Cette page n'est pas encore disponible dans votre langue. Nous nous efforçons d'ajouter d'autres langues. Nous vous remercions de votre compréhension.
Anti-DDoS Service
Anti-DDoS Service
- Service Overview
- Getting Started
- User Guide
-
FAQs
-
General FAQs
- What Are Regions and AZs?
- What Is the Black Hole Policy of HUAWEI CLOUD?
- What Are a SYN Flood Attack and an ACK Flood Attack?
- What Is a CC Attack?
- What Is a Slow HTTP Attack?
- What Are a UDP Attack and a TCP Attack?
- What Are the Differences Between DDoS Attacks and Challenge Collapsar Attacks?
- Does Anti-DDoS Provide SDKs and APIs?
- CNAD Basic (Anti-DDoS) FAQs
-
General FAQs
On this page
Show all
Anti-DDoS Custom Policies
Updated on 2024-10-29 GMT+08:00
Custom policies can be created to supplement the system-defined policies of Anti-DDoS. For details about the actions supported by custom policies, see Anti-DDoS Permissions and Actions.
You can create custom policies using one of the following methods:
- Visual editor: Select cloud services, actions, resources, and request conditions. This does not require knowledge of policy syntax.
- JSON: Edit JSON policies from scratch or based on an existing policy.
For details, see Creating a Custom Policy. The following section contains examples of common Anti-DDoS custom policies.
Anti-DDoS Custom Policy Examples
- Example 1: Authorizing a user to query the default Anti-DDoS policy
{ "Version": "1.1", "Statement": [ { "Effect": "Allow", "Action": [ "anti-ddos:defaultDefensePolicy:get" ] } ] }
Parent topic: Permission Management
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.
The system is busy. Please try again later.