Skip to Content

Key Features

Feature PointFeature Description
Basic ProtectionBlocking malformed packets
Defense against syn flood, ack flood, udp flood, icmp flood etc.
Defence against attacks exhausting connections, http get/post flood etc.
Defense against dns request/response flood and more
DNS DetectionDetection and protection based on the NAME, TYPE, CLASS characteristics of DNS queries/responses
Automatic DetectionAutomatic detection and protection through baseline learning, behavioral modeling algorithms and more
Deep ProtectionDeep matching and protection by conditions such as source/destination IP, protocol, port, packet length, flag, packet content etc.
Access ControlConfigure layer 3-4 blacklists, speed limits according to source/destination IP, protocol, ports ;
Configure application-layer black- and whitelist, speed limits, based on source/destination IP, protocol, ports, domain name, URL, User-Agent etc.
MonitoringTraffic monitoring, packet volume monitoring, event monitoring etc.
High AvailabilityMaster-slave deployment, load balancing etc.
Attack Evidence CollectionReal-time packet capturing for evidence based on source/destination IP, protocol, ports etc.
One-click switchOne-click to close or open protection