Why Does the Attack Traffic Volume Increase After AAD Is Deployed?
Some attackers may record the IP addresses used by exposed origin servers. Even after AAD is configured, the attackers will bypass AAD and directly launch attacks towards the known IP addresses. In this case, it is best practice to change the IP addresses of the origin servers.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot