• |

A10 Networks Blog

Select a Topic

  • All Topics

  • 5G

  • A10 News

  • Cloud & Networking

  • Cyber Security

  • Events

  • Glossary

  • Network Management

  • Network Security

  • Network Traffic

  • Open Source

  • Technical Articles

Select Author

  • All Authors

  • A10 PSIRT Team

  • A10 Staff

  • Ahmad Nassiri

  • Ahmed Abdelhalim

  • Akshay Mathur

  • Almas Raza

  • Amar Kapadia

  • Andrew Hickey

  • Arshad Khan

  • Babur Khan

  • Bruna Wells

  • Chris White

  • Derek Kang

  • Dhrupad Trivedi

  • Donald Shin

  • Gennady Dosovitsky

  • Geoff Blaine

  • George Nikaido

  • Gunter Reiss

  • Jeffrey Hughes

  • Jessica Dimaro

  • Jian Liu

  • Jim Frey

  • Kamal Anand

  • Karin Gilles

  • Ken Ludeman

  • Konstantin Dunaev

  • Leah McLean

  • Lee Chen

  • Michael Wheeler

  • Mike Thompson

  • Paul Harms

  • Paul Nicholson

  • Ravi Raj Bhat

  • Rex Chang

  • Rich Groves

  • Robert Keith

  • Sanjai Gangadharan

  • Saurabh Sureka

  • Shingo Takagi

  • Siddhartha Aggarwal

  • Simon Jackson

  • Steve Hotz

  • Subeh Sharma

  • Sudarsan Raghavan

  • Takahiro Mitsuhata

  • Tarun Aggrawal

  • Terry Young

  • Tony Griffen

  • Tracy Schriver

  • Wendi Wolfgram

  • Yasir Liaqatullah

July 8, 2020

NXNSAttack: A New DDoS Attack on Recursive DNS Resolvers

The purpose of a Distributed Denial of Service or DDoS attack is to prevent an online service from working properly by overloading a target service, say a web server, such that valid users either experience poor performance or, taken to the extreme, can’t connect to the target service at all. Whatever the degree of a cyberattack, the consequences are loss of service and loss of revenue which is particularly problematic for ecommerce sites so having DDoS protection in place before your organization suffers a cyberattack is crucial for ensuring business continuity and minimizing risk. But the worst thing about DDoS Read more

July 6, 2020

What’s so bad about the NXNSAttack DNS Amplification Attack?

How did NXNSAttack Against DNS Services get Noticed? In May 2020, the NXNSAttack was identified as a new DDoS attack on DNS servers by the cybersecurity researchers at Tel Aviv University. The NXNSAttack exploits the vulnerability at recursive DNS resolvers and triggers an amplification attack to other recursive DNS servers and authoritative DNS servers by up to 1,620 times the original resolution request. Such a high amplification factor should concern DNS infrastructure owners and DNS server managers. How does NXNSAttack Impact DNS Services? In a typical recursive DNS name resolution process, the authoritative DNS server could return an IP address Read more

July 2, 2020

How do you Load Balance in a Hybrid or Multi-cloud World?

As hybrid cloud and multi-cloud infrastructures become the norm, organizations need to ensure that traffic is managed optimally across every environment they use to deliver the best experience for users and customers. Multi-cloud load balancing introduces new challenges beyond traditional on-premises load balancing, as companies often use a range of diverse on-premises, public cloud, and private cloud environments with differences in configuration. Traffic management has grown more complex as well, encompassing both traditional and modern applications as well as containers. These requirements have placed even more importance on the application delivery controller (ADC), which must now provide a central point Read more

June 30, 2020

How do Layer 4 and Layer 7 Load Balancing Differ?

Load balancing is one of the most important functions of an application delivery controller (ADC), optimally distributing network traffic across servers to provide the best possible application performance and availability. There are a few different ways this can be done; you’ll see references to layer 4 load balancing, layer 7 load balancing, and even L4-7 load balancing. What does this mean, and which of these is the most useful? The difference between layer 4 and layer 7 load balancing is based on the various layers in the Open Systems Interconnection (OSI) Reference Model for networking. An L4 load balancer works Read more

June 29, 2020

Here’s to a great Affinity Partner Virtual Summit 2020

The Affinity Partner Virtual Summit was created to deliver an unmissable experience to our A10 partners, and to reflect our ongoing focus and commitment to the growing network. Our partners are a key part of A10’s business; it’s therefore our continuing ambition to showcase our ever-evolving proposition as a leader in secure application services, and to explicitly demonstrate the value of being an Affinity channel partner. We’re dedicated to strengthening our channel organisation and to ensure all partners, current and future, are empowered to sell A10’s products and solutions and to grow their own customer base. When our partners succeed, Read more

June 24, 2020

AWS hit by Largest Reported DDoS Attack of 2.3 Tbps

Attack Shows it is Imperative for a DDoS Zero-Trust Approach and Continued Diligence We have reached another milestone with the largest Distributed Denial of Service (DDoS) attack on record being reported by Amazon Web Services (AWS) at 2.3 Tbps in Q1 2020. This surpasses the last record attack by a whopping 70 percent. The previous record holder was the Memcached-based GitHub DDoS attack which measured 1.35 Tbps on Feb 28th 2018. Effectively, these headline-grabbing “performance gains” in DDoS attacks have been escalating steadily over the last four years, with a major high-profile attack every two years. This trend includes the Read more

June 17, 2020

What is High Availability Load Balancing?

Today’s enterprises are more dependent on their networks than ever. Trends like mobile broadband, multi-cloud and hybrid cloud, virtualization, remote work, and bring your own device (BYOD) enable employees to be productive from almost anywhere—as long as they have reliable connectivity. That puts tremendous pressure on IT to ensure high availability for mission-critical applications such as ERP, communication and collaboration systems, and virtual desktop infrastructure (VDI). Even the most robust and reliable software and systems can fail. To avoid interruptions and downtime, IT needs to implement a high availability architecture that uses redundancy and fault tolerance to enable continuous operation Read more

June 15, 2020

DDoS Protection and DNS over HTTPS solutions win at Interop Tokyo

Cybersecurity Solutions win Runner-up and Special Awards A10 Networks received a Runner-up Prize under the Security category for the latest version of its A10 Thunder® Threat Protection System (TPS) Virtual, and a Special Prize in the Network Infrastructure category for the A10 Thunder Convergent Firewall (CFW) DNS over HTTPS (DoH) solution at the Interop Tokyo 2020 “Best of Show Awards” held online from April 13. A full list of award winners can be found on the show’s website. The Best of Show Awards commends new products by exhibitors participating at Interop Tokyo – one of Japan’s largest Internet technology exhibitions Read more

June 12, 2020

A10 Networks EMEA Affinity Partner Virtual Summit

At A10 Networks, we are truly committed to the ongoing success of our partner channel community. Our partners and distributors are a key and valued part of the A10 operation; it’s therefore our continuing ambition to clearly define, differentiate and communicate our evolving proposition as a leader in providing secure application services, and to unequivocally demonstrate the business value of being an Affinity channel partner. We’re dedicated to strengthening and expanding our channel organisation and ensuring all current and future partners are emboldened to sell A10’s application security, acceleration and availability products and solutions; and enabled to grow their customer Read more

June 11, 2020

TLS Inspection and Zero Trust Security

Protecting users against modern, invisible cyber threats A security strategy is only as strong as its weakest point. No matter how extensive your network defenses are, if there is even one blind spot, you are still vulnerable to attacks. This is true even for Zero Trust, the model at the core of modern cybersecurity. Fortunately, there is a way to fix it.  Zero Trust Model: The Perfect Security Strategy…with a Catch The Zero Trust security model has become a critical element of network defense. Its rise has been driven by the way traditional concepts of secured zones, perimeters, network segments—even Read more

June 5, 2020

COVID-19: Zoom Calls, Eat, Sleep and Repeat

If You Can, take a Minute to Help The global pandemic has changed the way we all live, and the “new normal” has understandably made us focus on our own situation. Life seems to be a constant string of video conference calls, whether it’s for business or with family and friends, eating, Netflix, sleep and repeat. Despite the isolation measures that are in place globally, with the hyper connected world we live in, you could argue you’ve never had more contact with people than before. Nevertheless, reconnecting with old friends and distant family members, especially those we know are living Read more