Thunder TPS: Next-Generation Ddos Protection
Thunder TPS: Next-Generation Ddos Protection
Thunder TPS: Next-Generation Ddos Protection
THUNDER TPS
Next-generation DDoS Protection
Supported Platforms_____________ A10 Networks® Thunder TPS™ line of Threat Protection Systems provides agile and
efficient, network-wide protection against the full spectrum of distributed denial
of service (DDoS) attacks, including the challenging multi-vector attacks, which
use a combination of high rate volumetric or network protocol attacks, and more
Thunder TPS sophisticated application attacks.
physical appliance
The Thunder TPS product line is built upon A10 Networks Advanced Core Operating
System (ACOS®) platform, which delivers high performance and leverages a shared
memory architecture to provide efficient tracking of network flows, as well as accurate
aGalaxy DDoS protection enforcement for service providers, website operators and enterprises.
centralized management
• Full spectrum DDoS protection for service availability: Organizations are
increasingly dependent on the availability of their services, and on their ability to
connect to the Internet. Downtime results in immediate revenue loss. Thunder TPS
APP
provides deep traffic analysis to automatically spot anomalies across the traffic
spectrum, and protects against the full spectrum of attack vectors, including the
vThunder TPS
extra challenging multi-vector attacks which leverage a combination of volumetric,
protocol, and more sophisticated application-layer attacks, trying to take down the
weakest link in your defenses.
Overview_________________________ • High performance and efficiency to meet growing attack scale: There is an
undeniable increasing trend in DDoS attacks in terms of frequency, size and
The Thunder TPS product line is a
complexity. Thunder TPS, powered by ACOS, protects the largest, most demanding
family of high-performance appliances network environments. Performance scaling is maintained by distributing multi-
that detect and mitigate multi-vector vector detection and mitigation functions across optimal system resources.
DDoS attacks at the network edge, With the ability to offload common attack vectors to specialized hardware, the
functioning as a first line of defense multicore, powerful CPU cores can focus on complex application layer attacks,
for your network infrastructure. which requires very resource-intense deep packet inspection (DPI) processing.
Thunder TPS hardware appliances meet the highest demands, while being
Thunder TPS support offerings extremely efficient. The combination of high performance in a small form factor
include access to 24x7x365 support, results in lower OPEX through significant lower power usage, reduced rack space
and lowered cooling requirements.
DSIRT (DDoS Security Incident
• Full control and smart automation for agile protection: To easily integrate in
Response Team) assistance, and the
various networking architectures, a vendor neutral, flexible DDoS mitigation
A10 Threat Intelligence Service.
solution is required. Various network deployment models for in- and out-of-
band operations are available. With a RESTful API, aXAPI®, as well as leveraging
open signaling standards, Thunder TPS enables integration to your custom or
third-party detection solutions. The programmatic policy engine allows for fully
customized policies leveraging regular expressions (regex) and Berkeley Packet
Filter (BPF) pattern matching filters to perform application aware inspection.
Several actions can be tied to a policy rule, such as running a script and/or DDoS
signaling using BGP. This creates a powerful, automated yet flexible environment
to quickly counteract adaptive attack strategies.
1
Architecture and Key Components Out-of-band (TAP) mode
Asymmetric mode
Internet
Internet
Duplicated
Traffic
Thunder TPS
Edge Network
DDoS Traffic
Clean API For detailed telemetry analysis, define threshold violations, and
Traffic Communication synchronize white/black lists master to in-band Thunder TPS units
Access Network
2
Shadowserver, to enable Thunder TPS to instantly recognize and • Programmatic Policy Engine: Thunder TPS is able to perform
block traffic to and from known malicious sources. application aware inspection on incoming packets and take
A10’s Threat Intelligence Service provides the following benefits: defined actions to protect the application. For example, the
-- Protects networks from future threats system can enforce limits on various DNS query types, or
apply security checks in many portions of the HTTP header.
