New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
That's sort of a L7 attack...
I don't think both of you need to use so many insults over such a small thing...
Yes i do !!
Improved the detection system with Fastnetmon wich detecting attacks in less than 15 secs. Thanks @Pavel_Odintsov
Neat stuff.
So, basically you're trying to somewhat reproduce ovh's reactive VAC using voxility?
(Optimised routes when not under attack)
@vimalware One of our problems, is that in Spain we are 30ms away from the Voxility routing, so, we need a solution to only route in case of attack. With #SMAMA all is running as expected.
Do you still use both OVH and Voxility in a chain?
@tr1cky No, only Voxility.
Yes, that's what I was thinking too: solution for added Latency .
Does upgrading to 'permanent mitigation' require a new changed IP or can the regular SMAMA-enabled IP be upgraded within your system?
Yes, still require. We can enable the protection in any IP, but if you're constanttly receiving attacks you must get a permanent mitigation IP.
Err? Spam?
Will wait for SPAPA, hope he can mitigate.
WTF exactly am I reading here?
I watched the video, but still no clue what "SMAMA" is, because the video is in spanish.