On the Website Protection page, click the +
button on the upright corner, as shown below:
In the pop-out window, read the prerequisites at first, and then start adding a website according to your need, then click Submit
to complete, as shown below:
On the Website Protection page, click ...
in the Actions column, and then click Set
. And on the setting page, you can set the blacklist/whitelist for domain, frequency control, cache mode, warning notice, human identification, health check, APP token, as shown below:
The vulnerability interception of each website will be enabled by default and cannot be canceled, as shown below:
Note: After you set up an Anti-DDoS Pro or Anti-DDoS Premium instance to protect website services, you can add malicious IP addresses to the blacklist to block requests from them. You can add trusted IP addresses to the whitelist. Requests received from whitelisted IP addresses are forwarded directly to the website.
On the setting page, click the switch button to enable/stop the setting, as shown below:
If you enable the blacklist/whitelist for domain, click the blue string Set Blacklist / Whitelist
to set blacklist/whitelist (for domain), as shown below:
In the pop-out window: click Blacklist
, then enter the malicious IP/mask format that you want to block; click Whitelist
, enter the IP/mask format that you want to allow to pass through. Then click Done
to complete, as shown below:
Note: After you set up an Anti-DDoS Pro or Anti-DDoS Premium instance to protect your website service, you can enable Frequency Control to protect the website against HTTP flood attacks. And if you don’t need, just stop it. Frequency Control supports multiple modes and allows you to adjust the mode in real time based on the traffic status of the website as below:
- Normal: We recommend that you use this mode if the website traffic is normal. By default, this mode is used. In this mode, Frequency Control protects websites against common HTTP flood attacks but does not block normal requests.
- Emergency: You can enable this mode when you detect HTTP response errors, traffic anomalies, or CPU and memory usage spikes. The Emergency mode provides relatively rigorous protection compared to the Normal mode. In this mode, Frequency Control protects websites against more complicated HTTP flood attacks but may block a few normal requests.
- Strict: This mode provides rigorous protection. It uses Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) to verify the identities of all visitors. Only verified visitors are allowed to access the website.
- Super Strict: This mode provides the most rigorous protection against HTTP flood attacks. It uses CAPTCHA to verify the identities of all visitors. Only verified visitors are allowed to access the website. Compared to the Strict mode, this mode combines CAPTCHA verification with anti-debugging and anti-machine verification technologies to enhance the protection of your website.
On the setting page, click the switch button to enable/stop the setting, as shown below:
1. Set built-in mode
1.1 If you enable the frequency control, you can select the built-in mode: Normal, Urgent, Strict, Super Strict as you need, as shown below:
1.2 Click the blue string Customize Rules
to set frequency control rules of domain, as shown below:
Note: On the Customize Rules page that it turns to, you can add rule, edit the rule you have added and delete it, as you can refer to the following guides:
2. Add rule
2.1 Click Add Rule
, as shown below:
2.2 In the Edit Rule of Frequency Control window that pops out, edit the rule name, URI, matching rule, interval, single IP visits, and the blocking type as you need, then click Confirm
to complete, as shown below:
3. Edit rule of frequency control
3.1 Click Edit
in the Actions colomn, as shown below:
3.2 In the Edit Rule of Frequency Control window that pops out, edit the rule name, URI, matching rule, interval, single IP visits, and the blocking type as you need, then click Confirm
to complete, as shown below:
4. Delete rule
4.1 Click Delete
in the Actions colomn, as shown below:
4.2 In the pop-out window, confirm the information and then click Delete
to complete, as shown below:
On the setting page, click the switch button to enable/stop the setting, as shown below:
Clear all cache
Clear All Cache
as shown below. “Success” on the top of the page after clicking means finish.On the setting page, click the switch button to enable/stop the setting, as shown below:
1. Enable warning notice
1.1 If you enable the warning notice, you can set the warning note as you need. Click the blue string Set Warning Notice
, as shown below:
1.2 In the pop-out window, you can enable/stop the CC Attack,Certificate Expiration, Website QPS and the Exception Request as you need. Then click Done
to complete, as shown below:
On the setting page, click the switch button to enable/stop the setting, as shown below:
Set bulit-in mode
Note: The health check feature is suitable for services that have more than one origin server IP address. When Anti-DDoS Pro or Anti-DDoS Premium forwards traffic to backend servers, this feature verifies the availability of the backend servers. Therefore, traffic is forwarded to healthy backend servers to ensure that the services properly run. After the switch is turned off, the request will be backed to upstream directly without health check.
On the setting page, just click the switch button to enable/stop the setting. “Success” on the top of the page after clicking means finish, as shown below:
On the Website Protection page, click ...
in the Actions column, and then click Suspend
, as shown below:
In the pop-out window, confirm the information and then click Suspend
to complete, as shown below:
On the Website Protection page, click ...
in the Actions column, and then click Edit
, as shown below:
In the pop-out window, read the prerequisites at first, and then start editing the website settings according to your need, then click Done
to complete, as shown below:
On the Website Protection page, click ...
in the Actions column, and then click Delete
, as shown below:
In the pop-out window, confirm the information and then click Delete
to complete, as shown below:
On the Website Protection page, click ...
in the Actions column, and then click Modify Certificate
, as shown below:
In the pop-out window, start editing and confirm the certificate settings according to your need, then click Confirm
to complete, as shown below:
On the Website Protection page, click ...
in the Actions column, and then click View Log
, as shown below:
After clicking View Log
, it will turn to a new page, and you can view the content of requests forwarded by Anti-DDoS IP including Domain, Protocol, Client IP, URI, etc., as you can see below: