Network cluster

Network & performance resources

XDP, DPDK, packet filtering and architecture.

Performance comparison 9 min read

XDP vs DPDK for Anti-DDoS filtering: which one should you choose?

The xdp vs dpdk anti ddos question comes up all the time. This guide gives a practical answer for network and security teams: what XDP does extremely well, where DPDK becomes the right tool, and which approach usually offers the best cost/performance ratio.

Read the article
Technical comparison Reading time: 8 min

GRE, BGP or protected IPs: which model fits best?

The strengths, limits and deployment cases of the main anti-DDoS delivery models depending on topology and network control.

Read the article
Routing & latency Reading time: 9 min

Latency, asymmetry and clean traffic delivery

Why the traffic path, local egress and handoff model matter as much as raw mitigation capacity.

Read the article
Filtering server 8 min read

Dedicated Anti-DDoS filtering server: when is it the best compromise?

A dedicated Anti-DDoS filtering server takes pressure away from production, allows finer logic and gives you better control over clean traffic delivery. It is not always mandatory, but it is often the best balance between cost and flexibility.

Read the article
DDoS guide Reading time: 6 min

What is a scrubbing center and why the handoff model matters as much as capacity

A practical explanation of scrubbing centers, where they fit in Anti-DDoS design and why clean traffic delivery matters.

Read article
DDoS guide Reading time: 6 min

GRE vs VXLAN for Anti-DDoS delivery

How to think about GRE and VXLAN handoff models for clean traffic delivery, integration speed and operational control.

Read article
DDoS guide Reading time: 8 min

High-PPS filtering design

A practical look at building filtering layers for very high packet rates without losing observability or handoff clarity.

Read article
DDoS guide Reading time: 7 min

Router VM Anti-DDoS use cases

When a router VM makes sense: keeping customer routing and filtering logic while still receiving upstream volumetric protection.

Read article
DDoS guide Reading time: 8 min

Building a filtering stack behind volumetric protection

Why some buyers want Peeryx only for the first volumetric layer while keeping their own filtering stack behind it.

Read article

Talk to an engineer

XDP, DPDK, packet filtering and architecture.