Billing FAQs
The following question and answer sets provide usage information for different F5 Distributed Cloud Services subscriptions. In this section, you will find the following information:
- General usage and billing questions
- Understanding metering
- Understanding F5 SaaS Essentials package
- Understanding F5 SaaS Enterprise package
- Distributed Cloud Application Security services
- Distributed Cloud Application Delivery services
Find out more about the available products and services on the platform here: Distributed Cloud Services | F5 Products.
For account-specific pricing information, reach out to your account team or Contact Sales.
General Usage and Billing Questions
Where can I view my current Distributed Cloud Services consumption?
F5 Distributed Cloud Services customers receive a monthly report detailing their current usage.
What does metering mean?
Metering refers to product usage that is tracked according to specific units. Consumption of services is tracked, and any increases in consumption of those services result in additional charges.
How often am I billed for usage?
Billing depends on your billing program:
- AWS Pay-as-you-go for Distributed Cloud | F5 Distributed Cloud Technical Knowledge
- Term Subscription for Distributed Cloud | F5 Distributed Cloud Technical Knowledge
- Flex Consumption Program for Distributed Cloud | F5 Distributed Cloud Technical Knowledge
Purchased products have a monthly usage entitlement included in the purchase or draw from a shared entitlement pool. You can purchase additional capacity to accommodate increased monthly usage.
What happens if I go over my consumption entitlements?
Your obligations for excess usage are defined in the End User Services Agreement in the section on usage metrics (F5, Inc. End User Services Agreement). If you have excess usage, your account team will work with you to right-size your subscription to cover your usage at an additional cost.
How do I add services to my subscription?
You can enable most services directly through your console by going to Catalog on the homepage. Some services may require you to work with F5 Support to enable, and your account team can help coordinate the services enablement.
Billing for usage of added services varies by buying program. Work with your partner and account team to understand the additional cost of adding a service.
- Term Subscription: Your account team will contact you in the quarter in which you started a new service to review the additional costs. Work with your partner and account team to add and co-term the services to your subscription.
- Pay-as-you-go: Billed monthly in arrears for all usage.
- Flex Consumption Program (FCP): Newly added services appear in your monthly usage report. At your annual adjustment, if the total cumulative usage of all services used in the prior 12 months exceeds your annual commitment amount, there will be a True Up / True Forward payment.
How do I remove services from my subscription?
For term subscriptions, you have subscribed to a service for an agreed time. If you have concerns about your usage of existing services in your subscription, discuss these with your account team.
For Pay-as-you-go and FCP models, you are billed on what you consume. If you want to stop using a service, stop using it.
When will these changes be reflected in my bill?
- Term Subscription: You will receive regular reports of your consumption, and your account team will review these reports with you on a quarterly basis. If there is excess usage, work with your channel partner to submit a one-time order for the excess usage. You also have the option to amend your subscription to increase your entitlement amount for the remainder of your subscription term.
- FCP: You will get regular consumption reports showing your consumption toward your annual commitment amount. If you have consumed over your annual commitment, work with your channel partner to submit a True Up / True Forward payment covering your excess consumption at your agreement anniversary.
- Pay-as-you-go: You will receive a monthly bill for what you consumed in the previous month.
If I have F5 BIG-IP or NGINX subscriptions in addition to Distributed Cloud Services, will I receive a separate bill for each set of products?
If the products are on the same subscription, you will receive one bill. If the products are on separate subscriptions, you will receive one bill per subscription.
Understanding F5 SaaS Metering
What are the primary metered units on Distributed Cloud Services?
For most products, requests are the primary metering unit. A request is any single inbound transaction evaluated by a given security capability. It is counted once as it passes through the configured application delivery and security services.
Requests are pooled across services. If you have multiple services configured, the request is counted only once. For example, if you have Web Application Firewall (WAF), API Protection, and Rate Limiting configured, a request that passes through all of these is counted as a single request against your pool.
Customers on the Essentials package purchase Essentials requests, while Enterprise customers purchase Enterprise requests. Enterprise requests grant access to a wider range of services to provide enhanced protection for applications.
What services are aligned to different metered units?
