FortiDDos DDoS Attack Mitigation Guide - Fortinet
FortiDDos DDoS Attack Mitigation Guide - Fortinet
FortiDDos DDoS Attack Mitigation Guide - Fortinet
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Deploying a Solution<br />
Introduction<br />
A very simple deployment<br />
<strong>DDoS</strong> attacks pose a huge risk to a company's Internet connectivity and their<br />
prevention can save companies millions of dollars a year, especially for companies that<br />
depend on the Internet as a business platform and for those who the Internet is an<br />
element of their core IT infrastructure.<br />
How do IT managers ensure that their web infrastructure is safe from <strong>DDoS</strong> attacks?<br />
How do they ensure that they don't get a call from their key customers in the middle of<br />
the night? How do they ensure that they don't have to search through logs to figure out<br />
the attack type and sources and change the router and switch configuration?<br />
The Forti<strong>DDoS</strong> device is a solution for this, using hardware logic based appliances.<br />
In the sections below, we describe a few typical configurations.<br />
Following diagram shows a simple deployment. In this deployment with a set of<br />
dedicated servers in a co-location environment, a single Forti<strong>DDoS</strong> appliance is<br />
required. To ensure that there is no connectivity failure under critical failure of the<br />
appliance or power failure, there is a bypass switch. The bypass switch is inline with<br />
the traffic and passes traffic through the Forti<strong>DDoS</strong> unless there is a failure there.<br />
Forti<strong>DDoS</strong> <strong>DDoS</strong> <strong>Attack</strong> <strong>Mitigation</strong> <strong>Guide</strong><br />
28-100-167076-20120501 18<br />
http://docs.fortinet.com/ • Feedback