Back to OpenVZ Documentation

    DDoS Protection

    Learn about DDoS protection options available at RamNode data centers.

    DDoS Protection Availability

    We provide inbound DDoS filtering options in all of our locations. The type and level of protection varies by location.

    Atlanta / New York / Los Angeles

    • Included: Up to 5 Gbps of DDoS mitigation at no additional cost
    • Optional Upgrade: Up to 200 Gbps filtered IP addresses available for purchase

    Higher capacity filtering helps protect against larger volumetric attacks and provides better performance during attacks.

    Seattle / Netherlands

    • Included: Up to 10 Gbps of DDoS mitigation at no additional cost

    How DDoS Filtering Works

    Our DDoS filtering systems work by:

    • Monitoring all traffic entering our network
    • Detecting anomalous traffic patterns indicating an attack
    • Automatically filtering malicious traffic
    • Allowing legitimate traffic to pass through

    Types of Attacks Mitigated

    UDP floods
    SYN floods
    ACK floods
    Volumetric attacks
    Amplification attacks (DNS, NTP, etc.)
    Application layer attacks (limited)

    Ordering DDoS-Filtered IPs

    For locations that offer upgraded DDoS protection (Atlanta, New York, Los Angeles), you can order DDoS-filtered IP addresses:

    1

    Log into Client Area

    Go to the Client Area

    2

    Navigate to Addons

    Navigate to Services → View Available Addons

    3

    Select Your Service

    Select your service

    4

    Find DDoS Addon

    Look for "DDoS Filtered IP" addon

    5

    Complete Order

    Complete the order

    What to Expect During an Attack

    Small to Medium Attacks (under filtering capacity)

    • Automatic detection and filtering
    • Minimal to no impact on legitimate traffic
    • No action required from you

    Large Attacks (exceeding capacity)

    • RamNull may engage (automatic nullroute)
    • Temporary service interruption
    • See our RamNull documentation for details

    Best Practices

    • Use application-level firewalls (like iptables, CSF)
    • Keep software updated to prevent exploitation
    • Use Cloudflare or similar CDN for web traffic
    • Monitor your server for unusual traffic patterns
    • Consider DDoS-filtered IPs for mission-critical services

    Reporting Attacks

    If you're experiencing a DDoS attack, you don't need to report it unless it's not being automatically mitigated. Our systems will detect and filter most attacks automatically. For severe attacks or if you need assistance, open a support ticket.