Document Center
 
All Products
Search
  • Document Center
  • Anti-DDoS
  • Use Cases

This Product

  • This Product
  • All Products

    Anti-DDoS:Use Cases

    Document Center

    Anti-DDoS:Use Cases

    Last Updated:Apr 03, 2024

    Anti-DDoS provide use cases to suit various business requirements. You can refer to the following topics based on your business requirements.

    Anti-DDoS Origin

    • Configure alert notifications for DDoS attack events

    • Use Anti-DDoS Origin to protect an asset from DDoS attacks

    • Upgrade Anti-DDoS Origin to Anti-DDoS Proxy

    • Best practices for automatic deactivation of blackhole filtering

    • Use Anti-DDoS Origin Enterprise in combination with Anti-DDoS Proxy (Chinese Mainland)

    • Use Anti-DDoS Origin and WAF

    • Use Anti-DDoS Origin and SLB

    • Use an anti-DDoS diversion instance to enable automatic protection for your assets

    Anti-DDoS Proxy

    • Best practices for adding a service to an Anti-DDoS Proxy instance

    • Protect a website service by using both Anti-DDoS Proxy and WAF

    • Obtain the originating IP addresses of requests

    • Install the TOA kernel module to obtain the originating IP addresses of requests

    • Switch service traffic to a new Anti-DDoS Proxy instance

    • Configure ACLs for the origin server

    • Best practices to configure an ECS instance as the origin server of a non-website service

    • Handle exposure of the origin IP address

    • Create an Anti-DDoS Proxy instance by calling an API operation

    Thank you! We've received your feedback.