Usage Overview
You can purchase an AAD instance and connect your services to the instance. The widely covering defense rules provided by AAD will protect your services from massive DDoS attacks.
Step |
Description |
---|---|
Connecting services to AAD |
For details, see Connecting Domain Name Website Services to Advanced Anti-DDoS. |
Configuring protection policies |
AAD provides abundant and comprehensive protection rules. You can configure protection policies based on your service requirements. For details, see Configuring a Protection Policy. |
Enabling alarm notifications |
After the alarm notification is enabled, you will receive alarm notifications if your IP address is under a DDoS attack. For details, see Enabling Alarm Notifications. |
Managing instances |
View instance information, upgrade protection bandwidth and service bandwidth, and modify elastic protection bandwidth. For details, see Managing Instances. |
Managing domain names |
View domain name information, update certificates, modify resolution lines, change origin server IP addresses, and modify domain name service configurations. For details, see Managing Domain Names. |
Monitoring |
You can set alarms based on monitoring metrics, black hole, scheduling events, and attack events to learn about the protection status of AAD in a timely manner. For details, see Monitoring. |
Auditing |
AAD related operations are recorded for later query, audit, and backtrack operations. For details, see Auditing. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot