Vulnerability Reporting

1. Introduction: This policy outlines the process for third-party hackers, security researchers, and the general public to responsibly disclose vulnerabilities they discover in our systems, software, or services. We value the contributions of the security community and recognize the importance of their role in maintaining the highest security standards. 2. Scope: This policy applies to any digital assets owned, operated, or maintained by ServerAstra. This includes websites, applications, servers, and other [...]

Traffic monitoring: Asymmetric VLAN vs. Symmetric Interface Sampling

sFlow (Sampled Flow) is a robust technology for monitoring high-speed network traffic similar to Netflow and IPFIX. It works by generating sampled subsets of network packets, providing an efficient and scalable way to analyze traffic. Depending on your configuration, you may notice that sFlow samples from a VLAN (Virtual Local Area Network) are asymmetric, whereas those from a network interface are symmetric. This article explores why this is the case and why we choose VLAN sFlow monitoring. Table of Conten[...]

Cloud Resource policy

CPU For Central Processing Unit configuration in our cloud platform we use Dual AMD Epyc 7401, Dual AMD Epyc 7352 or Single AMD Epyc 7401P for each host node The difference between v(irtual)CPU and d(edicated)CPU is in the core usage guarantee. vCPU means maximum 100% of 1x AMD Epyc 7401 Core and minimum 25% expressed by formula: vCPU := 100% >= (1 x hostCPU) >= 25% dCPU means 100% of dedicated 1x AMD Epyc 7401 Core expressed by formula: dCPU := 1 x hostCPU hostCPU is 1 Physical Core of 1 (one) AMD E[...]

Network Security policy

At ServerAstra, we take the security of our customers' data and network very seriously. To ensure the highest level of protection, we employ several measures, including blocking outgoing Simple Mail Transfer Protocol (SMTP) port 25 and automated abuse monitoring. This page provides detailed information on our policies and the reasons behind them. Table of Contents SMTP Port 25 Blocking Policy Firewall Protection Automated Abuse monitoring Benefits of Our Network Security Measures FAQs SMTP Port 25 Block[...]

ServerAstra Peering policy

ServerAstra AS56322 has an open peering policy and will peer with networks at mutual exchange points in accordance with the policies described below Please read these policy carefully and thoroughly. Requirements ServerAstra uses PeeringDB as a single authoritative source of truth. This means peering partners must have an up-to-date PeeringDB entry before a bilateral peering session can be established. ServerAstra will use industry standards to secure the peering sessions. This includes industry standard pr[...]