Deze pagina is nog niet beschikbaar in uw eigen taal. We werken er hard aan om meer taalversies toe te voegen. Bedankt voor uw steun.
- What's New
- Function Overview
- Service Overview
- Getting Started
- User Guide
- Best Practices
-
API Reference
- API Usage Guidelines
- Before You Start
- API Overview
- API Calling
-
API
-
Anti-DDoS Management
- Querying the List of Defense Statuses of EIPs
- Querying Optional Anti-DDoS Defense Policies
- Querying Weekly Defense Statistics
- Querying Configured Anti-DDoS Defense Policies
- Updating Anti-DDoS Defense Policies
- Querying the Traffic of a Specified EIP
- Querying Events of a Specified EIP
- Querying Configured Anti-DDoS Defense Policies
- Anti-DDoS Task Management
- Alarm configuration management
-
Anti-DDoS Management
- Examples
- Appendix
- Out-of-Date APIs
- SDK Reference
-
FAQs
-
General FAQs
- What Are Regions and AZs?
- What Is the Black Hole Policy of HUAWEI CLOUD?
- What Are a SYN Flood Attack and an ACK Flood Attack?
- What Is a CC Attack?
- What Is a Slow HTTP Attack?
- What Are a UDP Attack and a TCP Attack?
- What Are the Differences Between DDoS Attacks and Challenge Collapsar Attacks?
- Does Anti-DDoS Provide SDKs and APIs?
- CNAD Basic (Anti-DDoS) FAQs
-
General FAQs
- Videos
Show all
Usage Overview
Step |
Description |
---|---|
Setting a protection policy |
Set a traffic scrubbing threshold for public IP addresses. For details, see Setting a Protection Policy. |
Enabling alarm notifications |
After the alarm notification function is enabled, you will receive an alarm if a DDoS attack is detected. For details, see Enabling Alarm Notifications. |
Setting event alarm notifications |
Cloud Eye enables event monitoring for protected EIPs and generates alarms for scrubbing, blocking, and unblocking events. For details, see Setting Event Alarm Notifications. |
Configuring Anti-DDoS logs on LTS |
With Anti-DDoS logs recorded on LTS, users can perform real-time decision analysis, device O&M management, and service trend analysis in a timely and efficient manner. For details, see Configuring LTS for Anti-DDoS Logging. |
Viewing a monitoring report |
View the monitoring report of an EIP, covering the current protection status, protection settings, and the traffic and anomalies within the last 24 hours. For details, see Viewing Monitoring Reports. |
Viewing an interception report |
This topic describes how to view the protection statistics, including the traffic cleaning frequency, cleaned traffic amount, weekly top 10 attacked public IP addresses, and total number of intercepted attacks of all public IP addresses of a user. For details, see Viewing Interception Reports. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.