Product Advantages
-
Highly Reliable
Bolstered by over 17 years of professional expertise and certified by NSS Labs, Huawei's Anti-DDoS systems guarantee reliability.Bolstered by over 17 years of professional expertise and certified by NSS Labs, Huawei's Anti-DDoS systems guarantee reliability. -
Fully Accurate
A database that is constantly updated with the latest feature library (carrying millions of blacklisted IP addresses) coupled with a 7-layer, smart scrubbing mechanism ensures accurate results.A database that is constantly updated with the latest feature library (carrying millions of blacklisted IP addresses) coupled with a 7-layer, smart scrubbing mechanism ensures accurate results.
-
Instantaneous Response
With industry-vetted technology and powerful equipment, Anti-DDoS checks each packet and responds to any attack immediately without causing service delays.With industry-vetted technology and powerful equipment, Anti-DDoS checks each packet and responds to any attack immediately without causing service delays. -
Completely Free
Anti-DDoS is free of charge and instantly available upon application. It provides professional defense templates and capability of self-learning to auto-adjust threshold.Anti-DDoS is free of charge and instantly available upon application. It provides professional defense templates and capability of self-learning to auto-adjust threshold.
Functions
-
Malformed and Probe Packet Filtering
Filters malformed packets and defends against scanning and probing attacks based on RFC standards.Filters malformed packets and defends against scanning and probing attacks based on RFC standards. -
Defense Against Network and Transport Layer Attacks
Effectively defends against attacks such as SYN floods, SYN-ACK floods, FIN floods, RST floods, UDP floods, ICMP floods, and TCP connection exhaustion.Effectively defends against attacks such as SYN floods, SYN-ACK floods, FIN floods, RST floods, UDP floods, ICMP floods, and TCP connection exhaustion.
-
Malformed packetsMalformed packetsLAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, and TCP Error FlagLAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, and TCP Error Flag
-
Probe packetsProbe packetsPort scanning, address scanning, tracert packet attacks, IP source route option attacks, IP timestamp option attacks, and IP record route option attacksPort scanning, address scanning, tracert packet attacks, IP source route option attacks, IP timestamp option attacks, and IP record route option attacks
-
TCP/UDP/ICMP flood attacksTCP/UDP/ICMP flood attacksSYN/SYN-ACK/ACK floods, FIN floods, RST floods, TCP/UDP fragmentation floods, UDP floods, and ICMP floodsSYN/SYN-ACK/ACK floods, FIN floods, RST floods, TCP/UDP fragmentation floods, UDP floods, and ICMP floods
-
TCP connection exhaustion attacksTCP connection exhaustion attacksZombie hosts are used to establish a large number of TCP connections to exhaust the server.Zombie hosts are used to establish a large number of TCP connections to exhaust the server.
-
Application Layer Threat Prevention
Effectively prevents attacks such as HTTP Get, Post Flood, CC, HTTP Slow Header/Post, and HTTPS Flood.Effectively prevents attacks such as HTTP Get, Post Flood, CC, HTTP Slow Header/Post, and HTTPS Flood. -
Attack Trend and Traffic Report Display
Uses a user-friendly platform to show real-time service traffic and attack trends.Uses a user-friendly platform to show real-time service traffic and attack trends.
-
Web application attacks
Web application attacks
HTTP GET or POST floods, CC attacks, HTTP Slow Header or POST floods, SSL DoS or DDoS, RUDY, LOIC, and WordPress attacks
HTTP GET or POST floods, CC attacks, HTTP Slow Header or POST floods, SSL DoS or DDoS, RUDY, LOIC, and WordPress attacks
-
DNS/SIP attacksDNS/SIP attacksDNS Query floods, DNS Reply floods, DNS cache poisoning, and SIP floods/SIP Methods floods attacks such as Register floods, Deregistration floods, Authentication floods, and Call floodsDNS Query floods, DNS Reply floods, DNS cache poisoning, and SIP floods/SIP Methods floods attacks such as Register floods, Deregistration floods, Authentication floods, and Call floods
-
IP address monitoringIP address monitoringDisplays the current defense status and configuration parameters; shows service traffic and various abnormalities over the past 24 hours.Displays the current defense status and configuration parameters; shows service traffic and various abnormalities over the past 24 hours.
-
Defense summaryDefense summaryProvides comprehensive defense summary with detailed and important protection metrics. In addition, the Top 10 most frequently attacked servers (along with the corresponding number of intercepted attacks) are listed.Provides comprehensive defense summary with detailed and important protection metrics. In addition, the Top 10 most frequently attacked servers (along with the corresponding number of intercepted attacks) are listed.