Overview

Last updated: 2020-04-02 10:00:55

    Product Introduction

    Anti-DDoS Pro is a paid anti-DDoS service for business deployed in Tencent Cloud. It works directly on Tencent Cloud services and users don’t need to change their IPs. It is easy to use and requires no additional changes on your end. Anti-DDoS Pro supports both IPv6 and IPv4 addresses, and provides Single-IP instances and Multi-IP instances for your choice.
    Anti-DDoS Pro offers two types of instances, single IP instances and multi-IP instances. You can choose either one as required:

    • Single IP instance: provides dedicated protection for a single IP.
    • Multi-IP instance: provides protection for multiple IPs.

    Key Features

    Multidimensional Protection

    Protection Type Description
    Malformed packet filtering Filters out Frag Flood, Smurf, Stream Flood, and Land Flood attacks, as well as IP, TCP and UDP malformed packets
    DDoS protection at the network layer Filters out UDP Flood, SYN Flood, TCP Flood, ICMP Flood, ACK Flood, FIN Flood, RST Flood and DNS/NTP/SSDP reflection attacks and null sessions.
    DDoS protection at the application layer Filters out CC attacks and HTTP slow attacks, and supports HTTP custom filtering such as host filtering, user-agent filtering and referer filtering.

    Flexible Defense Options

    Anti-DDoS Pro offers protection for a single IP or multiple IPs to meet your diverse business needs. You can flexibly change what you want to protect among CVM, CLB, WAF, and NAT Gateway, etc.

    Advanced Security Policies

    Anti-DDoS Pro comes with basic security policies, which can cope with common DDoS attacks by leveraging IP portrait, behavioral analysis, AI-based identification, and other protection algorithms. It also offers advanced protection policies, which can be tailored to your special needs to deal with ever-changing attack tricks.

    Protection Statistics and Analysis

    Anti-DDoS Pro provides real-time and detailed traffic reports and attack defense details so that you can evaluate its performance timely and accurately. Meanwhile, it can capture and download attack packets for fast troubleshooting.

    Was this page helpful?

    Was this page helpful?

    • Not at all
    • Not very helpful
    • Somewhat helpful
    • Very helpful
    • Extremely helpful
    Send Feedback
    Help