1 DATA SHEET VERISIGN INTERNET DEFENSE NETWORK FAQS WHAT IS A DOS OR DDOS ATTACK? A Denial of Service attack or Distributed Denial of Service attack occurs when a single host (DoS), or multiple hosts (DDoS), send legitimate traffic to a target with malicious intent for the purpose of disrupting an application or service either temporarily or permanently. Targets can include, but are not limited to Web servers, DNS servers, application servers, routers, firewalls, and Internet bandwidth. WHAT IS IN-THE-CLOUD? The term cloud is used as a symbol or metaphor for the Internet, based on the way the Internet is depicted in network diagrams. In-the-Cloud typically refers to a service that is provided/performed for a customer before it enters their Internet service connection(s)/ infrastructure. Essentially, an In-the-Cloud DDoS protection service redirects traffic destined for an organization through an Internet data center, where undesirable items like DDoS packets are dropped. The cleansed traffic is then delivered to the organization. IS THE VERISIGN INTERNET DEFENSE NETWORK A COMPLEMENTARY SERVICE OR WOULD IT REPLACE OUR FIREWALL, INTRUSION PREVENTION SYSTEM (IPS)/ INTRUSION DETECTION SYSTEM (IDS), AND/OR OTHER SECURITY PRODUCTS WITHIN OUR NETWORK INFRASTRUCTURE? The Verisign Internet Defense Network is a complementary service and is not intended to replace existing security infrastructure. I HAVE MULTIPLE INTERNET CARRIER CIRCUITS FROM DIFFERENT INTERNET SERVICE PROVIDERS (ISP S). CAN THE VERISIGN INTERNET DEFENSE NETWORK WORK WITH MY SOLUTION? Yes, the Verisign Internet Defense Network can monitor and mitigate DDoS attacks on any ISP, and can provide the same level of service for customers who are multi-homed through more than one ISP. This means a customer only has to deal with one team and one threat remediation process in order to knock down the attack, rather than relying on multiple bandwidth providers to reach similar conclusions on the same timelines. Since our solution is network agnostic, you have the flexibility to change your infrastructure to suit your changing business needs. HOW LONG DOES IT TAKE TO DEPLOY THE VERISIGN INTERNET DEFENSE NETWORK? It typically takes less than fourteen (14) calendar days to set up the monitoring solution and start receiving customer flow traffic. HOW LONG BEFORE I AM CONTACTED ABOUT A DDOS ATTACK TO MY NETWORK OR APPLICATION? WHAT KIND OF SERVICE LEVEL AGREEMENT (SLA) IS PROVIDED WITH THE VERISIGN INTERNET DEFENSE NETWORK? Typically, customers are notified of a potential attack within five minutes of a monitoring alert being generated. The SLA currently provided states that Verisign will contact the customer in accordance with its escalation plan within 15 minute of receipt of a monitoring alert. Upon contact, Verisign will work with the customer to determine if mitigation is required or if the alert was caused by legitimate customer activity. If mitigation is needed, Verisign will recommend the best course of action.
2 In the event that redirecting the customer s traffic is the recommended course of action, the customer s traffic will be redirected to Verisign s Internet Defense Network sites before reaching the customer s network. Verisign will apply layered filters to the traffic redirected to the Verisign Internet Defense Network sites which progressively block traffic aimed at disrupting or disabling the customer s Internet-based services. Legitimate traffic is then redirected from the Verisign Internet Defense Network sites back to the Customer s network. When the DDoS attack has abated, Verisign will coordinate with the Customer in order to return the Customer to its normal operations. IS THERE ANY MANUAL INTERVENTION DONE ON MY INFRASTRUCTURE DURING A DDOS ATTACK? Verisign establishes event mitigation procedures with you to fit your service model. Optimal solutions vary and depend upon network size and types of services utilized, among other considerations. If Internet traffic is redirected using our BGP off-ramping, no manual intervention is needed on the customer network. If traffic is redirected via DNS, you will need to point your A records to a Verisign IP address and set the time-to-live, TTL, to the minimum time for redistribution. After mitigation, traffic is proxied back to you. WHAT IS THE PROCESS FLOW DURING AN ATTACK SITUATION? When an alert is generated the Verisign support team contacts the customer, provides them with a ticket number and begins investigation. Once the alert is determined to be a DDoS event a recommendation is made to mitigate. Our SLA is to contact the customer with a recommendation on a mitigation strategy within 15 minutes after receipt of an alert. With customer permission, in order to mitigate the DDoS attack Verisign will swing traffic to a mitigation facility or facilities. The Verisign Internet Defense Network support team begins further analysis of the source of the attack and begins to reach to upstream providers to resolve the attack closer to the source, as needed. DO YOU CONTACT THE CUSTOMER AFTER THE DOS/ DDOS ATTACK HAS STOPPED? Yes. One of our Verisign Security Operations personnel will contact the company representative identified in the escalation plan to discuss moving traffic back to its original path. CAN I SETUP MY ROUTER TO THWART A DDOS ATTACK? Routers cannot block spoofed IP sources or manually traceback to thousands of IP addresses, which makes Access Control Lists (ACLs) useless against DDoS attacks. CAN I SETUP MY FIREWALL TO THWART A DDOS ATTACK? Firewalls are not designed to mitigate DDoS attacks. Using a firewall for mitigation could cause the CPU to spike and deplete memory resources. Also, firewalls don t have anomaly detection capabilities. CAN I SETUP MY INLINE IPS OR MY IDS TO THWART A DDOS ATTACK? Yes, but IPSs and IDSs require extensive manual tuning that takes time and can leave you vulnerable. An IDS traditionally sits behind the firewall with an uplink to a router or switch that sits in front of the firewall. An IDS issues an alert when it detects an anomaly. At that point, the attack traffic is already consuming your internet bandwidth with the potential of saturating the link, which can cause the CPU to spike and deplete memory resources. An IPS has the capability to work as an anomaly detector; however, it requires several weeks for an IPS to understand normal traffic patterns and frequent manual tuning to specify which traffic is allowed and which should be alerted or blocked. I HAVE OVER-PROVISIONED X AMOUNT OF BANDWIDTH TO TRY TO PREVENT DDOS ATTACKS. WHAT CAN THE VERISIGN INTERNET DEFENSE NETWORK DO FOR ME? Over-provisioning is not a cost effective solution. For example, if you know your normal amount of traffic
3 could reach 15Mbps, but provision 30Mbps in the event of a DDoS attack, you have over-provisioned by 100 percent and doubled your monthly recurring charges. And attackers can easily increase the volume of their attacks. Since some DDoS attacks now reach more than 40 Gbps, over-provisioning an Internet circuit could become very costly. WHAT ABOUT BLACKHOLING THE IP ADDRESS(ES)? Blackholing an IP address or a range of IP addresses can result in legitimate packets being discarded along with malicious attack traffic, which means the attacker wins. If an ISP performs the blackhole, they must first identify the source of the traffic, which can cost valuable time, and may still end up blocking legitimate traffic. WHERE ARE THE VERISIGN MITIGATION DATACENTERS LOCATED? Ashburn, Virginia San Francisco, California Amsterdam, Netherlands Tokyo, Japan ARE THE VERISIGN INTERNET DEFENSE NETWORK DATACENTERS IDENTICAL IN TYPES OF MITIGATION GEAR AND CAPACITY? All the Verisign Internet Defense Network datacenters are identical in capacity: dual 10 Gigabit Ethernet. Because we are NOT dependent on any hardware vendor or service provider, our datacenters do NOT have identical gear. WHAT DOES THE VERISIGN SOLUTION DO WITH DATA RETENTION? HOW LONG IS DATA KEPT IN STORAGE? Our current data retention policy is: Mitigation Events = 1 year DoS alerts (low) = 30 days DoS alerts (medium) = 60 days DoS alerts (high) = 90 days Traffic Reports = 60 days This is subject to change and does not constitute a guarantee. Please consult your Verisign representative for details. HOW DO CUSTOMERS GET TRAFFIC REPORTS? Traffic reports can be generated via the portal and then exported to a XML or PDF file. WHAT KIND OF DEVICE OR DEVICES DOES A POTENTIAL CUSTOMER NEED AT THEIR FACILITY? The Verisign Internet Defense Network supports the following equipment: Cisco routers Peakflow SP 4.5 supports the following Cisco routers Cisco traditional IOS-based routers that run IOS 12.0 or later (Netflow v5 and v9) Cisco Catalyst 4500 family w/sup IV or later and NFFC (Netflow v5) Cisco Catalyst 5500 family w/suitable Sup and NFFC (Netflow v7) Cisco Catalyst 6500 family w/sup 2 or later, hybrid or native (Netflow v5 and v7) Cisco CRS-1 (Netflow v9) Important: Cisco Catalyst routers do not support TCP flags. Juniper cflowd v9 traffic Juniper cflowd v9 is supported only for IP traffic. Cflowd data from MPLS-derived traffic might not work with current JunOS software and Peakflow SP does not officially support it.
