Thunder CFW: High-Performance Versatile Firewall
Thunder CFW: High-Performance Versatile Firewall
THUNDER CFW
High-Performance Versatile Firewall
Supported Platforms_____________ The A10 Thunder Convergent Firewall (CFW) is a standalone security product, built on
A10 Networks Advanced Core Operating System (ACOS®) platform. Thunder CFW is
the first converged security solution for service providers, cloud providers and large
enterprises that includes:
Thunder CFW • A powerful Secure Web Gateway that combines URL filtering, A10’s SSL Insight
physical appliance
technology, and explicit proxy to increase security efficacy by decrypting SSL
traffic at high speed and restricting access to undesirable websites.
• A high-performance Data Center Firewall with an integrated Layer 4 firewall, DDoS
aGalaxy
protection, and server load balancing. By uniting application delivery control and
centralized management
security on a single platform, Thunder CFW lowers hardware and operating costs.
• A scalable Gi/SGi Firewall with integrated DDoS protection and Carrier Grade
Networking (CGN) for mobile carriers. The Gi/SGi Firewall protects mobile
infrastructure with advanced policy enforcement.
Overview_________________________ • High-speed site-to-site IPsec VPN that enables enterprises and service providers
to encrypt data at a massive scale and in the cloud.
A10 Networks® Thunder® Convergent
With its data center efficient design and compact form factor, Thunder CFW provides
Firewall (CFW) is a high-performance,
an integrated security and application networking solution that minimizes rack space,
all-inclusive and flexible security power consumption and cooling costs.
solution featuring a Secure Web
Thunder CFW also leverages the A10 Harmony™ architecture to provide open and
Gateway, Data Center Firewall, Gi/SGi
standards-based programmability, which offers rapid integration with management and
Firewall and site-to-site IPsec VPN
orchestration systems, consistent policy enforcement and telemetry. The A10 Networks
for enterprises and service providers.
aGalaxy® Centralized Management System delivers everything that organizations need to
Thunder CFW uncovers threats in SSL configure, monitor and troubleshoot all A10 Thunder solutions, including Thunder CFW.
traffic and blocks access to malicious
websites at the enterprise perimeter. Features and Benefits
It also protects high-value assets in Whether you are an enterprise, service provider or mobile carrier, A10 Thunder CFW
the data center from network and offers the performance and the versatility you need to safeguard your applications, your
Distributed Denial of Service (DDoS) users and your infrastructure.
attacks. A10 Thunder CFW offers the
Secure Web Gateway
performance and the versatility you
Decrypt SSL once and inspect multiple times: Thunder CFW enables security devices
need to safeguard your applications,
to inspect encrypted traffic, eliminating the SSL blind spot in corporate defenses.
your users and your infrastructure. Leveraging SSL Insight technology, Thunder CFW decrypts SSL traffic and forwards it
to third-party security devices for inspection. With the Thunder CFW, organizations can
make their security infrastructure effective again.
Prevent data exfiltration and enforce compliance: Thunder CFW allows seamless
integration with third-party Data Loss Prevention (DLP) solutions via the industry standard
ICAP. Thunder CFW can send decrypted traffic to DLP servers for inspection before
1
forwarding intercepted traffic to a client or a server. According to The Thunder CFW includes integrated Carrier Grade NAT
inspection results from DLP servers, Thunder CFW enforces a policy functionality to allow mobile carriers to preserve their investment
by either permitting or denying traffic to prevent data leaks and in IPv4-based infrastructure. Also included are various IPv6
harmful infection. transition technologies, such as NAT64/DNS64, to assist in
providing a smooth transition to IPv6 networking and seamless
Gain superior URL classification coverage: Thunder CFW provides
subscriber access to resources regardless of the type of IP
an optional URL filtering service that maximizes employee
version used. Integrated application layer gateways (ALGs) ensure
productivity and mitigates web-based threats. Thunder CFW can
that applications remain addressable and operate transparently
monitor or block access to malicious websites, including malware,
through address translation. By including IPv4 preservation and
spam and phishing sites. The A10 URL Classification Service,
IPv6 migration support in the multi-functional Thunder CFW,
powered by Webroot, categorizes over 460 million domains and
operational tasks are greatly simplified.
13 billion URLs into 83 categories, enabling organizations to block
desirable sites and shield their users from online threats. To protect mobile infrastructure, the Thunder CFW Gi/SGi Firewall
provides granular control over network resources, allowing mobile
Extend the life of security infrastructure: Thunder CFW, with
carriers to block network attacks and unauthorized access. It delivers
integrated load balancing, enables organizations to maximize
a stateful firewall with a rich set of features to protect subscribers,
uptime and increase the capacity of their security infrastructure.
along with shielding the LTE data and control plane services from
It also unburdens firewalls and other security devices from
multiple types of threats. The Thunder CFW can also secure its own
computationally intensive tasks like SSL decryption and ICAP
resources, such as Network Address Translation (NAT) pools, to
support, enabling those devices to do what they do best – detect
ensure that its operational functions are not compromised.
and stop attacks.
Site-to-Site IPsec VPN
Data Center Firewall
Encrypt data at unparalleled speeds: Thunder CFW enables
Achieve unprecedented firewall performance: Powered by A10’s
enterprises and service providers to build out large-scale VPN
Advanced Core Operating System (ACOS), Thunder CFW provides
deployments. By supporting thousands of VPN tunnels per
high performance in a compact appliance, allowing organizations
Thunder CFW platform and a broad array of encryption algorithms
to stop emerging threats at scale. Combining a Shared Memory
and data integrity methods, organizations can deploy Thunder
Architecture and Flexible Traffic Accelerator (FTA) technology, the
CFW alongside their existing VPN equipment or build out new VPN
Data Center Firewall offers ultra-high throughput and unmatched
networks with Thunder CFW appliances.
connection rates, eliminating traditional performance bottlenecks
while protecting data center assets. Consolidate IPsec VPN, firewall and application delivery: Thunder
CFW combines Data Center Firewall, Gi/SGi Firewall and IPsec VPN
Lower OPEX and CAPEX: Consolidating multiple services on
on a single platform. Whether used with the Data Center Firewall
one platform reduces the number of appliances that need to be
to support secure interconnectivity between data centers or to
purchased and cuts power, space and cooling costs. Thunder CFW’s
support high-speed VPN connections in the cloud, Thunder CFW
Data Center Firewall takes unification further by converging not
provides a comprehensive networking and security platform that
just security but also networking and application delivery features,
reduces customers’ data center footprint and operating costs.
empowering organizations to eliminate single-purpose devices from
their data centers and reduce hardware and operating costs. Management
Protect multi-tenant environments: Thunder CFW leverages the Comprehensive and scalable management: Thunder CFW
A10 Harmony architecture to deliver completely programmable devices feature an array of options to simplify and automate
security for the data center. A10 Harmony unifies policy control, management tasks that reduce administrative costs and ensure
offers unprecedented telemetry and provides 100% RESTful API that complex tasks can be done accurately the first time. To
coverage. Thunder CFW also supports multi-tenancy features like complement our industry-standard CLI and Web GUI, our RESTful
Application Delivery Partitions (ADPs) for segmentation. API with 100% coverage offers rapid integration with third-party
management consoles to efficiently operate one or more Thunder
Gi/SGi Firewall CFW appliances. For larger deployments, our aGalaxy Centralized
Achieve massive scale and multiple functionality in a single Management System ensures that routine tasks can be performed
compact appliance: The Thunder CFW, with an integrated Gi/SGi at scale, across multiple appliances, regardless of physical location.
Firewall, delivers the performance that mobile carriers require to
Thunder CFW supports granular role-based access control,
scale and protect their networks. With the ability to support large
enabling you to create users and groups and grant read-only
session capacity and high connections-per-second rates, the
or read/write privileges for specific partitions or management
Thunder CFW will meet both current and future traffic requirements.
interfaces. To scale load-balancing capacity, A10 Networks aVCS®
Thunder CFW enables mobile carriers to efficiently safeguard their
Virtual Chassis System allows multiple appliances to operate
infrastructure, including the Gateway GPRS Support Node (GGSN)
as one, with a single management point for all appliances in the
and P-Gateway in the Evolved Packet Core (EPC).
virtual chassis.
2
Architecture and Key Components
Mobile Service Provider 2 Gi/SGi FW Data Center 3 DC FW
Web App
v4 v6
DC FW & ADC
DNS
EPC with GGSN and PGW Router
Internet
Secure Web
Enterprise Perimeter 1 Gateway 4 IPSec VPN
3
Thunder CFW Specifications Table
Thunder 840 Thunder 3230(S) Thunder 3430(S)
Data Center Firewall
DCFW Throughput 5 Gbps 25 Gbps 38 Gbps
DCFW Layer 4 CPS 200k 1.4 million 2 million
DCFW Concurrent Sessions 8 million 32 million 64 million
DCFW Rules 8k 16k 32k
Secure Web Gateway*1 | *2
SSLi Throughput (2k key) 0.5 Gbps 3.5 Gbps 5.5 Gbps
SSLi CPS (2k key) 300 12.5k 18k
IPsec VPN *2
*1 SSLi performance are measured in single appliance SSLi deployment. | *2 With maximum SSL | *3 With base model. Number varies by SSL model |
*4 No dedicated hardware but FTA-4 FPGA handles select switching/routing functions | ^ Certification in process | + FIPS model must be purchased
4
Thunder CFW Specifications Table (continued)
Thunder 4440(S) Thunder 5330(S) Thunder 5440(S)
Data Center Firewall
DCFW Throughput 70 Gbps 70 Gbps 90 Gbps
DCFW Layer 4 CPS 2.8 million 2.8 million 3.5 million
DCFW Concurrent Sessions 64 million 64 million 128 million
DCFW Rules 32k 32k 64k
Secure Web Gateway*1 | *2
SSLi Throughput (2k key) 8 Gbps 8 Gbps 12.5 Gbps
SSLi CPS (2k key) 22k 24k 28k
IPsec VPN *2
*1 SSLi performance are measured in single appliance SSLi deployment. | *2 With maximum SSL | *3 With base model. Number varies by SSL model |
*4 No dedicated hardware but FTA-4 FPGA handles select switching/routing functions | ^ Certification in process | + FIPS model must be purchased
5
Thunder CFW Specifications Table (continued)
Thunder 5840(S) Thunder 6440(S) Thunder 7440(S)
Data Center Firewall
DCFW Throughput 100 Gbps 150 Gbps 220 Gbps
DCFW Layer 4 CPS 4.5 million 4.5 million 6.5 million
DCFW Concurrent Sessions 128 million 256 million 256 million
DCFW Rules 64k 128k 128k
Secure Web Gateway*1 | *2
SSLi Throughput (2k key) 17.5 Gbps TBD TBD
SSLi CPS (2k key) 50k TBD TBD
IPsec VPN *2
*1 SSLi performance are measured in single appliance SSLi deployment. | *2 With maximum SSL | *3 With base model. Number varies by SSL model |
*4 No dedicated hardware but FTA-4 FPGA handles select switching/routing functions | ^ Certification in process | + FIPS model must be purchased
6
Thunder CFW SPE Specifications Table
Thunder 4435(S) SPE Thunder 5435(S) SPE Thunder 6435(S) SPE Thunder 6635(S) SPE
Data Center Firewall
DCFW Throughput 38 Gbps 76 Gbps 140 Gbps 150 Gbps
DCFW Layer 4 CPS 2.7 million 2.8 million 5.5 million 5.5 million
DCFW Concurrent Sessions 128 million 128 million 256 million 256 million
DCFW Rules 64k 64k 128k 128k
Secure Web Gateway*1 | *2
SSLi Throughput (2k key) 8 Gbps 8 Gbps 17.5 Gbps 17.5 Gbps
SSLi CPS (2k key) 22k 22k 50k 50k
IPsec VPN *2
*1 SSLi performance are measured in single appliance SSLi deployment. | *2 With maximum SSL | *3 With base model. Number varies by SSL model
7
Thunder 840 Thunder 3230(S) Thunder 3430(S)
8
Gi/SGi Firewall IPsec tunnel
• Equal Cost Multipath (ECMP) support
Firewall:
• NAT traversal
• Stateful Layer 4 network firewall
• Perfect Forward Secrecy (PFS) support
• ALG protocol support for protocols with dynamic ports
• Life bytes and time rekey
(including SIP, FTP)
• PKI support with Simple Certificate Enrollment Protocol
DDoS Protection:
(SCEP), Online Certificate Status Protocol (OCSP) and
• Integrated DDoS protection for NAT pools
certificate revocation list (CRL) distribution points
• IP anomaly detection
A10 Threat Intelligence Service**
IPv4 Preservation (CGNAT):
• Dynamic threat intelligence feed updated in near real time
• Carrier Grade NAT (CGN/CGNAT), Large Scale NAT (LSN),
• 30+ public, private and proprietary sources to block “call
NAT444, NAT44
homes” to command and control servers, identify known
IPv6 Migration: attack sources and mitigate zero-day attacks
• Dual stack support, full native IPv6 management and features
High-Performance ACOS Platform
• SLB-PT (Protocol Translation), SLB-64 (IPv4<–>IPv6, IPv6<–
• Scalable platform with multi-core, multi-CPU support
>IPv4)
• Linear application performance scaling
• NAT64/DNS64, NAT46, DS-Lite, 6rd, LW4o6
Networking
Secure Web Gateway (SWG) • Integrated L2/L3
SSL Insight: • Transparent mode/gateway mode
• High-performance SSL decryption and encryption as a • Routing – static routes, IS-IS (v4/v6), RIPv2/ng, OSPF v2/v3,
forward proxy BGP4+
• Internet Content Adaptation Protocol (ICAP) support for data • VLAN (802.1Q)
loss prevention • Trunking (802.1AX), LACP
• Dynamic port decryption to detect and intercept SSL or TLS • Access control lists (ACLs)
traffic regardless of TCP port number • Traditional IPv4 NAT/NAPT, IPv6 NAPT
• Forward proxy failsafe to bypass traffic when there is a • Jumbo Frame support
handshake failure • Hardware-accelerated Virtual Extensible LAN (VXLAN)
• SSL Insight bypass based on hostname; bypass list scales up • Network Virtualization using Generic Routing Encapsulation
to 1 million Server Name Indication (SNI) values (NVGRE)
• Multi-bypass list support
Management
• Decryption of HTTPS, STARTTLS, SMTP, XMPP
• Dedicated management interface (console, SSH, Telnet,
• Client certificate detection and optional bypass
HTTPS)
• Untrusted certificate handling using the Online Certificate
• Web-based GUI with language localization
Status Protocol (OCSP)
• Industry-standard CLI support
• TLS alert logging to log flow information from SSL Insight
• Granular role-based access control
events
• SNMP, syslog, email alerts, NetFlow v9 and v10 (IPFIX), sFlow
• SSL session ID reuse
• Port mirroring
• Firewall Load Balancing (FWLB)
• REST-style XML API (aXAPI) for all functions
URL Filtering: • LDAP, TACACS+, RADIUS support
• URL Classification Service powered by Webroot to selectively
Virtualization
bypass trusted websites for SSL decryption**
• aVCS (virtual chassis system)
• Optional monitoring and blocking of malicious or undesirable
• Multi-tenancy with ADPs
websites
-- Partition-based management
Operation modes -- L2/L3 virtualization
• Transparent Forward Proxy
Carrier-Grade Hardware
• Explicit Forward Proxy
• Hot swap redundant power supplies (AC or DC)
• Proxy chaining
• 40 GbE ports, 100 GbE ports
IPsec VPN • Tamper detection
• Route-based VPN • Lights Out Management (LOM/IPMI)
• Keying methods – IKEv1, IKEv2 • Hardware Security Module (HSM) option
• Authentication methods – RSA Signature, Pre-shared Key, • High-performance security processor option
Public Key Infrastructure (PKI) *Features and certifications may vary by appliance
• Key Exchange Diffie-Hellman Groups – 1, 2, 5, 14, 15, 16, 18 **Additional paid service
• Encryption and data integrity algorithms – DES, 3DES, AES-
128, AES-192, AES-256
• OSPF, BGP and Bidirectional Forwarding Detection (BFD) over
9
About A10 Networks
A10 Networks is a leader in application networking, providing a range of high-performance application networking solutions that help organizations
ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in
San Jose, California, and serves customers globally with offices worldwide. For more information, visit: www.a10networks.com.
Corporate Headquarters Worldwide Offices To discover how A10 Networks products will
enhance, accelerate and secure your business,
A10 Networks, Inc North America Hong Kong
HongKong@a10networks.com contact us at a10networks.com/contact or call to
3 West Plumeria Ave. sales@a10networks.com
San Jose, CA 95134 USA Taiwan speak with an A10 sales representative.
Europe
Tel: +1 408 325-8668 emea_sales@a10networks.com taiwan@a10networks.com
Fax: +1 408 325-8666 South America Korea
www.a10networks.com latam_sales@a10networks.com korea@a10networks.com
Japan South Asia
jinfo@a10networks.com SouthAsia@a10networks.com
Part Number: A10-DS-15112-EN-06 China Australia/New Zealand
Aug 2016 china_sales@a10networks.com anz_sales@a10networks.com
©2016 A10 Networks, Inc. All rights reserved. A10 Networks, the A10 Networks logo, ACOS, Thunder and SSL Insight are
trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries. All other trademarks
are property of their respective owners. A10 Networks assumes no responsibility for any inaccuracies in this document. A10
Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. For the full list of
trademarks, visit: www.a10networks.com/a10-trademarks. 10