Overview
This document describes best practices for working with Anti-DDoS Service and provides operational guidelines that you can follow when using this service.
Component |
Reference |
---|---|
Post-attack handling |
|
Origin server IP addresses |
Using the TOA Module to Obtain the Actual Source IP Addresses of Requests |
Improving protection capabilities |
Using the Scheduling Center to Implement Tiered Traffic Scheduling. |
Joint protection |
Using ELB and CNAD Advanced to Improve the DDoS Protection Capabilities of ECSs |
Using WAF, ELB, and CNAD Advanced to Improve Website Service Security |
|
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot