DDoS attack mitigation with WANGUARD Filter
The Filter component of Wanguard is an anti-DDoS traffic analyzer and intelligent firewall rules generator designed to protect networks from internal and external threats (availability attacks on DNS, VoIP, Mail and similar services, unauthorized traffic resulting in network congestion). It includes sophisticated traffic analysis algorithms that can detect and side-filter malicious traffic in a granular manner, without impacting the user experience or resulting in downtime.
Wanguard Filter works only in cooperation with a Flow Sensor (for NetFlow, sFlow, jFlow or IPFIX) or Packet Sensor (for in-line servers, port mirroring or network TAPs).
- Management and reporting through an advanced web-based Console with a unified, holistic presentation
- Defends against known, unknown and evolving DoS, DDoS and other volumetric attacks by smart filtering any combination of source and destination IPv4 or IPv6 addresses, source and destination TCP ports, source and destination UDP ports, IP protocols, invalid IP headers, ICMP types, common Time To Live values, packet lengths, packet payloads, country, DNS Transaction ID, etc.
- Analyzes IP packets (including VLAN and MPLS traffic), as well as NetFlow, sFlow, and IPFIX flow data
- Recognizes and blocks malicious traffic in under 5 seconds
- Does not require network baseline training or operator intervention
- Stateless operation designed to work with asymmetric routing
- Leverages SYN Proxy for protecting against spoofed SYN, SYN-ACK, and ACK attacks
- Performs deep packet inspection to find patterns inside packet payloads
- Per-endpoint flexible threat management tools and an easy-to-use API for scripting the reaction to attack vectors:
- Alert the NOC, customer or ISP of the attacker with user-defined email templates
- Send custom Syslog messages to remote log servers or SIEM systems
- Capture a sample of the attacker’s traffic for forensic investigation and legal evidence
- Execute your scripts that extend the built-in capabilities:
- Configure ACLs or execute “shun” commands on routers and PIX firewalls
- Filter attacking IP addresses by running “route blackhole” commands on Linux servers
- Send SNMP TRAP messages to SNMP monitoring stations, etc.
- Supports multiple packet filtering backends:
- Software-based filtering using the NetFilter framework provided by the Linux kernel
- Hardware-based filtering on 1/10 Gbps network cards with Intel’s 82599 chipset (Intel X520 NIC, Intel X540 NIC, HP 560 NIC, other vendors)
- Hardware-based filtering on 10/40 Gbps Chelsio T4 or T5 network adapters
- BGP FlowSpec-capable routers
- Third-party dedicated firewalls and IPSes controlled by helper scripts
- Cleaning server(s) can be deployed in-line or can scrub malicious traffic by BGP off-/on-ramping (sinkhole routing), S/RTBH or FlowSpec
- Cleaned traffic can be re-injected downstream into the network with static routing or GRE/IPIP tunneling
- Easy and non-disruptive installation on commodity server hardware
- The most affordable on-premise Anti-DDoS and DDoS mitigation software solution on the market
- Side filtering. Wanguard Filter sends a BGP routing update to a border router (route reflector) that sets its server as next hop for the suspect traffic. The kernel routes the cleaned traffic back into the network.
The traffic-filtering methods directly supported by Filter complement each other, performance-wise and feature-wise:
- The software firewall is very flexible, although not fast enough on commodity hardware to be able to scrub a full 10 GbE link flooded with small packets. The software filtering performance depends on may parameters such as CPU type/speed/cache, Linux kernel version, NIC chipset, NIC driver, attack type, server load, routed traffic size, the multi-core balance of hardware interrupts, the number of existing rules and multi-queue settings.
- The hardware packet filter can drop 10G traffic at wire-speed, inside the network adapter’s chipset, without using the CPU of the server. It can apply only a subset of filtering rules, so it might not as efficient as the software firewall against all types of attacks.
- FlowSpec (RFC 5575) can be used to signal the routers to perform appropriate filtering actions for a particular flow, which is defined by an n-tuple, like a combination of source and destination IP address, protocol number and ports.
The stateless operation of Filter ensures detection and mitigation of volumetric attacks that may cripple even the most powerful stateful devices, such as firewalls, Intrusion Detection Systems (IDS) or Intrusion Protection Systems (IPS). The disadvantage of the stateless operation is that Sensor and Filter are unable to detect and block non-volumetric application layer (OSI Layer 7) attacks, unlike traditional IPSes. Filter should be installed on the network’s entry points, before other stateful devices.
To increase the packet filtering capacity to 40 Gbit/s, 100 Gbit/s or more, you can cluster multiple Packet Filters deployed on different servers with 10 Gbit/s network adapters. To split the traffic, you can use a hardware load balancer or equal-cost multipath routing.
When a DDoS attack saturates the uplink bandwidth or is above the capacity of the filtering server(s), Sensor can BGP black-hole /null-route the attacked destinations.
You can download and use Wanguard Filter for 30 days by requesting an evaluation license .
You can purchase Wanguard Filter licenses through the online store .
Frequently asked questions are answered in the User Guide and Knowledge Base .
If you need any further information, do not hesitate to contact us .