Protection Process
This section describes how to connect to EdgeSec for security protection.
ESA (Edge Security Acceleration) provides cache acceleration and application security protection and supports multiple security functions, such as web attack defense, DDoS attack defense, and CC attack defense. ESA comprehensively improves the security protection capability of the acceleration network and ensures high-quality user experience and service security.
Protection Process Description
Perform the following operations to enable EdgeSec.
|
No. |
Step |
Description |
|---|---|---|
|
1 |
You can choose the EdgeSec professional edition or enterprise edition. For details about the functions, see Edition Differences. You can purchase the corresponding edition based on your protection requirements. |
|
|
2 |
Before enabling EdgeSec, you need to connect the domain name to be protected to EdgeSec. Configure protection policies based on service requirements to enable EdgeSec and build network security for websites. |
|
|
3 |
A protection policy is a collection of multiple protection rules. It is used to configure and manage basic web protection, blacklist and whitelist, and precise access protection. After a domain name is connected, the system generates a default protection policy for the domain name. You can configure protection rules for the policy as needed. |
|
|
4 |
You can view real-time web protection events, trends, bot request sources and distribution, and DDoS attack logs and monitoring data. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot