f5 Silverline Ddos Protection Datasheet
f5 Silverline Ddos Protection Datasheet
® ®
DDoS Protection
DATASHEET
F5 is the first leading application services company to offer a hybrid solution for DDoS
protection. By implementing Silverline DDoS Protection in addition to the on-premises
solution, customers can keep their businesses online when under DDoS attack with a
reduced risk of downtime, real-time DDoS mitigation response times, unparalleled visibility
and reporting, and cost efficiencies. The on-premises DDoS protection solution and
Silverline DDoS Protection can be implemented independently of each other, or together
as a hybrid solution for the most comprehensive L3–L7 DDoS protection. Throughout the
F5 infrastructure and process, Silverline DDoS Protection maintains PCI DSS compliance
by rigorously protecting and controlling data access, encrypting and retaining data,
and archiving or deleting data.
Software-Defined
DDoS Protection Application Services
Data Center Firewall
Orchestration
Professional Services and Support
Programmability
F5 Platform
VE
ScaleN
Figure 1: F5 provides a comprehensive DDoS solution with both on-premises protection and
cloud-based Silverline DDoS Protection.
Silverline cloud-scrubbing centers are designed with industry-leading security and open
source technologies to detect, identify, and mitigate threats in real time and return clean
traffic back to your site. By utilizing the breadth of the most advanced security hardware,
2
DATASHEET
Silverline DDoS Protection
software, rules engines, and customized tools, Silverline DDoS Protection provides
comprehensive, multi-layered attack analysis and mitigation that cannot be achieved with
other scrubbing services that use a single-vendor technology architecture.
Silverline DDoS Protection can run continuously to monitor all traffic and stop attacks
REFERENCE ARCHITECTURE: DDoS Protection
from
CONTENT TYPE:ever
Product Mapreaching your network, or it can be initiated on demand when your site is under
AUDIENCE: Security Architect
DDoS attack.
CUSTOMER SCENARIO: Enterprise Data Center
Figure 2: Divert traffic to Silverline DDoS Protection for cloud-scrubbing when your network is under
attack, or use it to continuously scrub all traffic to prevent a DDoS attack from ever reaching your
network.
As traffic enters the F5 scrubbing center, it is steered and broken down into a “spectrum
of suspicion.” F5 then determines the best scrubbing techniques for each segment of
traffic and automatically directs traffic through the cloud scrubbing centers for real-time
REFERENCE ARCHITECTURE: DDoS Protection
mitigation. Traffic
CONTENT continues to be tapped as it traverses the scrubbing center to confirm the
TYPE: Architecture Diagram
AUDIENCE: IT Director/Security Engineer
malicious traffic has been fully removed. Clean traffic is then returned to your website with
CUSTOMER SCENARIO: DDoS Scrubbing Center
little to no impact to the end user.
Scrubbing Center
Inspection Plane
Signaling
Management
Data Plane
Copied traffic
for inspection
Netflow Netflow
BGP signaling GRE Tunnel
Legitimate Proxy
Users
IP Reflection
3
DATASHEET
Silverline DDoS Protection
Deployment Modes
Complete network protection
REFERENCE ARCHITECTURE: DDoS Protection
For enterprises that need to protect their entire network infrastructure, Silverline DDoS
CONTENT TYPE: Product Map
AUDIENCE: Security Architect
Protection leverages Border Gateway Protocol (BGP) to route critical customer traffic to
CUSTOMER SCENARIO: DDoS Routing Method—Routed Mode
its scrubbing and protection center, and utilizes a Generic Routing Encapsulation (GRE)
tunnel to send the clean traffic back to your network. Routed mode configuration is a
scalable design for enterprises with large network deployments. Routed mode configuration
does not require any application-specific configuration and provides an easy option to turn
the service on or off.
Cloud Scrubbing
F5 Silverline DDoS
Protection/Customer
F5 Silverline ISP BGP peering Customer
Cloud-Based Data Center
Platform
DDoS
Attacker
ISP
Figure 4: F5 routed mode leverages BGP and GRE tunnels to offer DDoS protection to your network.
4
DATASHEET
Silverline DDoS Protection
DNS-directed
Legitimate traffic
User
DDoS
Attacker
Proxied connection
Figure 5: Protect your applications by making a DNS change to direct traffic through Silverline
DDoS Protection.
In addition, F5 offers Silverline® Threat Intelligence for additional detection and blocking
of IPs known to support malicious traffic. This service reduces unwanted attack
communications on your network and helps you avoid further mitigation requirements.
Emerging threats are continuously captured and published, while IP addresses that are no
longer malicious are removed from the threat data. Silverline Threat Intelligence enhances
Silverline DDoS Protection (in proxy mode) or Silverline® Web Application Firewall (WAF)
services without compromising access to legitimate IP addresses.
Figure 6: Use the F5 customer portal to inspect attack mitigation design, configure and provision
deployment preferences, and view attack events and communications.
5
DATASHEET
Silverline DDoS Protection
Attacks can be explored and analyzed, and packet capture reports (PCAPs) are also
available for download. With detailed after-action reports available by attack and with
longer-term views of attack traffic, the F5 customer portal allows you to see the pattern of
attacks over time to help you plan for the future. In addition to logging DDoS events to be
explored and analyzed, you have the option of exporting logs via Syslog to various SEIM
vendor solutions, such as Splunk, ArcSight, and QRadar.
Silverline DDoS Protection safeguards against a wide variety of attacks, including those
shown below.
Flexible Subscriptions
Silverline DDoS Protection is available as a one- or three-year subscription with flexible
options for protected bandwidth and payment terms: Always On™ and Always Available™.
Primary protection as the first line of defense Primary protection available on demand
The Always On subscription stops bad The Always Available subscription runs on
traffic from ever reaching your network by standby and can be initiated when under
continuously processing all traffic through the attack.
cloud-scrubbing service and returning only
legitimate traffic to your site.
6
7
DATASHEET
Silverline DDoS Protection
F5 Global Services
F5 Global Services offers world-class support, training, and consulting to help you get
the most from your F5 investment. Whether it’s providing fast answers to questions,
training internal teams, or handling entire implementations from design to deployment,
F5 Global Services can help ensure your applications are always secure, fast, and reliable.
For more information about F5 Global Services, contact [email protected] or visit
f5.com/support.
DevCentral
The F5 DevCentral™ user community of more than 195,000 members is your source for
the best technical documentation, discussion forums, blogs, media, and more related to
Application Delivery Networking.
More Information
To learn more about Silverline DDoS Protection, visit f5.com to find these and
other resources:
Web pages
DDoS Protection Reference Architecture
F5 Silverline DDoS Protection
F5 Networks, Inc. 401 Elliott Avenue West, Seattle, WA 98119 888-882-4447 f5.com
©2016 F5 Networks, Inc. All rights reserved. F5, F5 Networks, and the F5 logo are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com.
Anyotherproducts,services,orcompanynamesreferencedhereinmaybetrademarksoftheirrespectiveownerswithnoendorsementoraffiliation,expressorimplied,claimedbyF5.DC1114|DS-SILVERLINE-52994366-ddos-update 0416