Our Layer4 DDoS Protection
Layer4 attacks (infrastructure layer) are usually UDP or SYN floods, which send enormous amounts of data to the IP address.
send huge amounts of data to the IP address in order to crash the underlying server.
Our DDoS protection protects your servers from layer 4 attacks using live or dynamic filtering.
attacks:
Gamefilter
Our game filters are the solution against complex UDP floods that target game and voice servers (e.g. Teamspeak).
Teamspeak).
The idea behind the gamefilter is to offload as much traffic as possible to the DDoS filter (basically the
Edge) to always respond to certain amounts of traffic.
The gamefilter was implemented for several portranges and helps to keep game servers online even in case of very complex
attacks online.
The following port ranges have been implemented specifically for the operation of the following game servers:
-
2300-2400: DayZ und Arma 3, Arma 3 Query
-
5761-5794: Atlas
-
9000-9999: Teamspeak3
-
12800-13100: Hurtworld
-
19132: Minecraft Pocket Edition
-
22000-22020: Rage-MP / MTA
-
22126: Rage-MP / MTA
-
23000-23200: Battlefield
-
27000-28000: Alle Source Engine / Query Games wie z.B. Counter Strike 1.6, Counter
Strike
Source, Counter Strike GO, The Ship, Garrys Mod, Nuclear Dawn, Call of Duty Modern Warfare 3,
Starbound, Space Engineers, 7 Days to Die, Rust, Quake Live, ARK: Survival Evolved, Valheim, Mordhau
-
30000-32000: FiveM GTA-MP
-
36123-36128: Stormworks
In our web interface, even stricter filter profiles can also be activated for specific games.
Known technical effects
While DDoS filters are active, you may notice the following effects, among others:
-
Requests to Dockerhub can be limited/blocked. This can be enabled through a ticket.
-
ICMP traffic may be limited, dropped or answered - icmp packet loss or higher latency may occur.
latency may occur (does not affect other protocols).
-
TCP traffic forces authentication, which can result in the connection being reset at the
reset the first time the connection is attempted.
-
UDP traffic may be limited or force reconnection.
The Layer 7 DDoS protection
DDoS attacks can target different layers. Compared to the past, current DDoS
DDoS attacks often target the top layer: Layer 7 is the application layer and is used to provide functions for the applications and is responsible for data input and output.
It provides functions for the applications and is responsible for data input and output.
Layer 7 attacks specifically target the protocols belonging to Layer 7 such as Telnet, FTP, NNTP, HTTP
or SMTP. Compared to other DDoS attacks, Layer 7 attacks require far less bandwidth and
packets to cause a disruption of services. A low-level protocol attack such as.
SYN flood requires a huge number of packets to carry out an effective DDoS attack,
whereas a Layer 7 attack requires only a limited number of packets to implement a major
DDoS attack.
The most widespread of the Layer 7 attacks is HTTP flooding. In this case, an
HTTP request is sent to the affected server and uses considerable resources, and although the number of
number of packets is limited, they fully utilise all server resources and lead to a denial of service.
denial of service.