Skip Navigation LinksHome > Vendors > A10 > a10tps3.1

A10TPS3.1 - TPS 3.1


Duration: 2 days
#threat protection system #ddos attack #traffic rate limit #traffic rate interval #precedence of ddos #tps mitigation strategy #ip protocol attack #tcp protocol attack #http protocol attack #monitoring & debugging

Instructs Network Operations, Development Operations, Network Security, and Architects on implementing an effective threat protection system for A10 ACOS deployments in data center environment.


Students learn to:
  • Use aGalaxy to orchestrate TPS devices
  • Monitor traffic and detect attacks
  • Configure and apply mitigation strategies against the following DDoS attacks
  •  volumetric
  •  protocol
  •  reflection
  •  resource
  • Generate reports
  • Examine network traffic at the packet level


TPS Deployment

  • Types of DDoS Attacks
  • TPS Deployment Modes
  • High Availability

DDoS Mitigation

  • Protection Layers
  • Protected Objects
  • Traffic Software Scrubbing Process
  • Mitigation Tables
  • Black / White Lists
  • Using aFlex Scripts


Traffic Rate Limiting

  • Defaut Traffic Rate Limits
  • Traffic Rate Interval
  • Custom Traffic Rate Limits
  • Templates
  • Precedence of DDoS Settings
  • Rate-Limiting by Class-List
  • Rate-Limiting by Geo-Location


TPS Mitigation Strategies 1: Volumetric Attacks

  • TCP SYN Flood
  • TCP SYN Cookie
  • TCP Anomalies
  • DNS Attacks
  • NTP Attacks


TPS Mitigation Strategies 2: Protocol Attacks

  • IP Protocol Attacks
  • ICMP Protocol Attacks
  • TCP Protocol Attacks
  • HTTP Protocol Attacks
  • SSL Attack Mitigation


TPS Mitigation Strategies 3: Resource Attacks

  • Slowloris
  • Slow Read Attacks
  • SLow Post Attacks


Monitoring & Debugging

  • sFlow
  • Using axdebug


Who Should Attend

  • Network Operations (NetOps)
  • Development Operations (DevOps)
  • Network Security (NetSec)
  • Architects (Arch)


  •  OSI reference model
  •  Network topology and administration




Course ID:

Show Schedule for: