The blackhole policy can be decapsulated automatically and manually.
After an action is performed on a specified IP address, the defense system cannot detect whether the attack is terminated because it cannot obtain traffic statistics about the IP address. In this method, the blackhole policy is automatically decapsulated based on the default encapsulation time.

The timing starts after the blackhole task is created. If the duration reaches the value of Blackhole Duration(Minutes), the ATIC automatically delivers the NP blocking policy to the anti-DDoS device to decapsulate the blackhole policy.
Dynamic and static blackhole policies (triggered based on the alarm severity and whether the second-level blackhole is enabled) can be manually decapsulated.
