TESTING DDOS DEFENSE EFFECTIVENESS AT 300 GBPS SCALE AND BEYOND

Similar documents
EFFECTIVE SERVICE PROVIDER DDOS PROTECTION THAT SAVES DOLLARS AND MAKES SENSE

A10 DDOS PROTECTION CLOUD

SUPERCHARGE YOUR DDoS PROTECTION STRATEGY

WHITE PAPER. DDoS of Things SURVIVAL GUIDE. Proven DDoS Defense in the New Era of 1 Tbps Attacks

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

WHITE PAPER A10 SSL INSIGHT & FIREWALL LOAD BALANCING WITH SONICWALL NEXT-GEN FIREWALLS

Cloudflare Advanced DDoS Protection

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

A10 SSL INSIGHT & SONICWALL NEXT-GEN FIREWALLS

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Check Point DDoS Protector Introduction

Fregata. DDoS Mitigation Solution. Technical Specifications & Datasheet 1G-5G

DDOS RESILIENCY SCORE (DRS) "An open standard for quantifying an Organization's resiliency to withstand DDoS attacks" Version July

9. Security. Safeguard Engine. Safeguard Engine Settings

TALK. agalaxy FOR THUNDER TPS REAL-TIME GLOBAL DDOS DEFENSE MANAGEMENT WITH A10 DATA SHEET DDOS DEFENSE MONITORING AND MANAGEMENT

Why IPS Devices and Firewalls Fail to Stop DDoS Threats

Corrigendum 3. Tender Number: 10/ dated

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Chapter 7. Denial of Service Attacks

haltdos - Web Application Firewall

DEPLOYMENT GUIDE HOW TO DEPLOY MICROSOFT SHAREPOINT 2016 WITH A10 THUNDER ADC

Comprehensive datacenter protection

TALK THUNDER SOFTWARE FOR BARE METAL HIGH-PERFORMANCE SOFTWARE FOR THE MODERN DATA CENTER WITH A10 DATASHEET YOUR CHOICE OF HARDWARE

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Configuring attack detection and prevention 1

INTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

THUNDER WEB APPLICATION FIREWALL

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

THUNDER TPS Next-generation DDoS Protection

Basic Concepts in Intrusion Detection

Thunder TPS. Overview. A10 Networks, Inc.

War Stories from the Cloud Going Behind the Web Security Headlines. Emmanuel Mace Security Expert

Configuring attack detection and prevention 1

Are You Fully Prepared to Withstand DNS Attacks?

Radware DefensePro DDoS Mitigation Release Notes Software Version Last Updated: December, 2017

A10 HARMONY CONTROLLER

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Configuring Flood Protection

Security+ Guide to Network Security Fundamentals, Fourth Edition. Network Attacks Denial of service Attacks

Anti-DDoS. FAQs. Issue 11 Date HUAWEI TECHNOLOGIES CO., LTD.

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1

COMPUTER NETWORK SECURITY

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING

Denial of Service and Distributed Denial of Service Attacks

Check Point DDoS Protector Simple and Easy Mitigation

Capability Analysis of Internet of Things (IoT) Devices in Botnets & Implications for Cyber Security Risk Assessment Processes (Part One)

