Drop DDoS traffic
To help our customers mitigate the effects of Distributed Denial of Service (DDoS) attacks against their networks, we offer customer-triggered Blackholing.
Blackholing via the route servers
- Customers advertise their IP/IPv6 prefix(es) tagged with the BGP BLACKHOLE Community (50263:666).
- Accepted prefix length by the 1-IX EU Route-Servers is /32 for IPv4 (only if BLACKHOLE is set)
- Accepted prefix length by the 1-IX EU Route-Servers is /128 for IPv6 (only if BLACKHOLE is set)
- Prefix validation (RIR and RPKI filtering) is applied as usual, to prevent unauthorized Blackholing
- The 1-IX EU Route Servers rewrite the next-hop of the advertised IP/IPv6 prefix(es) to the address of the Blackhole next-hop
- Then the 1-IX EU Route Servers advertise this prefixes to all peers
- All of the peers MUST accept /32 for IPv4 and /128 for IPv6 with BGP BLACKHOLE Community (50263:666)
- Blackhole next-hop has a unique MAC address (determined by ARP/NDP)
- All frames with destination MAC address of Blackhole next-hop are dropped inside 1-IX EU switching platform