Help Center>
Anti-DDoS Service>
FAQs>
AAD FAQs>
Access Configuration>
How Do I Check Whether a Protected Domain Name Is Correctly Configured After I Connect It to AAD?
Updated on 2023-09-14 GMT+08:00
How Do I Check Whether a Protected Domain Name Is Correctly Configured After I Connect It to AAD?
- Log in to the management console.
- How Do I Connect My Service System to AAD? describes how to add domain names to be protected to AAD.
- Copy the CNAME value of the domain name to be tested.
- Ping the CNAME value and record the corresponding IP address (for example, 192.168.0.1).
- Modify the local hosts file. This section uses Windows as an example. Go to the C:\Windows\System32\drivers\etc directory and open the hosts file. Add a record to the file, as shown in the following figure:
- Clear the browser cache and enter the domain name in the address box to check whether you can access the domain name properly.
Parent topic: Access Configuration
Access Configuration FAQs
- Can I Connect My Service System to AAD If It Is Not Running on HUAWEI CLOUD?
- How Do I Check Whether a Protected Domain Name Is Correctly Configured After I Connect It to AAD?
- What Can I Do When Message "Invalid request" Is Displayed When I Upload an HTTPS/WebSockets Certificate?
- How Do I Convert a Non-PEM Certificate into a PEM One?
- How Do I Enable Both AAD and WAF?
- How Do I Connect My Service System to AAD?
- How Is CNAME-based Access Implemented?
- How Does AAD Distribute Traffic When There Are Multiple Origin Servers?
- How Do I Check Whether a Back-to-Origin IP Address Has Been Whitelisted on My Origin Server?
- How Do I Change the Exposed IP Address of an Origin Server?
- How Do I Query the Back-to-Origin IP Address Range?
- Can I Migrate Enterprise Project Resources After Adding the Protected Domain Name?
- Can I Build My Own Anti-DDoS System Using HUAWEI CLOUD ECSs?
- How Do the AAD Blacklist and Whitelist Protect Customer's Servers?
- Do I Still Need to Configure the Blacklist and Whitelist in WAF Protection Policies After Configuring Them in DDoS Protection Policies?
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
The system is busy. Please try again later.
For any further questions, feel free to contact us through the chatbot.
Chatbotmore