When a heavy-traffic attack occurs, you can configure a blackhole policy to defend against attack traffic. After the policy takes effect, all traffic is discarded. Exercise caution when using this function.
Context
There are dynamic and static blackholes.
Configuring a Static Blackhole
A static blackhole indicates a manually configured blackhole policy that takes effect immediately after being created.
Configuring a Dynamic Blackhole
Dynamic blackholes refer to that traffic statistics are collected based on destination IP addresses and blackholes are dynamically triggered based on the statistics.