?
Solved

ddos protection

Posted on 2007-11-14
7
Medium Priority
?
1,255 Views
Last Modified: 2013-12-25
We are asked as a hosting company to provide ddos protection. Is there a per server software we can install also what reasonably priced hardware options are there? We already have an optional per port Cisco ASA firewall, but anything additional?
0
Comment
Question by:ostsupport
  • 4
  • 2
7 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 20353731
this is always a compromise for an ISP as you are damned if you do and damned if you dont.

ISA Server and similar types of application gateways provide various forms of ddos protection from half scans, dns poisoning, fragmentation, floods etc as do the majority of layer 3 boxes such as PIX. The compromise is, for example, that most vpn's use fragmenting as do routers etc where the size of the MTU has been lowered from the standard.

Was there a particular form you had in mind?

0
 

Author Comment

by:ostsupport
ID: 20354066
Not really we are just looking to help protect the network and such. The Cisco ASA firewall does not seem to have IDS or really anything to do in case of DDOS. We host 100's of dedicated servers with all different operating systems and want to ensure that number one an attacked customer does not affect the other customers and number 2 that the attacked customer themselves has a remedy.
0
 
LVL 74

Expert Comment

by:Jeffrey Kane - TechSoEasy
ID: 20355859
If you're concerned about DDoS Protection, you shouldn't be using a hosting company that doesn't provide it at the perimeter level.  You definitely don't want to be having your server itself handling this task since just the act of handling the DDoS Attack would produce it's own DDoS event.

I use The Planet for all my hosting, and they provide this as part of their service: http://www.theplanet.com/why_the_planet/security/

Jeff
TechSoEasy
0
Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

 

Author Comment

by:ostsupport
ID: 20357933
We are the hosting company. We are trying to provide DDoS Protection and other netowrk security as well.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 20360331
Can you give an overview of the perimeter environment?

You mention ASA (version?) but I assume with a sizeable profile like yours you must be using more than that.


0
 

Author Comment

by:ostsupport
ID: 20361593
I am not 100% sure as I am not a tech myself but i believe it goes

2811 cisco router
3550 cisco switch
Optional 5510 ASA firewall
then each rack has its own 3550 to control the bandwith allocated to each server

I believe that is correct, but if you need more i can get the info from one of the techs.
0
 

Accepted Solution

by:
ostsupport earned 0 total points
ID: 20509026
We were looking more like the below solutions

1. IntruGuard: Very cost effective. Has large userbase in Europe and US. Done using ASICs (custom hardware). Can withstand 2 Gbps throughput during worst attacks. Great reviews by analysts and users. Must look at this. Custom solution for DDoS, easy to use GUI. Google for Planeetta and MetaNet and you will find out why webhosts like the appliance. It is very easy to use. Easy to plug-in - bump-in-the-wire. Self-learning and adaptive as your business grows. Tolly Group has great things to say in their performance test for this box. Google Tolly+IntruGuard.

2. Top Layer: Has a user base. Combines IPS with DDoS. IPS is not so much essential in data center. More suited for enterprise deployment. You can cluster multiple of these boxes to get throughput. Costs becomes higher as throughput grows - obviously. Tested by Tolly Group. Google Tolly+Top Layer.

3. Riorey: DDoS solution. Appliance done in software - our current favorite

4.prolexic

Ect
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Securing your business data in current era should be your biggest priority. Numerous people are unaware of the fact that insiders commit more than 60 percent of security breaches. You need to figure out the underlying cause and invoke your potential…
In this article, the configuration steps in Zabbix to monitor devices via SNMP will be discussed with some real examples on Cisco Router/Switch, Catalyst Switch, NAS Synology device.
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question