A10 Ds Thunder Adc
A10 Ds Thunder Adc
Thunder ADC
Application Delivery Controller and Advanced Load Balancer
Platforms
Benefits
Enhance Secure
APP
Application Availability Communications
Organizations must guarantee their applications are Internet sessions are rapidly adopting encryption to secure
constantly accessible. Thunder ADC utilizes multiple load online data transport. Clients and servers, meanwhile,
balancing techniques to efficiently distribute workloads negotiate the most secure and complex methods mutually
across all servers while constantly evaluating application supported. Thunder ADC front-ends servers and offloads
health. Client requests are forwarded to servers that cumbersome, processing-intensive tasks associated
host the proper content and can best respond to ensure with the latest cryptographic standards. This maximizes
application and content delivery. content protection, speeds delivery and lowers
infrastructure expenses.
Ensure
Business Continuity
Protect
With data centers proliferating worldwide, administrators Vulnerable Applications
must maintain around-the-clock global operational Software development and testing can catch most, but
integrity. To guarantee cohesion and optimize app delivery typically not all, coding flaws. The resulting applications are
among diverse sites or clouds, Thunder ADC includes susceptible to attacks that cannot be blocked by intrusion
advanced global server load balancing (GSLB) working prevention systems (IPS), next-generation firewalls or
with other application delivery features. GSLB expands sandboxing. Businesses lose revenue, suffer damaged
functionality across global data centers for high availability, brand reputation and loss of confidential data. Thunder ADC
fault tolerance, and the best user experience. provides protection against ‘zero day’ and other emerging
application layer threats with DNS and web
application firewalls.
Accelerate
Content Delivery
Applications must be responsive —no matter the location —
to ensure a superior end-user experience, enhance remote
employee productivity and exceed SLA mandates.
Thunder ADC overcomes the inherent WAN latencies,
inefficient software programs and chatty protocols to
provide fast and responsive service. End users receive
a superior user experience while organizations gain a
competitive advantage.
Benefits (cont.)
Optimize Polynimbus
Applications via Multi-Tenancy Operational Efficiency
To optimize the delivery and security for potentially In a multi-cloud, or hybrid cloud environment, it’s essential
hundreds of apps in a given data center, IT administrators for IT operations to have a standardized ADC and service
need a multi-tenant methodology. visibility from a business and OPEX planning perspective.
Thunder ADC can be deployed in a virtual and container
Thunder ADC provides the ability to granularly program
environment with flexible and portable licensing, yet deliver
more than 1,000 individual partitions on a single appliance
feature parity regardless of the form factor. A10 Harmony®
for tailor-made policies by application, service, or user,
Controller enables effective operation by providing deeper
while consolidating appliances.
secure application service analytics, easy troubleshooting
tools and centralized policy enforcement control.
Consolidate
Access Control
Organizations must allow external clients access to
web portals, internal resources and mobile/BYOD apps.
At the same time, security must be maintained with
authentication and be transparent to the user.
Thunder
370/340 Gbps 100 12M
7655S ADC L4/L7 Application
Throughput
GE Interfaces L4 Connections
Per Second
by the Numbers
Industry-leading Performance Thunder ADC delivers industry-leading performance – 370 Gbps of application
throughput and 145 Gbps of TLS/SSL bulk throughput – in a single 1.5U
appliance, rich ADC features (all-inclusive) in the broadest range of form factors,
including physical, virtual, bare metal, containers for multi-tenancy and cloud.
Reference Architectures
Features
Application Delivery and Performance
Advanced Global
Server Load Balancing Server Load Balancing (GSLB)
Thunder ADC is a full-proxy, load-balancing and content- Extend load balancing on a global basis. Thunder ADCs,
switching solution. With aFleX® scripting, deep packet distributed worldwide, continuously update each other on
inspection, comprehensive load-balancing algorithms and their respective individual nodes for optimal site selection
persistence support, Thunder ADC enables application layer and status to ensure disaster recovery.
visibility to optimally route inbound requests.
Geographic and network proximity policy metrics
Customizable server health checks ensure only fully optimize multi-site deployments. DNS proxy or DNS server
functional servers are used to service client needs. The methods further improve implementation flexibility and
server best able to respond is selected and total servers deployment simplicity.
required can be substantially reduced for lower TCO.
High Density
Broad
Application Delivery Partitions
Acceleration Methodologies
Provide support for multi-tenant environments with
Leverage numerous techniques to overcome inherent
application delivery partitions (ADP). They allow the
distance-related latency, inefficient internet protocols
configuration of more than 1,000 partitions on a
and application design limitations. Acceleration methods,
single Thunder ADC appliance, which enables Layer 3
including TCP connection multiplexing, RAM caching, GZIP
virtualization. Each partition may be configured for a
compression and SSL-offload, expedite content transfer.
unique set of policies and offers resource isolation for most
The solution supports TCP optimization standards such as
application-oriented use cases.
selective acknowledgment, client keep-alive and window
scaling, to further speed delivery.
Recursive DNS
DNS
Ultra-low Latency For Consolidation
Thunder ADC provides powerful recursive DNS capability
For Financial Applications
enabling a one-stop DNS solution that leverages the high
The Thunder ADC family also offers solutions for low
performance of ACOS DNS cache service, the scalability
latency applications, featuring specialized Thunder
of DNS load balancing and the security of DNS application
appliances with custom software, to meet the low latency
firewall (DAF). This makes the ADC recursive DNS feature a
and jitter requirements of financial applications. Featuring
perfect solution for any enterprise or service provider
ultra-low latency hardware, these appliances offer near
seeking to consolidate DNS services and drive higher
instantaneous execution times and provide granular
customer satisfaction.
program policies for efficient packet forwarding, while
also consolidating multiple network functions, thus
reducing hops.
Application Security
Extensive SSO
Cipher Suite Support and Application Authentication
Hardware-based SSL offload engines support advanced The integrated application access management (AAM)
cryptographic methods at ultra-high capacity. Thunder module optimizes and enforces authentication and
ADC can manage session security, such as perfect forward authorization to applications.
secrecy (PFS), with an advanced cipher suite, including
The module integrates with authentication servers, identity
elliptic curve cryptography (ECC).
data stores, identity providers (IdPs) and applications to
Appliances can process TLS/SSL encryption and decryption authenticate users and enforce access privileges. Common
at rates 145 Gbps—and up to 140,000 connections per AAA and single sign-on (SSO) methods include LDAP,
second—when using ECC with 256-bit keys. RADIUS, RSA SecurID, TDS SQL, SAML and Kerberos.
overflows that target coding flaws. Integrated into balancing multiple DNS servers and with cache DNS
Thunder ADC, the WAF blocks these and other application capabilities, while supporting recursive DNS lookup. To
behavior anomaly attacks, and prevents unauthorized secure DNS services, the ADC incorporates a sophisticated
data leakage. DNS application firewall (DAF), DNS RPZ and integrated
DDoS protection to filter unwanted and malformed
requests, stop buffer overflows and head off DNS
amplification-based DDoS attacks. It delivers validated
DNSSEC pass-through support to prevent threats such as
DNS cache-poisoning and spoofing.
Certified By The integrated Thunder ADC web application firewall has achieved WAF
ICSA Labs certification from ICSA Labs. ICSA Labs testing and certification ensures
that Thunder ADC performs as intended to secure application services
from exploitation and attack.
Analytics API
Visibility and Logging
>_ Full Programmability
When deployed in conjunction with the A10 Harmony The Thunder ADC platform leverages A10’s REST-based
Controller, Thunder ADC provides access to dozens of aXAPIs to configure all features with 100 percent API
aggregate and per-request metrics in real time. These coverage. This interface is used to integrate with third-
include end-to-end response times, latency, popular URLs, party or custom management consoles, such as SDN
and error and health indicators. The data is analyzed to platforms (e.g., VMware) and cloud orchestration systems
provide per-app reporting and alerts on availability, security (e.g., OpenStack and Microsoft SCVMM). A software
and performance. plug-in is available for private clouds leveraging vRealize
Orchestrator from VMware.
Detailed Layer 4 based analytics information is separately
provided by individual clients, ADC (single appliance or as a
cluster) and per server. Comprehensive
Management Tools
• Supports various cloud platform and technologies across multi-cloud environments. Administrators can
including OpenStack, OpenShift, Kubernetes and more. automatically discover, track and monitor each appliance
including key operational metrics such as CPU and disk
• Provides native integration with Infrastructure as Code
usage as well as device partitions and users. The controller
(IaC) for provisioning and configuration automation, such
performs configuration backup and restore operations and
as Terraform and Ansible.
schedules software upgrades.
• Automates network operation with dynamic ADC
configuration update using Thunder Kubernetes
Connector (TKC), HashiCorp Consul and network
infrastructure automation (NIA).
• Monitors application network with common open-source
tools such as Prometheus, Grafana and Fluentd.
• Provides quick and easy deployment using resource
manager template in public cloud, including Azure
Resource Manager (ARM) and AWS CloudFormation
templates.
Applications View
Get a real-time status report of the application
services, including application response time and
latency, top URL analytics, top domains analytics
for global usage visualization, response type
analytics by port number and slow transaction
analytics per page under
the application.
1 GE (BASE-T) 5 5 5 6 6
1 GE Fiber (SFP) 0 0 4 2 2
25 GE Fiber (SFP28) 0 0 0 0 4
40 GE Fiber (QSFP+) 0 0 0 4
Hardware Specifications
Intel Intel Intel Xeon Intel Xeon
Processor
Communications Processor Communications Processor 8-core 8-core
Hardware on S models
TLS/SSL Security Acceleration Software Hardware Hardware
(2 options)*7
14 lbs 14 lbs
Unit Weight*3 18 lbs 18 lbs
16lbs (RPS) 16 lbs (RPS)
Single 750W*6 Single 750W*6 Dual 750W RPS Dual 750W RPS
Power Supply (DC option available)
80 Plus Platinum efficiency, 100 - 240 VAC, 50 – 60 Hz
Power Consumption (typical/max)*3 60W / 80W 80W / 110W 151W / 205W 165W / 238W
Heat in BTU/hour (typical/max)*3 205 / 273 273 / 376 516 / 700 564 / 831
Cooling Fan (front-to-back airflow) Removable Fans Hot Swap Smart Fans
FCC Class A, UL, CE, FCC Class A, UL, CE, FCC Class A, UL, CE,
FCC Class A, UL, CE, CB,
Regulatory Certifications CB, VCCI, KCC, BSMI, RCM CB, VCCI, KCC, BSMI, RCM CB, VCCI, KCC, BSMI, RCM
VCCI, BSMI, RCM | RoHS
| RoHS | RoHS | RoHS
Layer 4 Concurrent Sessions 128 Million 128 Million 256 Million 256 Million
DDoS Protection (SYN flood) SYN/sec 16 Million 110 Million 166 Million 166 Million
Network Interfaces
1 GE (BASE-T) 6 0 0 0
1 GE Fiber (SFP) 2 0 0 0
25 GE Fiber (SFP28) 0 0 0 0
40 GE Fiber (QSFP+) 0 4 4 4
Hardware Specifications
Intel Xeon Intel Xeon Intel Xeon Intel Xeon
Processor
14-core 6-core 12-core 18-core
TLS/SSL Security Acceleration Hardware Hardware on S model Hardware on S model Hardware on S models
Dimensions (inches) 1.75 (H) x 17.5 (W) x 18(D) 1.75 (H) x 17.5 (W) x 30 (D) 1.75 (H) x 17.5 (W) x 30 (D) 1.75 (H) x 17.5 (W) x 30 (D)
Dual 750W RPS Dual 1100W RPS Dual 1100W RPS Dual 1100W RPS
Power Supply (DC option available)
80 Plus Platinum efficiency, 100 - 240 VAC, 50 – 60 Hz
Power Consumption (typical/max)*3 175W / 222W 360W / 445W 360W / 445W 375W / 470W
