DDoS Protection
Coverage terms, limitations, mitigation behavior, incident reporting, and responsibilities.
Coverage
Scope
Mitigation is designed for volumetric, protocol, and common application-layer attacks within our network edge and scrubbing centers. Custom-layer attacks may require additional tuning and are not guaranteed without an add-on.
Limitations
- No guarantee of zero downtime.
- False positives may occur; traffic may be rate-limited.
- Bypass attempts or on-host compromises are out of scope.
Mitigation Behavior
Traffic is scrubbed via heuristics and signatures, including rate limiting, filtering, and temporary null-routing of abusive sources. Changes to rules may be made without notice during active incidents.
Incident Reporting
Report incidents promptly with timestamps, server IPs, logs, and relevant traffic patterns. We may request additional data to tune mitigation and restore service stability.