CNAD Overview
The following figure shows the process of connecting an EIP to CNAD for protection.

No. |
Procedure |
Description |
---|---|---|
1 |
Use Identity and Access Management (IAM) to grant fine-grained CNAD service permissions to users. |
|
2 |
Purchase a CNAD instance based on service requirements. |
|
3 |
Configure protection policies based on your service requirements. CNAD provides a wide range of protection policies. |
|
4 |
Add the EIP to be protected to the CNAD instance. |
|
5 |
Performing common security operations |
|
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot