6rd is an IPv6 migration technology, where the access network of the service provider is running IPv4.

Active Directory Federation Services (ADFS)

Active Directory Federation Services (ADFS) allows the sharing of identity authentication between two trusted partners beyond the boundaries of their respective Active Directory (AD) forests. This feature is available within Windows servers and provides users with Single Sign-On access to systems and applications across organizational boundaries.


aFleX is a scripting tool that is built into the Thunder and AX Series of New Generation Server Load Balancers. aFleX is based on a standard scripting language, TCL, enabling the load balancer to perform Layer 7 deep-packet inspection (DPI). Information in the header or data portion of the packet can then be erased, changed or manipulated as needed, or the packet can be dropped or redirected based on the information.

aFleX Advanced Scripting

Application delivery controllers (ADCs) have become an essential part of the network, ensuring applications are highly available, accelerated, and secure. ADCs provide a broad range of features and the management tools needed to meet advanced requirements.

Application Acceleration

Application Acceleration consists of methods that can be used to improve the performance of applications over networks to ensure that application data is delivered as quickly as possible. Application acceleration techniques also reduce the computational overhead on the servers providing the data. 

Application Bandwidth Management

Application Bandwidth Management consists of a set of Quality of Service (QoS) tools used to handle and prioritize data traffic by application type. In doing so, bandwidth-intensive applications, such as peer-to-peer applications (for example, BitTorrent), can be prevented from crowding out legitimate business traffic.

Application Delivery Controllers

Application Delivery Controllers are networking devices that reside in the data center and serve as a key part of an application delivery network. With the explosion in Internet traffic, business applications, and the number of Internet-enabled devices, application delivery controllers provide the front-end intelligence that supplements and enhances business application flows.

Application Delivery Networking

Application delivery networking is the practice of creating a framework of technologies that work together to provide the appropriate levels of availability, security, visibility, and acceleration to networked applications. These application delivery networking technologies feature their own proprietary CPUs and generally reside at the network endpoints. They enhance the delivery of applications across the Internet via a variety of optimization techniques.

Application Traffic Acceleration

As many data center operators know, it is difficult to control all aspects of the network between the application server and the end customer, which poses significant challenges for application performance. Fortunately, many tools and features are available to help accelerate application content to ensure optimal delivery and offload backend server infrastructure.

aXAPI Custom Management

The Thunder Series and AX Series Application Delivery Controllers (ADCs) feature aXAPI, a REST-based Application Programming Interface (API), enabling remote interaction from third-party applications to control the server load balancer.


Bandwidth refers to the width of a communications channel, and it may be helpful to envision bandwidth as a hose or pipe that carries data communications instead of water. Comparatively a communications channel (such as a T1 line) could be said to have a wide bandwidth, while a lower-speed communications channel (such as a 56 Kb dial-up line) could be said to have a narrow bandwidth.

Bandwidth Management

Bandwidth management is the practice of effectively allocating the available resources within an enterprise's communications channel in order to optimize the speed of mission-critical communications, while reducing bandwidth allocated to applications that are less critical or less sensitive to time delays.

Carrier Grade NAT (CGN, CG-NAT, CGNAT)

Carrier Grade NAT, (CGN, CGNAT, CG-NAT) is also known as Large Scale NAT (LSN). Like regular Network Address Translation (NAT), it shares an outside IP address among multiple inside local (private) IP addresses. This feature is utilized to alleviate the IPv4 address exhaustion.

Carrier Grade Network Address Translation

Network Address Translation (NAT) is a technology that has been used for a long time and by now has a ubiquitous presence in firewalls and Internet gateways. Carrier Grade NAT (CGN), also known as Large Scale NAT (LSN) is now becoming the new standard. Initially, traditional NAT was used for translating the address ranges between two networks. In the last decade, NAT has been used for virtually every household or enterprise connection, as part of a home Internet router.

Data Breach

A data breach is a security incident involving the unknowing exposure or unauthorized access of sensitive, protected, or confidential data. In the corporate environment, a data breach is a fairly common occurrence and is either caused by the theft or loss of a computing device, internal employees inadvertently introducing malware into a network, or external hackers directly targeting a company’s network. Because these incidents can damage a company’s reputation and are costly and time-consuming to mitigate, data breach prevention is a top priority in most IT environments.