FCC Class A, UL, CE, CB, FCC Class A, UL, CE, CB, FCC Class A, UL, CE, CB, FCC Class A, UL, CE, CB,
Regulatory Certifications VCCI, KCC, BSMI, VCCI, KCC, BSMI, VCCI, KCC, BSMI, RCM | VCCI, KCC, BSMI, RCM |
RCM | RoHS RCM | RoHS RoHS, FIPS 140-2^|*5 RoHS, FIPS 140-2^|*5
Layer 4 CPS 4.5 Million 4.5 Million 8.3 Million 8.3 Million
Layer 4 Concurrent Sessions 256 Million 256 Million 256 Million 256 Million
Layer 7 CPS (1:1)*1 1.5 Million 1.4 Million 2.8 Million 2.8 Million
DDoS Protection (SYN flood) SYN/sec 166 Million 238 Million 332 Million 332 Million
Network Interfaces
1 GE (BASE-T) 0 0 0 0
1 GE Fiber (SFP) 0 0 0 0
25 GE Fiber (SFP28) 0 0 0 0
40 GE Fiber (QSFP+) 0 4 4 0
Management Ports Ethernet Mgmt Port, RJ-45 Console Port, Lights Out Management
Hardware Specifications
Intel Xeon 2 x Intel Xeon 2 x Intel Xeon 2 x Intel Xeon
Processor
18-core 10-core 18-core 18-core
TLS/SSL Security Acceleration Hardware on S models Hardware on S model Hardware on S model Hardware on S model
Dimensions (inches) 1.75 (H) x 17.5 (W) x 30 (D) 1.75 (H) x 17.5 (W) x 30 (D) 1.75 (H) x 17.5 (W) x 30 (D) 1.75 (H) x 17.5 (W) x 30 (D)
Dual 1500W RPS Dual 1100W RPS Dual 1100W RPS Dual 1500W RPS
Power Supply (DC option available)
80 Plus Platinum efficiency, 100 - 240 VAC, 50 – 60 Hz
Power Consumption (typical/max)*3 550W / 760W 480W / 550W 690W / 820W 820W / 950W
FCC Class A, UL, CE, CB, FCC Class A, UL, CE, CB,
FCC Class A, UL, CE, CB, FCC Class A, UL, CE, CB,
Regulatory Certifications VCCI, KCC, BSMI, VCCI, BSMI, RCM | RoHS,
VCCI, BSMI, RCM | RoHS VCCI, KCC, BSMI, RCM | RoHS
RCM | RoHS, FIPS 140-2*5 FIPS 140-2^|*5
Hardware specifications and performance numbers are subject to change without notice, and may vary depending on configuration and environmental conditions.
As for network interfaces, it’s highly recommended to use A10 Networks’ qualified optics/transceivers to ensure network reliability and stability.
*1 Layer 7 connections per second - measures number of new HTTP connections (1 HTTP request per TCP connection, without TCP connection reuse ) within 1 second |
*2 Tested with maximum SSL option. Cipher “TLS_RSA_WITH_AES_128_CBC_SHA256” with RSA 2K keys, unless noted, are used for RSA cases, “TLS_ECDHE_ECDSA_
WITH_AES_128_CBC_SHA256” with EC P-256 are used for PFS cases. | *3 With base model. Number varies by hardware options (e.g. SSL cards) | *4 With maximum SSL
option | *5 For FIPS 140-2 Level 2 validated, FIPS models must be purchased | *6 Optional RPS available | *7 Thunder 1040-F comes with hardware TLS/SSL acceleration
with 16GB RAM by default | *8 10Gbps speed only | ^ Certification in process
Network Interfaces
100 GE Fiber (QSFP28) 16 16
Management Ports Ethernet Mgmt Port, RJ-45 Console Port, Lights Out Management
Hardware Specifications
Processor (Intel Xeon) 28-core 2 x 28-core
Dimensions (Inches) 2.625 (H) x 17.5 (W) x 30 (D) 2.625 (H) x 17.5 (W) x 30 (D)
Regulatory Certifications FCC Class A, UL, CE, CB, VCCI, BSMI, RCM | RoHS FCC Class A, UL, CE, CB, VCCI, BSMI, RCM | RoHS
Hardware specifications and performance numbers are subject to change without notice, and may vary depending on configuration and environmental conditions. As for
network interfaces, it’s highly recommended to use A10 Networks’ qualified optics/transceivers to ensure network reliability and stability.
