F5製品およびサービスに関するセルフサービス ヘルプの記事
弊社主催のコミュニティでつながり、学ぶ
サブスクリプションおよび登録キーの管理
F5パートナーのためのリソースおよびサポート ポータル
Learn to use F5 products
詳しくは、F5の営業担当社にお問い合わせください
お近くのサポート担当者にお問い合わせください
F5ソリューションを最適化するためのサポートを受ける
複数のクラウドにわたり、一貫したアプリケーション サービスを実現します。
ロード バランサー、コンテンツ キャッシュ、Webサーバー、WAF、DoSセキュリティ プラットフォームをオールインワンで提供し、インフラストラクチャの肥大化を抑制します。
Kubernetesに最適なロード バランサー、キャッシュ、APIゲートウェイ、WAFをオールインワンで提供することで、高いパフォーマンスと軽量化を実現します。
トラフィック管理機能とセキュリティを統合したセルフサービスのAPI駆動型ツール スイートにより、アプリとAPIを速やかに導入できます。
Learn the lingo. Find definitions and learn about the general application of common industry terms as they are used on this website.
ActiveX ›
Advanced compression ›
AJAX (Asynchronous JavaScript and XML) ›
Anti-phishing ›
Application acceleration ›
Application accelerator ›
Application delivery controller ›
Application firewall ›
Application intelligence ›
Application layer firewall ›
Application layer gateway ›
Application layer security ›
Application security ›
Application services ›
Application traffic manager ›
Asymmetric deployment ›
Bandwidth ›
Bot management, mitigation, and protection ›
Bot mitigation ›
Buffer overflow ›
Caching ›
CDN (Content Delivery Network) ›
CIFS SMB ›
Clientless remote access ›
Connection flood ›
Cookie poisoning ›
Credential Stuffing ›
Cross-site scripting ›
Data integrity ›
Data layer security ›
Delivery networking ›
Denial of service ›
Diameter edge agent (DEA) ›
Diameter interfaces ›
Diameter load balancer ›
Diameter protocol ›
Diameter routing agent (DRA) ›
Disaster recovery/business continuity ›
DDoS (Distributed Denial-of-Service) ›
DMZ (Demilitarized Zone) ›
DNS flood: NXDOMAIN flood ›
DNS flood: query flood ›
DTLS (Datagram Transport Layer Security) ›
Endpoint security ›
Extensible Markup Language (XML) ›
Extranet access control ›
File server consolidation ›
GET flood ›
Global namespace ›
Hash DoS attack ›
Hypertext Transfer Protocol (HTTP) ›
ICMP flood, Ping flood, Smurf attack ›
Intelligent compression ›
Internet traffic management ›
Infrastructure as code (IAC) ›
IPsec (Internet Protocol Security) ›
IPv6 (Internet Protocol Version 6) ›
IMS (IP Multimedia Subsystem) ›
IWF (Interworking Function) ›
IP QoS ›
IPsec VPN ›
IPv6 gateway ›
IPv6 proxy ›
Java ›
Latency ›
Load balancer ›
MIB (Management Information Base) ›
Multi-Homing ›
NAS (Network Attached Storage) ›
Network availability ›
Network traffic management ›
NFS (Network File System) ›
NMS (Network Management Station) ›
OID (Object Identifier) ›
PCI (Payment Card Industry Data Security Standard) ›
Policy enforcement ›
PUSH and ACK flood ›
QoS (Quality of Service) ›
Rate shaping ›
Replication ›
Reverse proxy ›
RFC 3588 ›
RFC 6733 ›
RPO (Recovery Point Objective) ›
RTO (Recovery Time Objective) ›
RTSP (Real-Time Streaming Protocol) ›
SCTP (Stream Control Transmission Protocol) ›
Secure application delivery ›
Secure remote access ›
SIP (Session Initiation Protocol) ›
SIP proxy ›
SIP proxy server ›
SIP VoIP gateway ›
SLA (Service-Level Agreement) ›
SNMP (Simple Network Management Protocol) ›
SOA (Service Oriented Architecture) ›
SOAP (Simple Object Access Protocol) ›
SQL injection ›
SSL acceleration ›
SSL bridging ›
SSL decryption ›
SSL flood and SSL renegotiation attacks ›
SSL offloading ›
SSL termination ›
SSL/TLS encryption ›
SSL VPN ›
SYN flood ›
Teardrop attack ›
Telecommunications industry organizations ›
Threat Stack ›
Traffic management ›
Traffic shaping ›
UDP flood ›
Universal access controller ›
Universal access manager ›
Virtual private network (VPN) ›
WAF (Web application firewall) ›
WAN acceleration ›
Web 2.0 ›
Web acceleration ›
Web App and API Protection ›
Web application performance ›
Web application security ›
Web performance ›
Web server performance ›
Wireless network security ›
XML (Extensible Markup Language) ›
XML firewall ›
Zero Trust ›