Updated on 2024-09-26 GMT+08:00

Usage Overview

You can purchase an AAD instance and connect your services to the instance. The widely covering defense rules provided by AAD will protect your services from massive DDoS attacks.

Usage Overview shows the usage overview of AAD.

Currently, you can only purchase and renew AAD International Edition instances and manage domain name access via the console. Configuration of protection policies or alarm notifications is not available.

Table 1 Usage Overview

Step

Description

Purchasing an AAD instance

Connecting services to AAD

For details, see Connecting Domain Name Website Services to Advanced Anti-DDoS.

Configuring protection policies

AAD provides abundant and comprehensive protection rules. You can configure protection policies based on your service requirements. For details, see Configuring a Protection Policy.

Enabling alarm notifications

After the alarm notification is enabled, you will receive alarm notifications if your IP address is under a DDoS attack. For details, see Enabling Alarm Notifications.

Managing instances

View instance information, upgrade protection bandwidth and service bandwidth, and modify elastic protection bandwidth. For details, see Managing Instances.

Managing domain names

View domain name information, update certificates, modify resolution lines, change origin server IP addresses, and modify domain name service configurations. For details, see Managing Domain Names.

Managing protection logs

With LTS, users can perform real-time decision analysis, device O&M management, and service trend analysis in a timely and efficient manner. For details, see Managing Protection Logs.

Monitoring

You can set alarms based on monitoring metrics, black hole, scheduling events, and attack events to learn about the protection status of AAD in a timely manner. For details, see Monitoring.

Auditing

AAD related operations are recorded for later query, audit, and backtrack operations. For details, see Auditing.

Adding a tag to an AAD instance

If your organization has configured tag policies for AAD, add tags to vaults based on the policies. For details about the tag policy, contact the organization administrator. For details, see Configuring Instance Tags.