Avatar of routerwala
routerwalaFlag for India

asked on 

stopping ddos attacks

WE ARE FACING MASSIVE DDOS ATTACK FOR OUR NETWORK
WE ARE USING 1 STM BANDWIDTH FOR OUR NETWORK.
WE HAVE BLOCKED THIS MASSIVE DDOS ATTACK AT OUR END USING RADWARE BOX . BUT MAIN PROBLEM IS ,
THAT MASSIVE DDOS ATTACK CONSUME 1 STM BANDWITH BETWEEN OUR BOX AND UPSTREAM PROVIDER, HENCE OUR 1 STM PIPE GETS BLOCK
. BECAUSE OF THIS WE FACING OUTAGE IN OUR NETWORK FOR INTERNAET TRAFFIC.
PLEASE , LET US KNOW ANY SOLUTIONS FOR THIS,
THANK TOU
SecuritySoftware FirewallsVulnerabilities

Avatar of undefined
Last Comment
mo_patel
SOLUTION
Avatar of rharland2009
rharland2009

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Avatar of mav7469
mav7469

What port are the attacks comming in from?  Have you turned off ICMP on your firewall?
Avatar of routerwala
routerwala
Flag of India image

ASKER

yes we have turned off all incoming ports.
SOLUTION
Avatar of madunix
madunix

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
ASKER CERTIFIED SOLUTION
Avatar of mo_patel
mo_patel

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
Security
Security

Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.

32K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo