Last update:2024-06-12 18:29:13
In the DDOS Protection > L7 DDoS Protection > Managed Protection, the managed rules with the action of “Deny Connection” is used to protect the mitigation infrastructure during ultra-large-scale L7 DDoS attacks. The Cloud Security 2.0 platform will automatically ban the repeatedly attacking IP at the L3/4 and record it in the L3/4 Banned IPs logs.
On the L3/4 Banned IPs page, you can:
Since the “Deny Connection” works at the L3/4, its effectiveness granularity is the mitigation node IP + attack IP, not the hostname. The L3/4 Banned IPs logs for the exclusive IP and its query will only be generated when you have purchased the exclusive IP value-added service. Therefore, this page is not open by default. If you have purchased the exclusive IP, please contact technical support to open it.
Entering the L3/4 Banned IPs page:
After clicking “Search”, the total number of hit logs and logs will be displayed. The log information includes: Time, Client IP, Node IP, Policy Name, Rule Name, Action, Explanation (expand to view), Request Information (expand to view).
Supports downloading the query results filtered by the query conditions to a CSV file for viewing.