Non-website Business Connection

Last updated: 2020-07-30 12:10:24

    This document describes how to connect a non-website business to an Anti-DDoS Advanced instance and verify the forwarding configuration.

    Prerequisites

    Process

    Directions

    Configuring forwarding rule

    1. Log in to the new Anti-DDoS Advanced Console and click Business Connection on the left sidebar.
    2. On the "Business Connection" page, select the Port Connection tab and click Add Rule.
    3. On the forwarding rule adding page, configure the following parameters as needed:

      Parameter description:
      • Associated Anti-DDoS Advanced IP: select the target IP.
      • Forwarding Protocol: TCP and UDP are supported.
      • Forwarding Port: it is the Anti-DDoS Advanced IP port to be accessed. You are recommended to select the same port as that of the real server. Port 843 cannot be used as the forwarding port of an Anti-DDoS Advanced IP in all regions except Beijing and Guangzhou.
      • Real Server Port: it is the real port of your business website.
      • Forwarding Method: forwarding via IP and forwarding via domain name are supported.
      • Load Balancing Method: only weighted round-robin is supported currently.
      • Real Server IP + Weight or Real Server Domain Name: enter the real server IP + weight or real server domain name based on the forwarding method. Up to 20 pairs of IP + weight or domain names are supported.
        • If you select Forwarding via IP, enter the real server IP address + weight such as 1.1.1.1 50. If a domain name corresponds to multiple pairs of real server IP + weight, you can enter all of them and separate them with carriage returns. Up to 20 entries are supported.
        • If you select Forwarding via domain name, enter the real server domain name. If one domain name corresponds to multiple real server domain names, you can enter all of them and separate them with carriage returns. Up to 20 entries are supported.

    Opening forwarding IP range

    To prevent business interruption that occurs if the real server blocks the Anti-DDoS Advanced forwarding IP, you are recommended to configure allowlist policies for the real server infrastructure (such as firewall, web application firewall, intrusion protection system (IPS), and traffic management system) and disable the protection features of the server firewall and other security software tools (such as Safedog) or set allowlist policies for them, so that the forwarding IP will not be affected by the security policies of the real server.

    You can log in to the new Anti-DDoS Advanced Console and click Instance List on the left sidebar to find the target instance ID.

    Click the instance ID to enter the basic information page and view the Anti-DDoS Advanced forwarding IP range.

    Verifying configuration locally

    After the forwarding configuration is completed, the Anti-DDoS Advanced IP will forward the packets from the relevant port to the corresponding real server port according to the forwarding rule.
    To ensure the stability of your business, a local test is recommended. The verification method is as follows:

    • For businesses accessed through IPs
      For businesses accessed through IPs (such as games), run telnet to check whether the Anti-DDoS Advanced port is accessible. You can also enter the Anti-DDoS Advanced IP as the server IP in your local client (if available) to check whether the local client can connect to it.

      For example, if your Anti-DDoS Advanced IP is 10.1.1.1 with forwarding port 1234, and your real server IP is 10.2.2.2 with port 1234, when you run telnet locally to access 10.1.1.1:1234, if the address can be accessed, the forwarding is successful.

    • For businesses accessed through domain names
      For businesses accessed through domain names, you can modify the local hosts file to verify whether the configuration has taken effect.
      a. Modify the local hosts file to direct local requests to the protected site to your Anti-DDoS Advanced instance. The following uses Windows as an example to describe how to configure the local hosts file:
      Open the hosts file in C:\Windows\System32\drivers\etc and add the following content at the end of the file:

        <Anti-DDoS Advanced IP address> <Domain name of the protected website>

      For example, if the Anti-DDoS Advanced IP is 10.1.1.1 and the domain name is www.qq.com, then add:

        10.1.1.1       www.qqq.com

      Save the hosts file and run the ping command on the local computer to ping the protected domain name. If the resolved IP address is the Anti-DDoS Advanced IP address bound in the hosts file, the local hosts configuration has taken effect.

      If the resolved IP address is still the real server IP address, try running the ipconfig /flushdns command in Windows Command Prompt to clear the local DNS cache.

      b. After successfully configuring the hosts, check whether the domain name can be accessed. If it can be accessed properly, the configuration has taken effect.

    If the verification still fails with the correct method, please log in to the Anti-DDoS Advanced Console and check whether the configuration is correct. If the problem persists after you fix any incorrect configuration items, please contact Tencent Cloud technical support.

    Was this page helpful?

    Was this page helpful?

    • Not at all
    • Not very helpful
    • Somewhat helpful
    • Very helpful
    • Extremely helpful
    Send Feedback
    Help