26.10.2013 Views

FortiDDos DDoS Attack Mitigation Guide - Fortinet

FortiDDos DDoS Attack Mitigation Guide - Fortinet

FortiDDos DDoS Attack Mitigation Guide - Fortinet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Typical deployment for an internet data center with two links protected by two independent devices<br />

Typical deployment for an internet data center with two links<br />

protected by two independent devices<br />

In this configuration, the two appliances share states with each other through a<br />

proprietary connection/protocol. Traffic can be asymmetric.<br />

In this configuration, the two Forti<strong>DDoS</strong> appliances are not connected to each other<br />

protect the two links independently. The total traffic in this case can be 2 Gbps full<br />

duplex.<br />

Figure 7: Deployment with two internet links and two Forti<strong>DDoS</strong> appliances<br />

Forti<strong>DDoS</strong> <strong>DDoS</strong> <strong>Attack</strong> <strong>Mitigation</strong> <strong>Guide</strong><br />

28-100-167076-20120501 22<br />

http://docs.fortinet.com/ • Feedback

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!