IBM Cloud Docs
Third-party services and DDoS protection

Third-party services and DDoS protection

When you integrate third-party services, such as Content Delivery Networks (CDNs), VPNs, or NAT devices with CIS, it is important to understand how these components interact with Distributed Denial of Service (DDoS) protection systems. The following sections describe recommended configuration settings and adjustments to DDoS rules to make sure that these services work seamlessly together. The goal is to maintain strong traffic filtering, reduce potential risks, and avoid any negative impact on performance.

Using a third-party CDN in front of CIS

Some CIS customers choose to place a third-party CDN in front of CIS to cache and serve their resources.

However, it is "not" recommended to place a third-party CDN in front of CIS. Some CDN providers might introduce discrepancies into HTTP requests that deviate from protocol standards and protocol best practices. Also, because traffic to CIS then originates from a limited set of the CDN's IP addresses, this can (in rare cases) cause the traffic to be misidentified as a DDoS attack. For example, when you use the Akamai CDN in front of CIS, the high volume of traffic from a limited set of IPs can resemble attack behavior to CIS.

Instead, it is recommended to use CIS and the underlying Cloudflare network and its CDN capabilities, which provide the following benefits:

  • Reduced latency by removing an extra network hop between vendor data centers.
  • Immediate DDoS protection at the first point of contact with the internet (an industry best practice).

If you use a third-party CDN in front of CIS and CIS mitigates a DDoS attack, you must still pay your CDN provider for the attack traffic the provider that is processed before mitigation.

Recommended DDoS configuration adjustments for CDN or proxy

If you use a CDN or proxy in front of CIS, it is recommended that you change the action and/or sensitivity level of the following DDoS rules named:

  • HTTP requests with unusual HTTP headers or URI path (signature #1) with the rule ID ...3486aee1
  • HTTP requests with unusual HTTP headers or URI path (signature #56) with the rule ID ...e269dfd6
  • HTTP requests with unusual HTTP headers or URI path (signature #57) with the rule ID ...f35a42a0
  • Requests coming from known bad sources with the rule ID ...3a679c52