No part of this document may be reproduced or transmitted in any form or by any means without prior
written consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specied in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every eort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
1.3 Accessing and Using Anti-DDoS.........................................................................................................................................2
1.3.1 How to Access Anti-DDoS.................................................................................................................................................2
1.3.2 How to Use Anti-DDoS...................................................................................................................................................... 3
1.3.3 Related Services.................................................................................................................................................................... 3
1.3.4 User Permissions.................................................................................................................................................................. 4
3.1 What Is Anti-DDoS?............................................................................................................................................................. 14
3.2 What Services Can Anti-DDoS Protect?........................................................................................................................ 14
3.3 How Do I Use Anti-DDoS?................................................................................................................................................. 14
3.4 What Kinds of Attacks Does Anti-DDoS Defend Against?......................................................................................14
3.5 Will I Be Promptly
Notied When an Attack Is Detected?..................................................................................... 15
A Change History...................................................................................................................... 16
The Anti-DDoS trac cleaning service (Anti-DDoS for short) defends elastic IP
addresses (EIPs) against network- and application-layer distributed denial of
service (DDoS) attacks and sends alarms immediately when detecting an attack.
In addition, Anti-DDoS improves the utilization of bandwidth and ensures the
stable running of users' services.
Anti-DDoS monitors the service
trac in real time. It then cleans attack trac according to user-congured
defense policies so that services run as normal. In addition, monitoring reports are
generated, presenting users with clear network security evaluations.
Anti-DDoS helps users cope with trac attacks with ease. It can precisely identify
connection exhaustion and slow-connection attacks and can help users defend
against the following attacks:
●Web server attacks
Such as SYN
connection attacks
●Game attacks
Such as User Datagram Protocol (UDP)
Protocol (TCP), and fragment attacks
●HTTPS server attacks
Such as SSL DoS and DDoS attacks
ood, HTTP ood, Challenge Collapsar (CC), and slow-
trac from the Internet to EIPs to detect attack
ood, SYN ood, Transmission Control
●DNS server attacks
Such as attacks targeted at vulnerabilities in the Domain Name Server (DNS)
protocol stack, DNS reection attacks, DNS ood attacks, and DNS cachemiss attacks
Anti-DDoS also provides the following functions:
●Providing monitoring records for each EIP, including the current defense
status, current defense
abnormalities.
●Providing attack statistics reports on all protected EIPs, covering the trac
cleaning frequency, cleaned trac amount, top 10 attacked EIPs, and number
of blocked attacks.
1.2 Application Scenarios
Anti-DDoS defends only EIPs against DDoS attacks.
Anti-DDoS devices are deployed at egresses of data centers. Figure 1-1 shows the
network topology.
The detection center detects network access
security policies. If an attack is detected, data is diverted to cleaning devices for
real-time defense. Abnormal
Figure 1-1 Network topology
trac is cleaned, and normal trac is forwarded.
trac according to user-congured
1.3 Accessing and Using Anti-DDoS
1.3.1 How to Access Anti-DDoS
Anti-DDoS provides a web-based service management platform. You can access
Anti-DDoS using the management console or HTTPS-based application
programming interfaces (APIs).
If you have registered an account, you can log in to the management console
directly. On the home page, choose Security > Anti-DDoS to access the AntiDDoS service.
●HTTPS-compliant APIs
You can access Anti-DDoS using APIs. For details, see the
Reference
.
Anti-DDoS API
1.3.2 How to Use Anti-DDoS
Description:
●Anti-DDoS defends IP addresses against DDoS attacks after you enable it.
●Enable alarm notication, which sends notications by SMS or email when an
IP address is under a DDoS attack.
●Adjust security settings based on service needs during defense.
●View monitoring and interception reports after the defense is enabled to
check network security situations.
●You can disable Anti-DDoS defense as required.
1.3.3 Related Services
CTS
Cloud Trace Service (CTS) provides you with a history of Anti-DDoS operations.
After enabling CTS, you can view all generated traces to review and audit
performed Anti-DDoS operations. For details, see the
.
Guide
●Anti-DDoS operations that can be recorded by CTS
Table 1-1 Anti-DDoS operations that can be recorded by CTS