-- Blocks non-DDoS related threats such as spam and phishing
The detection and mitigation capabilities are extremely
-- Increases Thunder TPS efficiency
customizable, using regular expression (regex) and Berkeley
With a threat intelligence network that continuously charts
Packet Filter (BPF) for high-speed pattern matching in
potential intruders on the Internet, customers can leverage
policies. DevOps can leverage event-triggered scripts for
global knowledge to block traffic from malicious Internet
increased operational agility.
locations and offload Thunder TPS from identifying known
• Easy network integration: With multiple performance options
bots and attack sources.
and flexible deployment models including MPLS inspection,
High Performance and Efficiency to Meet Growing Thunder TPS can be integrated into any network architecture,
Attack Scale of any size. And, with aXAPI, A10’s RESTful API, Thunder TPS
Over the last few years, DDoS attacks have rapidly proliferated in can easily be integrated into third-party detection solutions.
terms of bandwidth (Gbps) and packets per second (pps). Thunder
Leveraging open standards such as the BGP Blackhole
TPS can leverage high-performance, specialized hardware as well
functionality, Thunder TPS mitigation integrates easily with
as the latest, most powerful Intel Xeon CPUs to mitigate the largest
any DDoS detection solutions. Open APIs and networking
and most sophisticated attacks. A10’s Advanced Core Operating
standards support enables tight integration with many other
System (ACOS) platform enables efficient use of the specialized
devices, including SDN controllers and security products.
system resources.
• Centralized Management: For larger deployments, our
• High performance protection: With mitigation throughput optional aGalaxy centralized management system ensures
capacity ranging from 1 to 300 Gbps (or 2.4 Tbps in a list routine tasks can be performed at scale, across multiple
synchronization cluster) ensures that the largest, multi-vector appliances, regardless of physical location.
DDoS attacks can be dealt with effectively. Select Thunder
TPS models are equipped with high-performance FPGA-based Product Description
FTA technology to detect and mitigate up to 60 common The Thunder TPS product line is a family of high-performance
attack vectors immediately, before the data CPUs are involved. appliances that detect and mitigate multi-vector DDoS attacks at
SYN cookies can be generated to validate client connection the network edge, functioning as a first line of defense for a network
requests, at a rate of up to 440 Mpps. The Security and infrastructure.
Policy Engine (SPE) hardware enforces highly granular traffic Thunder TPS Hardware Appliances: The Thunder TPS line of
rates; as fine as 100 ms interval. SSL security processors are hardware appliances protects large networks with entry-level
leveraged for detecting and mitigating SSL-based attacks, such models starting at 2 Gbps and moving up to a 300 Gbps high-
as the POODLE vulnerability. More complex application-layer performance appliance for your most demanding requirements. All
(L7) attacks (HTTP, DNS, etc.) are processed by the Intel Xeon models feature redundant power supplies*, solid-state drives (SSDs),
CPUs, so that high-performance system scaling is maintained and have no inaccessible moving parts for high availability. Select
even for multi-vector attacks. Network connectivity is provided models benefit from our Security and Policy Engine (SPE) hardware
acceleration, leveraging FPGA-based FTA technology among other
with 1, 10, 40 and 100 GbE interfaces.
hardware optimized packet processing to provide highly scalable
• Large threat intelligence class lists: Eight individual lists,
flow distribution and hardware DDoS protection capabilities.
each containing up to 16 million list entries, can be defined. Switching and routing processors provide high-performance network
This allows a user to utilize data from intelligence sources processing. Each appliance offers the best performance per rack
such as the A10 Threat Intelligence Service, in addition to the unit, and “80 PLUS™ Platinum” certification* for power supplies to
dynamically generated entries of black/white lists. ensure a green solution and reduce power consumption costs. High
• Simultaneous protected objects: To protect entire networks density with 1, 10, 40 and 100 GbE port options are available to
with many connected users and services, the Thunder TPS is meet the highest networking bandwidth demands.
able to simultaneously monitor 64,000 hosts or subnets. vThunder Virtual Appliances: The vThunder line of virtual
Full Control and Smart Automation for Agile Protection appliances is designed to meet the growing needs of organizations
that require a flexible and easy-to-deploy DDoS Protection solution
For network operators, it is critical that a DDoS mitigation solution
running within a virtualized infrastructure. Each vThunder instance
can easily be inserted into the existing network architecture, so
has the full set of DDoS protection features that can run atop your
that the network remains prepared for imminent DDoS threats.
choice of commodity hardware and also your choice of leading
hypervisor, for example, VMware ESXi and Microsoft Hyper-V.
3
Thunder TPS Hardware Appliance Specifications Table
Thunder Thunder Thunder
Thunder 840 TPS
3030S TPS 4435(S) TPS 5435(S) TPS
Throughput 2 Gbps 10 Gbps 38 Gbps 77 Gbps
TCP SYN Auth/sec *1
1.5 million 6.5 million 35 million 35 million
SYN Cookie/sec *1
1.5 million 6.5 million 55 million 112 million
Network Interface
1 GE Copper 5 6 0 0
1 GE Fiber (SFP) 0 2 0 0
1/10 GE Fiber (SFP+) 2 4 16 16
40 GE Fiber (QSFP+) 0 0 0 4
100 GE Fiber 0 0 0 0
Management Interface Yes Yes Yes Yes
Lights Out Management No Yes Yes Yes
Console Port Yes Yes Yes Yes
Solid-state Drive (SSD) Yes Yes Yes Yes
Intel
Intel Xeon Intel Xeon Intel Xeon
Processor Communication
4-core 10-core 10-core
Processor
Memory (ECC RAM) 8 GB 16 GB 64 GB 64 GB
Hardware Acceleration
64-bit Linear Decoupled Architecture Yes Yes Yes Yes
Flexible Traffic Acceleration Software Software 1 x FTA-3+ FPGA 2 x FTA-3+ FPGA
Switching/Routing Software Software Hardware Hardware
SSL Security Processor ('S' Models) N/A Single Dual Dual
Internal or External
*3|*4
Hardware Bypass External External External
Option
Power Consumption (Typical/Max)*2 57W / 75W 131W / 139W 350W / 420W 400W / 480W
Heat in BTU/hour (Typical/Max) *2
195 / 256 447 / 474 1,195 / 1,433 1,365 / 1,638
Single 150W (AC only) Dual 600W RPS Dual 1100W RPS Dual 1100W RPS
Power Supply (DC option available)
100 - 240 VAC, 50-60Hz 80 Plus Platinum efficiency, 100 - 240 VAC, 50 – 60 Hz
Cooling Fan Single Fixed Fan Hot Swap Smart Fans
1.75 in (H), 1.75 in (H), 1.75 in (H), 1.75 in (H),
Dimensions 17.0 (W), 17.5 in (W), 17.5 in (W), 17.5 in (W),
12 in (D) 17.45 in (D) 30 in (D) 30 in (D)
Rack Units (Mountable) 1U 1U 1U 1U
Unit Weight 8.8 lbs 20.1 lbs 34.5 lbs 35.5 lbs
Operating Ranges Temperature 0° C - 40° C | Humidity 5% - 95%
FCC Class A, UL, CE, FCC Class A, UL, CE, FCC Class A, UL, CE,
FCC Class A, UL, CE,
TUV, CB, VCCI, China TUV, CB, VCCI, China TUV, CB, VCCI, China
Regulatory Certifications TUV, CB, VCCI, China
CCC, BSMI, RCM, MSIP, CCC, MSIP, BSMI, RCM, CCC, BSMI, RCM, EAC,
CCC, BSMI, RCM | RoHS
EAC, FAC | RoHS EAC, NEBS | RoHS NEBS | RoHS
Standard Warranty 90-day Hardware and Software
*1 Packets per second. Performance varies with deployment mode and configuration | *2 With base model. The value may vary with SSL and/or Hardware Bypass options |
*3 Hardware bypass model must be purchased for internal bypass function | *4 Available in Q4 2016 | ^ Certification in process
4
Thunder TPS Hardware Appliance Specifications Table (continued)
Thunder 6435(S) TPS Thunder 6635(S) TPS Thunder 14045 TPS*4
Throughput 155 Gbps 155 Gbps 300 Gbps
TCP SYN Auth/sec *1
70 million 70 million 130 million
SYN Cookie/sec*1 223 million 223 million 440 million
Network Interface
1 GE Copper 0 0 0
1 GE Fiber (SFP) 0 0 0
1/10 GE Fiber (SFP+) 16 12 0
40 GE Fiber (QSFP+) 4 0 4
100 GE Fiber 0 4 (CXP) 4 (CFP2 or QSFP28)
Management Interface Yes Yes Yes
