Updated on 2025-05-30 GMT+08:00

CNAD Overview

The following figure shows the process of connecting an EIP to CNAD for protection.

Figure 1 Connecting an EIP to CNAD
Table 1 Procedures

No.

Procedure

Description

1

Using IAM to Grant CNAD Permissions

Use Identity and Access Management (IAM) to grant fine-grained CNAD service permissions to users.

2

Purchasing a CNAD Instance

Purchase a CNAD instance based on service requirements.

3

Adding a Protection Policy

Configure protection policies based on your service requirements. CNAD provides a wide range of protection policies.

4

Adding a Protected Object

Add the EIP to be protected to the CNAD instance.

5

Performing common security operations