Feeds

A10 ships new iron, OS

Layer 4 connections per-second-per-Watt as a measure of green, anyone?

Maximizing your infrastructure through virtualization

A10 Networks has announced new gateway devices and a revision to its ACOS operating system.

The three new chunks of metal are the 6430 / 6430S (same unit, with and without SSL support) and the half-the-power, half-the-price 5430S.

A10's director of product marketing Paul Nicholson introduced El Reg to yet another measure of green-ness, the number of Layer 4 connections per second per Watt it will support, a measure that seems to have less-than-ubiquitous support.

However, some of the measures in the Thunder kit come more readily to hand: the 6430S supports 150 Gbps throughput, handles 5.3 million Layer 4 connections per second, and has enough grunt to handle 1,024 tenants. The SSL-supporting version can run more than 130,000 new SSL connections per second.

For those without the $US229,000-plus (add $US40,000 to include SSL), the 5430S is a fifty-fifty tradeoff, with performance and price both more-or-less halved: 2.8 million layer 4 connections per second, and 67,000 SSL CPS at $US139.995.

The other thing the company is keen on pointing out is the small form factor, with the 6430 a single RU high. Nicholson also pointed to the “no moving parts” philosophy – or nearly none, and the fans are fully hot-swappable.

For DDoS defence, the 5230S unit claims the capacity to get in the way of 113 million SYN cookies per second, while the 6230S stops 212 million.

That feature, along with the new Web application firewall capabilities and authentication services, have been added to the A10 ACOS operating system with no extra license fees.

The authentication services, Nicholson said, are designed to simplify cases such as where different security is applied to internal and external users – such as a company Wiki, where someone outside the firewall has to authenticate, but not someone connected to the corporate LAN.

Authenticating at the Wiki's server, he pointed out, presents a risk, since if there's a vulnerability on the server, it's exposed to the outside world. So A10's position is that if the user has to authenticate to get past the Thunder device, they never get as far as the server.

“You're shifting the authentication away from a Web server's known exploits”, he told The Register. ®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.