← Back to blog

GRE, BGP or protected IPs: which model should you choose to protect a service against DDoS?

Simple GRE tunnel, GRE + BGP or protected IP delivery: here is how to choose the right model depending on your architecture, routing control requirements and deployment speed.

No single universal model

The best design depends on your IP ownership, routing needs and production constraints.

GRE is often the fastest start

For many customers, a simple tunnel is already enough to deploy cleanly.

BGP adds control

It becomes useful when you want to keep your own announcements or a more advanced routing policy.

Protected IPs simplify onboarding

They let you test quickly without moving everything on day one.

When a customer looks for serious DDoS protection, the first question should not be “which provider?” but “which delivery model actually fits my architecture?”. Many deployment mistakes come from picking the wrong balance between a simple GRE tunnel, GRE with BGP and protected IP delivery.

In practice these three models do not offer the same complexity, the same operational benefits or the same migration impact. Choosing well from the start avoids unnecessary moves, fragile integrations and unrealistic expectations.

The real decision: simplicity, control or deployment speed

The common mistake is to ask for the “most advanced” design before checking the real need. Many customers do not need BGP on day one. Others do benefit from keeping their own prefixes and routing logic from the beginning.

The right choice depends on three things: who owns the public IPs, how much routing control is needed and how fast the protection has to go live.

Why the delivery model matters so much

Your delivery model affects deployment time, maintenance effort, the number of required changes on the existing environment and how easily the design can evolve later.

A technically powerful solution that is too heavy to integrate can slow down the whole project. On the other hand, a very simple model can be perfect for one service but too limited for a larger multi-site or multi-prefix environment.

When to choose a simple GRE tunnel

GRE-only is often the right answer when a customer wants to protect an existing production service quickly and does not need to announce their own prefixes.

It fits dedicated servers, web services, APIs, gaming platforms and environments that want to add anti-DDoS protection without redesigning the public routing layer.

  • Simpler deployment
  • Fewer BGP-side dependencies on the customer environment
  • Very good for fast latency and integration tests
  • A strong option when keeping an existing OVH, Hetzner or similar dedicated server

When to add BGP to the GRE tunnel

BGP becomes relevant when you have your own IP space, your own ASN or an architecture where routing control is part of the requirement. It allows cleaner prefix handling and more flexibility as the environment grows.

It is not a mandatory prerequisite for protection. It is an architectural choice that adds control when that control has real operational value.

When to use protected anti-DDoS IPs

Protected IPs are often the fastest way to start. Traffic hits an IP exposed on the mitigation side first, and clean traffic is then delivered to your server through a tunnel.

This is especially useful if you do not want to announce your own blocks, if you want to validate the service quickly or if you first want a simple production-ready model before moving to something more advanced.

1. The service is published on a protected IP

The public exposure point sits on the mitigation infrastructure.

2. Malicious traffic is filtered upstream

The goal is to stop the attack before delivery to your own environment.

3. Legitimate traffic is delivered to your infra

Delivery can happen through GRE or another method depending on the design.

4. You keep room to evolve later

If your needs change, the design can move towards more routing control later on.

How to decide between the three models quickly

If you want to move fast, protect a specific service and avoid complexity, start with GRE-only or protected IP delivery in most cases. If keeping your own public space is already important, GRE + BGP makes sense from day one.

The best design is usually the one that protects fast without locking you into unnecessary complexity. The goal is not to look impressive on paper, but to stay clean, stable and operable.

Common mistakes to avoid

The most common mistake is picking a model that is too heavy for the real need, or too simple for an already advanced environment. It is also risky to ignore return traffic, MTU and the exact way the service will be exposed.

Is BGP mandatory to be protected?

No. Many services can be protected properly with GRE and, when helpful, protected IP delivery.

Is a tunnel alone enough for a dedicated server?

In many cases yes, especially when the main goal is to protect a service already running in production.

When are protected IPs most useful?

When you want to go live quickly, reduce complexity and avoid announcing your own blocks at the start.

Can we start simple and evolve later?

Yes. That is often the best path: validate the service first, then evolve the design if the architecture really requires it.

Conclusion

GRE, GRE + BGP and protected IP delivery are not opposing ideas. They are three valid delivery models, each useful depending on your production reality.

If your goal is to add serious DDoS protection without making your architecture unnecessarily heavier, the best starting point is the one that protects quickly, cleanly and leaves room to evolve later.

Resources

Related reading

To go deeper, here are other useful pages and articles.

Tell us how your network is set up

Share whether you already have your own IPs, an existing dedicated server or a need for very fast deployment and we will tell you which model is the cleanest fit.