GlobalNet - FAQ: DDoS Protection

We use cookies to improve our services. By continuing to navigate the site, you agree to the terms of use of cookies.

LogIn
Request

Map of GlobalNet backbone networks

hidesearch
Countries and cities of presence

Show more
Backbone network
Enter a query
To perform a broader search, enter the address or name of the data center you are looking for

Map of GlobalNet backbone networks

Filters

Map search

Hide search

21 Apr 2023

FAQ: DDoS Protection

Share

All you have to know about DDoS Protection from GlobalNet.

1. WHAT DDOS PROTECTION SERVICES ARE AVAILABLE FOR CONNECTION?

IN GLOBALNET THERE IS A WIDE RANGE OF SOLUTIONS AVAILABLE FOR IP-TRANSIT TRAFFIC:

  • GBL-TMS — automatic detection and filtering of malicious traffic on a geographically distributed TMS cleaning system.
  • GBL-ACL — automatic detection of attacks with the creation of FlowSpec announcements that limit incoming UDP traffic to the attacked host by bandwidth.
  • GBL-FS — reception and distribution of announcements in the GN FlowSpec network, which are designed to limit incoming traffic before it reaches the protected network. 

IX DDoS Protection is a free protection option for all DATAIX participants. It automatically detects attacks in DATAIX and directs infected traffic to the TMS cleaning system.


2. WHAT TYPES OF MALICIOUS ACTIVITY CAN THE PROTECTION SERVICE REFLECT?

THE DDOS PROTECTION ON THE TMS SYSTEM PROVIDES IDENTIFICATION OF DIFFERENT TYPES OF ATTACKS:

  • Flood attacks: UDP, SYN, HTTP requests;
  • Amplification attacks: DNS, L2TP, NTP, SNMP;
  • Attacks on ICMP and VoIP protocols.

The full list of dangerous attack and protection options can be obtained from GlobalNet specialists.


3. HOW CAN I FIND OUT ABOUT THE BEGINNING OF A DDOS ATTACK, TRACK THEIR HISTORY AND IMPACT ON TRAFFIC?

ACCORDING TO THE NEEDS OF EACH CUSTOMER, THE INFORMATION CAN BE TRACKED:

  • In your personal account available under GBL-TMS, GBL-ACL and IX DDoS Protection services;
  • Via email notifications, syslog, webhooks and telegram chat.


4.WHAT DOES THE STANDARD CONFIGURATION OF PROTECTION AGAINST MALICIOUS ATTACKS INCLUDE?

STANDARD CONFIGURATION INCLUDES:

  1. Set up of the identification of the malicious traffic based on the client’s prefix indications. 
  2. Automatic activation of the traffic clearance according to the recommended counteraction template


5. WHAT DOES THE EXTENDED CONFIGURATION OF PROTECTION AGAINST MALICIOUS ATTACKS INCLUDE?

THE EXTENDED CONFIGURATION INCLUDES:

  • Modification of the rules for blocking and transparent traffic transmission on the TMS system;
  • Creating individual attack detection templates;
  • Installing a unique traffic filtering pattern;
  • Setting up alerts about incoming DDoS attacks with their parameters;
  • Setting up access to your personal account


Sincerely, the GlobalNet team.