Ddos
🛑 Ddos
Section titled “🛑 Ddos”Deny lists, firewall rule groups, and tunnel-based safeguards. Rate limiting and pattern analysis for network perimeter security.
Category: Security
Use Cases
Section titled “Use Cases”- Configure DDoS protection policies
- Monitor and analyze DDoS threats
- Configure infrastructure protection
Resource Reference
Section titled “Resource Reference”| Resource | Description | Tier | Dependencies |
|---|---|---|---|
ddos_protection | DDoS protection | Advanced | None |
ddos_mitigation_rule | DDoS mitigation rule | Advanced | None |
Related Domains
Section titled “Related Domains”| Domain | Description |
|---|---|
| Network Security | NAT policies, firewalls, and segment connections. |
| Virtual | HTTP, TCP, UDP load balancing with origin pools. |
Generated from enriched API specs and local xcsh examples.