SlideShare a Scribd company logo
redGuardian DP100
large scale DDoS mitigation
revision: 2017.08.04
Introduction
1. Large scale (100Gbit – 1Tbit) DDoS attacks are becoming
serious issue for network operators and their customers.
2. DDoS mitigation at this scale is considered complex and
expensive task.
3. We wold like to show you we can mitigate such attacks in a
cost-effective way.
redGuardian DP100 (1)
• DDoS scrubber for terabit scale DDoS attack mitigation
• 100Gbit+ scrubbing capacity per 1RU node
• DPI, lightweight unidirectional states, regexps
redGuardian DP100 (2)
• multi tenancy
• line rate speed
• runs on x86 platform
DDoS attacks
source: Akamai „State of the Internet”, Q4 2016
Notice, almost all high volume attacks are:
• reflected and amplified UDP, including
fragmented responses
• various TCP floods
It is the same and well known for years.
redGuardian – some of mitigated attacks
Protocol Name
UDP Chargen reflected response flood
UDP DNS reflected response flood
UDP Echo reflected response flood
UDP LDAP query flood
UDP LDAP reflected response flood
UDP MSSQL reflected response flood
UDP NetBIOS reflected response flood
UDP NTP reflected response flood
UDP QOTD reflected response flood
UDP RIP reflected response flood
UDP RPC Portmap reflected response flood
UDP Sentinel reflected response flood
UDP SNMP reflected response flood
UDP SSDP reflected response flood
UDP Steam query flood
UDP Steam reflected response flood
UDP fragment flood
TCP SYN flood
TCP ACK flood
TCP FIN flood
TCP RST flood
TCP fragment flood
TCP invalid flags
ICMP PING Flood
ICMP obsolete/legacy messages
ICMP fragment flood
GRE destination address validation
HTTP Wordpress botnet flood
IP invalid checksum
IP invalid fragment offset
IP packet length mismatch
IP source address from private address space
IP source address spoofed as myself
Comparison
Legacy DDoS solutions redGuardian
D/RTBH blocks destination, makes DDoS succed do not block destination IPs, as service should stay alive
S/RTBH blocks source hosts, pushes thousands of entries into FIB,
may block legitimate users (spoofed source IPs)
logic does not rely on blocking source IPs, as these can be spoofed!
manual L3/L4 ACL rules, hard to maintain L3/L4/payload ACLs are preconfigured, harmless; can be adjusted if
needed
installing Flowspec rules by DDoS detection system introduce
pressure on network equipment (thousands of rules pushed) when
facing large botnets and multi vector attacks, reaction is too slow
(dozen of seconds) and may block legitimate users (spoofed source
IPs)
does not require instrumentation from anomaly detection system,
blocks instantly; can match using more criterias than Flowspec,
including packet payload patterns
stateless ACL rules have limited functionality, while stateful engines
can be easily exhausted by installing millions of states
with lightweight states one can maintain billions of states with useful
metadata, thanks to that terabit scale inspection does not have to be
stateless
dedicated appliances using ASICs, NPs or FPGAs make 100Gbit - 1Tbit
DDoS solutions price is very high
x86 hardware is fast, low cost and may already be installed in your
datacenter
Inside redGuardian x86 scrubber
• redGuardian dataplane
• 100G capacity
• 12 x 10G SFP+ port
or
1 x 100G QSFP28 port
• Xeon V3/V4 CPU
• 64GB RAM
• GNU/Linux OS
Inside redGuardian x86 scrubber: Ops perspective (1)
17: sampler-rx: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
18: sampler-tx: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
19: sampler-drop: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
// sniff sampled packets on received, transmitted or dropped side
# tcpdump -ni sampler-drop
# service dataplane status
● dataplane.service - Dataplane service
Loaded: loaded (/lib/systemd/system/dataplane.service; enabled)
Active: active (running) since Tue 2017-05-16 15:25:14 CEST; 6 days ago
Docs: man:dataplane(1)
man:dataplane.conf(5)
Process: 41296 ExecReload=/bin/kill -HUP $MAINPID (code=exited, status=0/SUCCESS)
Main PID: 37932 (dataplane)
CGroup: /system.slice/dataplane.service
└─37932 /usr/sbin/dataplane /etc/dataplane/dataplane.conf
Inside redGuardian x86 scrubber: Ops perspective (2)
# dpkg -l | grep dataplane
ii dataplane 1880.0 amd64 redGuardian anti-DDoS dataplane service
ii dataplane-collectd 280.0 amd64 dataplane collectd integration
// easy 3rd party performance management systems integration like Grafana
redGuardian capabilities (1)
• stateless ACL match L3/L4 and payload
– drop based on provided or custom sigantures
– drop udp sport 1434 data u64 0x5365727665724e61 at 3
– drop udp dport 389 data str "objectclass0" at 34
– drop frag single-or-first icmp type 0 code 1:255
• lightweight, unidirectional state filters
– suitable for asymmetric routing scenarios
– enforce retries, drop fragment chains
– billions of entries
redGuardian capabilities (2)
• rate-limiting
– enforce pps per flow with billions of policers
– enforce Mbps per rule or per customer on exit
• regexp engine
– drop packets with payload maching regular expressions
– match domain names in DNS query section
• source IP tagging for ACL rules
– each /24 of global IPv4 space can have one of 16 tags
– each /32 of global IPv4 space can have up to 8 marks
– drop udp srctag $bad_country
– drop udp marked $bad_ips
Performance
CPU: E3-1231 v3 @ 3.40GHz (Turbo mode disabled)
Note: only one CPU core used for packet fowarding!
Scenario Mpps 10G line rate %
ACL basic drop 14,88 100%
ACL long drop 8,72 59%
TCP SYN state filter 10,04 67%
hashed rate-limit 10,44 70%
redGuardian can handle 100G line rate on modern multicore Xeon server.
Deployment (on-prem, off-path)
1. Place redGuardian scrubbers
nearby transit and peering routers
for effective traffic hijacking.
2. Connect directly to routers or core
switches using n×10G or 100G
ports (LAG), assign /31 p2p for
scrubber.
3. Use 3rd party opensource
(pmacct+ExaBGP, FastNetMon) or
commercial flow-based analytics
tools to detect IP under attack and
divert its incoming traffic (change
next-hop to scrubber or move
packets into special VRF).
4. Ensure injected /32 routes or
Flowspec rules are active at transit
router tables or transit interfaces
only (loop prevention).
redGuardian
scrubber
IP core
transit/peering VRF
flow-based
analytics
IP core
flows or SPAN
BGP /32 injection,
Flowspec rules, PBR
DDoS
victim
diverted traffic to
/32 victim
cleaned traffic
injected into IP core
normal traffic,
other customers
Deployment (on-prem, inline)
redGuardian
scrubber
protected networkupstream
1. Place redGuardian scrubbers between protected network and
upstream providers/transit links, using 2n×10G or 2n×100G ports.
2. Scrubber acts like filtering bridge between pairs of ports.
Availability
• physical 100G appliance
• software license
– use your own x86 hardware
– scale capacity between PoPs as needed
• service (BGP scrubbing center)
Conclusion
redGuardian provides:
1. performance typical for specialised hardware
2. elasticity typical for software
3. working solution for large scale DDoS attacks problem
Additional resources
1. twitter: @redguardianeu
2. https://www.slideshare.net/atendesoftware/presentations
3. https://www.redguardian.eu/
4. http://www.atendesoftware.pl/
5. e-mail: info @ redguardian.eu
DDoS shall not pass!
https://twitter.com/redguardianeu

More Related Content

PDF
Implementing BGP Flowspec at IP transit network
PPTX
Spy hard, challenges of 100G deep packet inspection on x86 platform
PDF
An Introduction to BGP Flow Spec
PDF
DPDK Summit 2015 - Aspera - Charles Shiflett
PPTX
BGP Flowspec (RFC5575) Case study and Discussion
PDF
BPF & Cilium - Turning Linux into a Microservices-aware Operating System
PDF
DPDK Summit 2015 - HP - Al Sanders
PDF
DPDK Summit 2015 - Sprint - Arun Rajagopal
Implementing BGP Flowspec at IP transit network
Spy hard, challenges of 100G deep packet inspection on x86 platform
An Introduction to BGP Flow Spec
DPDK Summit 2015 - Aspera - Charles Shiflett
BGP Flowspec (RFC5575) Case study and Discussion
BPF & Cilium - Turning Linux into a Microservices-aware Operating System
DPDK Summit 2015 - HP - Al Sanders
DPDK Summit 2015 - Sprint - Arun Rajagopal

What's hot (20)

PPTX
High Performance Networking Leveraging the DPDK and Growing Community
PDF
Cilium - API-aware Networking and Security for Containers based on BPF
PDF
DevConf 2014 Kernel Networking Walkthrough
PPTX
TRex Realistic Traffic Generator - Stateless support
PDF
DPDK in Containers Hands-on Lab
PDF
DPDK Summit 2015 - NTT - Yoshihiro Nakajima
ODP
Dpdk performance
PDF
Taking Security Groups to Ludicrous Speed with OVS (OpenStack Summit 2015)
PPTX
Vigor 3910 docker firmware quick start
PPTX
DPDK summit 2015: It's kind of fun to do the impossible with DPDK
PPTX
Enable DPDK and SR-IOV for containerized virtual network functions with zun
PDF
DPDK Summit - 08 Sept 2014 - 6WIND - High Perf Networking Leveraging the DPDK...
PDF
The Next Generation Firewall for Red Hat Enterprise Linux 7 RC
PDF
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
PDF
DPDK Summit 2015 - RIFT.io - Tim Mortsolf
PDF
Linux Native, HTTP Aware Network Security
PPTX
Tc basics
PDF
Network Programming: Data Plane Development Kit (DPDK)
PDF
Performance challenges in software networking
PDF
Open vSwitch - Stateful Connection Tracking & Stateful NAT
High Performance Networking Leveraging the DPDK and Growing Community
Cilium - API-aware Networking and Security for Containers based on BPF
DevConf 2014 Kernel Networking Walkthrough
TRex Realistic Traffic Generator - Stateless support
DPDK in Containers Hands-on Lab
DPDK Summit 2015 - NTT - Yoshihiro Nakajima
Dpdk performance
Taking Security Groups to Ludicrous Speed with OVS (OpenStack Summit 2015)
Vigor 3910 docker firmware quick start
DPDK summit 2015: It's kind of fun to do the impossible with DPDK
Enable DPDK and SR-IOV for containerized virtual network functions with zun
DPDK Summit - 08 Sept 2014 - 6WIND - High Perf Networking Leveraging the DPDK...
The Next Generation Firewall for Red Hat Enterprise Linux 7 RC
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
DPDK Summit 2015 - RIFT.io - Tim Mortsolf
Linux Native, HTTP Aware Network Security
Tc basics
Network Programming: Data Plane Development Kit (DPDK)
Performance challenges in software networking
Open vSwitch - Stateful Connection Tracking & Stateful NAT
Ad

Viewers also liked (8)

PDF
Protect your edge BGP security made simple
PDF
Janog 39: speech about FastNetMon by Yutaka Ishizaki
PDF
Lekker weer nlnog_nlnog_ddos_fl
PPTX
DeiC DDoS Prevention System - DDPS
PDF
Keeping your rack cool
PDF
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
PDF
DDoS Mitigation Tools and Techniques
PDF
Nanog66 vicente de luca fast netmon
Protect your edge BGP security made simple
Janog 39: speech about FastNetMon by Yutaka Ishizaki
Lekker weer nlnog_nlnog_ddos_fl
DeiC DDoS Prevention System - DDPS
Keeping your rack cool
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
DDoS Mitigation Tools and Techniques
Nanog66 vicente de luca fast netmon
Ad

Similar to redGuardian DP100 large scale DDoS mitigation solution (20)

PPT
PDF
Make DDoS expensive for the threat actors
PDF
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
PPTX
Multi-Layer DDoS Mitigation Strategies
PDF
Multi-Layer DDoS Mitigation Strategies
PDF
DDoS Mitigation Strategies by Md. Abdul Awal
PDF
DDos Mitigation Strategie, presented at bdNOG 19
PDF
Postgres clusters
PPT
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
PDF
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
PDF
Inside Microsoft's FPGA-Based Configurable Cloud
PDF
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
PDF
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
PPT
sector-sphere
PPT
Sector Sphere 2009
PPTX
Practice of large Hadoop cluster in China Mobile
PPTX
Dpdk applications
PPTX
RDMA at Hyperscale: Experience and Future Directions
PPTX
Disaster Recovery Experience at CACIB: Hardening Hadoop for Critical Financia...
PDF
Linux HTTPS/TCP/IP Stack for the Fast and Secure Web
Make DDoS expensive for the threat actors
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
Multi-Layer DDoS Mitigation Strategies
Multi-Layer DDoS Mitigation Strategies
DDoS Mitigation Strategies by Md. Abdul Awal
DDos Mitigation Strategie, presented at bdNOG 19
Postgres clusters
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
Inside Microsoft's FPGA-Based Configurable Cloud
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek Janik
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
sector-sphere
Sector Sphere 2009
Practice of large Hadoop cluster in China Mobile
Dpdk applications
RDMA at Hyperscale: Experience and Future Directions
Disaster Recovery Experience at CACIB: Hardening Hadoop for Critical Financia...
Linux HTTPS/TCP/IP Stack for the Fast and Secure Web

More from Redge Technologies (11)

PDF
[PL] DDoS na sieć ISP (KIKE 2023)
PDF
BGP zombie routes
PPTX
100M pakietów na sekundę czyli jak radzić sobie z atakami DDoS
PPTX
BGP hijacks and leaks
PPTX
Stress your DUT
PPTX
Ochrona przed atakami DDoS na platformie x86. Czy można mieć jednocześnie wyd...
PDF
100Mpps czyli jak radzić sobie z atakami DDoS?
PPTX
SCAP – standaryzacja formatów wymiany danych w zakresie bezpieczeństwa IT
PDF
Na froncie walki z DDoS
PDF
100 M pps on PC.
PDF
100 M pakietów na sekundę dla każdego.
[PL] DDoS na sieć ISP (KIKE 2023)
BGP zombie routes
100M pakietów na sekundę czyli jak radzić sobie z atakami DDoS
BGP hijacks and leaks
Stress your DUT
Ochrona przed atakami DDoS na platformie x86. Czy można mieć jednocześnie wyd...
100Mpps czyli jak radzić sobie z atakami DDoS?
SCAP – standaryzacja formatów wymiany danych w zakresie bezpieczeństwa IT
Na froncie walki z DDoS
100 M pps on PC.
100 M pakietów na sekundę dla każdego.

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Approach and Philosophy of On baking technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Machine learning based COVID-19 study performance prediction
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
A Presentation on Artificial Intelligence
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Network Security Unit 5.pdf for BCA BBA.
MIND Revenue Release Quarter 2 2025 Press Release
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Assigned Numbers - 2025 - Bluetooth® Document
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectroscopy.pptx food analysis technology
Advanced methodologies resolving dimensionality complications for autism neur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Approach and Philosophy of On baking technology
Building Integrated photovoltaic BIPV_UPV.pdf
Empathic Computing: Creating Shared Understanding
Machine learning based COVID-19 study performance prediction
A comparative analysis of optical character recognition models for extracting...
Per capita expenditure prediction using model stacking based on satellite ima...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
NewMind AI Weekly Chronicles - August'25-Week II
MYSQL Presentation for SQL database connectivity
A Presentation on Artificial Intelligence
Dropbox Q2 2025 Financial Results & Investor Presentation

redGuardian DP100 large scale DDoS mitigation solution

  • 1. redGuardian DP100 large scale DDoS mitigation revision: 2017.08.04
  • 2. Introduction 1. Large scale (100Gbit – 1Tbit) DDoS attacks are becoming serious issue for network operators and their customers. 2. DDoS mitigation at this scale is considered complex and expensive task. 3. We wold like to show you we can mitigate such attacks in a cost-effective way.
  • 3. redGuardian DP100 (1) • DDoS scrubber for terabit scale DDoS attack mitigation • 100Gbit+ scrubbing capacity per 1RU node • DPI, lightweight unidirectional states, regexps
  • 4. redGuardian DP100 (2) • multi tenancy • line rate speed • runs on x86 platform
  • 5. DDoS attacks source: Akamai „State of the Internet”, Q4 2016 Notice, almost all high volume attacks are: • reflected and amplified UDP, including fragmented responses • various TCP floods It is the same and well known for years.
  • 6. redGuardian – some of mitigated attacks Protocol Name UDP Chargen reflected response flood UDP DNS reflected response flood UDP Echo reflected response flood UDP LDAP query flood UDP LDAP reflected response flood UDP MSSQL reflected response flood UDP NetBIOS reflected response flood UDP NTP reflected response flood UDP QOTD reflected response flood UDP RIP reflected response flood UDP RPC Portmap reflected response flood UDP Sentinel reflected response flood UDP SNMP reflected response flood UDP SSDP reflected response flood UDP Steam query flood UDP Steam reflected response flood UDP fragment flood TCP SYN flood TCP ACK flood TCP FIN flood TCP RST flood TCP fragment flood TCP invalid flags ICMP PING Flood ICMP obsolete/legacy messages ICMP fragment flood GRE destination address validation HTTP Wordpress botnet flood IP invalid checksum IP invalid fragment offset IP packet length mismatch IP source address from private address space IP source address spoofed as myself
  • 7. Comparison Legacy DDoS solutions redGuardian D/RTBH blocks destination, makes DDoS succed do not block destination IPs, as service should stay alive S/RTBH blocks source hosts, pushes thousands of entries into FIB, may block legitimate users (spoofed source IPs) logic does not rely on blocking source IPs, as these can be spoofed! manual L3/L4 ACL rules, hard to maintain L3/L4/payload ACLs are preconfigured, harmless; can be adjusted if needed installing Flowspec rules by DDoS detection system introduce pressure on network equipment (thousands of rules pushed) when facing large botnets and multi vector attacks, reaction is too slow (dozen of seconds) and may block legitimate users (spoofed source IPs) does not require instrumentation from anomaly detection system, blocks instantly; can match using more criterias than Flowspec, including packet payload patterns stateless ACL rules have limited functionality, while stateful engines can be easily exhausted by installing millions of states with lightweight states one can maintain billions of states with useful metadata, thanks to that terabit scale inspection does not have to be stateless dedicated appliances using ASICs, NPs or FPGAs make 100Gbit - 1Tbit DDoS solutions price is very high x86 hardware is fast, low cost and may already be installed in your datacenter
  • 8. Inside redGuardian x86 scrubber • redGuardian dataplane • 100G capacity • 12 x 10G SFP+ port or 1 x 100G QSFP28 port • Xeon V3/V4 CPU • 64GB RAM • GNU/Linux OS
  • 9. Inside redGuardian x86 scrubber: Ops perspective (1) 17: sampler-rx: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 18: sampler-tx: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 19: sampler-drop: <BROADCAST,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast // sniff sampled packets on received, transmitted or dropped side # tcpdump -ni sampler-drop # service dataplane status ● dataplane.service - Dataplane service Loaded: loaded (/lib/systemd/system/dataplane.service; enabled) Active: active (running) since Tue 2017-05-16 15:25:14 CEST; 6 days ago Docs: man:dataplane(1) man:dataplane.conf(5) Process: 41296 ExecReload=/bin/kill -HUP $MAINPID (code=exited, status=0/SUCCESS) Main PID: 37932 (dataplane) CGroup: /system.slice/dataplane.service └─37932 /usr/sbin/dataplane /etc/dataplane/dataplane.conf
  • 10. Inside redGuardian x86 scrubber: Ops perspective (2) # dpkg -l | grep dataplane ii dataplane 1880.0 amd64 redGuardian anti-DDoS dataplane service ii dataplane-collectd 280.0 amd64 dataplane collectd integration // easy 3rd party performance management systems integration like Grafana
  • 11. redGuardian capabilities (1) • stateless ACL match L3/L4 and payload – drop based on provided or custom sigantures – drop udp sport 1434 data u64 0x5365727665724e61 at 3 – drop udp dport 389 data str "objectclass0" at 34 – drop frag single-or-first icmp type 0 code 1:255 • lightweight, unidirectional state filters – suitable for asymmetric routing scenarios – enforce retries, drop fragment chains – billions of entries
  • 12. redGuardian capabilities (2) • rate-limiting – enforce pps per flow with billions of policers – enforce Mbps per rule or per customer on exit • regexp engine – drop packets with payload maching regular expressions – match domain names in DNS query section • source IP tagging for ACL rules – each /24 of global IPv4 space can have one of 16 tags – each /32 of global IPv4 space can have up to 8 marks – drop udp srctag $bad_country – drop udp marked $bad_ips
  • 13. Performance CPU: E3-1231 v3 @ 3.40GHz (Turbo mode disabled) Note: only one CPU core used for packet fowarding! Scenario Mpps 10G line rate % ACL basic drop 14,88 100% ACL long drop 8,72 59% TCP SYN state filter 10,04 67% hashed rate-limit 10,44 70% redGuardian can handle 100G line rate on modern multicore Xeon server.
  • 14. Deployment (on-prem, off-path) 1. Place redGuardian scrubbers nearby transit and peering routers for effective traffic hijacking. 2. Connect directly to routers or core switches using n×10G or 100G ports (LAG), assign /31 p2p for scrubber. 3. Use 3rd party opensource (pmacct+ExaBGP, FastNetMon) or commercial flow-based analytics tools to detect IP under attack and divert its incoming traffic (change next-hop to scrubber or move packets into special VRF). 4. Ensure injected /32 routes or Flowspec rules are active at transit router tables or transit interfaces only (loop prevention). redGuardian scrubber IP core transit/peering VRF flow-based analytics IP core flows or SPAN BGP /32 injection, Flowspec rules, PBR DDoS victim diverted traffic to /32 victim cleaned traffic injected into IP core normal traffic, other customers
  • 15. Deployment (on-prem, inline) redGuardian scrubber protected networkupstream 1. Place redGuardian scrubbers between protected network and upstream providers/transit links, using 2n×10G or 2n×100G ports. 2. Scrubber acts like filtering bridge between pairs of ports.
  • 16. Availability • physical 100G appliance • software license – use your own x86 hardware – scale capacity between PoPs as needed • service (BGP scrubbing center)
  • 17. Conclusion redGuardian provides: 1. performance typical for specialised hardware 2. elasticity typical for software 3. working solution for large scale DDoS attacks problem
  • 18. Additional resources 1. twitter: @redguardianeu 2. https://www.slideshare.net/atendesoftware/presentations 3. https://www.redguardian.eu/ 4. http://www.atendesoftware.pl/ 5. e-mail: info @ redguardian.eu
  • 19. DDoS shall not pass! https://twitter.com/redguardianeu