After you add non-website services to Anti-DDoS Pro or Anti-DDoS Premium, issues such
as logon timeout or disconnections may occur. In this case, you can enable the session
persistence feature. This feature forwards requests from the same client to the same
backend server within a specified period. This topic describes how to configure session
persistence for a port forwarding rule.
Prerequisites
A port forwarding rule for a non-website service is configured on the Port Config
page. For more information, see
Create forwarding rules.
Enable session persistence
- Log on to the Anti-DDoS Pro console.
- In the top navigation bar, select the region where your instance resides.
- Mainland China: If you select this region, the Anti-DDoS Pro console appears.
- Outside Mainland China: If you select this region, the Anti-DDoS Premium console appears.
You can switch the region to configure and manage Anti-DDoS Pro or Anti-DDoS Premium
instances. Make sure that you select the required region when you use Anti-DDoS Pro
or Anti-DDoS Premium.
- In the left-side navigation pane, choose .
- On the Port Config page, select the instance, find the forwarding rule that you want to manage, and
then click Change in the Session Persistence column.
- In the Session Persistence dialog box, set Timeout Period and click Complete. The timeout period is measured in seconds, and the valid value ranges from 30 to
3600.
After the session persistence feature is enabled, the status of
Session Persistence changes to
Enabled.

Configure session persistence or health checks for multiple rules
- Log on to the Anti-DDoS Pro console.
- In the top navigation bar, select the region where your instance resides.
- Mainland China: If you select this region, the Anti-DDoS Pro console appears.
- Outside Mainland China: If you select this region, the Anti-DDoS Premium console appears.
You can switch the region to configure and manage Anti-DDoS Pro or Anti-DDoS Premium
instances. Make sure that you select the required region when you use Anti-DDoS Pro
or Anti-DDoS Premium.
- In the left-side navigation pane, choose .
- On the Port Config page, select the target instance, click Batch Operations below the rule list, and select Session Persistence/Health Check Settings.
- In the Create Session/Health Settings dialog box, enter the required information and click Create.
Note You can export health check settings to a TXT file, modify the settings in the TXT
file, and then copy and paste the settings to the Create Session/Health Settings dialog
box. In the TXT file, keep the settings of all rules in the same format. For more
information, see
Export multiple port configurations.
The formats of session persistence and health check settings are described as follows:
- Enter the session persistence and health check settings of each forwarding rule in
each row.
- Health check settings include the following fields left to right: forwarding port,
forwarding protocol (TCP or UDP), session persistence period, health check type, port,
response timeout period, check interval, unhealthy threshold, healthy threshold, path,
and domain. The session persistence period is measured in seconds, and the valid value
ranges from 30 to 3600. Fields are separated with spaces. For more information about
the fields, see Health check parameters.
- The forwarding port must be specified in forwarding rules.
- Health check types include TCP, HTTP, and UDP. If a forwarding rule uses UDP, we recommend
that you configure a UDP health check. If a forwarding rule uses TCP, we recommend
that you configure a TCP health check (Layer 4 health check) or HTTP health check
(Layer 7 health check).
- If you configure an HTTP health check, the Path parameter is required, but the Domain
parameter is optional.