Server Protection is a service that protects your servers and instances from DDoS attacks.
How it works
Advanced protection modes
Pricing
Order service
Deactivate service
How it works
Server Protection (free) is provided for all our equipment by default. In case of an attack, our system blocks the server's IP. So, an attacker cannot continue the attack. The server is not affected, but it becomes unavailable for several hours.
You can order advanced (paid) Server Protection. During an attack, it redirects traffic to the threat mitigation system (TMS), that helps to filter traffic and detect threats. This system recognizes an attack, removes attack traffic, and enables only legitimate traffic that won't impact the server's operation. You can configure the ACL (access control list) for TMS by yourself. The main advantage is that a server's IP is not blocked during an attack, and the server remains available.
Advanced protection can operate in one of two modes: always-on or on-demand.
Advanced protection modes
Advanced protection |
Basic protection | ||
On-demand |
Always-on | ||
Pricing |
Paid |
Paid | Free |
Attack detection |
2 minutes
|
5 seconds
|
3 minutes
|
Types of attacks to be prevented |
• Common amplification attacks • IP spoofing attacks • Attacks using flows or volumetric attacks (L3) • Attacks to establish connection (L4) |
• Common amplification attacks • IP spoofing attacks • Attacks using flows or volumetric attacks (L3) • Attacks to establish • Attacks at the application layer (L5-L7) |
• Common amplification attacks • IP spoofing attacks |
Protection technology |
1. Attack is detected. 2. Traffic is redirected 3. TMS filters the traffic. 4. TMS sends legitimate traffic to the server. |
1. All traffic passes through TMS. 2. In case of attack, TMS immediately filters the traffic. 3. TMS sends legitimate traffic to the server.
|
1. Attack is detected. 2. The attacked IP
|
When it is suitable for you |
• Your server is rarely attacked • Your server is not attacked at the application layer (L7) • Your server doesn't host any critical business applications |
• Your server is attacked more than 2-3 times a day • Your server is attacked at the application layer (L7) • Your server hosts a critical business application
|
• Your server is hardly ever attacked • Your server doesn't host any critical business applications |
Pricing
The price of a Server Protection depends on three things:
- OSI layers to be protected. Two options are available: L3-L4 and L3-L7. The first option is cheaper.
- Bandwidth used by the TMS to send traffic to a server. Several options are available: 1 Mbit/s, 10 Mbit/s, 100 Mbit/s, 200 Mbit/s, 500 Mbit/s, 1 Gbit/s, 2 Gbit/s,10 Gbit/s. The lower the bandwidth, the cheaper the price.
- Server location. Prices vary from location to location. Please send a request, and we will advise you the price for Server Protection in a particular data center.
The price does not depend on a mode you choose. But note that always-on mode is available at L3-L7 layers, and on-demand mode is available only at L3-L4.
We can also offer you a plan with custom terms. Tell us what protection parameters you are interested in, and we will be happy to negotiate a custom proposal for you.
How to activate service
Server Protection is provided for virtual servers, Cloud baremetals, and dedicated servers. We can also protect your equipment that is not hosted by us.
To order protection for a Gcore server, send a request to technical support via chat in the bottom-right corner of the screen. Please note that the main IP of your server will be changed after we set up the protection. In your request, specify the following details:
- server ID,
- OSI levels to be protected (L3-L4 or L3-L7),
- protection mode (on-demand or always-on),
- bandwidth,
- IP whitelist and IP blacklist (optionally, you can specify it later).
To order protection for a third-party server, fill out the application at the bottom of the Server Protection section of our website. In the application, specify the following:
- your contact info,
- location of your equipment,
- subnet of your equipment,
- IP whitelist and IP blacklist (optionally, you can specify it later).
To rent a new dedicated server with Server Protection, select its configuration in the Dedicated servers section of our website and fill out an application at the bottom of the page. In the application, specify the following:
- server configuration,
- OSI levels to be protected (L3-L4 or L3-L7),
- protection mode (on-demand or always-on),
- bandwidth,
- IP whitelist and IP blacklist (optionally, you can specify it later).
To rent a new instance or a baremetal server with Server Protection, send a request to technical support via chat in the bottom-right corner of the screen. In your request, specify that you need Server protected equipment.
How to deactivate service
To deactivate protection of your server, contact our technical support. We will stop the service. Please note that the main IP of your server will be changed after deactivation.