Activation

Important

After you have connected the service, you need to perform configuration in your personal account and on your server side.

In your Contol Panel

To ensure your domain operates under our protection, you need to add it to the protected assets page. To do this, log in to your account on the website. The Objects area is located in the Control Panel tab.

Click the Add object button.

Enter your domain name in the field that appears and click the Add button.

The added domain will appear in the Objects table.

Click on the row of the added domain. A page will open with the object management menu on the left side.

Click the Protected object menu item.

On the page that opens, perform the configuration according to the instructions.

On your server side

We have allocated a protected IP address for you — you now need to replace the current A record of your domain in the DNS with this address.

Additionally, for the protection system to function correctly, you need to add our outgoing addresses to the trusted list: remove all restrictions in the Firewall and at the web server level.

The list of our outgoing networks:

  • 103.134.155.0/24
  • 160.25.253.0/24
  • 185.121.240.0/22
  • 193.84.78.0/24
  • 193.104.120.0/24
  • 188.0.150.0/24
  • 193.84.90.0/24
  • 160.79.120.0/24

You can use the following commands:

iptables -I INPUT -s 103.134.155.0/24 -j ACCEPT

iptables -I INPUT -s 160.25.253.0/24 -j ACCEPT

iptables -I INPUT -s 185.121.240.0/22 -j ACCEPT

iptables -I INPUT -s 193.84.78.0/24 -j ACCEPT

iptables -I INPUT -s 193.104.120.0/24 -j ACCEPT

iptables -I INPUT -s 188.0.150.0/24 -j ACCEPT

iptables -I INPUT -s 193.84.90.0/24 -j ACCEPT

iptables -I INPUT -s 160.79.120.0/24 -j ACCEPT

If attackers know the direct IP address of your web server, we recommend blocking connections to ports 80 and 443 for all networks except local connections and those coming from our networks:

iptables -I INPUT -p tcp -m multiport –dports 80,443 -j DROP

iptables -I INPUT -i lo -j ACCEPT

iptables -I INPUT -s 103.134.155.0/24 -j ACCEPT

iptables -I INPUT -s 160.25.253.0/24 -j ACCEPT

iptables -I INPUT -s 185.121.240.0/22 -j ACCEPT

iptables -I INPUT -s 193.84.78.0/24 -j ACCEPT

 iptables -I INPUT -s 193.104.120.0/24 -j ACCEPT

iptables -I INPUT -s 188.0.150.0/24 -j ACCEPT

iptables -I INPUT -s 193.84.90.0/24 -j ACCEPT

iptables -I INPUT -s 160.79.120.0/24 -j ACCEPT

iptables -I INPUT -s 127.0.0.1 -j ACCEPT

iptables -I INPUT -s IP.Your.Web.Server -j ACCEPT

iptables -I INPUT -m conntrack –ctstate RELATED,ESTABLISHED -j ACCEPT

After this, you need to restart your web server process. When protection is enabled, information about users’ real IP addresses is passed in the HTTP headers X-Real-IP and X-Forwarded-For. To display the real IP addresses, configure mod_rpaf for Apache web servers, mod_remoteip for Apache > 2.3, or http_real_ip for Nginx, so that your web server correctly processes these headers.

Nginx Configuration

In the configuration file /etc/nginx/nginx.conf, under the http or server section, add:

set_real_ip_from 103.134.155.0/24;

set_real_ip_from 160.25.253.0/24;

set_real_ip_from 185.121.240.0/22;

set_real_ip_from 193.84.78.0/24;

set_real_ip_from 193.104.120.0/24;

set_real_ip_from 188.0.150.0/24;

set_real_ip_from 193.84.90.0/24;

set_real_ip_from 160.79.120.0/24;

real_ip_header X-Forwarded-For;

Save the configuration file and restart Nginx with: 

service nginx restart

Apache Configuration (mod_rpaf)

In the module’s configuration file, enter the following settings.

In the module configuration file, add:

RPAFenable On

RPAFsethostname On

RPAFproxy_ips 127.0.0.0 103.134.155.0/24 160.25.253.0/24 185.121.240.0/22 193.84.78.0/24 193.104.120.0/24 188.0.150.0/24 193.84.90.0/24 160.79.120.0/24

RPAFheader X-Forwarded-For

Apache Configuration (mod_remoteip)

In the module’s configuration file, enter the following settings:

RemoteIPHeader X-Forwarded-For

RemoteIPInternalProxy 127.0.0.1 185.121.240 185.121.241 185.121.242 185.121.243 103.134.155 160.25.253 193.84.78 193.104.120 188.0.150 193.84.90 160.79.120

Save the configuration file and restart Apache with:

service apache2 restart

For IIS configuration, follow the steps in this guide: https://techcommunity.microsoft.com/t5/iis-support-blog/how-to-use-x-forwarded-for-header-to-log-actual-client-ip/ba-p/873115.

If you need help with these settings, please let us know. Also, keep the following in mind:

  • If your site uses SSL (HTTPS), you can configure it in detail in your account.
  • If you use WebSockets, let us know which ports need to be opened on our side.
  • You can also use our DNS servers — just inform us in advance via a support ticket.

When using site protection, do not disclose the server’s direct IP address. Mail should be sent through an external relay. For protecting other applications, use our application protection service.

DNS Servers

If needed, you may also use our DNS servers.
The addresses of our DNS servers are:

– dns1.storm-pro.net
– dns2.storm-pro.net
– dns3.storm-pro.net
– dns4.storm-pro.net

For any setup difficulties, please contact us via chat on the website or through the inquiry form in your account.