diff --git a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.de-de.md b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.de-de.md
index ef82cd5ab73..579c8c68252 100644
--- a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.de-de.md
+++ b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.de-de.md
@@ -1,7 +1,7 @@
---
title: Aktivieren und Konfigurieren der Edge Network Firewall
excerpt: Erfahren Sie hier, wie Sie die Edge Network Firewall konfigurieren
-updated: 2025-06-04
+updated: 2025-09-08
---
## Ziel
@@ -10,11 +10,6 @@ Zum Schutz von Diensten, die über öffentliche IP-Adressen zugänglich sind, bi
**Diese Anleitung erklärt, wie Sie die Edge Network Firewall für Ihre Dienste konfigurieren.**
-> [!warning]
->
-> **Achtung**: Die Funktion "Scrubbing-Center: permanenter Modus" erreicht End of Life (EOL) und wird am 8. September 2025 endgültig deaktiviert.
->
-
> [!primary]
>
> Weitere Informationen zu unserer Anti-DDoS-Lösung finden Sie [hier](/links/security/antiddos).
@@ -54,7 +49,8 @@ Die Edge Network Firewall reduziert die Anfälligkeit für DDoS-Angriffe im Netz
Loggen Sie sich in Ihr [OVHcloud Kundencenter](/links/manager) ein, klicken Sie auf `Network`{.action} in der linken Seitenleiste und dann auf `Öffentliche IP-Adressen`{.action}. Über das Dropdown-Menü unter **Meine öffentlichen IP-Adressen und zugehörige Dienste** können Sie Ihre Dienste nach Kategorien filtern.
-{.thumbnail}
+{.thumbnail}
+
Klicken Sie anschließend rechts neben der IPv4 auf `...`{.action} und wählen Sie `Firewall erstellen`{.action}.
@@ -164,30 +160,9 @@ Beispiel: Ein Paket für den TCP-Port 80 wird von Regel 2 abgefangen und die fol
### Schutz vor Angriffen - Aktivität im Scrubbing Center
-Unsere Anti-DDoS-Infrastruktur (VAC) verfügt über zwei Betriebsmodusse: **automatisch** und **permanent**. Der Schutz erfolgt über das automatische Scrubbing Center. In diesem Bereich untersucht unsere Technik die Datenpakete und versucht, den DDoS-Datenverkehr zu entfernen, während der legitime Datenverkehr durchgelassen wird.
-
-- **Automatische Abwehr** ist die Standardeinstellung: Alle IPs von OVHcloud werden automatisch protektiert. In der Regel ist dies die beste Wahl für Ihre Dienste. Wird illegitimer Traffic entdeckt, wird das Scrubbing Center aktiviert. Dies wird durch den Status „Erzwungen“ für eine bestimmte IP-Adresse angezeigt. Zu diesem Zeitpunkt ist auch die Edge Network Firewall aktiv. Die Situation normalisiert sich wieder, wenn der Angriff abgemildert wurde und keine verdächtigen Aktivitäten mehr beobachtet werden.
-
-- **Der permanente Schutz** kann über das OVHcloud Kundencenter aktiviert und deaktiviert werden. Bei permanentem Schutz wird die erste Filterstufe permanent angewendet, damit der gesamte Traffic das Schutzsystem durchläuft, bevor er den Server erreicht. Es wird davon abgeraten, diese Option über längere Zeiträume zu aktivieren, es sei denn, Sie bemerken starke Latenzschwankungen, da das Scrubbing Center den Traffic zu häufig umleitet.
-
-Beachten Sie, dass im Vergleich zum automatischen Modus **keine** Erhöhung des Schutzniveaus erreicht wird, wenn dieser Modus aktiviert ist.
-
-So aktivieren Sie die Funktion:
-
-- Klicken Sie auf das Menü `Bare Metal Cloud`{.action}.
-- Gehen Sie zu `Netzwerk`{.action} in der linken Seitenleiste.
-- Gehen Sie zum Abschnitt `IP`{.action}.
-
-|  |
-|:--:|
-| Als Nächstes klicken Sie auf die Schaltfläche `...`{.action} rechts von der betreffenden IPv4. |
-
-
-|  |
-|:--:|
-| Wählen Sie `Mitigation: Permanent mode`{.action}. |
-
+Unsere Infrastruktur für DDoS-Schutz (VAC) läuft automatisch. Der Schutz erfolgt über das Scrubbing Center. In diesem Bereich untersucht unsere Technik die Datenpakete und versucht, den DDoS-Datenverkehr zu entfernen, während der legitime Datenverkehr durchgelassen wird.
+Alle IPs von OVHcloud werden automatisch protektiert. In der Regel ist dies die beste Wahl für Ihre Dienste. Wird illegitimer Traffic entdeckt, wird das Scrubbing Center aktiviert. Dies wird durch den Status „Erzwungen“ für eine bestimmte IP-Adresse angezeigt. Zu diesem Zeitpunkt ist auch die Edge Network Firewall aktiv. Die Situation normalisiert sich wieder, wenn der Angriff abgemildert wurde und keine verdächtigen Aktivitäten mehr beobachtet werden.
> [!success]
> **Hinweis**
@@ -201,12 +176,10 @@ So aktivieren Sie die Funktion:
> Beachten Sie, dass unsere DDoS-Schutz-Infrastruktur für einen Dienst nicht deaktiviert werden kann. Alle OVHcloud Produkte werden im Rahmen des Schutzes geliefert und können nicht ausgenommen werden.
>
-
## Network Security Dashboard
Detaillierte Einblicke in entdeckte Angriffe und die Ergebnisse der Aktivitäten des Scrubbing Centers erhalten Sie in unserem [Network Security Dashboard](/pages/bare_metal_cloud/dedicated_servers/network_security_dashboard).
-
## Fazit
Nachdem Sie dieses Tutorial gelesen haben, sollten Sie in der Lage sein, die Edge Network Firewall zu konfigurieren, um die Sicherheit Ihrer OVHcloud Dienste zu verbessern.
@@ -215,4 +188,4 @@ Nachdem Sie dieses Tutorial gelesen haben, sollten Sie in der Lage sein, die Edg
[Game Server mit der Application Firewall schützen](/pages/bare_metal_cloud/dedicated_servers/firewall_game_ddos)
-Für den Austausch mit unserer User Community gehen Sie auf .
+Treten Sie unserer [User Community](/links/community) bei.
diff --git a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-asia.md b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-asia.md
index 114414d8b44..a9936bb7dda 100644
--- a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-asia.md
+++ b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-asia.md
@@ -1,7 +1,7 @@
---
title: Enabling and configuring the Edge Network Firewall
excerpt: Find out how to configure the Edge Network Firewall for your services
-updated: 2025-06-04
+updated: 2025-09-08
---
## Objective
@@ -10,11 +10,6 @@ To protect customer services exposed on public IP addresses, OVHcloud offers a s
**This guide will show you how to configure the Edge Network Firewall for your services.**
-> [!warning]
->
-> **Warning**: Permanent Mitigation is reaching its End-Of-Life (EOL) and will be disabled permanently on September 8, 2025.
->
-
> [!primary]
>
> You can find more information on our Anti-DDoS solution on [our website](/links/security/antiddos).
@@ -165,29 +160,9 @@ For example, a packet for TCP port 80 will be intercepted by rule 2 and the rule
### Attack mitigation - scrubbing centre activity
-Our Anti-DDoS infrastructure (VAC) has two modes of operation: **automatic** and **permanent**. The mitigation process is done via the automated scrubbing centre. This is where our advanced technology takes a deep look at the packets and attempts to remove DDoS traffic while allowing legitimate traffic to pass through.
-
-- **Automatic mitigation** is the default: All OVHcloud IPs are under automatic mitigation. Usually this is the best choice for your services. In case any malicious traffic is detected, the scrubbing centre activates. This state is indicated by the "Forced" status for a given IP address. At this time the Edge Network Firewall is also active. The situation comes back to normal when the attack is mitigated and no more suspicious activity is observed.
-
-- **Permanent mitigation** mode can be enabled or disabled via the OVHcloud Control Panel. With permanent mitigation, you permanently apply the first level of filtering so all traffic will always pass through the mitigation system before reaching the server. We do not recommend enabling this for longer periods of time unless you are experiencing latency jitter due to the scrubbing centre redirecting the traffic too frequently.
-
-Please note that compared to automatic mode, there is **no** increase in the level of protection when this mode is enabled.
-
-To enable it, follow these steps:
-
-- Open `Network`{.action} in the left-hand sidebar.
-- Open `Public IP Addresses`{.action}.
-
-|  |
-|:--:|
-| Next, click the `...`{.action} button to the right of the relevant IPv4. |
-
-
-|  |
-|:--:|
-| Select `Mitigation: permanent mode`{.action}. |
-
+Our Anti-DDoS infrastructure (VAC) operates automatically. The mitigation process is done via the automated scrubbing centre. This is where our advanced technology takes a deep look at the packets and attempts to remove DDoS traffic while allowing legitimate traffic to pass through.
+All OVHcloud IPs are under automatic mitigation. In case any malicious traffic is detected, the scrubbing centre activates. This state is indicated by the "Forced" status for a given IP address. At this time the Edge Network Firewall is also active. The situation comes back to normal when the attack is mitigated and no more suspicious activity is observed.
> [!success]
> **Tips**
@@ -201,12 +176,10 @@ To enable it, follow these steps:
> Please note that our Anti-DDoS infrastructure cannot be disabled on a service. All OVHcloud products are delivered within the scope of protection and this cannot be changed.
>
-
## Network Security Dashboard
For detailed insight into detected attacks and the results of scrubbing centre activities, we encourage you to explore our [Network Security Dashboard](/pages/bare_metal_cloud/dedicated_servers/network_security_dashboard).
-
## Conclusion
After reading this tutorial, you should be able to configure the Edge Network Firewall to improve the security of your OVHcloud services.
@@ -215,4 +188,4 @@ After reading this tutorial, you should be able to configure the Edge Network Fi
- [Protecting a game server with the application firewall](/pages/bare_metal_cloud/dedicated_servers/firewall_game_ddos)
-Join our [community of users](/links/community).
+Join our [community of users](/links/community).
\ No newline at end of file
diff --git a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-au.md b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-au.md
index 74d9f4b99cd..f67615cf347 100644
--- a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-au.md
+++ b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-au.md
@@ -1,7 +1,7 @@
---
title: Enabling and configuring the Edge Network Firewall
excerpt: Find out how to configure the Edge Network Firewall for your services
-updated: 2025-06-04
+updated: 2025-09-08
---
## Objective
@@ -10,11 +10,6 @@ To protect customer services exposed on public IP addresses, OVHcloud offers a s
**This guide will show you how to configure the Edge Network Firewall for your services.**
-> [!warning]
->
-> **Warning**: Permanent Mitigation is reaching its End-Of-Life (EOL) and will be disabled permanently on September 8, 2025.
->
-
> [!primary]
>
> You can find more information on our Anti-DDoS solution on [our website](/links/security/antiddos).
@@ -165,29 +160,9 @@ For example, a packet for TCP port 80 will be intercepted by rule 2 and the rule
### Attack mitigation - scrubbing centre activity
-Our Anti-DDoS infrastructure (VAC) has two modes of operation: **automatic** and **permanent**. The mitigation process is done via the automated scrubbing centre. This is where our advanced technology takes a deep look at the packets and attempts to remove DDoS traffic while allowing legitimate traffic to pass through.
-
-- **Automatic mitigation** is the default: All OVHcloud IPs are under automatic mitigation. Usually this is the best choice for your services. In case any malicious traffic is detected, the scrubbing centre activates. This state is indicated by the "Forced" status for a given IP address. At this time the Edge Network Firewall is also active. The situation comes back to normal when the attack is mitigated and no more suspicious activity is observed.
-
-- **Permanent mitigation** mode can be enabled or disabled via the OVHcloud Control Panel. With permanent mitigation, you permanently apply the first level of filtering so all traffic will always pass through the mitigation system before reaching the server. We do not recommend enabling this for longer periods of time unless you are experiencing latency jitter due to the scrubbing centre redirecting the traffic too frequently.
-
-Please note that compared to automatic mode, there is **no** increase in the level of protection when this mode is enabled.
-
-To enable it, follow these steps:
-
-- Open `Network`{.action} in the left-hand sidebar.
-- Open `Public IP Addresses`{.action}.
-
-|  |
-|:--:|
-| Next, click the `...`{.action} button to the right of the relevant IPv4. |
-
-
-|  |
-|:--:|
-| Select `Mitigation: permanent mode`{.action}. |
-
+Our Anti-DDoS infrastructure (VAC) operates automatically. The mitigation process is done via the automated scrubbing centre. This is where our advanced technology takes a deep look at the packets and attempts to remove DDoS traffic while allowing legitimate traffic to pass through.
+All OVHcloud IPs are under automatic mitigation. In case any malicious traffic is detected, the scrubbing centre activates. This state is indicated by the "Forced" status for a given IP address. At this time the Edge Network Firewall is also active. The situation comes back to normal when the attack is mitigated and no more suspicious activity is observed.
> [!success]
> **Tips**
@@ -201,12 +176,10 @@ To enable it, follow these steps:
> Please note that our Anti-DDoS infrastructure cannot be disabled on a service. All OVHcloud products are delivered within the scope of protection and this cannot be changed.
>
-
## Network Security Dashboard
For detailed insight into detected attacks and the results of scrubbing centre activities, we encourage you to explore our [Network Security Dashboard](/pages/bare_metal_cloud/dedicated_servers/network_security_dashboard).
-
## Conclusion
After reading this tutorial, you should be able to configure the Edge Network Firewall to improve the security of your OVHcloud services.
@@ -215,4 +188,4 @@ After reading this tutorial, you should be able to configure the Edge Network Fi
- [Protecting a game server with the application firewall](/pages/bare_metal_cloud/dedicated_servers/firewall_game_ddos)
-Join our [community of users](/links/community).
+Join our [community of users](/links/community).
\ No newline at end of file
diff --git a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-ca.md b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-ca.md
index 114414d8b44..a9936bb7dda 100644
--- a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-ca.md
+++ b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-ca.md
@@ -1,7 +1,7 @@
---
title: Enabling and configuring the Edge Network Firewall
excerpt: Find out how to configure the Edge Network Firewall for your services
-updated: 2025-06-04
+updated: 2025-09-08
---
## Objective
@@ -10,11 +10,6 @@ To protect customer services exposed on public IP addresses, OVHcloud offers a s
**This guide will show you how to configure the Edge Network Firewall for your services.**
-> [!warning]
->
-> **Warning**: Permanent Mitigation is reaching its End-Of-Life (EOL) and will be disabled permanently on September 8, 2025.
->
-
> [!primary]
>
> You can find more information on our Anti-DDoS solution on [our website](/links/security/antiddos).
@@ -165,29 +160,9 @@ For example, a packet for TCP port 80 will be intercepted by rule 2 and the rule
### Attack mitigation - scrubbing centre activity
-Our Anti-DDoS infrastructure (VAC) has two modes of operation: **automatic** and **permanent**. The mitigation process is done via the automated scrubbing centre. This is where our advanced technology takes a deep look at the packets and attempts to remove DDoS traffic while allowing legitimate traffic to pass through.
-
-- **Automatic mitigation** is the default: All OVHcloud IPs are under automatic mitigation. Usually this is the best choice for your services. In case any malicious traffic is detected, the scrubbing centre activates. This state is indicated by the "Forced" status for a given IP address. At this time the Edge Network Firewall is also active. The situation comes back to normal when the attack is mitigated and no more suspicious activity is observed.
-
-- **Permanent mitigation** mode can be enabled or disabled via the OVHcloud Control Panel. With permanent mitigation, you permanently apply the first level of filtering so all traffic will always pass through the mitigation system before reaching the server. We do not recommend enabling this for longer periods of time unless you are experiencing latency jitter due to the scrubbing centre redirecting the traffic too frequently.
-
-Please note that compared to automatic mode, there is **no** increase in the level of protection when this mode is enabled.
-
-To enable it, follow these steps:
-
-- Open `Network`{.action} in the left-hand sidebar.
-- Open `Public IP Addresses`{.action}.
-
-|  |
-|:--:|
-| Next, click the `...`{.action} button to the right of the relevant IPv4. |
-
-
-|  |
-|:--:|
-| Select `Mitigation: permanent mode`{.action}. |
-
+Our Anti-DDoS infrastructure (VAC) operates automatically. The mitigation process is done via the automated scrubbing centre. This is where our advanced technology takes a deep look at the packets and attempts to remove DDoS traffic while allowing legitimate traffic to pass through.
+All OVHcloud IPs are under automatic mitigation. In case any malicious traffic is detected, the scrubbing centre activates. This state is indicated by the "Forced" status for a given IP address. At this time the Edge Network Firewall is also active. The situation comes back to normal when the attack is mitigated and no more suspicious activity is observed.
> [!success]
> **Tips**
@@ -201,12 +176,10 @@ To enable it, follow these steps:
> Please note that our Anti-DDoS infrastructure cannot be disabled on a service. All OVHcloud products are delivered within the scope of protection and this cannot be changed.