Services that count requests:
- Web App Firewall
- API Protection
- L7 DDoS
- Malicious User Detection
- Threat Campaigns
- Rate Limiting
- IP Reputation
- Geo Filtering
- IP Filtering
- ASN Filtering
- TLS FP Filtering
- HTTP Filtering
- Detection Control
- CDN
What are the additional metered units for Distributed Cloud Services?
| Unit | Description | Limit per SKU |
|---|---|---|
| Applications (Web App Scanning) | An application is a deployed instance hosted on a web server, available through a defined entry URL. Different URLs are counted as different applications. | 1 application |
| Bot Defense transactions | Bot Defense is available as an add-on for endpoint protection. A Bot Defense transaction is any request that comes to the Bot Defense service. This includes requests from endpoints configured to be protected using Bot Defense, and the requests for Bot Defense JavaScript as configured by the user. Transaction counts are measured as a daily average over a month and are sold in 500K per day blocks, with tiered pricing available. | 500K transactions per day |
| Client-Side Defense transactions | Client-Side Defense transactions refer to distinct page views of an authorized website with Client-Side Defense JavaScript. This number is generally lower than the total page views on those pages. | 1M transactions |
| Data transfer | Data transfer is the volume of data passing from a Customer Edge (CE) node to a Regional Edge node on the F5 Global Network per month. | 1 TB |
| CDN data transfer | CDN data transfer is the volume of data passing from the CDN to an end user over the F5 Global Network per month. Each region has a different SKU associated with it. | 1 TB |
| DDoS rules | DDoS rules are automated policies that detect and mitigate distributed traffic floods. These rules include Fast ACLs, which are high-performance allow/deny IP and request-filter lists enforced at the network/edge to quickly block unwanted traffic. | 100 prefixes |
| DNS load balancers | DNS load balancers are globally distributed load balancers (GSLB) that distribute user requests across servers or data centers in multiple geographic regions to optimize performance, reduce latency, and ensure availability. | 10 DNSLBs (Essentials), 20 DNSLBs (Enterprise) |
| DNS zones | A DNS zone is a distinct division of a domain namespace managed by an entity such as an organization. You can exercise granular control on components such as name servers that hold the DNS records for the domain namespace represented by the zone. | 10 zones (Essentials), 20 zones (Enterprise) |
| HTTP load balancers | A load balancer distributes user requests across servers or data centers in multiple geographic regions to optimize performance, reduce latency, and ensure availability. App Rules are built into each load balancer. Essentials customers can have up to 100 rules per load balancer. Enterprise customers can have up to 1,000 rules per load balancer. | 1 load balancer |
| Logs | Logs, metrics, alerts, and events are automatically generated and are used for troubleshooting. Each request directly translates into a line of logs. | 1M lines of logs |
| Malware Protection transactions | Malware Protection protects web apps and APIs from malicious file uploads by scanning files in real time. Each scan is a single transaction. | 1M transactions |
| Synthetic Monitoring executions | An execution is one instance of one monitor endpoint operating from one region. If you have one HTTP monitor operating in three regions every five minutes, you have three executions occurring every five minutes. | 500K executions |
| Nodes | Customer Edge (CE) nodes extend Distributed Cloud Services into customer environments, enabling local service deployment and hybrid multicloud networking. Recommended size depends on your performance and scaling needs. | 1 node |
| Public application (non-HTTP) traffic | Public application traffic addresses throughput of non-HTTP applications. Any non-HTTP application protocols (including TCP, UDP, MQTT, and QUIC) are metered by maximum throughput. | 1 Mbps of throughput, tiered |
| Virtual IPs (VIPs) | A VIP (virtual IP) is the front-end listener address (IP/hostname and port) that clients connect to, which then routes traffic through F5 Distributed Cloud Services load balancer to the configured origins. | 1 VIP |
What about DDoS requests? Are those counted as part of the request pool?
No. Routed DDoS requests that get blocked do not count against your pool of requests.
What is an Application Rule?
Rules can be:
- Routes
- Service policy rules
- CDN cache rules
- Rate limiting policies
- CORS policy
- Trusted client rules
- Client blocking rules
Rules are only counted when in use. If a rule is deployed as part of a shared service policy to multiple load balancers, the rule is counted for every load balancer it is applied to. If IP lists or IP sets are present in a rule, each IP match is counted as a unique rule. L3 policies (for example, Fast ACLs) are not counted as Application Rules.
What is an execution for Distributed Cloud Synthetic Monitoring?
An execution is one instance of one monitor endpoint operating from one region. If you have one HTTP monitor operating in three regions every five minutes, you have three executions occurring every five minutes.
What is an application for Distributed Cloud Web App Scanning?
An application is a deployed instance hosted on a web server, available through a defined entry URL. Different URLs are counted as different applications.
How many scans can be done per application per month for Distributed Cloud Web App Scanning?
There are no limits to the number of scans you can conduct per month on those applications.
What is a transaction for Distributed Cloud Client-Side Defense?
Client-Side Defense transactions refer to distinct page views of an authorized website with Client-Side Defense JavaScript. This number is generally lower than the total page views on those pages.
What is a transaction for Distributed Cloud Bot Defense?
A transaction is any request that comes to the Bot Defense service. This includes requests from endpoints configured to be protected using Bot Defense, and requests for Bot Defense JavaScript as configured by the user.
How are Distributed Cloud Bot Defense transactions metered?
Transaction counts are measured as a daily average over a month and are sold in 500K per day blocks, with tiered pricing available.
What is a transaction for Distributed Cloud Data Intelligence?
For Data Intelligence Basic, a transaction is defined as an API call made to a Device ID backend to fetch device identifiers. You can include Data Intelligence on all web pages, or just specific pages.
For Data Intelligence for Bot Defense, a transaction is defined as a call made to an endpoint protected by Bot Defense, which can include Login, Forgot Password, Payment, Address Change, and Create Account.
How are Distributed Cloud Customer Edge nodes, Distributed Cloud App Stack combo-nodes, and App Stack containers metered?
Customer Edge (CE) nodes, App Stack combo-nodes, and containers are metered by node hour. Node hours are based on the size and the hours the node is running. Size is typically determined by the hardware or virtual machine size. On public cloud providers, size is selected during CE provisioning.
How is Distributed Cloud CDN metered?
CDN offers regional pricing for four distinct regions: North America, South America, Europe, and Asia, and requires a data transfer SKU for each region CDN will operate in. To estimate your total volume of traffic to cover with the data transfer SKUs, multiply the number of requests by the average size of those requests. CDN requests come from the same shared pool as other services.
What are some examples of how to calculate data transfer and request volume for Distributed Cloud CDN?
Using CDN for web applications to enhance performance: In general, take the total data transfer amount and divide by 50 KB to determine the number of requests.
A typical website setup would need 16 TB of data transfer. Using 50 KB as the average request size, 16 TB supports 320 million requests spread across the regions that the website operates within.
Using CDN to support video traffic, including Video on Demand (VOD) and live video: In general, take the total data transfer amount and divide by 500 KB to determine the number of requests.
A typical setup for video traffic uses 1 PB of data transfer. Using 500 KB as the average request size, 1 PB of data transfer supports two billion requests.
Understanding Load Balancers
What are load balancers?
F5 Distributed Cloud Services load balancers are cloud-managed, globally distributed load balancing functions that route application traffic across origins (apps, clusters, or sites) based on availability, health checks, and traffic policies. They can provide L4/L7 traffic management features such as TLS termination, routing, persistence, and integration with web application and API protection (WAAP) security controls at the edge or in customer environments. They are delivered through a SaaS-based control plane with data planes running on F5 global points of presence (PoPs) and Customer Edge (CE) nodes to balance and protect hybrid multicloud applications.
What do load balancers do?
Load balancers distribute incoming application traffic across one or more backends (origins) to improve availability, performance, and resiliency. They continuously health-check origins and apply traffic policies (for example, routing, TLS handling, failover, and session behavior) to send requests to the best available destination. They can also help protect applications by enforcing security controls such as DDoS mitigation and web application/API protections at the edge or in customer environments.
What use cases can load balancers apply to?
Load balancers are used to:
- Provide highly available, resilient delivery of apps and APIs by distributing traffic across multiple origins and enabling health-check-based failover.
- Support hybrid multi-cloud application deployments by steering users to the closest or best-performing backend and simplifying traffic management across regions and providers.
- Improve security and operational control by centralizing L7 policies (TLS, routing, access controls) and integrating DDoS and WAAP protections in front of applications.
Understanding public and private load balancers
Public load balancers expose a publicly reachable VIP or endpoint (typically on the internet) to accept external client traffic and route it to one or more origins. Any internet-facing application needs a public load balancer.
Private load balancers expose an internal-only VIP or endpoint reachable only from private networks (for example, through VPC/VNet, VPN, or direct connect) for east-west or internal application access.
There are no limits to the number of private load balancers an F5 Distributed Cloud Services customer can deploy.
What are the limitations of load balancers?
Public load balancers are limited by internet exposure and origin reachability: the VIP is publicly accessible and origins typically must be reachable from the public edge (or through approved tunnels and connectivity), which can increase security and compliance constraints.
Private load balancers are limited by network scope: the VIP is only reachable from connected private networks, so access requires VPN, Direct Connect, or interconnect and won't serve general internet clients without an additional public entry point.
In practice, public load balancers prioritize external accessibility but demand tighter protection and egress controls, while private load balancers reduce exposure but add dependency on private routing, DNS, and enterprise connectivity.
How am I billed for a load balancer? Is it when traffic passes through them, or just when they're deployed?
- Term Subscription: You are charged for public load balancers each month based on your purchase volume. You can add or remove public load balancers in conversation with your account team.
