AntiDDoS UMN test1 version

Reviewed-by: Hasko, Vladimir <vladimir.hasko@t-systems.com>
Co-authored-by: gtema <artem.goncharov@gmail.com>
Co-committed-by: gtema <artem.goncharov@gmail.com>
This commit is contained in:
gtema 2022-11-15 12:50:29 +00:00 committed by zuul
parent 97efed8eab
commit 5db8bf6e43
81 changed files with 1176 additions and 0 deletions

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,3 @@
version=""
language="en-us"
type=""

Binary file not shown.

After

Width:  |  Height:  |  Size: 365 B

Binary file not shown.

After

Width:  |  Height:  |  Size: 22 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 19 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 14 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 14 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 14 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 15 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 30 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 51 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 443 B

Binary file not shown.

After

Width:  |  Height:  |  Size: 346 B

Binary file not shown.

After

Width:  |  Height:  |  Size: 656 B

Binary file not shown.

After

Width:  |  Height:  |  Size: 627 B

Binary file not shown.

After

Width:  |  Height:  |  Size: 22 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 443 B

Binary file not shown.

After

Width:  |  Height:  |  Size: 28 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 11 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 17 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 15 KiB

View File

@ -0,0 +1,18 @@
<a name="en-us_topic_0023977447"></a><a name="en-us_topic_0023977447"></a>
<h1 class="topictitle1">Introduction</h1>
<div id="body15047603"></div>
<div>
<ul class="ullinks">
<li class="ulchildlink"><strong><a href="en-us_topic_0125048639.html">Functions</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0204851513.html">Region and AZ</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0204851520.html">Project</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0204851500.html">Application Scenarios</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0204851460.html">Accessing and Using Anti-DDoS</a></strong><br>
</li>
</ul>
</div>

View File

@ -0,0 +1,11 @@
<a name="en-us_topic_0023977462"></a><a name="en-us_topic_0023977462"></a>
<h1 class="topictitle1">What Is Anti-DDoS?</h1>
<div id="body1436949164711"><p id="en-us_topic_0023977462__p41668962105956">The Anti-DDoS traffic cleaning service (Anti-DDoS for short) defends elastic IP addresses (EIPs) against network- and application-layer distributed denial of service (DDoS) attacks and sends alarms immediately when detecting an attack. In addition, Anti-DDoS improves the utilization of bandwidth and ensures the stable running of users' services.</p>
<p id="en-us_topic_0023977462__p11200192720269">Anti-DDoS monitors the service traffic from the Internet to EIPs to detect attack traffic in real time. It then cleans attack traffic according to user-configured defense policies so that services run as normal. In addition, monitoring reports are generated, presenting users with clear network security evaluations.</p>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0204851505.html">FAQs</a></div>
</div>
</div>

View File

@ -0,0 +1,19 @@
<a name="en-us_topic_0125048639"></a><a name="en-us_topic_0125048639"></a>
<h1 class="topictitle1">Functions</h1>
<div id="body18191719"><p id="en-us_topic_0125048639__p30841384103716">The Anti-DDoS traffic cleaning service (Anti-DDoS for short) defends elastic IP addresses (EIPs) against network- and application-layer distributed denial of service (DDoS) attacks and sends alarms immediately when detecting an attack. In addition, Anti-DDoS improves the utilization of bandwidth and ensures the stable running of users' services.</p>
<p id="en-us_topic_0125048639__p11200192720269">Anti-DDoS monitors the service traffic from the Internet to EIPs to detect attack traffic in real time. It then cleans attack traffic according to user-configured defense policies so that services run as normal. In addition, monitoring reports are generated, presenting users with clear network security evaluations.</p>
<div class="p" id="en-us_topic_0125048639__p3345315095843">Anti-DDoS helps users cope with traffic attacks with ease. It can precisely identify connection exhaustion and slow-connection attacks and can help users defend against the following attacks:<ul id="en-us_topic_0125048639__ul4629401995934"><li id="en-us_topic_0125048639__li4436233210233">Web server attacks<p id="en-us_topic_0125048639__p3491797210234"><a name="en-us_topic_0125048639__li4436233210233"></a><a name="li4436233210233"></a>Such as SYN flood, HTTP flood, Challenge Collapsar (CC), and slow-connection attacks</p>
</li><li id="en-us_topic_0125048639__li4686113910242">Game attacks<p id="en-us_topic_0125048639__p412480310244"><a name="en-us_topic_0125048639__li4686113910242"></a><a name="li4686113910242"></a>Such as User Datagram Protocol (UDP) flood, SYN flood, Transmission Control Protocol (TCP), and fragment attacks</p>
</li><li id="en-us_topic_0125048639__li150075510822">HTTPS server attacks<p id="en-us_topic_0125048639__p5039778710823"><a name="en-us_topic_0125048639__li150075510822"></a><a name="li150075510822"></a>Such as SSL DoS and DDoS attacks</p>
</li><li id="en-us_topic_0125048639__li4909171210256">DNS server attacks<p id="en-us_topic_0125048639__p2960139010419"><a name="en-us_topic_0125048639__li4909171210256"></a><a name="li4909171210256"></a>Such as attacks targeted at vulnerabilities in the Domain Name Server (DNS) protocol stack, DNS reflection attacks, DNS flood attacks, and DNS cache-miss attacks</p>
</li></ul>
</div>
<div class="p" id="en-us_topic_0125048639__p56297929103316">Anti-DDoS also provides the following functions:<ul id="en-us_topic_0125048639__ul57045547103359"><li id="en-us_topic_0125048639__li23060377103359">Providing monitoring records for each EIP, including the current defense status, current defense configurations, and the last 24 hours' traffic and abnormalities.</li><li id="en-us_topic_0125048639__li1335111310261">Providing attack statistics reports on all protected EIPs, covering the traffic cleaning frequency, cleaned traffic amount, top 10 attacked EIPs, and number of blocked attacks.</li></ul>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0023977447.html">Introduction</a></div>
</div>
</div>

View File

@ -0,0 +1,15 @@
<a name="EN-US_TOPIC_0204851458"></a><a name="EN-US_TOPIC_0204851458"></a>
<h1 class="topictitle1">What Kinds of Attacks Does Anti-DDoS Defend Against?</h1>
<div id="body1437659770695"><div class="p" id="EN-US_TOPIC_0204851458__p16596681111055">Anti-DDoS helps users cope with traffic attacks with ease. It can precisely identify connection exhaustion and slow-connection attacks and can help users defend against the following attacks:<ul id="EN-US_TOPIC_0204851458__u6e91c54583664c2082720b02bd17d696"><li id="EN-US_TOPIC_0204851458__le12226cc153a45478b896c4911903527">Web server attacks<p id="EN-US_TOPIC_0204851458__a1d55fe1e6bf949afb77810f7b1a01381"><a name="EN-US_TOPIC_0204851458__le12226cc153a45478b896c4911903527"></a><a name="le12226cc153a45478b896c4911903527"></a>Such as SYN flood, HTTP flood, Challenge Collapsar (CC), and slow-connection attacks</p>
</li><li id="EN-US_TOPIC_0204851458__l23d71bbac421441ba5e9f26a46240046">Game attacks<p id="EN-US_TOPIC_0204851458__en-us_topic_0023977443_p412480310244"><a name="EN-US_TOPIC_0204851458__l23d71bbac421441ba5e9f26a46240046"></a><a name="l23d71bbac421441ba5e9f26a46240046"></a>Such as User Datagram Protocol (UDP) flood, SYN flood, Transmission Control Protocol (TCP), and fragment attacks</p>
</li><li id="EN-US_TOPIC_0204851458__l64f144e7845a4a66891e65481b578311">HTTPS server attacks<p id="EN-US_TOPIC_0204851458__ab425f0657e7c481bafbc5f09442bc22b"><a name="EN-US_TOPIC_0204851458__l64f144e7845a4a66891e65481b578311"></a><a name="l64f144e7845a4a66891e65481b578311"></a>Such as SSL DoS and DDoS attacks</p>
</li><li id="EN-US_TOPIC_0204851458__l6157fa0ce31441db90b49e406487baae">DNS server attacks<p id="EN-US_TOPIC_0204851458__a363ae79393304fea99bd4d04f0e10d85"><a name="EN-US_TOPIC_0204851458__l6157fa0ce31441db90b49e406487baae"></a><a name="l6157fa0ce31441db90b49e406487baae"></a>Such as attacks targeted at vulnerabilities in the Domain Name Server (DNS) protocol stack, DNS reflection attacks, DNS flood attacks, and DNS cache-miss attacks</p>
</li></ul>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0204851505.html">FAQs</a></div>
</div>
</div>

View File

@ -0,0 +1,20 @@
<a name="EN-US_TOPIC_0204851460"></a><a name="EN-US_TOPIC_0204851460"></a>
<h1 class="topictitle1">Accessing and Using Anti-DDoS</h1>
<div id="body8662426"></div>
<div>
<ul class="ullinks">
<li class="ulchildlink"><strong><a href="en-us_topic_0204851463.html">How to Access Anti-DDoS</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0204851524.html">How to Use Anti-DDoS</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0204851508.html">Related Services</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0204851498.html">User Permissions</a></strong><br>
</li>
</ul>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0023977447.html">Introduction</a></div>
</div>
</div>

View File

@ -0,0 +1,11 @@
<a name="EN-US_TOPIC_0204851461"></a><a name="EN-US_TOPIC_0204851461"></a>
<h1 class="topictitle1">Will I Be Promptly Notified When an Attack Is Detected?</h1>
<div id="body1466566949281"><p id="EN-US_TOPIC_0204851461__p10640672162945">You will be promptly notified when an attack is detected after you have enabled alarm notification.</p>
<p id="EN-US_TOPIC_0204851461__p4881940811523">On the Anti-DDoS console page, click the <strong id="EN-US_TOPIC_0204851461__b1052221132716">Alarm Notifications</strong> tab and enable the alarm notification function. Then you will receive notifications (by SMS or email) if a DDoS attack is detected.</p>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0204851505.html">FAQs</a></div>
</div>
</div>

View File

@ -0,0 +1,13 @@
<a name="EN-US_TOPIC_0204851463"></a><a name="EN-US_TOPIC_0204851463"></a>
<h1 class="topictitle1">How to Access Anti-DDoS</h1>
<div id="body8662426"><p id="EN-US_TOPIC_0204851463__a7d5e041e077c476da1d9cf2944921cd6">The public cloud provides a web-based service management platform. You can access Anti-DDoS using HTTPS-compliant APIs or the management console.</p>
<ul id="EN-US_TOPIC_0204851463__u66b51ca60d194c0781d48910917659aa"><li id="EN-US_TOPIC_0204851463__lf5cd6d78dd9f4511bc6e28255b096c2b">Management console<p id="EN-US_TOPIC_0204851463__p37869370201417"><a name="EN-US_TOPIC_0204851463__lf5cd6d78dd9f4511bc6e28255b096c2b"></a><a name="lf5cd6d78dd9f4511bc6e28255b096c2b"></a>If you have registered with the public cloud, you can log in to the management console directly. In the upper left corner on the console, click <span><img id="EN-US_TOPIC_0204851463__image15983193443717" src="en-us_image_0237050217.png"></span>. Select your region and project. On the home page, choose <span class="menucascade" id="EN-US_TOPIC_0204851463__menucascade81734428417621"><b><span class="uicontrol" id="EN-US_TOPIC_0204851463__uicontrol82659045617621">Security</span></b> &gt; <b><span class="uicontrol" id="EN-US_TOPIC_0204851463__uicontrol108842738217621">Anti-DDoS</span></b></span> to access the Anti-DDoS service.</p>
</li><li id="EN-US_TOPIC_0204851463__li494386892036">HTTPS-compliant APIs<p id="EN-US_TOPIC_0204851463__p2892991792036"><a name="EN-US_TOPIC_0204851463__li494386892036"></a><a name="li494386892036"></a>You can access Anti-DDoS using APIs. For details, see the <em id="EN-US_TOPIC_0204851463__i842352697161544">Anti-DDoS API Reference</em>.</p>
</li></ul>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0204851460.html">Accessing and Using Anti-DDoS</a></div>
</div>
</div>

View File

@ -0,0 +1,6 @@
<a name="EN-US_TOPIC_0204851467"></a><a name="EN-US_TOPIC_0204851467"></a>
<h1 class="topictitle1">Glossary</h1>
<div id="body8662426"><p id="EN-US_TOPIC_0204851467__en-us_topic_0047892914_p8060118">For details about the glossaries in this document, see <a href="https://docs.otc.t-systems.com/en-us/glossary/index.html" target="_blank" rel="noopener noreferrer">Glossary</a>.</p>
</div>
<div></div>

View File

@ -0,0 +1,29 @@
<a name="EN-US_TOPIC_0204851468"></a><a name="EN-US_TOPIC_0204851468"></a>
<h1 class="topictitle1">Viewing a Monitoring Report</h1>
<div id="body13189358"><div class="section" id="EN-US_TOPIC_0204851468__section87788284194"><h4 class="sectiontitle">Scenarios</h4><p id="EN-US_TOPIC_0204851468__p23883009142011">This topic describes how to view the monitoring report of an EIP, covering the current protection status, protection settings, and the traffic and anomalies within the last 24 hours.</p>
</div>
<div class="section" id="EN-US_TOPIC_0204851468__section284611418201"><h4 class="sectiontitle">Prerequisites</h4><p id="EN-US_TOPIC_0204851468__p458174542010">You have obtained an account and its password to log in to the management console.</p>
</div>
<div class="section" id="EN-US_TOPIC_0204851468__section1544716185202"><h4 class="sectiontitle">Procedure</h4><ol id="EN-US_TOPIC_0204851468__ol50569231154047"><li id="EN-US_TOPIC_0204851468__li8960030151422"><span>Log in to the management console.</span></li><li id="EN-US_TOPIC_0204851468__li1434906120214"><span>Click <span><img id="EN-US_TOPIC_0204851468__image9693347131611" src="en-us_image_0237050217.png"></span> in the upper left corner and select the region or project.</span></li><li id="EN-US_TOPIC_0204851468__li63453165153059"><span>Under <strong id="EN-US_TOPIC_0204851468__b079781318445">Security</strong>, choose <strong id="EN-US_TOPIC_0204851468__b2798713114410">Anti-DDoS</strong>. The <strong id="EN-US_TOPIC_0204851468__b1979931314417">Security Console</strong> is displayed.</span></li><li id="EN-US_TOPIC_0204851468__li57308383154047"><span>Select the <span class="wintitle" id="EN-US_TOPIC_0204851468__wintitle171371310161810"><b>Public IP Addresses</b></span> tab, locate the target IP address and click <strong id="EN-US_TOPIC_0204851468__b171393448306">View Monitoring Report</strong> in the <strong id="EN-US_TOPIC_0204851468__b1928184703010">Operation</strong> column, as shown in <a href="#EN-US_TOPIC_0204851468__fig28737219154047">Figure 1</a></span><p><div class="fignone" id="EN-US_TOPIC_0204851468__fig28737219154047"><a name="EN-US_TOPIC_0204851468__fig28737219154047"></a><a name="fig28737219154047"></a><span class="figcap"><b>Figure 1 </b>Viewing a monitoring report</span><br><span><img id="EN-US_TOPIC_0204851468__image1064417233547" src="en-us_image_0217719594.png" title="Click to enlarge" class="imgResize"></span></div>
</p></li><li id="EN-US_TOPIC_0204851468__li48662965154047"><span>On the <strong id="EN-US_TOPIC_0204851468__b1698011526139">Monitoring Report</strong> page, view monitoring details about a public IP address.</span><p><ul id="EN-US_TOPIC_0204851468__ul60791544154234"><li id="EN-US_TOPIC_0204851468__li41176635154258">You can view information such as the current protection status, protection settings, and the traffic and anomalies within the last 24 hours.</li><li id="EN-US_TOPIC_0204851468__li10252986154234">A 24-hour defense traffic chart is generated from data points taken in five-minute intervals. It includes the following information:<ul id="EN-US_TOPIC_0204851468__ul1515561015433"><li id="EN-US_TOPIC_0204851468__li25168018154234"><strong id="EN-US_TOPIC_0204851468__b19261232134717">Traffic (Kbps)</strong> displays the traffic status of the selected ECS, including the incoming attack traffic and normal traffic.</li><li id="EN-US_TOPIC_0204851468__li25185576154234"><strong id="EN-US_TOPIC_0204851468__b2722791488">Packet Rate (pps)</strong> displays the packet rate of the selected ECS, including the attack packet rate and normal incoming packet rate.</li></ul>
</li><li id="EN-US_TOPIC_0204851468__li26840898154258">The attack event list within one day records DDoS attacks on the ECS within one day, including cleaning events and black hole events.</li></ul>
<div class="fignone" id="EN-US_TOPIC_0204851468__fig3537135062113"><span class="figcap"><b>Figure 2 </b>Monitoring report</span><br><span><img id="EN-US_TOPIC_0204851468__image04215477583" src="en-us_image_0217782662.png" title="Click to enlarge" class="imgResize"></span></div>
<div class="note" id="EN-US_TOPIC_0204851468__note1364428614829"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><p id="EN-US_TOPIC_0204851468__p1959631814829">On the <strong id="EN-US_TOPIC_0204851468__b1832318134915">Monitoring Report</strong> page, click <span><img id="EN-US_TOPIC_0204851468__image1645994211184" src="en-us_image_0237052378.png" title="Click to enlarge" class="imgResize"></span> to download the monitoring report about the public IP address.</p>
</div></div>
</p></li></ol>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0204851516.html">Operation Guide</a></div>
</div>
</div>
<script language="JavaScript">
<!--
image_size('.imgResize');
var msg_imageMax = "view original image";
var msg_imageClose = "close";
//--></script>

View File

@ -0,0 +1,10 @@
<a name="EN-US_TOPIC_0204851490"></a><a name="EN-US_TOPIC_0204851490"></a>
<h1 class="topictitle1">What Services Can Anti-DDoS Protect?</h1>
<div id="body1437659770695"><p id="EN-US_TOPIC_0204851490__p3061099162643">Anti-DDoS supports traffic cleaning only for ECSs, ELB instances, and BMSs on the public cloud.</p>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0204851505.html">FAQs</a></div>
</div>
</div>

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,54 @@
<a name="EN-US_TOPIC_0204851495"></a><a name="EN-US_TOPIC_0204851495"></a>
<h1 class="topictitle1">Enabling Alarm Notification</h1>
<div id="body1456122569721"><div class="section" id="EN-US_TOPIC_0204851495__section4936191910582"><h4 class="sectiontitle">Scenarios</h4><p id="EN-US_TOPIC_0204851495__p2460150516355">The alarm notification function sends you alarm notifications (by SMS or email) if a DDoS attack is detected. If you do not enable this function, you have to log in to the management console to view alarms.</p>
</div>
<div class="section" id="EN-US_TOPIC_0204851495__section242134019595"><h4 class="sectiontitle">Prerequisites</h4><p id="EN-US_TOPIC_0204851495__p1860231417218">You have obtained an account and its password to log in to the management console.</p>
</div>
<div class="section" id="EN-US_TOPIC_0204851495__section12143195913595"><h4 class="sectiontitle">Procedure</h4><ol id="EN-US_TOPIC_0204851495__ol96248416950"><li id="EN-US_TOPIC_0204851495__li2025699116950"><span>Log in to the management console.</span></li><li id="EN-US_TOPIC_0204851495__li12755253201958"><span>Click <span><img id="EN-US_TOPIC_0204851495__image49480915112" src="en-us_image_0237050217.png"></span> in the upper left corner and select the region or project.</span></li><li id="EN-US_TOPIC_0204851495__li3020355116950"><span>Under <strong id="EN-US_TOPIC_0204851495__b12246162215520">Security</strong>, choose <strong id="EN-US_TOPIC_0204851495__b8250922145513">Anti-DDoS</strong>. The <strong id="EN-US_TOPIC_0204851495__b1825622217555">Security Console</strong> is displayed.</span></li><li id="EN-US_TOPIC_0204851495__li20128731174757"><span>Select the <span class="wintitle" id="EN-US_TOPIC_0204851495__wintitle171371310161810"><b>Alarm Notifications</b></span> tab. On the displayed page, set the alarm notifications.</span><p><div class="fignone" id="EN-US_TOPIC_0204851495__fig1521873317493"><span class="figcap"><b>Figure 1 </b>Configuring alarm notifications</span><br><span><img id="EN-US_TOPIC_0204851495__image583154162111" src="en-us_image_0217501082.png" title="Click to enlarge" class="imgResize"></span></div>
<p id="EN-US_TOPIC_0204851495__p912659162211"></p>
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" id="EN-US_TOPIC_0204851495__table30322971175021" frame="border" border="1" rules="all"><caption><b>Table 1 </b>Parameter description</caption><thead align="left"><tr id="EN-US_TOPIC_0204851495__ree2ae48f896d4ec2bede69c7f3faa943"><th align="left" class="cellrowborder" valign="top" width="27.63%" id="mcps1.3.3.2.4.2.3.2.4.1.1"><p id="EN-US_TOPIC_0204851495__a13a961abe1bd4ae7833413b2d60d3077"><strong id="EN-US_TOPIC_0204851495__b8423527069918">Parameter</strong></p>
</th>
<th align="left" class="cellrowborder" valign="top" width="59.209999999999994%" id="mcps1.3.3.2.4.2.3.2.4.1.2"><p id="EN-US_TOPIC_0204851495__adcd709073c4c4f5ead440f1540e21651"><strong id="EN-US_TOPIC_0204851495__b842352706135554">Description</strong></p>
</th>
<th align="left" class="cellrowborder" valign="top" width="13.16%" id="mcps1.3.3.2.4.2.3.2.4.1.3"><p id="EN-US_TOPIC_0204851495__ab4a77fd6d83744fb823f1ae8916d6d7d"><strong id="EN-US_TOPIC_0204851495__b842352706105441">Example Value</strong></p>
</th>
</tr>
</thead>
<tbody><tr id="EN-US_TOPIC_0204851495__row1162064382412"><td class="cellrowborder" valign="top" width="27.63%" headers="mcps1.3.3.2.4.2.3.2.4.1.1 "><p id="EN-US_TOPIC_0204851495__p12105514172050">Alarm Notifications</p>
</td>
<td class="cellrowborder" valign="top" width="59.209999999999994%" headers="mcps1.3.3.2.4.2.3.2.4.1.2 "><p id="EN-US_TOPIC_0204851495__p11316655172050">Indicates whether the alarm notification function is enabled. There are two values:</p>
<ul id="EN-US_TOPIC_0204851495__ul25555843172050"><li id="EN-US_TOPIC_0204851495__li34123464172050"><span><img id="EN-US_TOPIC_0204851495__image1081851421410" src="en-us_image_0237055345.png"></span>: enabled</li><li id="EN-US_TOPIC_0204851495__li16236901172050"><span><img id="EN-US_TOPIC_0204851495__image171101033245" src="en-us_image_0237055521.png"></span>: disabled</li></ul>
<p id="EN-US_TOPIC_0204851495__p39747874172050">If the function is in disabled state, click <span><img id="EN-US_TOPIC_0204851495__image878155315243" src="en-us_image_0237055521.png"></span> to set it to <span><img id="EN-US_TOPIC_0204851495__image683534941215" src="en-us_image_0237055345.png"></span>.</p>
</td>
<td class="cellrowborder" valign="top" width="13.16%" headers="mcps1.3.3.2.4.2.3.2.4.1.3 "><p id="EN-US_TOPIC_0204851495__p36525361172033"><span><img id="EN-US_TOPIC_0204851495__image74912412138" src="en-us_image_0237055345.png"></span></p>
</td>
</tr>
<tr id="EN-US_TOPIC_0204851495__row462471113516"><td class="cellrowborder" valign="top" width="27.63%" headers="mcps1.3.3.2.4.2.3.2.4.1.1 "><p id="EN-US_TOPIC_0204851495__p45819551164949">SMN Topic</p>
</td>
<td class="cellrowborder" valign="top" width="59.209999999999994%" headers="mcps1.3.3.2.4.2.3.2.4.1.2 "><p id="EN-US_TOPIC_0204851495__p62760665165036">You can select an existing topic or click <strong id="EN-US_TOPIC_0204851495__b1177551861910">View Topic</strong> to create a topic.</p>
<p id="EN-US_TOPIC_0204851495__p12883729165036">For details about topics, see the <i><cite id="EN-US_TOPIC_0204851495__cite359fad7cafc3403eb8687df9a9d81e2f101327">Simple Message Notification User Guide</cite></i>.</p>
</td>
<td class="cellrowborder" valign="top" width="13.16%" headers="mcps1.3.3.2.4.2.3.2.4.1.3 "><p id="EN-US_TOPIC_0204851495__p2060682164949">N/A</p>
</td>
</tr>
</tbody>
</table>
</div>
</p></li><li id="EN-US_TOPIC_0204851495__li61481533163417"><span>Click <span class="uicontrol" id="EN-US_TOPIC_0204851495__uicontrol2585182015116"><b>Apply</b></span> to enable alarm notification.</span></li></ol>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0204851516.html">Operation Guide</a></div>
</div>
</div>
<script language="JavaScript">
<!--
image_size('.imgResize');
var msg_imageMax = "view original image";
var msg_imageClose = "close";
//--></script>

View File

@ -0,0 +1,12 @@
<a name="EN-US_TOPIC_0204851498"></a><a name="EN-US_TOPIC_0204851498"></a>
<h1 class="topictitle1">User Permissions</h1>
<div id="body8662426"><div class="p" id="EN-US_TOPIC_0204851498__p366227111256">The public cloud system provides two types of permissions by default: user management and resource management.<ul id="EN-US_TOPIC_0204851498__ul4027810512510"><li id="EN-US_TOPIC_0204851498__li2151927212512">User management refers to the management of users, user groups, and user group rights.</li><li id="EN-US_TOPIC_0204851498__li6101538612510">Resource management refers to the control operations that can be performed by users on cloud service resources.</li></ul>
</div>
<p id="EN-US_TOPIC_0204851498__p556181412556">For permissions of Anti-DDoS users, see <a href="https://docs.otc.t-systems.com/en-us/permissions/index.html" target="_blank" rel="noopener noreferrer">Permissions</a>.</p>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0204851460.html">Accessing and Using Anti-DDoS</a></div>
</div>
</div>

View File

@ -0,0 +1,14 @@
<a name="EN-US_TOPIC_0204851500"></a><a name="EN-US_TOPIC_0204851500"></a>
<h1 class="topictitle1">Application Scenarios</h1>
<div id="body40261524"><p id="EN-US_TOPIC_0204851500__p3647054154023">Anti-DDoS defends only EIPs against DDoS attacks.</p>
<p id="EN-US_TOPIC_0204851500__p1948638193314">Anti-DDoS devices are deployed at egresses of data centers. <a href="#EN-US_TOPIC_0204851500__fig5732364017363">Figure 1</a> shows the network topology.</p>
<p id="EN-US_TOPIC_0204851500__p13864282113152">The detection center detects network access traffic according to user-configured security policies. If an attack is detected, data is diverted to cleaning devices for real-time defense. Abnormal traffic is cleaned, and normal traffic is forwarded.</p>
<div class="fignone" id="EN-US_TOPIC_0204851500__fig5732364017363"><a name="EN-US_TOPIC_0204851500__fig5732364017363"></a><a name="fig5732364017363"></a><span class="figcap"><b>Figure 1 </b>Network topology</span><br><span><img class="vsd" id="EN-US_TOPIC_0204851500__image10610600142526" src="en-us_image_0204851523.png"></span></div>
<p id="EN-US_TOPIC_0204851500__p64116823104554"></p>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0023977447.html">Introduction</a></div>
</div>
</div>

View File

@ -0,0 +1,10 @@
<a name="EN-US_TOPIC_0204851501"></a><a name="EN-US_TOPIC_0204851501"></a>
<h1 class="topictitle1">How Do I Use Anti-DDoS?</h1>
<div id="body1466666097220"><p id="EN-US_TOPIC_0204851501__p35740427124">The Anti-DDoS protection is automatically enabled for the elastic IP addresses you purchased. If the protection is not enabled for any IP address, enable it by following the instructions in <a href="en-us_topic_0204851514.html#EN-US_TOPIC_0204851514__li974624615513">Enabling Anti-DDoS</a>.</p>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0204851505.html">FAQs</a></div>
</div>
</div>

View File

@ -0,0 +1,18 @@
<a name="EN-US_TOPIC_0204851505"></a><a name="EN-US_TOPIC_0204851505"></a>
<h1 class="topictitle1">FAQs</h1>
<div id="body1434096191980"></div>
<div>
<ul class="ullinks">
<li class="ulchildlink"><strong><a href="en-us_topic_0023977462.html">What Is Anti-DDoS?</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0204851490.html">What Services Can Anti-DDoS Protect?</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0204851501.html">How Do I Use Anti-DDoS?</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0204851458.html">What Kinds of Attacks Does Anti-DDoS Defend Against?</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0204851461.html">Will I Be Promptly Notified When an Attack Is Detected?</a></strong><br>
</li>
</ul>
</div>

View File

@ -0,0 +1,46 @@
<a name="EN-US_TOPIC_0204851508"></a><a name="EN-US_TOPIC_0204851508"></a>
<h1 class="topictitle1">Related Services</h1>
<div id="body8662426"><div class="section" id="EN-US_TOPIC_0204851508__s4ed2944294c94b9685dd0ad9acd2c361"><h4 class="sectiontitle">CTS</h4><p id="EN-US_TOPIC_0204851508__a2dbd105639564c8b84bf58ba20e01378">Cloud Trace Service (CTS) provides you with a history of Anti-DDoS operations. After enabling CTS, you can view all generated traces to review and audit performed Anti-DDoS operations. For details, see the <i><cite id="EN-US_TOPIC_0204851508__cited56d1c46252048ad8a6b9bd00d7bbc3a154155">Cloud Trace Service User Guide</cite></i>.</p>
<ul id="EN-US_TOPIC_0204851508__ul1380517251614"><li id="EN-US_TOPIC_0204851508__li1880515251215">Anti-DDoS operations that can be recorded by CTS
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" id="EN-US_TOPIC_0204851508__t8517317c2d5f4e93a9d56077b4dec2aa" frame="border" border="1" rules="all"><caption><b>Table 1 </b>Anti-DDoS operations that can be recorded by CTS</caption><thead align="left"><tr id="EN-US_TOPIC_0204851508__r71578f6d75db4ac0a267f3c568120a52"><th align="left" class="cellrowborder" valign="top" width="55.85%" id="mcps1.3.1.3.1.1.2.3.1.1"><p id="EN-US_TOPIC_0204851508__afadd5afcfbee4372afd773bc8cbf6116">Operation</p>
</th>
<th align="left" class="cellrowborder" valign="top" width="44.15%" id="mcps1.3.1.3.1.1.2.3.1.2"><p id="EN-US_TOPIC_0204851508__a602681b4740847c4894d9382fbd51ac6">Trace Name</p>
</th>
</tr>
</thead>
<tbody><tr id="EN-US_TOPIC_0204851508__r0f66a4ec148e4fb3b0c081ced721672c"><td class="cellrowborder" valign="top" width="55.85%" headers="mcps1.3.1.3.1.1.2.3.1.1 "><p id="EN-US_TOPIC_0204851508__p3689577916038">Enabling Anti-DDoS</p>
</td>
<td class="cellrowborder" valign="top" width="44.15%" headers="mcps1.3.1.3.1.1.2.3.1.2 "><p id="EN-US_TOPIC_0204851508__p23847134191911">openAntiddos</p>
</td>
</tr>
<tr id="EN-US_TOPIC_0204851508__r460f7b2568c249d99d7d57dbb59f1ba9"><td class="cellrowborder" valign="top" width="55.85%" headers="mcps1.3.1.3.1.1.2.3.1.1 "><p id="EN-US_TOPIC_0204851508__p858403916038">Disabling Anti-DDoS</p>
</td>
<td class="cellrowborder" valign="top" width="44.15%" headers="mcps1.3.1.3.1.1.2.3.1.2 "><p id="EN-US_TOPIC_0204851508__p28400374191931">deleteAntiddos</p>
</td>
</tr>
<tr id="EN-US_TOPIC_0204851508__r3e7c2fe75a1c4d579504534f6ac8e8db"><td class="cellrowborder" valign="top" width="55.85%" headers="mcps1.3.1.3.1.1.2.3.1.1 "><p id="EN-US_TOPIC_0204851508__p1436225216038">Adjusting Anti-DDoS security settings</p>
</td>
<td class="cellrowborder" valign="top" width="44.15%" headers="mcps1.3.1.3.1.1.2.3.1.2 "><p id="EN-US_TOPIC_0204851508__p65888903191945">updateAntiddos</p>
</td>
</tr>
</tbody>
</table>
</div>
</li><li id="EN-US_TOPIC_0204851508__li1020711581382">Using CTS to view Anti-DDoS audit logs<ol id="EN-US_TOPIC_0204851508__ol3592143112715"><li id="EN-US_TOPIC_0204851508__li10591113182710">Log in to the management console.</li><li id="EN-US_TOPIC_0204851508__li15591193152715">Click <span><img id="EN-US_TOPIC_0204851508__image20263174620282" src="en-us_image_0237050217.png"></span> in the upper left corner to select a region or project.</li><li id="EN-US_TOPIC_0204851508__li125913392718">Select <strong id="EN-US_TOPIC_0204851508__b842352706152442">Cloud Trace Service</strong> under <strong id="EN-US_TOPIC_0204851508__b842352706152451">Management &amp; Deployment</strong>.</li><li id="EN-US_TOPIC_0204851508__li175915318273">In the left navigation pane, choose <strong>Trace List</strong>.</li><li id="EN-US_TOPIC_0204851508__li13914856125615">You can use filters to query traces. The following four filters are available:<ul id="EN-US_TOPIC_0204851508__ul15591630276"><li id="EN-US_TOPIC_0204851508__li159153122710"><strong id="EN-US_TOPIC_0204851508__b84235270615318">Trace Source</strong>, <strong id="EN-US_TOPIC_0204851508__b842352706153112">Resource Type</strong>, and <strong id="EN-US_TOPIC_0204851508__b842352706153114">Search By</strong><ul id="EN-US_TOPIC_0204851508__ul1659133142716"><li id="EN-US_TOPIC_0204851508__li15911310271">Select query conditions from the drop-down list, for example, choose <strong id="EN-US_TOPIC_0204851508__b8423527061816">Anti-DDoS</strong> &gt; <strong id="EN-US_TOPIC_0204851508__b84235270618111">anti-ddos</strong> &gt; <strong id="EN-US_TOPIC_0204851508__b842352706202852">Trace name</strong> &gt; <strong id="EN-US_TOPIC_0204851508__b842352706202855">openAntiddos</strong> to query all Anti-DDoS enabling operations.</li><li id="EN-US_TOPIC_0204851508__li359115392711"><strong id="EN-US_TOPIC_0204851508__b842352706202955">Trace name</strong>: This option allows you to select a trace name, such as <strong id="EN-US_TOPIC_0204851508__b842352706203029">openAntiddos</strong>.</li><li id="EN-US_TOPIC_0204851508__li1459111392714"><strong id="EN-US_TOPIC_0204851508__b842352706203119">Resource ID</strong>: This option allows you to select or manually enter the ID of the instance for which you want to view audit logs.</li><li id="EN-US_TOPIC_0204851508__li155915319272"><strong id="EN-US_TOPIC_0204851508__b842352706203150">Resource name</strong>: This option allows you to select or manually enter the name of the instance for which you want to view audit logs.</li></ul>
</li></ul>
<ul id="EN-US_TOPIC_0204851508__ul75927313274"><li id="EN-US_TOPIC_0204851508__li15911239278"><strong>Operator</strong>: Select a specific operator (at user level rather than tenant level).</li><li id="EN-US_TOPIC_0204851508__li1659233112712"><strong>Trace Status</strong>: Available options include <strong>All trace statuses</strong>, <strong>normal</strong>, <strong>warning</strong>, and <strong>incident</strong>. You can only select one of them.</li><li id="EN-US_TOPIC_0204851508__li3592230279">Start time and end time: You can specify the time period to query traces.</li></ul>
</li><li id="EN-US_TOPIC_0204851508__li175927315279">Click <span><img id="EN-US_TOPIC_0204851508__image481165065203238" src="en-us_image_0204851462.png"></span> on the left of the record to be queried to extend its details.</li><li id="EN-US_TOPIC_0204851508__li1859217342713">In the row containing the desired record, click <strong id="EN-US_TOPIC_0204851508__b842352706203353">View Trace</strong>.</li></ol>
</li></ul>
</div>
<div class="section" id="EN-US_TOPIC_0204851508__section16851842101240"><h4 class="sectiontitle">IAM</h4><p id="EN-US_TOPIC_0204851508__p25972272192329">Identity and Access Management (IAM) provides the permission management function for Anti-DDoS. Only users who have Anti-DDoS Administrator permissions can use Anti-DDoS. To apply for Anti-DDoS Administrator permissions, contact a user with Security Administrator permissions. For details, see the <em id="EN-US_TOPIC_0204851508__i84235269793348">Identity and Access Management User Guide</em>.</p>
</div>
<div class="section" id="EN-US_TOPIC_0204851508__section329492519538"><h4 class="sectiontitle">SMN</h4><p id="EN-US_TOPIC_0204851508__p669390194616">The Simple Message Notification (SMN) service provides the notification function. When alarm notification is enabled in Anti-DDoS, you will receive alarm messages by SMS or email if your IP address is under a DDoS attack.</p>
<p id="EN-US_TOPIC_0204851508__p534053169548">For details about SMN, see the <em id="EN-US_TOPIC_0204851508__i842352697152339">Simple Message Notification User Guide</em>.</p>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0204851460.html">Accessing and Using Anti-DDoS</a></div>
</div>
</div>