>
-
## Network Security Dashboard
For detailed insight into detected attacks and the results of scrubbing centre activities, we encourage you to explore our [Network Security Dashboard](/pages/bare_metal_cloud/dedicated_servers/network_security_dashboard).
-
## Conclusion
After reading this tutorial, you should be able to configure the Edge Network Firewall to improve the security of your OVHcloud services.
@@ -215,4 +188,4 @@ After reading this tutorial, you should be able to configure the Edge Network Fi
- [Protecting a game server with the application firewall](/pages/bare_metal_cloud/dedicated_servers/firewall_game_ddos)
-Join our [community of users](/links/community).
+Join our [community of users](/links/community).
\ No newline at end of file
diff --git a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-gb.md b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-gb.md
index 114414d8b44..a9936bb7dda 100644
--- a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-gb.md
+++ b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-gb.md
@@ -1,7 +1,7 @@
---
title: Enabling and configuring the Edge Network Firewall
excerpt: Find out how to configure the Edge Network Firewall for your services
-updated: 2025-06-04
+updated: 2025-09-08
---
## Objective
@@ -10,11 +10,6 @@ To protect customer services exposed on public IP addresses, OVHcloud offers a s
**This guide will show you how to configure the Edge Network Firewall for your services.**
-> [!warning]
->
-> **Warning**: Permanent Mitigation is reaching its End-Of-Life (EOL) and will be disabled permanently on September 8, 2025.
->
-
> [!primary]
>
> You can find more information on our Anti-DDoS solution on [our website](/links/security/antiddos).
@@ -165,29 +160,9 @@ For example, a packet for TCP port 80 will be intercepted by rule 2 and the rule
### Attack mitigation - scrubbing centre activity
-Our Anti-DDoS infrastructure (VAC) has two modes of operation: **automatic** and **permanent**. The mitigation process is done via the automated scrubbing centre. This is where our advanced technology takes a deep look at the packets and attempts to remove DDoS traffic while allowing legitimate traffic to pass through.
-
-- **Automatic mitigation** is the default: All OVHcloud IPs are under automatic mitigation. Usually this is the best choice for your services. In case any malicious traffic is detected, the scrubbing centre activates. This state is indicated by the "Forced" status for a given IP address. At this time the Edge Network Firewall is also active. The situation comes back to normal when the attack is mitigated and no more suspicious activity is observed.
-
-- **Permanent mitigation** mode can be enabled or disabled via the OVHcloud Control Panel. With permanent mitigation, you permanently apply the first level of filtering so all traffic will always pass through the mitigation system before reaching the server. We do not recommend enabling this for longer periods of time unless you are experiencing latency jitter due to the scrubbing centre redirecting the traffic too frequently.
-
-Please note that compared to automatic mode, there is **no** increase in the level of protection when this mode is enabled.
-
-To enable it, follow these steps:
-
-- Open `Network`{.action} in the left-hand sidebar.
-- Open `Public IP Addresses`{.action}.
-
-|  |
-|:--:|
-| Next, click the `...`{.action} button to the right of the relevant IPv4. |
-
-
-|  |
-|:--:|
-| Select `Mitigation: permanent mode`{.action}. |
-
+Our Anti-DDoS infrastructure (VAC) operates automatically. The mitigation process is done via the automated scrubbing centre. This is where our advanced technology takes a deep look at the packets and attempts to remove DDoS traffic while allowing legitimate traffic to pass through.
+All OVHcloud IPs are under automatic mitigation. In case any malicious traffic is detected, the scrubbing centre activates. This state is indicated by the "Forced" status for a given IP address. At this time the Edge Network Firewall is also active. The situation comes back to normal when the attack is mitigated and no more suspicious activity is observed.
> [!success]
> **Tips**
@@ -201,12 +176,10 @@ To enable it, follow these steps:
> Please note that our Anti-DDoS infrastructure cannot be disabled on a service. All OVHcloud products are delivered within the scope of protection and this cannot be changed.
>
-
## Network Security Dashboard
For detailed insight into detected attacks and the results of scrubbing centre activities, we encourage you to explore our [Network Security Dashboard](/pages/bare_metal_cloud/dedicated_servers/network_security_dashboard).
-
## Conclusion
After reading this tutorial, you should be able to configure the Edge Network Firewall to improve the security of your OVHcloud services.
@@ -215,4 +188,4 @@ After reading this tutorial, you should be able to configure the Edge Network Fi
- [Protecting a game server with the application firewall](/pages/bare_metal_cloud/dedicated_servers/firewall_game_ddos)
-Join our [community of users](/links/community).
+Join our [community of users](/links/community).
\ No newline at end of file
diff --git a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-ie.md b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-ie.md
index 114414d8b44..a9936bb7dda 100644
--- a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-ie.md
+++ b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-ie.md
@@ -1,7 +1,7 @@
---
title: Enabling and configuring the Edge Network Firewall
excerpt: Find out how to configure the Edge Network Firewall for your services
-updated: 2025-06-04
+updated: 2025-09-08
---
## Objective
@@ -10,11 +10,6 @@ To protect customer services exposed on public IP addresses, OVHcloud offers a s
**This guide will show you how to configure the Edge Network Firewall for your services.**
-> [!warning]
->
-> **Warning**: Permanent Mitigation is reaching its End-Of-Life (EOL) and will be disabled permanently on September 8, 2025.
->
-
> [!primary]
>
> You can find more information on our Anti-DDoS solution on [our website](/links/security/antiddos).
@@ -165,29 +160,9 @@ For example, a packet for TCP port 80 will be intercepted by rule 2 and the rule
### Attack mitigation - scrubbing centre activity
-Our Anti-DDoS infrastructure (VAC) has two modes of operation: **automatic** and **permanent**. The mitigation process is done via the automated scrubbing centre. This is where our advanced technology takes a deep look at the packets and attempts to remove DDoS traffic while allowing legitimate traffic to pass through.
-
-- **Automatic mitigation** is the default: All OVHcloud IPs are under automatic mitigation. Usually this is the best choice for your services. In case any malicious traffic is detected, the scrubbing centre activates. This state is indicated by the "Forced" status for a given IP address. At this time the Edge Network Firewall is also active. The situation comes back to normal when the attack is mitigated and no more suspicious activity is observed.
-
-- **Permanent mitigation** mode can be enabled or disabled via the OVHcloud Control Panel. With permanent mitigation, you permanently apply the first level of filtering so all traffic will always pass through the mitigation system before reaching the server. We do not recommend enabling this for longer periods of time unless you are experiencing latency jitter due to the scrubbing centre redirecting the traffic too frequently.
-
-Please note that compared to automatic mode, there is **no** increase in the level of protection when this mode is enabled.
-
-To enable it, follow these steps:
-
-- Open `Network`{.action} in the left-hand sidebar.
-- Open `Public IP Addresses`{.action}.
-
-|  |
-|:--:|
-| Next, click the `...`{.action} button to the right of the relevant IPv4. |
-
-
-|  |
-|:--:|
-| Select `Mitigation: permanent mode`{.action}. |
-
+Our Anti-DDoS infrastructure (VAC) operates automatically. The mitigation process is done via the automated scrubbing centre. This is where our advanced technology takes a deep look at the packets and attempts to remove DDoS traffic while allowing legitimate traffic to pass through.
+All OVHcloud IPs are under automatic mitigation. In case any malicious traffic is detected, the scrubbing centre activates. This state is indicated by the "Forced" status for a given IP address. At this time the Edge Network Firewall is also active. The situation comes back to normal when the attack is mitigated and no more suspicious activity is observed.
> [!success]
> **Tips**
@@ -201,12 +176,10 @@ To enable it, follow these steps:
> Please note that our Anti-DDoS infrastructure cannot be disabled on a service. All OVHcloud products are delivered within the scope of protection and this cannot be changed.
>
-
## Network Security Dashboard
For detailed insight into detected attacks and the results of scrubbing centre activities, we encourage you to explore our [Network Security Dashboard](/pages/bare_metal_cloud/dedicated_servers/network_security_dashboard).
-
## Conclusion
After reading this tutorial, you should be able to configure the Edge Network Firewall to improve the security of your OVHcloud services.
@@ -215,4 +188,4 @@ After reading this tutorial, you should be able to configure the Edge Network Fi
- [Protecting a game server with the application firewall](/pages/bare_metal_cloud/dedicated_servers/firewall_game_ddos)
-Join our [community of users](/links/community).
+Join our [community of users](/links/community).
\ No newline at end of file
diff --git a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-sg.md b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-sg.md
index 114414d8b44..a9936bb7dda 100644
--- a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-sg.md
+++ b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-sg.md
@@ -1,7 +1,7 @@
---
title: Enabling and configuring the Edge Network Firewall
excerpt: Find out how to configure the Edge Network Firewall for your services
-updated: 2025-06-04
+updated: 2025-09-08
---
## Objective
@@ -10,11 +10,6 @@ To protect customer services exposed on public IP addresses, OVHcloud offers a s
**This guide will show you how to configure the Edge Network Firewall for your services.**
-> [!warning]
->
-> **Warning**: Permanent Mitigation is reaching its End-Of-Life (EOL) and will be disabled permanently on September 8, 2025.
->
-
> [!primary]
>
> You can find more information on our Anti-DDoS solution on [our website](/links/security/antiddos).
@@ -165,29 +160,9 @@ For example, a packet for TCP port 80 will be intercepted by rule 2 and the rule
### Attack mitigation - scrubbing centre activity
-Our Anti-DDoS infrastructure (VAC) has two modes of operation: **automatic** and **permanent**. The mitigation process is done via the automated scrubbing centre. This is where our advanced technology takes a deep look at the packets and attempts to remove DDoS traffic while allowing legitimate traffic to pass through.
-
-- **Automatic mitigation** is the default: All OVHcloud IPs are under automatic mitigation. Usually this is the best choice for your services. In case any malicious traffic is detected, the scrubbing centre activates. This state is indicated by the "Forced" status for a given IP address. At this time the Edge Network Firewall is also active. The situation comes back to normal when the attack is mitigated and no more suspicious activity is observed.
-
-- **Permanent mitigation** mode can be enabled or disabled via the OVHcloud Control Panel. With permanent mitigation, you permanently apply the first level of filtering so all traffic will always pass through the mitigation system before reaching the server. We do not recommend enabling this for longer periods of time unless you are experiencing latency jitter due to the scrubbing centre redirecting the traffic too frequently.
-
-Please note that compared to automatic mode, there is **no** increase in the level of protection when this mode is enabled.
-
-To enable it, follow these steps:
-
-- Open `Network`{.action} in the left-hand sidebar.
-- Open `Public IP Addresses`{.action}.
-
-|  |
-|:--:|
-| Next, click the `...`{.action} button to the right of the relevant IPv4. |
-
-
-|  |
-|:--:|
-| Select `Mitigation: permanent mode`{.action}. |
-
+Our Anti-DDoS infrastructure (VAC) operates automatically. The mitigation process is done via the automated scrubbing centre. This is where our advanced technology takes a deep look at the packets and attempts to remove DDoS traffic while allowing legitimate traffic to pass through.
+All OVHcloud IPs are under automatic mitigation. In case any malicious traffic is detected, the scrubbing centre activates. This state is indicated by the "Forced" status for a given IP address. At this time the Edge Network Firewall is also active. The situation comes back to normal when the attack is mitigated and no more suspicious activity is observed.
> [!success]
> **Tips**
@@ -201,12 +176,10 @@ To enable it, follow these steps:
> Please note that our Anti-DDoS infrastructure cannot be disabled on a service. All OVHcloud products are delivered within the scope of protection and this cannot be changed.
>
-
## Network Security Dashboard
For detailed insight into detected attacks and the results of scrubbing centre activities, we encourage you to explore our [Network Security Dashboard](/pages/bare_metal_cloud/dedicated_servers/network_security_dashboard).
-
## Conclusion
After reading this tutorial, you should be able to configure the Edge Network Firewall to improve the security of your OVHcloud services.
@@ -215,4 +188,4 @@ After reading this tutorial, you should be able to configure the Edge Network Fi
- [Protecting a game server with the application firewall](/pages/bare_metal_cloud/dedicated_servers/firewall_game_ddos)
-Join our [community of users](/links/community).
+Join our [community of users](/links/community).
\ No newline at end of file
diff --git a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-us.md b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-us.md
index 114414d8b44..a9936bb7dda 100644
--- a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-us.md
+++ b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.en-us.md
@@ -1,7 +1,7 @@
---
title: Enabling and configuring the Edge Network Firewall
excerpt: Find out how to configure the Edge Network Firewall for your services
-updated: 2025-06-04
+updated: 2025-09-08
---
## Objective
@@ -10,11 +10,6 @@ To protect customer services exposed on public IP addresses, OVHcloud offers a s
**This guide will show you how to configure the Edge Network Firewall for your services.**
-> [!warning]
->
-> **Warning**: Permanent Mitigation is reaching its End-Of-Life (EOL) and will be disabled permanently on September 8, 2025.
->
-
> [!primary]
>
> You can find more information on our Anti-DDoS solution on [our website](/links/security/antiddos).
@@ -165,29 +160,9 @@ For example, a packet for TCP port 80 will be intercepted by rule 2 and the rule
### Attack mitigation - scrubbing centre activity
-Our Anti-DDoS infrastructure (VAC) has two modes of operation: **automatic** and **permanent**. The mitigation process is done via the automated scrubbing centre. This is where our advanced technology takes a deep look at the packets and attempts to remove DDoS traffic while allowing legitimate traffic to pass through.
-
-- **Automatic mitigation** is the default: All OVHcloud IPs are under automatic mitigation. Usually this is the best choice for your services. In case any malicious traffic is detected, the scrubbing centre activates. This state is indicated by the "Forced" status for a given IP address. At this time the Edge Network Firewall is also active. The situation comes back to normal when the attack is mitigated and no more suspicious activity is observed.
-
-- **Permanent mitigation** mode can be enabled or disabled via the OVHcloud Control Panel. With permanent mitigation, you permanently apply the first level of filtering so all traffic will always pass through the mitigation system before reaching the server. We do not recommend enabling this for longer periods of time unless you are experiencing latency jitter due to the scrubbing centre redirecting the traffic too frequently.
-
-Please note that compared to automatic mode, there is **no** increase in the level of protection when this mode is enabled.
-
-To enable it, follow these steps:
-
-- Open `Network`{.action} in the left-hand sidebar.
-- Open `Public IP Addresses`{.action}.
-
-|  |
-|:--:|
-| Next, click the `...`{.action} button to the right of the relevant IPv4. |
-
-
-|  |
-|:--:|
-| Select `Mitigation: permanent mode`{.action}. |
-
+Our Anti-DDoS infrastructure (VAC) operates automatically. The mitigation process is done via the automated scrubbing centre. This is where our advanced technology takes a deep look at the packets and attempts to remove DDoS traffic while allowing legitimate traffic to pass through.
+All OVHcloud IPs are under automatic mitigation. In case any malicious traffic is detected, the scrubbing centre activates. This state is indicated by the "Forced" status for a given IP address. At this time the Edge Network Firewall is also active. The situation comes back to normal when the attack is mitigated and no more suspicious activity is observed.
> [!success]
> **Tips**
@@ -201,12 +176,10 @@ To enable it, follow these steps:
> Please note that our Anti-DDoS infrastructure cannot be disabled on a service. All OVHcloud products are delivered within the scope of protection and this cannot be changed.
>
-
## Network Security Dashboard
For detailed insight into detected attacks and the results of scrubbing centre activities, we encourage you to explore our [Network Security Dashboard](/pages/bare_metal_cloud/dedicated_servers/network_security_dashboard).
-
## Conclusion
After reading this tutorial, you should be able to configure the Edge Network Firewall to improve the security of your OVHcloud services.
@@ -215,4 +188,4 @@ After reading this tutorial, you should be able to configure the Edge Network Fi
- [Protecting a game server with the application firewall](/pages/bare_metal_cloud/dedicated_servers/firewall_game_ddos)
-Join our [community of users](/links/community).
+Join our [community of users](/links/community).
\ No newline at end of file
diff --git a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.es-es.md b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.es-es.md
index 54f7140fca9..2b5dd03424c 100644
--- a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.es-es.md
+++ b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.es-es.md
@@ -1,7 +1,7 @@
---
title: 'Activación y configuración del Edge Network Firewall'
excerpt: 'Descubra cómo configurar el Edge Network Firewall para sus servicios'
-updated: 2025-06-04
+updated: 2025-09-08
---
## Objetivo
@@ -12,11 +12,6 @@ Para proteger su infraestructura mundial y los servidores de sus clientes, OVHcl
**Esta guía le mostrará cómo configurar el Edge Network Firewall para sus servicios.**
-> [!warning]
->
-> **Advertencia**: La mitigación permanente está llegando a su fin de vida útil (EOL) y se desactivará permanentemente el 8 de septiembre de 2025.
->
-
> [!primary]
>
> Puede encontrar más información sobre nuestra solución anti-DDoS en [nuestro sitio web](/links/security/antiddos).
@@ -169,27 +164,9 @@ Por ejemplo, la regla 2 interceptará un paquete para el puerto TCP 80 y no se a
### Mitigación de ataques: actividad del centro de limpieza
-Nuestra infraestructura anti-DDoS (VAC) dispone de dos modos de funcionamiento: **automático** y **permanente**. El proceso de mitigación se realiza a través del centro de limpieza automatizado. Aquí es donde nuestra tecnología avanzada analiza en profundidad los paquetes e intenta eliminar el tráfico DDoS, permitiendo al mismo tiempo el paso del tráfico legítimo.
-
-- **Mitigación automática** es la opción por defecto: todas las IP de OVHcloud están sujetas a mitigación automática. Por lo general, esta es la mejor opción para sus servicios. En caso de que se detecte tráfico malicioso, se activa el centro de limpieza. Este estado se indica mediante el estado "Forzado" para una dirección IP determinada. En este momento, el Edge Network Firewall también está activo. La situación vuelve a la normalidad cuando se mitiga el ataque y no se observa ninguna actividad sospechosa.
-
-- **Mitigación permanente** puede activarse o desactivarse desde el área de cliente de OVHcloud. Con la mitigación permanente, usted aplica permanentemente el primer nivel de filtrado para que todo el tráfico pase siempre a través del sistema de mitigación antes de llegar al servidor. No se recomienda habilitar esta opción durante períodos de tiempo más largos, a menos que experimente fluctuaciones de latencia debido a que el centro de limpieza redirige el tráfico con demasiada frecuencia.
+Nuestra infraestructura anti-DDoS (VAC) funciona automáticamente. El proceso de mitigación se realiza a través del centro de limpieza automatizado. Aquí es donde nuestra tecnología avanzada analiza en profundidad los paquetes e intenta eliminar el tráfico DDoS, permitiendo al mismo tiempo el paso del tráfico legítimo.
-Tenga en cuenta que, en comparación con el modo automático, el nivel de protección **no** aumenta cuando este modo está activado.
-
-Para activarla, siga estos pasos:
-
-- Haga clic en el menú `Bare Metal Cloud`{.action}.
-- Vaya a `Network`{.action} en la columna izquierda.
-- Acceda a la sección `IP`{.action}.
-
-|  |
-|:--:|
-| A continuación, haga clic en el botón `...`{.action} situado a la derecha de la IPv4 correspondiente. |
-
-|  |
-|:--:|
-| Seleccione `Mitigación: modo permanente`{.action}. |
+Todas las IP de OVHcloud están sujetas a mitigación automática. En caso de que se detecte tráfico malicioso, se activa el centro de limpieza. Este estado se indica mediante el estado "Forzado" para una dirección IP determinada. En este momento, el firewall de red perimetral también está activo. La situación vuelve a la normalidad cuando se mitiga el ataque y no se observa ninguna actividad sospechosa.
> [!success]
> **Sugerencias**
@@ -215,4 +192,4 @@ Después de leer este tutorial, debería ser capaz de configurar el Edge Network
- [Protección de un servidor de juegos con el firewall de aplicaciones](/pages/bare_metal_cloud/dedicated_servers/firewall_game_ddos)
-Interactúe con nuestra comunidad de usuarios en .
+Interactúe con nuestra [comunidad de usuarios](/links/community).
\ No newline at end of file
diff --git a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.es-us.md b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.es-us.md
index 7bc1881f85c..6eaa927888f 100644
--- a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.es-us.md
+++ b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.es-us.md
@@ -1,7 +1,7 @@
---
title: 'Activación y configuración del Edge Network Firewall'
excerpt: 'Descubra cómo configurar el Edge Network Firewall para sus servicios'
-updated: 2025-06-04
+updated: 2025-09-08
---
## Objetivo
@@ -12,11 +12,6 @@ Para proteger su infraestructura mundial y los servidores de sus clientes, OVHcl
**Esta guía le mostrará cómo configurar el Edge Network Firewall para sus servicios.**
-> [!warning]
->
-> **Advertencia**: La mitigación permanente está llegando a su fin de vida útil (EOL) y se desactivará permanentemente el 8 de septiembre de 2025.
->
-
> [!primary]
>
> Puede encontrar más información sobre nuestra solución anti-DDoS en [nuestro sitio web](/links/security/antiddos).
@@ -168,27 +163,9 @@ Por ejemplo, la regla 2 interceptará un paquete para el puerto TCP 80 y no se a
### Mitigación de ataques: actividad del centro de limpieza
-Nuestra infraestructura anti-DDoS (VAC) dispone de dos modos de funcionamiento: **automático** y **permanente**. El proceso de mitigación se realiza a través del centro de limpieza automatizado. Aquí es donde nuestra tecnología avanzada analiza en profundidad los paquetes e intenta eliminar el tráfico DDoS, permitiendo al mismo tiempo el paso del tráfico legítimo.
-
-- **Mitigación automática** es la opción por defecto: todas las IP de OVHcloud están sujetas a mitigación automática. Por lo general, esta es la mejor opción para sus servicios. En caso de que se detecte tráfico malicioso, se activa el centro de limpieza. Este estado se indica mediante el estado "Forzado" para una dirección IP determinada. En este momento, el Edge Network Firewall también está activo. La situación vuelve a la normalidad cuando se mitiga el ataque y no se observa ninguna actividad sospechosa.
-
-- **Mitigación permanente** puede activarse o desactivarse desde el área de cliente de OVHcloud. Con la mitigación permanente, usted aplica permanentemente el primer nivel de filtrado para que todo el tráfico pase siempre a través del sistema de mitigación antes de llegar al servidor. No se recomienda habilitar esta opción durante períodos de tiempo más largos, a menos que experimente fluctuaciones de latencia debido a que el centro de limpieza redirige el tráfico con demasiada frecuencia.
+Nuestra infraestructura anti-DDoS (VAC) funciona automáticamente. El proceso de mitigación se realiza a través del centro de limpieza automatizado. Aquí es donde nuestra tecnología avanzada analiza en profundidad los paquetes e intenta eliminar el tráfico DDoS, permitiendo al mismo tiempo el paso del tráfico legítimo.
-Tenga en cuenta que, en comparación con el modo automático, el nivel de protección **no** aumenta cuando este modo está activado.
-
-Para activarla, siga estos pasos:
-
-- Haga clic en el menú `Bare Metal Cloud`{.action}.
-- Vaya a `Network`{.action} en la columna izquierda.
-- Acceda a la sección `IP`{.action}.
-
-|  |
-|:--:|
-| A continuación, haga clic en el botón `...`{.action} situado a la derecha de la IPv4 correspondiente. |
-
-|  |
-|:--:|
-| Seleccione `Mitigación: modo permanente`{.action}. |
+Todas las IP de OVHcloud están sujetas a mitigación automática. En caso de que se detecte tráfico malicioso, se activa el centro de limpieza. Este estado se indica mediante el estado "Forzado" para una dirección IP determinada. En este momento, el firewall de red perimetral también está activo. La situación vuelve a la normalidad cuando se mitiga el ataque y no se observa ninguna actividad sospechosa.
> [!success]
> **Sugerencias**
@@ -214,4 +191,4 @@ Después de leer este tutorial, debería ser capaz de configurar el Edge Network
- [Protección de un servidor de juegos con el firewall de aplicaciones](/pages/bare_metal_cloud/dedicated_servers/firewall_game_ddos)
-Interactúe con nuestra comunidad de usuarios en .
+Interactúe con nuestra [comunidad de usuarios](/links/community).
\ No newline at end of file
diff --git a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.fr-ca.md b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.fr-ca.md
index f3061e25c9a..bf6eb931bdd 100644
--- a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.fr-ca.md
+++ b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.fr-ca.md
@@ -1,7 +1,7 @@
---
title: 'Activer et configurer le Edge Network Firewall'
excerpt: 'Découvrez comment configurer le Edge Network Firewall pour vos services'
-updated: 2025-06-04
+updated: 2025-09-08
---
## Objectif
@@ -10,11 +10,6 @@ Pour protéger les services des clients exposés sur les adresses IP publiques,
**Ce guide vous explique comment configurer le Edge Network Firewall pour vos services.**
-> [!warning]
->
-> **Avertissement** : la fonctionnalité « Centre de Scrubbing: mode permanent » atteint sa fin de vie (EOL) et sera désactivée définitivement le 8 septembre 2025.
->
-
> [!primary]
>
> Pour plus d'informations sur notre solution Anti-DDoS, [cliquez ici](/links/security/antiddos).
@@ -161,26 +156,9 @@ Par exemple, un paquet pour le port TCP 80 sera intercepté par la règle 2 et l
### Mitigation des attaques - Activité du centre de nettoyage (Scrubbing Center)
-Notre infrastructure anti-DDoS (VAC) dispose de deux modes de fonctionnement : **automatique** et **permanent**. Le processus de mitigation est effectué via un centre de nettoyage (*Scrubbing Center*) automatisé. C’est là que notre technologie avancée examine en profondeur les paquets et tente de supprimer le trafic DDoS tout en permettant au trafic légitime de passer.
-
-- **La mitigation automatique** est la valeur par défaut : toutes les adresses IP OVHcloud sont en mitigation automatique et il s'agit en général du meilleur choix pour vos services. Si un trafic malveillant est détecté, le Scrubbing Center est actif. Cet état est alors indiqué par un statut « Forcé » pour une adresse IP donnée. Le Edge Network Firewall est également actif. La situation revient à la normale lorsque l’attaque est mitigée et qu’aucune autre activité suspecte n’est observée.
-
-- **Le mode mitigation permanente** peut être activé ou désactivé depuis votre espace client. Avec la mitigation permanente, vous appliquez de manière permanente le premier niveau de filtrage afin que tout le trafic passe en permanence par le système de mitigation avant d’atteindre le serveur. Il est déconseillé d'activer cette option sur de plus longues périodes, à moins que vous ne subissiez de la gigue (variation de la latence), en raison du fait que le Scrubbing Center redirige le trafic trop fréquemment.
-À noter que, contrairement au mode automatique, il n’y a **pas** d’augmentation du niveau de protection lorsque ce mode est activé.
+Notre infrastructure anti-DDoS (VAC) fonctionne automatiquement. Le processus de mitigation s'effectue via un centre de nettoyage (**Scrubbing Center**) automatisé. C’est là que notre technologie avancée examine en profondeur les paquets et tente de supprimer le trafic DDoS tout en permettant au trafic légitime de passer.
-Pour l'activer, procédez comme suit :
-
-- Cliquez sur `Network`{.action} dans le menu situé à gauche de l'écran.
-- Cliquez sur `Adresses IP Publiques`{.action}.
-
-|  |
-|:--:|
-| Cliquez ensuite sur le bouton `...`{.action} à droite de l'IPv4 concernée |
-
-
-|  |
-|:--:|
-| Sélectionnez `Mitigation : mode permanent`{.action} |
+Toutes les adresses IP OVHcloud sont en mitigation automatique. Si un trafic malveillant est détecté, le **Scrubbing Center** s'active. Cet état est alors représenté par un statut « Forcé » pour une adresse IP donnée. Le Edge Network Firewall est également actif. La situation revient à la normale lorsque l’attaque est mitigée et qu’aucune autre activité suspecte n’est observée.
> [!success]
> **Astuces**
@@ -205,4 +183,4 @@ Après avoir lu ce tutoriel, vous devriez pouvoir configurer le Edge Network Fir
- [Protéger un serveur GAME avec le pare-feu applicatif](/pages/bare_metal_cloud/dedicated_servers/firewall_game_ddos)
-Échangez avec notre [communauté d'utilisateurs](/links/community).
+Échangez avec notre [communauté d'utilisateurs](/links/community).
\ No newline at end of file
diff --git a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.fr-fr.md b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.fr-fr.md
index fad1a0bc755..13b95c7aeac 100644
--- a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.fr-fr.md
+++ b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.fr-fr.md
@@ -1,7 +1,7 @@
---
title: 'Activer et configurer le Edge Network Firewall'
excerpt: 'Découvrez comment configurer le Edge Network Firewall pour vos services'
-updated: 2025-06-04
+updated: 2025-09-08
---
## Objectif
@@ -10,11 +10,6 @@ Pour protéger les services des clients exposés sur les adresses IP publiques,
**Ce guide vous explique comment configurer le Edge Network Firewall pour vos services.**
-> [!warning]
->
-> **Avertissement** : la fonctionnalité « Centre de Scrubbing: mode permanent » atteint sa fin de vie (EOL) et sera désactivée définitivement le 8 septembre 2025.
->
-
> [!primary]
>
> Pour plus d'informations sur notre solution Anti-DDoS, [cliquez ici](/links/security/antiddos).
@@ -161,26 +156,9 @@ Par exemple, un paquet pour le port TCP 80 sera intercepté par la règle 2 et l
### Mitigation des attaques - Activité du centre de nettoyage (Scrubbing Center)
-Notre infrastructure anti-DDoS (VAC) dispose de deux modes de fonctionnement : **automatique** et **permanent**. Le processus de mitigation est effectué via un centre de nettoyage (*Scrubbing Center*) automatisé. C’est là que notre technologie avancée examine en profondeur les paquets et tente de supprimer le trafic DDoS tout en permettant au trafic légitime de passer.
-
-- **La mitigation automatique** est la valeur par défaut : toutes les adresses IP OVHcloud sont en mitigation automatique et il s'agit en général du meilleur choix pour vos services. Si un trafic malveillant est détecté, le Scrubbing Center est actif. Cet état est alors indiqué par un statut « Forcé » pour une adresse IP donnée. Le Edge Network Firewall est également actif. La situation revient à la normale lorsque l’attaque est mitigée et qu’aucune autre activité suspecte n’est observée.
-
-- **Le mode mitigation permanente** peut être activé ou désactivé depuis votre espace client. Avec la mitigation permanente, vous appliquez de manière permanente le premier niveau de filtrage afin que tout le trafic passe en permanence par le système de mitigation avant d’atteindre le serveur. Il est déconseillé d'activer cette option sur de plus longues périodes, à moins que vous ne subissiez de la gigue (variation de la latence), en raison du fait que le Scrubbing Center redirige le trafic trop fréquemment.
-À noter que, contrairement au mode automatique, il n’y a **pas** d’augmentation du niveau de protection lorsque ce mode est activé.
+Notre infrastructure anti-DDoS (VAC) fonctionne automatiquement. Le processus de mitigation s'effectue via un centre de nettoyage (**Scrubbing Center**) automatisé. C’est là que notre technologie avancée examine en profondeur les paquets et tente de supprimer le trafic DDoS tout en permettant au trafic légitime de passer.
-Pour l'activer, procédez comme suit :
-
-- Cliquez sur `Network`{.action} dans le menu situé à gauche de l'écran.
-- Cliquez sur `Adresses IP Publiques`{.action}.
-
-|  |
-|:--:|
-| Cliquez ensuite sur le bouton `...`{.action} à droite de l'IPv4 concernée |
-
-
-|  |
-|:--:|
-| Sélectionnez `Mitigation : mode permanent`{.action} |
+Toutes les adresses IP OVHcloud sont en mitigation automatique. Si un trafic malveillant est détecté, le **Scrubbing Center** s'active. Cet état est alors représenté par un statut « Forcé » pour une adresse IP donnée. Le Edge Network Firewall est également actif. La situation revient à la normale lorsque l’attaque est mitigée et qu’aucune autre activité suspecte n’est observée.
> [!success]
> **Astuces**
@@ -205,4 +183,4 @@ Après avoir lu ce tutoriel, vous devriez pouvoir configurer le Edge Network Fir
- [Protéger un serveur GAME avec le pare-feu applicatif](/pages/bare_metal_cloud/dedicated_servers/firewall_game_ddos)
-Échangez avec notre [communauté d'utilisateurs](/links/community).
+Échangez avec notre [communauté d'utilisateurs](/links/community).
\ No newline at end of file
diff --git a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.it-it.md b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.it-it.md
index 5655def04d7..a1435a3af48 100644
--- a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.it-it.md
+++ b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.it-it.md
@@ -1,7 +1,7 @@
---
title: 'Abilitazione e configurazione di Edge Network Firewall'
excerpt: 'Come configurare Edge Network Firewall per i servizi'
-updated: 2025-06-04
+updated: 2025-09-08
---
## Obiettivo
@@ -10,11 +10,6 @@ Per proteggere i servizi clienti esposti agli indirizzi IP pubblici, OVHcloud of
**Questa guida ti mostra come configurare Edge Network Firewall per i tuoi servizi.**
-> [!warning]
->
-> **Avviso**: la funzionalità "Scrubbing Center: modalità permanente" ha raggiunto la fine del ciclo di vita (EOL) e sarà disattivata definitivamente l'8 settembre 2025.
->
-
> [!primary]
>
> Per maggiori informazioni sulla soluzione anti-DDoS di OVHcloud, visita [il sito Web](/links/security/antiddos).
@@ -164,28 +159,9 @@ Ad esempio, un pacchetto per la porta TCP 80 verrà intercettato dalla regola 2
### Mitigazione degli attacchi - attività del centro di pulitura
-La nostra infrastruttura anti-DDoS (VAC) dispone di due modalità di funzionamento: **automatica** e **permanente**. Il processo di mitigazione avviene tramite il centro di filtraggio automatico. È qui che la nostra tecnologia avanzata esamina nel dettaglio i pacchetti e cerca di rimuovere il traffico DDoS, consentendo il passaggio del traffico legittimo.