Lights Out Management Yes Yes Yes
Console Port Yes Yes Yes
Solid-state Drive (SSD) Yes Yes Yes
Intel Xeon Intel Xeon Intel Xeon
Processor
Dual 12-core Dual 12-core Quad 18-core
Memory (ECC RAM) 128 GB 128 GB 512 GB
Hardware Acceleration
64-bit Linear Decoupled Architecture Yes Yes Yes
Flexible Traffic Acceleration 4 x FTA-3+ FPGA 4 x FTA-3+ FPGA 8 x FTA-3+ FPGA
Switching/Routing Hardware Hardware Hardware
SSL Security Processor ('S' Models) Quad 2 x Dual, 2 x Quad or 4 x Quad TBD
Power Consumption (Typical/Max) *2
620W / 710W 995W / 1,150W 1,700W / 2,000W
Heat in BTU/hour (Typical/Max)*2 2,116 / 2,423 3,395 / 3,924 5,801 / 6,825
Dual 1100W RPS 2+2 1100W RPS 2+2 1100W RPS
Power Supply (DC option available)
80 Plus Platinum efficiency, 100 - 240 VAC, 50 – 60 Hz
Cooling Fan Hot Swap Smart Fans
1.75 in (H), 5.3 in (H), 5.3 in (H),
Dimensions 17.5 in (W), 16.9 in (W), 16.9 in (W),
30 in (D) 28 in (D) 30 in (D)
Rack Units (Mountable) 1U 3U 3U
Unit Weight 39 lbs 74.5 lbs 102 lbs
Operating Ranges Temperature 0° C - 40° C | Humidity 5% - 95%
FCC Class A, UL, CE, TUV, CB, FCC Class A^, UL^, CE^, TUV^, CB^,
FCC Class A, UL, CE, TUV, CB,
Regulatory Certifications VCCI, China CCC, BSMI, RCM, VCCI^, China CCC^, BSMI^, RCM^
VCCI, EAC, FAC | RoHS
EAC, NEBS | RoHS | RoHS^
Standard Warranty 90-day Hardware and Software
*1 Packets per second. Performance varies with deployment mode and configuration | *2 With base model. The value may vary with SSL and/or Hardware Bypass options |
*3 Hardware bypass model must be purchased for internal bypass function | *4 Available in Q4 2016 | ^ Certification in process
Thunder 6635(S) TPS Thunder 14045 TPS (CFP2) Thunder 14045 TPS (QSFP28)
6
Detailed Feature List* (continued)
(*Features may vary by appliance.)
Corporate Headquarters Worldwide Offices To learn more about the A10 Thunder Application
Service Gateways and how it can enhance your
A10 Networks, Inc North America Hong Kong
[email protected] business, contact A10 Networks at:
3 West Plumeria Ave. [email protected]
San Jose, CA 95134 USA Taiwan www.a10networks.com/contact or call to talk to an
Europe
Tel: +1 408 325-8668 [email protected] [email protected] A10 sales representative.
Fax: +1 408 325-8666 South America Korea
www.a10networks.com [email protected] [email protected]
Japan South Asia
[email protected] [email protected]
Part Number: A10-DS-15101-EN-11 China Australia/New Zealand
Oct 2016 [email protected] [email protected]
©2016 A10 Networks, Inc. All rights reserved. A10 Networks, the A10 Networks logo, ACOS, Thunder and SSL Insight are
trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries. All other trademarks
are property of their respective owners. A10 Networks assumes no responsibility for any inaccuracies in this document. A10
Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. For the full list of
trademarks, visit: www.a10networks.com/a10-trademarks. 7