Acronyms, are used all the time and the author /presentor is usually convinced that everyone in the audience understands what they mean, but every once in a while you hear or read something that you are not sure of the meaning. We are all professionals, that do not want to look like we are the only one in the room who does not know. So after hearing a talk or reading an article we often find ourselves looking it up; this can become confusing because acronyms mean different things when we search outside our field.

For example CE what does it mean?
The letters "CE" are the abbreviation of French phrase "Conformité Européene" which literally means "European Conformity".  In the dictionary you will probably find CE meaning Common Era or Christian Era.  When looking for a more modern meaning, we will find it may mean Consumer Electronics.
But here in our community, when someone writes CE, they mean Customer Edge.

Here, you have, at your fingertips a list of acronyms, unconfused with other fields.

Please let me know if I missed any acronyms so I can add them to our list.

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |



ACL - Access Control List

ADC - Application Delivery Controller 

ADN - Application delivery network

ADO - Application Delivery Optimization

ALG - Application Layer Gateway

AI - Artificial Intelligence

AJAX -  Asynchronous JavaScript and XML

API  -   Application Programming Interface

APM  -  Access Policy Manager

ASM  -  Application Security Manager  (F5’s Application Security Manager™ ASM is also known as BD)

AWAF - Advanced Web Application Firewall

AWS  -  Amazon Web Services


BaDos  -  Behaviour AniDDoS (Behaviour AniDDoS, an F5 product that is used against DDoS)

BDM -- Business Decision Maker

BGP  -  Border Gateway Protocol

BOO  -  Build Once Only


CDN -  Content Delivery Network

CE  -  Customer Edge

CGNAT -  Carrier Grade NAT

CIA triad  -  Confidentiality, Integrity,Availability (triad Security model)

CIFS  -  Common Internet file system

CRS  -  Core RuleSet

CRUD -  Create , Read, Update, Delete

CSRF - Cross-Site Request Forgery, also known as XSRF

CUPS - Control Plane and User Plane Separation

CVE - Common Vulnerabilities and exposures

CVSS - Common Vulnerability Scoring System


DAP - Digital Adoption Plateform

DAST - Dynamic testing. (Examples of such tools Qualys and Nessus)

DB - Database

DC - Direct Communication / Direct Connect

DDoS - Distributed Denial-of-Service

DGW - Default Gateway Weight Settings Protocol (DGW)

DHCP - Dynamic Host Configuration Protocol

DIO - Distribution Initiated Opportunity

DLP - Data Loss Protection

DMZ - Demilitarized Zone [Demilitarized Zone 

DNS - Domain Name System

DoH - DNS over HTTP

DoT - DNS over TLS

DPIAs - Data Protection Impact Assessment

DRP - Disaster Recovery Plan

DSR - Data Subject Rights


ELA -  Enterprise License Agreement

EDPB - European Data Protection Board

EDR - Endpoint Detection and Response

EPP - Endpoint Protection Platforms

EUSA - End User Software Agreement


FIPS - Federal Information Processing Standards

FPGA - field-programmable gate array

FQDN - Fully Qualified Domain Name

FRR - FRRouting


GDPR - General Data Protection Regulations

GKE - Google Kubernetes Engine

GPU - Graphic Processing Unit

GSLB - Volterra’s Global Load Balancing

gRPC - Google Remote Procedure Call


HIPAA - Health Insurance Portability & Accountability Act

HMAC -Hash-based message authentication

HSL - High-Speed Logging

HTTP -  Hypertext Transfer

HTTPS - Hypertext Transfer Protocol


IANA - Internet Assigned Numbers Authority

IBD -  Integrated Bot Defense

ICO - Information Commission Office

IDS - Intrusion Detection System

IIoT - Industrial Internet of Things

ILM - Information Lifecycle Management

IoT - Internet of Things

IPAM - IP Address Management

IPSec - Internet Protocol Security

IR - Incidence Response

ISO -  Standardization Organization

ISP - Internet Service Provider


JS - Javascript


KMS - Key Management Service / Key Management System

KPI -  Key Performance Indicator

KV - Key Value

k8s -   Kubernetics


L7 -  Layer 7 - The application layer

LB - Load Balancer

LBaaS - Load Balancing as a Service 

LDAP -Lightweight Directory Access Protocol

LFI - Local File Exclusion attack

LTM - Local Traffic Manager


MAM - Mobile Application Management

MDM - Mobile Device Management

MFA - Multi-Factor Authentication

MitM - Man in the Middle

ML - Machine Learning

MSA - Master Service Agreement

MSP - Managed Service Provider

MT - Managed Tenant

mTLS - Mutual Transport Layer Security

MUD - Malicious User Detection

MUM - Malicious User Mitigation


NAP - Network access point

NAS - Network-Attached Storage

NAT - Network Address Translation

NIC - NetworkInterface Cards

NFV - Network functions

NFVI - Network functions virtualization

NPU - Network Processing Units


OAS -  OpenAPI Specification (Swagger)

OPA - Open Policy Agent

OT - Original Tenant

OWASP - Open Web Application Security Project


PAAS -  Platform as a service (PaaS

PBD - Proactive Bot Defence.

PCI DSS - Payment Card Industry Data Security Standard.

PBD - Privacy by Design

PE - Portable executable

PFS - Perfect Forward Secrecy

PIA - Privacy Impact Assessments

PII - Personally identifiable information

POP - Point of  Presence


QoS  - Quality of Service


RBAC - Role based Access control

RCE - Remote Code Execution

RDP - Remote Desktop Protocol

RE -  Routing Engine, Regional Edges

REST - Representational State Transfer *[[Rest API -Representational State Transfer]]*

RFI -    Request For Information OR Remote File Inclusion vulnerability attack

RFP - Request for Proposal

RPC - Remote Procedure Call

RSA (Rivest–Shamir–Adleman) is a public-key cryptosystem

RTT - Round Trip Time


SAM - Security Accounts Manager

SAML - Security Assertion Markup Language

SCIM - System for Cross-domain Identity Management

SCP - Secure Copy Protocol

SCP - Server Communication Proxy

SDC - F5 Security and Distributed Cloud

SDK - Software Development Kit

SDN - Software Defined Network

SE - Solutions Engineer

SIEM - Security Information & Event Management

SLA -  Service Level Availability

SLED -State,Local Government and Education

SLI - Service Level Indicator

SNAT - Source Network Address Translation

SOC - Security Operations Center

SP - Service Provider

SPK - Service Proxy for Kubernetes

SRE - Site reliability engineering  

SRT -  Security Research Team at F5

SSD - Solid State Drive 

SSL - Secure Sockets Layer

SSO - Single Sign On

SSRF -  Server-side request forgery

STRIDE - Spoofing, Tampering,Repudiation,Information Leakage, Denial of Service, Elevation of Privilege (a TMA Model)


TCL -  Tool Command Language

TCP -  [Transmission Control Protocol

TDM - Technical Decision Maker

TLS -  Transport layer Security

TMA - Threat Model Assessment

TO - Tenant Owner

TOCTOU - Time of Check vs Time of Use

TOI -  Transfer of Information

TTFB - Time to First Bit

TTL - Time to Live


UAM - User Access Management

UI - User Interface

URI - Uniform Resource

URL - Uniform Resource Locator

UX - User Experience


VER - Volterra Edge Router

VES - Volterra Edge Services

VIF - virtual interface

VIP - Virtual IP address

VM - Virtual Machine

Vnet -  Virtual network

VPC - Virtual Private Cloud

VPN - Virtual Private Network

VRS - Volterra Rules Set


WAAP - Web Application& API Protection

WAF - Web application firewall

WPA3 - Wi-Fi Alliance Access 3


XML - Extensible Markup Language [XML - Wikipedia](

XSS - Cross Site Scripting 

XSRF - Cross-Site Request Forgery, also known as CSRF




ZTNA -Zero Trust Network Access

ZTP - Zero-Touch Provisioning

ZTS - Zero Trust Security

Updated Sep 13, 2022
Version 7.0

Was this article helpful?


  • Dina, here are 10 more you can add:

    BDM -- Business Decision Maker
    IANA -- Internet Assigned Numbers Authority
    IoT -- Internet of Things
    IIoT -- Industrial Internet of Things
    IPAM -- IP Address Management
    ISP -- Internet Service Provider
    NAT -- Network Address Translation
    QoS -- Quality of Service
    SNAT -- Source Network Address Translation
    TDM -- Technical Decision Maker




  • Love this acronym list - helpful to the customer!


    A few acronyms for the list from my acronym library:

    Access Control List (ACL)

    Application Delivery Optimization (ADO)

    Application Layer Gateway (ALG)

    [BIG-IP] Advanced Firewall Manager (AFM)

    Amazon Virtual Private Cloud (Amazon VPC)

    FRRouting (FRR)

    High-Speed Logging (HSL)

    Information Lifecycle Management (ILM)

    Mobile Device Management (MDM)

    Mobile Application Management (MAM)

    Load Balancing as a Service (LBaaS)

    Perfect Forward Secrecy (PFS)

    Global Points of Presence (PoPs)

    Solid State Drive (SSD)

    Network-Attached Storage (NAS)

    Virtual Private Network (VPN)

    Zero-Touch Provisioning (ZTP)

    Cheers! -Aubree Andersen

  • Very useful!

    Just FYI, (grammar nerd alert) these are abbreviations. Only a few are acronyms. Only abbreviations that are pronounced as a word are acronyms.  For example AWOL is an acroynm but FBI is an abbreviation.