-
-- **La mitigazione automatica** è quella predefinita: tutti gli IP OVHcloud sono sottoposti a mitigazione automatica. Solitamente, questa è la scelta migliore per i vostri servizi. In caso di rilevamento di traffico malevolo, il centro di filtraggio si attiva. Questo stato è indicato dallo stato "Forced" (Forzato) per un determinato indirizzo IP. In questo momento è attivo anche Edge Network Firewall. La situazione torna alla normalità quando l'attacco viene mitigato e non si osservano più attività sospette.
-
-- **La modalità di mitigazione permanente** può essere abilitata o disabilitata tramite lo Spazio Cliente OVHcloud. Con la mitigazione permanente, applichi in modo permanente il primo livello di filtraggio in modo che tutto il traffico passi sempre attraverso il sistema di mitigazione prima di raggiungere il server. Si consiglia di non attivare questa opzione per periodi di tempo più lunghi, a meno che non si verifichi un jitter della latenza dovuto al reindirizzamento del traffico troppo frequente da parte del centro di scrubbing.
-
-Rispetto alla modalità automatica, il livello di protezione aumenta di **no** quando questa modalità è attivata.
+La nostra infrastruttura anti-DDoS (VAC) funziona automaticamente. Il processo di mitigazione avviene tramite il centro di filtraggio automatico. È qui che la nostra tecnologia avanzata esamina nel dettaglio i pacchetti e cerca di rimuovere il traffico DDoS, consentendo il passaggio del traffico legittimo.
-Per attivarlo, eseguire la procedura seguente:
-
-- Clicca sul menu `Bare Metal Cloud`{.action}.
-- Vai su `Network`{.action} nella barra laterale sinistra.
-- Accedi alla sezione `IP`{.action}.
-
-|  |
-|:--:|
-| A questo punto, clicca sul pulsante `...`{.action} a destra dell'IPv4 corrispondente. |
-
-
-|  |
-|:--:|
-| Seleziona `Mitigazione: modalità permanente`{.action}. |
+Tutti gli IP OVHcloud sono sottoposti a mitigazione automatica. In caso di rilevamento di traffico malevolo, il centro di filtraggio si attiva. Questo stato è indicato dallo stato "Forced" (Forzato) per un determinato indirizzo IP. In questo momento è attivo anche Edge Network Firewall. La situazione torna alla normalità quando l'attacco viene mitigato e non si osservano più attività sospette.
> [!success]
@@ -212,4 +188,4 @@ Dopo aver letto questo tutorial, dovresti essere in grado di configurare Edge Ne
- [Proteggere un server game con il firewall dell’applicazione](/pages/bare_metal_cloud/dedicated_servers/firewall_game_ddos)
-Contatta la nostra Community di utenti all'indirizzo .
+Contatta la nostra [Community di utenti](/links/community).
\ No newline at end of file
diff --git a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.pl-pl.md b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.pl-pl.md
index 47d9bc3defe..53f60db6835 100644
--- a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.pl-pl.md
+++ b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.pl-pl.md
@@ -1,7 +1,7 @@
---
title: 'Aktywacja i konfiguracja Edge Network Firewall'
excerpt: 'Dowiedz się, jak skonfigurować Edge Network Firewall dla Twoich usług'
-updated: 2025-06-04
+updated: 2025-09-08
---
## Wprowadzenie
@@ -10,11 +10,6 @@ Aby chronić usługi dostępne dla klientów korzystających z publicznych adres
**Ten przewodnik wyjaśnia, jak skonfigurować Edge Network Firewall dla Twoich usług.**
-> [!warning]
->
-> **Ostrzeżenie** : funkcja "Scrubbing Center: tryb stały" została osiągnięta jego koniec życia (EOL) i zostanie definitywnie wyłączony 8 września 2025.
->
-
> [!primary]
>
> Więcej informacji na temat rozwiązania Anty-DDoS znajdziesz na [naszej stronie WWW](/links/security/antiddos).
@@ -164,29 +159,9 @@ Na przykład pakiet przeznaczony dla portu 80/TCP zostanie przechwycony przez re
### Filtrowanie ataku — działanie centrum oczyszczania
-Infrastruktura Anty-DDoS (VAC) może działać w dwóch trybach: **automatyczne** i **stałe**. Proces mitygacji realizowany jest za pośrednictwem zautomatyzowanego centrum oczyszczania. To w tym miejscu nasze zaawansowane technologie wnikliwie analizują pakiety i podejmują próby usunięcia ruchu DDoS, umożliwiając jednocześnie przepływ pożadanego ruchu.
-
-- **Domyślna wartość dla automatycznego filtrowania**: Wszystkie adresy IP OVHcloud są automatycznie filtrowane. Zazwyczaj jest to najlepszy wybór dla Twojej usługi. W przypadku wykrycia złośliwego ruchu, centrum oczyszczania zostaje włączone. Stan ten jest wskazywany przez status "Wymuszony" dla danego adresu IP. W tym momencie Edge Network Firewall jest również aktywny. Sytuacja wraca do normy, gdy atak jest złagodzony i nie obserwuje się już podejrzanej aktywności.
-
-- **Stały tryb filtrowania** można włączyć lub wyłączyć w Panelu klienta OVHcloud. Dzięki stałej mitygacji stosujesz na stałe pierwszy poziom filtrowania, dzięki czemu cały ruch będzie zawsze przechodził przez system mitygacji przed dotarciem do serwera. Nie zalecamy włączania tej opcji przez dłuższy czas, jeśli nie występują wahania czasu oczekiwania spowodowane zbyt częstym przekierowywaniem ruchu przez centrum szybkiej kontroli.
-
-Pamiętaj, że w porównaniu do trybu automatycznego, po jego włączeniu następuje **no** wzrost poziomu ochrony.
-
-Aby go aktywować, wykonaj następujące kroki:
-
-- Kliknij menu `Bare Metal Cloud`{.action}.
-- Przejdź do `Network`{.action} na lewym pasku bocznym.
-- Przejdź do sekcji `IP`{.action}.
-
-|  |
-|:--:|
-| Następnie kliknij `...`{.action} Przycisk po prawej stronie odpowiedniego adresu IPv4. |
-
-
-|  |
-|:--:|
-| Wybierz `Filtrowanie: tryb stały`{.action}. |
+Nasza infrastruktura Anty-DDoS (VAC) działa automatycznie. Proces mitygacji realizowany jest za pośrednictwem zautomatyzowanego centrum płukania. To tutaj nasza zaawansowana technologia przygląda się bliżej pakietom i próbuje usunąć ruch DDoS pozwalając jednocześnie na przechodzenie przez nie legalnego ruchu.
+Wszystkie adresy IP OVHcloud są objęte automatyczną mitygacją. W przypadku wykrycia jakiegokolwiek złośliwego ruchu centrum płukania zostaje aktywowane. Stan ten jest określony statusem "Wymuszony" dla danego adresu IP. W tym momencie aktywny jest również Edge Firewall Network. Kiedy atak zostanie zmitygowany, sytuacja powraca do normy i nie obserwuje się już podejrzanych działań.
> [!success]
> **Porady**
@@ -212,4 +187,4 @@ Po przeczytaniu tego tutoriala będziesz potrafił skonfigurować Edge Network F
- [Protecting a game server with the application firewall](/pages/bare_metal_cloud/dedicated_servers/firewall_game_ddos)
-Dołącz do społeczności naszych użytkowników na stronie .
+Dołącz do [grona naszych użytkowników](/links/community).
\ No newline at end of file
diff --git a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.pt-pt.md b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.pt-pt.md
index db3cf4f7f91..ee3b98667b4 100644
--- a/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.pt-pt.md
+++ b/pages/bare_metal_cloud/dedicated_servers/firewall_network/guide.pt-pt.md
@@ -1,7 +1,7 @@
---
title: 'Habilitar e configurar o Edge Network Firewall'
excerpt: 'Saiba como configurar a Edge Network Firewall para os seus serviços'
-updated: 2025-06-04
+updated: 2025-09-08
---
## Objetivo
@@ -10,11 +10,6 @@ Para proteger os serviços dos clientes expostos aos IPs públicos, a OVHcloud o
**Este guia explica como configurar a Edge Network Firewall para os seus serviços.**
-> [!warning]
->
-> **Aviso** : a funcionalidade "Centro de Scrubbing: modo permanente" foi atingida o seu fim de vida útil (EOL) será definitivamente desativado em 8 de setembro de 2025.
->
-
> [!primary]
>
> Encontrará mais informações sobre a nossa solução Anti-DDoS no [nosso website](/links/security/antiddos).
