All Products
Search
Document Center

Anti-DDoS:Configure near-origin traffic diversion

Last Updated:Mar 31, 2026

When a volumetric DDoS attack approaches your Anti-DDoS Proxy (Chinese Mainland) instance's mitigation capacity, scrubbing-center defenses alone may not prevent blackhole filtering from triggering. Near-origin traffic diversion addresses this by dropping attack traffic at Internet Service Provider (ISP) backbone core routers — close to the attack source, before it reaches your instance — reducing the total incoming volume and lowering the risk of hitting the blackhole threshold. You can disable this feature at any time.

When to use this feature

Enable near-origin traffic diversion when:

  • Your Anti-DDoS Proxy (Chinese Mainland) instance is under a volumetric attack that is approaching its mitigation capacity, and

  • A significant portion of the attack traffic originates from outside the Chinese mainland.

For example, if 30% of the attack traffic comes from outside the Chinese mainland, blocking that traffic can meaningfully reduce pressure on your instance.

Near-origin traffic diversion vs. location blacklist

Both features block traffic by geographic origin but operate differently:

Near-origin traffic diversionLocation blacklist
Where traffic is droppedAt ISP backbone core routers, near the attack sourceAt scrubbing centers, near the destination
Effect on total traffic volumeReduces incoming traffic volumeNo reduction
Attack typeVolumetric attacks near capacityConnection flood attacks

Use near-origin traffic diversion when you need to reduce the raw volume of incoming traffic. Use the location blacklist when you need to filter connection flood attacks without changing traffic volume. For more information about the location blacklist, see Configure the location blacklist.

Limitations

  • Near-origin traffic diversion is available only for Anti-DDoS Proxy (Chinese Mainland).

  • Each activation consumes one quota. The quota varies by function plan:

    Function planQuotaResets
    Standard10 activations per accountNever; cannot be upgraded
    Enhanced10 activations per account per monthAt the beginning of each month

    Check your remaining quota before activating during an attack to avoid running out mid-incident.

Prerequisites

Before you begin, ensure that you have:

Block traffic by ISP line

Each activation blocks traffic from outside the Chinese mainland on one ISP line — China Telecom or China Unicom — for a duration you specify. Start with China Telecom, then monitor the attack traffic volume. If the volume continues to approach your instance's mitigation capacity, block China Unicom traffic as well.

  1. Log on to the Anti-DDoS Proxy console.

  2. In the top navigation bar, select Chinese Mainland.

  3. In the left-side navigation pane, choose Mitigation Settings > General Policies.

  4. On the Protection for Infrastructure tab, select the instance you want to manage from the list on the left.

    Note
  5. In the Near-origin Traffic Diversion section, block one or both ISP lines:

    Near-origin Traffic Diversion section

    • China Telecom (Outside China): Click Actions to the right of this row. Set Blocking Duration (15 minutes to 24 hours), then click OK.

    • China Unicom (Outside China): Click Actions to the right of this row. Set Blocking Duration (15 minutes to 24 hours), then click OK.

Verify and manage blocking

After activating the feature, click View Blocking Information in the Near-origin Traffic Diversion section to confirm the blocked regions and blocking periods.

If traffic diversion succeeds, no error message appears. If an error message appears, follow the on-screen instructions to troubleshoot, then try again.

To stop blocking before the blocking period ends, click Unblock.

What's next

Monitor the attack traffic volume in the console. If traffic remains high after blocking one ISP line, block the other ISP line using the same steps.