All Documents
Current Document

Content is empty

If you don't find the content you expect, please try another search term

Documentation

Features and benefits

Last updated:2021-07-30 11:39:24

Features

  • Complete defense against DDoS attacks: KAD provides complete defense against Layer 4 to Layer 7 attacks, covering common attack types such as TCP flood, UDP flood, reflection and amplification, and CC attacks.
  • Attack data query: Detailed attack logs and traffic charts present attack situations in a visualized manner.
  • Protocol support: KAD supports HTTP, HTTPS, and TCP. UDP is supported on some lines.
  • Access from non-cloud users: Non-cloud users can have seamless access to KAD.
  • KAD provides the maximum defense capability of 2 Tbit/s per single node, and more than 10 Tbit/s reserved bandwidth, which can be applied to BGP lines of China Telecom, China Unicom, and China Mobile.

Benefits

  • Large traffic scrubbing: KAD provides the maximum defense capability of 2,000 Gbit/s in the Elasticity billing mode and more than 10 Tbit/s reserved bandwidth.
  • High-quality network: KAD can be applied to BGP lines of China Telecom, China Unicom, and China Mobile.
  • Rapid response: KAD performs accurate device detection and data scrubbing in seconds.
  • High cost-effectiveness: KAD supports billing by monthly subscription or by times, and can be applied in different scenarios.
  • Zero deployment cost: You can connect your services to KAD through DNS switching without changing the network topology or purchasing other devices.
  • Comprehensive protocol support: KAD supports different business protocols such as TCP, UDP, HTTP, HTTPS, and WebSocket.
On this page
Pure ModeNormal Mode

Pure Mode

Click to preview the document content in full screen
Feedback