PacketsDecreaser Docs
PacketsDecreaser Docs
  • ℹ️Informations
    • Location
  • DDoS Protection
    • Informations
    • Layer 4
      • How we mitigate DDoS Attacks
        • Pre-Filter
        • Generic Filter
        • Additional Mitigation Techniques
        • Time to Mitigate
      • Known technical impact
      • Application Filters
        • Wireguard
        • OpenVPN
        • SSH
        • Teamspeak 3
      • Gamefilters
        • FiveM
          • FiveM Layer 4
          • FiveM Layer 7
        • Minecraft Java
        • Valve Source Engine
        • SCP: Secret Laboratory
        • Minecraft Bedrock
        • BeamNG MP
        • Rust
        • Factorio
        • Palworld
      • TCP-Track
    • Layer 7
      • Informations
      • Getting Started
      • SSL Guide
      • How we mitigate DDoS Attacks
        • Edge
        • Filter
        • Clean Proxy
  • Remote DDoS Protection
    • GRE Tunnel
    • Wireguard Tunnel
  • KVM vSERVER
    • Known technical impact
    • Storage vServer
      • Add Storage
      • Upgrade Storage
  • 🕹️Gameserver
    • Information
    • Gamechanger
    • Supported Games
Powered by GitBook
On this page
  • Customized Post-Filtering for Special Requirements
  • Custom Post-Filtering Options Explained

Was this helpful?

  1. DDoS Protection
  2. Layer 4
  3. How we mitigate DDoS Attacks

Additional Mitigation Techniques


Customized Post-Filtering for Special Requirements

For clients with specific requirements or those who are under complex attacks, we offer customizations to our post-filtering process. These include, but are not limited to:

Custom Post-Filtering Options Explained

  • Geo Rate-limits or Blocks: These settings restrict or block all incoming traffic from specific geographic locations. Useful for mitigating attacks that originate from particular regions.

  • ASN Rate-limit or Blocking: This feature limits or blocks traffic from specific Autonomous System Numbers (ASNs). It's particularly effective in countering large-scale attacks originating from a single network operator.

  • IP Blacklists: A list of IP addresses that are denied access to the network. This is effective in blocking known malicious actors.

  • Packet Length Filters: These filters scrutinize the size of each data packet and block those that are suspiciously large or small, effectively mitigating attacks that exploit packet size.

  • And many more...

We encourage clients to reach out to us to discuss these requirements. We will work closely with you to tailor the most effective solution for your individual needs.

PreviousGeneric FilterNextTime to Mitigate

Last updated 21 days ago

Was this helpful?