All Documents
Current Document

Content is empty

If you don't find the content you expect, please try another search term

Documentation

Configure CC attack defense

Last updated:2020-09-23 18:14:42

This topic describes how to configure Challenge Collapsar (CC) attack defense.

Contents

KAD-based CC attack defense

Resource record-based CC attack defense

KAD-based CC attack defense

Enable or disable CC attack defense

  1. Log in to the KAD console.
  2. Select the target KAD instance from the KAD instance list.
  3. Move the pointer to More, and select CC Turn On.

image.png

Note: Make sure that the KAD instance is enabled.

To disable CC attack defense, click CC Turn Off.

Back


Resource record-based CC attack defense

Enable or disable CC attack defense

  1. Log in to the KAD console.
  2. Select the target KAD instance from the KAD instance list.
  3. In the lower part of the page, click the CC Config tab.
  4. Select a resource record, and click Start.

Note: Make sure that the KAD instance is started and CC attack defense is enabled.

image.png

You can disable CC attack defense for a DNS record in the same manner.

Back


Add a custom CC attack defense rule

  1. Select the target KAD instance.
  2. In the lower part of the page, click the CC Config tab.

image.png

  1. Click Manage Rules.
  2. Click Add. In the dialog box that appears, enter the rule group name, and click Add.
  3. Select the rule group. In the lower part of the page, click Add Subrule.
  4. Set rule information, including IP, UA, Referrer, and Path.

image.png

Back


Modify CC attack defense configuration

  1. Select the target KAD instance.
  2. In the lower part of the page, click the CC Config tab.
  3. Select a resource record, and click Edit in the Operation column.
  4. In the editing mode, you can modify the request threshold (QPS) and the CC rules group.

Request threshold (QPS): The maximum number of requests (queries) allowed to be processed by a web server per second (QPS). When the actual number of requests exceeds this threshold, the system detects and blocks malicious attack requests, and sends verification codes to the suspected hosts to verify whether they are attackers. If the number of requests is smaller than this threshold, CC attack defense will not be triggered.

Back

On this page
Pure ModeNormal Mode

Pure Mode

Click to preview the document content in full screen
Feedback