Secure Transit protects your on-premise, hybrid, and cloud-hosted networks from DDoS attacks and maximizes network performance by accelerating traffic.
This feature is available to every Gcore customer using the DDoS protection product. To start using Secure Transit, adjust your network settings as described in the following steps.
All you need to do is make sure that your network settings are properly configured. The following steps will help you to do so.
To correctly configure the DDoS protection for your site, we need to get the information about your network setup and traffic patterns. Complete and send us the DDoS protection questionnaire as explained in the following guide: Activate DDoS protection.
To ensure secure and efficient transmission of data packets through our anycast tunnels, the routers at your tunnel endpoints must support the following specifications:
If you are using an IP address provided by Gcore, you can skip this step.
Your Internet Routing Registry (IRR) entries must match the corresponding origin autonomous system numbers (ASNs). This is necessary for establishing accurate and secure traffic routing.
To verify the authenticity of your IP address prefixes, use the Resource Public Key Infrastructure (RPKI). It’s a security framework that links route prefixes to an autonomous system via cryptographic verification, which validates that the routing infomation is correct before it’s passed to your routers.
To check your prefixes, use any available RPKI validation tool or portal available through your service provider.
When sending your original data packets across the network, we encapsulate those packets with additional headers. These headers increase the overall size of each data packet, so you need to add extra space when configuring the maximum transmission unit (MTU) and maximum segment size (MSS) values for your network.
Recommended MSS clamping settings:
GRE tunnels for off-ramp traffic. The TCP maximum segment size (MSS) is 1432 bytes.
Clear the "Do Not Fragment" bit. If can’t set the MSS to less than 1500 bytes, you can clear the "Don’t fragment" (DF) flag in the IP header. When this option is enabled, packets larger than 1500 bytes will be fragmented and reassembled after decapsulation. In most environments, it won’t have significant impact on traffic throughput.
This configuration depends on the actual provider of your router. Here are the instructions for some common network providers:
Configure the tunnels on the Gcore side and your router side to connect to your origin infrastructure. Refer to the Set a GRE tunnel with Gcore guide for details.
After we check and process your DDoS questionnaire, we'll announce your prefixes through the Gcore network using Border Gateway Protocol (BGP). Once it’s done, all incoming traffic will be routed through Secure Transit for DDoS protection and then forwarded to your infrastructure.
Was this article helpful?
Explore our DDoS protection for servers