A10 DS Thunder TPS
A10 DS Thunder TPS
A10 DS Thunder TPS
Thunder TPS
DDoS Detection, Mitigation & Cloud Protection
Platforms
A10 Thunder TPS® (Threat Protection System) is the world’s and Services
highest-performance DDoS protection solution, leading the
industry in precision, intelligent automation, scalability, Thunder TPS
Physical Appliance
and performance.
V
New threat vectors have changed the breadth, centralized mitigation that delivers fast
intensity, and complexity of options available and cost-effective DDoS resilience. Management
to attackers. Today’s attacks have evolved,
Thunder TPS’ scale and zero-touch
and now include DDoS toolkits, weaponized
intelligent automation architecture with
IoT devices, online DDoS services, and more.
aGalaxy maximize ROI and help service aGALAXY
Established solutions, which rely on ineffective
provider enable profitable DDoS scrubbing Management
signature-based IPS or only traffic rate-
services.
limiting, are no longer adequate.
A10 Networks is available when you need
Thunder TPS scales to defend against the
help most. A10 support provides 24x7x365 Subscriber Portal
DDoS of Things and traditional zombie
services, including the A10 DSIRT (DDoS
botnets and detects DDoS attacks through
Security Incident Response Team) to
high-resolution packets or flow record
analysis from edge routers and switches.
help you understand and respond to
DDoS incidents and orchestrate cloud
Talk
Unlike outdated DDoS defense products,
scrubbing. A10 Threat Intelligence Service With A10
A10 Networks’ defenses include detection
leverages global knowledge to proactively Web
capabilities across key networks elements
stop bad actors. a10networks.com/tps
1
Benefits
Maintain
Service Availability
Downtime results in immediate productivity and revenue loss for any business. Thunder TPS ensures
service availability by automatically spotting anomalies across the traffic spectrum and mitigating
multi-vector DDoS attacks.
DEFEAT
Growing Attacks
Thunder TPS protects the largest, most-demanding network environments. Thunder TPS offloads common
attack vectors to specialized hardware, allowing its powerful multicore CPUs to distinguish legitimate users
from attacking botnets and complex application-layer attacks that require resource-intensive deep packet
inspection (DPI).
Scalable
Protection
Select Thunder TPS hardware models benefit from our Security and Policy Engine (SPE) hardware
acceleration, leveraging FPGA-based FTA technology and other hardware-optimized packet-processing for
highly scalable flow distribution and hardware DDoS protection capabilities.
Deploy
Wartime Support
No organization has unlimited trained personnel or resources during real-time DDoS attacks. Thunder TPS
supports five levels of programmatic mitigation escalation and de-escalation per protected zone. Remove the
need for frontline personnel to make time-consuming manual changes to escalating mitigation strategies
and improve response times during attacks. Administrators have the option to manually intervene and
coordinate with A10’s DDoS Security Incident Response Team (DSIRT) at any stage of an attack.
$ Reduce
Security OPEX
Thunder TPS is extremely efficient. It delivers high performance in a small form factor to reduce OPEX with
significantly lower power usage, rack space, and cooling requirements.
2
Reference Architectures
Proactive Mode
(Asymmetric or Symmetric)
aGalaxy
Reactive Mode
API Communication
Larger networks benefit from on-demand
mitigation, triggered manually or by flow
analytical systems. TPS fits in any network
API, sFlow, configuration with integrated BGP and other
Flow-based Detection Thunder TPS Syslogs routing protocols. This eliminates the need for
Suspected any additional diversion and re-injection routers.
Traffic
Clean
UI A10 Networks partners with the industry’s
BGP Traffic leading visibility and DDoS detection companies
GUI, REST API to provide additional flexibility for creating best-
Flow
Information of-class solutions for each customer’s unique
business needs. The flow-detection partner
companies leverage Thunder TPS’ open RESTful
API (aXAPI® and aGAPI®), to create tightly
Edge Router Access Router Firewall Services integrated monitoring solutions that include
visibility, detection and reporting.
3
Reference Architectures
APP
Thunder ADC
with Detection Critical Services
Duplicated
Edge Router Traffic Access Router Service
Thunder TPS
4
Features
A10 Thunder TPS is the world’s highest-performance DDoS protection solution. It detects and mitigates multi-vector DDoS
attacks with surgical precision while providing unprecedented performance, scalability, and deployment flexibility.
Complete Solution
For Flexible Deployments
Thunder TPS DDoS solutions provides a complete solution for DDoS defenses in proactive always-on or
on-demand reactive modes to meet their business objectives. Thunder TPS can be deployed in L2 or L3
inpath modes with full IPv4 and IPv6 support. On-demand reactive DDoS detection is facilitated with the
collection and analysis of exported flow data records from routers and switches. The Thunder TPS detector
applies always-on adaptive learning to build peacetime profiles for protected servers and services, based
on 17 flow record traffic indicators to spot anomalous behavior. When an attack is detected, aGalaxy
instructs Thunder TPS to initiate a BGP route redirection for the suspicious traffic. Then TPS applies
the appropriate countermeasures using a progressive auto mitigation level escalation technique before
delivering the clean traffic to the intended destination.
Multi-Vector ZAP
Attack Protection Zero-Day Automated Protection
Detect and mitigate DDoS attacks The ZAP engine utilizes heuristic
of many types, including volumetric, and machine learning automatically
protocol, or resource attacks; discover mitigation filters without
application-level attacks; or IoTbased advanced configuration or manual
attacks. Hardware acceleration intervention. ZAP speeds the response
offloads the CPUs and makes Thunder time against increasingly sophisticated
TPS particularly adept to deal with multi-vector attacks while minimizing
simultaneous multi-vector attacks. downtime and errors and lower
operating costs.
5
One-DDoS A10 DDoS Threat
Protection Intelligence
Layered, Distributed Detection
Aggregated and correlated DDoS
One-DDoS Protection provides the weapons intelligence from over 40
freshest approach to full-spectrum reputable data sources, is included
DDoS defense, placing detection with support, enabling Thunder TPS to
capabilities across key network elements instantly recognize and block traffic to
closest to the targeted elements of the and from known malicious sources. The
infrastructure. This provides the context, service includes millions of current and
packet level granularity, and visibility accurate IP addresses of DDoS weapons
needed to thwart today’s sophisticated used regularly in reflected amplification
targeted attacks. attacks and crippling IoT botnet attacks.
High-Performance Simultaneous
Protection Protected Objects
6
Complex Large Threat
Attack Mitigation at Scale Intelligence Class Lists
Thunder TPS tracks more than 27 traffic Eight lists, each containing up to 16
and behavioral indicators and can million entries, may be defined to utilize
apply escalating protocol challenges to data from intelligence sources, such
surgically differentiate attackers from valid as the A10 DDoS Weapons Intelligence
users for appropriate mitigation of up to Service, in addition to dynamically
256 million concurrent tracked sessions. generated entries of actionable black/
white lists.
Complex application attacks (e.g., HTTP,
DNS, etc.) are mitigated with advanced
parallel processing across a large
Zero-day
Attack Protection
number of CPU cores to maintain high-
performance system scaling, even for DDoS attackers continue to innovate
multi-vector attacks. their multi-vector attack arsenals with
new attack strategies. Thunder TPS ZAP
engine automatically recognizes DDoS
attack characteristics and dynamically
applies mitigation filters without advanced
configuration or manual intervention.
Efficient Easy
Intelligent Automation Network Integration
7
EFFECTIVE
Management
Thunder TPS supports an industry-standard CLI, on-box GUI, and the aGalaxy management system. The
CLI allows sophisticated operators easy troubleshooting and debugging. The intuitive on-box GUI enables
ease of use and basic graphical reporting. aGalaxy offers a comprehensive dashboard with advanced
reporting, mitigation console, and policy enforcement for multiple TPS devices.
aGalaxy is available with an optional integrated Thunder TPS detector that supports tightly integrated
interworking of Thunder TPS DDoS mitigation, flow-based DDoS detection, system-wide management, and
robust reporting.
8
Thunder TPS Physical Appliance
Specifications
Hardware-based - Anomaly Flood Blocking (pps) N/A N/A 55 Million 125 Million
Average Latency 10 µs 10 μs 35 µs 50 µs
1 GE Copper 5 1 + 4 (Bypass) 6 0 0
1 GE Fiber (SFP) 0 0 2 0 0
Hardware Specifications
Processor Intel
Intel Xeon Intel Xeon Intel Xeon
Communications
4-core 10-core 18-core
Processor
Dimensions (Inches) 1.75 (H) x 17.5 (W) x 17.25 (D) 1.75 (H) x 17.5 (W) x 17.45 (D) 1.75 (H) x 17.5 (W) x 30 (D) 1.75 (H) x 17.5 (W) x 30 (D)
Unit Weight 14 lbs | 16 lbs (RPS) 20.6 lbs 34.5 lbs 34.3 lbs
Single 750W*4 Dual 600W RPS Dual 1100W RPS Dual 1500W RPS
Power Supply (DC option available)
80 Plus Platinum efficiency, 100-240 VAC, 50-60 Hz
Power Consumption (Typical/Max)*2 80W / 110W 180W / 240W 350W / 420W 585W / 921W
Heat in BTU/Hour (Typical/Max)*2 273 / 376 615 / 819 1,195 / 1,433 1,997 / 3,143
9
Thunder TPS Physical Appliance Specifications (Cont.)
Throughput (Software Scrubbing)*1 220 Gbps 150 Gbps 300 Gbps 380 Gbps
Hardware Blocking 500 Gbps 500 Gbps 500 Gbps 1.2 Tbps
Software-based - SYN Authentication (pps) 50 Million 50 Million 100 Million 115 Milloin
Hardware-based - Anomaly Flood Blocking (pps) 250 Million 220 Million 440 Million 500 Million
Average Latency 60 µs 60 µs 60 µs 60 µs
Network Interface
1/10 GE Fiber (SFP+) 48 0 0 0
40 GE Fiber (QSFP+) 0 4 4 0
Hardware Specifications
Processor 2 x Intel Xeon 2 x Intel Xeon 4 x Intel Xeon 2 x Intel Xeon
18-core 18-core 18-core 28-core
Hardware Acceleration 3 x FTA-4, SPE 4 x FTA-3, SPE 8 x FTA-3, SPE 2 x FTA-5, SPE
Dimensions (Inches) 1.75 (H) x 17.5 (W) x 30 (D) 5.3 (H) x 16.9 (W) x 30 (D) 5.3 (H) x 16.9 (W) x 30 (D) 2.625 (H) x 17.5 (W) x 30 (D)
Dual 1500W RPS 2+2 1100W RPS 2+2 1100W RPS Dual 1500W RPS
Power Supply (DC option available)
80 Plus Platinum efficiency, 100-240 VAC, 50-60 Hz
Power Consumption (Typical/Max)*2 784W / 1,078W 1,000W / 1,200W 1,700W / 2,000W 1,121W / 1,300W
Regulatory Certifications
FCC Class A, UL, CE, GS, FCC Class A, UL, CE, GS,
FCC Class A, UL, CE, GS, CB, VCCI, CQC, KCC,
CB, VCCI, CCC, BSMI, CB, VCCI, CCC, BSMI,
BSMI, RCM | RoHS
RCM | RoHS RCM | RoHS
The specifications and performance numbers are subject to change without notice, and vary depending on configuration and environmental conditions.
As for network interface, it’s highly recommended to use A10 Networks qualified optics/transceivers to ensure network reliability and stability.
*1 Throughput performances are traffic-forwarding capacity and measured with legitimate traffic with DDoS protection enabled.
*2 With base model | *3 10Gbps speed only | *4 Optional RPS available | *5 Fixed SFP+ optical ports with dual rate (10GBASE-SR and 1000BASE-SX)
^ Certification in process | + Thunder 14045 comes with a splitter cable for console to provide access to both modules
10
Thunder TPS Virtual Appliance
Specifications
vThunder TPS
vCPU 6 8 24
vRAM 16 GB 16 GB 64 GB
vDisk 60 GB 60 GB 100 GB
vCPU 2 3 5
vRAM 16 GB 32 GB 64 GB
vDisk 40 GB 40 GB 40 GB
11
Detailed Feature List
Features may vary by appliance
• Inspection within IPinIP (e.g., • Regular expression filter (TCP/ • Spoof detection
networking, encapsulation) UDP/HTTP/SIP)
• DNS authentication
• Black/white lists • HTTP request rate limit (per URI)
• HTTP challenge
• Traffic indicator and top talkers • DNS request rate limit (per type,
FQDN, label count)
• Mitigation console Protected Objects
• SIP request limit (per type)
• Packet debugger tool • Protected zones for automated
• Application request malformed
• Top-k insights (source, detection and mitigation
check (DNS/HTTP/SIP)
destination) • Source/destination IP address/
• DNS domain-list
• Outbound detection subnet
• HTTP/S protocol compliance
• Source and destination IP pair
• Application (DNS/HTTP/SIP) flood
DDoS Threat Intelligence protection
• Destination port
Service • Source port
• Signature-based IPS
• Dynamically updated threat • Protocol (e.g., HTTP, DNS, SIP, TCP,
intelligence feed • QUIC version control and
UDP, ICMP and others)
malformed header check
• IP addresses of reflected • Class list/geolocation
amplification weapons • Packet watermarking (UDP) for
gaming traffic • Passive mode
• IP addresses of DDoS botnets
• Outbound mitigation symmetric
deployment
Protocol Attack Protection
Zero-Day Automated
• Invalid packets
Protection Non-Stop DNS Solution
• Anomalous TCP flag combinations
• Machine Learning powered attack • Act as Authoritative DNS cache
(no flag, SYN-FIN, SYN frag,
pattern recognition and filtering
LAND attack) • Seamless layered protection with
• Prevent zero-day attacks TPS mitigation
• SYN-ACK amplification attack
• No pre-configuration or manual protection • DNS water torture protection
intervention
• IP options • Selective and customizable
• Fast, automated response response/ forward
12
Detailed Feature List (Cont.)
Learn More ©2021 A10 Networks, Inc. All rights reserved. A10 Networks, the A10 Networks logo, ACOS, A10 Thunder, Thunder
TPS, A10 Lightning, A10 Harmony, and SSL Insight are trademarks or registered trademarks of A10 Networks, Inc. in
About A10 Networks the United States and other countries. All other trademarks are property of their respective owners. A10 Networks
assumes no responsibility for any inaccuracies in this document. A10 Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice. For the full list of trademarks, visit: www.a10networks.
Contact Us com/a10-trademarks.
13