Back to Cloud VPS Documentation

    DDoS-Filtered IP Configuration

    Configure your DDoS-protected IP address manually

    You will need to configure your DDoS-filtered IP manually after your order is processed. The IP, gateway, and netmask have been provided to you via email. Please use the configuration examples below as needed.

    Netplan Configuration (Ubuntu/Debian)

    Log into your server

    Connect via SSH to your instance.

    Get root access

    sudo -i

    Create configuration file

    nano /etc/netplan/60-filtered-ip.yaml

    Add configuration

    Add the following, replacing it with your IP and interface information:

    network:
      version: 2
      ethernets:
        <adapter name>:
          addresses:
            - <your filtered IP>/<netmask>
          gateway4: <filtered IP gateway>
          nameservers:
            addresses: [8.8.8.8, 8.8.4.4]

    Note: Adapter typically starts with eth or ens. You can find it with ip addr show or ifconfig.

    Apply changes

    Apply your changes:

    netplan apply

    Or verify first with:

    netplan try

    Verify configuration

    Confirm the IP was added properly:

    ip addr show

    Interfaces Configuration (Debian)

    Disable cloud-init network

    Create a new cloud-init configuration file:

    /etc/cloud/cloud.cfg.d/95-debian-network-config.cfg

    With contents:

    network: {config: disabled}

    Comment out cloud-init interface

    Edit /etc/network/interfaces.d/50-cloud-init.cfg and comment all lines related to eth0 (or any interface you want to statically configure).

    Configure static IP

    Edit /etc/network/interfaces. Replace iface eth0 inet dhcp with:

    iface eth0 inet static
        address <your IPv4 address>/24
        gateway <your IPv4 gateway>

    Add IPv6 (optional)

    You can add IPv6 the same way:

    iface eth0 inet6 static
        address <your IPv6 address>/64
        gateway <your IPv6 gateway>

    Apply changes

    Save and close the file. Then run:

    ifdown eth0;ifup eth0

    Or simply reboot:

    reboot

    Success! Your DDoS-filtered IP should now be configured and active. You can verify connectivity by pinging the IP address or accessing services running on your server.