- FCP-B: You are charged for any public load balancers that you deploy and configure. Once they start passing traffic, they draw from your requests pool.
What additional capabilities are available on F5 SaaS Enterprise load balancers?
Enterprise load balancers can support MQTT, QUIC, MCP, and database protocols in addition to HTTP, TCP, and UDP. They also support a one-second DNS refresh rate on CEs, 15-second health check intervals, and improved traffic insights (for example, time-series anomaly detection, top talkers, and flow analysis).
F5 SaaS Essentials Package
What services are included in F5 SaaS Essentials package?
| Service | Description |
|---|---|
| Web App Firewall | Protects web applications from common attacks (for example, OWASP Top 10) using L7 inspection and enforcement policies. |
| Service Policies | Apply traffic governance rules (allow/deny, routing actions, security checks) to control how requests are handled. |
| Rate Limiting | Limits request volume by client and app attributes to prevent abuse and protect backend capacity. |
| Threat Campaigns | Provides curated, continuously updated protections for active and exploited vulnerabilities and attack waves. |
| L7 DDoS | Detects and mitigates high-volume or application-layer DDoS attacks targeting HTTP(S) services. |
| Threat Mesh | Shares and correlates threat signals across protected apps and sites to improve detection and coordinated enforcement. |
| Fast ACLs | Enforces high-performance allow/deny lists (for example, IP/CIDR) at the edge to quickly block unwanted traffic. |
| Signature-based Bot Protection | Identifies and blocks known bad bots using signatures, reputation, and behavioral indicators. |
| Standard DNS Zones | Hosts and serves authoritative DNS records with standard management and resolution capabilities. |
| Secure DNS Zones | Adds DNS security controls (for example, access control and anti-abuse protections) to authoritative DNS zones. |
| Standard GSLB with 60s health check timers | Distributes traffic across sites using DNS-based load balancing with health checks at 60-second intervals. |
| Advanced GSLB with sub-60s health check timers | Performs DNS-based global load balancing with faster-than-60-second health checks for quicker failover. |
| Content Caching | Caches content at edge locations to reduce origin load and improve latency for repeat requests. |
| Support for Customer Edge nodes | Extends the data plane to customer environments to enforce policies and route traffic close to private apps. |
| TCP and UDP protocol support | Load balances and proxies non-HTTP services over TCP/UDP in addition to HTTP(S). |
| API protection rules | Applies API-focused security controls (for example, method/path enforcement and attack detection) to API traffic. |
| API rate limiting | Throttles API calls per key, client, or endpoint to protect APIs from spikes and abusive usage. |
| JWT validation | Validates JSON Web Tokens (JWTs) including signature and claims to authenticate and authorize requests before they reach the API. |
| API schema upload | Imports an API specification (for example, OpenAPI) to drive validation, discovery, and policy enforcement. |
| API endpoint and groups management | Organizes and manages API endpoints into logical groups for consistent policy and reporting. |
| AI Assistant | Provides guided help to create, troubleshoot, and optimize configurations using natural language. |
| Audit and request log observability | Captures admin and audit actions and request logs to support troubleshooting, forensics, and compliance. |
| Global Log Receiver | Streams logs to an external destination or SIEM for centralized retention and analysis. |
| Alert and notification policy rules | Defines conditions and routing for operational and security alerts and notifications. |
| Fast ACLs on Regional Edge | Applies fast allow/deny filtering at regional edge sites for low-latency enforcement. |
| Reports | Generates summarized views of traffic, security activity, and operational posture over time. |
| Dashboards | Provides real-time and historical visualizations of key traffic, performance, and security metrics. |
What are the per-month usage limits included in F5 SaaS Essentials package?
| Item | Description | Limit |
|---|---|---|
| Tenant VIP | A virtual IP (VIP) is the front-end listener address (IP/hostname and port) that clients connect to, which then routes traffic through F5 Distributed Cloud Services load balancer to the configured origins. | 1 |
| Public/Distributed load balancer | A public load balancer distributes external user requests across servers or data centers in multiple geographic regions to optimize performance, reduce latency, and ensure availability. Public = Public VIP + public origin. Distributed = Public/Private VIP + private origin across different sites. | 1 |
| App Rules | An Application Rule is any configuration on a load balancer that matches traffic parameters and takes any application delivery action. | 100 |
| Synthetic Monitoring executions | An execution is one instance of one monitor endpoint operating from one region. If you have one HTTP monitor operating in three regions every five minutes, you have three executions occurring every five minutes. | 500K |
| CDN data transfer | CDN data transfer is the volume of data passing from the CDN to an end user over the F5 Global Network per month. CDN data transfer is aggregated across regions, so you can adjust the distribution of traffic. | 5 TB |
| Standard/Secure DNS zones | A DNS zone is a distinct division of a domain namespace managed by an entity such as an organization. You can exercise granular control on components such as name servers that hold the DNS records for the domain namespace represented by the zone. | 5 |
| DNS load balancers (GSLBs) | DNS load balancers are globally distributed load balancers (GSLB) that distribute user requests across servers or data centers in multiple geographic regions to optimize performance, reduce latency, and ensure availability. | 5 |
| Web App Scanning applications | An application is a deployed instance hosted on a web server, available through a defined entry URL. Different URLs are counted as different applications. | 3 |
| DDoS mitigation rules | DDoS rules are automated policies that detect and mitigate distributed traffic floods. These rules include Fast ACLs, which are high-performance allow/deny IP and request-filter lists enforced at the network/edge to quickly block unwanted traffic. | 100 |
| Requests | Requests are any single inbound transaction evaluated by a given security capability, counted once as it passes through the configured application delivery and security services. | 30M |
| Logs | Logs, metrics, alerts, and events are automatically generated and are used for troubleshooting. Each request directly translates into a line of logs. | 1M |
How do I increase my usage limits?
Each item has an associated SKU that allows you to increase your usage limits. F5 will not cut off usage if you exceed your usage limits. If you do exceed your usage limits, the following will happen depending on your subscription type:
- Term Subscription: Your account team will contact you in the quarter in which you started a new service to review the additional costs. Work with your partner and account team to add and co-term the services to your subscription.
- Pay-as-you-go: Billed monthly in arrears for all usage.
- Flex Consumption Program (FCP): Newly added services appear in your monthly usage report. At your annual adjustment, if the total cumulative usage of all services used in the prior 12 months exceeds your annual commitment amount, there will be a True Up / True Forward payment.
What services are available as add-ons to F5 SaaS Essentials package?
| Item | Sold by |
|---|---|
| Non-HTTP throughput (TCP and UDP only) | Per Mbps |
| Customer Edge nodes | Per node |
| Traffic to Global Network | Per TB |
Can I create another tenant and use different packages?
No. Each customer is tied to a package. If you want to move from the Essentials package to the Enterprise package, contact your account team.
F5 SaaS Enterprise Package
What services are included in F5 SaaS Enterprise package?
In addition to the capabilities in the Essentials package, the following services are included with the Enterprise package:
| Service | Description |
|---|---|
| Malicious User Detection and Mitigation | Detects suspicious or abusive user behavior (for example, credential stuffing, scraping, and fraud patterns) and mitigates it with enforcement actions such as blocking, challenging, or throttling. |
| Malware Protection | Identifies and helps block malware-related activity (for example, known malicious payloads or command-and-control indicators) to prevent compromise and spread. |
| Risk-based Actions | Dynamically changes enforcement (allow, challenge, step-up auth, rate limit, block) based on calculated risk signals from the request, user, and device. |
| Client-Side Defense | Detects and mitigates malicious JavaScript, formjacking, and supply-chain script abuse running in the browser on your application pages. |
| Enterprise API Discovery | Continuously discovers and inventories APIs across your environment from traffic and configuration signals to expose unknown or unmanaged endpoints. |
| API Schema Validation | Validates API requests and responses against an uploaded schema (for example, OpenAPI) to enforce allowed methods, paths, parameters, and payload formats. |
| Sensitive Data Detection | Detects exposure of sensitive data (for example, PII, secrets, and tokens) in API payloads and logs and flags or enforces controls to reduce leakage. |
| Compliance Reporting | Produces audit-ready reports mapping security controls and activity to common compliance requirements and evidence needs. |
| API Threat Surface Detection | Identifies publicly exposed, vulnerable, or misconfigured API endpoints to reduce attack surface and prioritize remediation. |
| Code-based API Discovery | Discovers APIs by analyzing application code and repositories to find routes, parameters, and dependencies beyond what is seen in runtime traffic. |
| API Testing | Exercises APIs with automated tests to validate behavior and uncover security issues such as auth gaps, injection, and schema violations. |
| Aggressive origin health check intervals | Origin health checks are automated probes sent to backend origins at set intervals to verify they are reachable and responding correctly, so the load balancer routes traffic only to healthy endpoints. Checks can be performed every 15 seconds. |
| Rich traffic insights | Get more granular insights into application traffic with time-series anomaly detection, top talkers, and flow analysis diagrams. |
What are the per-month usage limits included in F5 SaaS Enterprise package? How are they different from the Essentials package?
