Support >
  About independent server >
  How to defend network attacks on high defense servers
How to defend network attacks on high defense servers
Time : 2023-05-17 16:22:58
Edit : Jtti

  Many Internet companies will choose high defense servers instead of ordinary servers, because high defense servers are significantly better than ordinary servers in terms of configuration and network resources. More importantly, their defense network attack capabilities are stronger than ordinary servers. Below is the defense network attack process of high defense server:

  1. Regular scanning

  Scan the existing network master nodes on a regular basis, check the possible security vulnerabilities, and clean up the new vulnerabilities in time.

  2. Configure the firewall at the backbone node of the high defense server

  Installing the firewall can effectively resist the DDOS attack and other attacks. When the attack is found, the attack can be directed to some unimportant sacrifice hosts, so as to protect the real hosts not being attacked.

  3. Make full use of network equipment to protect network resources

  When a company uses load balancing equipment such as routers and firewalls, it can effectively protect the network. In this way, when one router is attacked, the other will work immediately, thus cutting DDOS attacks to the greatest extent.

  4. Filter unnecessary services and ports

  Filter the fake IP on the router. Only the open service port is now a high defense server. Close all other ports or prevent it on the firewall.

https://www.jtti.cc/uploads/UEditorImages/202305/17/7f1cbed73e64e70f3f5c7fe401625d8a.jpg

  5. Limit SYN/ICMP traffic

  Users should configure the maximum traffic of Syn/ICMP on the router to limit the highest frequency width that Syn/ICMP packets can occupy. In this way, when a large number of limited SYN/ICMP flows appear, it means that it is not a normal network access, but it is, but it is not a normal network access, but it There are hackers invasion.

  6. Filter all RFC1918 IP address

  The RFC1918 IP address is the IP address of the internal network. They are not a fixed IP address of a network segment, but the regional IP address retained inside the Internet, which should be filtered out. This method is not to filter the interviews of internal employees, but to filter a large number of false internal IPs forged during the attack, which can also reduce the DDOS attack.

JTTI-Defl
JTTI-COCO
JTTI-Selina
JTTI-Ellis
JTTI-Eom