Server availability to fulfill requests and responsiveness to clients are essential for computing transactions, especially for Web-based transactions. Outages are not tolerated and 99.999% uptime expectations are now normal.
Traffic spikes in the form of malicious attacks or legitimate traffic peaks are common. Solutions to ensure computing resources are available despite overwhelming traffic conditions are now viewed as essential to the network infrastructure.
The AX Series new generation Application Delivery Controllers are designed to protect server farms by effectively controlling the total connection limit and the rate of new connections, despite overwhelming traffic or malicious attacks from users.
A tiered approach to session validation needs to be implemented with multiple check points and methods, all performing at high speeds. Valid connection requests may occur due to extraordinary traffic, such as huge spikes in Web traffic during the online holiday shopping season. In addition to huge legitimate traffic, there can be malicious attacks that make a Website unreachable or unresponsive to legitimate traffic. Protections against malicious traffic are available in the AX to ensure site availability and performance:
A10's AX Series is specifically built for processor-intensive, high volume networking tasks. The AX Series includes the Advanced Core Operating System (ACOS), which integrates modern multi-core, multi-threaded software to provide significant performance advantages.
Typical multiprocessing appliances with distributed memory have significant challenges for any task that requires aggregation of data among multiple cores. The typical method to collect the data among multiple cores is Inter-Process Communication (IPC). IPC can introduce millisecond delays that prevent users from receiving real-time, accurate data. The more cores an appliance has, the longer the delays it will have with IPC data aggregation.
The AX Series deploys shared memory, together with ACOS technology to enable effective enforcement of rate limiting and connection limits. The AX architecture provides the flexibility to implement any future security enhancement without sacrificing performance.
To find out more, please contact us.