1. Home
  2. Knowledge Base
  3. Howto's
  4. How to migrate from A10 Networks vThunder ADC to SKUDONET

How to migrate from A10 Networks vThunder ADC to SKUDONET


A10 Networks is one of the Application Delivery leaders that is struggling with the future of the Company, and hence, with the continuing support and development of their network security products.

This article will drive you on how to replace A10 Networks vThunder with SKUDONET if you’re planning to look for more modern ADC alternatives. Here, you’ll find some configuration examples and concepts used in A10 Networks which are analogous to SKUDONET.

Basic Concepts

partition: The partitions in A10 Thunder support Layer 3 virtualization for network and virtual service isolation, it’s similar to the namespace concept in Linux.
pool: A pool is a group of objects, in this case, a group or set of IP addresses.
service group: It defines a set of real servers or backends are defined. SKUDONET uses the term service per virtual service of the farm to define a specific behaviour inside a virtual service.
virtual server: This is the inbound virtual service definition, in SKUDONET it’s also called a farm.
member: real server or backend.

Simple L4 Load Balancing Service

This example shows how a simple L4 load balancing service is set up in A10 Networks Thunder and then in SKUDONET ADC.

A10 Networks ADC Configuration

The following example configures in A10 vThunder a VLAN 8 interface in ethernet 0 and set the IP address with its default static route.

active-partition PTEST
vlan 8
 untagged ethernet 0
 router-interface ve 8

interface ve 8
 ip address
ip route /0

Then, to configure a simple source NAT service without transparency and losing the client IP address but hiding our network architecture, it’s required to set the following command.

ip nat pool POOL netmask /24

Later, as our real servers are going to host a web service it will be required to create a health checker against a certain URL and gathering the HTTP 200 OK response:

health monitor SIMPLE_HTTP_CHECK
 method http url GET /status expect response-code 200

Create the real server definitions, 2 of them in this case, setting the name, IP address, and port.

slb server RSERVER1
no health-check
port 80 tcp

slb server RSERVER2
no health-check
port 80 tcp

Create the service group for TCP protocol, assigning the health check and both backend members previously created.

slb service-group SG_GROUP tcp
    health-check SIMPLE_HTTP_CHECK
    member RSERVER1:80
    member RSERVER2:80

Finally, create the virtual service with the previous definitions assigning a virtual IP address for inbound connections with a certain port and protocol, setting a name, associating the source nat pool and then the service group where the outbound connections are defined.

slb virtual-server VIP_GROUP
   port 80 tcp
      name VS_HTTP_GROUP
      source-nat pool POOL
      service-group SG_GROUP

With all these configurations we can set up a simple layer 4 load balancing service for a web service with a health check.

SKUDONET ADC Configuration

In SKUDONET, this configuration can be done via a web graphic interface or automated via rest API. In the web GUI, go to the section Network > VLAN and click over the button Create VLAN. Later on, select the parent interface as the first ethernet interface eth0, set the VLAN name as 8, IP address and netmask. Optionally, you can set up a gateway for this new interface but in any case, the static routes for it will be configured automatically. Finally, click on Create to apply the changes.


Then, go to the section Network > Virtual Interfaces to create the VIP from where the inbound traffic will come, and click on Create Virtual Interface to define the configuration and then apply with the button Create.


The LSLB service needs to be created with the name of the virtual service, the profile to be used in this case L4xNAT, the virtual IP created previously, the virtual port and finally, click on the Create button.


By default, the L4 local load balancing service uses the protocol TCP and source NAT but it could be modified in the future in the global settings of the farm.

Later on, it’s required to go to the just created farm VSGROUP and navigate to the Services tab. Then, add the real servers or backends in the Backends section. Optionally, we can go to the section Network > Aliases to assign backends IP addresses to names in the section Backends Aliases by clicking in the button Add IP Alias.

Finally, we can assign an advanced health check with Farm Guardian and detect the HTTP 200 OK response from a backend. This checker is completely configurable with a lot of preconfigured health checks by default.


In addition, SKUDONET can be completely automated using the latest rest JSON API available.



Was this article helpful?

Related Articles

Download Skudonet ADC Load Balancer
Community Edition

Source Code

A versatile and installable ADC system designed for diverse vendor hardware.


Installable ISO 

Load Balancing as a Service alongside an ADC orchestration toolkit.

Download Community Edition

Download Community Edition

“We manage the information you provide with the sole aim of assisting with your requests or queries in regards to our products or services; applying the computer and security procedures to ensure its protection. Your data can be rectified or removed upon request but won’t be offered to any third parties, unless we are legally required to do so.” Responsible: SKUDONET SL - info@skudonet.com