2
Customer Driven Innovation
2
Donot distribute/edit/copy without the
written consent of A10 Networks
Who are we ?
In 60 seconds more or less…
3.
3
A10 Company Overview
Foundedin Late 2004
CEO & Founder
Lee Chen
Co-founder of Foundry
Networks, Centillion Networks
Leader in Application Networking
Optimizing the performance and security of
data center applications and networks for web
giants, enterprises and service providers
Consistent Revenue Growth
Headquarters in San Jose
Offices in 23 countries;
3,000 customers worldwide
2008 2009 2010 2011 2012
THUNDER SERIES
ACOS
5
ACOS: Platform forApplication Service Gateways
Advanced Core Operation System
64bit OS on SW HW Shared Memory HW ASICs Cards
CGN
ADC TPS
Product
Lines
ACOS
Platform
IT Delivery
Model
6.
6
Thunder Awards
Best ofMicrosoft TechEd 2013
Best Hardware
Attendees’ Pick out of all 250 Vendors
“A10 Thunder platform’s compact size, streamlined performance, and green efficiency are
unprecedented.”
Jason Bovberg, Editor-in-Chief, Windows IT Pro
7.
7
Thunder Awards
Best ofInterop Japan 2013
Performance Optimization
DDoS Mitigation
“… high performance in a space-saving form factor… multi-function
solutions beyond load balancing.”
Izumi Miki, Executive Director, IT media Inc. and Interop Tokyo 2013 judge
9
High Touch Support
Following The Sun 24X7
Engineer first contact
Fast resolution time
“Responsiveness to customer needs was
above and beyond what they typically
expected.
Made updates and patching simple,
which makes the products easy to
maintain and manage.”
Differentiation through focus and investment
“A10’s Tech Support delivers the best customer service
from a networking company that I’ve ever had in my
life.”
10.
10
The Choice ofLeading Companies
Web Giants
Enterprises
Service Providers
3 of top 4 US
wireless carriers
3 of top 4 service providers in
Japan
7 of Top 10 US cable
providers
11.
11
Recent ADC StrategicCompetitive Wins Q3-2013
Territory Customer Product Value Competition Unique Value Prop Channel Partner
NA T-Mobile TH6430,
various AX
$9.2M F5 SLB / Flash Video
Features, Support,
Performance
N/A
NA Microsoft/Azure AX5630 $9.0M Arbor, Radware, F5 SLB, Performance, features Adaptive
NA Morgan Stanley AX3400 $675K F5, Radware Opex, Technical relationship Dimension Data
NA Rogers AX3200-12 $1.2M F5, Radware Cloud TV / L3V Herjavec
NA LinkedIn AX5630 $274K F5 Performance, price Intervision
NA ViaSat AX3200-12, AX3030 $0.9M Cisco / JNPR
F5
CGN & ADC – Features
SLB Cisco-like
SigmaNet
NA Comcast AX3530 $1.6M F5 Feature, P/P,
BRCD Replace
NA
Japan Docomo AX5200-11-SSLE
AX5630-DC
AX3400
$2.8M F5 Mobilemail(SSL)
ADP For Cloud
consolidation
NEC
Japan KDDI AX5200-11 AX3400 $1.3M F5 CGN/ DNS CTC
SEA True Internet TH6430 $1M F5, Juniper Solution approach,
Performance, Reference
Above & Beyond
EMEA KSA-Mobily TH6430 $915K F5 less than 1 year old CGNAT Beta-IT
EMEA Vimplecom AX 3530, AX3030 $309K Huawei, CSCO CGNAT Ericsson
21
A10 Unified ApplicationService Gateway Value
All features are included
without any additional fee.
SLB, ADC, WAF, GSLB, SSO,
DAF, DDoS, Virtualization
and much more…
Easy to configure and
maintain with unified
Services templates for
Applications (Microsoft,
IBM, Oracle, SAP..)
Built on Best-in-class Advanced
Core Operating System (ACOS)
with 64bit OS and HW ASICs for
more performance and also our
Shared Memory Architecture
Best Performance! Management!
No Licenses!
15.
22
ACOS Platform: HighPerformance Application Networking
Shared Memory Architecture
1 2 3 N
Flexible Traffic Accelerator (FPGA)
Switching and Routing
Efficient &
Accurate Memory
Architecture
64-Bit Multi-Core
Optimized
Optimized
Flow Distribution
Application
Acceleration
Application
Security
Application
Availability
16.
23
Benefits of ACOSShared Memory
ACOS Shared Memory
Conventional IPC Architecture
L4-7
CPU 1
L4-7
CPU 2
L4-7
CPU 3
L4-7
CPU 4
L4-7
CPU 5
High-speed
Shared Memory
L4-7
CPU 1
L4-7
CPU 2
L4-7
CPU 3
L4-7
CPU 4
L4-7
CPU 5
Communication Bus
17.
24
Thunder Platform Options
vThunder200 Mbps to 8 Gbps
Supports:
VMware, Hyper-V,
Citrix Xen, Open Source
Xen, KVM and Amazon
Web Services (AWS)
• Choice of hardware or software appliances
• Billing options for pay-as-you go/grow
aCloud
Thunder 6430/6430S
150 Gbps
5M L4 CPS
256M CEC
16x10Gb & 4x40Gb
Thunder 5430S
77 Gbps
2.5M L4 CPS
128M CEC
16x10Gb & 4x40Gb
Carrier, Service Provider,
Large Enterprise, Web Giant
Thunder 930
5 Gbps
200K L4 CPS
16M CEC
8x1Gb & 2x10Gb
Thunder 1030S
10 Gbps
450K L4 CPS
32M CEC
8x1Gb & 2x10Gb
Thunder 3030S
30 Gbps
750K L4 CPS
64M CEC
8x1Gb & 4x10Gb
SMB and Enterprise
28
Application Availability
SLB& Highly available for applications and data centers
High performance SLB &
ADP - Scaling capacity for
peak loads
High availability:
For uninterrupted
operation
Health-checks:
Complete
application fault
detection
Global server load
balancing (GSLB):
Intelligence for
global operations
22.
29
SLB & ApplicationDelivery Partitions
ADP-1 ADP-2 ADP-3
Virtual
Interfaces
Private
space:
Layers
3-7
Shared
space:
Layers
1-2
Virtual
Interfaces
Virtual
Interfaces
Server _s1
• Port 80
• 10.0.0.10
Server _s1
• Port 80
• 20.0.0.10
Server _s1
• Port 80
• 30.0.0.10
VIPX VIPY VIPZ
VLANs, Ethernet (physical) interfaces
Application Delivery Partitions
Up to 1024 Partitions in one
box.
Benefits:
Isolate Layer 3 - 7
Allow customized resource
allocation through system-
resource-usage templates
23.
30
Private and PublicObjects with L3V Partitions
Public objects
Ethernet interfaces
Untagged Ethernet interface can be
used only from a single partition
Tagged Ethernet interfaces can be
used from many partitions
VLANs
Once a VLAN is owned by one
partition, it will not be visible in
others, and it cannot be reused
Private objects
Resources – Throughput, CPS, SSL, CEC..
Virtual Ethernet (VE) interfaces
IP addresses
ARP entries
Routing tables
ACLs
Real servers
Virtual servers
Service groups
Health monitors
Certificates and keys
aFleX policies
24.
31
High Availability: ForUninterrupted Operation
Eliminates the ADC as a point
of failure
Benefits:
Sub-second failover
Active-standby, active-active
or N+1 options
Stateful failover to preserve
sessions
Standby
Active
VIPs
Floating VIP
SNAT VIP
VIPs
Floating VIP
SNAT VIP
Interlink
“HA port”
25.
32
Health-checks: Complete ApplicationFault Detection
Ensures servers are able to handle
users as intended
Benefits:
Users always receive the optimal
experience
Ensures all components needed are
functioning
Network, application (HTTP, DNS,
more…) or database health-checks
A10 ADC
Unreachable Component down
e.g. database
Traffic directed to
active server
26.
33
GSLB: Intelligence forGlobal Operations
Provides multi-data center resiliency
Benefits:
Enables disaster recovery on failure or
active-active data centers
Optimizes users to the best performing
data center (e.g. response time, geo-
location, more…)
Ensures user’s Web experience is the
fastest
A10 ADC
Data Center
Geo Site
35
Application Acceleration
Applicationacceleration for a faster user experience and
optimized utilization
TCP Optimization:
Improve application
performance
RAM Caching:
Faster page loads
equal more revenue
SSL Acceleration:
Secure applications
Compression:
Optimize any
bandwidth level
29.
36
TCP Optimization: ImproveApplication Performance
Reduces TCP connection
management overhead
TCP reuse (multiplexing) to offload server
connection setup and tear down
Benefits:
Increases overall server capacity
Reduction in connections
Improved response times less required
servers
Details:
Server TCP stack offload
Persistent connection to servers
A10 ADC
Data Center
Many TCP
Connections
Reduced TCP
Connections
30.
37
SSL Acceleration: SecureApplications
Offloads compute intensive SSL traffic
Hardware security processor assist
Benefits:
Eliminates high SSL CPU overhead from servers
Servers support many more transactions per
second
Simpler certificate management
Details:
4096-, 2048-, and 1024-bit keys
2x key size = 3x to 7x drop in legacy SLBs capacity
A10 ADC
Data Center
Secured
HTTPS
Unsecured
HTTP
31.
38
RAM Caching: FasterPage Loads Equal More Revenue
RAM Cached objects served from the
Thunder ADC
Eliminates repetitive fetches for frequently
requested objects
Benefits:
Faster response to the end user
Reduce connections and server requests
Reduce servers due to offloaded traffic
Details:
Static or dynamic support
Extensive object type support
A10 ADC
Data Center
Repeated Requests
Served From Cache
32.
39
Compression: Optimize AnyBandwidth Level
Reduces transmission size for HTTP
Smaller payload to transfer to the end
user
Benefits:
Optimize traffic for international, mobile,
legacy devices etc.
Faster delivery to end-user
Offloads Web server CPU cycles
Details:
Gzip & deflate encoding support
Hardware or software options
A10 ADC
Data Center
Compressed
Traffic
Uncompressed
Traffic
41
Application Security
Enhanceexisting security infrastructure, and protect against the latest
threats
Web application firewall
(WAF):
Eliminate common Web
attacks
SSL intercept:
Eliminate the
outbound SSL
blind spot
Application access
management (AAM):
Add authentication
seamlessly
DNS application
firewall (DAF):
Protect critical
infrastructure
DDoS protection:
Multi-vector edge
protection
35.
42
WAF: Eliminate CommonWeb Attacks
Benefit:
Protect web applications
Ensure against code vulnerabilities and
assist PCI-DSS/HIPAA compliancy
Prevent damage to intellectual
property, data and applications
Advantage:
Fully integrated/designed for ACOS
No license; single device solution
Scalable and high performance
36.
43
WAF Key Features- Applicable OWASP Top 10
Injection
SQL injection attack (SQLIA)
Allowed HTTP methods checks for allowed
keywords GET, POST etc.
Form Consistency Check
Cross-Site Scripting (XSS) check
HTML XSS check
Insecure Direct Object References
Whitelisting URI
URI Black List/White List check
Sensitive Data Exposure
Credit Card Number scrubbing
Social Security Number scrubbing
Missing Function Level Access Control
aFleX
Cross-Site Request Forgery (CSRF) check
Referer Check
CSRF Check
Using Components with Known Vulnerabilities
URI Blacklist
Unvalidated redirects and forwards
Whitelisting URI
37.
44
AAM: Add AuthenticationSeamlessly
Benefit:
User authentication required for
resource access
Enhanced protection and server
efficiency
Authentication offload
Advantage:
Supports popular authentication
services/stores
No adjustment to web servers or
infrastructure
Seamless integration
Access Request
Authentication
Challenge
Authentication
Request
Authentication
Success
Access
Granted
AAM
38.
45
AAM Features
AuthenticationMethods
Basic HTTP
Form Based
Web page generated from Thunder ADC (not
Web servers)
Certificate authentication with OCSP
responder support
Authentication Server Support
LDAP
Including password change
RADIUS
OCSP
Authentication Relay
Basic HTTP
Kerberos Authentication
Single Sign-On
Kerberos Constrained Delegation (KCD)
Kerberos Protocol Transition (KPT)
Health Monitoring & SLB
LDAP
RADIUS
Kerberos
39.
46
DAF: Protect CriticalInfrastructure
Benefit:
Uninterrupted DNS services
Protects vulnerable infrastructure
Ensures infrastructure cannot be a
weapon against a 3rd party
Advantage:
Blocks non-DNS traffic (up to 70%)
Surge protection
Full DNS command set (aFleX and
built-in)
Redirection for “honey pots”
Malicious and
Invalid Non-DNS
Traffic on Port 53
“Zombies”
Infected Clients
Generating Requests
Regular Clients
Perform as
Expected
Optional Malicious
and Invalid Traffic
Redirection
DNS Infrastructure
Denied
Surge Protection
Allowed
Result = Reduced and Optimized
CPU Usage
40.
47
DDoS Protection: Multi-vectorEdge Protection
Benefits:
Large-scale DDoS protection
Advanced protection features
Predictable operations
Advantage:
Full DDoS defense covers network and
application attacks
Hardware DDoS protection for common
attacks
SYN flood protection to 200M per second
SYN Flood
Rate Limiting
Connection Limiting
Slow L7 Attacks
Geographic Control
Infrastructure Protection
DDoS
DDoS
More…
L7 aFleX Control
41.
48
DDoS Protection Features
Network layer protection/protocol features
SYN Flood protection
Packet Anomaly Detection
Invalid Packets
Frag Attack
Ping of Death
IP Options drop
Teardrop attack protection
Sockstress attack protection
TCP Flag Anomaly
ACK Flood Prevention
Protocol Based Rate Limiting
SYN flood protection
SYN Cookies
Hardware based (select platforms)
Dynamic SYN Cookies
Traffic limiting
ICMP Rate Limiting
Smurf Attack Protection
Fraggle Attack Protection
Source Rate Limiting - Packets, Connection
Rate, Total Connections
Destination Rate Limiting – Packets,
Connection Rate, Total Connections
Port Based Filtering per Destination
42.
49
DDoS Protection Features
DNS/HTTP
DNS malformed packet-drop
DNS amplification attacks
DNS Any filtering
DNS Any rate limiting
aFleX DDoS protection
Slowloris mitigation
Request rate limiting
Geographic filtering
Location based policies, including country
based policies
PBSLB
Whitelist
Blacklist
Invalid HTTP or SSL payload
Zero-length TCP window
Out-of-sequence packet
Combined defense
ACL, AAM and WAF
Other
Syslog monitoring
Scale out support with aVCS or SDN
Global DDoS parameters
51
Comprehensive Management Options
Comprehensive management options for operational simplicity and
reduced management cost
CLI and GUI: Ease of Use and Management
aFleX: Comprehensive DPI and traffic management
aXAPI scripting: Customizable management options for integration
aGalaxy: Centralized and automated operations for lower TCO
3rd party integrations: SDN and Cloud orchestration integration
Other management options:
Application delivery partitions and layer 3 virtualization (ADP/L3V)
Virtual chassis system (aVCS)
45.
52
GUI and CLI:Ease of Use and Management
GUI (Graphical User Interface)
Fewer screens and steps for
tasks
Intuitive and easy to use
CLI (Command Line Interface)
Industry standard CLI, familiar
interface
Easy to use, comprehensive
help
46.
53
aVCS Configuration
Thunder-1 (vBlade)
VCSPriority 150
Thunder-2 (vBlade)
VCS Priority 150
Thunder-4 (vBlade)
VCS Priority 150
Thunder-3 (vMaster)
VCS Priority 200
Virtual Chassis System
Management station connects to the
aVCS floating IP address (vMaster)
Configuration changes
Made on the vMaster and dynamically
pushed to all of the vBlades
Software images
The vMaster checks a new vBlade and
upgrades the image if required
The vMaster also checks to make sure that
the vBlade has the current configuration
vMaster/vBlade(s)
The vMaster sends heartbeat messages to
the vBlades on the same broadcast domain
to verify that it is active. During the
vMaster election, a vBlade is elected as a
standby that will become a vMaster if the
current vMaster becomes offline
47.
54
aFleX: Comprehensive DPIand traffic management
Deep packet inspection and
scripting technology
Benefits
Adjust traffic and L7 data as
needed
Fix or optimize applications
Complete traffic control
Example: Automatically displays a Web page
based on the user’s language, using the language
set in the user’s browser.
English
Spanish
Japanese
Chinese
56
aXAPI: Customizable ManagementOptions for Integration
Integrate into 3rd Party Applications
Reporting
Centralized configuration management
Provisioning
Custom Management Solutions
Integrated into homegrown apps versus
using the A10 CLI or GUI
Interactive Infrastructure
Applications can issue triggers to change
traffic management behavior based on
external events
Authentication request,
containing Thunder
admin username and
password.
If authentication is
successful, Thunder
replies with a session ID
and status 200 - ok
Configuration or
monitoring request,
containing the session ID
Next configuration or
monitoring request,
containing the session ID
Third-party application
sends session close
request or allows session
to time out.
If session ID is Valid, and
session has not timed out
or been closed, Thunder
performs the requested
action and replies with
status 200 - OK
Thunder performs
requested action, if
session ID is valid and
session has not timed out
or been closed
Third-party Application aXAPI
50.
57
aGalaxy: Centralized andAutomated Operations for Lower TCO
A central network management
system for all A10 devices
Benefits:
Automate repetitive tasks and
eliminate human error
Centralized control of events and
configuration
Faster operation for reduced OPEX
92
Thunder: The NextGeneration ADC
Unified Application
Service Gateway (UASG)
Best Performance
No Licensing
Management
efficiency
Application Service Convergence
CGN
ADC TPS
53.
93
93
Do not distribute/edit/copywithout the written consent of A10 Networks
Thank You
www.a10networks.com
Any App Any Cloud Any Size
Editor's Notes
#1 First, I would like to thank you for your time. My name is Erez and I’m presale engineer at a10networks.
Before we will dive into a10 technology, I would like to have a few slide in order to introduce a10networks company.
Fell free to ask or stop me in case you have any questions.
#3 Brief background on the company and then speak about our expanded Corporate Vision and Product Direction that led us to these new developments BEFORE we dive into the product launch material.
A10 is a Late-Stage Private company that is experiencing significant growth. We can’t speak about any financial details, except those that are already public. Two quick data points are that we are now in excess of 600 employees globally and it was reported that we hit $120M in 2012 revenues and continue to grow well on a Y/Y basis.
#4 Brief background on the company and then speak about our expanded Corporate Vision and Product Direction that led us to these new developments BEFORE we dive into the product launch material.
A10 is a Late-Stage Private company that is experiencing significant growth. We can’t speak about any financial details, except those that are already public. Two quick data points are that we are now in excess of 600 employees globally and it was reported that we hit $120M in 2012 revenues and continue to grow well on a Y/Y basis.
#6 TechEd demo featured 200+ million SYN attacks per second, 140 Gbps of attack traffic with an IXIA traffic generator. 0% CPU due to FTA-3/FPGAs. Demo also showed RAM caching and SSL offload to benefit users time to load a page and offload the web server respectively.
InterOp demo (for the awards) featured 750 Gbps of application traffic via a five unit 6430S aVCS cluster and a 200+ million SYN attack, similar to TechEd. Non-award demos included SDN with NEC, aGalaxy and others.
“A10's Thunder 6430 won the Performance Optimization category thanks to its clear messages including '150 Gbps in 1 RU' and 'high performance in a space-saving form factor'," said Izumi Miki, Executive Director, IT Industry Division, IT media Inc. and a judge for the Interop Tokyo 2013's Award program. "It features 40 G interfaces and supports high-speed traffic needs. We also recognized its multi-function solutions beyond load balancing."
#7 TechEd demo featured 200+ million SYN attacks per second, 140 Gbps of attack traffic with an IXIA traffic generator. 0% CPU due to FTA-3/FPGAs. Demo also showed RAM caching and SSL offload to benefit users time to load a page and offload the web server respectively.
InterOp demo (for the awards) featured 750 Gbps of application traffic via a five unit 6430S aVCS cluster and a 200+ million SYN attack, similar to TechEd. Non-award demos included SDN with NEC, aGalaxy and others.
“A10's Thunder 6430 won the Performance Optimization category thanks to its clear messages including '150 Gbps in 1 RU' and 'high performance in a space-saving form factor'," said Izumi Miki, Executive Director, IT Industry Division, IT media Inc. and a judge for the Interop Tokyo 2013's Award program. "It features 40 G interfaces and supports high-speed traffic needs. We also recognized its multi-function solutions beyond load balancing."
#15 The volume of data delivered from global data centers is growing at an astounding 26% annual CAGR, but IT spending lags far behind that growth. Importantly, website performance can not be about just adding more servers and data center bandwidth. Operators need more intelligent ways to scale their application traffic and ensure App Uptime, Performance & Availability.
#18 Infrastructure-as-a-Service Multi-Tenant Cloud data center architectures, or what some are calling Software-Defined Data Centers, are driving all new design of data centers with high degrees of automation and service agility. The technologies employed in these cloud data centers include cloud orchestration systems and software defined networking, which both drive all new levels of automation and programmability of DC infrastructure. The adoption of these new data center architectures is increasing network complexity and requires application networking solutions that are flexible and dynamic.
#19 Organizations are enhancing the performance of their networks by increasing the speed of their data center networks from the 1 and 10 Gigabit Ethernet rates in use over the last ten years to 40 Gigabit Ethernet currently and evolving to 100 Gigabit Ethernet as soon as 2015. Organizations require high performance application networking technology to ensure data center application and network performance and security are maintained despite rapidly escalating data rates, which have historically been very difficult functions to scale well.
#26 Maintaining uptime for maximum application availability requires multiple technologies to ensure that user connectivity is sustained and traffic is routed to an active data center in a multi-data center environment.
Application acceleration employs many techniques that can be used concurrently to create efficiency in your environment, optimizing the user experience, and reducing load on your servers and network to reduce infrastructure costs.
Consolidation of equipment can be achieved by introducing higher performance ADCs and consolidating many loads that were previously served by individual ADCs and SLBs (10 to 1 ratios are not uncommon), while building more efficient and flexible enterprise data centers. With the advent of virtualization, many options exist to ensure separation and isolation for different business units, as required.
Effectiveness of data center staff resources is essential. A10 ADCs enable more efficiency with fewer resources, primarily using automation in the form of smart templates that speed application deployment, and management scripting that automates tasks to suit your environment. Scripting to overcome deployment issues is also key, and A10 ADCs ensure that any issue or policy can be taken care of or implemented quickly.
Security is a primary concern for business applications and data in any data center, A10 ADCs offer multiple security services that enhance your existing security solutions to minimize risk and ensure compliance with various regulatory requirements.
#33 Describe feature. Add ways to do GSLB – latency, geolocation, failure, et al..
Data center fail over, business continuity, and flexible traffic distribution at the best price for comparable features and performance
Flexible deployment options; as a standalone GSLB or combined with SLB running in the same Thunder unit
Comprehensive site selection policies; including world-wide geo-location data base support for not only continent and country but to the levels of province or state and city levels.
Supports health checks for all the popular services
#37 Compute intensive SSL traffic is offloaded by Thunder Series hardware
Simpler certificate management
Servers support many more transactions per second
Reduced operational expense
#39 Compressed content allows higher volumes of data to be sent
Provides network optimization = bandwidth savings up to 70
Eliminates Web server CPU cycles
Increases end to end performance while reducing costs
#43 A2 Broken Authentication and Session management is covered by AAM module
A5 Security Misconfiguration: WAF as a whole is sort of addressing this: to protect an application because you cant control or guarantee the application’s security; how it is coded. But a WAF does not secure against leaving default passwords and so on.
#46 Reduce load for protected servers (~70%)
Legitimate DNS traffic allowed only, protocol enforcement
Predictable load
DNS Pre-fetching (or Pre-Resolving) prepared
Increases capacity while freeing resources to address increased load
Increased security for backend servers
Quarantine malicious traffic for inspection (or denial)
Guarantee uptime regardless of DDoS attacks
For customers running a large DNS infrastructure
#48 Frag – Drops all IP fragments, which can be used to attack hosts running
IP stacks that have known vulnerabilities in their fragment reassembly
code
• IP-option – Drops all packets that contain any IP options
• Land-attack – Drops spoofed SYN packets containing the same IP
address as the source and destination, which can be used to launch an
“IP land attack”
• Ping-of-death – Drops all jumbo IP packets, known as “ping of death”
packets
#49 Frag – Drops all IP fragments, which can be used to attack hosts running
IP stacks that have known vulnerabilities in their fragment reassembly
code
• IP-option – Drops all packets that contain any IP options
• Land-attack – Drops spoofed SYN packets containing the same IP
address as the source and destination, which can be used to launch an
“IP land attack”
• Ping-of-death – Drops all jumbo IP packets, known as “ping of death”
packets
#54 aFleX Example:
when HTTP_REQUEST {
if { [HTTP::header accept-language] contains “es” } {
pool Spanish
} elseif { [HTTP::header accept-language] contains “ja” } {
pool Japanese
} elseif { [HTTP::header accept-language] contains “zh” } {
pool Chinese
} else {
pool English
}
}
#56 aXAPI allows control of the ADC for various functions via external commands
REST (Representational State Transfer) style XML API versus SOAP-style
Allows commands to be issued by a simple HTTP command versus a complicated XML definition
Set parameters and get statistics
REST versus SOAP/XML Benefits
Quicker implementation
Less code
Less complex
Easier to understand and support
#57 A central network management system for all A10 devices
Configuration management & repository
Event management & alarm notification
Unified view of traffic trends & traffic growth
Centralized SSL cert storage & management
Centralized management for upgrades & image upgrade repository
Configuration deployment & compare function
Automatic device discovery
Configuration backup & restore
aFleX TCL script management, including retrieval, storage & deployment
Reboot & shutdown features
Report automation & asset management
#66 Simple version – enterprise focused examples of how an AX could be deployed for specific use cases at in different companies to overcome issues, all with one platform (note SLB-PT in ADC release).
IPv6 web site to protect brand and ensure universal access > no presence = a blank page, bad for companies – e.g. any user should see the content – otherwise reputation and revenue may be affected.
Limited IPv4 resources and propriety NAT errors stop Internet facing service growth > not just preserving IPv4, but replacing propriety NAT gateways, a better way to do NAT – standardized NAT.
Critical new supplier is IPv6 only, internal clients require access immediately > for example, no IPv6 network? Use 6rd to enable connectivity over an existing IPv4 network quickly, to connect to, say, an IPv6 only supplier in APAC.
IPv6 supplier is bought, need to provide access to internal IPv4 applications > we have an example of a customer who needed to connect an acquired APAC company who was on IPv6 only to internal IPv4 resources in Texas. NAT64/DNS64 allowed this to happen easily and cost effectively.
IPv4 is the legacy protocol, cost savings require retirement of IPv4 core > perhaps more future looking? But will allow the retirement of IPv4 devices and associated cost savings (licenses, power etc) while still allowing IPv4 clients to connect over the IPv6 network (instead of maintaining two networks).
#68 Ref accounts
Logix
Sudden Link
Grande
Apogee
Cox
Metrocast
3UK
NTT-Docomo
KDDI
EMOBILE
UQ Communications
South Tokyo Cable TV
#72 DoS traffic is generated in various parts of the Internet, accumulating volume.
#73 Targeted high rate protocol attacks to exhaust specific resources on the target
Example: Fragmented packet attacks PPS metric
Exhaust L7 system resources using traffic that seems legitimate.
“Slow and low” aka R.U.D.Y. (Slow HTTP POST), Slow read attack
SYN flood: is it pure volume
http://www.incapsula.com/ddos/ddos-attacks
#76 You want to rid DDoS as soon as it enters your network. Or remove the high volume part one tier higher, at ISP or in a cloud service
#77 Targeted high rate protocol attacks to exhaust specific resources on the target
Example: Fragmented packet attacks PPS metric
Exhaust L7 system resources using traffic that seems legitimate.
“Slow and low” aka R.U.D.Y. (Slow HTTP POST), Slow read attack
SYN flood: is it pure volume
http://www.incapsula.com/ddos/ddos-attacks
#88 Inline provides much more traffic statistics since we see the return traffic. Also, the need for 3rd party flow analysis is reduced or eliminated. They can provide extra value for real-time threshold tuning, reporting etc.