View File

@ -0,0 +1,27 @@
<a name="EN-US_TOPIC_0204851509"></a><a name="EN-US_TOPIC_0204851509"></a>
<h1 class="topictitle1">Viewing an Interception Report</h1>
<div id="body1466566949281"><div class="section" id="EN-US_TOPIC_0204851509__section17395142512253"><h4 class="sectiontitle">Scenarios</h4><p id="EN-US_TOPIC_0204851509__p2754248105512">This topic describes how to view the protection statistics, including the traffic cleaning frequency, cleaned traffic amount, weekly top 10 attacked public IP addresses, and total number of intercepted attacks of all public IP addresses of a user.</p>
</div>
<div class="section" id="EN-US_TOPIC_0204851509__section12107193742510"><h4 class="sectiontitle">Prerequisites</h4><p id="EN-US_TOPIC_0204851509__p843414521251">You have obtained an account and its password to log in to the management console.</p>
</div>
<div class="section" id="EN-US_TOPIC_0204851509__section138668540256"><h4 class="sectiontitle">Procedure</h4><ol id="EN-US_TOPIC_0204851509__ol28181714154553"><li id="EN-US_TOPIC_0204851509__li50785800154553"><span>Log in to the management console.</span></li><li id="EN-US_TOPIC_0204851509__li22542612202124"><span>Click <span><img id="EN-US_TOPIC_0204851509__image1025102915175" src="en-us_image_0237050217.png"></span> in the upper left corner and select the desired region or project.</span></li><li id="EN-US_TOPIC_0204851509__li63453165153059"><span>Under <strong id="EN-US_TOPIC_0204851509__b12870142914552">Security</strong>, choose <strong id="EN-US_TOPIC_0204851509__b1087510293556">Anti-DDoS</strong>. The <strong id="EN-US_TOPIC_0204851509__b17880329135514">Security Console</strong> is displayed.</span></li><li id="EN-US_TOPIC_0204851509__li32957463154553"><span>Select the <span class="wintitle" id="EN-US_TOPIC_0204851509__wintitle171371310161810"><b>Statistics</b></span> tab and view the protection statistics of all public IP addresses of a user, as shown in <a href="#EN-US_TOPIC_0204851509__fig1644131633612">Figure 1</a>.</span><p><p id="EN-US_TOPIC_0204851509__p101871173275">You can set <strong id="EN-US_TOPIC_0204851509__b1542509466">Report Date</strong> to view the security report within a specified time range (one week long). You can query statistics of the last four weeks, including the number of cleaning times, cleaned traffic volume, top 10 attacked public IP addresses, and total number of intercepted attacks.</p>
<div class="fignone" id="EN-US_TOPIC_0204851509__fig1644131633612"><a name="EN-US_TOPIC_0204851509__fig1644131633612"></a><a name="fig1644131633612"></a><span class="figcap"><b>Figure 1 </b>Interception report</span><br><span><img id="EN-US_TOPIC_0204851509__image229912476281" src="en-us_image_0217727368.png" title="Click to enlarge" class="imgResize"></span></div>
<div class="note" id="EN-US_TOPIC_0204851509__note1718110141943"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><p id="EN-US_TOPIC_0204851509__p1959631814829">On the <strong id="EN-US_TOPIC_0204851509__b1240267901">Statistics</strong> page, click <span><img id="EN-US_TOPIC_0204851509__image420641616209" src="en-us_image_0237052378.png" title="Click to enlarge" class="imgResize"></span> to download monitoring reports to view protection statistics of a certain period of time.</p>
</div></div>
</p></li></ol>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0204851516.html">Operation Guide</a></div>
</div>
</div>
<script language="JavaScript">
<!--
image_size('.imgResize');
var msg_imageMax = "view original image";
var msg_imageClose = "close";
//--></script>

View File

@ -0,0 +1,13 @@
<a name="EN-US_TOPIC_0204851513"></a><a name="EN-US_TOPIC_0204851513"></a>
<h1 class="topictitle1">Region and AZ</h1>
<div id="body1502335136582"><p id="EN-US_TOPIC_0204851513__a2354cfba390943ee9f0bd31084e2fd82">A region is a geographic area where resources used by Anti-DDoS are located.</p>
<p id="EN-US_TOPIC_0204851513__p57680708113340">Availability zones (AZs) in the same region can communicate with each other over the intranet, but those in different regions cannot.</p>
<p id="EN-US_TOPIC_0204851513__p51261127113531">The public cloud has data centers in different regions around the world. Therefore, Anti-DDoS can be used in different regions. Anti-DDoS is designed to meet users' customized requirements or local legal or other requirements in different regions.</p>
<p id="EN-US_TOPIC_0204851513__p49364327113340">Each region contains many AZs where power and networks are physically isolated. AZs in the same region can communicate with each other over the intranet. Each AZ provides cost-effective and low-latency network connections that are unaffected by faults that may occur in other AZs. Therefore, deploying Anti-DDoS in separate AZs protects your applications against local faults that occur in a specific location.</p>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0023977447.html">Introduction</a></div>
</div>
</div>

View File

@ -0,0 +1,25 @@
<a name="EN-US_TOPIC_0204851514"></a><a name="EN-US_TOPIC_0204851514"></a>
<h1 class="topictitle1">Enabling Anti-DDoS</h1>
<div id="body1466567049171"><div class="section" id="EN-US_TOPIC_0204851514__section1490345194616"><h4 class="sectiontitle">Scenarios</h4><p id="EN-US_TOPIC_0204851514__p8197871415">The Anti-DDoS protection is automatically enabled for the public IP addresses you purchased. If protection is not enabled for any IP address, enable it by following the instructions provided in this topic. The Anti-DDoS service then protects your IP addresses against DDoS attacks.</p>
</div>
<div class="section" id="EN-US_TOPIC_0204851514__section109235264484"><h4 class="sectiontitle">Prerequisites</h4><ul id="EN-US_TOPIC_0204851514__ul29314945172328"><li id="EN-US_TOPIC_0204851514__li55099500172328">You have obtained an account and its password to log in to the management console.</li><li id="EN-US_TOPIC_0204851514__li59480879172328">You have not enabled Anti-DDoS for your IP addresses.</li></ul>
</div>
<div class="section" id="EN-US_TOPIC_0204851514__section1614473784811"><h4 class="sectiontitle">Procedure</h4><ol id="EN-US_TOPIC_0204851514__ol5929102215513"><li id="EN-US_TOPIC_0204851514__li974624615513"><a name="EN-US_TOPIC_0204851514__li974624615513"></a><a name="li974624615513"></a><span>Log in to the management console.</span></li><li id="EN-US_TOPIC_0204851514__li36060173201823"><span>Click <span><img id="EN-US_TOPIC_0204851514__image20939288918" src="en-us_image_0237050217.png"></span> in the upper left corner and select the desired region or project.</span></li><li id="EN-US_TOPIC_0204851514__li5858326415513"><span>Under <strong id="EN-US_TOPIC_0204851514__b16805195220470">Security</strong>, choose <strong id="EN-US_TOPIC_0204851514__b9806105294710">Anti-DDoS</strong>. The <strong id="EN-US_TOPIC_0204851514__b17807165274712">Security Console</strong> is displayed.</span></li><li id="EN-US_TOPIC_0204851514__li8687111113119"><span>Click the <span class="wintitle" id="EN-US_TOPIC_0204851514__wintitle292815389272"><b>Public IP Addresses</b></span> tab, locate the row that contains the unprotected IP address, and click <span class="uicontrol" id="EN-US_TOPIC_0204851514__uicontrol1292863815279"><b>Enable Anti-DDoS</b></span> in the <strong id="EN-US_TOPIC_0204851514__b20995542714">Operation</strong> column, as shown in <a href="#EN-US_TOPIC_0204851514__fig193873431206">Figure 1</a>.</span><p><div class="fignone" id="EN-US_TOPIC_0204851514__fig193873431206"><a name="EN-US_TOPIC_0204851514__fig193873431206"></a><a name="fig193873431206"></a><span class="figcap"><b>Figure 1 </b>Public IP Addresses</span><br><span><img id="EN-US_TOPIC_0204851514__image82300498186" src="en-us_image_0217500718.png" title="Click to enlarge" class="imgResize"></span></div>
</p></li><li id="EN-US_TOPIC_0204851514__li5614346915513"><span>In the displayed <strong id="EN-US_TOPIC_0204851514__b5753371285">Enable Anti-DDoS</strong> dialog box, click <strong id="EN-US_TOPIC_0204851514__b14894111722814">Yes</strong>.</span><p><div class="fignone" id="EN-US_TOPIC_0204851514__fig7648207181819"><span class="figcap"><b>Figure 2 </b>Enabling Anti-DDoS</span><br><span><img id="EN-US_TOPIC_0204851514__image17171152411918" src="en-us_image_0217500934.png"></span></div>
</p></li></ol>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0204851516.html">Operation Guide</a></div>
</div>
</div>
<script language="JavaScript">
<!--
image_size('.imgResize');
var msg_imageMax = "view original image";
var msg_imageClose = "close";
//--></script>

View File

@ -0,0 +1,20 @@
<a name="EN-US_TOPIC_0204851516"></a><a name="EN-US_TOPIC_0204851516"></a>
<h1 class="topictitle1">Operation Guide</h1>
<div id="body30896486"></div>
<div>
<ul class="ullinks">
<li class="ulchildlink"><strong><a href="en-us_topic_0258573747.html">Setting a Default Protection Policy for Newly Purchased Public IP Addresses</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0204851514.html">Enabling Anti-DDoS</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0204851495.html">Enabling Alarm Notification</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0204851517.html">Adjusting Security Settings</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0204851468.html">Viewing a Monitoring Report</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0204851509.html">Viewing an Interception Report</a></strong><br>
</li>
</ul>
</div>

View File

@ -0,0 +1,66 @@
<a name="EN-US_TOPIC_0204851517"></a><a name="EN-US_TOPIC_0204851517"></a>
<h1 class="topictitle1">Adjusting Security Settings</h1>
<div id="body1432542610285"><div class="section" id="EN-US_TOPIC_0204851517__section104821493819"><h4 class="sectiontitle">Scenarios</h4><p id="EN-US_TOPIC_0204851517__p281751915824">You can adjust security settings after Anti-DDoS is enabled.</p>
</div>
<div class="section" id="EN-US_TOPIC_0204851517__section9733010918"><h4 class="sectiontitle">Prerequisites</h4><p id="EN-US_TOPIC_0204851517__p27781655192010">You have obtained an account and its password to log in to the management console.</p>
</div>
<div class="section" id="EN-US_TOPIC_0204851517__section164521218919"><h4 class="sectiontitle">Procedure</h4><ol id="EN-US_TOPIC_0204851517__ol8556847152556"><li id="EN-US_TOPIC_0204851517__li8960030151422"><span>Log in to the management console.</span></li><li id="EN-US_TOPIC_0204851517__li61227481202044"><span>Click <span><img id="EN-US_TOPIC_0204851517__image463972411519" src="en-us_image_0237050217.png"></span> in the upper left corner and select the desired region or project.</span></li><li id="EN-US_TOPIC_0204851517__li63453165153059"><span>Under <strong id="EN-US_TOPIC_0204851517__b46581629132919">Security</strong>, choose <strong id="EN-US_TOPIC_0204851517__b1265920292299">Anti-DDoS</strong>. The <strong id="EN-US_TOPIC_0204851517__b7659122932918">Security Console</strong> is displayed.</span></li><li id="EN-US_TOPIC_0204851517__li57147559152644"><span>Select the <span class="wintitle" id="EN-US_TOPIC_0204851517__wintitle171371310161810"><b>Public IP Addresses</b></span> tab, locate the row that contains the IP address for which protection settings need to be modified, and click <span class="wintitle" id="EN-US_TOPIC_0204851517__wintitle194518411194"><b>Set Protection</b></span> in the <strong id="EN-US_TOPIC_0204851517__b15639135871816">Operation</strong> column, as shown in <a href="#EN-US_TOPIC_0204851517__fig6189986015278">Figure 1</a>.</span><p><div class="fignone" id="EN-US_TOPIC_0204851517__fig6189986015278"><a name="EN-US_TOPIC_0204851517__fig6189986015278"></a><a name="fig6189986015278"></a><span class="figcap"><b>Figure 1 </b>Public IP address list</span><br><span><img id="EN-US_TOPIC_0204851517__image19952936124911" src="en-us_image_0217719114.png" title="Click to enlarge" class="imgResize"></span></div>
</p></li><li id="EN-US_TOPIC_0204851517__li1760802152556"><span>In the displayed <span class="wintitle" id="EN-US_TOPIC_0204851517__wintitle1272110207362"><b>Set Protection</b></span> dialog box, set required parameters, as shown in <a href="#EN-US_TOPIC_0204851517__fig415543111219">Figure 2</a>.</span><p><div class="fignone" id="EN-US_TOPIC_0204851517__fig415543111219"><a name="EN-US_TOPIC_0204851517__fig415543111219"></a><a name="fig415543111219"></a><span class="figcap"><b>Figure 2 </b>Page for setting protection parameters</span><br><span><img id="EN-US_TOPIC_0204851517__image18577037195813" src="en-us_image_0248191753.png" title="Click to enlarge" class="imgResize"></span></div>
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" id="EN-US_TOPIC_0204851517__table84181091119" frame="border" border="1" rules="all"><caption><b>Table 1 </b>Parameter description</caption><thead align="left"><tr id="EN-US_TOPIC_0204851517__row941711013115"><th align="left" class="cellrowborder" valign="top" width="20.3%" id="mcps1.3.3.2.5.2.2.2.3.1.1"><p id="EN-US_TOPIC_0204851517__p13417140201120"><strong id="EN-US_TOPIC_0204851517__b543889356144253">Parameter</strong></p>
</th>
<th align="left" class="cellrowborder" valign="top" width="79.7%" id="mcps1.3.3.2.5.2.2.2.3.1.2"><p id="EN-US_TOPIC_0204851517__p16417704114"><strong id="EN-US_TOPIC_0204851517__b4102827915513">Description</strong></p>
</th>
</tr>
</thead>
<tbody><tr id="EN-US_TOPIC_0204851517__row296916541259"><td class="cellrowborder" valign="top" width="20.3%" headers="mcps1.3.3.2.5.2.2.2.3.1.1 "><p id="EN-US_TOPIC_0204851517__p3970554192510">Protection Settings</p>
</td>
<td class="cellrowborder" valign="top" width="79.7%" headers="mcps1.3.3.2.5.2.2.2.3.1.2 "><ul id="EN-US_TOPIC_0204851517__ul9262156192818"><li id="EN-US_TOPIC_0204851517__li7262146102810"><strong id="EN-US_TOPIC_0204851517__b166082315911">Default</strong>: In this mode, <strong id="EN-US_TOPIC_0204851517__b11795184613617">Traffic Cleaning Threshold</strong> is fixed at <strong id="EN-US_TOPIC_0204851517__b17444122414373">300 Mbps</strong>. When the service UDP traffic is greater than <strong id="EN-US_TOPIC_0204851517__b16545192313199">300 Mbps</strong> or the TCP traffic is greater than <span class="parmvalue" id="EN-US_TOPIC_0204851517__parmvalue035831615018"><b>90000 pps</b></span>, traffic scrubbing is triggered and Anti-DDoS will automatically intercept the attack traffic.</li><li id="EN-US_TOPIC_0204851517__li1195941582814"><strong id="EN-US_TOPIC_0204851517__b16494903337">Manual</strong>: In this mode, you can set the value of <strong id="EN-US_TOPIC_0204851517__b624112156411">Traffic Cleaning Threshold</strong> based on your service needs and enable <strong id="EN-US_TOPIC_0204851517__b774405112416">CC Defense</strong>.</li></ul>
<div class="note" id="EN-US_TOPIC_0204851517__note07513431808"><span class="notetitle"> NOTE: </span><div class="notebody"><ul id="EN-US_TOPIC_0204851517__en-us_topic_0204851524_ul5873919185614"><li id="EN-US_TOPIC_0204851517__en-us_topic_0204851524_li28731419135619">Mbps = Mbit/s (short for 1,000,000 bit/s). It is a unit of transmission rate and refers to the number of bits transmitted per second.</li><li id="EN-US_TOPIC_0204851517__en-us_topic_0204851524_li1287311198565">PPS, short for Packets Per Second, is a measure of throughput for network devices. It means the number of packets sent per second.</li></ul>
</div></div>
</td>
</tr>
<tr id="EN-US_TOPIC_0204851517__row2418805113"><td class="cellrowborder" valign="top" width="20.3%" headers="mcps1.3.3.2.5.2.2.2.3.1.1 "><p id="EN-US_TOPIC_0204851517__p134171306118">Traffic Cleaning Threshold</p>
</td>
<td class="cellrowborder" valign="top" width="79.7%" headers="mcps1.3.3.2.5.2.2.2.3.1.2 "><p id="EN-US_TOPIC_0204851517__p94181009119">Anti-DDoS scrubs traffic when detecting that the incoming traffic of an IP address exceeds the threshold.</p>
<ul id="EN-US_TOPIC_0204851517__ul151454553354"><li id="EN-US_TOPIC_0204851517__li014511553354">The default value of <strong id="EN-US_TOPIC_0204851517__b126312003465">Traffic Cleaning Threshold</strong> is fixed at <strong id="EN-US_TOPIC_0204851517__b2616153424511">300 Mbps</strong> when <strong id="EN-US_TOPIC_0204851517__b195362864513">Protection Settings</strong> is set to <strong id="EN-US_TOPIC_0204851517__b1844133914457">Default</strong>.</li><li id="EN-US_TOPIC_0204851517__li131455558357">If you need to change the value of <strong id="EN-US_TOPIC_0204851517__b320665012464">Traffic Cleaning Threshold</strong>, set <strong id="EN-US_TOPIC_0204851517__b13766133511488">Protection Settings</strong> to <strong id="EN-US_TOPIC_0204851517__b623764354814">Manual</strong>. Then you can set the traffic cleaning threshold based on your service traffic. You are advised to set the threshold to a value closest to the purchased bandwidth but not greater than the purchased bandwidth.<p id="EN-US_TOPIC_0204851517__p1919135214219">If <strong id="EN-US_TOPIC_0204851517__b1727055125118">Traffic Cleaning Threshold</strong> is set to <strong id="EN-US_TOPIC_0204851517__b1572825545117">Unlimited</strong>, your public IP addresses get almost no protection from DDoS attacks.</p>
</li></ul>
<div class="note" id="EN-US_TOPIC_0204851517__note520641233713"><span class="notetitle"> NOTE: </span><div class="notebody"><p id="EN-US_TOPIC_0204851517__p14233151211370">If your service traffic is larger than the value of <strong id="EN-US_TOPIC_0204851517__b1393451184618">Traffic Cleaning Threshold</strong> you set, traffic scrubbing is triggered. Only attack traffic is intercepted. If service traffic does not trigger scrubbing, no traffic is intercepted.</p>
</div></div>
</td>
</tr>
<tr id="EN-US_TOPIC_0204851517__row1941817061112"><td class="cellrowborder" valign="top" width="20.3%" headers="mcps1.3.3.2.5.2.2.2.3.1.1 "><p id="EN-US_TOPIC_0204851517__p11418150121116">CC Defense</p>
</td>
<td class="cellrowborder" valign="top" width="79.7%" headers="mcps1.3.3.2.5.2.2.2.3.1.2 "><ul id="EN-US_TOPIC_0204851517__ul141814011119"><li id="EN-US_TOPIC_0204851517__li20524341144410"><strong id="EN-US_TOPIC_0204851517__b3849129115210">CC Defense</strong> is set to <strong id="EN-US_TOPIC_0204851517__b1714523885218">Disable</strong> automatically when <strong id="EN-US_TOPIC_0204851517__b13783251175110">Protection Settings</strong> is set to <strong id="EN-US_TOPIC_0204851517__b11373175615112">Default</strong>. Note that only <strong id="EN-US_TOPIC_0204851517__b13518263538">CC Defense</strong> rather than Anti-DDoS protection is disabled.</li><li id="EN-US_TOPIC_0204851517__li1118533061710">If <strong id="EN-US_TOPIC_0204851517__b7580105612275">Protection Settings</strong> is set to <strong id="EN-US_TOPIC_0204851517__b185816565277">Manual</strong>, you can enable <strong id="EN-US_TOPIC_0204851517__b358211560273">CC Defense</strong> based on your service needs.<div class="note" id="EN-US_TOPIC_0204851517__note165281359101620"><span class="notetitle"> NOTE: </span><div class="notebody"><p id="EN-US_TOPIC_0204851517__p19528195921612">CC defense is available only for clients that carry web services and support the full HTTP protocol stack. This is because CC defense works in redirection or redirection+verification code mode. If your client does not support the full HTTP protocol stack, you are advised to disable CC defense.</p>
</div></div>
</li></ul>
</td>
</tr>
<tr id="EN-US_TOPIC_0204851517__row399342155012"><td class="cellrowborder" valign="top" width="20.3%" headers="mcps1.3.3.2.5.2.2.2.3.1.1 "><p id="EN-US_TOPIC_0204851517__p5992042145016">HTTP Request Threshold</p>
</td>
<td class="cellrowborder" valign="top" width="79.7%" headers="mcps1.3.3.2.5.2.2.2.3.1.2 "><p id="EN-US_TOPIC_0204851517__p1610054210500">This parameter is required only when <strong id="EN-US_TOPIC_0204851517__b1480711115575">CC Defense</strong> is set to <strong id="EN-US_TOPIC_0204851517__b2398105316578">Enable</strong>. The unit is qps (short for queries per second). QPS is a common measure of the amount of search traffic an information retrieval system, such as a search engine or a database, receives during one second.</p>
<p id="EN-US_TOPIC_0204851517__p162141923191417">This parameter is used to defend against a large number of malicious requests targeting websites. Defense against CC attacks, which aim to exhaust server resources by sending specially crafted GET or POST requests, is triggered when the HTTP request rate on a site reaches the selected value. In EIP protection, the maximum recommended value is <strong id="EN-US_TOPIC_0204851517__b173791715195816">5000</strong>. In ELB protection, the value can be larger</p>
<p id="EN-US_TOPIC_0204851517__p7814822195420">You are advised to set this parameter to the maximum number of HTTP requests that can be processed by the deployed service. Anti-DDoS will automatically scrub traffic if detecting that the total number of requests exceeds the configured HTTP request threshold. If the value is too large, CC defense will not be triggered promptly.</p>
<ul id="EN-US_TOPIC_0204851517__ul1981412245413"><li id="EN-US_TOPIC_0204851517__li581412245410">If the actual HTTP request rate is smaller than the configured value, the deployed service is able to process all HTTP requests, and Anti-DDoS does not need to be involved.</li><li id="EN-US_TOPIC_0204851517__li9814152210541">If the actual HTTP request rate is greater than or equal to the configured value, Anti-DDoS triggers CC defense to analyze and check each request, which affects responses to normal requests.</li></ul>
</td>
</tr>
</tbody>
</table>
</div>
</p></li><li id="EN-US_TOPIC_0204851517__li8407301152556"><span>Click <strong id="EN-US_TOPIC_0204851517__b842352706152247">OK</strong> to save the settings.</span></li></ol>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0204851516.html">Operation Guide</a></div>
</div>
</div>
<script language="JavaScript">
<!--
image_size('.imgResize');
var msg_imageMax = "view original image";
var msg_imageClose = "close";
//--></script>

