Application Delivery

Thunder ADC
Application Delivery

A10 Networks® Thunder® ADC product line of high-performance, next-generation application delivery controllers enable customers’ applications to be highly available, accelerated and secure.

  • Application availability
  • Application acceleration
  • Security for compliance
  • Visibility into traffic
A10 Networks Thunder ADC Application Delivery

A10 Thunder Series is a family of hardware and software appliances ready to match any deployment need. Each Thunder Series form factor is powered by ACOS software, which brings a unique combination of shared memory accuracy and efficiency, 64-bit scalability and advanced flow processing.

Thunder ADC is A10 Networks premium ADC product line, delivering up to 220 Gbps of throughput in a single appliance or 1.7 Tbps of throughput in a cluster, the broadest range of form factors (physical, virtual, Bare Metal, and hybrid), and with expanded system resources designed to support future feature needs.

The A10 Thunder ADC product line is built upon A10’s Advanced Core Operating System ( ACOS® ) platform, with their Symmetric Scalable Multi-Core Processing (SSMP) software architecture that delivers high performance and a range of deployment options for dedicated, hosted or cloud data centers.

  • Application availability for customer satisfaction: Enable your Web and key infrastructure servers to scale seamlessly to meet customer demand and ensure business continuity to maximize revenue and user satisfaction.
  • Application acceleration for efficient operations: Provide fast and responsive service to your customers for competitive advantage and reduced infrastructure requirements for both application delivery and critical services, driving down CAPEX and OPEX.
  • Security for compliance and risk reduction: Protect against advanced and emerging attacks for uninterrupted operations, brand protection, and revenue loss while meeting required regulatory compliance obligations for Payment Card Industry Data Security Standard (PCI DSS) and other regulations.
  • Visibility into traffic profiles: Thunder ADCs feed information in real-time to the A10 Harmony Controller. Administrators gain insight and visibility into key performance indicators, receive alerts and notifications on availability, performance and security such as popular URLs, application health, and performance metrics and obtain complete report generation. This allows them to quickly cross reference indicators and troubleshoot root causes of issues they may be encountering.

A10 Thunder ADC delivers critical services in the most efficient hardware and software models. With its data center-efficient design and compact form factor, Thunder ADC minimizes your rack space, power consumption, and cooling costs.

While the Thunder ADC platform provides a rich set of application and security services out-of-the-box, it also supports open and standards-based programmability, which allows developers to rapidly integrate custom and off-the-shelf services with Thunder ADC. The A10 Harmony architecture combines open programmability, policy enforcement, and telemetry to deliver the next generation of application networking.

Highly available applications and data centers: Advanced server load balancing (SLB) and global server load balancing (GSLB) ensure maximum uptime by detecting local and remote outages. Acting on advanced health checks, A10 Thunder ADC directs connections to active servers and data centers in a way that is transparent to the end user.

  • Next-generation cloud data center evolution: Equip your network for the next phase in network evolution with Infrastructure-as-a-Service (IaaS) capabilities. Benefit from integration of software defined networks (SDNs) with overlay networking (VXLAN and NVGRE), cloud orchestration systems (OpenStack, Microsoft SCVMM, Cisco ACI, and more), network functions virtualization (NFV) using vThunder virtual appliances, and enable service chaining and traffic insertion.
  • Fast deployment and proven application configuration and provisioning: Rapidly enable and deploy business critical applications with predefined smart templates for popular applications from Microsoft (Exchange, Skype for Business, SharePoint), Oracle and many more, to deploy in hours, not days or week.

Provide fast and responsive service to your end-users for a competitive advantage. Reduce infrastructure requirements for both application delivery and critical services, driving down CAPEX and OPEX.

  • Application acceleration for a better user experience and infrastructure utilization: Offload application infrastructure from CPU and memory intensive tasks to reduce costs. Techniques include SSL offload (including offload of demanding 2048- and 4096-bit key operations ECDHE, and Perfect Forward Secrecy), HTTP compression, support for SPDY, TCP reuse, and RAM caching. Deliver a faster experience for your customers and reduced CAPEX and OPEX as your infrastructure scales efficiently without wasted compute cycles.
  • Virtualization for ADC and SLB consolidation: Choose the best option for your network to enable multi-tenancy. Maximize density with our Application Delivery Partitions (ADP), allowing you to configure up to 1,023 virtual ADCs on a single Thunder ADC appliance that support Layer 3 virtualization. Rapidly deploy pure software vThunder appliances or Hybrid Virtual Appliances (HVA) to provide strong isolation and complete resource isolation as required.
  • Full control and deep packet inspection (DPI) capabilities to solve complex problems: aFleX® TCL scripting provides granular traffic transformation capabilities to adjust traffic as needed for your applications. Additionally, advanced ADC capabilities enable the most common requirements to be met with specific preconfigured templates and capabilities, for example L7 URL switching.
  • Flexible management to optimize IT operations: Multiple management capabilities simplify operation tasks using the aGalaxy centralized management system to control any A10 Thunder device, whether pushing configurations, aFleX rules providing 100 percent coverage, backing up SSL keys and much more. Our aXAPI® REST-based API gives complete management control with custom scripting for homegrown management operations or integration into third-party management systems. Also, plug-ins and packages are available to be used with partners’ management systems such as Microsoft SCVMM and others.

Protect against advanced and emerging attacks for uninterrupted operations, brand protection and revenue loss - all while meeting regulatory compliance obligations.

  • Elastic Web application firewall (WAF). Use advanced rule sets to protect against top OWASP vulnerabilities such as SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), plus gain application-specific security rules for popular applications like WordPress, Joomla, Microsoft Outlook Web Access (OWA), etc.
  • Defend against attacks. Deploy advanced security to protect against malware, malicious botnets and application-layer DDoS attacks. Monitors traffic parameters to identify and protect your business from application-layer DDoS, botnet attacks and malware. Safe user traffic is permitted while the system identifies and blocks malicious traffic before it can impact app server resources and availability.
  • Access control. Using any information available in the HTTP request (e.g., IP subnet, country, browser or any custom parameter), access control can be exercised and the user can be either blocked or can be asked to prove the identity.

Ensure your organization has complete visibility and control. Provide data-driven insights and actions improve cloud application performance and health.

  • Per-application analytics. Use insights and analytics at the application level to help application owners proactively identify issues, troubleshoot faster and quickly build capacity plans.
  • Comprehensive reporting, visualization and analysis. Gain deeper insights into a specific metric, time range or correlation. The application dashboard gives access to a broad range metrics for application traffic, security, performance and health.
  • Centralized access logs. Get to the root of any issue - and begin remediation efforts - with application access logs that empower application owners to easily get to the root of any issue.
  • Alerts. Program the system to raise alerts in various conditions or a combination of conditions. Alerts are delivered via email for manual action and/or to a webhook URL for automation.

A10 Thunder ADC Product Line

A10 Thunder ADC is a family of hardware and software appliances ready to match any deployment need. Each Thunder ADC form factor is powered by ACOS software, which brings a unique combination of shared memory accuracy and efficiency, 64-bit scalability and advanced flow processing.

  • Thunder SPE Appliances: The Thunder SPE appliances deliver ultra high-speed Security and Policy Enforcement for your most demanding application networking and security requirements. Thunder SPE appliances leverage A10’s innovative Security and Policy Engine (SPE) to implement security and policy enforcement functions at higher speed, harnessing the power of advanced Flexible Traffic Acceleration (FTA) technology and high speed lookup capabilities. In addition, Thunder SPE is a future-proof design capable of enabling an expanded set of security and policy enforcements. All models are dual power supply-capable, feature solid-state drives (SSDs) and utilize no inaccessible moving parts for high availability. Thunder SPE appliances offer the best performance per rack unit coupled with high density interface 1 GbE, 10 GbE, 40 GbE and 100 GbE port options and the highest level “80 PLUS Platinum” certification for power supplies to ensure a green solution and reduce power consumption costs.
  • Thunder Hardware Appliances: The A10 Thunder ADC GSLB line of appliances fits all sizes of networks, starting with entry level models and moving up to high performance appliance for your most demanding requirements. All models are dual power supply-capable*, feature solid-state drives (SSDs) and use no inaccessible moving parts for high availability. All models benefit from our Flexible Traffic Acceleration (FTA) technology, with select models featuring field programmable gate arrays (FPGAs) for hardware optimized FTA processing; this provides highly scalable flow distribution and distributed denial of service (DDoS) protection capabilities. Select models include dedicated security processors for SSL offload, switching and routing processors for high-speed network processing, and lights-out management (LOM) support for out-of-band monitoring and management. Each appliance offers the best performance per rack unit and the highest level “80 PLUS Platinum” certification * for power supplies to ensure a green solution and reduce power consumption costs. Coupled with high density 1 GbE, 10 GbE, 40 GbE, and 100 GbE port options, Thunder ADC meets the highest networking bandwidth demands.
  • vThunder Virtual Appliances: The vThunder® ADC line of virtual appliances is designed to meet the growing needs of organizations requiring a flexible and easy-to-deploy application delivery and server load balancer solution running within a virtualized infrastructure or public cloud service. Each vThunder instance has a full set of features that can run atop your choice of commodity hardware and also your choice of leading hypervisor; for example, VMware ESXi, Microsoft Hyper-V, and KVM. vThunder ADC for Amazon Web Services (AWS) and Microsoft Azure are also available for cloud deployments.
  • Thunder ADC for Bare Metal: This family of high-performance software appliances provide complete ADC functionality that is tied to a dedicated server. With no need for an intervening hypervisor, the resulting throughput of up to 40 Gbps of Layer 7 traffic processing is optimized. As with vThunder, the Bare Metal option eases installations. Large enterprise, service providers and Web hosting operations are ideal environments that can leverage the flexibility afforded by Bare Metal.
  • Thunder Hybrid Virtual Appliances (HVA): Offering you the combined flexibility of a virtual appliance and the power of the performance optimized hardware appliances, A10 Thunder HVA appliances enable multi-tenancy with multiple vThunder virtual appliances running on dedicated, turnkey hardware appliances with a high density of instances that are strongly isolated from each other, each with its own dedicated ACOS instance and dedicated compute resources. The fact that each instance can use dedicated SSL security processor technology with Single Root I/O Virtualization (SR- IOV) to offload and accelerate SSL sessions is a key hardware advantage. All vThunder ADC instances are included within the HVA appliance.

Additional management options are also available to enhance your Thunder ADC infrastructure. A10’s aGalaxy® line of hardware and software appliances centrally manage all Thunder ADC hardware and software appliances for streamlined operations, resulting in reduced OPEX.

Hardware Specifications

A10's Thunder Series line of hardware appliances fits a wide variety of networks with entry level models starting at 5 Gbps and moving up to 220 Gbps high-performance appliance for your most demanding requirements.

Thunder ADC Hardware SPECIFICATIONS Thunder
840
Thunder
930
Thunder
1030S
Thunder
3030S
Thunder
3040
Thunder
3230
Thunder
3430
Thunder
4430
Thunder
4435 SPE
Thunder
4440
Thunder
5330
Application Throughput (L4/L7) 5 Gbps / 5 Gbps 5 Gbps / 5 Gbps 10 Gbps / 10 Gbps 30 Gbps / 30 Gbps 30 Gbps / 30 Gbps 30 Gbps / 30 Gbps 42 Gbps / 42 Gbps 38 Gbps / 38 Gbps 38 Gbps / 38 Gbps 80 Gbps / 80 Gbps 78 Gbps / 78 Gbps
Layer 4 CPS 200k 200k 450k 750k 750k 1.5 million 2.5 million 2.7 million 3.1 million 2.9 million 3.1 million
Layer 4 HTTP RPS 1 million 1 million 2 million 3 million 3 million 7.5 million 12 million 12 million 12 million 15 million 15 million
Layer 4 Concurrent Sessions 16 million 16 million 32 million 64 million 64 million 64 million 128 million 128 million 128 million 128 million 128 million
Layer 7 CPS (1:1)*1 50k 50k 150k 250k 280k 420k 620k 620k 660k 750k 770k
SSL Bulk Throughput*2 1 Gbps 1 Gbps 7 Gbps 11 Gbps 11 Gbps 14 Gbps 20 Gbps 20 Gbps 26 Gbps 25 Gbps 30 Gbps
SSL CPS*2|*3 RSA (1K): 2k
RSA (2K): 500
RSA (1K): 1.9k
RSA (2K): 400
RSA (1K): 25k
RSA (2K): 7k
RSA (1K): 47k
RSA (2K): 14k
RSA: 30k
ECDSA: 20k
RSA: 40k
ECDSA: 26k
RSA: 45k
ECDSA: 32k
RSA (1K): 86k
RSA (2K): 84k
RSA (1K): 120k
RSA (2K): 65k
RSA: 70k
ECDSA: 42k
RSA: 70k
ECDSA: 50k
DDoS Protection (SYN Flood) SYN/sec 1.7 million 2 million 4 million 7.5 million 8 million 55 million 55 million 55 million 55 million 166 million 112 million
Application Delivery Partitions (ADP) L3V 32 32 32 64 64 64 127 127 1,023 127 127
Network Interfaces  
1 GE Copper 5 6 6 6 6 0 0 0 0 0 0
1 GE Fiber (SFP) 0 2 2 2 2 4 4 0 0 0 0
1/10 GE Fiber (SFP+) 2 2 2 4 4 4 4 16 16 24 8
40 GE Fiber (QSFP+) 0 0 0 0 0 0 0 4 0 4 0
100 GE Fiber (CXP) 0 0 0 0 0 0 0 0 0 0 0
Thunder ADC Hardware SPECIFICATIONS Thunder
5430-11
Thunder
5435 SPE
Thunder
5440
Thunder
5630
Thunder
5840
Thunder
6430
Thunder
6435 SPE
Thunder
6440
Thunder
6630
Thunder
6635 SPE
Thunder
7440
Application Throughput (L4/L7) 79 Gbps / 78 Gbps 78 Gbps / 77 Gbps 100 Gbps / 100 Gbps 79 Gbps / 78 Gbps 115 Gbps / 113 Gbps 150 Gbps / 145 Gbps 153 Gbps / 150 Gbps 160 Gbps / 150 Gbps 150 Gbps / 145 Gbps 150 Gbps / 145 Gbps 220 Gbps / 200 Gbps
Layer 4 CPS 3.7 million 3.7 million 4 million 6 million 6.2 million 5.3 million 7.1 million 5.5 million 7.1 million 7.1 million 10.5 million
Layer 4 HTTP RPS 20 million 20 million 22 million 32.5 million 31 million 31 million 38 million 31 million 38 million 38 million 44 million
Layer 4 Concurrent Sessions 256 million 256 million 256 million 256 million 256 million 256 million 256 million 256 million 256 million 256 million 256 million
Layer 7 CPS (1:1)*1 790k 790k 950k 1.5 million 1.5 million 1.35 million 1.6 million 1.4 million 1.6 million 1.6 million 2.8 million
SSL Bulk Throughput*2 30 Gbps 37 Gbps 45 Gbps 45 Gbps 55 Gbps 46 Gbps 60 Gbps 60 Gbps 64 Gbps 64 Gbps 75 Gbps
SSL CPS*2|*3 RSA (1K): 111k
RSA (2K): 110k
RSA (1K): 120k
RSA (2K): 65k
RSA: 100k
ECDSA: 60k
RSA (1K): 180k
RSA (2K): 174k
RSA: 150k
ECDSA: 90k
RSA (1K): 134k
RSA (2K): 130k
RSA (1K): 170k
RSA (2K): 135k
RSA (1K): 180k
RSA (2K): 180k
RSA (1K): 190k
RSA (2K): 174k
RSA (1K): 190k
RSA (2K): 174k
RSA (1K): 200k
RSA (2k): 200k
DDoS Protection (SYN Flood) SYN/sec 112 million 112 million 166 million 100 million 166 million 223 million 223 million 332 million 223 million 223 million 332 million
Application Delivery Partitions (ADP) L3V 1,023 1,023 1,023 1,023 1,023 1,023 1,023 1,023 1,023 1,023 1,023
Network Interfaces  
1 GE Copper 0 0 0 0 0 0 0 0 0 0 0
1 GE Fiber (SFP) 0 0 0 4 0 0 0 0 0 0 0
1/10 GE Fiber (SFP+) 16 16 24 24 24 16 16 48 12 12 48
40 GE Fiber (QSFP+) 4 4 4 4 4 4 4 4 0 0 4
100 GE Fiber (CXP) 0 0 0 0 0 0 0 0 4 4 0
  • *1 Layer 7 connections per second - measures number of new HTTP connections (1 HTTP request per TCP connection, without TCP connection reuse ) within 1 second
  • *2 With maximum SSL
  • *3 Cipher "AES128-SHA256" with RSA 2K keys, unless noted, are used for RSA cases, "ECDHE-ECDSA-AES128-SHA256" with EC P-256 are used for PFS cases