[179275] in North American Network Operators' Group
RE: PoC for shortlisted DDoS Vendors
daemon@ATHENA.MIT.EDU (Kate Gerry)
Mon Apr 6 14:57:35 2015
X-Original-To: nanog@nanog.org
From: Kate Gerry <kate@quadranet.com>
To: Arzhel Younsi <xionox@gmail.com>, "nanog@nanog.org" <nanog@nanog.org>
Date: Mon, 6 Apr 2015 11:54:57 -0700
In-Reply-To: <1428346060.335551.249898177.74182BBA@webmail.messagingengine.com>
Errors-To: nanog-bounces@nanog.org
WANGuard is great for detection but WANFilter failed my tests.
I couldn't filter a 700mbit SYN flood. The best it did was to completely bl=
ock TCP/80. It uses netfilter to block Layer3 attacks.
It does have ACL support for some Intel NICs, but it doesn't use it near en=
ough.
=20
--
Kate
=A0=A0=A0=A0
-----Original Message-----
From: NANOG [mailto:nanog-bounces@nanog.org] On Behalf Of Arzhel Younsi
Sent: Monday, April 06, 2015 11:48 AM
To: nanog@nanog.org
Subject: Re: PoC for shortlisted DDoS Vendors
Not an appliance but WanGaurd might be a good match as well. We're currentl=
y evaluating it.
http://www.andrisoft.com/software/wanguard
--
Arzhel
On Fri, Apr 3, 2015, at 01:31, dennis@justipit.com wrote:
> You should include Radware on that list .
>=20
> ----- Reply message -----
> From: "Mohamed Kamal" <mkamal@noor.net>
> To: "NANOG" <nanog@nanog.org>
> Subject: PoC for shortlisted DDoS Vendors
> Date: Wed, Apr 1, 2015 9:51 AM
>=20
> In our effort to pick up a reasonably priced DDoS appliance with a=20
> competitive features, we're in a process of doing a PoC for the=20
> following shortlisted vendors:
>=20
> 1- RioRey
> 2- NSFocus
> 3- Arbor
> 4- A10
>=20
> The setup will be inline. So it would be great if anyone have done=20
> this before and can help provide the appropriate tools, advices, or=20
> the testing documents for efficient PoC.
>=20
> Thanks.
>=20
> --
> Mohamed Kamal
> Core Network Sr. Engineer