When your client was targeted by ddos, and you force to nullroute the IP for may be few days if the ddos not stop. How you guy try to cool down the customer when their server get down for few days?
Just explain to him that he's attracting bad traffic to his website, for whatever reason that may be. It's having a negative impact on other paying customers, and while you understand it's an inconvenience for him that he is nullrouted, that you will not allow any individual customer (him) to impact the quality of other's services because of it.When your client was targeted by ddos, and you force to nullroute the IP for may be few days if the ddos not stop. How you guy try to cool down the customer when their server get down for few days?
I'm usually a smartass and say "Quit pissing people off on EFNET".When your client was targeted by ddos, and you force to nullroute the IP for may be few days if the ddos not stop. How you guy try to cool down the customer when their server get down for few days?
In fact, we have the solution for them. Just they not willing to spend.Basically what's been said above, possibly assist in helping the customer find a suitable solution or alternative.
yup....they is no other alternative way to do it if customer not going to spend for better security. so i will only keep nullroute the ip if they attack is continue.We just keep extending the nullroute until they switch to one of our DDOS Protected VPSs, it doesn't make sense that other clients on the node/network should suffer from attacks directed at one client and any amount of downtime caused by a single client is unacceptable.
One time a client told me "you're going to make me wait 24 hours for only a 5 minute outage" but 5 minutes multiplied by the number of clients on the switch was just unacceptable.
My biggest issue with DDOS attacks isn't how our clients react to the downtime, it's how the clients would react if we got booted from a data center as the result of the attacks (past experience has me very cautious with this subject).
I'm trying to convince my brother of that right now. I've been hit with DDOS before because someone didn't like me and I lost a lot of income.If you have an online company, then operating a website without DDOS protection is a gamble. IMO, it's worth spending a few extra dollars as an insurance policy. Like other forms of insurance, you hope to never have to use it, but it's worth having if you do.
If you have visibility in low end land and any competitor or haters, you will eventually get your DDoS experience.Somewhat off-topic, but how strongly would you guys recommend DDoS protection for non-businesses? Particularly for hobbyists who are running personal websites like blogs and fan communities. Are there instances where you feel DDoS protection would be overkill because the likelihood of it happening is very low?
DDoS filtered IP offerers would be a better description. Prometeus also offers filtered IPs in Italy (filtering done by SeFlow).I think with cost from the common cheap DDoS offerers (BuyVM, RamNode, SecureDragon)
I know that BuyVM and RamNode offer filtered IPs, but we do not (our VPS nodes are colocated inside the data center). Just wanted to point that out since it's a common misconception about our service since we used to do it that way over a year ago.DDoS filtered IP offerers would be a better description.
If you don't care about null route now and then, then what does it matter?We have some customers too cheap to buy filtered IP's so
they get nullrouted 30 - 40 times a month, not even kidding.