Keep network control
Protected transit makes sense when customer prefixes, edge design and BGP policy must stay central to the architecture.
Peeryx protected IP transit preserves prefixes, BGP control and several handoff models so legitimate traffic can return to production that is already running.
This model is for teams that need more than a single protected IP or a one-size-fits-all tunnel. It preserves prefixes, BGP control and multiple clean-traffic handoff models while protecting infrastructure that is already in production.
Protected transit makes sense when customer prefixes, edge design and BGP policy must stay central to the architecture.
Cross-connect, GRE, IPIP, VXLAN or a router VM are not sales details. They are the mechanisms that define the real quality of the integration.
A technical buyer wants to see the traffic path, mitigation model, handoff design and the constraints that remain on the customer side.
A good model lets you frame prefixes, links, target latency, current hoster and legitimate traffic return paths from the start.
Because it makes compatibility with the existing environment, handoff quality and long-term operating cost visible from the beginning.
Peeryx sits between the Internet and your production as a specialized network layer. Depending on the scenario, your prefixes are announced toward the platform or your services are exposed through protected IPs, then legitimate traffic is returned through the delivery model that best fits your environment.
BGP announcements for your prefixes or exposure through protected IPs depending on the level of control you want, rollout speed and the way your network already operates.
Filtering is designed to preserve legitimate traffic, with continuous observation, targeted signatures and upstream relief only when attack volume truly requires it.
Cross-connect, GRE, IPIP, VXLAN or a router VM: Peeryx does not force a single model. The right handoff depends on your edge, hoster, target latency and operating style.
Dedicated servers, clusters, gaming platforms, APIs and critical services can stay where they are. The goal is to protect what already runs before considering wider changes.
How Peeryx receives traffic, how mitigation is applied, how clean traffic comes back and how much network control the customer keeps.
Depending on your topology, clean traffic can be delivered through protected IPs, GRE, IPIP, VXLAN, cross-connect or a router VM. The right choice depends mainly on the infrastructure already in place and the level of network control you need.
A practical way to start quickly with clean public exposure and lower early complexity.
A standard model for protecting an existing dedicated server without rebuilding the full architecture.
Best suited when your own prefixes and routing policies need to remain in place.
The objective remains to add protection without disrupting the customer’s daily operations.
A clear focus on protected transit for infrastructure, hosting and public-facing services.
Cross-connect, GRE, IPIP, VXLAN and router VM delivery models let you fit Peeryx into your existing network design.
Five included post-filter firewall rules let you ratelimit, accept or drop traffic after mitigation.
Protection spans L3, L4, L5 and L7, including DDoS targeting all L3/L4 protocols.
Protected transit delivered directly in datacenter for low-latency, high-trust interconnection.
Fast deployment model for secure protected transit over established GRE encapsulation.
Simple routed delivery option when IPIP better matches your infrastructure constraints.
Flexible protected delivery for environments built around overlay network designs.
Prefer to keep tunnel control on your side? Peeryx can provide a router VM for iBGP or eBGP return paths.
Choose cross-connect, tunnels or router VM based on your existing topology and operational preferences.
Traffic enters the Peeryx mitigation fabric where volumetric and protocol attacks are filtered in real time.
Firewall rules and behavioral analysis refine the accepted traffic profile after core mitigation.
Filtered traffic is handed back to your infrastructure through the chosen delivery method, with BGP included.
Commit-based pricing keeps the offer transparent while scaling efficiently for larger networks.
Commit pricing
Commit pricing
Commit pricing
Commit pricing
If you prefer to control the tunneling layer yourself, Peeryx can provide a router VM so you can establish tunnels on your side and route traffic back using iBGP or eBGP according to your design.
Add specialized gaming traffic filtering for €190/month when you need deeper rules tailored to game protocols and session patterns.
Up to 24 hours
Up to 72 hours
Under 2 hours with €250 setup
Protect public-facing customer workloads without sacrificing delivery flexibility.
Add premium Anti-DDoS protected transit to exposed backbone segments and edge services.
Secure business-critical applications, APIs and platforms against disruptive traffic spikes.
Protect game-adjacent infrastructure while keeping the transit product as the operational core.
Before buying protected transit, buyers should understand link saturation, 95th percentile billing, blackholing, asymmetric routing and the difference between static profiles and truly adaptive mitigation.
The xdp vs dpdk anti ddos question comes up all the time. This guide gives a practical answer for network and security teams: what XDP does extremely well, where DPDK becomes the right tool, and which approach usually offers the best cost/performance ratio.
Read the articleAdaptive mitigation and clean delivery
Link saturation, 95th percentile, blackholing, asymmetric routing and clean traffic delivery: the fundamentals before comparing providers.
Read the articleAdaptive mitigation and clean delivery
How to keep an OVH or Hetzner server in production and get legitimate traffic back without rebuilding the whole infrastructure.
Read the articleProtection without full migration
The minimum commit is 100 Mbps, billed on a 95th percentile basis.
Yes. Router VM delivery is available when clients want to manage the tunneling layer and return traffic through iBGP or eBGP.
No. It is an optional €190/month add-on for customers who need more specialized gaming rules.
Excess traffic outside the commit is billed at €1.50/month per exceeded Mbps.
Share your prefixes, links, hoster, target latency and expected handoff model. We will recommend the right Peeryx design.