Anti-DDoS provide use cases to suit various business requirements. You can refer to the following topics based on your business requirements.
Anti-DDoS Origin
Best practices for automatic deactivation of blackhole filtering
Use Anti-DDoS Origin Enterprise in combination with Anti-DDoS Proxy (Chinese Mainland)
Use an anti-DDoS diversion instance to enable automatic protection for your assets
Anti-DDoS Proxy
Best practices for adding a service to an Anti-DDoS Proxy instance
Protect a website service by using both Anti-DDoS Proxy and WAF
Install the TOA kernel module to obtain the originating IP addresses of requests
Best practices to configure an ECS instance as the origin server of a non-website service
Create an Anti-DDoS Proxy instance by calling an API operation