This topic describes how to configure Challenge Collapsar (CC) attack defense.
Contents
KAD-based CC attack defense
Resource record-based CC attack defense
KAD-based CC attack defense
Enable or disable CC attack defense
- Log in to the KAD console.
- Select the target KAD instance from the KAD instance list.
- Move the pointer to More, and select CC Turn On.
Note: Make sure that the KAD instance is enabled.
To disable CC attack defense, click CC Turn Off.
Back
Resource record-based CC attack defense
Enable or disable CC attack defense
- Log in to the KAD console.
- Select the target KAD instance from the KAD instance list.
- In the lower part of the page, click the CC Config tab.
- Select a resource record, and click Start.
Note: Make sure that the KAD instance is started and CC attack defense is enabled.
You can disable CC attack defense for a DNS record in the same manner.
Back
Add a custom CC attack defense rule
- Select the target KAD instance.
- In the lower part of the page, click the CC Config tab.
- Click Manage Rules.
- Click Add. In the dialog box that appears, enter the rule group name, and click Add.
- Select the rule group. In the lower part of the page, click Add Subrule.
- Set rule information, including IP, UA, Referrer, and Path.
Back
Modify CC attack defense configuration
- Select the target KAD instance.
- In the lower part of the page, click the CC Config tab.
- Select a resource record, and click Edit in the Operation column.
- In the editing mode, you can modify the request threshold (QPS) and the CC rules group.
Request threshold (QPS): The maximum number of requests (queries) allowed to be processed by a web server per second (QPS). When the actual number of requests exceeds this threshold, the system detects and blocks malicious attack requests, and sends verification codes to the suspected hosts to verify whether they are attackers. If the number of requests is smaller than this threshold, CC attack defense will not be triggered.
Back