The “StormWall for Servers” service involves filtering any types of malicious traffic, connected via a tunnel based on the IPIP/GRE protocol, proxying, or directly on the platform. The service is aimed at both end customers (web services, gaming services, VoIP, web applications for business, etc.) and service providers (data centers, hosting and internet providers, telecom operators, etc.).
Implementation options:
- Tunneling
We provide an external protected Storm IP to your equipment, which clients connect to.
You will know the IP addresses of your users.
Suitable for Unix OS and specialized routers. - Proxying
All requests to the server will come from a single IP address.
You will not know the IP addresses of your users.
Suitable for Windows OS.
This service:
- provides reliable protection of TCP/UDP services from DDoS attacks;
- filters an unlimited volume of traffic;
- does not limit the number of ports on your server;
- provides filtering at OSI model levels 3-5.

For traffic filtering, Triple Filter is used; for HTTP flood filtering, the BanHammer technology is applied; for protection against failures at StormWall network nodes, the Global Session technology is utilized; and for acceleration, the HyperCache technology is employed.
To reduce response time and minimize issues related to the use of NAT, StormWall implements the ZeroNAT (no NAT at all) Tunnels technology. As a result, the customer receives a real IP address directly on their server. Moreover, there are no restrictions on the number of ports used.