New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
The thing is Corero is probably able to filter it if it get configured with custom rules tailored to the specific attack you're under.
If you're using the free included best effort ddos protection from provider doubt they would put much effect into fixing the leak.
but if you're paying them for extra ddos protection/mitigation capacity the provider is more likely to try to resolve the issue of ddos attack leaking.
With my experience the story doesn’t match on the default rules either and trust me I know this box. Sure, it’s not a one size fits all, but nothing is.
My problem here is that we have a user here, whose sole purpose is aggressively advertising Path.net at the expense of $anything else mentioned, which is likely shilling.
Path probably took a bigger ddos hit for this person. Unlike the provider they had that maybe used corero had a set limit of you exceed X amount you will then get null routed.
That's what I am thinking.
https://reprints2.forrester.com/#/assets/2/975/RES159092/report