To configure Anti-DDoS Diversion for servers in an Internet Data Center (IDC), you need to coordinate with Alibaba Cloud technical support based on your business needs. This topic describes how to configure Anti-DDoS Diversion.
Step 1: Purchase an Anti-DDoS Diversion instance
Acess Anti-DDoS Diversion Buy Page.
Complete all configurations, review the service agreement, and follow the instructions to finalize your purchase.
Configuration item
Description
Diversion Mode
On-demand: Ideal for services under occasional attacks.
Always-on: Ideal for services under frequent attacks.
Mitigation Threshold
For more information, see Best-effort protection.
Protection Mode
Insurance: Two best-effort protection sessions per month. Resets at the start of each month.
Unlimited: Unlimited mitigation sessions per month.
For more information, see Mitigation sessions.
Clean Bandwidth
Normal traffic bandwidth of your service. It is set to 100 Mbit/s by default, with an increment of 100 Mbit/s up to 100,000 Mbit/s.
C-class IP Addresses
The number of C-class IP addresses in your IDC servers. It is set to 1 by default, with a maximum of 10,000.
Data Centers
The number of IDC servers. It is set to 1 by default, with a maximum of 10.
Initial Installation Mode
The initial way to install the diversion infrastructure.
Quantity
The quantity is determined by the configuration of your reinjection point.
Contact your pre-sales manager to complete the configuration.
Step 2: Add CIDR Block to Anti-DDoS Diversion instance
Log on to the Traffic Security console.
Go to the
page and select Outside Chinese Mainland in the top navigation bar.Select your Anti-DDoS Diversion instance, then click Reinjection Configurations to create an injection point.
Injection type: Configure this after consulting Alibaba Cloud technical support.
Injection point: This refers to the location of the traffic scrubbing center from which business traffic is injected. The injection point is typically in the same region as your IDC servers. You can configure one or more injection regions based on your business needs.
Click Add CIDR block for Forwarding to include the Classless Inter-Domain Routing (CIDR) block in the protected object.
Add CIDR Block: Enter a CIDR block and a subnet mask. You can enter CIDR blocks ranging from /22 to /28 for non-extended blocks and /16 to /22 for extended blocks.
NoteIf you want to protect CIDR blocks from /22 to /16, you can expand the subnet and configure Anti-DDoS Diversion for each subnet. Additionally, you can enable or disable protection for a particular subnet as needed.
Reinjection Type: Configure this after consulting Alibaba Cloud technical support.
Select a reinjection region.
Unified Reinjection from All Traffic Scrubbing Centers: Clean traffic is first forwarded to the scrubbing centers located at your configured injection point. The injection point then reroutes the traffic back to your IDC server.
Separate Reinjection from Individual Traffic Scrubbing Center: This method is ideal for scenarios where you have IDC servers in multiple locations. Clean traffic is forwarded to the scrubbing centers at each injection point, and then each injection point reroutes the traffic back to the IDC server situated in the same location as the injection point.
Step 3: Complete Anti-DDoS Diversion configurations
In the Diversion Mode column, you can set the rerouting mode as follows:
Manual
This is the default mode. In this mode, you must manually enable Anti-DDoS Diversion during a DDoS attack and disable it once the attack subsides.
Automatic
Anti-DDoS Diversion activates automatically if the inbound bandwidth or packet rates of your IDCs exceed the set threshold. After selecting this mode, you need to configure the automatic startup rules, shutdown methods, and other relevant parameters.
ImportantThis method is exclusive to IDCs on Alibaba Cloud and is only available under specific protocols. Therefore, you should contact Alibaba Cloud technical support before usage.
Parameter
Description
Policy Name
The name of the custom policy.
Traffic Rate
The threshold of inbound bandwidth, typically double the normal business Mbit/s.
Unit: megabits per second (Mbit/s)
Minimum: 100 Mbit/s
Packet Rate
The threshold of inbound packets, typically double the normal business Kpps.
Unit: kilo packets per second (Kpps)
Minimum: 10 Kpps
Continuity
The number of consecutive times the inbound bandwidth or packet rate exceeds the specified threshold to trigger the automatic activation of Anti-DDoS Diversion.
Stop Mode
Choose how to stop Anti-DDoS Diversion after it is enabled. Options include:
Manual (default): You must manually stop the protection after the attack ends.
Automatic: The protection stops automatically at a specified time after the attack ends.
Time Zone: Choose the time zone corresponding to the location of your IDC server using the Greenwich Mean Time (GMT) format as
GMT-hh:mm
. For instance,GMT-08:00
represents the time zone that is 8 hours behind GMT.Stop Time: Specifies when the protection should automatically stop using a 24-hour clock format as
hh:mm
.We recommend that you set the stop time to during off-peak hours. The Alibaba Cloud Anti-DDoS service will automatically stop the diversion at the specified time after detecting the end of the attack.
In the Status column, select Review to request an Alibaba Cloud compliance check on the current CIDR block.
Upon approval, CIDR blocks can be rerouted. We recommend contacting Alibaba Cloud technical support after making your submission for further assistance.
In the Mitigation Policy column, select a mitigation template.
Template
Protection Operations
Note
General Policy
Filters out malformed packets not adhering to protocol specifications
Filters out TCP, UDP, and ICMP packets with clear attack signatures
Filters out fragmented packets and packets that are not transmitted over TCP, UDP, or ICMP
Verifies specific IP addresses that generate abnormal requests and implements rate limiting on those addresses
The General Policy offers protection against common DDoS attacks and is well-suited for most services.
Office Policy
Filters out malformed packets not adhering to protocol specifications
Filters out TCP, UDP, and ICMP packets with clear attack signatures
Filters out fragmented packets
Allows packets transmitted over GRE and IPsec
Applies loose verification to IP addresses that generate requests
The Office Policy is tailored for office networks, offering more relaxed outbound access restrictions.
TCP Game Policy
Filters out malformed packets not adhering to protocol specifications
Eliminates TCP, UDP, and ICMP packets with clear attack signatures
Filters out fragmented packets and packets that are not transmitted over TCP, UDP, or ICMP
Verifies specific IP addresses that generate abnormal requests and implements rate limiting on those addresses
Strictly verifies UDP packets and limits UDP packets based on the verification results
For services that rely on TCP, the TCP Game Policy is recommended.
UDP Game Policy
Filters out malformed packets not adhering to protocol specifications
Filters out TCP, UDP, and ICMP packets with clear attack signatures
Filters out fragmented packets and packets that are not transmitted over TCP, UDP, or ICMP
Applies loose verification to UDP packets
For services that rely on UDP, the UDP Game Policy is recommended.
Step 4: Start Anti-DDoS Diversion
On-demand
Manual
When the IDC O&M team detects an attack, click Start Traffic Rerouting in the Actions column. The Traffic Rerouting Status will switch to Traffic Rerouting, which indicates active DDoS protection for the traffic of the protected assets.
To stop protection, select Pause Rerouting. This will discontinue the DDoS protection for the traffic of the protected assets.
Automatic
On-demand protection automatically activates when the inbound bandwidth or packet rate exceeds the set threshold several times.
Always-on
In this mode, inbound traffic is consistently rerouted to the traffic scrubbing center, ensuring protection at all times, regardless of attack status.
To initiate it, select Start Traffic Rerouting in the Actions column, and the Traffic Rerouting Status will update to Traffic Rerouting, confirming that DDoS protection is in effect for the protected assets.
Step 5: Verify whether diversion and injection are effective
Run the traceroute
command to verify whether traffic is passing through AS134963, or check the monitoring report to confirm the effectiveness of the diversion protection.
Additionally, check the Reinjection Status to ensure it displays Normal. If not, contact Alibaba Cloud technical support for assistance.
Step 6: View protection report
After the attack is over, click View Monitoring Details or View IDC Attack Analysis in the Actions column to review the attack data.
Related API operations
To configure the advertising of a CIDR block, see ConfigNetStatus.
To query Anti-DDoS Diversion instances, see ListInstance.
To query the CIDR blocks of an Anti-DDoS Diversion instance, see QueryNetList.