A10 SB DDoS Protection For CGNAT Environments
A10 SB DDoS Protection For CGNAT Environments
A10 SB DDoS Protection For CGNAT Environments
native technologies.
Solution
The Security Landscape A10 Thunder® CGN, available in
container, virtual, bare metal and
Traditionally, service provider networks have depended upon firewall defenses physical form factors are augmented
at the internet edge to protect critical network infrastructure such as CGNAT. with integrated DDoS protection
However, with the changing threat landscape and growing volumes of IoT to give service providers enhanced
devices, attacks can now originate from inside the network. This changes the infrastructure protection against the
paradigm. As DDoS and other types of attacks grow in frequency, sophistication rising occurrence of DDoS attacks
and size, organizations need to have solutions that can mitigate attacks early targeting CGNAT infrastructure and NAT
1
In particular, network elements that maintain state such as intrusion detection systems, firewalls, and carrier grade NAT (CGNAT)
are prime targets for malicious activity. Their state tables can be exploited through various attacks to exhaust CPU and memory
resources which severely impacts subscribers’ quality of experience.
Research reports show an increase in DDoS attacks against CGNAT devices. Reflective attacks combined with some element of
amplification can target specific addresses in the NAT pools to cause buffer exhaust, increased CPU utilization, and session quota
exhaust and can be either internally or externally generated. In addition, internally generated attacks can target either NAT pool
resources or external resources, resulting in blacklisting of the NAT IP addresses.
IP anomaly filtering protects internal and external devices and the CGNAT network elements from attacks
based on known packet signatures and disrupts network reconnaissance attempts where attackers use
protocol vulnerabilities to gain target information, such as operating system type and version.
Thunder CGN also mitigates infrastructure attacks by managing connection rates. Connection rate limits can
be set up based on TCP, UDP and ICMP protocol and are enforced on a per source IP address basis, limiting
both originating connections from clients, and connections from the external networks. Once the rate limit is
reached, sessions are no longer created for the source IP address regardless of absolute quota size.
2
4. Selective Filtering
ICMP Selective filtering protect servers and CPUs against reflection and spoofing types of volumetric attacks.
Selective filtering identifies when packets are coming in at an abnormally fast rate, creates a destination IP
and destination IP port entry in a logging table and drops the packets.
The most advanced carrier-grade networking solution, Thunder CGN evolves continuously to serve service
providers worldwide for their integrated security, CGNAT and networking needs.
In addition, the integrated CGNAT feature set is included along with Gi/SGi firewall in the A10 Thunder
Convergent Firewall (CFW) to offer a comprehensive security solution for service provider network
deployments, while enabling a smooth transition to IPv6.
3
Next Steps
For more information, please contact your A10 representative
or visit a10networks.com/cgn.
Learn More ©2021 A10 Networks, Inc. All rights reserved. A10 Networks, the A10 Networks logo, ACOS, A10 Thunder, Thunder
TPS, A10 Lightning, A10 Harmony, and SSL Insight are trademarks or registered trademarks of A10 Networks, Inc. in
the United States and other countries. All other trademarks are property of their respective owners. A10 Networks
About A10 Networks assumes no responsibility for any inaccuracies in this document. A10 Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice. For the full list of trademarks, visit: www.a10networks.
Contact Us com/company/legal/trademarks/.