Skip to content

Ddos

Deny lists, firewall rule groups, and tunnel-based safeguards. Rate limiting and pattern analysis for network perimeter security.

Category: Security

  • Configure DDoS protection policies
  • Monitor and analyze DDoS threats
  • Configure infrastructure protection
ResourceDescriptionTierDependencies
ddos_protectionDDoS protectionAdvancedNone
ddos_mitigation_ruleDDoS mitigation ruleAdvancedNone
DomainDescription
Network SecurityNAT policies, firewalls, and segment connections.
VirtualHTTP, TCP, UDP load balancing with origin pools.

Generated from enriched API specs and local xcsh examples.