How to Configure
Learn how to configure our DDoS protection.
This guide will walk you through configuring DDoS protection for your infrastructure using Edge Rules and Application Filters. We’ll cover best practices and step-by-step instructions for securing your services.
Edge Rules Configuration
Edge Rules allow you to control traffic flows based on various criteria like IP addresses, protocols, and packet characteristics.
Edge Rules management interface showing existing rules and their priorities
Best Practice: Default Deny Rule
We strongly recommend starting with a “deny all” rule and then explicitly allowing only necessary traffic. Here’s how to set this up:
Edge Rules use a dynamic priority system and follow a first-match principle. Rules are evaluated from highest priority (lowest number) to lowest priority, and processing stops at the first matching rule. For example, if a packet matches a rule with priority 1, rules with priority 2 and higher will not be evaluated. This makes rule priority crucial for proper traffic filtering.
When creating a new rule, you can only assign a priority up to (highest existing priority + 1). If you insert a rule between existing rules (e.g., adding a rule with priority 4), all subsequent rules will automatically shift down (the existing priority 4 becomes 5, 5 becomes 6, and so on). This helps maintain organized rule management while preventing priority gaps.
Create Default Deny Rule
- Click “Create New Edge Rule”
- Select “ANY” for protocol
- Set Destination to your protected IP
- Set Source IP to “0.0.0.0/0” (all IPs)
- Set Priority to “1” (highest priority)
- Set Action to “Drop”
- Add description: “Drop All Traffic”
Allow Specific Services
Create subsequent rules with higher priority numbers to allow specific services:
- Priority 1: Allow SSH (TCP port 22)
- Priority 2: Allow HTTP/HTTPS (TCP ports 80/443)
- Priority 3: Allow other required services
Application Filters
Application Filters ensure only legitimate traffic of specific applications gets through and reach your server.
Application Filter configuration showing FiveM game server protection
Setting Up Application Filters
Access Port Automation
Navigate to the Port Automation section in the dashboard
Create New Application Shield
Click “Create New Application Shield” button
Configure Application Settings
- Enter your Destination IP
- Specify the Application Port
- Select the Application Type (e.g., FiveM, Wireguard, OpenVPN, Source Engine)
Advanced Configuration Tips
Rate Limiting
When creating Edge Rules, consider setting appropriate rate limits, two types or rate limits are available:
-
Ratelimit: This defines the maximum number of packets allowed per second (1-2500000 packets) per source IP. If the source IP exceeds this limit, the packet will be dropped.
-
Ratelimit Burst: This setting allows for short bursts of traffic (1-250000 packets). It uses a token bucket algorithm, where tokens are added to a “bucket” at a fixed rate. Each packet sent removes a token. If the bucket is empty, additional packets are dropped. Each source IP has it’s own “bucket”.
Feature Matching
Use Feature Matching to fine-tune your protection:
-
State Type: Configure connection state matching
- NEW: Match packets that start a new connection
- ESTABLISHED: Match packets belonging to an existing connection
- RELATED: Match packets related to, but not part of, an existing connection
- INVALID: Match packets that don’t belong to any known connection
-
Packet Length: Set valid packet size ranges (1-65535 bytes)
- Helps identify and filter abnormal packet sizes
- Common legitimate packet sizes:
- TCP packets: typically 40-1500 bytes
- UDP gaming traffic: often 100-300 bytes
- HTTP/HTTPS: variable, but usually under 1500 bytes