This can be easily replicated by downloading any large file 3 times or more simultaneously. For example :
https://speed.hetzner.de/10GB.bin
Here is an example of the result:
In this example, the total server throughput is less than 1 Gbps (link speed) and is connected to our network equipment, which has 10 Gbps connectivity to Psychz Networks (with less than a few hundred Mbps of background traffic ). 40 Gbps of DDoS protection are allowed. A null route was produced (as verified by a route plot and confirmed by Psychz Networks staff) after approximately 30 seconds of sustained traffic (4 wires each at about 20 MB / s each). The null route lasted about an hour. No email or ticket is created to warn us. This experiment was repeated several times in different systems.
Our clients legitimately expect to be able to fully use their 1 Gbps network port and will not face a null route under any circumstances if the total incoming traffic to our equipment does not exceed 40 Gbps.
Psychz Networks staff kindly reproduced this exact scenario and observed the result detailed above. The answer we receive is very clear: this is the normal and expected result. The only solution is to opt for DDoS protection.
We really wonder if we are being selected. This does not look good at all. We also wonder how our customers are supposed to be protected from an incoming volumetric DDoS attack when they cannot survive 1 Gbps of legitimate incoming traffic. A case in which an attacker would send 1 Gbps of traffic sustained in 2 or 3 TCP sessions would eliminate a host behind the 40 Gbps DDoS protection of Psychz Networks. Psychz Networks could not answer this last question.
What has been your experience with Psychz Networks DDoS protection? Are you able to reproduce our case?
To be honest,