Solved

ddos protection

Posted on 2007-11-14
7
1,242 Views
Last Modified: 2013-12-25
We are asked as a hosting company to provide ddos protection. Is there a per server software we can install also what reasonably priced hardware options are there? We already have an optional per port Cisco ASA firewall, but anything additional?
0
Comment
Question by:ostsupport
  • 4
  • 2
7 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 20353731
this is always a compromise for an ISP as you are damned if you do and damned if you dont.

ISA Server and similar types of application gateways provide various forms of ddos protection from half scans, dns poisoning, fragmentation, floods etc as do the majority of layer 3 boxes such as PIX. The compromise is, for example, that most vpn's use fragmenting as do routers etc where the size of the MTU has been lowered from the standard.

Was there a particular form you had in mind?

0
 

Author Comment

by:ostsupport
ID: 20354066
Not really we are just looking to help protect the network and such. The Cisco ASA firewall does not seem to have IDS or really anything to do in case of DDOS. We host 100's of dedicated servers with all different operating systems and want to ensure that number one an attacked customer does not affect the other customers and number 2 that the attacked customer themselves has a remedy.
0
 
LVL 74

Expert Comment

by:Jeffrey Kane - TechSoEasy
ID: 20355859
If you're concerned about DDoS Protection, you shouldn't be using a hosting company that doesn't provide it at the perimeter level.  You definitely don't want to be having your server itself handling this task since just the act of handling the DDoS Attack would produce it's own DDoS event.

I use The Planet for all my hosting, and they provide this as part of their service: http://www.theplanet.com/why_the_planet/security/

Jeff
TechSoEasy
0
Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

 

Author Comment

by:ostsupport
ID: 20357933
We are the hosting company. We are trying to provide DDoS Protection and other netowrk security as well.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 20360331
Can you give an overview of the perimeter environment?

You mention ASA (version?) but I assume with a sizeable profile like yours you must be using more than that.


0
 

Author Comment

by:ostsupport
ID: 20361593
I am not 100% sure as I am not a tech myself but i believe it goes

2811 cisco router
3550 cisco switch
Optional 5510 ASA firewall
then each rack has its own 3550 to control the bandwith allocated to each server

I believe that is correct, but if you need more i can get the info from one of the techs.
0
 

Accepted Solution

by:
ostsupport earned 0 total points
ID: 20509026
We were looking more like the below solutions

1. IntruGuard: Very cost effective. Has large userbase in Europe and US. Done using ASICs (custom hardware). Can withstand 2 Gbps throughput during worst attacks. Great reviews by analysts and users. Must look at this. Custom solution for DDoS, easy to use GUI. Google for Planeetta and MetaNet and you will find out why webhosts like the appliance. It is very easy to use. Easy to plug-in - bump-in-the-wire. Self-learning and adaptive as your business grows. Tolly Group has great things to say in their performance test for this box. Google Tolly+IntruGuard.

2. Top Layer: Has a user base. Combines IPS with DDoS. IPS is not so much essential in data center. More suited for enterprise deployment. You can cluster multiple of these boxes to get throughput. Costs becomes higher as throughput grows - obviously. Tested by Tolly Group. Google Tolly+Top Layer.

3. Riorey: DDoS solution. Appliance done in software - our current favorite

4.prolexic

Ect
0

Featured Post

3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
The new Gmail Phishing Scam going around is surprising even the savviest of users with its sophisticated techniques.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question