Keep network control
Protected transit makes sense when customer prefixes, edge design and BGP policy must stay central to the architecture.
Built for network teams that want to filter the attack, keep BGP logic and get clean traffic back in a usable form.
This model is for teams that need more than a single protected IP or a one-size-fits-all tunnel. It preserves prefixes, BGP control and multiple clean-traffic handoff models while protecting infrastructure that is already in production.
Protected transit makes sense when customer prefixes, edge design and BGP policy must stay central to the architecture.
Cross-connect, GRE, IPIP, VXLAN or a router VM are not sales details. They are the mechanisms that define the real quality of the integration.
A technical buyer wants to see the traffic path, mitigation model, handoff design and the constraints that remain on the customer side.
A good model lets you frame prefixes, links, target latency, current hoster and legitimate traffic return paths from the start.
Because it makes compatibility with the existing environment, handoff quality and long-term operating cost visible from the beginning.
Peeryx protected transit is built so the customer keeps the useful part of the design: prefixes, BGP logic, edge, handoff model and complementary filters whenever that makes sense.
When the design requires it, Peeryx integrates without taking away control over prefixes, ASN or useful BGP policy.
Dedicated servers, clusters, proxies, edge routers and existing links can stay at the core of production.
The choice between cross-connect, GRE, IPIP, VXLAN, protected IPs or a router VM should answer a real constraint, not a marketing claim.
After Peeryx pre-filtering, you can still finish the job with your own XDP, DPDK, ACL or application-proxy logic.
Peeryx sits between the Internet and your production as a specialized network layer. Depending on the scenario, your prefixes are announced toward the platform or your services are exposed through protected IPs, then legitimate traffic is returned through the delivery model that best fits your environment.
BGP announcements for your prefixes or exposure through protected IPs depending on the level of control you want, rollout speed and the way your network already operates.
Filtering is designed to preserve legitimate traffic, with continuous observation, targeted signatures and upstream relief only when attack volume truly requires it.
Cross-connect, GRE, IPIP, VXLAN or a router VM: Peeryx does not force a single model. The right handoff depends on your edge, hoster, target latency and operating style.
Dedicated servers, clusters, gaming platforms, APIs and critical services can stay where they are. The goal is to protect what already runs before considering wider changes.
How Peeryx receives traffic, how mitigation is applied, how clean traffic comes back and how much network control the customer keeps.
Depending on your topology, clean traffic can be delivered through protected IPs, GRE, IPIP, VXLAN, cross-connect or a router VM. The right choice depends mainly on the infrastructure already in place and the level of network control you need.
A practical way to start quickly with clean public exposure and lower early complexity.
A standard model for protecting an existing dedicated server without rebuilding the full architecture.
Best suited when your own prefixes and routing policies need to remain in place.
The objective remains to add protection without disrupting the customer’s daily operations.
A clear focus on protected transit for infrastructure, hosting and public-facing services.
Cross-connect, GRE, IPIP, VXLAN and router VM delivery models let you fit Peeryx into your existing network design.
Five included post-filter firewall rules let you ratelimit, accept or drop traffic after mitigation.
Protection spans L3, L4, L5 and L7, including DDoS targeting all L3/L4 protocols.
Protected transit delivered directly in datacenter for low-latency, high-trust interconnection.
Fast deployment model for secure protected transit over established GRE encapsulation.
Simple routed delivery option when IPIP better matches your infrastructure constraints.
Flexible protected delivery for environments built around overlay network designs.
Prefer to keep tunnel control on your side? Peeryx can provide a router VM for iBGP or eBGP return paths.
Choose cross-connect, tunnels or router VM based on your existing topology and operational preferences.
Traffic enters the Peeryx mitigation fabric where volumetric and protocol attacks are filtered in real time.
Firewall rules and behavioral analysis refine the accepted traffic profile after core mitigation.
Filtered traffic is handed back to your infrastructure through the chosen delivery method, with BGP included.
Commit-based pricing that stays readable, with a model built for real production, BGP control and clean traffic delivery.
Commit pricing
Commit pricing
Commit pricing
Commit pricing
If you want to keep control over BGP sessions, tunnels or handoff logic, Peeryx can provide a router VM that fits your architecture.
Add specialized gaming traffic filtering for €190/month when you need deeper rules tailored to game protocols and session patterns.
Up to 24 hours
Up to 72 hours
Under 2 hours with €250 setup
Protect public-facing customer workloads without sacrificing delivery flexibility.
Add premium Anti-DDoS protected transit to exposed backbone segments and edge services.
Secure business-critical applications, APIs and platforms against disruptive traffic spikes.
Protect game-adjacent infrastructure while keeping the transit product as the operational core.
Protected IP transit anti-DDoS makes sense when you need upstream mitigation, clean traffic delivery and a network model that still fits existing production constraints.
Peeryx fits best when you want to preserve visibility over routing, prefixes and handoff choices instead of accepting an opaque mitigation model.
The goal is not only to absorb the attack. It is to return clean traffic to a server, cluster, proxy or edge that remains useful in production.
Peeryx can act as the first anti-DDoS layer before your own XDP, DPDK, reverse proxy or specialised application logic.
When requirements move from 2x10G to larger ports, the right model is the one that avoids a full redesign of architecture and operations.
The clearer the network and operations constraints are, the faster Peeryx can propose a clean and realistic delivery design.
Before buying protected transit, buyers should understand link saturation, 95th percentile billing, blackholing, asymmetric routing and the difference between static profiles and truly adaptive mitigation.
The xdp vs dpdk anti ddos question comes up all the time. This guide gives a practical answer for network and security teams: what XDP does extremely well, where DPDK becomes the right tool, and which approach usually offers the best cost/performance ratio.
Read the articleA readable model: protected ingress, mitigation, handoff decision and clean delivery aligned with your topology.
Link saturation, 95th percentile, blackholing, asymmetric routing and clean traffic delivery: the fundamentals before comparing providers.
Read the articleA readable model: protected ingress, mitigation, handoff decision and clean delivery aligned with your topology.
How to keep an OVH or Hetzner server in production and get legitimate traffic back without rebuilding the whole infrastructure.
Read the articlePeeryx can clean traffic upstream and hand legitimate traffic back to a server that is already live.
Protected IP Transit makes sense when you want real network control, keep your prefixes or integrate mitigation into an architecture already structured around BGP and clean handoff.
Yes. Peeryx is built for customers that want to preserve network logic, with BGP included, under-ASN support and delivery models compatible with several designs.
Clean traffic can be returned through cross-connect, GRE, IPIP, VXLAN or a router VM depending on topology, operations and latency targets.
Yes. In some scenarios, Peeryx can protect upstream and hand clean traffic back so your own filtering logic or internal network edge can do the rest.
Yes. Peeryx can clean traffic upstream and then deliver it back through GRE, IPIP, VXLAN, cross-connect or a router VM. That is useful when your own custom logic still sits behind it.
No. The goal is to match the existing environment as closely as possible. Depending on the case, Peeryx can integrate while preserving your prefixes, edge design or existing proxies.
Share your network context, latency targets, preferred handoff model and the services you need to protect. We’ll tell you whether protected transit is the right fit and how to integrate it cleanly.