the explosion in Internet traffic, business applications, and the number of Internet-enabled devices, application delivery controllers provide the front-end intelligence that supplements and enhances business application flows.
Read more

Application Delivery Networking

Application delivery networking is the practice of creating a framework of technologies that work together to provide the appropriate levels of availability, security, visibility, and acceleration to networked applications. These application delivery networking technologies feature their own proprietary CPUs and generally reside at the network endpoints. They enhance the delivery of applications across the Internet via a variety of optimization techniques.
Read more

Application Traffic Acceleration

As many data center operators know, it is difficult to control all aspects of the network between the application server and the end customer, which poses significant challenges for application performance.

Read more

aXAPI Custom Management

The Thunder Series and AX Series Application Delivery Controllers (ADCs) feature aXAPI, a REST-based Application Programming Interface (API), enabling remote interaction from third-party applications to control the server load balancer.
Read more

Bandwidth

Bandwidth refers to the width of a communications channel, and it may be helpful to envision bandwidth as a hose or pipe that carries data communications instead of water. Comparatively a communications channel (such as a T1 line) could be said to have a wide bandwidth, while a lower-speed communications channel (such as a 56 Kb dial-up line) could be said to have a narrow bandwidth.
Read more

Bandwidth Management

Bandwidth management is the practice of effectively allocating the available resources within an enterprise's communications channel in order to optimize the speed of mission-critical communications, while reducing bandwidth allocated to applications that are less critical or less sensitive to time delays.
Read more

Carrier Grade NAT (CGN, CG-NAT, CGNAT)

Carrier Grade NAT, (CGN, CGNAT, CG-NAT) is also known as Large Scale NAT (LSN). Like regular Network Address Translation (NAT), it shares an outside IP address among multiple inside local (private) IP addresses. This feature is utilized to alleviate the IPv4 address exhaustion.
Read more

Carrier Grade Network Address Translation

Network Address Translation (NAT) is a technology that has been used for a long time and by now has a ubiquitous presence in firewalls and Internet gateways. Carrier Grade NAT (CGN), also known as Large Scale NAT (LSN) is now becoming the new standard. Initially, traditional NAT was used for translating the address ranges between two networks. In the last decade, NAT has been used for virtually every household or enterprise connection, as part of a home Internet router.
Read more

Data Breach

A data breach is a security incident involving the unknowing exposure or unauthorized access of sensitive, protected, or confidential data. In the corporate environment, a data breach is a fairly common occurrence and is either caused by the theft or loss of a computing device, internal employees inadvertently introducing malware into a network, or external hackers directly targeting a company’s network. Because these incidents can damage a company’s reputation and are costly and time-consuming to mitigate, data breach prevention is a top priority in most IT environments.
Read more

DDoS

DDoS is an acronym for Distributed Denial-of-Service. It’s a type of attack where hundreds or even thousands of client computers are hijacked by a hacker to strike against a single system, network or application. If an organization becomes compromised by a DDoS attack, whatever service it provides becomes unavailable to its employees and customers.
Read more

DDoS Mitigation

DDoS mitigation typically involves coordinated activities that proactively detect and protect the intended target and networks from a DDoS attack. This is done by passing network traffic addressed to the target through high-capacity network resources that scrub the data for any malicious characteristics. As a rule, DDoS mitigation should occur in the background and continue to allow legitimate traffic to access your services at network speed.
Read more

DDoS Protection

Distributed denial-of-service (DDoS) attacks continue to threaten data privacy and business operations and have increased in volume, velocity, duration, and complexity. As a result, effective DDoS protection relies on a hybrid defense solution, comprised of existing data center components as well as dedicated hardware and software products that work together to provide a more complete threat protection system.
Read more

Denial of Service (DoS)

Denial of Service (DoS) is an attack where one computer and one Internet connection inundates a targeted system or resource. When an army of remotely controlled computers inundates all your resources, that’s called a Distributed Denial of Service (DDoS) attack. Both types of attacks attempt to prevent internal employees and customers from accessing an organization’s web-based service by either flooding the servers or crashing them.
Read more

