Q: The IP access of which regions is supported by Anti-DDoS Pro?
A: Anti-DDoS Pro supports IP access of all regions, including JD Cloud and users outside the Cloud.
Q: Which forwarding protocols does Anti-DDoS Pro support?
A: Anti-DDoS Pro supports the forwarding setting of protocols including TCP, UDP, HTTP and HTTPS, and supports websocket protocol access, covering all business scenarios.
Q: What are the differences between non-web service forwarding and web service forwarding?
A: The two forwarding settings correspond to different application scenarios and usage protocols. Specific differences are as follows:
Provides 3 to 4 layers of SYN Flood, ACK Floods, ICMP Flood, UDP Flood, NTP Floods, SSDP Flood and other attacks protection. The DDoS protection for application layer is not supported.
In addition to providing SYN Flood, ACK Floods, ICMP Flood, UDP Flood, NTP Floods, SSDP Flood and other attacks protection, it also supports application-layer protection against attacks such as CC attacks, HTTP Flood, etc.
Q: What ISP-Lines does Anti-DDoS Pro support?
A: Anti-DDoS Pro supports single and multiple ISP-Line purchase, and supports the single ISP-Line to upgrade to multi ISP-Lines.
Single ISP-Line: The China Telecom's ISP-Lines.
Multi ISP-Lines: Telecom+Unicom+CMCC.
By default, the China Telecom's ISP-Lines will be resolved to the China Telecom Machine Room, the China Unicom's ISP-Lines to the China Unicom Machine Room, and the CMCC's ISP-Lines to the CMCC Machine Room. If the attack traffic exceeds the maximum capacity of China Unicom Machine Room or CMCC Machine Room, the ISP-Lines will be resolved to the China Telecom's ISP-Lines to complete the cleaning.
Q: Does Anti-DDoS Pro support extensive domains?
A: In Web Service forwarding rules configuration of Anti-DDoS Pro, it supports the protection of the extensive domains.
Extensive domain name resolution refers to the use of wildcard (*) as secondary domain name to enable all secondary domain names to point to the same IP. For example, it supports configurating *.jdcloud.com.
Q: What is business bandwidth, and what happens it is exceeded?
A: Business bandwidth purchased by Anti-DDoS Pro is for the entire instance, meaning the bandwidth in the IN or OUT direction of all normal traffic for the instance.
In default, Anti-DDoS Pro gifts 100M business bandwidth, and if it is exceeded, it would trigger traffic speed limit, which may lead to random data loss. If the bandwidth goes beyond the business bandwidth, the system will send alarm notification and recommend you upgrade it timely.
Q: What are the requirements for access to domains of Anti-DDoS Pro?
A: According to relevant laws and regulations of Ministry of Industry and Information Technology, Anti-DDoS Pro only protects filed domains. If the domain is not filed, the Anti-DDoS Pro service will not be available.
Q: What is the main business of CC defense?
A: CC defense is mainly for Web Service business, and is closed by default. CC defense does not take effect when closed.
After turning on the main switch, all the domains of this instance will turn on CC defense, and you can manually close the domains that do not require CC defense.
Q: Why would a black hole occur?
A: When the attack traffic reaches the upper limit of the Anti-DDoS Pro package that you purchase, a black hole will be triggered and shield all access to the server.
It is recommended that you buy a better protection packages for greater protection. After the package has been upgraded, the system will automatically become unbanned in seconds.
Q: How long will the black hole be lasting, and how to unban it?
A: By default of the black hole policy of Anti-DDoS Pro, it would last for 2 hours. If the server has not been attacked in 2 hours, it will automatically become unbanned.
The duration before the server is unbanned is related to the number of times the black hole is triggered and the peak value of the attack. If the server continues to receive attack, the duration of the ban will continue to lengthen.
If the attack traffic so excessive that the operator's ban is triggered, the duration of the ban is determined by the operator's policy and becomes uncertain.
Q: What error status codes does Anti-DDoS Pro support?
A: Anti-DDoS Pro sets up error code pages for the following special cases, and you can view and troubleshoot the problems according to the notification on the page.
|Error Code||Meaning||Reasons for Occurring||What to do|
|ERROR 422||Access denied||Sorry, the webmaster has performed IAM to the region you are in or the access IP and denied your access because of possible malicious behavior on your computer or IP.||Please contact the webmaster to modify the access policy.|
|ERROR 420||Request to re-enter||The same access from you has passed though the node of Anti-DDoS Pro of JD.||Please confirm the website configuration, and confirm whether it is configured with multiple proxy servers, and the proxy path has generated loop.|
|ERROR 522||The origin server is unreachable . The same access from you has passed though the node of Anti-DDoS Pro of JD.||F or errors occurring to the origin server, the common causes are DNS setting error, changes have not taken effect or origin server firewall||The request is blocked. Please access later or contact the webmaster.|
|ERROR 421||The domain name does not exist||The domain you access has not purchased Anti-DDoS Pro service of JD Cloud or the configuration has not taken effect, so the services cannot be provided.||Please confirm the website has purchased Anti-DDoS Pro service of JD Cloud and the configuration has taken effect.|
|ERROR 523||The origin server is busy||The server is busy due to the possible reason that the origin server is subject to CC attack||The origin server is busy. Please access later.|
|ERROR 524||The server is busy . The origin server is busy.||The origin server is busy. Please access later.|
Q: What is backup IP? What's the benefit of configuring a backup IP?
A: The backup IP is the standby to the back-to-origin IP. The definitions are as follows:
Back-to-origin IP: Refers to the back-to-origin address of Anti-DDoS Pro in case of attacks, which can be an IP address or a domain. It is recommended that the back-to-origin IP be externally invisible.
Backup IP: Refers to the back-to-origin IP address of Anti-DDoS Pro in case of non-attack state. It is an externally visible backup IP. Backup IP is not mandatory.
The benefits of configuring backup IP are:
As an example of non-web service settings, the schematic diagram is as follows:
You can expand the “Product Graphic Instructions” on the Instance Details page to view the diagram.
The back-to-origin IP address is 18.104.22.168 and the backup IP address is 22.214.171.124. The back-to-origin/defense status bar can be switched according to the network status.
Q: Does Anti-DDoS Pro support non-80-port website access?
A: It supports.Anti-DDoS Pro supports custom port to meet access requirements for the non-standard-port Web Service business.
Q: What is an HTTP back-to-origin?
A: As shown in the figure below, after the HTTP back-to-origin is turned on, it returns to server via Anti-DDoS Pro and will be translated into the protocol back-to-origin of HTTP. The back-to-origin port used by default is 80.
If the port is customized by HTTP, the port back-to-origin of custom port will be used.
Q: Whether Anti-DDoS Pro supports IPV6, are there any special restrictions?
A: The China Telecom Line of Anti-DDoS Pro has already supported IPv6 ISP-Lines, you can only select IPV4 addresses or select both IPV4 and IPV6 addresses according to your needs when you purchase new instances.
Restrictions: Unicom and CMCC ISP-Lines temporarily do not support IPV6; the purchased IPV4 instances temporarily do not support to upgrade to IPV6; IP addresses of back-to-origin do not support to configure IPV6. If you have special requirements, please submit ticket feedback.