First of all DNS-records should be checked. Usually for correct work
example.org [http://domain.name.com] has original IP-address
and www.example.org [http://www.domain.name.com] has CDN IP-address
and CNAME www.example.org.cybersecurecdn.com
[http://www.example.org.cybersecurecdn.com] . Checking mechanism is
described below:
In order to activate alias, a DNS CNAME record for www.example.org
[http://www.example.org] needs to be created to point
www.example.org.cybersecurecdn.com
[http://www.ex...
All checks are the same as in the previous question and customer
should provide redirect from example.org [http://domain.name.com] to
www.example.org [http://www.domain.name.com]
Settings , described below should be done.
SSL SETTINGS.
If customer uses https he need to point his SSL-certificate
configuration. The next steps should be performed:
CERTIFICATE
The certificate customer received after registering an SSL certificate
with a trusted certificate authority (it means certificate content).
SSL CHAIN CERTIFICATE
They are OPTIONAL and contain all of the certificates required to
verify the subject identified by the end certificate.
CERTIFICATE KEY
Also kn...
To check correct site work usual browser is used. First of all
redirect from http://example.org [http://domain.name] to
http://example.org [http://www.domain.name] should work and customer
should obtain site content without any errors.
To check WAF protection the next request should be used:
http://www.example.org/?a=b%20AND%201=1
[http://www.domain.name/?a=b%20AND%201=1]
It's a standard SQL injection request and it's blocked by WAF by
default. An answer on this request is Error 403 (Forbidd...
To enable malware scan you need to:
1) download the cwatch malware monitoring file from customer portal
https://login.cwatch.comodo.com/
2.) Upload the downloaded file to the root of your site
http://example.org/ [http://example.org/example.org_1500902659128.php]
3.) Switch On for automatic malware removal on customer portal
https://login.cwatch.comodo.com/
4.) Put it in the location of the file on customer
portal https://login.cwatch.comodo.com/
An example:
http://example.org/exampl...
This check is explained on example of domain example.org.
To check file location is used.
Request:
curl -v http://example.org/example.org_1500902659128.php
[http://example.org/example.org_1500902659128.php]
Correct answer:
* Hostname was NOT found in DNS cache
* Trying 74.208.236.246...
* Connected to example.org [http://example.org] (74.208.236.246) port
80 (#0)
> GET /example.org_1500902659128.php HTTP/1.1
> User-Agent: curl/7.38.0
> Host: example.org [http://example.org]
> Accept...
In malware scanner ver. 1.1 debug mode is provided. To turn it on
customer should download new php-file from customer portal, upload it
to web-server root directory and save new path for this file.
Then file cwwdebug.data should be created in web-server root
directory. This file should contain 1 key string (keyword) with digits
and letters without spaces. For example, THIS_IS_KEY. To get result
customer should send a request:
https://example.org/phpdagent011.php?debug=this_is_key
where php...
Error 531
PROBLEM DESCRIPTION
Customer gets error 531 trying to visit his site.
[http://www.websoctest.com/]ACTIONS TAKEN TO FIGURE OUT
# dig A example.org
example.org. 300 IN A 104.37.183.1
The problem is concluded in the fact that as Remote IP-address
BelugaCDN IP-address (104.37.183.1) is used as A record for customer
domain.
Remote IP-address (also called origin) is address, where customer site
is located. It shouldn't match CDN IP-address (Beluga's or another
CDN).
Customer mu...