How the StormWall DDoS protection service works

Website protection
You redirect your DNS record (yourself or with our help) to the protected IP
We proxy traffic from the visitors of your website, redirecting to your server only clean traffic saving real visitors’ IPs in HTTP header.
You can read more about what DDoS attacks are and how you can protect yourself in the article “What is DDoS (Distributed Denial of Service)“
How the StormWall DDoS protection service works
IP protection (TCP/UDP)
Connection is established with GRE/IPIP tunnel or using proxy.
IPIP/GRE tunnel is possible if you are using *nix system (Linux, FreeBSD) or specialized router (Cisco, Mikrotik etc.). In this case we «teleport» protected Storm IP to your equipment and you use it for your clients.
When you use OS Windows on your server, proxy is used. In these cases all the requests from your clients will come from one IP address.
IP protection (TCP/UDP)
Network protection (BGP)
We establish GRE/IPIP/MPLS tunnel or physical connection with you on one or our connection points
We set up a BGP session which you use to announce your IP prefixes
We accept your announcement, filter all the traffic and deliver only legitimate traffic to your router
You can divert all traffic through StormWall or only incoming traffic, depending on your needs. You can use protection service always or activate it yourself only in case of attack.
Network protection (BGP)

Global Filtering Network

> 4500 Gbit/s
Filtering Capacity
> 4500Gbit/s
bandwidth without connection inspection (stateless) - processing IP packets on ACL/FlowSpec level without TCP connection check (blocking TCP/UDP amplifications)
User's manual
user-manual.svg

You can download the user manual from this link

We use cookies to make the site faster and more user-friendly. By continuing to use the site you agree to our Privacy Policy