Protection L2 - L5 from DDOS attacks

  • All virtual and dedicated servers of our hosting are automatically connected to the L2 - L5 protection system against DDoS attacks
  • Protection provided by StormWall, one of the largest IT infrastructure security providers, with a maximum coarse bandwidth of more than 3.5 Tbps and fine packet filtering of more than 1600 Gbps
  • For servers, by default, basic traffic filtering rules apply, but for more efficient server operation, individual settings may be required.
  • Дополнительная настройка защиты позволяет отфильтровать лишние запросы к серверу, снизить нагрузку, оптимизировать и максимально снизить ping до Вашего сервера
  • For many popular game servers, we already have ready-made sets of rules to protect against DDoS attacks and we can quickly apply them to your server
  • If there are no ready-made rules, then we can create new rules for your game server or other project
  • To create individual rules, it is necessary to dump legitimate traffic in order for the protection to work as efficiently as possible

The procedure for collecting a dump and setting up individual rules:

    Provision of information
  • You need to tell us what software / game server you have installed, its name and version, for example Minecraft pocket edition 1.18
  • Tell us what ports and protocols (udp/tcp) are used by your software / game server and services on the server itself (ssh, ftp, etc.)
  • Provide the IP address of your PC from which you will connect to the server to collect the dump
    Preparing and collecting a traffic dump
  • You will need to completely disconnect from the server (close rdp/ssh connection, game launchers, etc.) and tell us
  • We will prepare rules for dumping a legitimate connection
  • Then, strictly on our command, you will need to connect, for example, to the game server, log in to the game, play for 1-2 minutes, then exit the game, close the game launcher and disconnect from the server
  • After completing the above steps, you inform us about it
    Application of individual rules
  • We will check if the traffic dump was correctly collected from your IP (if necessary, the procedure will need to be repeated)
  • Next, we will prepare the filtering rules for your project and inform you when it is ready
  • If after applying the rules there are no problems with the server operation, then the configuration of individual protection is completed