Note: Items marked with an asterisk (*) are new or changed from the Essentials package.
| Item | Description | Limit |
|---|---|---|
| Tenant VIP | A virtual IP (VIP) is the front-end listener address (IP/hostname and port) that clients connect to, which then routes traffic through F5 Distributed Cloud Services load balancer to the configured origins. | 1 |
| Public/Distributed load balancer | A public load balancer distributes external user requests across servers or data centers in multiple geographic regions to optimize performance, reduce latency, and ensure availability. Public = Public VIP + public origin. Distributed = Public/Private VIP + private origin across different sites. | 4* |
| App Rules | An Application Rule is any configuration on a load balancer that matches traffic parameters and takes any application delivery action. | 1,000* |
| Synthetic Monitoring executions | An execution is one instance of one monitor endpoint operating from one region. If you have one HTTP monitor operating in three regions every five minutes, you have three executions occurring every five minutes. | 500K |
| CDN data transfer | CDN data transfer is the volume of data passing from the CDN to an end user over the F5 Global Network per month. CDN data transfer is aggregated across regions, so you can adjust the distribution of traffic. | 15 TB* |
| Standard/Secure DNS zones | A DNS zone is a distinct division of a domain namespace managed by an entity such as an organization. You can exercise granular control on components such as name servers that hold the DNS records for the domain namespace represented by the zone. | 10* |
| DNS load balancers (GSLBs) | DNS load balancers are globally distributed load balancers (GSLB) that distribute user requests across servers or data centers in multiple geographic regions to optimize performance, reduce latency, and ensure availability. | 10* |
| Web App Scanning applications | An application is a deployed instance hosted on a web server, available through a defined entry URL. Different URLs are counted as different applications. | 3 |
| DDoS mitigation rules | DDoS rules are automated policies that detect and mitigate distributed traffic floods. These rules include Fast ACLs, which are high-performance allow/deny IP and request-filter lists enforced at the network/edge to quickly block unwanted traffic. | 100 |
| Requests | Requests are any single inbound transaction evaluated by a given security capability, counted once as it passes through the configured application delivery and security services. | 30M |
| Logs | Logs, metrics, alerts, and events are automatically generated and are used for troubleshooting. Each request directly translates into a line of logs. | 50M* |
| Public application non-HTTP traffic | Public application traffic addresses throughput of non-HTTP applications. Any non-HTTP application protocols (including TCP, UDP, MQTT, and QUIC) are metered by maximum throughput. | 20 Mbps* |
| Customer Edge nodes | Customer Edge (CE) nodes extend Distributed Cloud Services into customer environments, enabling local service deployment and hybrid multi-cloud networking. Recommended size depends on your performance and scaling needs. | 3 medium nodes* |
| Data transfer | Data transfer is the volume of data passing from a Customer Edge (CE) node to a Regional Edge node on the F5 Global Network per month. | 1 TB* |
| Client-Side Defense transactions | Client-Side Defense transactions refer to distinct page views of an authorized website with Client-Side Defense JavaScript. This number is generally lower than the total page views on those pages. | 1M* |
| Malware Protection transactions | Malware Protection protects web apps and APIs from malicious file uploads by scanning files in real time. Each scan is a single transaction. | 1M* |
How do I increase my usage limits?
Each item has an associated SKU that allows you to increase your usage limits. F5 will not cut off usage if you exceed your usage limits. If you do exceed your usage limits, the following will happen depending on your subscription type:
- Term Subscription: Your account team will contact you in the quarter in which you started a new service to review the additional costs. Work with your partner and account team to add and co-term the services to your subscription.
- Pay-as-you-go: Billed monthly in arrears for all usage.
- Flex Consumption Program (FCP): Newly added services appear in your monthly usage report. At your annual adjustment, if the total cumulative usage of all services used in the prior 12 months exceeds your annual commitment amount, there will be a True Up / True Forward payment.
Can I downgrade from the Enterprise package to the Essentials package?
Yes, you can downgrade from the Enterprise package to the Essentials package, but you will lose access to specific features that are only available on the Enterprise package.
Understanding Additional Application Security Services
Additional Application Security services are not included in either F5 SaaS Essentials or Enterprise packages.
