DomainBop
Dormant VPSB Pathogen
Do You Send An RFO Email If Your Network Has 5 Minutes of Packet Loss on Some Routes? How long of a network outage, or packet loss, is required before you send out an RFO.
The reason I'm asking is because SeFlow had a short 5 minute packet loss on some international routes (not a total network outage) today due to a 40Gbps DDoS attack and sent out an RFO within the hour (which I thought was very nice).
Meanwhile (close your eyes if you cringe when seeing the word ColoCrossing), when I had VPS's on ColoCrossing's network (specifically CVPS/UGVPS in Buffalo, Atlanta, Los Angeles) packet loss was a very common occurence and typically lasted much longer than 5 minutes and RFO's were not sent out (unless it was a total network outage that lasted for several hours...and even then RFO's were not always sent)
The RFO SeFlow sent (posted for educational purposes because a few LEB providers may not know what an RFO looks like)
The reason I'm asking is because SeFlow had a short 5 minute packet loss on some international routes (not a total network outage) today due to a 40Gbps DDoS attack and sent out an RFO within the hour (which I thought was very nice).
Meanwhile (close your eyes if you cringe when seeing the word ColoCrossing), when I had VPS's on ColoCrossing's network (specifically CVPS/UGVPS in Buffalo, Atlanta, Los Angeles) packet loss was a very common occurence and typically lasted much longer than 5 minutes and RFO's were not sent out (unless it was a total network outage that lasted for several hours...and even then RFO's were not always sent)
The RFO SeFlow sent (posted for educational purposes because a few LEB providers may not know what an RFO looks like)
+1 for SeFlowDear Customer,
as a result of a violent attack over 40Gbps happened a few minutes ago, we had packet loss on international uplinks for about 5 minutes. In last period attacks have increased size due to the NTP amplification bug.
In order to prevent further disruptions , we have implemented a series of scripts inside seguard that put automatic blackhole if we receive attack other 40Gbps.
The change has already been implemented and is already working.
blackholing means the we block , at transit level, target DDoS IP. This means that in case of attack other SeFlow capacity, only theinvolved ip address will be locked, and all other services will remain active without any problematic or packet loss.
With this solution we are certain to avoid any future packet loss in our network