The “StormWall for Servers” service filters all types of malicious traffic, connected through an IPIP/GRE tunnel, proxying, or directly on the platform. The service is designed for both end customers (web services, gaming services, VoIP, business web applications, etc.) and service providers (data centers, hosting and internet providers, telecom operators, etc.).).
Implementation options:
- Tunneling
We provide your equipment with an external protected Storm IP that clients connect to.
You will still see the IP addresses of your users.
This solution is suitable for Unix-based operating systems and specialized routers. - Proxying
All requests to the server will originate from a single IP address.
You will not see the IP addresses of your users.
Suitable for Windows operating systems.
This service:
- Provides reliable protection for TCP/UDP services against DDoS attacks;
- Filters unlimited volumes of traffic;
- Does not limit the number of ports on your server;
- Provides filtering at OSI layers 3-5.

For traffic filtering, Triple Filter is used; for HTTP flood filtering, the BanHammer technology is applied; for protection against failures at StormWall network nodes, the Global Session technology is utilized; and for acceleration, the HyperCache technology is employed.
To reduce response time and minimize issues related to the use of NAT, StormWall implements the ZeroNAT (no NAT at all) Tunnels technology. As a result, the customer receives a real IP address directly on their server. Moreover, there are no restrictions on the number of ports used.