← Back to blog

How to migrate from a hoster Anti-DDoS to specialised protection without changing server

You can upgrade DDoS protection without moving machines, reinstalling services or leaving your current hoster. The goal is to place a specialised network layer in front of the existing infrastructure, filter attacks there, then deliver clean traffic back to the same server.

How to migrate from a hoster Anti-DDoS to specialised protection without changing server
No full move required

In many cases the server can stay at the current hoster. Protection sits in front and sends clean traffic back.

The network decides

GRE, IPIP, VXLAN, BGP, reverse proxy or router VM: the right model depends on the exposed service.

Progressive cutover

Connectivity, MTU, return path, firewall and metrics are validated before production traffic is fully switched.

Changing Anti-DDoS without changing hoster is possible when you separate where the server runs from where public traffic is filtered. Instead of moving the machine, database, files and dependencies, you place a specialised layer in front of the existing service. That layer can receive traffic through protected IPs, BGP, GRE/IPIP/VXLAN tunnels, reverse proxy or router VM, filter the attack and deliver clean traffic back to the original server.

The goal is not to add a random proxy. The goal is to build a readable, testable and reversible production path from generic hoster protection to specialised DDoS mitigation without breaking what already works.

Why choose Peeryx

Add specialised protection without rebuilding production

Peeryx acts as a mitigation and clean-traffic delivery layer. You keep your server, applications, hoster and operational habits, while the public traffic entry moves to a protection layer designed for network attacks, tunnels, BGP and production services.

Problem definition: bundled protection is no longer enough

Bundled hoster Anti-DDoS is useful against common attacks with little setup. Limits appear when the exposed service is more sensitive: real-time application, BGP infrastructure, gaming platform, critical API, customer tunnel or service that cannot tolerate packet loss and coarse rules.

Changing anti ddos without changing hoster means keeping the server environment while changing the public traffic entry. Public traffic should no longer arrive directly on the origin IP. It should pass through a specialised layer able to filter, observe, tune and deliver clean traffic.

  • Keep existing server and hosting
  • Hide or reduce direct origin exposure
  • Choose GRE, IPIP, VXLAN, BGP, reverse proxy or router VM
  • Test before final cutover
  • Keep a rollback plan

Why it matters

A full server migration looks simple on paper but becomes risky in production: data, backups, rights, application configuration, allowed IPs, DNS, monitoring, client access and firewall rules. If DDoS protection is the actual problem, moving everything is not always the smartest answer.

A good migration changes only what must change: network entry, filtering, clean handoff and operational control. The server keeps its role, but it is no longer exposed in the same way. That reduces downtime and makes before/after comparison possible.

Possible solutions

There are several ways to put specialised protection in front of an already hosted server. The right choice depends on the service, IP control, system access, MTU constraints, BGP needs and accepted cutover risk.

For a compatible web or application service, reverse proxy may be enough. For a dedicated server, GRE/IPIP tunnel or router VM often provides better control. For an operator or prefix-based infrastructure, protected IP transit with BGP is usually cleaner.

Solution When to use it What to validate
Reverse proxy Compatible web, API or game service with a simple public entry. Ports, protocol, logs, real client IP and latency.
GRE / IPIP tunnel Dedicated server or router able to receive encapsulated traffic. MTU, return path, firewall, monitoring and capacity.
VXLAN More specific network-to-network or L2-like integration. Overhead, MTU, termination, operations and design clarity.
BGP + protected IP transit Own prefixes, ASN or operator-grade routing control. ROA/RPKI, BGP sessions, routing policies, cutover and rollback.
Peeryx router VM Clean termination point between Peeryx and production. Routing, security, admin access, monitoring and failure plan.

Peeryx method

Our approach avoids a single delivery model. A customer who wants to change anti ddos without changing hoster does not always need BGP; sometimes a tunnel is enough. Conversely, a simple proxy can be too limited when flows, ports or routing constraints are more complex.

Cutover should happen in stages: port inventory, delivery choice, connectivity test, MTU validation, firewall check, return-path test and progressive switch of the public entry. That turns the security upgrade into an engineering change, not an emergency move.

1. Quick audit

Identify service, ports, IPs, normal traffic, symptoms and current limits.

2. Delivery choice

Select GRE, IPIP, VXLAN, BGP, reverse proxy or router VM.

3. Test before cutover

Validate connectivity, MTU, return path, firewall, app behavior and rollback.

4. Progressive cutover

Send public traffic through Peeryx and tune filtering without forced migration.

Concrete example

Consider a dedicated server running a real-time app, game service or public API. The hoster includes standard protection, but some floods create timeouts, session loss or overly broad blocking. Moving the server would be costly because backups, monitoring, access and customers are already in place.

With Peeryx, the public entry can move to a protected IP, BGP-announced prefix or reverse proxy. Traffic is filtered on Peeryx, then delivered to the existing server through a tunnel or router VM. The server stays where it is; its Internet exposure changes.

Common mistakes

The first mistake is changing everything at once: server, DNS, application, firewall and protection. If something breaks, you cannot tell whether the cause is routing, tunnel, application configuration or filtering.

The second mistake is leaving the real IP exposed. If attackers still know the origin, they can try to bypass protection. The third is forgetting rollback: a clean migration must define how to temporarily return to the previous path.

  • Not testing MTU before production
  • Still exposing the real server IP
  • Forgetting server-side firewall rules
  • Changing DNS without lowering TTL
  • Mixing volumetric, protocol and application attacks
  • Choosing BGP when a tunnel is enough, or the opposite

FAQ

Can I really change Anti-DDoS without changing hoster?

Yes, if the architecture allows a new network entry in front of the server and clean delivery back to it. Depending on the case this uses tunnel, BGP, reverse proxy or router VM.

Which option should I choose?

Reverse proxy fits compatible services. GRE/IPIP often fits existing dedicated servers. VXLAN is more specific. BGP is best for own prefixes, ASN or operator-grade routing control.

Will this add latency?

Any protection path must be designed. The aim is a coherent mitigation point and clean handoff so stability gains outweigh the network detour.

Can Peeryx protect a production server already online?

Yes. The process is progressive: diagnosis, configuration, test, cutover, observation and filtering adjustment without forced machine move.

Which internal pages should I read next?

Start with Protected IP Transit, then the Router VM Anti-DDoS page to understand how to receive clean traffic behind Peeryx.

Conclusion: improve protection without breaking what works

Migrating from hoster Anti-DDoS to specialised protection does not have to be a heavy relocation project. The key is separating server hosting from public traffic protection. In many cases the server stays at the current hoster while Internet exposure moves through a more precise, visible and service-aware layer.

Peeryx is designed for that scenario: protected IP transit, tunnels, BGP, reverse proxy, router VM and clean traffic delivery. When current protection reaches its limits, the answer is not always changing hoster; it is often changing exposure architecture.

Resources

Related reading

To go deeper, here are other useful pages and articles.

Hoster & specialised Anti-DDoS 17 min read

What to do when your hoster’s Anti-DDoS is no longer enough

When your hoster’s Anti-DDoS is no longer enough, the worst decision is often to migrate in a hurry. This guide explains how to identify the real limit, keep the existing server when possible, then add specialised protection with tunnels, reverse proxy, router VM or protected IP transit.

Read article
Clean traffic delivery 8 min read

Anti-DDoS clean traffic delivery: why the handoff matters as much as mitigation

In Anti-DDoS architecture, mitigation alone is not enough: legitimate traffic still has to be delivered back correctly. This guide explains why clean traffic handoff matters as much as scrubbing, how to choose the right delivery model and which mistakes break daily operations. It also helps compare clean traffic delivery, clean handoff, GRE, IPIP, VXLAN and cross-connect with an operator-grade architecture, operations and buying logic.

Read the article
VXLAN / IPIP 11 min read

DDoS protection over VXLAN or IPIP: when should you use them?

VXLAN and IPIP do not solve exactly the same clean traffic delivery problem after DDoS mitigation. This guide explains when each one makes sense, which limits matter and how to choose a model that matches your topology, edge design and operations. It also helps compare VXLAN, IPIP, GRE, clean handoff and post-mitigation traffic delivery with an operator-grade architecture, operations and buying logic.

Read the article
DDoS guide Reading time: 7 min

Router VM Anti-DDoS use cases

When a router VM makes sense: keeping customer routing and filtering logic while still receiving upstream volumetric protection.

Read article
Hosters & MSPs Reading time: 15 min

Anti-DDoS IP transit for hosting providers and service providers

Prefix protection, BGP, clean handoff and operator-grade integration for hosters, MSPs and exposed services.

Read article
Architecture guide Reading time: 8 min

Protected IP transit: understand the model

Link saturation, 95th percentile, blackholing, asymmetric routing and clean traffic delivery: the fundamentals before comparing providers.

Read the article

Want to keep your server but upgrade protection?

Peeryx can review your topology and propose a progressive integration: tunnel, BGP, reverse proxy, router VM or protected IP transit depending on the real need, without forced server migration.