IPGuard XDP Suite
XDP on the dedik, analytics and control on the VDS.
XDP security pipeline
Filter attack traffic inside the kernel and watch it from the web panel.
This layout keeps the hot path on the dedicated server in Rust, while the VDS hosts the dashboard, policy editor and history. It matches the `Board/` visual language but is a completely separate project.
Traffic mix
Pressure by protocol
Useful to decide when to move a protocol family from observe to drop mode.
41% of current packet volume
28% of current packet volume
19% of current packet volume
12% of current packet volume
Architecture
Dedicated server + VDS split
The website describes the control plane your operators will use in production.
Dedicated server
Rust XDP agent
The agent attaches to the NIC, reads packet headers and updates BPF maps before user space sees noisy traffic.
Telemetry relay
Signed control channel
Every few seconds the agent pushes counters, health and sampled offenders to the VDS over a narrow authenticated path.
VDS analytics
Dashboard and API
Operators inspect attack patterns, store history, tune profiles and roll policies back out to the dedicated server.
Live feed
Current mitigations
SYN flood wave
XDP moved this host group to hard drop after the burst crossed the threshold.
Amplification cluster
Agent rate-limited the segment and mirrored metadata to the dashboard API.
QUIC anomaly
Traffic moved into observe mode while counters continue to build confidence.
Agent scope
What the Rust service does
Rollout