Getting Started with Common Practices
This section describes Anti-DDoS protection practices.
| Version | Practice | Description | |
|---|---|---|---|
| Anti-DDoS | Routine maintenance | Use an ECS to remotely access the server that has been routed to a black hole. | |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.
 
    