About GCore DDoS Protection for dedicated servers

Server Protection is a service that protects dedicated servers from DDoS attacks.

How it works
Advanced protection modes
Billing
 
 
 

How it works

Basic (free) Server Protection is set up on all of our equipment by default. When a server is attacked, the system blocks its IP, so the attacker cannot continue the attack. The server does not suffer, but it becomes unavailable for several hours.

You can order advanced (paid) Server Protection. It redirects traffic to TMS (threat mitigation system — a system for cleaning traffic and detecting threats) during an attack. This device detects an attack, cleans up the traffic, and sends to the server only data that will not harm it. You can set the ACL (access control list) for TMS. The main advantage is that IP is not blocked during an attack, and the server remains available.

Advanced protection can operate in one of two modes: always-on or on-demand.

Advanced protection modes

With on-demand, traffic passes through the TMS only during an attack. The system needs about a minute to identify the threat and start redirecting traffic to the TMS. The server will receive "dirty" traffic during that time and cleaned traffic — after.

With always-on, your traffic passes through the TMS all the time, even when there is no attack. With this protection mode, the response to the attack will be instant, and the server will be guaranteed to receive only clean traffic.

 

Improved protection

Basic protection

On-demand

Always-on
Payment

Paid

Paid Free

How soon it
recognizes an attack (maximum time)

2 minutes

 

5 second

 

3 minutes

 

What attacks it protects from 














• Standard amplification attacks

Attacks from fake
IP addresses

Attacks using flows or volumetric attacks (L3)

Attacks to establish
a connection (L4)







Standard amplification attacks

Attacks from fake
IP addresses

Attacks using flows or volumetric attacks (L3)

Attacks to establish
a connection (L4)

Attacks at the application layer (L5-L7)



Standard amplification attacks

Attacks from fake
IP addresses












Protection mechanism 









1. Attack detected

2. Traffic is redirected
to TMS

3. TMS cleans up traffic

4. TMS sends cleaned traffic to the server


1. All traffic passes through TMS

2. When attacked,
TMS immediately
cleans up the traffic

3. TMS sends cleaned traffic to the server

 

1. Attack detected

2. The attacked IP
is blocked for a while





 

What cases it is suitable for 








You are rarely
attacked

You are not attacked
at the application
layer (L7)

The server does not host a critical business application

You are attacked
from 2 to 3 times a day

You are attacked
at the application
layer (L7)

The server hosts
a critical business application

You are practically
not attacked

The server does not host a critical business application





 

Billing

 The price of a Server Protection service depends on three things:

  • OSI layers to be protected. Two ranges are available: L3-L4 and L3-L 7, the first option is cheaper.
  • The bandwidth that will be used by TMS to send traffic to the server. Several options are available: 1 Mbps, 10 Mbps, 100 Mbps, 200 Mbps, 500 Mbps, 1 Gbps, 2 Gbps, 10 Gbps. The lower the bandwidth is, the cheaper the tariff is.
  • The region where the server is located. Prices vary from location to location, please send a request for service, and we will tell you the price of Server Protection in a particular data center.

The price does not depend on the choice of on-demand or always-on protection mode but remember: always-on is available at L3-L7 protection layers, and on-demand is available only at L3-L4.

We are also considering the possibility of providing a tariff with individual conditions: describe protection parameters you are interested in, and we will be happy to discuss an individual offer for you.

 

Was this article helpful?
Recently viewed articles