DDoS Protection
DDoS protection on NetActuate is integrated directly into the BGP and anycast infrastructure. Rather than existing as a separate service, DDoS rules are attached to your BGP and anycast groups, so mitigation actions are applied at the network level where your traffic enters.
Rules
The Rules tab shows the DDoS rules active on your account. This view is read-only — DDoS rules are configured and managed by the NetActuate operations team. To request changes to your DDoS rules, open a support ticket or contact your account manager.
Each rule specifies:
- Action on attack detection — what mitigation to apply when an attack is identified (e.g., scrubbing, rate limiting, blackholing)
- Action on attack conclusion — what to do when the attack ends (e.g., restore normal routing)
- Assigned prefixes — which IP prefixes the rule applies to
Rule Scope
DDoS rules can be applied at three levels:
- Account-level default — applies to all prefixes unless overridden by a group-level rule
- Per BGP group — overrides the account default for all prefixes in that BGP group
- Per Anycast group — overrides the account default for all prefixes in that anycast group
This layered approach lets you set a sensible default for your account and then customize behavior for specific groups that have different traffic profiles or sensitivity requirements. Work with the NetActuate operations team to configure the right rule scope for your infrastructure.
Analytics
The DDoS Analytics view provides a summary of attack traffic across your infrastructure:
- Total Traffic — aggregate attack traffic volume
- Total Packets — total packets associated with detected attacks
- IP Sources — number of unique source IP addresses involved in attacks
Attacks
The Attacks tab provides a historical log of all DDoS attacks detected against your prefixes. Each entry in the log links to a detailed attack report.
Attack Detail
Clicking an individual attack opens a detailed breakdown with the following metrics:
- Total Traffic — aggregate volume of attack traffic
- Peak Traffic — maximum traffic rate during the attack
- Total Packets — packet count for the attack duration
- Total IP Sources — number of unique source IPs involved
The detail page includes additional analysis panels, all measured in packets per second:
- PPS by Protocol — breakdown of attack traffic by protocol (TCP, UDP, ICMP, other)
- Top Source IPs by Protocol — the top 10 source IP addresses for each protocol
- TCP Flags — distribution of TCP flag combinations in attack traffic
- Top Countries — geographic origin of attack traffic
- Top ASNs — autonomous systems originating the most attack traffic
- Top Source Ports — most common source ports
- Top Destination Ports — most targeted destination ports
- Source IP/Port Pairs — specific source combinations generating the most traffic
- Top Flows — highest-volume individual traffic flows
Best Practices
Use anycast for automatic geographic distribution
Anycast spreads traffic across multiple locations. During a DDoS attack, the traffic is distributed across all anycast locations rather than concentrated at a single point, reducing the per-location impact.
Layer your defenses
Combine network-level mitigation (DDoS rules on your groups) with host-level firewall rules and application-level rate limiting for comprehensive protection.
Review attack reports
After any mitigation event, review the attack detail page. The protocol breakdown, source ASNs, and top flows data help you understand the attack vector and inform future rule adjustments — share these findings with the NetActuate team when requesting rule changes.
Related Sections
- How-To Guide — reviewing your DDoS configuration and requesting changes
- Anycast Dashboard — manage anycast groups where DDoS rules are applied
- BGP Dashboard — manage BGP groups where DDoS rules are applied
- Firewall — API-managed host-level firewall rules
- ECMP Load Balancing — distribute traffic for resilience
Need Help?
Contact support@netactuate.com or open a support ticket from the portal.