User Visibility The EX Series is the industry’s only appliance combining bandwidth management, link manage- ment, and network monitoring with application and user visibility. This helps organizations optimize and secure their networks by understanding their current network demands at the application and user level, applying traffic policies to enforce network utilization, and increasing reliability of traffic through the use of application prioritization and multiple links. The EX series is built on a high performance and secure platform for an unmatched solution to optimize the network edge.
Bandwidth Management Application & User Visibility Link Management
Comprehensive Protocol Support Bandwidth Utilization Reports Link Load Balancing
Maximize bandwidth with support for Bandwidth utilization reports quickly iden- Support multi-homed networks with fine- over 100 applications to ensure the most tify top applications, and users consuming grained load balancing across two or more critical network traffic receives the high- the most bandwidth. Graphical real-time WAN links to help increase WAN capacity, est priority across WAN links. The EX and historical reports with drill down ca- ensure link level redundancy and optimize provides automatic application protocol pabilities are available from the web user network traffic over the WAN. The EX classification, comprehensive policies and interface. PDF, HTML or XML format- allows mission critical applications to use traffic controls such as rate shaping, rate ted reports may be exported manually highly available dedicated links and non- limiting, selective dropping, priority mark- or emailed periodically on a configurable critical applications such as web brows- ing and automatic load aware shaping. schedule. ing or multimedia to use links with lower service level agreements. Application Protocol Identification Identity-Based Application Visibility Application protocol classification tech- Know who is doing “what” and “when” by Performance, Security & Flexibility niques extend above simple Layer 3 and 4 monitoring application activity and applica- (IP and port) combinations. Deep packet tion user identities for a variety of Instant High Performance inspection techniques enable the EX to Messaging (IM), file transfer, and email 1 Gbps to 4 Gbps throughput allows identify application protocols for positive applications. Combine with A10’s ID Se- the network capacity room to grow and application identification. These tech- ries appliance to enhance all reports and scale with increasing needs. niques enable the EX to identify applica- policies with a company assigned identity, tion protocols that use port hopping, port machine host name, and MAC address for Network IPS tunneling, and encryption. unprecedented visibility and control. Identify network anomalies before they impact your internal machines. Provide Innovative User Based QoS Policies Application Logging real time protection against attacks such Allocate bandwidth and network applica- Log discrete application actions with user as Distributed Denial of Service (DDoS), tion access transparently to a user based name, such as writing a file, sending an port scans, address sweeps, protocol solely on their company assigned user ID. email or posting data to a web site, and misuse and malformed packets. Practically any corporate data store such archive them periodically for compliance as Active Directory, SQL database and or post event investigations. Use a free Flexible Deployment Options LDAP is available when connecting to an form text search engine to pinpoint events Integrate into existing network infrastruc- A10 ID Series appliance. Traditional QoS of interest. tures with support for both transparent policies based on Layer 3-7 traffic clas- and gateway modes, allowing fail open or sification and heurstics can also be used closed configurations. Transparent mode to control bandwidth consumption. also means no network configuration is changed for seamless deployment.
EX Series Features »» Application Bandwidth Management ros, Lotus, IPP, NNTP, NTP, Printer, RPC, yy Application logging RPC2Portmap, Router, Shell, SNMP, Sun File Transfer – FTP, NFS, CIFS yy QoS policy actions RPC, Syslog, Time, UUCP ) Mail - SMTP, POP3 Automatic load aware shaping Instant Messaging – Yahoo, AOL, MSN, QQ Rate shape, limit, drop »» Link Management Web – HTTP Post Connection limit yy Map application ID to company assigned ID* Priority marking yy Inbound and outbound WAN link balance yy Augmented with ID, host name, and MAC* Apply sub-policy yy Link preference by QoS class yy QoS policy rules yy Bind different classes to different link sets »» IPS Anomaly Protection 100+ predefined application classes yy Expose internal services using Destination Custom classes based on L2-L7 Network Address Translation (DNAT) or yy 28 network anomaly types attributes server load balancing (SLB) DDoS Attacks Custom classes based on Identity* yy Use built in DNS or 3rd party DNS ICMP Based Attacks aFleX powered custom classification yy Packet steering or link load balance by IP Based Attacks engine domain name or identity* TCP/UDP Based Attacks Heuristics based classification yy Link load balancing algorithms yy Predefined application class categories Round Robin »» Layer 2 and Layer 3 Support Peer-to-Peer (Ares, BitTorrent, Cspace, Weighted Round Robin Dijjer, DirectConnect, eDonkey-eMule, Least Connection yy L3 routing protocols FreeCast, Gnutella, Limewire, KaZaA, Weighted Least Connection RIP2 Krawler, PPLive, PPStream, Share, Bandwidth Usage OSPF SoulSeek, TVAnts, WinMX, Xunlei) Round Trip Time Static Route Multimedia (Abacast, Flash Video, Bandwidth Price yy L2 transparent mode iTunes, Motion, Quicktime, RTP, RTSP, Tagged and untagged Vlans Shoutcast, Windows Media) »» Application and Identity Visibility Voice-over-IP (H323, Skype, Skinny) Instant Messaging (AOL, Yahoo, MSN, yy Granular reporting »» Management Gtalk, IRC, QQ) Top N internal talkers Access (SSH, rlogin, telnet, Remote Top N external talkers yy Industry standard Command Line Desktop, VNC) Top N applications Interface (CLI) File Transfer (FTP, RCP, NFS, CIFS, Top N URLs yy Intuitive Graphical User Interface (GUI) SMB, NetBIOS, Netware) Packet size distribution yy Localized for Chinese, Japanese and Email (MS Exchange, POP3, IMAP, Interactive drill down Korean SMTP, BIFF) Periodic graphical reports yy SSH, Telnet, RS-232 Serial Console Database (mySQL, Oracle) Threshold alerts Directory (LDAP, ident) Enhanced with Identity, Client Host »» High Availability Web (HTTP, HTTPS) Name, and Client Host MAC address* Miscellaneous (AURP, Ariel, BGP, Day PDF, HTML or XML format yy Active/Standby Time, DHCP, DNS, Echo, Gopher, Kerbe- By application, subnet, VLAN or interface * Requires ID Series IP-to-ID integration
EX Series Hardware Summary
EX 1100 EX 2110 Processor Single Quad Core Single Quad Core Ethernet Interface Gigabit Copper 4 6 Gigabit Fiber – SFP Mini GBIC 0 2 Management Interface Yes (separate port) Yes (separate port) Console Port Yes Yes Hard Disks Single Single Cooling Fan Single, Fixed Single, Fixed Maximum Power Consumption 131 W 158 W Single 250 W Single 250 W Power Supply 100 to 240 VAC, Frequency 50 – 60 Hz Power Off Bypass Yes Yes 1.75 in (H) 1.75 in (H) Dimensions 17.3 in (W) 17.3 in (W) 16.7 in (D) 16.7 in (D) Rack Units (Mountable) 1U 1U Unit Weight 16 lbs 16 lbs Operating Ranges Temperature and Humidity 0° - 40° C 5% - 95% Regulatory Certification FCC Class A, UL, CE, TUV, CB, VCCI Standard Warranty 90-day Hardware & Software
General Information visit: www.a10networks.com | +1-408-325-8668