DDoS Protection is a service that protects Dedicated Servers from DDoS attacks.
Basic (free) Protection is set up on all of our equipment by default. When a server is attacked, the system blocks its IP, so the attacker cannot continue the attack. The server does not suffer, but it becomes unavailable for several hours.
You can order advanced (paid) Protection. It redirects traffic to TMS (threat mitigation system — a system for cleaning traffic and detecting threats) during an attack. This device detects an attack, cleans up the traffic, and sends to the server only data that will not harm it. You can set the ACL (access control list) for TMS. The main advantage is that IP is not blocked during an attack, and the server remains available.
Advanced protection can operate in one of two modes: always-on or on-demand.
With on-demand, traffic passes through the TMS only during an attack. The system needs about a minute to identify the threat and start redirecting traffic to the TMS. The server will receive "dirty" traffic during that time and cleaned traffic — after.
With always-on, your traffic passes through the TMS all the time, even when there is no attack. With this protection mode, the response to the attack will be instant, and the server will be guaranteed to receive only clean traffic.
Improved protection | Basic protection | |
---|---|---|
On-demand | Always-on | |
Payment | Paid | Paid |
How soon it recognizes an attack (maximum time) | 2 minutes | 5 second |
What attacks it protects from | • Standard amplification attacks • Attacks from fake IP addresses • Attacks using flows or volumetric attacks (L3) • Attacks to establish a connection (L4) |
• Standard amplification attacks • Attacks from fake IP addresses • Attacks using flows or volumetric attacks (L3) • Attacks to establish a connection (L4) • Attacks at the application layer (L5-L7) |
Protection mechanism | 1. Attack detected 2. Traffic is redirected to TMS 3. TMS cleans up traffic 4. TMS sends cleaned traffic to the server |
1. All traffic passes through TMS2. When attacked, TMS immediately cleans up the traffic3. TMS sends cleaned traffic to the server |
What cases it is suitable for | • You are rarely attacked • You are not attacked at the application layer (L7) • The server does not host a critical business application |
• You are attacked from 2 to 3 times a day • You are attacked at the application layer (L7) • The server hosts a critical business application |
The price of DDoS Protection service depends on three things:
The price does not depend on the choice of on-demand or always-on protection mode but remember: always-on is available at L3-L7 protection layers, and on-demand is available only at L3-L4.
We are also considering the possibility of providing a tariff with individual conditions: describe protection parameters you are interested in, and we will be happy to discuss an individual offer for you.
Was this article helpful?
Enhance your online presence with our virtual and dedicated servers.