Features
Anti-DDoS Pro provides protection against large-capacity DDoS attacks, effectively resists various high-volume DDoS attacks, and supports protection against attacks on Layer 3 to Layer 7.
Main functions of Anti-DDoS Pro include:
1. Management and configuration
- It supports the creation and management of Anti-DDoS Pro instances.
2. Forwarding configuration supported
- It supports the creation of non-web service (IP and port) and web service (domain name) forwarding rules;
- It supports the forwarding configuration of TCP, UDP, HTTP, HTTPS protocols, websocket protocol, multi-IP back-to-origin, domain name back-to-origin, and GEO geographical back-to-origin.
3. Various protection configuration rules
- It supports the configuration of IP black/whitelist, URL whitelist, CC Protection and custom rules for refined protection;
- It supports advanced configuration of web services such as non-standard port access, HTTP back-to-origin, and HTTP access redirection to HTTPS;
- It supports custom return page and is applicable to abnormal status code return page and custom rule blocking page;
- It supports Anti-DDoS Basic + Anti-DDoS Pro linkage protection scheduling rules to meet the needs of low-latency business scenarios;
- It can automatically switch the protection IP when the attack traffic exceeds the upper limit.
4. Flexible protection billing scheme
- It supports elastic protection, and is billed based on actual attack bandwidth, helping you save costs.
5. Quick access
- It supports quick access to Anti-DDoS Pro service by means of CNAME.
6. Massive attack protection
- It supports BGP lines, and the total protection capacity can reach up to 1.5T.
7. Accurate report display
- Through the display of DDoS attack protection, business traffic, CC Protection, number of connections and other reports, it can help you fully understand the service situation of Anti-DDoS Pro.
8. The common attack types covered are listed in the following table:
Attack classification |
Description |
Exception filter |
Blacklist/TCP/UDP/other protocol load characteristic filter |
Protocol vulnerability threat protection |
IP Spoofing; LAND attacks; Fraggle attacks; Smurf attacks; Winnuke attacks; Ping of Death attacks; Tear Drop attacks; IP Option control attacks; IP multi-part control packet attacks; TCP label validity check attacks; oversize ICMP control packet attacks; ICMP redirection control packet attacks; ICMP inaccessible control packet attacks |
Scanning and prying threat protection |
port scanning attacks; address scanning attacks; TRACERT control packet attacks; IP origin server routing option attacks; IP time stamp option attacks; IP routing record option attacks, etc. |
Transmission level threat protection |
SYN flood attacks; ACK flood attacks; SYN-ACK flood attacks; FIN/RST flood attacks; TCP fragment flood attacks; UDP flood attacks; UDP fragment flood attacks; ICMP flood, etc. |
Application-based threat protection |
HTTP get/post attack; CC attack; HTTP slow header/post attack; HTTPS flood attack; SSL DoS/DDoS attack; TCP connection exhaustion attack; Sockstress attack; TCP retransmission attack; TCP empty connection attack; SIP flood, etc. |