TALK THUNDER TPS SURGICAL MULTI-VECTOR DDOS PROTECTION WITH A10 DATASHEET DDOS PROTECTION & MITIGATION

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

DDoS MITIGATION BEST PRACTICES

WHITE PAPER Hybrid Approach to DDoS Mitigation

Arbor Solution Brief Arbor Cloud for Enterprises

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

SmartWall Threat Defense System - NTD1100

Pulse Secure Application Delivery

MICRON21 BUILDS WORLD-CLASS DATA CENTRE WITH A10 LOAD-BALANCING, SECURITY AND CLOUD SOLUTIONS

Chapter 10: Denial-of-Services

HP High-End Firewalls

Multi-vector DDOS Attacks

THUNDER TPS Next-generation DDoS Protection

DEUTSCHE TELEKOM TERASTREAM: A NETWORK FUNCTIONS VIRTUALIZATION (NFV) USING OPENSTACK

ebook ADVANCED LOAD BALANCING IN THE CLOUD 5 WAYS TO SIMPLIFY THE CHAOS

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

Sam Pickles, F5 Networks A DAY IN THE LIFE OF A WAF

TALK THUNDER TPS SURGICAL MULTI-VECTOR DDOS PROTECTION WITH A10 DATA SHEET DDOS DETECTION, MITIGATION & CLOUD PROTECTION

DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT

Secure your Web Applications with AWS WAF & AWS Shield. James Chiang ( 蔣宗恩 ) AWS Solution Architect

CloudStorm TM 100GE Application and Security Test Load Module

Computer Security: Principles and Practice

SSL INSIGHT SSL ENCRYPTION CHALLENGES SSL USE EXPOSES A BLIND SPOT IN CORPORATE DEFENSES SOLUTION BRIEF UNCOVER HIDDEN THREATS IN ENCRYPTED TRAFFIC

methods of attack detection built on customized hardware vs. signature based methods built on standard CPU/RAM WHAT IS A DDOS ATTACK?

TALK THUNDER TPS SURGICAL MULTI-VECTOR DDOS PROTECTION WITH A10 DATA SHEET DDOS DETECTION & MITIGATION

Inline DDoS Protection versus Scrubbing Center Solutions. Solution Brief

Data Sheet. DPtech Anti-DDoS Series. Overview. Series

DDoS Testing with XM-2G. Step by Step Guide

(DNS, and DNSSEC and DDOS) Geoff Huston APNIC

Monitoring the Device

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

Herding Cats. Carl Brothers, F5 Field Systems Engineer

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015

THE EVOLUTION OF SIEM

Security Whitepaper. DNS Resource Exhaustion

DDoS attack patterns across the APJ cloud market. Samuel Chen CCIE#9607 Enterprise Security Architect, Manager - APJ

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks

IBM Cloud Internet Services: Optimizing security to protect your web applications

Distributed Denial of Service

DDoS Managed Security Services Playbook

DDoS: Coordinated Attacks Analysis

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

ICSA Labs Network Firewall Certification Testing Report Corporate Criteria Version 4.2. Huawei Technologies. USG Series/Eudemon-N Series

Radware s Attack Mitigation Solution Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

Global DDoS Threat Landscape

HP High-End Firewalls

Routing Security DDoS and Route Hijacks. Merike Kaeo CEO, Double Shot Security

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Transcription:

TEST REPORT TESTING DDOS DEFENSE EFFECTIVENESS AT 300 GBPS SCALE AND BEYOND Ixia BreakingPoint DDoS Defense Test Methodology Report

TABLE OF CONTENTS EXECUTIVE SUMMARY... 3 WHAT IS A DDOS ATTACK... 5 DDOS ATTACKS HAVE EVOLVED... 5 TESTING LOGISTICS... 6 TEST TOPOLOGY... 7 TEST RESULTS... 9 DDOS DEFENSE OBJECTIVES...11 KEY TAKEAWAYS...13 SUMMARY...14 DISCLAIMER This document does not create any express or implied warranty about A10 Networks or about its products or services, including but not limited to fitness for a particular use and non infringement. A10 Networks has made reasonable efforts to verify that the information contained herein is accurate, but A10 Networks assumes no responsibility for its use. All information is provided as-is. The product specifications and features described in this publication are based on the latest information available; however, specifications are subject to change without notice, and certain features may not be available upon initial product release. Contact A10 Networks for current information regarding its products or services. A10 Networks products and services are subject to A10 Networks standard terms and conditions.

EXECUTIVE SUMMARY Distributed denial of service (DDoS) attacks against critical business services are increasing in intensity, frequency and sophistication. To combat this swell in DDoS activity, organizations must make new investments in DDoS defense solutions. Businesses have suffered sticker shock when investigating expanding, doubling or tripling their DDoS defense capabilities with older, established providers. They need better ways to ensure they re investing in solutions that are more effective, scalable and that make economic sense, while also ensuring future protection. To help companies understand the options available, A10 Networks and Ixia Communications ran a battery of tests to determine the effectiveness at scale of the A10 Networks Thunder Threat Protection System (TPS ) 14045, the industry s highest performance DDoS mitigation appliance. For this report, we assaulted the A10 Thunder 14045 TPS with a barrage of volumetric, network protocol and application attacks real-world attack traffic using the Ixia BreakingPoint security and applications testing platform. Fifteen challenging DDoS attack vectors where applied at scales of up to 310+ Gbps with 360,000 attacking agents. The summary finding is that Thunder 14045 TPS, powered by A10 Networks Advanced Core Operating System (ACOS ) processing engine, was able to deflect the attack vectors individually and simultaneously without any impact to legitimate user traffic. Making investments in new technology is complex because data sheet statistics only tell part of the story. For quantifiable data on how a technology will actually work in their particular network, organizations must test at scale with real-world application traffic and security attacks. Sashi Jeyaretnam Director of Product Management, Ixia TEST RESULT SUMMARY Successfully defended 310+ Gbps of attack and legitimate user traffic Less than 60% average CPU utilization while under full attack Detected and mitigated all fifteen attack vectors No interruption to legitmate user while under attack 3

WHAT IS A DDOS ATTACK? Denial of service (DoS) is a technique an attacker uses to render an online service inaccessible to legitimate users. DoS attack tools and dark web services come in many shapes and sizes, but all focus on overwhelming the target s infrastructure. For example, a web server can be overwhelmed with excessive fake requests so legitimate requests cannot be met. Often, these attacks come from compromised computers or the Internet of Things (IoT), which are remotely controlled by an attacker and used to send the nefarious traffic. These compromised hosts, known as bots and distributed over the Internet, are enlisted in a botnet. This means the attack is launched from many different, distributed hosts simultaneously; which is why DDoS attacks are called distributed denial of service attacks. Attack traffic accumulates to larger and larger traffic rates, all destined for the victim s IP address. DDOS TYPES Technically speaking, DDoS attacks can be divided into several different categories: VOLUMETRIC ATTACKS DNS or NTP amplification attacks, are aimed at flooding and saturating a victim s network connection, thus rendering services unavailable. Amplification attacks use bots that send requests with a fake or spoofed IP address (the victim s IP address) to a service such as a DNS server, which sends a response much larger than the request to the victim s IP address. All of these responses, coming from many usually unpatched or poorly configured Internet servers accumulate large bandwidth data destined for the victim. NETWORK PROTOCOL ATTACKS SYN floods, ping of death and IP anomalies are aimed at exhausting a victim s protocol stack so it cannot respond to legitimate traffic. A SYN flood attack, for example, is based on the fact that a server reserves resources for uncompleted connection requests. Eventually the server times out the connection and frees up the reserved resources, but if these requests happen at a high enough rate, the server s resources deplete and it is overwhelmed, and thus it cannot respond to legitimate requests. APPLICATION ATTACKS Low-and-slow techniques, HTTP GET flood, DNS flood or SSL-based attacks specifically exploit a weakness in an application s function or attempt to overwhelm the service. The approach is similar; the attack intends to consume all resources of the application, eventually overwhelming it. 4

DDOS ATTACKS HAVE EVOLVED SINGLE VECTOR MULTI-VECTOR Volumetric Network Protocol Application Multi-Vector Attacks UDP Flood SYN Floods Slowloris Fragmentation Ping Floods HTTP Get Floods NTP Amplification Malformed DNS R.U.D.Y.......... Simultaneous Attacks Adaptive Strategy... Figure 1: Evolution of multi-vector attacks MULTI-VECTOR ATTACKS Multi-vector attacks have become the norm. Attackers have weaponized their botnets with multiple capabilities to search out weaknesses in their target s defenses by applying multiple attack vectors in sequence or simultaneously to create a multi-vector attack. These types of attacks are the most problematic for a defender when combined with scale. TESTING LOGISTICS The following results summarize the extensive testing conducted by Ixia at A10 Networks San Jose, California headquarters in August 2017. The test conducted and the results collected followed Ixia s DDoS defense validation methodology outlined by Ixia on its methodology paper. The DDoS attacks and legitimate user traffic were created by Ixia s BreakingPoint security and application testing platform run on the 100 GbE-enabled CloudStorm hardware system. A10 Thunder 14045 TPS was placed in L3 mode inpath to the Ixia platform to separate the untrusted zone, which included attacker traffic and legitimate user traffic aimed toward target servers in the trusted zone. The success criteria of the test were to monitor the trusted zone to understand how legitimate user traffic was affected during an attack and to determine if the DDoS attack traffic was adequately detected and mitigated. THE EQUIPMENT USED TO CONDUCT THE TEST BreakingPoint all-in-one applications and network security testing platform, version 8.30.1 with IxOS 8.30EA-Patch1 Thunder 14045 TPS, ACOS version 3.2.2-P1 XGS12-HSL Chassis CloudStorm 100GE Load Module Cloud Storm 40GE Load Module 5

TEST TOPOLOGY The test models a large network with an untrusted zone with legitimate users accessing web services and a large number of attacking botnet agents generating DDoS attacks. The trusted zone is the network segment that includes the target servers protected by A10 Thunder TPS. ITEM Untrusted zone physical network bandwidth PARAMETER 340 Gbps networking # attacking agents defined 360,000 # legitimate user agents defined 138 # protected servers 30 UNTRUSTED ZONE TRUSTED ZONE UDP Fragmentation Flood NTP Amplification ICMP Echo Flood TCP Christmas Tree Flood SYN Flood Legitimate Users TCP SYN+FIN Flood Mirai Botnet Induced DNS DDoS Excessive Post Slowloris Multi-vector A10 Thunder 14045 TPS Servers 100% 100% Attack Traffic Sent Multi-vector UDP Fragmentation Flood NTP Amplification Legitimate User Traffic Sent Slowloris Excessive Post DNS DDoS Mirai Botnet Induced TCP SYN+FIN Flood SYN Flood TCP Christmas Tree Flood ICMP Echo Flood Attack Traffic Received Legitimate User Traffic Received 0% 0% UNTRUSTED ZONE TRUSTED ZONE Figure 2: Network topology 6

The legitimate user traffic models HTTP GET requests and server responses. The attacker traffic comprised fifteen DDoS attack vectors. To determine the effectiveness of Thunder 14045 TPS, a baseline of legitimate users accessing web services was established. This traffic was monitored to understand the impact to legitimate users during an active DDoS attack. First, the DDoS attacks were generated in waves of one attack vector at a time at, followed by a multi-vector attack where all fifteen attacks and legitimate user sessions were applied. TYPE OF ATTACK UDP Fragmentation Flood: Fragmented UDP packet at high rates CATEGORY OF ATTACK Volumetric NTP Amplification: Bots spoof NTP request to the victims server IP Volumetric ICMP Echo flood Volumetric TCP ChristmasTree Flood: TCP packet with PSH, URG and FIN flags set without any data, to exploit the protocol and exhaust resources SYN Flood: TCP SYN packets with 1024 bytes of data, sent at high rate to exhaust both memory and bandwidth of target Network Protocol Network Protocol TCP SYN+FIN Flood: Invalid TCP packet with SYN and FIN flags set, sent at high rate to exploit protocol and exhaust resources Network Protocol Mirai Botnet Induced Various Attacks: Variety of attacks including DNS Flood Attack, Botnet HTTP Flood Attack, Botnet UDP Flood Attack, UDP Plain Flood Attack, Valve Source Engine Query Flood Attacks Volumetric Application Targeted DNS DDoS: A mix of DNS queries and malformed large DNS requests Application Excessive Post: Flood attempts to post large files to web server Application Slowloris: HTTP sessions with incomplete header are attempted Application A combined multi-vector attack Volumetric Application Targeted Figure 3: Attack strategies applied 7

