What are the main services of Gentian products?
Telecom Cloudbank-DDoS attack protection ("Telecom Cloudbank-Anti-D"), Telecom Cloudbank-Domain name security protection ("Telecom Cloudbank-Domain name worry-free"), Telecom Cloudbank-Anti-Phishing website disposal ("Telecom Cloudbank-Anti-Phishing") and Website security expert ("Telecom Cloudbank-Website security expert"): "Telecom Yuntai-Anti-Phishing") and Telecom Yuntai-Website Security Specialist ("Telecom Yuntai-Website Security Specialist" for short)
DDOS protection methods?
1, DDoS network attack protection: When faced with a large number of SYNFlood, UDPFlood, DNSFlood, ICMPFlood attacks, it can quickly block the source of the attack to ensure normal business operation.
2, domain name resolution dysfunction disaster recovery: when the root domain and top-level domain servers fail to provide normal service, or even when all external authorized servers fail, a company's next-generation firewall DNS proxy system can still serve as a resolution island to provide normal domain name resolution services.
3. DNS security policy linkage: track and monitor the resolution requests of key domains/domains, and when abnormal situations occur, start the relevant security linkage measures, and only respond to normal domain name services.
4. DNS amplification attack protection: When there is an abnormal surge in traffic of an IP, IP analysis and security linkage measures are automatically activated to limit the speed of the IP and prune the response results to effectively prevent the DNS server from becoming a source of amplification attacks.
5. Multi-line traffic scheduling disaster recovery: For customers with multi-line outlets, different export policies can be configured.
6. Weak credentials awareness: When a legitimate user logs in to various application management systems through a weak password, it will be intelligently perceived and notify the security administrator of the existence of a weak password security risk, thus improving the account security level.
7, vulnerability attack protection: when the attacker of the enterprise information assets for password violence enumeration or system vulnerability attacks can be quickly detected when the attack behavior, and the formation of effective defense.
8, botnet detection: when the organization's internal staff through instant messaging tools or e-mail received malware, malware and the outside world in the process of communication can be quickly detected, and thus effectively protect the organization's internal information is not leaked.
9, APT Directed Attack Detection: A company's next-generation firewall can effectively detect APT Directed Attacks and ZeroDay Attacks as well as malware in the process of transmission through a variety of traffic identification algorithms, thus rejecting APT attacks from thousands of miles away.
Router ddos defense settings?
1, source IP address filtering
Source IP address filtering at all ISP network access or aggregation nodes can effectively reduce or eliminate source IP address spoofing, so that SMURF, TCP-SYNflood, and other ways of DDoS attacks can not be implemented.
2. Traffic Restriction
Controlling certain types of traffic, such as ICMP, UDP, and TCP-SYN traffic at network nodes, and restricting their sizes to reasonable levels can mitigate the impact of denial of DDoS attacks on the bearer network and the target network.
3. ACL Filtering
Without affecting the business, it filters the traffic of worm attack ports and control ports of DDoS tools.
4. TCP Interception
For TCP-SYNflood attacks, the user side can consider enabling the TCP interception function of the gateway device to defend against them. Since enabling TCP interception may have a certain impact on router performance, comprehensive consideration should be given when using this feature.
What are the cloud computing virtualization products?
Cloud computing virtualization products are cloud servers, virtual hosts, cloud storage, supercomputing clusters, container services, CDNs, databases, messaging services, network acceleration, load balancing, ddos defense, Web application firewalls, cloud bastion, SSL certificates, cloud shields, big data, artificial intelligence, enterprise mailboxes
First, there are the most basic cloud computing products, namely Public cloud vendors that provide cloud computing resources, the domestic representatives are Aliyun, Huawei Cloud, Tencent Cloud, etc., and foreign countries include AWS, GCP, Azure, etc.