You can create network acceleration rules to enable an Anti-DDoS Premium instance of the Insurance or Unlimited mitigation plan to work together with an Anti-DDoS Premium instance of the MCA mitigation plan. If no attacks occur after you enable the network acceleration feature, service access is accelerated by the Anti-DDoS Premium instance of the MCA mitigation plan. If attacks occur, service traffic is switched to the Anti-DDoS Premium instance of the Insurance or Unlimited mitigation plan for scrubbing. This way, only normal service traffic is forwarded to the origin server.
Prerequisites
- An Anti-DDoS Premium instance of the MCA mitigation plan is purchased.
For more information, see References.
- An Anti-DDoS Premium instance of the Insurance or Unlimited mitigation plan is purchased.
Notice The clean bandwidth and queries per second (QPS) of the instance must meet the protection requirements of your services.
For more information, see Purchase an Anti-DDoS Pro or Anti-DDoS Premium instance.
- Your website is added to an Anti-DDoS Premium instance. The website is associated
with both the Anti-DDoS Premium instance of the MCA mitigation plan and the Anti-DDoS
Premium instance of the Insurance or Unlimited mitigation plan.
For more information, see Add a website.
- Both the Anti-DDoS Premium instance of the MCA mitigation plan and the Anti-DDoS Premium
instance of the Insurance or Unlimited mitigation plan forward service traffic as
expected.
For more information, see Verify the forwarding configurations on your local computer.
Background information
Network acceleration is suitable for scenarios in which services are deployed outside the Chinese mainland but most users of the services are located in the Chinese mainland. In these scenarios, if you use only the Anti-DDoS Premium instance of the Insurance or Ultimate mitigation plan to protect your services, the access latency is increased for the users in the Chinese mainland.
You can purchase an Anti-DDoS Premium instance of the Insurance or Unlimited mitigation plan and an Anti-DDoS Premium instance of the MCA mitigation plan. This way, if no attacks occur, service access is accelerated by the Anti-DDoS Premium instance of the MCA mitigation plan. If attacks occur, service traffic is switched to the Anti-DDoS Premium instance of the Insurance or Unlimited mitigation plan for scrubbing.

Create a network acceleration rule
If no attacks occur after a network acceleration rule is created, service access of users in the Chinese mainland is accelerated by using the Anti-DDoS Premium instance of the MCA mitigation plan. If attacks occur, the service traffic is switched to the Anti-DDoS Premium instance of the Insurance or Unlimited mitigation plan for scrubbing. This way, only normal service traffic is forwarded to the origin server. If service traffic is automatically switched to the Anti-DDoS Premium instance of the Insurance or Unlimited mitigation plan, the instance switches the service traffic back to the Anti-DDoS Premium of the MCA mitigation plan when the attacks stop and the waiting time that you specify elapses.
In addition to automatic switchover, you can also manually switch the service traffic to the Anti-DDoS Premium instance of the Insurance or Unlimited mitigation plan and then manually switch the service traffic back to the Anti-DDoS Premium instance of the MCA mitigation plan based on the protection requirements of your services. For more information, see What to do next.
What to do next
After a cloud service interaction rule is created, you can perform the following operations on the rule.
Operation | Description |
---|---|
Switch to DDoS | If traffic scrubbing by your Anti-DDoS Pro or Anti-DDoS Premium instance is not automatically
triggered, the ![]() ![]() Service traffic can be switched to your Anti-DDoS Pro or Anti-DDoS Premium instance
only if blackhole filtering is not triggered for the IP address of the instance.
Notice After you manually switch service traffic to your Anti-DDoS Pro or Anti-DDoS Premium
instance, the service traffic cannot be automatically switched back to the associated
cloud resources. To switch the service traffic back to the associated cloud resources,
you must click Switch back to manually switch the service traffic.
|
Switch back | If service traffic is scrubbed by your Anti-DDoS Pro or Anti-DDoS Premium instance,
the ![]() ![]() Notice
If blackhole filtering is triggered for the IP addresses of all associated cloud resources, the switchback fails. If blackhole filtering is deactivated for some cloud resources, service traffic is first switched back to these cloud resources. After blackhole filtering is deactivated for the remaining cloud resources, service traffic is also switched back to these cloud resources. |
Edit | You can modify the cloud service interaction rule. However, you cannot change the values of Interaction Scenario and Name for the rule. |
Delete | You can delete the cloud service interaction rule.
Warning Before you delete a rule, make sure that the domain name of your website is not mapped
to the CNAME provided by Sec-Traffic Manager. Otherwise, access to the website may
fail after you delete the rule.
|