2 min read

Vercel Firewall

Learn how Vercel Firewall helps to protect your applications and websites from DDoS attacks and unauthorized access.
Table of Contents

Vercel Firewall is a set of tools and infrastructure, created specifically with security in mind. It automatically mitigates DDoS attacks and Enterprise teams can get further customization for their site, including dedicated support and custom rules for IP blocking.

DDoS Mitigation is available on all plans

Vercel provides automated DDoS mitigation for all deployments, regardless of the plan that you are on. With this automated DDoS mitigation, we block incoming traffic if we identify abnormal or suspicious levels of incoming requests.

Dedicated DDoS support is available on Enterprise plans

For significantly larger, distributed attacks on Enterprise Teams, we work closely with you to ensure your site(s) stay online in the event of an attack. The combination of automated prevention and direct communication from our Customer Success Managers helps ensure your site is resilient to attacks.

Contact our sales team to learn more:

Attack Challenge Mode is available on all plans

Attack Challenge Mode is a way for customers on all plans to ensure more control when under high volume attacks. The Vercel Firewall automatically mitigates against DDoS attacks, but sometimes you may want an extra layer of control to ensure that all traffic to your site is legitimate.

Custom rules for IP Blocking is available on Enterprise plans

Those with the owner and member roles can access this feature

Enterprise teams can customize the Vercel Firewall by restricting access to your applications or websites based on the IP addresses of incoming requests.

By creating custom rules for IP blocking, in conjunction with DDoS mitigation, you can further strengthen your security posture and maintain control over who can access your applications and websites.

TLS Fingerprints are available on Enterprise plans

For advanced firewall customers, the Vercel Firewall offers the utilization of JA3 and JA4 TLS fingerprints, a sophisticated technology employed to track and identify suspicious traffic. TLS fingerprints uniquely identify user sessions based on details in the Transport Layer Security (TLS) protocol initiation process.

This advanced feature provides heightened security measures, especially useful in detecting persistent and covert threats like Botnets or Advanced Persistent Threats (APTs).

Last updated on April 18, 2024