After you purchase an Anti-DDoS Origin instance, you must add your asset with a public IP address to the instance for protection. This allows Anti-DDoS Origin to provide default mitigation capability for the asset. If your protected asset experiences cross-border DDoS attacks and your service does not involve cross-border traffic, you can enable cross-border traffic blocking to quickly block cross-border traffic. This topic describes how to add an object for protection and enable cross-border traffic blocking for the protected object.
Add an object for protection
If you are using an Anti-DDoS Origin instance for the first time, you must follow the instructions on the page to complete authorization for the assets within your Alibaba Cloud account.
Method 1: Automatically add assets for protection
Rule | Description |
Limits |
|
Automatic protection rules |
|
Anti-DDoS Origin automatically adds cloud services for protection but does not automatically remove protected cloud services. If you want to remove a protected cloud service, you must manually remove it.
Procedure
Log on to the Traffic Security console.
In the top navigation bar, select the resource group to which the instance belongs and select All Regions for the region.
In the left-side navigation pane, choose .
On the Protected Objects page, select the instance and click Protection Status by Attack Status under Enable. Set the state in which an asset is automatically added for protection.
Method 2: Manually add assets for protection
Scenario 1: You purchase an Anti-DDoS Origin 1.0 (Subscription) instance
The instance can only be an Anti-DDoS Origin Enterprise instance and protect an asset of a regular Alibaba Cloud service.
Log on to the Traffic Security console.
In the top navigation bar, select the resource group and region of your instance.
In the left-side navigation pane, choose .
On the Protected Objects page, select the instance and click Add Object for Protection.
In the Add Object for Protection dialog box, select Add Asset or Add Manually, and then click Confirm.
Add Asset: Select a public IP address within the current Alibaba Cloud account.
Add Manually: Manually enter a public IP address within the current Alibaba Cloud account.
Scenario 2: You purchase an Anti-DDoS Origin 2.0 (Subscription) instance
The instance can be an Anti-DDoS Origin Enterprise instance or an Anti-DDoS Origin instance of Inclusive Edition for Small and Medium Enterprises and protect an asset of a regular Alibaba Cloud service.
Log on to the Traffic Security console.
In the top navigation bar, select the resource group to which the instance belongs and select All Regions for the region.
In the left-side navigation pane, choose .
On the Protected Objects page, select the instance and click Add Object for Protection.
In the Add Object for Protection dialog box, select Add Asset or Add Manually, and then click Confirm.
Add Asset: Select a public IP address within the current Alibaba Cloud account.
Add Manually: Manually enter a public IP address within the current Alibaba Cloud account.
Scenario 3: You purchase an Anti-DDoS Origin 2.0 (Pay-as-you-go) instance
The instance can protect an asset of a regular Alibaba Cloud service or an elastic IP address (EIP) with Anti-DDoS (Enhanced) enabled.
Asset of a regular Alibaba Cloud service: You can perform the following operations to add the asset to the instance.
EIP with Anti-DDoS (Enhanced) enabled: After you purchase an EIP with Anti-DDoS (Enhanced) enabled, the EIP is automatically added for protection. You do not need to manually add it. You can view the purchased EIP with Anti-DDoS (Enhanced) enabled on the Protected Objects page. Click the EIPs With Anti-DDoS (Enhanced) Enabled tab.
Log on to the Traffic Security console.
In the top navigation bar, select the resource group to which the instance belongs and select All Regions for the region.
In the left-side navigation pane, choose .
On the Protected Objects page, select the instance and click Add Object for Protection.
In the Add Object for Protection dialog box, select Add Asset or Add Manually, and then click Confirm.
Add Asset: Select a public IP address within the current Alibaba Cloud account.
Add Manually: Manually enter a public IP address within the current Alibaba Cloud account.
Scenario 4: You enable the multi-account management feature and add assets of members
If your Alibaba Cloud account has the multi-account management feature enabled and is the management account, you can add assets of members for protection. For more information, see Multi-account management.
You can enable the multi-account management feature only for Anti-DDoS Origin 2.0 (Subscription) Enterprise instances and Anti-DDoS Origin 2.0 (Pay-as-you-go) instances.
Asset of a regular Alibaba Cloud service: You can perform the following operations to add the asset to the instance.
EIP with Anti-DDoS (Enhanced) enabled: After the multi-account management feature is enabled, an EIP with Anti-DDoS (Enhanced) enabled that is purchased by a member is automatically added for protection. You do not need to manually add it. You can view the purchased EIP with Anti-DDoS (Enhanced) enabled on the Protected Objects page. Click the EIPs With Anti-DDoS (Enhanced) Enabled tab.
Log on to the Traffic Security console.
In the top navigation bar, select the resource group to which the instance belongs and select All Regions for the region.
In the left-side navigation pane, choose .
On the Protected Objects page, select the instance and click Add Object for Protection.
In the Add Object for Protection dialog box, select Add Assets of Members, and then click Confirm.
Enable cross-border traffic blocking for a protected object
The cross-border traffic blocking mitigation policy has a validity period and can be used only 10 times per month. We recommend that you enable this policy only when a DDoS attack occurs.
The cross-border traffic blocking mitigation policy discards all cross-border service traffic within a specified blocking period. This policy is suitable for scenarios in which your service does not involve cross-border traffic. The policy typically discards traffic from specific regions based on the location of the attack source by using core routers in the backbone network of an Internet service provider (ISP).
If the protected asset resides in the Chinese mainland, the cross-border traffic blocking mitigation policy blocks all traffic from outside the Chinese mainland.
If the protected asset resides outside the Chinese mainland, the cross-border traffic blocking mitigation policy is not supported.
When an attack occurs, you can log on to the Traffic Security console and view the details of the attack event on the Attack Analysis page. If you find that the attack traffic comes from cross-border IP addresses, you can enable cross-border traffic blocking for the public IP address. After the blocking period ends, the traffic blocking is automatically deactivated. If you no longer want to block cross-border traffic, you can manually disable it before the blocking period ends.
Log on to the Traffic Security console.
In the top navigation bar, select the resource group to which the instances belong and the region in which the instances reside.
Anti-DDoS Origin 1.0 (Subscription) instances: Select the region in which the instance resides.
Anti-DDoS Origin 2.0 (Subscription) and Anti-DDoS Origin 2.0 (Pay-as-you-go) instances: Select All Regions.
In the left-side navigation pane, choose .
Select the instance, find the IP address, and turn on the switch in the Cross-border Traffic Blocking column. Then, set the blocking period.
NoteThe blocking period can be 30 minutes to 1 day. You cannot directly change the blocking period after you configure it. If you want to change the blocking period, you must disable cross-border traffic blocking and enable it again.
You can view the Blocking Start Time and Blocking End Time in the asset list. After the blocking period ends, the traffic blocking is automatically deactivated, and the Cross-border Traffic Blocking status of the public IP address changes to Disabled.
Manage protected objects
View the details of protected objects
Log on to the Traffic Security console.
In the top navigation bar, select the resource group to which the instances belong and the region in which the instances reside.
Anti-DDoS Origin 1.0 (Subscription) instances: Select the region in which the instance resides.
Anti-DDoS Origin 2.0 (Subscription) and Anti-DDoS Origin 2.0 (Pay-as-you-go) instances: Select All Regions.
In the left-side navigation pane, choose .
On the Protected Objects page, select the instance that you want to view. You can view the protection configuration details of the public IP addresses that are protected by the instance.
Assets that are assigned public IP addresses and WAF instances
Item
Description
IP
The public IP address that is protected by the instance.
Asset Owner
If the current Alibaba Cloud account has the multi-account management feature enabled and is the management account, and you are using an Anti-DDoS Origin 2.0 Enterprise instance, this item will be displayed.
The Alibaba Cloud account to which the asset belongs. This column is displayed only when the current Alibaba Cloud account has the multi-account management feature enabled and is the management account, and you purchase an Anti-DDoS Origin 2.0 Enterprise instance.
Traffic Scrubbing Threshold
The minimum bandwidth that must be reached before traffic scrubbing is triggered. The bandwidth is measured in Mbit/s and packets per second (PPS). For more information, see Set a traffic scrubbing threshold.
Region
The region in which the asset resides.
Asset Type
The type of the asset.
Status
The security status of an asset.
Normal
Blackholed: Click Deactivate Blackhole in the Actions column. In the Deactivate Blackhole dialog box, view the remaining quota for deactivating blackhole filtering, confirm the deactivation, and then click OK. You can view the records of blackhole events. For more information, see View the details of a blackhole event.
Mitigation Policy
The mitigation policy that is attached to the public IP address.
If the value is Default, the default mitigation capability of Anti-DDoS Origin is used for the public IP address. If a custom mitigation policy is used, you can click the policy to go to the Mitigation Settings page and view the details of the policy.
Cross-border Traffic Blocking
Indicates whether cross-border traffic blocking is enabled.
Actions
Delete: Delete the protected object.
Deactivate Blackhole: This operation is available only when the status of the asset is Blackholed.
View Applied Policy: View the details of the mitigation policy that is attached to the public IP address.
Eips with anti-DDoS (enhanced) enabled
Item
Description
IP
The EIP with Anti-DDoS (Enhanced Edition) enabled.
Asset Owner
This column is displayed only when the current Alibaba Cloud account has the multi-account management feature enabled and is the management account.
The Alibaba Cloud account to which the asset belongs. This column is displayed only when the current Alibaba Cloud account has the multi-account management feature enabled and is the management account.
Traffic Scrubbing Threshold
The minimum bandwidth that must be reached before traffic scrubbing is triggered. The bandwidth is measured in Mbit/s and pps. For more information, see Set a traffic scrubbing threshold.
Region
The region in which the EIP with Anti-DDoS (Enhanced) enabled resides.
Asset Type
The value is fixed as EIP with Anti-DDoS (Enhanced Edition) Enabled.
Ports
The number of ports for which port-specific mitigation policies are configured under Anti-DDoS Pro/Premium EIP. You can click the
icon on the left of the target IP to view which ports have mitigation policies configured.
Status
The security status of the EIP with Anti-DDoS (Enhanced) enabled.
Normal
Blackholed: Click Deactivate Blackhole in the Actions column. In the Deactivate Blackhole dialog box, view the remaining quota for deactivating blackhole filtering, confirm the deactivation, and then click OK. You can view the records of blackhole events. For more information, see View the details of a blackhole event.
Mitigation Policy
The mitigation policy that is attached to the EIP with Anti-DDoS (Enhanced) enabled.
If the value is Default, the default mitigation capability of Anti-DDoS Origin is used for the EIP with Anti-DDoS (Enhanced) enabled. If a custom mitigation policy is used, you can click the policy to go to the Mitigation Settings page and view the details of the policy.
Cross-border Traffic Blocking
Indicates whether cross-border traffic blocking is enabled.
Actions
Add Port: Add a port.
Deactivate Blackhole: This operation is available only when the status of the EIP with Anti-DDoS (Enhanced) enabled is Blackholed.
View Applied Policy: View the details of the mitigation policy that is attached to the EIP with Anti-DDoS (Enhanced) enabled.
Delete a protected object
On the Protected Objects page, select the instance.
In the asset list, find the public IP address and click Delete in the Actions column.
In the Delete Protected Object dialog box, read the prompt information and click OK.
FAQ
References
After you add an object for protection, if the Mitigation Policy is Default, the default mitigation capability of Anti-DDoS Origin is used for the public IP address. If your service requires that traffic with specific characteristics be allowed or blocked, you can customize a mitigation policy and attach the policy to the protected object. For more information, see IP-specific mitigation policies and Port-specific mitigation policies.
WarningWhen you attach a port-specific mitigation policy to a port, a transient connection that lasts a few seconds occurs on your TCP-based services. We recommend that you attach a port-specific mitigation policy to a port during off-peak hours.
Assets of regular Alibaba Cloud services support only IP-specific mitigation policies. EIPs with Anti-DDoS (Enhanced) enabled support both IP-specific and port-specific mitigation policies. If you configure both IP-specific and port-specific mitigation policies, IP-specific mitigation policies have a higher priority.
For information about how to set a traffic scrubbing threshold for an asset, see Set a traffic scrubbing threshold.