DDoS Protection is a service that safeguards your servers and instances from DDoS attacks.
We offer free default DDoS Protection for all our equipment. In the event of an attack, our system blocks the server's IP address, preventing the attacker from continuing their malicious activity. The server is not affected, but it becomes unavailable for several hours.
For advanced DDoS Protection, you can opt for our paid service. During an attack, it redirects traffic to the threat mitigation system (TMS) for traffic filtering and threat detection. The TMS recognizes an attack, removes malicious traffic, and allows only legitimate traffic that won't disrupt the server's operation. You can configure the TMS access control list (ACL) according to your preferences. The main advantage is that a server's IP remains unblocked and available during an attack.
Advanced protection offers two modes: always-on or on-demand.
With an on-demand mode, traffic passes through the TMS only during an attack. The system needs about a minute to identify a threat and redirect traffic to the TMS. During this first minute, a targeted server will receive attack traffic and then filtered traffic.
With an always-on mode, your traffic passes through the TMS, even when there is no attack. This protection immediately responds to an attack and guarantees that only legitimate traffic will be sent to your server.
On-demand (Advanced protection) | Always-on (Advanced protection) | Basic protection | |
Pricing model | Paid | Paid | Free |
Maximum time to recognize an attack | 2 minutes | 5 seconds | 3 minutes |
Attacks it protects from | • Common amplification attacks • IP spoofing attacks • Attacks using flows or volumetric attacks (L3) • Attacks to establish connection (L4) |
• Common amplification attacks • IP spoofing attacks • Attacks using flows or volumetric attacks (L3) • Attacks to establish a connection (L4) • Attacks at the application layer (L5-L7) |
• Common amplification attacks • IP spoofing attacks |
Protection technology | 1. The attack is detected. 2. Traffic is redirected to TMS. 3. TMS filters the traffic. 4. TMS sends legitimate traffic to the server. |
1. All traffic passes through TMS. 2. In case of an attack, TMS immediately filters the traffic. 3. TMS sends legitimate traffic to the server. |
1. Attack is detected. 2. The attacked IP is blocked for a while. |
Use cases | • Your server is rarely attacked• Your server is not attacked at the application layer (L7) • Your server doesn't host any critical business applications |
• Your server is attacked more than 2-3 times a day• Your server is attacked at the application layer (L7) • Your server hosts a critical business application |
• Your server is hardly ever attacked • Your server doesn't host any critical business applications |
With the real-time DDoS attack statistics feature, you can access a live dashboard that provides a comprehensive overview of ongoing attacks on your protected resources.
You can filter statistics by specific data centers, time intervals, and attack metrics such as bits per second (bps) and packets per second (pps.)
The price for DDoS Protection depends on three factors:
The price does not depend on the mode you choose. But note that always-on mode is available at L3-L7 layers, and on-demand mode is available only at L3-L4.
We can also offer you a plan with custom terms. Let us know what protection parameters you are interested in, and we will be happy to negotiate a custom proposal for you.
Was this article helpful?
Explore our DDoS protection for servers