How does IG200/2000 protect against Botnets and attacks from limited IP sources?
IG200/2000 can limit the packets/source/second, concurrent connections/source, concurrent connections/destination, SYN packets/source/second, SYN packets/second, connection establishment rate/source/second etc. These mechanisms ensure that the fast or slow Botnets attacks are thwarted with minimal collateral damage. Q: How does IG 200/2000 protect against my network equipment from being overloaded when under a DoS/DDoS attack? A: IG200/2000 is usually deployed before your critical network infrastructure and provides a clean pipe to them. It therefore ensures that subsequent network infrastructure such as routers, switches, load balancers, and firewalls etc. do not get overloaded with connections.