Help Center/ Anti-DDoS Service/ Best Practices/ Using the Scheduling Center to Implement Tiered Traffic Scheduling.
Updated on 2024-12-24 GMT+08:00

Using the Scheduling Center to Implement Tiered Traffic Scheduling.

Application Scenarios

If you use both CNAD Unlimited Protection Basic Edition and AAD, you can configure tiered scheduling rules to schedule AAD to protect your cloud resources protected by the Unlimited Protection Basic Edition. This can significantly enhance the DDoS attack defense capability.

This section uses the domain name www.example.com of a website service as an example to describe how to use the scheduling center to implement tiered traffic scheduling.

Architecture

Figure 1 shows the working principle of tiered DDoS scheduling.

  • CNAD Advanced offers comprehensive protection against DDoS attacks. If a DDoS attack is detected, traffic scrubbing will be automatically initiated.
  • When a service is blocked due to heavy traffic attacks, AAD CNAMEs will be called to divert malicious attack traffic to AAD for scrubbing, ensuring that important services are not interrupted.
Figure 1 Working principle of DDoS tiered scheduling

Advantages

The Unlimited Protection Basic Edition defends against routine DDoS attacks without requiring the origin server IP address to be changed. Service traffic is directly transmitted to the origin server, so there is no extra latency.

When there are a large number of DDoS attacks, AAD is called to protect the cloud resources of the Unlimited Protection Basic Edition's protected objects. In this case, service traffic is forwarded by AAD.

Limitations and Constraints

  • The protected domain name (www.example.com) is deployed on Huawei Cloud in a region that supports CNAD Advanced instances (for example, CN North-Beijing4).
  • The protected domain name (www.example.com) is not connected to WAF.

Resource and Cost Planning

Resource

Description

Quantity

Cost

CNAD Unlimited Protection Basic Edition

Defends against routine attacks. (Service traffic is directly transmitted to the origin server.)

1

For details about the billing modes and standards, see Billing Overview.

AAD

Defends against massive attacks. (Service traffic is forwarded through AAD.)

1