TEST RESULTS ESTABLISH LEGITIMATE USER TRAFFIC BASELINE The legitimate user traffic is modeled as users making HTTP GET requests and the server responses to those requests. These transactions followed normal user traffic patterns and were able to meet all TCP and HTTP authentication challenges. PARAMETER MEASURED RESULTS NOTES Average Throughput GET request 300 Mbps GET response from server 5 Gbps 10,000 concurrent connections Average Latency - Time To First Byte (TTFB) 8.6 ms Figure 4: Legitimate user traffic characteristics Repeated HTTP GET requests were applied throughout the tests, and 5 Gbps of response traffic was sent back to the legitimate users without interruption during peacetime and while under attack. Figure 5: Unaffected legitimate users HTTP GET and responses (from BreakingPoint report) 8

SECURITY EFFECTIVENESS FOR EACH ATTACK TYPE ATTACK STRATEGY MITIGATION STRATEGY RESULTS ATTACK TYPE ATTACK VOLUME OR RATE SENT MITIGATION APPLIED MITIGATION EFFECTIVENESS IMPACT TO LEGITIMATE USERS Excessive HTTP POST 75 Gbps HTTP Challenge POST rate limit Slowloris 3 M simultaneous HTTP sessions at a rate of 100K sessions per second Slow and low attack protection Mirai 50K attacker at 100 Kpps Drop traffic destined to undefined port Drop traffic from well known source port NTP Amplification 90 Gbps Drop traffic from well known source port Drop fragmented UDP packet DNS DDoS 50 Gbps with 2M DNS queries per second DNS authentication challenge DNS malformed query check Drop fragmented UDP packet TCP Christmas Tree Flood 24 Mpps Protocol anomaly filter done by hardware SYN Flood 100 Gbps TCP SYN authentication Drop traffic destined to undefined port UDP Fragmentation Flood 100 Gbps with 9 Mpps Drop fragmented UDP packet TCP SYN+FIN Flood 23 Mpps Protocol anomaly filter done by hardware 9

SECURITY EFFECTIVENESS MULTI-VECTOR ATTACK AT SCALE ATTACK STRATEGY RESULTS ATTACK TYPE ATTACK VOLUME OR RATE SENT MITIGATION EFFECTIVENESS IMPACT TO LEGITIMATE USERS Multi-vector all of the individual attacks run together + ICMP echo flood Aggregate traffic of 310 Gbps with 52 Mpps Figure 6: BreakingPoint test results summary (from BreakingPoint report) A10 Thunder TPS proved itself a powerful mitigation solution against all attack vectors, and simultaneously ensures service availability of legitimate users. Amritam Putatunda Technical Product Manager, Ixia Figure 7: Aggregate BreakingPoint 310+ Gbps untrusted traffic and returned responses (from BreakingPoint report) 10

DDOS DEFENSE OBJECTIVES When it comes to DDoS, the focus should always be on the legitimate user and ensuring that critical services are available to them. Although DDoS attacks are, by nature, largely brute force attacks, DDoS defense must be surgical and able to intelligently distinguish legitimate user traffic from attacking bot behavior. Strategies like Remote Triggered Black Hole (RTBH) and service rate limiting should be the last course of action, not the first, to prevent the service from falling over, because these strategies are indiscriminate and in effect help the attacker accomplish their objective of blocking availability of services to legitimate user. Effective DDoS solutions will include many strategies for detecting and mitigating malicious DDoS behavior, including: Peacetime traffic behavioral learning and anomalous behavioral threshold setting Tracking of multiple behavioral indicators to spot deviation from normal patterns to applications or services Inspection traffic for anomalies at L3-L4 Inspect traffic for protocol and application anomalous behavior Initiate authentication challenges at L4-L7 Limit source session initiated traffic and query rates at network and application layers Policy-based automated mitigation severity escalation Integrates current, accurate threat intelligence at internet scale to stop known bad actors Offer an open API for automated orchestration And more Figure 8: Thunder TPS mitigation console 11