@@ -164,29 +159,9 @@ Por exemplo, um pacote para a porta TCP 80 será intercetado pela regra 2 e as r
### Mitigação do ataque - limpeza da atividade do centro
-A nossa infraestrutura Anti-DDoS (VAC) funciona de duas formas: **auto** e **permanente**. O processo de mitigação é efetuado através do centro de depuração automático. É aqui que a nossa tecnologia avançada analisa detalhadamente os pacotes e tenta eliminar o tráfego DDoS, permitindo a passagem de tráfego legítimo.
-
-- **A mitigação automática** é a predefinição: Todos os IPs da OVHcloud estão sob mitigação automática. Geralmente, esta é a melhor escolha para os seus serviços. Caso seja detetado algum tráfego malicioso, o centro de depuração é ativado. Este estado é indicado pelo estado "Forçado" para um determinado endereço IP. Neste momento, a Firewall Edge Network também está ativa. A situação volta ao normal quando o ataque é mitigado e não se observa mais nenhuma atividade suspeita.
-
-- **O modo de mitigação permanente** pode ser ativado ou desativado a partir da Área de Cliente OVHcloud. Com a mitigação permanente, aplica de forma permanente o primeiro nível de filtragem, pelo que todo o tráfego passa sempre pelo sistema de mitigação antes de chegar ao servidor. Não recomendamos que ative esta opção por períodos mais longos, exceto se observar um certo nervosismo devido ao facto de o centro de limpeza redirecionar o tráfego com demasiada frequência.
-
-Note que, quando comparado com o modo automático, o nível de proteção aumenta **não** quando o modo atual é ativado.
-
-Para ativá-la, siga estes passos:
-
-- Clique no menu `Bare Metal Cloud`{.action}.
-- Aceder a `Network`{.action} na barra lateral esquerda.
-- Aceda à secção `IP`{.action}.
-
-|  |
-|:--:|
-| Em seguida, clique no botão `...`{.action} à direita do IPv4 correspondente. |
-
-
-|  |
-|:--:|
-| Selecione `Mitigação: modo permanente`{.action}. |
+A nossa infraestrutura anti-DDoS (VAC) funciona automaticamente. O processo de mitigação é efetuado através do centro de depuração automático. É aqui que a nossa tecnologia avançada analisa detalhadamente os pacotes e tenta eliminar o tráfego DDoS, permitindo a passagem de tráfego legítimo.
+Todos os IPs da OVHcloud sofrem uma mitigação automática. Caso seja detetado algum tráfego malicioso, o centro de depuração é ativado. Este estado é indicado pelo estado "Forçado" para um determinado endereço IP. Neste momento, a Firewall Edge Network também está ativa. A situação volta ao normal quando o ataque é mitigado e não se observa mais nenhuma atividade suspeita.
> [!success]
> **Dicas**
@@ -212,4 +187,4 @@ Depois de ler este manual, deverá poder configurar a Edge Network Firewall para
- [Proteger um servidor de jogos com a firewall de aplicações](/pages/bare_metal_cloud/dedicated_servers/firewall_game_ddos)
-Fale com nossa comunidade de utilizadores: .
+Fale com a nossa [comunidade de utilizadores](/links/community).
\ No newline at end of file
diff --git a/pages/bare_metal_cloud/dedicated_servers/network_security_dashboard/guide.en-gb.md b/pages/bare_metal_cloud/dedicated_servers/network_security_dashboard/guide.en-gb.md
index dae4ff1a945..2057f74ca4e 100644
--- a/pages/bare_metal_cloud/dedicated_servers/network_security_dashboard/guide.en-gb.md
+++ b/pages/bare_metal_cloud/dedicated_servers/network_security_dashboard/guide.en-gb.md
@@ -1,18 +1,13 @@
---
title: "Monitoring DDoS attacks with the Network Security Dashboard"
excerpt: "Learn how to navigate through the Network Security Dashboard"
-updated: 2025-06-04
+updated: 2025-09-08
---
## Objective
This guide explains the Network Security Dashboard and provides an overview of counter measures triggered by our DDoS protection infrastructure when malicious network activity is detected. You can find details on which additional protections should be implemented to keep your services up and running. Moreover, traffic charts are available on the dashboard for scrubbing centre activity periods to better visualize the situation.
-> [!warning]
->
-> **Warning**: Permanent Mitigation is reaching its End-Of-Life (EOL) and will be disabled permanently on September 8, 2025.
->
-
## Requirements
- An OVHcloud service exposed on a dedicated public IP address ([Dedicated Server](/links/bare-metal/bare-metal), [VPS](/links/bare-metal/vps), [Public Cloud instance](/links/public-cloud/public-cloud), [Hosted Private Cloud](/links/hosted-private-cloud/vmware), [Additional IP](/links/network/additional-ip), etc.)
@@ -53,8 +48,7 @@ Log in to the [OVHcloud Control Panel](/links/manager), open the `Network`{.acti
The columns correspond to the Anti-DDoS scrubbing (**Mitigation**) status, the Edge Network **Firewall** and **GAME firewall** features availability and their statuses.
- The **Mitigation** state can be:
- - **Automatic** - The scrubbing centre is in **automatic** mode. It is the recommended mode to use, it reroutes traffic for deeper analysis when needed.
- - **Permanent** - The scrubbing centre is **permanently enabled**. We do not recommend it to be enabled permanently, unless latency jitter is noted due to rerouting traffic back and forth.
+ - **Automatic** - The scrubbing centre is in **automatic** mode, and reroutes traffic for deeper analysis when needed.
- **Forced** - This indicates the scrubbing centre is **taking action** right now.
- The **Firewall** column indicates the state of the Edge Network Firewall which can be:
diff --git a/pages/bare_metal_cloud/dedicated_servers/network_security_dashboard/guide.fr-fr.md b/pages/bare_metal_cloud/dedicated_servers/network_security_dashboard/guide.fr-fr.md
index e38297443da..6f8eee73081 100644
--- a/pages/bare_metal_cloud/dedicated_servers/network_security_dashboard/guide.fr-fr.md
+++ b/pages/bare_metal_cloud/dedicated_servers/network_security_dashboard/guide.fr-fr.md
@@ -1,18 +1,13 @@
---
title: "Monitoring des attaques DDoS avec le Network Security Dashboard"
excerpt: "Apprenez à naviguer dans le Network Security Dashboard"
-updated: 2025-06-04
+updated: 2025-09-08
---
## Objectif
Ce guide a pour but de présenter le tableau de bord de sécurité réseau (*Network Security Dashboard*), un outil d'aperçu de ce qui se passe lorsqu'une activité réseau malveillante est détectée et que l'infrastructure de protection DDoS est impliquée. Vous y trouverez des détails sur ce qui a déclenché la mise en place de protections supplémentaires pour maintenir vos services opérationnels. Des graphiques de trafic correspondant aux périodes d’activité du centre de nettoyage (*Scrubbing Center*) y sont également disponibles afin de mieux visualiser la situation.
-> [!warning]
->
-> **Avertissement** : la fonctionnalité « Centre de Scrubbing: mode permanent » atteint sa fin de vie (EOL) et sera désactivée définitivement le 8 septembre 2025.
->
-
## Prérequis
- Un service OVHcloud exposé sur une adresse IP publique dédiée ([Serveur dédié](/links/bare-metal/bare-metal), [VPS](/links/bare-metal/vps), [Instance Public Cloud](/links/public-cloud/public-cloud), [Hosted Private Cloud](/links/hosted-private-cloud/vmware), [Additional IP](/links/network/additional-ip), etc.)
@@ -53,8 +48,7 @@ Connectez-vous à votre [espace client OVHcloud](/links/manager), cliquez sur `N
Les colonnes correspondent à la disponibilité et aux états de l'anti-DDoS Scrubbing (**Mitigation**), du Edge Network **Firewall** et du **GAME firewall**.
- L'état **Mitigation** peut être :
- - **Automatique** - Le centre de nettoyage est en mode **automatique**. Il s'agit du mode recommandé, car il redirige le trafic pour une analyse plus approfondie lorsque cela est nécessaire.
- - **Permanent** - Le centre de nettoyage est **activé en permanence**. Il est déconseillé de l'activer de manière permanente, sauf en cas de gigue (*jitter*) de latence due à un réacheminement du trafic en va-et-vient.
+ - **Automatique** - Le centre de nettoyage est en mode **automatique**, et redirige le trafic pour une analyse plus approfondie lorsque cela est nécessaire.
- **Forcé** - Ceci indique que le centre de nettoyage est **en train d'effectuer une action**.
- La colonne **Firewall** indique l'état du Edge Firewall Network qui peut être :