Deze pagina is nog niet beschikbaar in uw eigen taal. We werken er hard aan om meer taalversies toe te voegen. Bedankt voor uw steun.
- What's New
- Function Overview
- Service Overview
- Getting Started
- User Guide
- Best Practices
-
API Reference
- API Usage Guidelines
- Before You Start
- API Overview
- API Calling
-
API
-
Anti-DDoS Management
- Querying the List of Defense Statuses of EIPs
- Querying Optional Anti-DDoS Defense Policies
- Querying Weekly Defense Statistics
- Querying Configured Anti-DDoS Defense Policies
- Updating Anti-DDoS Defense Policies
- Querying the Traffic of a Specified EIP
- Querying Events of a Specified EIP
- Querying Configured Anti-DDoS Defense Policies
- Anti-DDoS Task Management
- Alarm configuration management
-
Anti-DDoS Management
- Examples
- Appendix
- Out-of-Date APIs
- SDK Reference
-
FAQs
-
General FAQs
- What Are Regions and AZs?
- What Is the Black Hole Policy of HUAWEI CLOUD?
- What Are a SYN Flood Attack and an ACK Flood Attack?
- What Is a CC Attack?
- What Is a Slow HTTP Attack?
- What Are a UDP Attack and a TCP Attack?
- What Are the Differences Between DDoS Attacks and Challenge Collapsar Attacks?
- Does Anti-DDoS Provide SDKs and APIs?
- CNAD Basic (Anti-DDoS) FAQs
-
General FAQs
- Videos
Connecting to a Server Routed to a Black Hole
Scenario
When your server is under a traffic flooding attack, a black hole will be triggered to block all accesses from the Internet. You can connect to a server which a black hole has been triggered for through an ECS.
Prerequisites
- You have purchased at least one public IP address.
- The username and password for logging in to an ECS have been obtained.
- The username and password for logging in to a server which a black hole has been triggered for have been obtained.
Constraints
Ensure the ECS can be accessed and in the same region as the server.
Procedure
- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project.
- Click
and choose Computing > Elastic Cloud Server.
- Log in to the ECS that can be accessed and in the same region as the server which a black hole has been triggered for.
Select a login method and log in to the ECS.
- For details about how to log in to a Windows ECS, see Windows ECS Login Overview.
- For details about how to log in to a Linux ECS, see Linux ECS Login Overview.
- Table 1 describes how to connect to a server which a black hole has been triggered for.
Table 1 Server connection ECS OS
Blackholed Server OS
Connection Method
Windows
Windows
Use MSTSC to log in to the server which a black hole has been triggered for.
- Search for mstsc in the ECS and click it to open the Remote Desktop Connection dialog box.
- Click Show Options in the displayed dialog box.
- Enter the EIP and username (Administrator by default) of the server which a black hole has been triggered for.
- Click OK and enter the login password as prompted to log in to the server.
Linux
Use a remote login tool, such as PuTTY or Xshell, to log in to the server.
Linux
Windows
- Install a remote connection tool, such as rdesktop.
- Run the following command to log in to the server which a black hole has been triggered for.
rdesktop -u Username -p Password -g Resolution EIP bound to the server which a black hole has been triggered for
Linux
Run the following command to log in to the server which a black hole has been triggered for.
ssh EIP bound to the server which a black hole has been triggered for
Follow-up Operation
Once you have connected your ECS to a server in the black hole state, you can transfer files to the server and can make whatever configuration changes are necessary.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.