Comparing Gatekeeper with traditional DDoS firewalls #729
Replies: 1 comment 10 replies
-
|
Hi @datutu58888, Since you are still learning what Gatekeeper does, I recommend you watch our NANOG 82 presentation and explore the other references on the Publications page of our wiki. For a Gatekeeper deployment to support multiple tenants in a datacenter, one has to write a policy that is aware of the tenants. Since you're just getting started with Gatekeeper, I advise you to start with the simplest policy you can get running and grow from there. The wiki page Tips for Deployments can help with these initial steps. Our documentation focuses on Gatekeeper deployments in line with the protected networks, but this is not a requirement. See this NextHop 2020 presentation for an advanced example of a deployment that dynamically allocates network prefixes to off-path Gatekeeper servers. For this to work, one needs to plan the routing infrastructure carefully. Typical Gatekeeper deployments write policies for Gatekeeper to be transparent for the protected applications because the deployer has no way to modify the applications. Therefore, as long as one writes a policy aware of the applications, Gatekeeper will be transparent for the applications. When the deployer controls the protocols the applications use, it's possible to write much tighter policies. If you want to flatten the learning curve and have professional support, see Digirati's Gatekeeper consultancy. They have been contributing to the Gatekeeper project since the beginning, have operational experience with Gatekeeper, and are committed to the project's long-term success. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
hello
"I've been looking at Gatekeeper for a while and still don't understand what its function is. I'm deploying it now. My current understanding is that DDoS defense primarily works by identifying traffic at the TCP and UDP transport layers and applying a verification mechanism to filter out malicious traffic. It's similar for Layer 3 and Layer 4 applications; without that, it would be impossible to judge if the traffic is legitimate."
"Traditional commercial DDoS firewalls allow users to define cleansing thresholds for attacks like SYN floods and UDP floods to activate verification and filtering mechanisms. I don't see how Gatekeeper can identify and cleanse illegitimate packets, such as those from a SYN flood."
"Does Gatekeeper support multi-tenant environments in an IDC (Internet Data Center), with deployment options like passive (out-of-band) or inline (bridge/serial) mode, and is its presence transparent?"
Beta Was this translation helpful? Give feedback.
All reactions