What additional Application Security services are metered?
| Product | Description |
|---|---|
| Bring Your Own Virtual IP | You may use your own virtual IP addresses for applications connected to your Distributed Cloud tenant. |
| Bot Defense Web | Defend against malicious bots that take over accounts, damage brand reputation, slow performance, and cause financial harm. Learn the value of rich client-side signals in the mitigation of bots for web applications. |
| Bot Defense Mobile | Defend against malicious bots that take over accounts, damage brand reputation, slow performance, and cause financial harm. Learn the value of rich client-side signals in the mitigation of bots for mobile applications. |
| Bot Defense Additional Transactions | Get additional transactions based on the projected number of interactions between a client and a server to determine if the request is coming from a person or a bot. |
| Bot Defense Additional Region | Add a new Bot Defense server to another region or infrastructure deployment in your environment, after the first two are allocated. |
| Bot Defense Content Scraping Protection | Content Scraping Protection prevents bots from scraping web application content and degrading web app performance. This enables Content Scraping Protection (CSP) for all Bot Defense engines in your tenant. |
| Mobile SDK Integrator | Use Mobile SDK Integrator to insert the Bot Defense Mobile SDK into CI/CD pipelines for mobile apps without making any code changes. |
| Mobile App Shield | Mobile App Shield thwarts attackers that try to debug mobile apps or run them on rooted devices looking for vulnerabilities. This runtime security prevents data loss that results from attacks on apps running on mobile devices. |
| Routed DDoS - Always Available | Routed DDoS detects and mitigates large-scale, volumetric network-targeted attacks in real time. The Always Available version is pre-configured for your systems, runs on standby, and can be initiated when under attack. Each tunnel carries filtered traffic to your network. |
| Routed DDoS - Always Available Clean Bandwidth | When enabled, Routed DDoS redirects customer traffic to the F5 Global Network to ensure app availability. This determines peak bandwidth usage for clean traffic. |
| Routed DDoS - Always On | Routed DDoS detects and mitigates large-scale, volumetric network-targeted attacks in real time. The Always On version is configured to continuously route and process your traffic on F5 Distributed Cloud Services, allowing only legitimate traffic to reach your apps. Each tunnel carries filtered traffic to your network. |
| Routed DDoS - Always On Clean Bandwidth | When enabled, Routed DDoS redirects customer traffic to the F5 Global Network to ensure app availability. This determines peak bandwidth usage for clean traffic. |
| DDoS Mitigation Tunnel | Additional GRE tunnels help route clean traffic to specific clouds or data centers. |
| DDoS Mitigation Router Monitoring | If additional router monitors are needed for an Always Available subscription, add more routers to help ensure F5 SOCs are alerted to respond to threats. |
| Data Intelligence Basic | Data Intelligence provides intelligence on user behavior, network characteristics, and device characteristics that is useful for detecting malicious traffic using Device IDs. |
| Data Intelligence Basic for Bot Defense | Add Data Intelligence Device ID analysis capabilities to Bot Defense. |
| Data Intelligence Advanced for Bot Defense | Add advanced Data Intelligence features like behavioral, device feature, and Device ID analysis capabilities to Bot Defense. |
| Data Intelligence Premium for Bot Defense | Add premium Data Intelligence features and managed services to Bot Defense, including anomaly detection and aggregated features analysis. |
How are these additional Application Security services metered?
| Product | Limit | Metering unit |
|---|---|---|
| Bring Your Own Virtual IP | 1 /24 subnet, or 256 IP addresses (254 usable) per month | Per /24 subnet (customer owned) |
| Bot Defense Web | 2 regions, plus 1 test region, and 500K transactions per month | Per application |
| Bot Defense Mobile | 2 regions, plus 1 test region, and 500K transactions per month | Per application |
| Bot Defense Additional Transactions | 500K additional transactions per day, per month | Per 500K transactions per day, per month |
| Bot Defense Additional Region | 1 additional region per month | Per region |
| Bot Defense Content Scraping Protection | N/A | N/A - on or off |
| Mobile SDK Integrator | 1 application per month | Per application |
| Mobile App Shield | 1 application with 25K users per month | Per application per 25K users |
| Routed DDoS - Always Available | 2 GRE tunnels, 1 router monitor per month | N/A - on or off |
| Routed DDoS - Always Available Clean Bandwidth | N/A - depends on bandwidth requirements | Per Mb of bandwidth - based on peak utilization |
| Routed DDoS - Always On | 2 GRE tunnels per month | N/A - on or off |
| Routed DDoS - Always On Clean Bandwidth | N/A - depends on bandwidth requirements | Per Mb of bandwidth - based on peak utilization |
| DDoS Mitigation Tunnel | 1 additional GRE tunnel per month | Per tunnel |
| DDoS Mitigation Router Monitoring | 1 router monitor | Per router |
| Data Intelligence Basic | 500K transactions per day, per month | Per 500K transactions per day, per month |
| Data Intelligence Basic for Bot Defense | 500K transactions per day, per month | Per 500K transactions per day, per month |
| Data Intelligence Advanced for Bot Defense | 500K transactions per day, per month | Per 500K transactions per day, per month |
| Data Intelligence Premium for Bot Defense | 500K transactions per day, per month | Per 500K transactions per day, per month |
Understanding Additional Application Delivery Services
What additional Application Delivery services are metered?