DNS Application Firewall

The Thunder and AX Series Application Delivery Controllers (ADCs) have been deployed to protect, load balance and ensure availability for critical DNS infrastructure at Internet and DNS service providers. The A10 ADCs ensure the DNS infrastructure, as a strategic asset, is protected and DNS server resources are optimized.


DS-Lite is an IPv6 migration technology, where the access network of the service provider is running IPv6.

Firewall Load Balancing

While having a solid firewall infrastructure is a cornerstone of network security, best-of-breed solutions cannot be optimized without adequate firewall load balancing. If internal defenses are overloaded and cannot filter user traffic for malware, viruses, and other security threats, this renders a network infrastructure vulnerable to security breaches. A highly available firewall is crucial in protecting the network and ensuring business continuity.

Global Server Load Balancing (GSLB)

Global Server Load Balancing (GSLB) is popular for its disaster recovery functionality as well as for more intelligent direction of traffic for optimal site selection.


HTTPS is an acronym for HyperText Transfer Protocol plus Security Socket Layer. It’s a widely used Internet protocol for secure communication over a computer network. When a client accesses a website or a web application, HTTPS provides authentication for both the website and associated web server and encrypts data between the client and server.

Inter-Process Communication (IPC)

Inter-Process Communication (IPC) is a messaging sub-system that can enable data exchange between processors. Because IPC creates additional CPU overhead, it can result in delayed response times, slower software performance, and inaccurate real-time data per CPU.

IPv4 Address Exhaustion

IPv4 address exhaustion is the depletion of the pool of unallocated Internet Protocol Version 4 (IPv4) addresses.


IPv6 (Internet Protocol version 6) is a revision of the Internet Protocol (IP) developed by the Internet Engineering Task Force (IETF).

IPv6 Migration, Scaling, Transition

Since IPv4 and IPv6 are incompatible, both protocols have to be supported simultaneously in order to provide a smooth migration and seamless user experience.

Load Balancer

A load balancer is a hardware or virtual software device that intelligently distributes application and network traffic across multiple servers. The goal of the load balancer is to make sure that all users are served information as quickly as possible, and that more work gets done in less time. Today’s application delivery controllers (ADCs) offer load balancing technology as one of their features.

Load Balancing

Load balancing is an important networking feature generally performed by multiple dedicated hardware devices known as Application Delivery Controllers (ADCs). These load balancing devices distribute large amounts of inbound traffic among a group of back-end servers hosting the same application content.

Microsoft Exchange

Microsoft Exchange is an email server, calendar host and contact manager, with built-in protection against spam and viruses. Exchange enables users throughout an organization to access email, VM, calendars, and contacts from a wide variety of devices and from any location.

Microsoft Internet Information Services (IIS)

Microsoft Internet Information Services (IIS) is a server application for use with Microsoft Windows Servers. It can be used to host a wide variety of services, such as media streaming or web applications. IIS support includes HTTP, HTTPS, FTP, FTPS, SMTP and NNTP protocols. The IIS web server is architected for multiple versions of the Microsoft Windows operating system.

Microsoft Lync Server

Microsoft Lync Server is the successor to Microsoft Office Communications Server (OCS), providing a single interface that unites enterprise-ready voice communications, IM, collaboration, and audio/video web conferencing into a richer, more contextual offering for users.

Microsoft SharePoint

Microsoft SharePoint is a web-based enterprise application for document management and collaboration, utilizing the HTTP and HTTPS protocols. SharePoint runs over TCP, and requires multiple acknowledgements and secure processing of data, which can slow down servers and degrade responsiveness to users when load increases.

Microsoft Unified Access Gateway (UAG)

Microsoft Unified Access Gateway (UAG) 2010 is part of the Microsoft Forefront security product line. The UAG is a comprehensive remote access and security software solution that can offer secure unified access to internal corporate applications.

Microsoft Windows Server Terminal Services

Microsoft Terminal Services (also called Remote Desktop Services) allows remote control of applications over a network. With Terminal Services, a remote user can gain control of another user’s resources, such as individual applications or an entire device.


As Cloud Computing adoption increases, virtualization is a key enabler, driving economies of scale and the ability to scale with hardware appliances or commodity hardware.


NAT64 is a technology where IPv6-only clients can still access legacy IPv4-only content.

Network Management

Networks are handling larger volumes of traffic due to increased user demand and number of applications. To handle this demand, a higher number of physical and virtualized devices are needed to keep pace. For IT staff, it can be difficult to keep up, whether provisioning and ongoing configuration change, keeping track of new deployments, or performing necessary upgrades. Management of network devices and customization can be time-intensive and laborious without the right management systems.

Operating System (OS)

An Operating System (OS) is the software program that runs on a computer or mobile device and handles the most fundamental tasks. Examples of common operating systems include Microsoft Windows, Linux, and UNIX.

RAM Caching

RAM caching optimizes network transactions for the user, network and web servers. Frequently requested objects from web servers are stored locally in RAM on the Application Delivery Controller (ADC). When subsequent requests for the same object are received, the ADC provides the object from its own RAM cache, thus avoiding additional requests to the original web server.

Server Load Balancer

server load balancer is a hardware or virtual software appliance that distributes the demand for server and application processing power across an array of servers, ensuring application availability, application scaling and reliability via comprehensive health monitoring that removes unresponsive or underperforming server application from the load balancing scenario.

SIP Load Balancing

SIP load balancing scales and optimizes a SIP infrastructure. SIP registration and SIP proxy traffic can be handled in separate service groups, whose servers can be monitored with separate application-layer SIP health checks for registration or non-registration traffic.


SLB-PT (Server Load Balancing - Protocol Translation) is a method of connecting an IPv4 server through an ADC and make it available to the IPv6 public Internet, or vice versa.


SSL is an acronym that commonly refers to the two cryptographic Internet protocols—Transport Layer Security (TLS) and its predecessor, Security Sockets Layer (SSL). The purpose of SSL is to provide secure communications over a computer network, and SSL-encrypted data now accounts for about one-third of all Internet traffic.

SSL Decryption, Encryption and Inspection

To prevent cyber-attacks, enterprises need to inspect incoming and outgoing traffic for threats. Unfortunately, attackers are increasingly turning to encryption to evade detection. With more and more applications using encrypting data- in fact, today, SSL traffic accounts for 25% to 35% of all Internet traffic-organizations that do not inspect SSL communications are providing an open door for attackers to infiltrate defenses and for malicious insiders to steal sensitive data.

SSL Offload

Internet users today are much more alert about web security than just a few years ago; secured traffic exchange via encrypted http traffic is becoming the standard now for web sites and applications.

SSL Offloading

Secure Socket Layer (SSL) is a commonly-used protocol that helps to ensure the security of HTTP traffic traveling across the Internet. SSL relies on public- and private-key encryption to encrypt communications between the client and server so that messages are sent safely across the network. By encrypting the transmission, sensitive information, such as a user's login ID for an online banking session, or perhaps a credit card number, is protected and kept out of the hands of potential hackers and criminal organizations.

Traffic Monitoring

Traffic monitoring, also known as network monitoring, is the method of studying the incoming and outgoing traffic on a computer network via specialized hardware and/or software.

Traffic Shaping

Traffic shaping, also known as packet shaping, Quality of Service (QoS) or bandwidth management, is the manipulation and  prioritization of network traffic to reduce the impact of heavy users or machines from effecting other users.

Web Application Firewall

A web application firewall is a device that protects web servers and web applications from malware and threats by providing a layer of control between end users and applications. The web application firewall functions as a flexible barrier that filters all application access, inspecting both in-bound and out-bound traffic. It is specifically designed to mitigate attacks without blocking legitimate users and without slowing down application performance.

What is a DDoS Attack?

DDoS attacks threaten vital business operations and security issued by remotely controlled computers or botnets. Cybercriminals use them to initiate devastating attacks on your business.