*1 Layer 7 connections per second - measures number of new HTTP connections (1 HTTP request per TCP connection, without TCP connection reuse ) within 1 second |
*2 Tested with Cipher "TLS_RSA_WITH_AES_128_CBC_SHA256" with 2K keys for RSA cases, "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256" with EC P-256 for ECC
cases | *3 Increased to twice its capacity from ACOS 5.2.1-P7/6.0.1 onward
Network Interfaces
10 GE Fiber (SFP+) 4*3
Management Ports Ethernet Mgmt port, RJ-45 console port, Lights Out Management
Hardware Specifications
Processor (Intel Xeon) 2 x 8-core
Storage SSD
Hardware specifications and performance numbers are subject to change without notice, and may vary depending on configuration and environmental conditions.
*1 99th percentile. All the performance numbers are measured using FIX protocol with 670B packet size. | *2 Flow processing module (FPM) consists of FTA-3 (Flexible
Traffic Accelerator) and SPE (Security and Policy Engine). | *3 10Gbps speed only | ^ Certification in process
Application Throughput (L4 / L7) 10 Gbps / 7.5 Gbps 40 Gbps / 40 Gbps 60 Gbps / 60 Gbps 75 Gbps / 75 Gbps 100 Gbps / 100 Gbps
Network Interfaces
1 GE (BASE-T) 6 2 2 2 2
1/10 GE Fiber (SFP+) 4 6 2 10 10
100 GE Fiber (QSFP28) 0 0 2 0 4
Hardware Specifications
Processor Intel Xeon 8-core 2 x Intel Xeon 20-core 2 x Intel Xeon 20-core
TLS/SSL Security Processor Built-in 2 x Security Card (PCIe) 2 x Dual-chip Security Card (PCIe)
Single 230W
Power Supply Dual 750W Power Supply Dual 2000W Power Supply
Power Supply
Network Interfaces
1 GE (BASE-T) 2 2 2 2
1/10 GE Fiber (SFP+) 6 2 10 10
100 GE Fiber (QSFP28) 0 2 0 4
Hardware Specifications
*1 Layer 7 connections per second - measures number of new HTTP connections (1 HTTP request per TCP connection, without TCP connection reuse ) within 1 second
*2 RSA (2K keys) cipher: “TLS_RSA_WITH_AES_128_CBC_SHA”, ECDSA (EC P-256) cipher: “TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA”
*3 A10 Thunder on Dell Technologies OEM bundle solutions are licensed under the Convergent Firewall (CFW) license. Check with your A10 Networks sales representative for
the latest information on full feature testing and validation.
All Thunder MVP performance specifications are aggregate number that use the following VM profiles:
- R640 10GE NIC model is tested with 4-VM profile (8 vCPUs, 16 GB memory, 30 GB storage, 16 SSL virtual functions (VFs) assigned on each vThunder)
- R640 100GE NIC model is tested with 4-VM profile (16 vCPUs, 32 GB memory, 30 GB storage, 8 SSL VFs assigned on each vThunder)
- R740 10GE and 100GE NIC model are tested with 8-VM profile (8 vCPUs, 16 GB memory, 30 GB storage, 16 SSL VFs assigned on each vThunder)
Supported Hypervisors VMware ESXi (VMXNET3, SR-IOV, PCI Passthrough), KVM (VirtIO, OvS with DPDK, SR-IOV, PCI Passthrough), Microsoft Hyper-V
Bandwidth Licenses Lab 200 Mbps 1 Gbps 4 Gbps 8 Gbps 10 Gbps 20 Gbps 40 Gbps 100 Gbps FlexPool
VMware ESXi
• • • • • • • *1
• *1 | *2
• *2
•
KVM
• • • • • • • *1
• *1 | *2
• *2
•
Microsoft Hyper-V
• • • • • *3
•
vThunder ADC for Cloud AWS Microsoft Azure Oracle Cloud
Licenses *4
30-day Trial License 30-day Trial License 30-day Trial License
Pre-installed Bandwidth License: Pre-installed Bandwidth License: Pre-installed OCPU based
• 20 Mbps, 100 Mbps, 200 Mbps, • 20 Mbps, 100 Mbps, 200 Mbps, License:
500 Mbps, 1 Gbps, 5 Gbps, 10 500 Mbps, 1 Gbps, 5 Gbps, 10 • 1 OCPU to 24 OCPU
Gbps Gbps BYOL Bandwidth License
BYOL Bandwidth License BYOL Bandwidth License FlexPool License
FlexPool License FlexPool License
Reference Platforms Dell PowerEdge, Cisco UCS, Ericsson Hyperscale Datacenter System (HDS), HP ProLiant and more
Bandwidth Licenses *
10 Gbps (4 cores), 20 Gbps (8 cores), 40 Gbps (14 cores) and 60 Gbps (24 cores)
FlexPool (Up to 60 Gbps per Thunder ADC)
* 1 SR-IOV | *2 PCI Passthrough | *3 8 Gbps license not recommended for Microsoft Hyper-V | *4 Per-instance maximum throughput varies depending on instance
type and configurations
* Licenses are tied to the maximum number of CPU cores that can be allocated to ACOS
Application Acceleration
• HTTP acceleration and optimization IPv6 Migration/IPv4 Preservation
- HTTP connection multiplexing (also called TCP connection reuse) • Full native IPv6 management and feature support
- RAM caching • SLB-PT (Protocol Translation), SLB-64 (IPv4<–>IPv6, IPv6<–>IPv4)
- HTTP compression • Carrier grade NAT (CGN/CGNAT), Large scale NAT (LSN), NAT444, NAT44, NAT46
• SSL offload - Integrated DDoS protection for NAT pools
- SSL termination, SSL bridging • NAT64/DNS64, DS-Lite, 6rd, LW4o6
- SSL proxy • ALG protocol support for protocols with dynamic ports like SIP and FTP
- SSL session ID reuse
• TCP optimization support including selective acknowledgment,
client keep-alive and window scaling Management
• HTTP pipelining • Dedicated on-box management interface (GUI, CLI, SSH, Telnet)
• HTTP/2, SPDY protocol • Web-based AppCentric templates (ACT) intuitive guided configuration tool
• HTTP/3, QUIC protocol • SNMP, syslog, email alerts, NetFlow v9 and v10 (IPFIX), sFlow
• RESTful API (aXAPI)
• LDAP, TACACS+, RADIUS support
Application Security • Configurable control CPUs
• Web application firewall (WAF) • Interoperable with A10 Harmony Controller for centralized management,
• DNS application firewall (DAF) configuration and analytics
• Integrated DDoS protection for application services • Plug-in available for VMware vRealize Orchestrator deployments
• Hardware-based DDoS protection*
• Application Access Management (AAM) — SAML, WIA, Kerberos, NTLM,
TDS SQL Logon, LDAP, RADIUS, Basic, OCSP stapling, HTML Form-based Virtualization
• AAM RADIUS-based audit support • vThunder virtual appliance for VMware vSphere ESXi, Microsoft Hyper-V, KVM,
• Single sign-on (SSO) authentication relay Nutanix AHV, Amazon Web Services (AWS) AMI, Microsoft Azure VHD and
• Authentication for Microsoft SharePoint, Outlook Web Access, and other QCOW2 for Oracle Cloud and others
packaged and custom applications • Thunder ADC for Bare Metal
• Comprehensive SSL/TLS support • Thunder ADC for containers
- TLS 1.2 and TLS 1.3* • Networking acceleration (SR-IOV, DPDK) and management integration
- Perfect Forward Secrecy (PFS) with Elliptic Curve Diffie-Hellman Exchange • A10 Thunder on Dell Technologies OEM solution bundle
(ECDHE) and other Elliptic Curve Cryptography (ECC) ciphers
- AES-NI and GCM ciphers
Extensibility
• aVCS (Virtual Chassis System)
• Multi-tenancy with application delivery partition (ADP) based management
• Layer 3 - 7 virtualization
Learn More ©2023 A10 Networks, Inc. All rights reserved. A10 Networks, the A10 Networks logo, ACOS, Thunder, Harmony and SSL
Insight are trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries. All
About A10 Networks other trademarks are property of their respective owners. A10 Networks assumes no responsibility for any inaccuracies
in this document. A10 Networks reserves the right to change, modify, transfer, or otherwise revise this publication
Contact Us without notice. For the full list of trademarks, visit: A10networks.com/a10trademarks.
A10networks.com/contact Part Number: A10-DS-15100-EN-52 Mar 2023