Deze pagina is nog niet beschikbaar in uw eigen taal. We werken er hard aan om meer taalversies toe te voegen. Bedankt voor uw steun.
- What's New
- Function Overview
- Service Overview
- Getting Started
- User Guide
- Best Practices
-
API Reference
- API Usage Guidelines
- Before You Start
- API Overview
- API Calling
-
API
-
Anti-DDoS Management
- Querying the List of Defense Statuses of EIPs
- Querying Optional Anti-DDoS Defense Policies
- Querying Weekly Defense Statistics
- Querying Configured Anti-DDoS Defense Policies
- Updating Anti-DDoS Defense Policies
- Querying the Traffic of a Specified EIP
- Querying Events of a Specified EIP
- Querying Configured Anti-DDoS Defense Policies
- Anti-DDoS Task Management
- Alarm configuration management
-
Anti-DDoS Management
- Examples
- Appendix
- Out-of-Date APIs
- SDK Reference
-
FAQs
-
General FAQs
- What Are Regions and AZs?
- What Is the Black Hole Policy of HUAWEI CLOUD?
- What Are a SYN Flood Attack and an ACK Flood Attack?
- What Is a CC Attack?
- What Is a Slow HTTP Attack?
- What Are a UDP Attack and a TCP Attack?
- What Are the Differences Between DDoS Attacks and Challenge Collapsar Attacks?
- Does Anti-DDoS Provide SDKs and APIs?
- CNAD Basic (Anti-DDoS) FAQs
-
General FAQs
- Videos
Show all
Related Services
Anti-DDoS can protect public IP addresses. Its relationships with other cloud services are as follows:
Service |
Relationship with Other Cloud Services |
---|---|
Cloud Trace Service (CTS) |
After you enable CTS, CTS records DDoS mitigation operations for later query, audit, and backtrack. |
Simple Message Notification (SMN) |
Simple Message Notification (SMN) provides the notification function. When alarm notification is enabled, you will receive alarm messages by SMS or email if your IP address is DDoS attacked. |
Log Tank Service (LTS) |
Attack logs are recorded in Log Tank Service (LTS), which enable real-time decision making and analysis, device O&M management, and service trend analysis. |
Cloud Eye Service (CES) |
Cloud Eye monitors metrics related to Anti-DDoS Service. You can learn about the protection status in a timely manner and set corresponding protection policies based on the metrics in Cloud Eye. |
Identity and Access Management (IAM) |
Identity and Access Management (IAM) provides the permission management function for Anti-DDoS Service. Only users with required permissions can use Anti-DDoS Service. |
Enterprise Project Management (EPS) |
You can create enterprise projects based on the enterprise organization structure. Then you can manage resources across different regions by enterprise project, grant different permissions to user groups, and add them to enterprise projects. Anti-DDoS Service can be interconnected with EPS. You can manage Anti-DDoS Service resources by enterprise project and grant different permissions to users. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.