aGalaxy Management System

Centralized Management System

The A10 Networks® aGalaxy® Centralized Management System delivers everything that organizations need to gain network visibility and control, and scales to manage hundreds of A10 Networks Thunder® ADC line of Application Delivery Controllers or A10 Networks Thunder TPS Systems.

  • Highly scalable
  • Stop DDoS attacks
  • Gain visibility
  • Unify policy management
A10 aGalaxy 5000 Centralized Management

Optimize Operations with Global Monitoring and Management

Large enterprises and service providers face a similar problem: they need to effciently manage networking and security policies across large, geographically distributed data centers. These organizations require a global view of their application environment to rapidly identify and remediate issues and ensure that policies are consistently enforced. And, most importantly, they need a unified platform that can scale with their network.

The A10 Networks® aGalaxy® Centralized Management System delivers everything that organizations need to gain network visibility and control. This solution scales to manage hundreds of A10 Networks Thunder® ADC line of Application Delivery Controllers or A10 Networks Thunder TPS line of Threat Protection Systems, streamlining operations and lowering IT costs. With a solution like this, you have a centralized management system, administrators can monitor and comprehensively analyze their A10 Thunder ADC and Thunder TPS deployments, so they can view Distributed Denial of Service (DDoS) attacks in real time and drill down to see the number of current connections handled by an individual appliance.

Maximize IT Agility and Security

As network operators embrace web scale and DevOps practices such as agile development, they need to quickly provision changes, identify issues and roll back configuration when necessary. Centralized management system makes it easy to assess the application environment and push out policies to dozens or even hundreds of Thunder ADC or Thunder TPS appliances at once.

Stop DDoS Attacks with Laser Precision

Security administrators have their own, unique set of challenges. They must swiftly detect and mitigate DDoS attacks to prevent downtime, often in diverse locations. It can collect sFlow data as well as integrate with DDoS detection systems to identify DDoS incidents. Security administrators can then centrally apply granular policies to block attack traffc and monitor the results of their policy updates from a single pane of glass.

Gaining Visibility

A10 Networks aGalaxy Architecture and Key Components

By implementing this centralized management system, organizations can:

  • Lower operating costs by consolidating management tasks
  • Monitor incidents in real time through a live dashboard
  • Receive DDoS incident alerts and mitigate rapidly
  • Resolve application performance problems anywhere in your network
  • Scale to manage hundreds of Thunder ADC or Thunder TPS appliances
A10 Networks aGalaxy Gain Visibility Into DDoS Attacks

Gain Visibility into DDoS Attacks

aGalaxy centralized management system aggregates data from multiple sources, providing a rich set of telemetry data to monitor live attacks. Collecting sFlow and syslog data from all Thunder ADC devices under management as well as counters and statistics from Thunder TPS appliances, aGalaxy centralized management system offers a complete picture of network activity and attacks.

In addition, the line of hardware and software appliances can integrate with third-party DDoS detection systems that can automatically recognize the telltale signs of a DDoS attack - such as protocol anomalies, a sudden surge in traffc, or a large number of requests from known bots. Once detected, a DDoS attack incident can be created dynamically in aGalaxy using RESTful APIs. Incident management not only tracks key information, like attack duration and type of attack, but it also allows administrators to directly mitigate an attack based on incident data.

Detect and Mitigate DDoS Attacks in Real Time

From the Mitigation Console, security administrators can view a live dashboard of network activity. They can apply mitigation templates or custom countermeasures instantly. With a myriad of policies and thresholds at their fingertips, administrators can granularly regulate traffic and block suspicious activity. Within seconds of applying policies, they can verify whether their policies mitigated the attack and adjust countermeasures as needed.

Unify Policy Management

Centralized management system provides a unified platform for controlling device and application settings. It consolidates all management tasks in one location, making it easy for administrators to apply consistent policies across all devices. From the web user interface, administrators can view the status of virtual servers or, for Thunder TPS management, TPS protected objects. With a few simple clicks, they can edit configuration settings.

Monitor Application Performance

aGalaxy provides a global view of your network from the perspective of your application delivery and DDoS protection platforms. You can identify, diagnose and resolve performance problems before they impact user experience. Detailed logs and counters reveal system status. An interactive services map shows the relationship between load-balancing elements in your network. Specify a service group, a port, a template, an A10 Networks aFleX® script or any other setting to view all of the virtual IPs or Thunder ADC appliances that share that particular configuration.

Simplify Device Management

Managing appliances shouldn’t be diffcult. With this philosophy in mind, A10 has streamlined device management, even for organizations with dozens or even hundreds of A10 Thunder appliances. Upgrade software, manage SSL certificates, and backup and restore configuration files for all of your appliances from one location. By eliminating the need to log into every appliance for device management, you improve operational effciency.

Report on Network Activity and Attacks

aGalaxy offers a variety of security reports that enable organizations to track security events, identify attack trends and address compliance. The solution for Thunder TPS provides a rich set of reports that illustrate overall traffc and blocked attacks by protocol. It also offers Web Application Firewall (WAF) reports to demonstrate security status and satisfy Payment Card Industry (PCI) requirements. All reports can be exported, viewed or printed (for example as a PDF), enabling all stakeholders to analyze security events.