xcsh ddos¶
Volumetric attack mitigation and traffic scrubbing.
Synopsis¶
Description¶
Network perimeter hardening through deny list configurations, rule group hierarchies, and encrypted tunnel endpoints. Attack signature detection identifies flood patterns while throttling mechanisms block anomalous traffic bursts. Tunnel health checks verify coverage across distributed segments. Priority ordering governs policy application for multi-layered screening approaches.
Available Commands¶
| Command | Description |
|---|---|
| add-labels | Add-labels Ddos resources |
| apply | Apply Ddos resources |
| create | Create Ddos resources |
| delete | Delete Ddos resources |
| get | Get Ddos resources |
| list | List Ddos resources |
| patch | Patch Ddos resources |
| remove-labels | Remove-labels Ddos resources |
| replace | Replace Ddos resources |
| status | Status Ddos resources |