| Product | Description |
|---|---|
| CE Node - Medium | CE nodes extend Distributed Cloud Services into customer environments, enabling local service deployment and hybrid multicloud networking. Recommended size depends on your performance and scaling needs. |
| CE Node - Large | CE nodes extend Distributed Cloud Services into customer environments, enabling local service deployment and hybrid multicloud networking. Recommended size depends on your performance and scaling needs. |
| Application Firewall | A web application firewall (WAF) monitors, filters, and blocks malicious HTTP/HTTPS traffic to protect web applications from threats like cross-site scripting (XSS), SQL injection, and other vulnerabilities. |
| App Stack Combo Node - Medium | App Stack nodes extend Distributed Cloud Services into customer environments, enabling local service deployment and hybrid multicloud networking, as well as application hosting on the CE. Recommended size depends on number of applications to host and their performance needs. |
| App Stack Combo Node - Large | App Stack nodes extend Distributed Cloud Services into customer environments, enabling local service deployment and hybrid multicloud networking, as well as application hosting on the CE. Recommended size depends on number of applications to host and their performance needs. |
| App Stack Combo Node - 80vCPU | App Stack nodes extend Distributed Cloud Services into customer environments, enabling local service deployment and hybrid multicloud networking, as well as application hosting on the CE. Recommended size depends on number of applications to host and their performance needs. |
| App Stack Tiny Container | App Stack containers can be used to deploy your applications on the F5 Global Network. The size of the container varies depending on application requirements and throughput. |
| App Stack Medium Container | App Stack containers can be used to deploy your applications on the F5 Global Network. The size of the container varies depending on application requirements and throughput. |
| App Stack Large Container | App Stack containers can be used to deploy your applications on the F5 Global Network. The size of the container varies depending on application requirements and throughput. |
| App Stack Container-to-Container Traffic | Bandwidth for any traffic passed between App Stack containers. |
| App Stack Container-to-Internet Traffic | Bandwidth for any traffic passed from App Stack containers to the public internet. |
| CDN Transfer to Internet - North America | A content delivery network (CDN) is a globally distributed network of servers designed to deliver web content, such as images, videos, and scripts, to users with high speed and low latency by caching and serving data from the nearest geographic location. Depending on which region content needs to be delivered to, this covers volume of traffic required for delivering content to the public internet. |
| CDN Transfer to Internet - Europe | A content delivery network (CDN) is a globally distributed network of servers designed to deliver web content, such as images, videos, and scripts, to users with high speed and low latency by caching and serving data from the nearest geographic location. Depending on which region content needs to be delivered to, this covers volume of traffic required for delivering content to the public internet. |
| CDN Transfer to Internet - Asia | A content delivery network (CDN) is a globally distributed network of servers designed to deliver web content, such as images, videos, and scripts, to users with high speed and low latency by caching and serving data from the nearest geographic location. Depending on which region content needs to be delivered to, this covers volume of traffic required for delivering content to the public internet. |
| CDN Transfer to Internet - South America | A content delivery network (CDN) is a globally distributed network of servers designed to deliver web content, such as images, videos, and scripts, to users with high speed and low latency by caching and serving data from the nearest geographic location. Depending on which region content needs to be delivered to, this covers volume of traffic required for delivering content to the public internet. |
How are these additional Application Delivery services metered?
| Product | Limit | Metering unit |
|---|---|---|
| CE Node - Medium | 1 medium node per month | Per node hour |
| CE Node - Large | 1 large node per month | Per node hour |
| Application Firewall | 1 App Firewall per month | Per node |
| App Stack Combo Node - Medium | 1 medium node per month | Per node hour |
| App Stack Combo Node - Large | 1 large node per month | Per node hour |
| App Stack Combo Node - 80vCPU | 1 80vCPU node per month | Per node hour |
| App Stack Tiny Container | 1 tiny container per month | Per container hour |
| App Stack Medium Container | 1 medium container per month | Per container hour |
| App Stack Large Container | 1 large container per month | Per container hour |
| App Stack Container-to-Container Traffic | 1 TB traffic per month | Per TB |
| App Stack Container-to-Internet Traffic | 1 TB traffic per month | Per TB |
| CDN Transfer to Internet - North America | 1 TB data transfer per month | Per TB |
| CDN Transfer to Internet - Europe | 1 TB data transfer per month | Per TB |
| CDN Transfer to Internet - Asia | 1 TB data transfer per month | Per TB |
| CDN Transfer to Internet - South America | 1 TB data transfer per month | Per TB |