Configuring a Blackhole Policy

When a heavy-traffic attack occurs, you can configure a blackhole policy to defend against attack traffic. After the policy takes effect, all traffic is discarded. Exercise caution when using this function.

Context

There are dynamic and static blackholes.


Copyright © Huawei Technologies Co., Ltd.