High-Performance Visibility in SSL Encrypted Traffic
SSL encrypted traffic is growing, rendering most security devices ineffective.
Gain visibility into encrypted traffic with SSL Insight and stop potential threats.
Thunder SSLi Product Datasheet
How it benefits your business
Decrypt SSL once, inspect multiple times
Best-in-class SSL decryption eliminates the blind spot in corporate defenses by enabling third-party security devices to inspect encrypted traffic.
See more with dynamic Web category classification
A cloud-based self-learning network that can classify over 13 billion URLs and 460 million domain names for superior visibility.
Get better value from your security infrastructure
The high-performance Thunder SSLi platform offloads burdensome tasks such as SSL decryption, URL filtering and ICAP integration from perimeter security.
Flexible, high-performance visibility
Comprehensive SSL inspection using multiple ciphers, including ECDHE with Perfect Forward Secrecy (PFS), with up to 40 Gbps of SSL inspection throughput, while offering the flexibility to deploy in either transparent or explicit proxy modes.
Application delivery partitions
Support for multiple virtual partitions using A10’s Application Delivery Partition (ADP) technology lets you deploy a single appliance for both SSL decryption and encryption to inspect and secure web traffic.
URL category bypass
Dynamic URL classification lets you define policies allowing specific traffic streams to bypass decryption to meet distinct data privacy and compliance requirements (HIPAA, PCI, etc.).
Deny access to specific URL categories and respond with custom messages.
Firewall load balancing
Advanced server load balancing of decrypted traffic to external security devices delivers expanded visibility. Offloading SSL encryption and decryption improves security infrastructure performance.
Reduced load on security infrastructure
Leveraging the Internet Content Adaptation Protocol (ICAP) allows you to set fine-grained policies to selectively redirect traffic to security devices and service chains based on application type.