Features

Products

Anti-DDoS Pro

2022-02-22 07:35:31

Features

Anti-DDoS Pro provides protection against large-capacity DDoS attacks, effectively resists various high-volume DDoS attacks, and supports protection against attacks on Layer 3 to Layer 7.

Main functions of Anti-DDoS Pro include:

1. Management and configuration

  • It supports the creation and management of Anti-DDoS Pro instances.

2. Forwarding configuration supported

  • It supports the creation of non-web service (IP and port) and web service (domain name) forwarding rules;
  • It supports the forwarding configuration of TCP, UDP, HTTP, HTTPS protocols, websocket protocol, multi-IP back-to-origin, domain name back-to-origin, and GEO geographical back-to-origin.

3. Various protection configuration rules

  • It supports the configuration of IP black/whitelist, URL whitelist, CC Protection and custom rules for refined protection;
  • It supports advanced configuration of web services such as non-standard port access, HTTP back-to-origin, and HTTP access redirection to HTTPS;
  • It supports custom return page and is applicable to abnormal status code return page and custom rule blocking page;
  • It supports Anti-DDoS Basic + Anti-DDoS Pro linkage protection scheduling rules to meet the needs of low-latency business scenarios;
  • It can automatically switch the protection IP when the attack traffic exceeds the upper limit.

4. Flexible protection billing scheme

  • It supports elastic protection, and is billed based on actual attack bandwidth, helping you save costs.

5. Quick access

  • It supports quick access to Anti-DDoS Pro service by means of CNAME.

6. Massive attack protection

  • It supports BGP lines, and the total protection capacity can reach up to 1.5T.

7. Accurate report display

  • Through the display of DDoS attack protection, business traffic, CC Protection, number of connections and other reports, it can help you fully understand the service situation of Anti-DDoS Pro.

8. The common attack types covered are listed in the following table:

Attack classification Description
Exception filter Blacklist/TCP/UDP/other protocol load characteristic filter
Protocol vulnerability threat protection IP Spoofing; LAND attacks; Fraggle attacks; Smurf attacks; Winnuke attacks; Ping of Death attacks; Tear Drop attacks; IP Option control attacks; IP multi-part control packet attacks; TCP label validity check attacks; oversize ICMP control packet attacks; ICMP redirection control packet attacks; ICMP inaccessible control packet attacks
Scanning and prying threat protection port scanning attacks; address scanning attacks; TRACERT control packet attacks; IP origin server routing option attacks; IP time stamp option attacks; IP routing record option attacks, etc.
Transmission level threat protection SYN flood attacks; ACK flood attacks; SYN-ACK flood attacks; FIN/RST flood attacks; TCP fragment flood attacks; UDP flood attacks; UDP fragment flood attacks; ICMP flood, etc.
Application-based threat protection HTTP get/post attack; CC attack; HTTP slow header/post attack; HTTPS flood attack; SSL DoS/DDoS attack; TCP connection exhaustion attack; Sockstress attack; TCP retransmission attack; TCP empty connection attack; SIP flood, etc.
Feedback

开始与售前顾问沟通

可直接拨打电话 400-098-8505转1

我们的产品专家为您找到最合适的产品/解决⽅案

在线咨询 5*8⼩时

1v1线上咨询获取售前专业咨询

点击咨询
企微服务助手

专业产品顾问,随时随地沟通