A10 DS 15100 en 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

DATA SHEET

THUNDER ADC
APPLICATION DELIVERY CONTROLLER & LOAD BALANCER

PLATFORMS
Offering a complete application optimization solution,
A10 Thunder® ADC (Application Delivery Controller) processes THUNDER ADC
Physical & SPE Appliances
a complex set of functions simultaneously via the industry’s
V
highest-performing appliances. It integrates advanced L4-7
vTHUNDER ADC
techniques to ensure server availability, protect vulnerable Virtual Appliance

applications and accelerate content delivery.


THUNDER ADC
Bare Metal

THUNDER ADC
AGILE APPLICATION Thunder ADC delivers the capacity,
scalability, multi-tenancy and
Container

DELIVERY & programmability to adjust to an ever-

SECURITY changing environment. Consolidate point


products, reduce network complexity and
FLEXPOOL
Capacity Pooling
From SMBs and large enterprises to service achieve a substantial reduction in TCO. License
providers and cloud operators, organizations MANAGEMENT
are hosting a large and rapidly growing set of Thunder ADC delivers L4-7 load balancing
mission-critical applications. and multiple layers of security via web
and DNS app firewalls, single sign-on
HARMONY CONTROLLER
A purpose-built solution, A10 Thunder (SSO) authentication and in-depth support Centralized Analytics and
ADC ensures these applications are highly for advanced encryption, including Management

available, accelerated and secure. It helps high-performance PFS/ECC. Built upon

TALK
reduce downtime, ensure business continuity A10’s Advanced Core Operating System
and builds highly available applications and (ACOS®) platform, Thunder ADC delivers
environments. application performance and security for
any environment. WITH A10
WEB
a10networks.com/adc

1
BENEFITS

APP
ENHANCE SECURE
APPLICATION AVAILABILITY COMMUNICATIONS

Organizations must guarantee their Internet sessions are rapidly adopting


applications are constantly accessible. encryption to secure online data
Thunder ADC utilizes multiple load- transport. Clients and servers, meanwhile,
balancing techniques to efficiently negotiate the most secure and complex
distribute workloads across all servers methods mutually supported. Thunder
while constantly evaluating application ADC front-ends servers and offloads
health. Client requests are forwarded to cumbersome, processing-intensive tasks
servers that host the proper content and associated with the latest cryptographic
can best respond to ensure application standards. This maximizes content
and content delivery. protection, speeds delivery and lowers
infrastructure expenses.

ENSURE PROTECT
BUSINESS CONTINUITY VULNERABLE APPLICATIONS

With data centers proliferating Software development and testing can

worldwide, administrators must catch most, but typically not all, coding

maintain around-the-clock global flaws. The resulting applications are

operational integrity. To guarantee susceptible to attacks that cannot be

cohesion and optimize app delivery blocked by intrusion prevention systems

among diverse sites, Thunder ADC (IPS), next-generation firewalls or

provides advanced global server load sandboxing. Businesses lose revenue,

balancing (GSLB) between locations. suffer damaged brand reputation and

GSLB provides optimal site selection confidential information is stolen.

and status to ensure disaster recovery. Thunder ADC provides protection


against ‘zero day’ and other emerging
application layer threats with DNS and
web application firewalls.

ACCELERATE
CONTENT DELIVERY

Applications must be responsive — no matter the location — to ensure a superior end-user experience,


enhanced remote employee productivity and SLA mandates are exceeded. Thunder ADC overcomes the
inherent WAN latencies, inefficient software programs and chatty protocols to provide fast and responsive
service. Clients obtain a fast experience while organizations gain a competitive advantage.

2
OPTIMIZE CONSOLIDATE
APPLICATIONS VIA MULTI-TENANCY ACCESS CONTROL

To optimize the delivery and security for Organizations must allow external
potentially hundreds of apps in a given clients access to web portals, internal
data center, IT administrators need a resources and mobile/BYOD apps. At the
multi-tenant methodology. same time, security must be maintained
with authentication and be transparent
Thunder ADC provides the ability to
to the user.
granularly program more than 1,000
individual partitions on a single appliance Thunder ADC centrally manages multiple
for tailor-made policies by application, facets of authentication, authorization
service or user, as well as achieve and accounting (AAA) with a system-
appliance consolidation. wide perspective, while eliminating
separate authentication points, for a
single sign-on (SSO) experience.
PROACTIVE
INFRASTRUCTURE MODIFICATIONS

Dynamic traffic profiles and throughput


levels require detailed visualization into
application usage to implement network
changes in real-time.

When combined with A10 Harmony™


Controller, Thunder ADC provides ultra
granular visibility and L4-7 analytics to
accelerate troubleshooting and head off
potentially reduced user experiences.

THUNDER
220/200 Gbps 100 44M 10.5M
7440-11 ADC
BY THE NUMBERS
L4/L7 Application
Throughput
GbE
Ports
L4
HTTP RPS
L4 Connections
Per Second

1,023 75 Gbps
Application SSL Bulk
Delivery Throughput*
* With Maximum SSL Partitions (L3V)

INDUSTRY-LEADING Thunder ADC delivers up to an industry-leading 220 Gbps of throughput in a single


PERFORMANCE one-rack unit appliance — or 1.7 Tbps of throughput in a cluster — and features the
broadest range of form factors, including physical, virtual, bare metal multi-tenant
and cloud.

3
REFERENCE ARCHITECTURES

BACKUP DATA CENTER

INTERNET
HARMONY
CONTROLLER
AVAILABILITY SECURITY
GSLB WAF
High Availability DAF
Health Checks AAM (SSO)
Server Load Balancing DDoS Mitigation
ACCELERATION
THUNDER ADC SSL Offload
TCP Reuse
RAM Caching
Compression

WEB APPS DNS ENTERPRISE APPS


ENTERPRISE DEPLOYMENT
Offering up to an industry-leading 220 Gbps of
REMOTE A10 Threat Intelligence Authenticate via throughput in a single one-rack unit appliance,
SERVICES Downloads Third-Party IdP Service
Thunder ADC may be deployed at the core of
an environment to deliver high-performance
application delivery, load balancing and security.

HARMONY CONTROLLER REMOTE DATA CENTER

INTERNET
THUNDER ADC THUNDER ADC DNS SERVERS
Traffic Steering DNS SLB
MOBILE USERS SLB DNS Application Firewall
Service Chaining

SERVICE PROVIDER DEPLOYMENT


THUNDER ADC WEB &
SLB/GSLB APPLICATION
PERSONALIZED VIDEO OTHER
SSL Offload SERVERS Proven in large-scale service provider
CONTENT SERVICES OPTIMIZATION SERVICES
DDoS Mitigation
environments, Thunder ADC may be deployed
to optimize network efficiency and services
via traffic-steering and service-chaining to
multiple value-added services, such as video
TRAFFIC STEERING & ADC FUNCTIONALITY
in a Mobile Service Provider Space
ADC FEATURES
for Service Providers
optimization. The solution includes carrier-grade
networking (CGN) support for IPv4 address
expansion and IPv6 migration.

APPLICATION DELIVERY
PARTITIONS
INTERNAL USERS

ADP 1 ADP 2 ADP N


A10 Thunder ADC supports multi-tenant
environments with application delivery partitions
(ADP). Configure more than 1,000 virtual ADCs
THUNDER ADC
MICROSOFT
ENVIRONMENT
ORACLE
ENVIRONMENT
SAP
ENVIRONMENT
on a single appliance that also enables Layer 3
virtualization. Each partition may be configured
for a unique set of policies and offers sufficient
HARMONY CONTROLLER resource isolation for most application-oriented
use cases.

4
FEATURES

APPLICATION DELIVERY & PERFORMANCE

ADVANCED GLOBAL
SERVER LOAD BALANCING SERVER LOAD BALANCING (GSLB)

Thunder ADC is a full-proxy, load- Extend load balancing on a global basis.


balancing and content-switching solution. Thunder ADCs, distributed worldwide,
With aFleX scripting, deep packet
®
continuously update each other on their
inspection, comprehensive load-balancing respective individual nodes for optimal
algorithms and persistence support, site selection and status to ensure
Thunder ADC enables application layer disaster recovery.
visibility to optimally route inbound
Geographic and network proximity policy
requests.
metrics optimize multi-site deployments.
Customizable server health checks DNS Proxy or DNS Server methods further
ensure only fully functional servers are improve implementation flexibility and
used to service client needs. The server deployment simplicity.
best able to respond is selected and total
servers required can be substantially
reduced for lower TCO.

BROAD HIGH-DENSITY
ACCELERATION METHODOLOGIES
APPLICATION DELIVERY PARTITIONS
Leverage numerous techniques to
Provide support for multi-tenant
overcome inherent distance-related
environments with application
latency, inefficient internet protocols
delivery partitions (ADP). They allow
and application design limitations.
the configuration of more than 1,000
Acceleration methods, including TCP
partitions on a single Thunder ADC
connection multiplexing, RAM caching,
appliance, which enables Layer 3
GZIP compression and SSL-offload,
virtualization. Each partition may be
expedite content transfer. The solution
configured for a unique set of policies
supports TCP optimization standards,
and offers resource isolation for most
such as selective acknowledgment,
application-oriented use cases.
client keep-alive and window scaling, to
further speed delivery.

5
ULTRA LOW
LATENCY
FOR FINANCIAL APPLICATIONS

The Thunder ADC family also offers


solutions for Low Latency applications,
featuring specialized Thunder
appliances, with custom software
to meet the low latency and jitter
requirements of financial applications.
Featuring ultra-low latency hardware,
these appliances offer near
instantaneous execution times and
provide granular program policies
for efficient packet forwarding, while
also consolidating multiple network
functions and thus reducing hops.

APPLICATION SECURITY

EXTENSIVE APPLICATION
CIPHER SUITE SUPPORT AUTHENTICATION & SSO

Hardware-based SSL offload engines The integrated application access


support advanced cryptographic management (AAM) module optimizes
methods at ultra-high capacity. and enforces authentication and
Thunder ADC can manage session authorization to applications.
security, such as Perfect Forward
The module integrates with
Secrecy (PFS), with an advanced
authentication servers, identity data
cipher suite, including elliptic curve
stores, identity providers (IdPs) and
cryptography (ECC).
applications to authenticate users and
Appliances can process SSL enforce access privileges. Common
encryption and decryption at rates AAA and single sign-on (SSO) methods
over 50 Gbps — and up to 90,000 include LDAP, RADIUS, RSA SecurID,
connections per second — when using TDS SQL, SAML and Kerberos.
ECC with 256-bit keys.
AAM interfaces to OCSP responders
to validate client certificate status, as
well as to Microsoft Active Directory
for SharePoint and Outlook Web
Access users.

6
ZERO-DAY POWERFUL
APPLICATION PROTECTION DNS FIREWALL
DNS
An ICSA-certified web application Thunder ADC incorporates a
firewall (WAF) guards vulnerable sophisticated DNS application firewall
software from dozens of application (DAF) to stop buffer overflows,
layer attacks, including the Open Web malformed requests and head off DNS
Application Security Project (OWASP) amplification-based DDoS attacks.
top-10 threats. These attacks include It delivers validated DNSSEC pass-
cross-site request forgery, SQL injection through support to prevent threats such
and buffer overflows that target coding as DNS cache-poisoning and spoofing.
flaws. Integrated into Thunder ADC, the In addition, the ADC can load-balance
WAF blocks these and other application multiple DNS servers and cache DNS
behavior anomaly attacks, as well as responses to provide scalability to DNS
prevents unauthorized data leakage. servers.

SERVER THREAT
DDOS PROTECTION
INTELLIGENCE
DDoS protection is standard in all SERVICE
appliances. With FTA-based hardware
An optional subscription, the A10 Threat
models, using field-programmable
Intelligence Service provides data from
gate arrays (FPGA), protection may
more than three dozen security sources,
be enabled for high-volume attacks
including DShield and Shadowserver.
against application servers. FPGAs
The service enables Thunder ADC to
mitigate common volumetric attacks,
instantly recognize and block traffic to
while general-purpose CPUs mitigate
and from known malicious IP address
more sophisticated low-and-slow and
sources. The service protects networks
application attacks, such as Slowloris
from future threats, blocks threats
and HTTP floods. Additional methods
such as spam and phishing, and greatly
to limit unwarranted data floods include
increases Thunder ADC efficiency.
connection rate limiting and bandwidth
rate limiting per source IP.

CERTIFIED BY The integrated Thunder ADC web application firewall has achieved WAF
ICSA LABS certification from ICSA Labs. ICSA Labs testing and certification ensures
that Thunder ADC performs as intended to secure application services from
exploitation and attack.

SEE ALL CERTIFICATIONS

7
APPLICATION VISIBILITY & MANAGEMENT

RICH FULLY
ANALYTICS AND VISIBILITY
>_ PROGRAMMABLE

When deployed in conjunction with the The Thunder ADC platform leverages
A10 Harmony Controller, Thunder ADC A10’s REST-based aXAPIs to configure
provides access to dozens of aggregate all features with 100 percent API
or per-request metrics in real-time. coverage. This interface is used to
These include end-to-end response integrate with third-party or custom
times, latency, popular URLs, and error management consoles, such as SDN
and health indicators. This data is platforms (e.g., Cisco ACI and VMware)
analyzed to provide per-app reporting and cloud orchestration systems (e.g.,
and alerts on availability, security and OpenStack and Microsoft SCVMM). A
performance. software plug-in is available for private
clouds leveraging vRealize Orchestrator
Detailed Layer 4 based analytics
from VMware.
information is separately provided by
individual clients, ADC (single appliance
or as a cluster) and per server.

SMART COMPREHENSIVE
TEMPLATES MANAGEMENT TOOLS

To optimally deliver server content, the Thunder ADC is supported by the A10
ADC front-ending the application should Harmony Controller; this controller is a
be ‘tuned’ with configurations that best centralized management platform that
fit the needs of that application; that coordinates and distributes application
takes time and iterative efforts to get centric service policies and configuration
the ideal settings. files to hundreds of Thunder appliances
and device cluster infrastructures
Thunder ADCs equipped with
across multi-cloud environments.
AppCentric Templates (ACT) bypass
Administrators can automatically
this step by providing select business-
discover, track and monitor each
critical applications — from Microsoft
appliance including key operational
(e.g., Exchange, Skype for Business
metrics such as CPU and disk usage as
and SharePoint), Oracle and many
well as device partitions and users. The
more — with predefined templates that
controller performs configuration backup
include the key policy settings on a per-
and restore operations and schedules
application basis for rapid deployment.
software upgrades.

8
APPLICATION SERVER VIEW
Thunder ADC with Harmony Controller provides
detailed analytics from the server perspective.
Including server health, response times, number
of new and existing connections. Multiple filtering
options customize the reports.

THUNDER ADC CLUSTER VIEW


Granular real-time reports on the health of the
Thunder ADC may be generated. Information
available includes CPU and memory utilization
rates, bandwidth utilized and total cluster
connections.

CLIENT VIEW
The experience from the end-user perspective
may be measured and reported. Includes end-
to-end latency, app server latency and client
performance.

RESPONSE TIME DETAILS


This information is useful for troubleshooting
delayed application response times. The screen
details the time taken in various portions of
a HTTP transaction. These graphs also help
distinguish application vs. Infrastructure related
issues.

9
THUNDER ADC PHYSICAL APPLIANCE
THUNDER THUNDER THUNDER THUNDER THUNDER

PERFORMANCE 840 ADC 930 ADC 940 ADC 1030S ADC 1040 ADC
Application Throughput (L4/L7) 5 Gbps / 5 Gbps 5 Gbps / 5 Gbps 10 Gbps / 7.5 Gbps 10 Gbps / 10 Gbps 20 Gbps / 20 Gbps

Layer 4 CPS 200K 200K 240k 450K 500K

Layer 4 HTTP RPS 1 Million 1 Million 1 Million 2 Million 2 Million

Layer 4 Concurrent Sessions 16 Million 16 Million 16 Million 32 Million 32 Million

Layer 7 CPS (1:1)*1


50K 50K 75K 150K 180K

SSL Bulk Throughput *2


1 Gbps 1 Gbps 1 Gbps 7 Gbps 9 Gbps

SSL CPS *2
RSA (1K): 2K RSA (1K): 1.9K RSA (1K): 2K RSA (1K): 25K RSA: 15K*7
RSA (2K): 500 RSA (2K): 400 RSA (2K): 1k RSA (2K): 7K ECDSA: 15K*7

DDoS Protection (SYN Flood) SYN/sec 1.7 Million 2 Million 2 Million 4 Million 4 Million

Application Delivery Partitions (ADP) 32 32 32 32 32

NETWORK INTERFACE
1 GE Copper 5 6 5 6 5

1 GE Fiber (SFP) 0 2 0 2 0

1/10 GE Fiber (SFP+) 2 2 4 2 4*8

Management Ports Ethernet Mgmt port, RJ-45 console port

HARDWARE SPECIFICATIONS
Intel Intel Intel
Intel Xeon Intel Xeon
Processor Communications Communications Communications
2-core 4-core
Processor Processor Processor

Memory (ECC RAM) 8 GB 8 GB 8 GB 8 GB 8 GB / 16 GB*4

Storage SSD SSD SSD SSD SSD

Hardware Acceleration Software Software Software Software Software

SSL Security Processor ('S' Models) N/A N/A N/A Yes Yes

1.75 (H) x 17 (W) x 1.75 (H) x 17.5 (W) x 1.75 (H) x 17.5 (W) x 1.75 (H) x 17.5 (W) x 1.75 (H) x 17.5 (W) x
Dimensions (inches)
12 (D) 17.45 (D) 17.25 (D) 17.45 (D) 17.25 (D)

Rack Units (Mountable) 1U 1U 1U 1U 1U

17.8 lbs 14 lbs 18.0 lbs 15 lbs


Unit Weight 8.8 lbs
19.9 lbs (RPS) 16 lbs (RPS) 20.1 lbs (RPS) 17 lbs (RPS)

Single 150W (AC only) Single 600W*6 Single 750W*6 Single 600W*6 Single 750W*6
Power Supply (DC option available)
100 - 240 VAC 50-60Hz 80 Plus Platinum efficiency, 100 - 240 VAC, 50 – 60 Hz

Power Consumption (Typical/Max)*3 57W / 75W 66W / 76W 60W / 80W 98W / 108W 80W / 110W

Heat in BTU/hour (Typical/Max) *3


195 / 256 225 / 259 205 / 273 334 / 369 273 / 376

Cooling Fan Single Fixed Fan Hot Swap Smart Fans Removable Fans Hot Swap Smart Fans Removable Fans

Operating Ranges Temperature 0° - 40° C | Humidity 5% - 95%

FCC Class A, UL, CE, FCC Class A, UL, CE, FCC Class A, UL, CE, FCC Class A, UL, CE, FCC Class A, UL, CE,
TUV, CB, VCCI, CCC, TUV, CB, VCCI, CCC, GS, CB, VCCI, CCC, TUV, CB, VCCI, CCC, GS, CB, VCCI, CCC,
Regulatory Certifications
BSMI, RCM | RoHS MSIP, BSMI, RCM, FAC BSMI^, RCM^ | RoHS KCC, BSMI, RCM, FAC | BSMI^, RCM^ | RoHS
| RoHS RoHS, CC EAL2+

Standard Warranty 90-Day Hardware and Software

10
Thunder ADC Physical Appliance Specifications (Cont.)

THUNDER THUNDER THUNDER

PERFORMANCE 3030S ADC 3040 ADC 3350 ADC


Application Throughput (L4/L7) 30 Gbps / 30 Gbps 30 Gbps / 30 Gbps 40 Gbps / 40 Gbps

Layer 4 CPS 750K 750K 1.2 Million

Layer 4 HTTP RPS 3 Million 3 Million 5 Million

Layer 4 Concurrent Sessions 64 Million 64 Million 64 Million

Layer 7 CPS (1:1)*1 250K 280K 500K

SSL Bulk Throughput *2


11 Gbps 11 Gbps 18 Gbps

SSL CPS *2
RSA (1K): 47K RSA: 30K RSA: 28K*7
RSA (2K): 14K ECDSA: 20K ECDSA: 28K*7

DDoS Protection (SYN Flood) SYN/sec 7.5 Million 8 Million 7.5 Million

Application Delivery Partitions (ADP) 64 64 64 64 127

NETWORK INTERFACE Model C Model E


1 GE Copper 6 6 6 6 6

1 GE Fiber (SFP) 2 2 18 2 2

1/10 GE Fiber (SFP+) 4 4 4 *8


4 + 16
*8
4*8

25 GE Fibers (SFP28) 0 0 0 0 4

40 GE Fiber (QSFP+) 0 0 0 0 4

Management Ports Ethernet Mgmt port, RJ-45 console port,


Ethernet Mgmt port, RJ-45 console port
Lights Out Management

HARDWARE SPECIFICATIONS
Processor Intel Xeon Intel Xeon Intel Xeon Intel Xeon Intel Xeon
4-core 4-core 8-core 8-core 8-core

Memory (ECC RAM) 16 GB 16 GB 16 GB 16 GB 32 GB

Storage SSD SSD SSD

Hardware Acceleration Software Software Software

SSL Security Processor ('S' Models) Yes Yes Yes

Dimensions (inches) 1.75 (H) x 17.5 (W) x 1.75 (H) x 17.5 (W) x
1.75 (H) x 17.5 (W) x 18(D)
17.45 (D) 17.45 (D)

Rack Units (Mountable) 1U 1U 1U

Unit Weight 20.1 lbs 20.6 lbs 18 lbs

Dual 600W RPS Dual 600W RPS Dual 750W RPS


Power Supply (DC option available)
80 Plus Platinum efficiency, 100 - 240 VAC, 50 – 60 Hz

Power Consumption (Typical/Max) *3


131W / 139W 180W / 240W 153W / 220W 159W / 222W 165W / 238W

Heat in BTU/hour (Typical/Max) *3


447 / 474 615 / 819 523 / 751 543 / 758 564 / 831

Cooling Fan Hot Swap Smart Fans

Operating Ranges Temperature 0° - 40° C | Humidity 5% - 95%

Regulatory Certifications FCC Class A, UL, CE,


FCC Class A, UL, CE,
TUV, CB, VCCI, CCC,
CB, GS, VCCI, CCC, KCC,
KCC, BSMI, RCM, EAC, FCC Class A^, UL^, CE^, GS^, CB^, VCCI^, CCC^, BSMI^, RCM^ | RoHS^
BSMI, RCM | RoHS,
FAC | RoHS, CC EAL2+,
FIPS 140-2^|*5
FIPS 140-2*5

Standard Warranty 90-Day Hardware and Software

11
Thunder ADC Physical Appliance Specifications (Cont.)

THUNDER THUNDER THUNDER THUNDER THUNDER

PERFORMANCE 3230 ADC 3430 ADC 4430 ADC 4440 ADC 5330 ADC
Application Throughput (L4/L7) 30 Gbps / 30 Gbps 42 Gbps / 42 Gbps 38 Gbps / 38 Gbps 80 Gbps / 80 Gbps 78 Gbps / 78 Gbps

Layer 4 CPS 1.5 Million 2.5 Million 2.7 Million 2.9 Million 3.1 Million

Layer 4 HTTP RPS 7.5 Million 12 Million 12 Million 15 Million 15 Million

Layer 4 Concurrent Sessions 64 Million 128 Million 128 Million 128 Million 128 Million

Layer 7 CPS (1:1)*1 420K 620K 620K 750K 770K

SSL Bulk Throughput *2


14 Gbps 20 Gbps 20 Gbps 25 Gbps 30 Gbps

SSL CPS *2
RSA: 40K RSA: 45K RSA (1K): 86K RSA: 70K RSA: 70K
ECDSA: 26K ECDSA: 32K RSA (2K): 84K ECDSA: 42K ECDSA: 50K

DDoS Protection (SYN Flood) SYN/sec 55 Million 55 Million 55 Million 166 Million 112 Million

Application Delivery Partitions (ADP) 64 127 127 127 127

NETWORK INTERFACE
1 GE Fiber (SFP) 4 4 0 0 0

1/10 GE Fiber (SFP+) 4 4 16 24 8

40 GE Fiber (QSFP+) 0 0 4 4 0

Management Ports Ethernet Mgmt port, RJ-45 console port, Lights Out Management

HARDWARE SPECIFICATIONS
Processor Intel Xeon Intel Xeon Intel Xeon Intel Xeon Intel Xeon
4-core 6-core 6-core 6-core 10-core

Memory (ECC RAM) 16 GB 32 GB 32 GB 32 GB 32 GB

Storage SSD SSD SSD SSD SSD

Hardware Acceleration FTA-4 FTA-4 FTA-3 2 x FTA-4 FTA-4

SSL Security Processor ('S' Models) Yes Yes Yes Yes Yes

Dimensions (inches) 1.75 (H) x 17.5 (W) x 1.75 (H) x 17.5 (W) x 1.75 (H) x 17 (W) x 1.75 (H) x 17.5 (W) x 1.75 (H) x 17.5 (W) x
17.15 (D) 17.15 (D) 24.6 (D) 30 (D) 17.15 (D)