DNS Application Firewall

The Thunder and AX Series Application Delivery Controllers (ADCs) have been deployed to protect, load balance and ensure availability for critical DNS infrastructure at Internet and DNS service providers. The A10 ADCs ensure the DNS infrastructure, as a strategic asset, is protected and DNS server resources are optimized.
Read more

DS-Lite

DS-Lite is an IPv6 migration technology, where the access network of the service provider is running IPv6.
Read more

Firewall Load Balancing

While having a solid firewall infrastructure is a cornerstone of network security, best-of-breed solutions cannot be optimized without adequate firewall load balancing. If internal defenses are overloaded and cannot filter user traffic for malware, viruses, and other security threats, this renders a network infrastructure vulnerable to security breaches. A highly available firewall is crucial in protecting the network and ensuring business continuity.
Read more

Global Server Load Balancing (GSLB)

Global Server Load Balancing (GSLB) is popular for its disaster recovery functionality as well as for more intelligent direction of traffic for optimal site selection.
Read more

HTTPS

HTTPS is an acronym for HyperText Transfer Protocol plus Security Socket Layer. It’s a widely used Internet protocol for secure communication over a computer network. When a client accesses a website or a web application, HTTPS provides authentication for both the website and associated web server and encrypts data between the client and server.
Read more

Inter-Process Communication (IPC)

Inter-Process Communication (IPC) is a messaging sub-system that can enable data exchange between processors. Because IPC creates additional CPU overhead, it can result in delayed response times, slower software performance, and inaccurate real-time data per CPU.
Read more

IPv4 Address Exhaustion

IPv4 address exhaustion is the depletion of the pool of unallocated Internet Protocol Version 4 (IPv4) addresses.
Read more

IPv6

IPv6 (Internet Protocol version 6) is a revision of the Internet Protocol (IP) developed by the Internet Engineering Task Force (IETF).
Read more

IPv6 Migration, Scaling, Transition

Since IPv4 and IPv6 are incompatible, both protocols have to be supported simultaneously in order to provide a smooth migration and seamless user experience.

Read more

Load Balancer

A load balancer is a hardware or virtual software device that intelligently distributes application and network traffic across multiple servers. The goal of the load balancer is to make sure that all users are served information as quickly as possible, and that more work gets done in less time. Today’s application delivery controllers (ADCs) offer load balancing technology as one of their features.
Read more

Load Balancing

Load balancing is an important networking feature generally performed by multiple dedicated hardware devices known as Application Delivery Controllers (ADCs). These load balancing devices distribute large amounts of inbound traffic among a group of back-end servers hosting the same application content.
Read more

Microsoft Exchange

Microsoft Exchange is an email server, calendar host and contact manager, with built-in protection against spam and viruses. Exchange enables users throughout an organization to access email, VM, calendars, and contacts from a wide variety of devices and from any location.
Read more

Microsoft Internet Information Services (IIS)

Microsoft Internet Information Services (IIS) is a server application for use with Microsoft Windows Servers. It can be used to host a wide variety of services, such as media streaming or web applications. IIS support includes HTTP, HTTPS, FTP, FTPS, SMTP and NNTP protocols. The IIS web server is architected for multiple versions of the Microsoft Windows operating system.
Read more

Microsoft Lync Server

Microsoft Lync Server is the successor to Microsoft Office Communications Server (OCS), providing a single interface that unites enterprise-ready voice communications, IM, collaboration, and audio/video web conferencing into a richer, more contextual offering for users.
Read more

Microsoft SharePoint

Microsoft SharePoint is a web-based enterprise application for document management and collaboration, utilizing the HTTP and HTTPS protocols. SharePoint runs over TCP, and requires multiple acknowledgements and secure processing of data, which can slow down servers and degrade responsiveness to users when load increases.
Read more

Microsoft Unified Access Gateway (UAG)

Microsoft Unified Access Gateway (UAG) 2010 is part of the Microsoft Forefront security product line. The UAG is a comprehensive remote access and security software solution that can offer secure unified access to internal corporate applications.
Read more

