← Back to blog

Anti-DDoS clean traffic delivery: why the handoff matters as much as mitigation

Many websites talk about mitigation capacity and far fewer talk about clean traffic delivery. Yet a credible Anti-DDoS design does not stop at scrubbing: legitimate traffic still has to be delivered back to the right target properly.

Mitigation alone is not enough

If clean traffic is not delivered correctly, the chain remains incomplete.

The handoff defines operational reality

Latency, MTU, routing and monitoring become central topics.

Several models are credible

GRE, BGP over GRE, protected IPs, cross-connects or a router VM depending on the need.

A good design preserves what already works

The goal is often to add a clean layer, not to force a full migration.

On many Anti-DDoS websites, the discussion stops at mitigation. In real life, filtering is only part of the job. Once the attack is reduced, legitimate traffic still has to reach the right place through a delivery model that stays stable, readable and operational.

That is exactly where a large part of technical credibility is decided. A good design is not only able to absorb a flood. It also has to deliver clean traffic back without creating a new fragile point.

Why clean traffic delivery matters as much as mitigation

If the cleaning layer stops the attack but hands clean traffic back poorly, the customer still ends up with a production problem. The real result is not “the attack was seen”; the real result is “the service stayed reachable and usable”.

Clean traffic delivery is what turns theoretical capacity into an operational result. It is the difference between a platform that looks impressive on slides and an architecture that survives in production.

The main clean traffic delivery models

There is no single universal model. Depending on the level of control required, clean traffic can be handed back through GRE, IPIP, VXLAN, BGP over GRE, cross-connects or a router VM that sits between mitigation and the customer environment.

The right choice mainly depends on public addressing, BGP ownership, deployment speed and how strongly you want to preserve the existing architecture.

Simple GRE

Fast to deploy and often enough to start in a clean way.

BGP over GRE

Adds more control when prefixes and routing decisions must remain on the customer side.

Protected IPs / cross-connect / router VM

Useful depending on how much simplification or control is expected.

Latency, MTU and asymmetric routing: what the handoff really changes

The delivery model directly impacts perceived latency, available MTU, asymmetric routing behaviour and troubleshooting simplicity. Technical buyers watch these topics very closely, especially for gaming, APIs or critical services.

A credible handoff model therefore has to be designed from the start around production constraints: where traffic returns, how it leaves again, what MTU stays comfortable and how to avoid surprises when the attack actually happens.

Why preserving the existing environment is often the best strategy

In many cases the customer does not want to reinvent the network. They want to add a clean Anti-DDoS layer in front of an existing dedicated server, cluster, business proxy or custom logic that already delivers value.

That is why clean traffic delivery matters so much. It lets you add protection without turning integration into a heavy migration project.

  • Keep an existing server at OVH, Hetzner or another provider
  • Keep XDP, DPDK or proxy logic already running in production
  • Add a cleaning layer without moving the whole architecture
  • Increase maturity progressively instead of replacing everything at once

A credible Peeryx-style scenario

A customer keeps their public IPs and servers where they already run. Traffic is captured by Peeryx, cleaned and handed back to the return point chosen by the customer. If the need is simple, a GRE tunnel is enough. If more routing control is required, Peeryx can also work with BGP over GRE or another suitable variant.

The objective is not to force a single model. The objective is to choose the model that makes clean traffic genuinely usable in the customer’s real environment.

Common mistakes

The first mistake is underestimating delivery and focusing only on scrubbing. The second is choosing a return model that is more complex than necessary when a simpler design would be more robust.

Another common mistake is ignoring MTU, monitoring and asymmetric return topics until the worst possible moment: the attack itself.

FAQ

Can clean traffic be sent back to my existing server?

Yes. In many cases that is exactly the point of the design.

Is simple GRE often enough?

Yes. For many deployments, simple GRE is already a very strong compromise.

When should BGP be added?

Mainly when you want to keep more control over your prefixes and routing decisions.

Does the handoff matter as much as the advertised mitigation capacity?

Yes. Without clean delivery, capacity alone does not create the expected production outcome.

Conclusion

Clean Anti-DDoS traffic delivery is not an implementation detail. It is the bridge between mitigation and production reality.

Talking about capacity without talking about handoff means talking about half an architecture. A serious strategy has to clean and deliver traffic back properly.

Resources

Related reading

To go deeper, here are other useful pages and articles.

Upstream pre-filtering 8 min read

Upstream Anti-DDoS pre-filtering: when to use it and why it changes everything

Upstream Anti-DDoS pre-filtering is not a magic layer. Used correctly, it removes obvious noise early, protects links and leaves the smarter layers enough room to keep working.

Read the article
Filtering server 8 min read

Dedicated Anti-DDoS filtering server: when is it the best compromise?

A dedicated Anti-DDoS filtering server takes pressure away from production, allows finer logic and gives you better control over clean traffic delivery. It is not always mandatory, but it is often the best balance between cost and flexibility.

Read the article
Routing & latency Reading time: 9 min

Latency, asymmetry and clean traffic delivery

Why the traffic path, local egress and handoff model matter as much as raw mitigation capacity.

Read the article
Architecture guide Reading time: 8 min

Protected IP transit: understand the model

Link saturation, 95th percentile, blackholing, asymmetric routing and clean traffic delivery: the fundamentals before comparing providers.

Read the article
Technical comparison Reading time: 8 min

GRE, BGP or protected IPs: which model fits best?

The strengths, limits and deployment cases of the main anti-DDoS delivery models depending on topology and network control.

Read the article
Volumetric mitigation 9 min read

How do you mitigate a DDoS attack above 100Gbps?

Link, PPS, CPU, upstream relief and clean handoff: the real framework behind credible 100Gbps mitigation.

Read the article

Need a clean delivery model that fits your infrastructure?

Peeryx can help choose and deploy the right return model for clean traffic: GRE, BGP over GRE, protected IPs or another delivery method consistent with your production.