Rack Units (Mountable) 1U 1U 1U 1U 1U

Unit Weight 23 lbs 23 lbs 25.2 lbs 32.5 lbs 23 lbs

Dual 600W RPS Dual 600W RPS Dual 600W RPS Dual 1100W RPS Dual 600W RPS
Power Supply (DC option available)
80 Plus Platinum efficiency, 100 - 240 VAC, 50 – 60 Hz

Power Consumption (Typical/Max) *3


190W / 240W 210W / 260W 266W / 319W 360W / 445W 210W / 260W

Heat in BTU/hour (Typical/Max)*3 648 / 819 717 / 887 908 / 1,088 1,229 / 1,519 717 / 887

Cooling Fan Hot Swap Smart Fans

Operating Ranges Temperature 0° - 40° C | Humidity 5% - 95%

Regulatory Certifications FCC Class A, UL, CE, FCC Class A, UL, CE, FCC Class A, UL, CE, FCC Class A, UL, CE, FCC Class A, UL, CE,
GS, CB, VCCI, CCC, GS, CB, VCCI, CCC, TUV, CB, VCCI, CCC, GS, CB, VCCI, CCC, KCC, GS, CB, VCCI, CCC,
KCC, BSMI, RCM, NEBS KCC, BSMI, RCM, NEBS KCC, BSMI, RCM, NEBS BSMI, RCM | RoHS, BSMI, RCM, NEBS |
| RoHS | RoHS | RoHS, CC EAL2+ FIPS 140-2^|*5 RoHS

Standard Warranty 90-Day Hardware and Software

12
Thunder ADC Physical Appliance Specifications (Cont.)

THUNDER THUNDER THUNDER THUNDER

PERFORMANCE 5440 ADC 5630 ADC 5840 ADC 5840-11ADC


Application Throughput (L4/L7) 100 Gbps / 100 Gbps 79 Gbps / 78 Gbps 115 Gbps / 113 Gbps 115 Gbps / 113 Gbps

Layer 4 CPS 4 Million 6 Million 6.2 Million 6.2 Million

Layer 4 HTTP RPS 22 Million 32.5 Million 31 Million 31 Million

Layer 4 Concurrent Sessions 256 Million 256 Million 256 Million 256 Million

Layer 7 CPS (1:1)*1 950K 1.5 Million 1.5 Million 1.5 Million

SSL Bulk Throughput*2 45 Gbps 45 Gbps 55 Gbps 55 Gbps

SSL CPS *2
RSA: 100K RSA (1K): 180K RSA: 150K RSA: 150K
ECDSA: 60K RSA (2K): 174K ECDSA: 90K ECDSA: 90K

DDoS Protection (SYN Flood) SYN/sec 166 Million 100 Million 166 Million 166 Million

Application Delivery Partitions (ADP) 1,023 1,023 1,023 1,023

NETWORK INTERFACE
1 GE Fiber (SFP) 0 4 0 0

1/10 GE Fiber (SFP+) 24 24 24 48

40 GE Fiber (QSFP+) 4 4 4 0

100 GE Fiber 0 0 0 4 (QSFP28)

Management Ports Ethernet Mgmt port, RJ-45 console port, Lights Out Management

HARDWARE SPECIFICATIONS
Processor Intel Xeon 2 x Intel Xeon
Intel Xeon 18-core Intel Xeon 18-core
12-core 8-core

Memory (ECC RAM) 64 GB 128 GB 64 GB 64 GB /128 GB*4

Storage SSD SSD SSD SSD

Hardware Acceleration 2 x FTA-4 4 x FTA-2 2 x FTA-4 2 x FTA-4

SSL Security Processor ('S' Models) Yes Yes Yes Yes

Hardware Security Module (HSM) Yes N/A Yes N/A

Dimensions (inches) 1.75 (H) x 17.5 (W) x 30 (D) 5.3 (H) x 16.9 (W) x 28 (D) 1.75 (H) x 17.5 (W) x 30 (D) 1.75 (H) x 17.5 (W) x 30 (D)

Rack Units (Mountable) 1U 3U 1U 1U

Unit Weight 32.5 lbs 72 lbs / 76.5 lbs *4


32.5 lbs 34.3 lbs

Dual 1100W RPS 2+2 1100W RPS Dual 1100W RPS Dual 1500W RPS
Power Supply (DC option available)
80 Plus Platinum efficiency, 100 - 240 VAC, 50 – 60 Hz

Power Consumption (Typical/Max)*3 360W / 445W 780W / 890W 375W / 470W 550W / 760W

Heat in BTU/hour (Typical/Max) *3


1,229 / 1,519 2,661 / 3,037 1,280 / 1,604 1,877 /2,594

Cooling Fan Hot Swap Smart Fans

Operating Ranges Temperature 0° - 40° C | Humidity 5% - 95%

Regulatory Certifications
FCC Class A, UL, CE, GS, CB, FCC Class A, UL, CE, TUV, CB, FCC Class A, UL, CE, GS, CB, FCC Class A, UL, CE, GS,
VCCI, CCC, BSMI, RCM | RoHS, VCCI, KCC^, EAC, FAC | RoHS, VCCI, CCC, BSMI, RCM | RoHS, CB, VCCI, CCC^, BSMI, RCM
FIPS 140-2^|*5 CC EAL2+ FIPS 140-2^|*5 | RoHS^

Standard Warranty 90-Day Hardware and Software

13
Thunder ADC Physical Appliance Specifications (Cont.)

THUNDER THUNDER THUNDER

PERFORMANCE 6440 ADC 7440 ADC 7440-11ADC


Application Throughput (L4/L7) 160 Gbps / 150 Gbps 220 Gbps / 200 Gbps 220 Gbps / 200 Gbps

Layer 4 CPS 5.5 Million 10.5 Million 10.5 Million

Layer 4 HTTP RPS 31 Million 44 Million 44 Million

Layer 4 Concurrent Sessions 256 Million 256 Million 256 Million

Layer 7 CPS (1:1)*1 1.4 Million 2.8 Million 2.8 Million

SSL Bulk Throughput *2


60 Gbps 75 Gbps 75 Gbps

SSL CPS *2
RSA (1K): 180K RSA (1K): 200K RSA (1K): 200K
RSA (2K): 180K RSA (2K): 200K RSA (2K): 200K

DDoS Protection (SYN Flood) SYN/sec 332 Million 332 Million 332 Million

Application Delivery Partitions (ADP) 1,023 1,023 1,023

NETWORK INTERFACE
1/10 GE Fiber (SFP+) 48 48 48

40 GE Fiber (QSFP+) 4 4 0

100 GE Fiber 0 0 4 (QSFP28)

Management Ports Ethernet Mgmt port, RJ-45 console port, Lights Out Management

HARDWARE SPECIFICATIONS
Processor 2 x Intel Xeon 2 x Intel Xeon 2 x Intel Xeon
10-core 18-core 18-core

Memory (ECC RAM) 128 GB 128 GB 128 GB

Storage SSD SSD SSD

Hardware Acceleration 3 x FTA-4 3 x FTA-4 3 x FTA-4

SSL Security Processor ('S' Models) Yes Yes Yes

Hardware Security Module (HSM) N/A N/A N/A

Dimensions (inches) 1.75 (H) x 17.5 (W) x 30 (D) 1.75 (H) x 17.5 (W) x 30 (D) 1.75 (H) x 17.5 (W) x 30 (D)

Rack Units (Mountable) 1U 1U 1U

Unit Weight 36 lbs 36 lbs 37 lbs

Dual 1100W RPS Dual 1100W RPS Dual 1500W RPS


Power Supply (DC option available)
80 Plus Platinum efficiency, 100 - 240 VAC, 50 – 60 Hz

Power Consumption (Typical/Max)*3 480W / 550W 690W / 820W 820W / 950W

Heat in BTU/hour (Typical/Max) *3


1,638 / 1,877 2,355 / 2,798 2,798 / 3,242

Cooling Fan Hot Swap Smart Fans

Operating Ranges Temperature 0° - 40° C | Humidity 5% - 95%

Regulatory Certifications
FCC Class A, UL, CE, GS, CB, VCCI, CCC, FCC Class A, UL, CE, GS, CB, VCCI, CCC, FCC Class A, UL, CE, GS, CB, VCCI, CCC^,
BSMI, RCM | RoHS KCC, BSMI, RCM | RoHS, FIPS 140-2*5 KCC^, BSMI, RCM | RoHS^, FIPS 140-2^|*5

Standard Warranty 90-Day Hardware and Software

The specifications, performance numbers are subject to change without notice, and may vary depending on configuration and environmental conditions.
As for network interface, it’s highly recommended to use A10 Networks qualified optics/transceivers to ensure network reliability and stability.

*1 Layer 7 connections per second - measures number of new HTTP connections (1 HTTP request per TCP connection, without TCP connection reuse ) within 1 second | *2 Tested
with maximum SSL option. Products showing both RSA and ECDSA are tested using 3rd generation SSL card(s). Cipher “TLS_RSA_WITH_AES_128_CBC_SHA256” with RSA 2K keys,
unless noted, are used for RSA cases, “TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256” with EC P-256 are used for PFS cases. | *3 With base model. Number varies by SSL model |
*4 With maximum SSL option | *5 For FIPS 140-2 Level 2 validated, FIPS models must be purchased | *6 Optional RPS available | *7 Tested with session ticket TLS extension enabled
on the 4th gen SSL model (QSSL) | *8 10Gbps speed only | ^ Certification in process

14
THUNDER ADC SPE PHYSICAL APPLIANCE
THUNDER THUNDER

PERFORMANCE 4435 SPE 5435 SPE


Application Throughput (L4/L7) 38 Gbps / 38 Gbps 78 Gbps / 77 Gbps

Layer 4 CPS 3.1 Million 3.7 Million

Layer 4 HTTP RPS 12 Million 20 Million

Layer 4 Concurrent Sessions 128 Million 256 Million

Layer 7 CPS (1:1)*1 660K 790K

SSL Bulk Throughput (RSA 2K keys) *2


26 Gbps 37 Gbps

SSL CPS (RSA 2K keys) *2


65K 65K

DDoS Protection (SYN Flood) SYN/sec 55 Million 112 Million

Application Delivery Partitions (ADP) 1,023 1,023

NETWORK INTERFACE
1/10 GE Fiber (SFP+) 16 16

40 GE Fiber (QSFP+) 0 4

Management Ports Ethernet Mgmt port, RJ-45 console port, Lights Out Management

HARDWARE SPECIFICATIONS
Processor (Intel Xeon) 10-core 10-core

Memory (ECC RAM) 64 GB 64 GB

Storage SSD SSD

Hardware Acceleration FTA-3, SPE 2 x FTA-3, SPE

SSL Security Processor ('S' Models) N/A N/A

Dimensions (inches) 1.75 (H) x 17.5 (W) x 30 (D) 1.75 (H) x 17.5 (W) x 30 (D)

Rack Units (Mountable) 1U 1U

Unit Weight 34.5 lbs 35.5 lbs

Dual 1100W RPS Dual 1100W RPS


Power Supply (DC option available)
80 Plus Platinum efficiency, 100 - 240 VAC, 50 – 60 Hz

Power Consumption (Typical/Max)*3 350W / 420W 400W / 480W

Heat in BTU/hour (Typical/Max)*3 1,195 / 1,433 1,365 / 1,638

Cooling Fan Hot Swap Smart Fans

Operating Ranges Temperature 0° - 40° C | Humidity 5% - 95%

Regulatory Certifications FCC Class A, UL, CE, TUV, CB, VCCI, CCC, MSIP, BSMI, FCC Class A, UL, CE, TUV, CB, VCCI, CCC, BSMI, RCM,
RCM, EAC, NEBS | RoHS EAC, NEBS | RoHS

Standard Warranty 90-Day Hardware and Software

The specifications, performance numbers are subject to change without notice, and may vary depending on configuration and environmental conditions.
As for network interface, it’s highly recommended to use A10 Networks qualified optics/transceivers to ensure network reliability and stability.
*1 Layer 7 connections per second - measures number of new HTTP connections (1 HTTP request per TCP connection, without TCP connection reuse ) within 1 second
*2 Tested with maximum SSL option, using cipher “TLS_RSA_WITH_AES_128_CBC_SHA” with RSA 2K keys | *3 With base model. Number varies by SSL model
*4 With maximum SSL option

15
THUNDER ADC FOR LOW LATENCY
PHYSICAL APPLIANCE
THUNDER

PERFORMANCE 4435
Mean Latency L7 3.9 µs

Max Latency L7 4.2 µs

Jitter L7 0.4 µs

Concurrent NAT Sessions 32,000

NETWORK INTERFACE
1/10 GE Fiber (SFP+) 16

Management Ports Ethernet Mgmt port, RJ-45 console port, Lights Out Management

HARDWARE SPECIFICATIONS
Processor (Intel Xeon) 10-core

Memory (ECC RAM) 64 GB

Storage SSD

Hardware Acceleration FTA-3, SPE

Dimensions (inches) 1.75 (H) x 17.5 (W) x 30 (D)

Rack Units (Mountable) 1U

Unit Weight 34.5 lbs

Dual 1100W RPS


Power Supply (DC option available)
80 Plus Platinum efficiency, 100 - 240 VAC, 50 – 60 Hz

Power Consumption (Typical/Max) 350W / 420W

Heat in BTU/hour (Typical/Max) 1,195 / 1,433

Cooling Fan Hot Swap Smart Fans

Operating Ranges Temperature 0° - 40° C | Humidity 5% - 95%

Regulatory Certifications FCC Class A, UL, CE, TUV, CB, VCCI, CCC, MSIP, BSMI, RCM, EAC, NEBS | RoHS

Standard Warranty 90-Day Hardware and Software

The specifications, performance numbers are subject to change without notice, and may vary depending on configuration and environmental conditions.
As for network interface, it’s highly recommended to use A10 Networks qualified optics/transceivers to ensure network reliability and stability.

16
vTHUNDER ADC VIRTUAL APPLIANCE
vTHUNDER ADC

Supported Hypervisors VMware ESXi 5.0 or higher (VMXNET3, SR-IOV, PCI Passthrough)
KVM QEMU 1.0 or higher (VirtIO, OvS with DPDK, SR-IOV, PCI Passthrough)
Microsoft Hyper-V on Windows Server 2008 R2 or higher

Hardware Requirements See installation guide

Standard Warranty 90-Day Software

Bandwidth Licenses Lab 200 Mbps 1 Gbps 4 Gbps 8 Gbps 10 Gbps 20 Gbps 40 Gbps 100 Gbps FlexPool

VMware ESXi *1 *1|*2 *2


Yes

*1 *1|*2 *2
KVM • • • • • Yes

+
Microsoft Hyper-V • • • • •+ Yes

*1
SR-IOV
*2
PCI Passthrough
+
8 Gbps license not recommended for Microsoft Hyper-V

vTHUNDER ADC FOR CLOUD AWS MICROSOFT AZURE ORACLE


Throughput Up to 10 Gbps Up to 10 Gbps Up to 10 Gbps

Image Format Amazon AMI Microsoft VHD QCOW2

Licenses 30-days Trial License 30-days Trial License 30-days Trial License
Pre-installed Bnadwidth License: Pre-installed Bandwidth License: Pre-installed OCPU based License:
- 200 Mbps, 500 Mbps, 1 Gbps - 10 Mbps, 50 Mbps, 100 Mbps, - 1 OCPU to 24 OCPU
BYOL Bandwidth License: 200 Mbps, 500 Mbps BYOL Bandwidth License:
- Lab/Developer, 200 Mbps, 1 Gbps, BYOL Bandwidth License: - Lab/Developer, 200 Mbps, 1 Gbps,
4 Gbps, 10 Gbps - Lab/Developer, 200 Mbps, 500 Mbps, 4 Gbps, 10 Gbps
FlexPool License: 1 Gbps, 4 Gbps, 10 Gbps FlexPool License:
- Up to 10 Gbps FlexPool License - Up to 10 Gbps
- Up to 10 Gbps

THUNDER ADC FOR BARE METAL

System Requirements Minimum Hardware Requirement


• Intel x86-based CPUs with minimum of 4 cores
• 16 GB RAM
• 80 GB of free disk space
• 2 Ethernet interfaces (3 or more are recommended)
• Intel Network Adapters and drivers including igb, ixgbe, and i40e.

Reference Platforms Cisco UCS, Dell PowerEdge, Ericsson Hyperscale Datacenter System (HDS), HP ProLiant and more.

Bandwidth Licenses* 10 Gbps (4 cores), 20 Gbps (8 cores), 40 Gbps (14 cores) and 60 Gbps (24 cores)
FlexPool

Standard Warranty 90-Day Software

* Licenses are tied with maximum number of cores which can be allocated to ACOS

17
THUNDER ADC FOR CONTAINER
Image Format Docker

Operating System Reference Operating System:


• Ubuntu 16.04.3 LTS (Xenial Xerus)
• RedHat Enterprise Linux version 7.6

System Requirements Minimum requirement:


• 1 or more data interface
• 1 vCPU and 4GB memory

Licenses BYOL Bandwidth License:


• Up to 100 Gbps
FlexPool License:
• Up to 100 Gbps

Standard Warranty 90-Day Software

DETAILED FEATURE LIST


Features may vary by appliance.

Application Delivery • High Availability – Active-Active, - RAM Caching


• Comprehensive IPv4/IPv6 Support Active-Standby configurations
- HTTP Compression
• Advanced Layer 4/Layer 7 Server • SIP Load Balancing for VoIP
• SSL Offload
Load Balancing • STARTTLS support for Secure
- SSL Termination, SSL Bridging
- Fast HTTP, Full HTTP Proxy Email & LDAP
- SSL Proxy
- High-performance, template- • Network Traffic Filtering – high-
speed processing of large black/ - SSL session ID reuse
based Layer 7 switching
with header/URL/domain white lists • TCP optimization support
manipulation • Firewall Load Balancing (FWLB) including Selective
Acknowledgment, Client Keep-
- Comprehensive Layer 7 • Global Server Load Balancing
Alive and Window Scaling
application persistence support (GSLB)
• HTTP Pipelining support
- HTTP/2, FTP, DNS, FIX and more • Traffic steering/Service chaining
• HTTP/2, SPDY protocol support
• Comprehensive load balancing • Transparent Cache Switching
methods (TCS)
- Round Robin, Least Connections, • Next Hop Load Distribution Application Security
Weighted RR, Weighted LC, (NHLD) for load balancing multiple
• Web Application Firewall (WAF)
Fastest Response, & more links
• DNS Application Firewall (DAF)
• aFleX – deep packet inspection • Diameter AAA Load Balancing
and transformation for • Integrated DDoS protection for
• Database Load Balancing
customizable, application-aware application services
switching • Internet Content Adaptation
• Hardware-based DDoS protection*
Protocol (ICAP) support
• Advanced Health Monitoring • Application Access Management
- Comprehensive Protocol Support (AAM) — SAML, WIA, Kerberos,
– ICMP, TCP, UDP, HTTP, HTTPS, Application Acceleration NTLM, TDS SQL Logon, LDAP,
FTP, RTSP, SMTP, POP3, SNMP, RADIUS, Basic, OCSP stapling,
• HTTP Acceleration and
DNS, RADIUS, LDAP and more HTML Form-based
Optimization
- Scriptable health check support • AAM RADIUS-based audit support
- HTTP Connection Multiplexing
using TCL, Python, Perl, Bash
(also called TCP connection reuse)

18
Detailed Feature List (Cont.)

• Single sign-on (SSO) Networking Controller for centralized


authentication relay management, configuration
• Integrated Layer 2/Layer 3
and analytics
• Authentication for Microsoft
• Transparent Mode/Gateway Mode
SharePoint, Outlook Web Access, • Plug-in available for VMware
and other packaged and custom • Routing – Static Routes, IS-IS (v4/ vRealize Orchestrator
applications v6), RIPv2/ng, OSPF v2/v3, BGP4+ deployments
• Comprehensive SSL/TLS support • VLAN (802.1Q)
- TLS 1.2 and TLS 1.3 support • Link Aggregation (802.1AX), LACP Virtualization
- Perfect Forward Secrecy (PFS) • Access Control Lists (ACLs) • aVCS (Virtual Chassis System)
with Elliptic Curve Diffie-Hellman • Traditional IPv4 NAT/NAPT • vThunder virtual appliance for
Exchange (ECDHE) and other
• IPv6 NAPT VMware vSphere ESXi, Microsoft
Elliptic Curve Cryptography
Hyper-V, KVM (VirtIO, Open
(ECC) ciphers • Jumbo Frame support*
vSwitch with DPDK and
- AES-NI and GCM ciphers • Hardware-accelerated VXLAN* SR-IOV), Nutanix AHV, Amazon
• IP Anomaly Detection • NVGRE Web Services (AWS) AMI,
Microsoft Azure VHD and QCOW2
• Connection Rate Limiting/
for Oracle Cloud and other
Connection Limiting
IPv6 Migration/IPv4 • Thunder ADC for Bare Metal
• Bandwidth Rate Limiting per
Preservation • Thunder ADC for containers
Source IP
• Full native IPv6 management and
• Dynamically add IPs to Black- • Multi-tenancy with Application
feature support
White Lists Delivery Partitions (ADP)
• SLB-PT (Protocol Translation),
• Support for Simple Certificate - Partition-based management
SLB-64 (IPv4<–>IPv6,
Enrollment Protocol (SCEP) - L3 virtualization
IPv6<–>IPv4)
• Hardware Security Module (HSM) • Hypervisor acceleration and
• Carrier Grade NAT (CGN/CGNAT),
support management integration
Large Scale NAT (LSN), NAT444,
- Internal HSM card* NAT44, NAT46
- External network HSM (Thales - Integrated DDoS protection for
Visibility and Analytics with
nShield HSM) NAT pools
Harmony Controller
• NAT64/DNS64, DS-Lite, 6rd,
LW4o6 Performance / Acceleration
A10 Threat Intelligence
Service** • ALG protocol support for protocols • End-to-end response times
with dynamic ports like SIP and
• Dynamically updated threat • Total bytes exchanged (BW)
FTP
intelligence feed • Average request-rate-per-second
• Worst-behaving URLs, services
Management and domains
Scalable, High-Performance
• Dedicated on-box management
Platform • Cache hits and misses as time
interface (GUI, CLI, SSH, Telnet) series
• Advanced Core Operating System
• Web-based AppCentric Templates • Compressed and uncompressed
(ACOS)
(ACT) support bytes sent as a time series
- Multi-core, Multi-CPU support
• SNMP, syslog, email alerts, • Latency
- Linear application scaling NetFlow v9 and v10 (IPFIX), sFlow
- Average end-to-end latency
- ACOS on data plane • RESTful API (aXAPI)
- App server latency
• Linux on control plane • LDAP, TACACS+, RADIUS support
- Client performance
• IPv6 feature parity • Configurable control CPUs
- Partition service latency
• Interoperable with A10 Harmony

19
Detailed Feature List (Cont.)

Traffic - Top clients by: Bandwidth, Carrier-Grade Hardware*


Connections, Throughput
• Popular URLs, services and • Advanced hardware architecture
domains • Thunder ADC
• Hardware-based SYN Cookies
• Requests by response codes - Dropped traffic, errors/failures,
• Hot swap Redundant Power
anomalies
• Geographical request distribution Supplies (AC or DC)
- Load distribution by server
• Secure versus open requests • Smart Fans (hot swap)
- TCP SYN: received, rates
• Most active clients • Solid-state drive (SSD)
- DSR received
• Number of connections to • Tamper detection
application server • Thunder Cluster
• Lights Out Management (LOM/
• Number of connections from - Average cluster CPU by device IPMI)
clients and partition
• 25 GbE ports, 40 GbE ports, 100
- Average cluster memory GbE ports
Errors and Health Indicators
- Average and peak throughput • High-performance security
• Time series of total bytes in and
out from each server - Connections processor option

• Time series of traffic rates (in • Application Servers


Mbps) in and out from each server - Server health over time Security and Capability
• Percent of error traffic over range - Traffic by server: Connections/ Assurance Certifications*
• Number of good SSL connections rates, throughput, bytes and • ICSA Labs WAF Certification
packets received/sent
• Average application server latency • Common Criteria EAL 2+
by service - Logs: Normal, errors, anomalies
• FIPS 140-2 Level 2
with filters by protocol, client, VIP
• Client-side latency SRTT, max, min • Joint Interoperability Test
and average as a time series - Server response times
Command (JITC)

TCP-Based Analytics • Network Equipment Building


System (NEBS) compliance
• Client
- Bytes and packets sent/
received; Connections
- Errors and failures

* Features and certifications may vary by


appliance.
** Additional paid service.

LEARN MORE ©2019 A10 Networks, Inc. All rights reserved. A10 Networks, the A10 Networks logo, ACOS, Thunder and SSL Insight
are trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries. All other
trademarks are property of their respective owners. A10 Networks assumes no responsibility for any inaccuracies
ABOUT A10 NETWORKS in this document. A10 Networks reserves the right to change, modify, transfer, or otherwise revise this publication
without notice. For the full list of trademarks, visit: www.a10networks.com/a10-trademarks.
C O NTACT US
a10networks.com/contact Part Number: A10-DS-15100-EN-42 DEC 2019

20

You might also like