Microsoft Windows Server Terminal Services

Microsoft Terminal Services (also called Remote Desktop Services) allows remote control of applications over a network. With Terminal Services, a remote user can gain control of another user’s resources, such as individual applications or an entire device.
Read more

Multi-tenancy/Virtualization

As Cloud Computing adoption increases, virtualization is a key enabler, driving economies of scale and the ability to scale with hardware appliances or commodity hardware.
Read more

NAT64

NAT64 is a technology where IPv6-only clients can still access legacy IPv4-only content.
Read more

Network Management

Networks are handling larger volumes of traffic due to increased user demand and number of applications. To handle this demand, a higher number of physical and virtualized devices are needed to keep pace. For IT staff, it can be difficult to keep up, whether provisioning and ongoing configuration change, keeping track of new deployments, or performing necessary upgrades. Management of network devices and customization can be time-intensive and laborious without the right management systems.
Read more

Operating System (OS)

An Operating System (OS) is the software program that runs on a computer or mobile device and handles the most fundamental tasks. Examples of common operating systems include Microsoft Windows, Linux, and UNIX.
Read more

RAM Caching

RAM caching optimizes network transactions for the user, network and web servers. Frequently requested objects from web servers are stored locally in RAM on the Application Delivery Controller (ADC). When subsequent requests for the same object are received, the ADC provides the object from its own RAM cache, thus avoiding additional requests to the original web server.
Read more

Server Load Balancer

server load balancer is a hardware or virtual software appliance that distributes the demand for server and application processing power across an array of servers, ensuring application availability, application scaling and reliability via comprehensive health monitoring that removes unresponsive or underperforming server application from the load balancing scenario.

Read more

SIP Load Balancing

SIP load balancing scales and optimizes a SIP infrastructure. SIP registration and SIP proxy traffic can be handled in separate service groups, whose servers can be monitored with separate application-layer SIP health checks for registration or non-registration traffic.
Read more

SLB-PT

SLB-PT (Server Load Balancing - Protocol Translation) is a method of connecting an IPv4 server through an ADC and make it available to the IPv6 public Internet, or vice versa.
Read more

SSL

SSL is an acronym that commonly refers to the two cryptographic Internet protocols—Transport Layer Security (TLS) and its predecessor, Security Sockets Layer (SSL). The purpose of SSL is to provide secure communications over a computer network, and SSL-encrypted data now accounts for about one-third of all Internet traffic.
Read more

SSL Decryption, Encryption and Inspection

To prevent cyber-attacks, enterprises need to inspect incoming and outgoing traffic for threats. Unfortunately, attackers are increasingly turning to encryption to evade detection. With more and more applications using encrypting data- in fact, today, SSL traffic accounts for 25% to 35% of all Internet traffic1 -organizations that do not inspect SSL communications are providing an open door for attackers to infiltrate defenses and for malicious insiders to steal sensitive data.
Read more

SSL Offload

Internet users today are much more alert about web security than just a few years ago; secured traffic exchange via encrypted http traffic is becoming the standard now for web sites and applications.
Read more

SSL Offloading

Secure Socket Layer (SSL) is a commonly-used protocol that helps to ensure the security of HTTP traffic traveling across the Internet. SSL relies on public- and private-key encryption to encrypt communications between the client and server so that messages are sent safely across the network. By encrypting the transmission, sensitive information, such as a user's login ID for an online banking session, or perhaps a credit card number, is protected and kept out of the hands of potential hackers and criminal organizations.
Read more

Traffic Monitoring

Traffic monitoring, also known as network monitoring, is the method of studying the incoming and outgoing traffic on a computer network via specialized hardware and/or software.
Read more

Traffic Shaping

Traffic shaping, also known as packet shaping, Quality of Service (QoS) or bandwidth management, is the manipulation and  prioritization of network traffic to reduce the impact of heavy users or machines from effecting other users.
Read more

Web Application Firewall

A web application firewall is a device that protects web servers and web applications from malware and threats by providing a layer of control between end users and applications. The web application firewall functions as a flexible barrier that filters all application access, inspecting both in-bound and out-bound traffic. It is specifically designed to mitigate attacks without blocking legitimate users and without slowing down application performance.
Read more