View File

@ -0,0 +1,10 @@
<a name="EN-US_TOPIC_0204851520"></a><a name="EN-US_TOPIC_0204851520"></a>
<h1 class="topictitle1">Project</h1>
<div id="body1502335388008"><p id="EN-US_TOPIC_0204851520__aa8689ff2bd584c43b7c88254308b570a">Projects are used to group and isolate OpenStack resources, including computing, storage, and network resources. Multiple projects can be created for one account. A project can be a department or a project team.</p>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0023977447.html">Introduction</a></div>
</div>
</div>

View File

@ -0,0 +1,24 @@
<a name="EN-US_TOPIC_0204851524"></a><a name="EN-US_TOPIC_0204851524"></a>
<h1 class="topictitle1">How to Use Anti-DDoS</h1>
<div id="body8662426"><div class="p" id="EN-US_TOPIC_0204851524__p4887506616264">Description:<ul id="EN-US_TOPIC_0204851524__ul41028350162615"><li id="EN-US_TOPIC_0204851524__li14362393163441">Anti-DDoS defends IP addresses against DDoS attacks after you enable it.<ul id="EN-US_TOPIC_0204851524__ul106955012413"><li id="EN-US_TOPIC_0204851524__li8561577349">Anti-DDoS can automatically enable the protection</li><li id="EN-US_TOPIC_0204851524__li11883151014348">Before purchasing a public IP address, you can log in to the Anti-DDoS management console and click <strong id="EN-US_TOPIC_0204851524__b14800165116436">Set Default Protection Policy</strong> on the <strong id="EN-US_TOPIC_0204851524__b394419994420">Public IP Addresses</strong> tab page to set the default protection policy for the new public IP address. Then, DDoS protection that implements the configured default protection policy is automatically enabled for the newly purchased public IP addresses.<div class="fignone" id="EN-US_TOPIC_0204851524__fig9805102716331"><span class="figcap"><b>Figure 1 </b>Setting the default protection policy</span><br><span><img id="EN-US_TOPIC_0204851524__image780572712338" src="en-us_image_0258870399.png" title="Click to enlarge" class="imgResize"></span></div>
</li><li id="EN-US_TOPIC_0204851524__li16670135114357">If you do not set a default protection policy for the newly purchased public IP addresses, the <strong id="EN-US_TOPIC_0204851524__b1295382513510">Protection Settings</strong> in <strong id="EN-US_TOPIC_0204851524__b131831838183514">Default</strong> mode apply to the IP addresses, as shown in <a href="#EN-US_TOPIC_0204851524__fig1187371918561">Figure 2</a>.<div class="note" id="EN-US_TOPIC_0204851524__note510325711358"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><ul id="EN-US_TOPIC_0204851524__ul117941419133920"><li id="EN-US_TOPIC_0204851524__li1164074373918">When the service UDP traffic is greater than <strong id="EN-US_TOPIC_0204851524__b1812414725112">300 Mbps</strong> or the TCP traffic is greater than <strong id="EN-US_TOPIC_0204851524__b29368019528">90000 pps</strong>, traffic scrubbing is triggered and Anti-DDoS will automatically intercept the attack traffic.</li><li id="EN-US_TOPIC_0204851524__li28731419135619">Mbps = Mbit/s (short for 1,000,000 bit/s). It is a unit of transmission rate and refers to the number of bits transmitted per second.</li><li id="EN-US_TOPIC_0204851524__li579461910395">PPS, short for Packets Per Second, is a measure of throughput for network devices. It means the number of packets sent per second.</li></ul>
</div></div>
<div class="fignone" id="EN-US_TOPIC_0204851524__fig1187371918561"><a name="EN-US_TOPIC_0204851524__fig1187371918561"></a><a name="fig1187371918561"></a><span class="figcap"><b>Figure 2 </b>Default protection settings</span><br><span><img id="EN-US_TOPIC_0204851524__image71631638194310" src="en-us_image_0258875446.png" title="Click to enlarge" class="imgResize"></span></div>
</li><li id="EN-US_TOPIC_0204851524__li89334125016">If protection is not enabled for an elastic IP address, enable the protection by referring to <a href="en-us_topic_0204851514.html">Enabling Anti-DDoS</a>.</li><li id="EN-US_TOPIC_0204851524__li1752093813382">If you delete an elastic IP address, Anti-DDoS automatically disables the protection for the IP address, which is recorded in Cloud Trace Service (CTS).</li></ul>
</li><li id="EN-US_TOPIC_0204851524__li2217029162615">Enable alarm notification, which sends notifications by SMS or email when an IP address is under a DDoS attack.</li><li id="EN-US_TOPIC_0204851524__li51105023162615">Adjust security settings based on service needs during defense.</li><li id="EN-US_TOPIC_0204851524__li16220367162615">View monitoring and interception reports after the defense is enabled to check network security situations.</li></ul>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0204851460.html">Accessing and Using Anti-DDoS</a></div>
</div>
</div>
<script language="JavaScript">
<!--
image_size('.imgResize');
var msg_imageMax = "view original image";
var msg_imageClose = "close";
//--></script>

View File

@ -0,0 +1,52 @@
<a name="EN-US_TOPIC_0258573747"></a><a name="EN-US_TOPIC_0258573747"></a>
<h1 class="topictitle1">Setting a Default Protection Policy for Newly Purchased Public IP Addresses</h1>
<div id="body1593595239470"><p id="EN-US_TOPIC_0258573747__p8060118">After you set a default protection policy, the newly purchased public IP addresses will be protected based on the default protection policy.</p>
<div class="section" id="EN-US_TOPIC_0258573747__section2445144802214"><h4 class="sectiontitle">Prerequisites</h4><p id="EN-US_TOPIC_0258573747__p7409143855412">You have obtained an account and its password to log in to the management console.</p>
</div>
<div class="section" id="EN-US_TOPIC_0258573747__section153322312232"><h4 class="sectiontitle">Procedure</h4><ol id="EN-US_TOPIC_0258573747__ol945391411235"><li id="EN-US_TOPIC_0258573747__li974624615513"><span>Log in to the management console.</span></li><li id="EN-US_TOPIC_0258573747__li36060173201823"><span>Click <span><img id="EN-US_TOPIC_0258573747__image20939288918" src="en-us_image_0258575568.png"></span> in the upper left corner and select the desired region or project.</span></li><li id="EN-US_TOPIC_0258573747__li5858326415513"><span>Choose <span class="menucascade" id="EN-US_TOPIC_0258573747__menucascade198325984016"><b><span class="uicontrol" id="EN-US_TOPIC_0258573747__uicontrol108311695400">Security</span></b> &gt; <b><span class="uicontrol" id="EN-US_TOPIC_0258573747__uicontrol583114910401">Anti-DDoS</span></b></span>. The Anti-DDoS service management page is displayed.</span></li><li id="EN-US_TOPIC_0258573747__li791281718445"><span>The <strong id="EN-US_TOPIC_0258573747__b148081829164211">Public IP Addresses</strong> tab page is displayed by default. Click <strong id="EN-US_TOPIC_0258573747__b3465155464211">Set Default Protection Policy</strong>.</span><p><div class="fignone" id="EN-US_TOPIC_0258573747__fig87135471034"><span class="figcap"><b>Figure 1 </b>Setting a default protection policy for newly purchased public ip addresses</span><br><span><img id="EN-US_TOPIC_0258573747__image271315474310" src="en-us_image_0258795362.png" title="Click to enlarge" class="imgResize"></span></div>
</p></li><li id="EN-US_TOPIC_0258573747__li777811244487"><span>Configure the default protection policy.</span><p><div class="fignone" id="EN-US_TOPIC_0258573747__fig182831259165614"><span class="figcap"><b>Figure 2 </b>Configuring the default protection policy</span><br><span><img id="EN-US_TOPIC_0258573747__image8283155916564" src="en-us_image_0258829059.png" title="Click to enlarge" class="imgResize"></span></div>
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" id="EN-US_TOPIC_0258573747__table1245516550574" frame="border" border="1" rules="all"><caption><b>Table 1 </b>Parameter description</caption><thead align="left"><tr id="EN-US_TOPIC_0258573747__ree2ae48f896d4ec2bede69c7f3faa943"><th align="left" class="cellrowborder" valign="top" width="20.39%" id="mcps1.3.3.2.5.2.2.2.3.1.1"><p id="EN-US_TOPIC_0258573747__a13a961abe1bd4ae7833413b2d60d3077"><strong id="EN-US_TOPIC_0258573747__b10104174220432">Parameter</strong></p>
</th>
<th align="left" class="cellrowborder" valign="top" width="79.61%" id="mcps1.3.3.2.5.2.2.2.3.1.2"><p id="EN-US_TOPIC_0258573747__adcd709073c4c4f5ead440f1540e21651"><strong id="EN-US_TOPIC_0258573747__b1757813433435">Description</strong></p>
</th>
</tr>
</thead>
<tbody><tr id="EN-US_TOPIC_0258573747__row462471113516"><td class="cellrowborder" valign="top" width="20.39%" headers="mcps1.3.3.2.5.2.2.2.3.1.1 "><p id="EN-US_TOPIC_0258573747__p4888314215513">Traffic Cleaning Threshold</p>
</td>
<td class="cellrowborder" valign="top" width="79.61%" headers="mcps1.3.3.2.5.2.2.2.3.1.2 "><p id="EN-US_TOPIC_0258573747__p9617192718260">Anti-DDoS scrubs traffic when detecting that the incoming traffic of an IP address exceeds the threshold.</p>
<p id="EN-US_TOPIC_0258573747__p19162832630">Configure this parameter based on your actual needs. You are advised to set the threshold to a value closest to the purchased bandwidth but not greater than the purchased bandwidth.</p>
<p id="EN-US_TOPIC_0258573747__p1919135214219">If <strong id="EN-US_TOPIC_0258573747__b78681410124619">Traffic Cleaning Threshold</strong> is set to <strong id="EN-US_TOPIC_0258573747__b8566213124610">Unlimited</strong>, your public IP addresses get almost no protection from DDoS attacks.</p>
</td>
</tr>
<tr id="EN-US_TOPIC_0258573747__row13123900172033"><td class="cellrowborder" valign="top" width="20.39%" headers="mcps1.3.3.2.5.2.2.2.3.1.1 "><p id="EN-US_TOPIC_0258573747__p6111610215513">CC Defense</p>
</td>
<td class="cellrowborder" valign="top" width="79.61%" headers="mcps1.3.3.2.5.2.2.2.3.1.2 "><ul id="EN-US_TOPIC_0258573747__ul937993715513"><li id="EN-US_TOPIC_0258573747__en-us_topic_0204851514_li5145722015513"><strong id="EN-US_TOPIC_0258573747__b1535524712474">Disable</strong>: disables the defense.</li><li id="EN-US_TOPIC_0258573747__en-us_topic_0204851514_li6046180015513"><strong id="EN-US_TOPIC_0258573747__b1375875711472">Enable</strong>: enables the defense.<div class="note" id="EN-US_TOPIC_0258573747__en-us_topic_0204851514_note34180542121252"><span class="notetitle"> NOTE: </span><div class="notebody"><p id="EN-US_TOPIC_0258573747__en-us_topic_0204851514_p39189427121252">CC defense is available only for clients supporting the full HTTP protocol stack because CC defense works in redirection or redirection+verification code mode. If your client does not support the full HTTP protocol stack, you are advised to disable CC defense.</p>
</div></div>
</li><li id="EN-US_TOPIC_0258573747__en-us_topic_0204851514_li5323799815513"><strong id="EN-US_TOPIC_0258573747__b18153154104820">HTTP Request Threshold</strong><p id="EN-US_TOPIC_0258573747__en-us_topic_0204851514_p47233133112711">This option is available only when CC defense is enabled.</p>
<p id="EN-US_TOPIC_0258573747__en-us_topic_0204851514_p728529515513">You are advised to set this parameter to the maximum number of HTTP requests that can be processed by the deployed service. Anti-DDoS automatically scrubs traffic if the total number of detected requests exceeds this threshold. If the value is too large, CC defense will not be triggered promptly.</p>
<ul id="EN-US_TOPIC_0258573747__en-us_topic_0204851514_ul1623789311289"><li id="EN-US_TOPIC_0258573747__en-us_topic_0204851514_li2665975511285">If the actual HTTP request rate is smaller than the configured value, the deployed service is able to process all HTTP requests, and Anti-DDoS does not need to be involved.</li><li id="EN-US_TOPIC_0258573747__en-us_topic_0204851514_li36634440112814">If the actual HTTP request rate is greater than or equal to the configured value, Anti-DDoS triggers CC defense to analyze and check each request, which affects responses to normal requests.</li></ul>
</li></ul>
</td>
</tr>
</tbody>
</table>
</div>
</p></li><li id="EN-US_TOPIC_0258573747__li142454474564"><span>Click <strong id="EN-US_TOPIC_0258573747__b429311515505">OK</strong>.</span><p><p id="EN-US_TOPIC_0258573747__p31581261351">After the default protection policy is set, the newly purchased public IP addresses are protected based on the default protection policy. For details about how to adjust a configured protection policy, see <a href="en-us_topic_0204851517.html">Adjusting Security Settings</a>.</p>
</p></li></ol>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0204851516.html">Operation Guide</a></div>
</div>
</div>
<script language="JavaScript">
<!--
image_size('.imgResize');
var msg_imageMax = "view original image";
var msg_imageClose = "close";
//--></script>

View File

@ -0,0 +1 @@
var expandClassName="dropdownexpand";var collapseClassName="dropdowncollapse";var collapseTableClassName="dropdowncollapsetable";function ExpandorCollapseNode(a){a=a.parentNode;if(a.className==expandClassName){a.className=collapseClassName}else{a.className=expandClassName}}function ExpandorCollapseTableNode(a){a=a.parentNode;if(a.className==expandClassName){a.className=collapseTableClassName}else{a.className=expandClassName}}function ExpandorCollapseAllNodes(g,h,c){var a=g.getAttribute("title");var b=g.parentNode;if(a=="collapse"){g.setAttribute("title","expand");g.className="dropdownAllButtonexpand";g.innerHTML=h}else{g.setAttribute("title","collapse");g.className="dropdownAllButtoncollapse";g.innerHTML=c}var f=b.getElementsByTagName("*");for(var d=0;d<f.length;d++){var e=f[d];if(e.className.indexOf(expandClassName)!=-1||e.className.indexOf(collapseClassName)!=-1||e.className.indexOf(collapseTableClassName)!=-1){if(a=="collapse"){if(e.tagName.toLowerCase()=="table"){e.className=collapseTableClassName}else{e.className=collapseClassName}}else{e.className=expandClassName}}}}function ExpandForHref(f){if(null==f||"#"==f||"###"==f){return}var a=null;try{a=document.getElementById(f)}catch(d){}if(null==a||a.length==0){return}try{var b=a.parentNode;while(b!=null&&b.tagName!="body"){if(b.className==collapseClassName){b.className=expandClassName}b=b.parentNode}}catch(c){}}window.onload=function(){var b=document.getElementsByTagName("div");for(var c=0;c<b.length;c++){var j=b[c];if(j.className.indexOf(expandClassName)!=-1){j.className=collapseClassName}}var d=document.getElementsByTagName("a");try{for(var c=0;c<d.length;c++){var f=d[c];var h=f.getAttribute("href");if(h!=""&&h!=null){f.addEventListener("click",showHasConref,false)}}}catch(g){}};function showHasConref(b){var a=b.currentTarget.getAttribute("href");try{if(a!=null&&a!="#"&&a.lastIndexOf("#")>-1){ExpandForHref(a.substring(a.lastIndexOf("#")+1))}}catch(c){}};

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.7 KiB

Some files were not shown because too many files have changed in this diff Show More