Thunder TPS: Next-Generation Ddos Protection

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Datasheet

THUNDER TPS
Next-generation DDoS Protection

Supported Platforms_____________ A10 Networks® Thunder TPS™ line of Threat Protection Systems provides agile and
efficient, network-wide protection against the full spectrum of distributed denial
of service (DDoS) attacks, including the challenging multi-vector attacks, which
use a combination of high rate volumetric or network protocol attacks, and more
Thunder TPS sophisticated application attacks.
physical appliance
The Thunder TPS product line is built upon A10 Networks Advanced Core Operating
System (ACOS®) platform, which delivers high performance and leverages a shared
memory architecture to provide efficient tracking of network flows, as well as accurate
aGalaxy DDoS protection enforcement for service providers, website operators and enterprises.
centralized management
• Full spectrum DDoS protection for service availability: Organizations are
increasingly dependent on the availability of their services, and on their ability to
connect to the Internet. Downtime results in immediate revenue loss. Thunder TPS
APP
provides deep traffic analysis to automatically spot anomalies across the traffic
spectrum, and protects against the full spectrum of attack vectors, including the
vThunder TPS
extra challenging multi-vector attacks which leverage a combination of volumetric,
protocol, and more sophisticated application-layer attacks, trying to take down the
weakest link in your defenses.
Overview_________________________ • High performance and efficiency to meet growing attack scale: There is an
undeniable increasing trend in DDoS attacks in terms of frequency, size and
The Thunder TPS product line is a
complexity. Thunder TPS, powered by ACOS, protects the largest, most demanding
family of high-performance appliances network environments. Performance scaling is maintained by distributing multi-
that detect and mitigate multi-vector vector detection and mitigation functions across optimal system resources.
DDoS attacks at the network edge, With the ability to offload common attack vectors to specialized hardware, the
functioning as a first line of defense multicore, powerful CPU cores can focus on complex application layer attacks,
for your network infrastructure. which requires very resource-intense deep packet inspection (DPI) processing.
Thunder TPS hardware appliances meet the highest demands, while being
Thunder TPS support offerings extremely efficient. The combination of high performance in a small form factor
include access to 24x7x365 support, results in lower OPEX through significant lower power usage, reduced rack space
and lowered cooling requirements.
DSIRT (DDoS Security Incident
• Full control and smart automation for agile protection: To easily integrate in
Response Team) assistance, and the
various networking architectures, a vendor neutral, flexible DDoS mitigation
A10 Threat Intelligence Service.
solution is required. Various network deployment models for in- and out-of-
band operations are available. With a RESTful API, aXAPI®, as well as leveraging
open signaling standards, Thunder TPS enables integration to your custom or
third-party detection solutions. The programmatic policy engine allows for fully
customized policies leveraging regular expressions (regex) and Berkeley Packet
Filter (BPF) pattern matching filters to perform application aware inspection.
Several actions can be tied to a policy rule, such as running a script and/or DDoS
signaling using BGP. This creates a powerful, automated yet flexible environment
to quickly counteract adaptive attack strategies.

1
Architecture and Key Components Out-of-band (TAP) mode
Asymmetric mode

Internet

Internet
Duplicated
Traffic
Thunder TPS
Edge Network

DDoS Traffic

Thunder TPS Data Centers

Clean API For detailed telemetry analysis, define threshold violations, and
Traffic Communication synchronize white/black lists master to in-band Thunder TPS units
Access Network

Features and Benefits


Flow A10 Thunder TPS provides many features to detect and mitigate
Information Inspection
multi-vector DDoS attacks with unprecedented performance
scalability and deployment flexibility.

Full Spectrum DDoS Protection for Service Availability


A10 Thunder TPS is able to detect and mitigate broad level of
Service attacks, even if multiple attacks hit the network simultaneously.
For on-demand, or permanent (proactive) mitigation, triggered • Multi-vector attack protection: Service availability is
manually or by flow analytical systems realized by detecting and mitigating DDoS attacks of
Symmetric (Inline) mode many types, whether they are pure volumetric, protocol or
resource attacks, or even application-level attacks. Hardware
acceleration offloads the CPUs and make Thunder TPS
particularly adept to deal with multi-vector attacks.
Internet
• Smart threat detection and mitigation: The system has
access to a rich set of multi-protocol counters and behavioral
Edge indicators to learn peacetime network conditions, enabling
Router
precise detection of anomalies. Dynamic mitigation policies
escalate suspect traffic through progressively tougher
countermeasures to minimize legitimate traffic drops.

Thunder TPS DevOps can leverage event-triggered scripts for increased


operational agility.
• Granular connection rate protection: Apply highly granular,
Access multi-protocol rate limiting to prevent sudden surges
Router
of illegitimate traffic to overwhelm network and server
resources. It is possible to apply limits per connection,
defined by bandwidth or packet rate.
Service • Hybrid DDoS Protection: Volumetric attacks that exceed
your network’s capacity can be dealt with integrated DDoS
Provides continuous, comprehensive detection and mitigation, with Protection using Thunder TPS on premise and Verisign’s
more application-level attack mitigation options cloud based DDoS Protection Services. The Verisign DDoS
protection service is backed by global points of presence and
multiple Tbps of global capacity.
• A10 Threat Intelligence Service powered by ThreatSTOP: This
service combines and enhances reputation data from over
three dozen security intelligence sources, including DShield and

2
Shadowserver, to enable Thunder TPS to instantly recognize and • Programmatic Policy Engine: Thunder TPS is able to perform
block traffic to and from known malicious sources. application aware inspection on incoming packets and take
A10’s Threat Intelligence Service provides the following benefits: defined actions to protect the application. For example, the
-- Protects networks from future threats system can enforce limits on various DNS query types, or
apply security checks in many portions of the HTTP header.
-- Blocks non-DDoS related threats such as spam and phishing
The detection and mitigation capabilities are extremely
-- Increases Thunder TPS efficiency
customizable, using regular expression (regex) and Berkeley
With a threat intelligence network that continuously charts
Packet Filter (BPF) for high-speed pattern matching in
potential intruders on the Internet, customers can leverage
policies. DevOps can leverage event-triggered scripts for
global knowledge to block traffic from malicious Internet
increased operational agility.
locations and offload Thunder TPS from identifying known
• Easy network integration: With multiple performance options
bots and attack sources.
and flexible deployment models including MPLS inspection,
High Performance and Efficiency to Meet Growing Thunder TPS can be integrated into any network architecture,
Attack Scale of any size. And, with aXAPI, A10’s RESTful API, Thunder TPS
Over the last few years, DDoS attacks have rapidly proliferated in can easily be integrated into third-party detection solutions.
terms of bandwidth (Gbps) and packets per second (pps). Thunder
Leveraging open standards such as the BGP Blackhole
TPS can leverage high-performance, specialized hardware as well
functionality, Thunder TPS mitigation integrates easily with
as the latest, most powerful Intel Xeon CPUs to mitigate the largest
any DDoS detection solutions. Open APIs and networking
and most sophisticated attacks. A10’s Advanced Core Operating
standards support enables tight integration with many other
System (ACOS) platform enables efficient use of the specialized
devices, including SDN controllers and security products.
system resources.
• Centralized Management: For larger deployments, our
• High performance protection: With mitigation throughput optional aGalaxy centralized management system ensures
capacity ranging from 1 to 300 Gbps (or 2.4 Tbps in a list routine tasks can be performed at scale, across multiple
synchronization cluster) ensures that the largest, multi-vector appliances, regardless of physical location.
DDoS attacks can be dealt with effectively. Select Thunder
TPS models are equipped with high-performance FPGA-based Product Description
FTA technology to detect and mitigate up to 60 common The Thunder TPS product line is a family of high-performance
attack vectors immediately, before the data CPUs are involved. appliances that detect and mitigate multi-vector DDoS attacks at
SYN cookies can be generated to validate client connection the network edge, functioning as a first line of defense for a network
requests, at a rate of up to 440 Mpps. The Security and infrastructure.
Policy Engine (SPE) hardware enforces highly granular traffic Thunder TPS Hardware Appliances: The Thunder TPS line of
rates; as fine as 100 ms interval. SSL security processors are hardware appliances protects large networks with entry-level
leveraged for detecting and mitigating SSL-based attacks, such models starting at 2 Gbps and moving up to a 300 Gbps high-
as the POODLE vulnerability. More complex application-layer performance appliance for your most demanding requirements. All
(L7) attacks (HTTP, DNS, etc.) are processed by the Intel Xeon models feature redundant power supplies*, solid-state drives (SSDs),
CPUs, so that high-performance system scaling is maintained and have no inaccessible moving parts for high availability. Select
even for multi-vector attacks. Network connectivity is provided models benefit from our Security and Policy Engine (SPE) hardware
acceleration, leveraging FPGA-based FTA technology among other
with 1, 10, 40 and 100 GbE interfaces.
hardware optimized packet processing to provide highly scalable
• Large threat intelligence class lists: Eight individual lists,
flow distribution and hardware DDoS protection capabilities.
each containing up to 16 million list entries, can be defined. Switching and routing processors provide high-performance network
This allows a user to utilize data from intelligence sources processing. Each appliance offers the best performance per rack
such as the A10 Threat Intelligence Service, in addition to the unit, and “80 PLUS™ Platinum” certification* for power supplies to
dynamically generated entries of black/white lists. ensure a green solution and reduce power consumption costs. High
• Simultaneous protected objects: To protect entire networks density with 1, 10, 40 and 100 GbE port options are available to
with many connected users and services, the Thunder TPS is meet the highest networking bandwidth demands.
able to simultaneously monitor 64,000 hosts or subnets. vThunder Virtual Appliances: The vThunder line of virtual
Full Control and Smart Automation for Agile Protection appliances is designed to meet the growing needs of organizations
that require a flexible and easy-to-deploy DDoS Protection solution
For network operators, it is critical that a DDoS mitigation solution
running within a virtualized infrastructure. Each vThunder instance
can easily be inserted into the existing network architecture, so
has the full set of DDoS protection features that can run atop your
that the network remains prepared for imminent DDoS threats.
choice of commodity hardware and also your choice of leading
hypervisor, for example, VMware ESXi and Microsoft Hyper-V.

* Except Thunder 840 TPS

3
Thunder TPS Hardware Appliance Specifications Table
Thunder Thunder Thunder
Thunder 840 TPS
3030S TPS 4435(S) TPS 5435(S) TPS
Throughput 2 Gbps 10 Gbps 38 Gbps 77 Gbps
TCP SYN Auth/sec *1
1.5 million 6.5 million 35 million 35 million
SYN Cookie/sec *1
1.5 million 6.5 million 55 million 112 million
Network Interface
1 GE Copper 5 6 0 0
1 GE Fiber (SFP) 0 2 0 0
1/10 GE Fiber (SFP+) 2 4 16 16
40 GE Fiber (QSFP+) 0 0 0 4
100 GE Fiber 0 0 0 0
Management Interface Yes Yes Yes Yes
Lights Out Management No Yes Yes Yes
Console Port Yes Yes Yes Yes
Solid-state Drive (SSD) Yes Yes Yes Yes
Intel
Intel Xeon Intel Xeon Intel Xeon
Processor Communication
4-core 10-core 10-core
Processor
Memory (ECC RAM) 8 GB 16 GB 64 GB 64 GB
Hardware Acceleration
64-bit Linear Decoupled Architecture Yes Yes Yes Yes
Flexible Traffic Acceleration Software Software 1 x FTA-3+ FPGA 2 x FTA-3+ FPGA
Switching/Routing Software Software Hardware Hardware
SSL Security Processor ('S' Models) N/A Single Dual Dual
Internal or External
*3|*4
Hardware Bypass External External External
Option
Power Consumption (Typical/Max)*2 57W / 75W 131W / 139W 350W / 420W 400W / 480W
Heat in BTU/hour (Typical/Max) *2
195 / 256 447 / 474 1,195 / 1,433 1,365 / 1,638
Single 150W (AC only) Dual 600W RPS Dual 1100W RPS Dual 1100W RPS
Power Supply (DC option available)
100 - 240 VAC, 50-60Hz 80 Plus Platinum efficiency, 100 - 240 VAC, 50 – 60 Hz
Cooling Fan Single Fixed Fan Hot Swap Smart Fans
1.75 in (H), 1.75 in (H), 1.75 in (H), 1.75 in (H),
Dimensions 17.0 (W), 17.5 in (W), 17.5 in (W), 17.5 in (W),
12 in (D) 17.45 in (D) 30 in (D) 30 in (D)
Rack Units (Mountable) 1U 1U 1U 1U
Unit Weight 8.8 lbs 20.1 lbs 34.5 lbs 35.5 lbs
Operating Ranges Temperature 0° C - 40° C | Humidity 5% - 95%
FCC Class A, UL, CE, FCC Class A, UL, CE, FCC Class A, UL, CE,
FCC Class A, UL, CE,
TUV, CB, VCCI, China TUV, CB, VCCI, China TUV, CB, VCCI, China
Regulatory Certifications TUV, CB, VCCI, China
CCC, BSMI, RCM, MSIP, CCC, MSIP, BSMI, RCM, CCC, BSMI, RCM, EAC,
CCC, BSMI, RCM | RoHS
EAC, FAC | RoHS EAC, NEBS | RoHS NEBS | RoHS
Standard Warranty 90-day Hardware and Software
*1 Packets per second. Performance varies with deployment mode and configuration | *2 With base model. The value may vary with SSL and/or Hardware Bypass options |
*3 Hardware bypass model must be purchased for internal bypass function | *4 Available in Q4 2016 | ^ Certification in process

4
Thunder TPS Hardware Appliance Specifications Table (continued)
Thunder 6435(S) TPS Thunder 6635(S) TPS Thunder 14045 TPS*4
Throughput 155 Gbps 155 Gbps 300 Gbps
TCP SYN Auth/sec *1
70 million 70 million 130 million
SYN Cookie/sec*1 223 million 223 million 440 million
Network Interface
1 GE Copper 0 0 0
1 GE Fiber (SFP) 0 0 0
1/10 GE Fiber (SFP+) 16 12 0
40 GE Fiber (QSFP+) 4 0 4
100 GE Fiber 0 4 (CXP) 4 (CFP2 or QSFP28)
Management Interface Yes Yes Yes
Lights Out Management Yes Yes Yes
Console Port Yes Yes Yes
Solid-state Drive (SSD) Yes Yes Yes
Intel Xeon Intel Xeon Intel Xeon
Processor
Dual 12-core Dual 12-core Quad 18-core
Memory (ECC RAM) 128 GB 128 GB 512 GB
Hardware Acceleration
64-bit Linear Decoupled Architecture Yes Yes Yes
Flexible Traffic Acceleration 4 x FTA-3+ FPGA 4 x FTA-3+ FPGA 8 x FTA-3+ FPGA
Switching/Routing Hardware Hardware Hardware
SSL Security Processor ('S' Models) Quad 2 x Dual, 2 x Quad or 4 x Quad TBD
Power Consumption (Typical/Max) *2
620W / 710W 995W / 1,150W 1,700W / 2,000W
Heat in BTU/hour (Typical/Max)*2 2,116 / 2,423 3,395 / 3,924 5,801 / 6,825
Dual 1100W RPS 2+2 1100W RPS 2+2 1100W RPS
Power Supply (DC option available)
80 Plus Platinum efficiency, 100 - 240 VAC, 50 – 60 Hz
Cooling Fan Hot Swap Smart Fans
1.75 in (H), 5.3 in (H), 5.3 in (H),
Dimensions 17.5 in (W), 16.9 in (W), 16.9 in (W),
30 in (D) 28 in (D) 30 in (D)
Rack Units (Mountable) 1U 3U 3U
Unit Weight 39 lbs 74.5 lbs 102 lbs
Operating Ranges Temperature 0° C - 40° C | Humidity 5% - 95%
FCC Class A, UL, CE, TUV, CB, FCC Class A^, UL^, CE^, TUV^, CB^,
FCC Class A, UL, CE, TUV, CB,
Regulatory Certifications VCCI, China CCC, BSMI, RCM, VCCI^, China CCC^, BSMI^, RCM^
VCCI, EAC, FAC | RoHS
EAC, NEBS | RoHS | RoHS^
Standard Warranty 90-day Hardware and Software
*1 Packets per second. Performance varies with deployment mode and configuration | *2 With base model. The value may vary with SSL and/or Hardware Bypass options |
*3 Hardware bypass model must be purchased for internal bypass function | *4 Available in Q4 2016 | ^ Certification in process

vThunder TPS Specifications


vThunder TPS
Throughput Up to 5 Gbps
VMware vSphere ESXi 5.5 or higher
Supported Hypervisors
Microsoft Hyper-V on Windows Server 2008*1 or higher
Hardware Requirements See installation guide
Availability depends on hypervisor type.
Licenses Lab/Developer Editions: 1 Gbps
Production Editions: 1 Gbps, 2 Gbps and 5 Gbps*2
Standard Warranty 90-day Software
*1 Windows Server 2012 R2 is recommended for higher performance | *2 VMware ESXi only
5
Thunder 840 TPS Thunder 3030S TPS Thunder 4435(S) TPS

Thunder 5435(S) TPS Thunder 6435(S) TPS

Thunder 6635(S) TPS Thunder 14045 TPS (CFP2) Thunder 14045 TPS (QSFP28)

Detailed Feature List* • DNS authentication


(*Features may vary by appliance.) • HTTP challenge
High Performance, Scalable Platform • TCP/UDP/ICMP flood protection
• ACOS Operating System • Application (DNS/HTTP) flood protection
-- Multi-core, multi-CPU support • Amplification attack protection
-- Linear application scaling Protocol Attack Protection
-- Linux on control plane • Invalid packets
• ACOS on data plane • Anomalous TCP flag combinations (no flag, SYN/FIN, SYN
• IPv6 feature parity frag, LAND attack)
• IP options
Networking
• Packet size validation (ping of death)
• Asymmetric, symmetric, out-of-band (TAP)
• POODLE attack
• Transparent (L2), routed (L3)
• Routing: static routes, BGP4+ Resource Attack Protection
• VLAN (802.1Q) • Fragmentation attack
• Trunking (802.1AX), LACP • Slowloris
• Access control lists (ACLs) • Slow GET/POST
• Network Address Translation (NAT) • Long form submission
• MPLS traffic protection • SSL renegotiation

Management Application Attack Protection


• Dedicated management interface (GUI, console, SSH, Telnet) • Application aware filter
• Industry-standard Command Line Interface (CLI) • Regular expression filter (TCP/UDP/HTTP)
• SNMP, syslog, email alerts • HTTP request rate limit
• Port mirroring • DNS request rate limit
• REST-style XML API (aXAPI) or SDK kit • DNS query check
• LDAP, TACACS+, RADIUS support • HTTP protocol compliance
• Configurable control CPUs • HTTP anomalies

Flood Attack Protection Protected Objects


• SYN cookies • Protected zones for automated inspection and mitigation
• SYN authentication • Source/destination IP address/subnet
• ACK authentication • Source and destination IP pair
• Spoof detection • Destination port
• SSL authentication* • Source port

6
Detailed Feature List* (continued)
(*Features may vary by appliance.)

• Protocol (HTTP, DNS, TCP, UDP, ICMP and others) Redirection


• DNS query type • BGP route injection
• URI • IPinIP (source and terminate)
• Class list/geo location • GRE tunnel termination
• Passive mode • NAT
Actions Detection/Analysis
• Capture packet • Manual thresholds
• Run script • Protocol anomaly detection
• Drop • Inspection within IPinIP
• TCP reset • Black/white lists
• Dynamic authentication • IP/port scanning detection
• Add to black list • Traffic indicator and top talkers
• Add to white list • Mitigation console (GUI)
• Log • Packet debugger tool
• Limit concurrent connections A10 Threat Intelligence Service**
• Limit connection rate • Dynamic updated threat intelligence feed, used by class-list
• Limit traffic rate (pps/bps)
Advanced Hardware Highlights
• Forward to other device
• Redundant power supplies (AC or DC)*
• Remote Triggered Black Hole (RTBH)
• Smart fans (hot swap)*
Telemetry
• Solid-state drive (SSD)
• Rich traffic and DDoS statistics counters
• 1GbE, 1/10GbE, 40GbE and 100GbE ports
• sFlow v5
• Tamper detection*
• netFlow (v9, IPFIX)
• Lights Out Management (LOM/IPMI)*
• Custom counter blocks for flow-based export
• Hardware bypass*
• High-speed logging
• CEF logging *Features may vary by appliance
**Additional paid service

About A10 Networks


A10 Networks is a leader in application networking, providing a range of high-performance application networking solutions that help organizations
ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in
San Jose, California, and serves customers globally with offices worldwide. For more information, visit: www.a10networks.com.

Corporate Headquarters Worldwide Offices To learn more about the A10 Thunder Application
Service Gateways and how it can enhance your
A10 Networks, Inc North America Hong Kong
[email protected] business, contact A10 Networks at:
3 West Plumeria Ave. [email protected]
San Jose, CA 95134 USA Taiwan www.a10networks.com/contact or call to talk to an
Europe
Tel: +1 408 325-8668 [email protected] [email protected] A10 sales representative.
Fax: +1 408 325-8666 South America Korea
www.a10networks.com [email protected] [email protected]
Japan South Asia
[email protected] [email protected]
Part Number: A10-DS-15101-EN-11 China Australia/New Zealand
Oct 2016 [email protected] [email protected]

©2016 A10 Networks, Inc. All rights reserved. A10 Networks, the A10 Networks logo, ACOS, Thunder and SSL Insight are
trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries. All other trademarks
are property of their respective owners. A10 Networks assumes no responsibility for any inaccuracies in this document. A10
Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. For the full list of
trademarks, visit: www.a10networks.com/a10-trademarks. 7

You might also like