You are always free to call the Fusix NOC or open a ticket with us for any task that you may need; but there is also the option of using Fusix Team!works, our customer portal that marries your love for your own product to our love for automated IP networking. Using Fusix Team!works, you can perform many routine network administration tasks in a fully automated manner, 24/7 and without additional cost:
- review the IP address prefix list we route for your network;
- customers with a BGP session will want to set this to “automatic” using their AS or AS-macro;
- receive an e-mail with changes to your prefix list.
- IP bandwidth:
- specifications of ports that are used to provide Internet services to your network;
- IP bandwidth utilisation per port and in total;
- set up and change reverse DNS settings;
- filters for UDP and/or ICMP traffic to one or more IP addresses in your range in order to combat a possible attack;
- set up blackholing, meaning that in case of an attack we drop all traffic to one of your IP addresses.
- set up and change notification settings via e-mail and/or SMS in case your port or BGP session goes down.
In addition we are always working on new features. Please make sure to subscribe to our newsletter to stay informed of the latest developments and learn how you can get to try out the new features first.
Netflow data and anti-DDoS
Anti-DDoS page of your Fusix Customer Portal shows Netflow data for the 100 IP addresses in your network that receive the most bytes, packets, flows, bytes per second, bytes per packet, or packets per second. This information is retrieved every 5 minutes and the data is summarized across the latest 15 minutes.
Why would you want to see this Netflow data? Whether you have your own ISP network with Fusix IP transit, or you use IP address provided by Fusix, either way the capabilities of your network devices and/or the maximum throughput of your Internet uplink might be not enough to sustain a DDoS attack. As a result, your servers would become unreachable from the Internet, and the DDoS attack would achieve its wicked goal. In such a situation, you can identify which IP address is the target of the attack based on the Netflow data that describes the traffic that goes to your IP addresses.
Once you know the victim address, you can use our on-line DDoS-response tools integrated in our Team!works web portal free of charge effectively by following these steps:
- Drop all traffic to the IP address that seems to be the target (blackhole). If the blackholing stopped the DDoS, you identified the actual target;
- Now try filtering the incoming traffic, so that only eligible traffic will reach the target, while the DDoS traffic will be dropped. The filtering tool is based on dropping traffic that uses specific protocols, such as UDP or ICMP.
- Preventively, you could always drop UDP and/or ICMP traffic for IP addresses of your services that should not receive such traffic by default.
In the Customer Portal you can see:
- The top 100 IP addresses in your network receiving traffic, and sort them according to the traffic-measurement criteria;
- Traffic filters that are active;
- History of traffic filters that were applied and removed in the past.
While you can use our web portal free of charge at any time of day or night to take anti-DDOS measures, we are of course happy to help you on the phone, too, in case of emergency!
Automatic updates of your IP prefix list
Fusix is one of the very few Tier 2 IP transit providers with automated IP prefix updates. Our IP transit customers announce IP address blocks to us across BGP. Should you wish to announce a new prefix, or stop using an existing prefix, you can simply change the relevant public Internet routing registry (such as RIPE NCC, NTT, RADB, etc.). As your IP transit provider, Fusix is automatically aware of these changes and re-configures the settings of your IP transit service accordingly.
The back-end of our network-management platform regularly retrieves your route objects, compares them with the current configuration of the prefix filters and makes appropriate updates. The steps of this process are:
- Team!works retrieves (by using command: bgpq3 -h rr.ntt.net -3 -m 24 — [ASN or AS-set]) your route objects daily at 10.00am and 16.00pm (Amsterdam time) and compares them with the current configuration of the Fusix backbone;
- You can request to always review and approve all changes, before they are implemented. Otherwise, Team!works will update configuration of your IP transit service automatically, except when such change removes > 25% of the currently accepted IP address blocks and hence must be reviewed manually anyway;
- All requests for a change approval and notifications about automatically implemented changes are e-mailed to your maintenance e-mail address (which you can set or change in the Team!works portal).
In the Customer Portal you can review the settings for your ISP network:
- Your AS number and, if applicable, your AS-SET;
- Status of the most recent update: Accepted / Review;
- The total number of accepted IPv4 and IPv6 IP address blocks (prefixes). Use the “show” link to see all blocks;
- Set the update policy to “always manually review and approve” or to “implement automatically, unless such update removes >25% of the IP blocks”;
- Review history and details of all implemented updates.
With Fusix Team!works automated prefix filtering, we have launched a feature that is unfortunately standard only in some of the biggest ISP networks. As with our anti-DDOS feature explained above – yes we are still happy to help you with this over the phone or in e-mail. But you can also be sure that our automated systems keep the Internet secure and your prefixes safe!