We have recently communicated with our customers about the following requirements:
650) This. width = 650; "src ="/e/u261/themes/default/images/spacer.gif "style =" Background: URL ("/e/u261/lang/ZH-CN/images/localimage.png") No-repeat center; Border: 1px solid # DDD; "alt =" spacer.gif "/> 650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/4B/45/wKioL1QpAzqCxpFOAAC46GrtE-o571.jpg "Title =" qq 40929145740.png "alt =" wKioL1QpAzqCxpFOAAC46GrtE-o571.jpg "/>
Traffic cleaning is performed at the man level. The uplink egress of the Access Router is a bandwidth of 70 Gbit/s and 70 thousand Mbit/s. It is bundled with multiple Ge interfaces and connected to the nearest two core routers through dual-homing.
There are two deployment methods: edge mounting and serial connection.
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/4B/46/wKioL1QpB_3z_s-yAAD7pfxjYfM601.jpg "Title =" qq 40929151714.png "alt =" wKioL1QpB_3z_s-yAAD7pfxjYfM601.jpg "/>
An alliance in the industry now adopts the bypass method. The entire system is divided into three components (abnormal traffic detection, abnormal traffic cleaning, and Management Platform), so that three products can be sold at a time. The detection can be split to import the traffic from the backbone to the mounted detection device. after about 30 seconds of analysis, the detection can determine whether a DDoS attack is included, then, the cleaning platform is notified to publish a host route to the router to pull the traffic for cleaning. The cleaned traffic is then directed and reinjected to the next layer of devices in multiple ways to clean the traffic on the network side.
You can also connect the cleaning device to the network by means of serial connection. through real-time analysis of all traffic, you can see whether there is a DDoS attack, but will this affect the throughput of the original system? Further verification required
A group's aggregation layer deploys a traffic Cleaning System