KEY TAKEAWAYS A10 Thunder TPS was designed to deliver high performance with surgical precision to increase the effectiveness of DDoS defense. It is available in a range of form factors that make economic sense to busineses of any size. Thunder TPS offers unrivaled scale, enabling you to reduce the number of units your business must purchase, which has a dramatic positive impact on TCO and overall reliability. COMPARISON AGAINST OLDER ESTABLISHED VENDOR FLAGSHIP PLATFORMS VENDOR & FLAGSHIP APPLIANCE Thunder 14045 Arbor Networks TMS 5000 Arbor Networks* TMS HD 1000 Radware* DP model 400-160 Network interfaces speed available 40 GbE 100 GbE 40 GbE 100 GbE No 40 GbE or 100 GbE available 40 GbE 100 GbE Rack units (RU) 3 RU 6 RU 2 RU 2 RU Throughput 300 Gbps 100 Gbps 160 Gbps 160 Gbps Mitigation packets per second 440 Mpps 40 Mpps 110 Mpps 330 Mpps Number of appliances and RU needed to match Thunder 14045 bandwidth capabilities 1 appliance 3 RU 3 appliances 18 RU 2 appliances 4 RU 2 appliances 4 RU Number of appliances and RU needed to match Thunder 14045 packet rate capabilities 1 appliance 3 RU 11 appliances 66 RU 4 appliances 8 RU 2 appliances 4 RU * As advertised on the vendor websites. Highest performance advertised appliance from the vendor may or may not be in production at the time of this document s reading. Older, established vendors can t keep up with A10 Networks innovation and continue to fall behind. The choice is clear. It is your money. Maximize your investment and get the best DDoS defense to protect against multi-vector attacks with precision and uncompromised scale. 12

SUMMARY New threat vectors have changed the breadth, intensity and complexity of options available to attackers. Established solutions, which rely on ineffective, signature-based IPS or only traffic rate limiting, are no longer adequate. A10 Thunder TPS offers the scalability and precision to defeat the most challenging multi-vector DDoS attacks to make your infrastructure resilient against DDoS attacks. Unlike outdated legacy DDoS protection products, Thunder TPS is built on A10 s market-proven Advanced Core Operating System (ACOS) platform, which delivers scalable form factors and cost structures that make economic sense with a complete detection, mitigation and management solution. A10 Networks Thunder 14045 TPS, the industry s highest performance DDoS defense appliance, was put to the test and was able to defeat DDoS attacks with precision and protect legitimate user at a rate of 310+ Gbps. NOW YOU KNOW THE FACTS Contact A10 and let s get started on a path to a more effective, scalable and cost effective approach to DDoS resilience. ABOUT A10 NETWORKS A10 Networks (NYSE: ATEN) is a Secure Application Services company, providing a range of highperformance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide. For more information, visit: a10networks.com or tweet @a10networks ABOUT IXIA Ixia, a Keysight Business, provides testing, visibility, and security solutions to strengthen networks and cloud environments for enterprises, service providers, and network equipment manufacturers. Learn more at ixiacom.com. LEARN MORE ABOUT A10 NETWORKS CONTACT US a10networks.com/contact Part Number: A10-WP-21144-EN-01 SEP 2017 2017 A10 Networks, Inc. All rights reserved. A10 Networks, the A10 Networks logo, ACOS, A10 Thunder, A10 Lightning, A10 Harmony and SSL Insight are trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries. All other trademarks are property of their respective owners. A10 Networks assumes no responsibility for any inaccuracies in this document. A10 Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. For the full list of trademarks, visit: www.a10networks.com/a10-trademarks. 13