26.10.2013 Views

FortiDDos DDoS Attack Mitigation Guide - Fortinet

FortiDDos DDoS Attack Mitigation Guide - Fortinet

FortiDDos DDoS Attack Mitigation Guide - Fortinet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Typical deployment for an internet data center with two links protected by two independent devices in active<br />

Typical deployment for an internet data center with two links<br />

protected by two independent devices in active configuration<br />

In this configuration, the two appliances share states with each other through a<br />

proprietary connection/protocol. Traffic can be asymmetric.<br />

In this configuration, the two Fort<strong>DDoS</strong> appliances are cross connected and share<br />

states and therefore the traffic can move from one link to the other and the appliances<br />

will remain in sync with each other.The total traffic in this case can be 1 Gbps full<br />

duplex.<br />

Figure 6: Deployment with two internet links and two Forti<strong>DDoS</strong> appliances<br />

Forti<strong>DDoS</strong> <strong>DDoS</strong> <strong>Attack</strong> <strong>Mitigation</strong> <strong>Guide</strong><br />

28-100-167076-20120501 21<br />

http://docs.fortinet.com/ • Feedback

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!