4 Juniper routers Peakflow SP 4.5 supports the following Juniper routers Juniper T-series (cflowd v5, or v9 with services PIC) Juniper M-series with Internet Processor II (cflowd v5, or v9 with services PIC) Juniper J-series (cflowd v5) Juniper TX-series (cflowd v9) Juniper MX960 (cflowd v5) Devices or other vendors that can provide flow data or IPFIX will be handled on a case-by-case basis. Foundry routers Peakflow SP supports Foundry routers with sflow v2, v4, and v5. Foundry does not support ACL generation Force10 routers Peakflow SP supports Force10 routers with sflow DO I NEED TO PURCHASE A CIRCUIT TO THE VERISIGN INTERNET DEFENSE NETWORK DATACENTER SO MY TRAFFIC CAN BE REDIRECTED? You have the option to purchase a circuit to one of the Verisign Internet Defense Network datacenters or we can redirect/on-ramp your traffic with a GRE tunnel (most preferred) or a VPN tunnel. ARE THERE ANY REQUIREMENTS REGARDING IP ADDRESS SPACE? In order for Verisign to off-ramp your traffic via BGP, you must have a minimum of /24 or 254 continuous IP address spaces. The /24 can be obtained from your Internet Service Provider or from ARIN, APNIC, RIPE, AFRINIC or LACNIC. North America Asia Pacific Europe Africa Latin America and Carribbean IS IT POSSIBLE FOR THE VERISIGN INTERNET DEFENSE NETWORK SOLUTION TO PROTECT JUST A SINGLE WEB SERVER? Yes, in the case of a single Web server we can divert traffic with a DNS change. However, you will need to make some changes to your system. We will provide Verisign IP addresses for you so you can change the A record in your (or your ISP s) managed DNS server to the newly assigned Verisign IP address. WHEN THE CUSTOMER S TRAFFIC IS OFF-RAMPED TO VERISIGN, IS THERE ANY LATENCY THAT NEEDS TO BE FACTORED INTO THE EQUATION? Latency is determined by the distance between the customer s protected facility and the Verisign Internet Defense Network data center. Verisign has extensive public and private peering at most of the global Internet exchange points; this allows Verisign optimal routing paths throughout the Internet. Verisign also distributes data centers geographically to minimize latency. Centers are located in the Washington DC Metro area, Silicon Valley/San Francisco Bay area, Amsterdam, and Tokyo. Customers in these markets should expect no measurable latency increase (<5 ms). Beyond these metro markets, customers in the US could experience additional latency of ms per 1,000 miles of distance from the data center. Past experience indicates that from one US coast to the other US coast latency averages around 30-35ms. IT CAN TAKE OVER 30 MINUTES FOR BORDER GATEWAY PROTOCOL (BGP) TO ANNOUNCE A CUSTOMER NETWORK BLOCK. BEFORE VERISIGN HAS THE ABILITY TO START FILTERING TRAFFIC, WHAT MEASURES ARE USED TO DECREASE THE CONVERGENCE TIME? Verisign has studied the issue of BGP convergence time in depth. Verisign uses a BGP route monitoring industry leader that has hundreds of BGP probes all over the globe with thousands of BGP feeds. Verisign uses this tool to track the time it takes
5 for BGP updates to propagate across the Internet. While convergence time isn t completely controllable or predictable, we typically see all the BGP feeds converge on the new protected path in two (2) minutes or less. Verisign advises customers to expect convergence time to be around five (5) minutes, but we have seen the time be much less. Verisign has been using BGP announcement techniques to failover critical.com and.net critical infrastructure services for years. HOW DOES VERISIGN LEVERAGE THEIR RELATIONS WITH OTHER ISPS DURING AN ATTACK THAT THE CUSTOMER CANNOT MITIGATE ON ITS OWN? Verisign has extensive public and private peering at most of the global Internet exchange points, giving Verisign the ability to reach close to 60% of the Internet via peering. As a critical infrastructure provider, Verisign participates with most large networks in the same operational security forums Tier 1, 2, and 3 carriers use to interact with each other. When a customer has an issue, Verisign can leverage those relationships to interact directly with the carriers in the same forums and ways those networks work with one another. HOW DOES VERISIGN BEST WORK WITH ENCRYPTED DATA (SSL) TO UNDERSTAND THE NATURE OF AN ATTACK? If only the payload is encrypted and customers do not want to exchange keys, we can filter only the headers or anything outside the payload. If the customer is willing to provide exchange keys, we can decrypt -> filter -> and re-encrypt the packet and send it to the customer via a secure return path. CAN THE VERISIGN INTERNET DEFENSE NETWORK WORK WITH THE CUSTOMER S MONITORING, MITIGATION OR CORRELATION GEAR DEPLOYED IN THE NETWORK INFRASTRUCTURE? Verisign will evaluate such deployed gear on a case-by-case basis and determine whether it can be integrated with the Verisign Internet Defense Network. DOES THE VERISIGN SUPPORT IPV6? We are testing IPv6 with the Verisign Internet Defense Network, but do not have an availability date yet. ABOUT VERISIGN Verisign is the trusted provider of Internet infrastructure services for the digital world. Billions of times each day, companies and consumers rely on our Internet infrastructure to communicate and conduct commerce with confidence. LEARN MORE For more information about the Verisign Internet Defense Network, please contact a Verisign representative by phone at or , by at or visit us at VerisignInc.com 2011 Verisign, Inc. All rights reserved. VERISIGN and other trademarks, service marks, and designs are registered or unregistered trademarks of Verisign, Inc. and its subsidiaries in the United States and in foreign countries. PMS is a trademark of Pantone, Inc. All other trademarks are property of their respective owners.
Multi-Layered VoIP Security A DefensePro White Paper - Avi Chesla, VP Security Table of Content Abstract...3 What is VoIP...3 VoIP Protocols...4 VoIP Architecture...4 The VoIP Market & Standards...6 The
The Critical Security Controls for Effective Cyber Defense Version 5.0 1 Introduction... 3 CSC 1: Inventory of Authorized and Unauthorized Devices... 8 CSC 2: Inventory of Authorized and Unauthorized Software...
VoIP and IPT Best Practices for Implementation A Guide to Ensuring a Solid Foundation for Unified Communications Executive Summary Gary Audin, Delphi, Inc. Migration is the movement from one place or condition
Managed Workplace 2012 Setup Guide On Premise See All. Manage All. Service All. www.levelplatforms.com TABLE OF CONTENTS Welcome... vii About this Document... viii Where To Get More Help... viii Contact
IP TELEPHONY POCKET GUIDE BY BARRY CASTLE 2nd Edition September 2004 ShoreTel, Inc. 960 Stewart Drive Sunnyvale, CA 94085 408.331.3300 1.800.425.9385 www.shoretel.com email@example.com TABLE OF CONTENTS
VoIP Impairment, Failure, and Restrictions A BROADBAND INTERNET TECHNICAL ADVISORY GROUP TECHNICAL WORKING GROUP REPORT A Uniform Agreement Report Issued: May 2014 Copyright / Legal Notice Copyright Broadband
white paper: voice over IP VoIP Migration for Global Business Success How Convergence à la Carte Can Realise the Benefits of Enterprise-Wide IP Communications By Jo Matthew Perrin Nickols and Huib Coomans
Firewall Strategies June 2003 (Updated May 2009) 1 Table of Content Executive Summary...4 Brief survey of firewall concepts...4 What is the problem?...4 What is a firewall?...4 What skills are necessary
Essential Ingredients for Optimizing End User Experience Monitoring An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Neustar IT MANAGEMENT RESEARCH, Table of Contents Executive Summary...1
PeopleSoft Red Paper Series Securing Your PeopleSoft Application Environment July 2010 Including: How to Plan for Security How to Secure Customized System Exposing PeopleSoft outside the Firewall Securing
Planning for VoIP by John Q. Walker and Jeffrey T. Hicks a NetIQ Corporation whitepaper, April 2, 2002 Treating VoIP as a Major IT Project 2 Getting It Going...2 Keeping It Running Well...3 Planning, Analysis,
Best Practices Guide McAfee epolicy Orchestrator for use with epolicy Orchestrator versions 4.5.0 and 4.0.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be
95 95 9. Exercise: Large Scale Incident Handling Main Objective Targeted Audience Total Duration Time Schedule The main objective of the exercise is to teach incident handlers the key information and actions
Report Number: I332-016R-2005 Security Guidance for Deploying IP Telephony Systems Systems and Network Attack Center (SNAC) Released: 14 February 2006 Version 1.01 SNAC.Guides@nsa.gov ii This Page Intentionally
WHITE PAPER Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers) Table of Contents About This Document... 1 Chapter 1 Wireless Data Technologies... 2 Wireless Data Technology Overview...
Industrial Ethernet: A Control Engineer s Guide Abstract As part of a continuing effort to make their organizations more efficient and flexible, manufacturers are rapidly migrating to Industrial Ethernet
Net Integration Technologies, Inc. http://www.net itech.com Net Integrator Firewall Technical Overview Version 1.00 TABLE OF CONTENTS 1 Introduction...1 2 Firewall Architecture...2 2.1 The Life of a Packet...2
AAPT Business Platinum Internet 10 / 20 Service Schedule An AAPT Internet Solution This Service Schedule forms part of the Agreement between Us and You and cannot be used as a stand-alone agreement. Any
Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),
CHAPTER 1 LAN Design Objectives Upon completion of this chapter, you will be able to answer the following questions: How does a hierarchical network support the voice, video, and data needs of a small-
WHITE PAPER Security Best Practices for Mobility in Education Securing Networks as Mobile Devices Proliferate in Education Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................
Journey to Cloud 9 Navigating a path to secure cloud computing Alastair Broom Solutions Director, Integralis March 2012 Navigating a path to secure cloud computing 2 Living on Cloud 9 Cloud computing represents