Product Advantages
-
Highly Reliable
Keep your services reliable with professional and NSS Labs-certified Anti-DDoS devices.
Keep your services reliable with professional and NSS Labs-certified Anti-DDoS devices.
-
Fully Accurate
Accurately identify attacks from IP addresses in a blacklist that is updated daily and thoroughly eliminate potential attacks.
Accurately identify attacks from IP addresses in a blacklist that is updated daily and thoroughly eliminate potential attacks.
-
Instantaneous Response
Check each data packet to identify attacks and respond to threats immediately to ensure your service continuity.
Check each data packet to identify attacks and respond to threats immediately to ensure your service continuity.
-
Completely Free
Try Anti-DDoS for free. Enabled by default, it protects your services when they need it most. You can easily adjust your protection threshold using the provided template.
Try Anti-DDoS for free. Enabled by default, it protects your services when they need it most. You can easily adjust your protection threshold using the provided template.
Application Scenarios
Website Browsing
Websites are prone to DDoS attacks, which ultimately can cause them to crash. Anti-DDoS, however, can withstand multi-layered (layer-4 to -7) attacks, which in turn improves the browsing experience.
Advantages
Functions
-
Malformed and Probe Packet Filtering
Filter out malformed packets and defend against malicious probes and scans based on RFC standards.
Filter out malformed packets and defend against malicious probes and scans based on RFC standards.
-
Defense Against Network and Transport Layer Attacks
Defend your servers against attacks such as SYN floods, SYN-ACK floods, FIN floods, RST floods, UDP floods, ICMP floods, and state-exhaustion attacks.
Defend your servers against attacks such as SYN floods, SYN-ACK floods, FIN floods, RST floods, UDP floods, ICMP floods, and state-exhaustion attacks.
-
Malformed packetsMalformed packets
LAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, and TCP Error Flag
LAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, and TCP Error Flag
-
Probes and scansProbes and scans
Port scanning, address scanning, tracert packet attacks, IP source route option attacks, IP timestamp option attacks, and IP record route option attacks
Port scanning, address scanning, tracert packet attacks, IP source route option attacks, IP timestamp option attacks, and IP record route option attacks
-
TCP/UDP/ICMP flood attacksTCP/UDP/ICMP flood attacks
SYN/SYN-ACK/ACK floods, FIN floods, RST floods, TCP/UDP fragmentation floods, UDP floods, and ICMP floods
SYN/SYN-ACK/ACK floods, FIN floods, RST floods, TCP/UDP fragmentation floods, UDP floods, and ICMP floods
-
State-exhaustion attacksState-exhaustion attacks
Zombie hosts are used to establish a large number of TCP connections to exhaust the server.
Zombie hosts are used to establish a large number of TCP connections to exhaust the server.
-
Application Layer Threat Prevention
Defend your servers against attacks such as HTTP GET/POST floods, CC attacks, HTTP Slow Header/POST, and HTTPS floods.
Defend your servers against attacks such as HTTP GET/POST floods, CC attacks, HTTP Slow Header/POST, and HTTPS floods.
-
Attack Trend and Traffic Report Display
Learn of traffic status and attack trends at any time on the management console.
Learn of traffic status and attack trends at any time on the management console.
-
Web application attacksWeb application attacks
HTTP GET/POST floods, CC attacks, HTTP Slow Header/POST floods, SSL DoS or DDoS, RUDY, LOIC, and WordPress attacks
HTTP GET/POST floods, CC attacks, HTTP Slow Header/POST floods, SSL DoS or DDoS, RUDY, LOIC, and WordPress attacks
-
DNS/SIP attacksDNS/SIP attacks
DNS Query floods, DNS Reply floods, DNS cache poisoning, and SIP floods/SIP Methods floods attacks such as Register floods, Deregistration floods, Authentication floods, and Call floods
DNS Query floods, DNS Reply floods, DNS cache poisoning, and SIP floods/SIP Methods floods attacks such as Register floods, Deregistration floods, Authentication floods, and Call floods
-
IP address monitoringIP address monitoring
Keep abreast of current defense status and configurations as well as the service traffic status and traffic scrubbing over the past 24 hours.
Keep abreast of current defense status and configurations as well as the service traffic status and traffic scrubbing over the past 24 hours.
-
Defense statisticsDefense statistics
Provide a convenient defense overview, including the traffic cleaning frequency, peak amount of cleaned traffic, the top 10 attacked public IP addresses, and the total number of attacks that have been intercepted.
Provide a convenient defense overview, including the traffic cleaning frequency, peak amount of cleaned traffic, the top 10 attacked public IP addresses, and the total number of attacks that have been intercepted.