Recommended Topology - DDoS Protection For Networks
Recommended Topology - DDoS Protection For Networks
Table of Contents
Last Updated Sep 24, 2023 3 minute read Summarize Documentation Cloud WAF DDoS Protection for Networks User Guide Public
This topic describes Imperva’s guidelines and recommendations for customer setup that provides maximum service availability, performance, and functionality.
This topology is recommended for both always-on and on-demand DDoS Protection for Networks customers.
Service Availability
Imperva has a global network of data centers, also referred to as Imperva PoPs. (For the full list, see Imperva Data Centers (PoPs).) When you connect your network to
Imperva, we advertise your network to transit providers from our PoPs all across the world using Anycast. After traffic is scrubbed, the legitimate traffic is sent to your data
center through several dedicated connections between your data center(s) and the Imperva PoPs.
Each of your data centers should be connected to at least 2 Imperva data centers to make sure service is available during failure or planned PoP maintenance. At least one
of these connections should be to a high capacity PoP (listed in the onboarding instructions here: Add a GRE Tunnel Connection).
Note:
To ensure 100% availability, each customer data center should be connected to 3 Imperva PoPs.
If you have multiple data centers, you can connect to the same or different Imperva PoPs.
Connecting to multiple Imperva PoPs ensures service availability by Imperva. Failures which would impact service availability can also occur at your end or even at your
ISP. Therefore, it is recommended that you use redundant endpoint routers and redundant ISP connections when connecting your data centers to Imperva PoPs.
Service Performance
For best performance, consider the following when setting up connections between your data centers and the Imperva PoPs:
Choose Imperva PoPs that minimize latency, as well as other performance KPIs such as packet loss and jitter. In most cases, this is achieved by connecting to
Welcome to Imperva! 👋 How
Imperva PoPs that are geographically closest to your data centers. can I direct you?
https://docs.imperva.com/bundle/cloud-application-security/page/network-ddos/network-topology.htm 1/3
12/19/24, 3:48 PM Recommended Topology: DDoS Protection for Networks
Note: It is also worthwhile considering the ISP, as in some cases, a connection through one ISP has lower latency than through another, due to peering
agreements between transit providers.
It is recommended to reinforce your setup with a redundant connection if the following apply:
You see significant performance differences between the different connections of your data center to the selected Imperva PoPs (e.g. a difference of
several 10s of milliseconds), and
a significant portion of the traffic to your network is scrubbed at the Imperva PoP the best performance that you are connecting to. This would typically
happen if both your data center and many of the users sending traffic to it are in proximity to that PoP.
Each Imperva PoP contains two tunnel endpoints (external routers). When you connect to both endpoints, traffic continues to flow through the alternate
connection in the event of local router failure, and does not fail over to a less preferable connection to a different PoP.
Note: Failover to a connection from a different PoP can still occur in some scenarios, such as in the event of a complete PoP failure.
Note: To make sure you set the right priority, you can use traffic manipulation techniques such as the AS prepend or local preference to prioritize the
additional tunnel to Endpoint 2 in the primary PoP. For details, see BGP Community Support Option.
See also:
https://docs.imperva.com/bundle/cloud-application-security/page/network-ddos/network-topology.htm 2/3
12/19/24, 3:48 PM Recommended Topology: DDoS Protection for Networks
Contact
+1 (866) 926-4678
or Contact Us
Follow us
Cookie Policy
Privacy and Legal
Modern Slavery Statement
Powered By
https://docs.imperva.com/bundle/cloud-application-security/page/network-ddos/network-topology.htm 3/3