You will need to configure your DDoS-filtered IP manually after your order is processed. The IP, gateway, and netmask have been provided to you via email. Please use the configuration examples below as needed.
Netplan Configuration (Ubuntu/Debian)
Log into your server
Connect via SSH to your instance.
Get root access
sudo -iCreate configuration file
nano /etc/netplan/60-filtered-ip.yamlAdd configuration
Add the following, replacing it with your IP and interface information:
network:
version: 2
ethernets:
<adapter name>:
addresses:
- <your filtered IP>/<netmask>
gateway4: <filtered IP gateway>
nameservers:
addresses: [8.8.8.8, 8.8.4.4]Note: Adapter typically starts with eth or ens. You can find it with ip addr show or ifconfig.
Apply changes
Apply your changes:
netplan applyOr verify first with:
netplan tryVerify configuration
Confirm the IP was added properly:
ip addr showInterfaces Configuration (Debian)
Disable cloud-init network
Create a new cloud-init configuration file:
/etc/cloud/cloud.cfg.d/95-debian-network-config.cfgWith contents:
network: {config: disabled}Comment out cloud-init interface
Edit /etc/network/interfaces.d/50-cloud-init.cfg and comment all lines related to eth0 (or any interface you want to statically configure).
Configure static IP
Edit /etc/network/interfaces. Replace iface eth0 inet dhcp with:
iface eth0 inet static
address <your IPv4 address>/24
gateway <your IPv4 gateway>Add IPv6 (optional)
You can add IPv6 the same way:
iface eth0 inet6 static
address <your IPv6 address>/64
gateway <your IPv6 gateway>Apply changes
Save and close the file. Then run:
ifdown eth0;ifup eth0Or simply reboot:
rebootSuccess! Your DDoS-filtered IP should now be configured and active. You can verify connectivity by pinging the IP address or accessing services running on your server.
