Skip to content

Commit 06e8852

Browse files
ddos protection dashbutton
1 parent b688588 commit 06e8852

File tree

12 files changed

+81
-62
lines changed

12 files changed

+81
-62
lines changed

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/add-prefix-allowlist.mdx

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,17 +8,18 @@ head:
88
content: Add an IP address/prefix to the Advanced DDoS Protection allowlist
99
---
1010

11-
import { Render, Steps } from "~/components";
11+
import { Render, Steps, DashButton } from "~/components";
1212

1313
To add an IP address or prefix to the Advanced DDoS Protection [allowlist](/ddos-protection/advanced-ddos-systems/concepts/#allowlist):
1414

1515
<Steps>
16-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and
17-
select your account. 2. Go to **L3/4 DDoS** > **Advanced Protection**. 3.
18-
Under **General settings** > **Allowlist**, select **Edit**. 4. Enter a prefix
19-
and (optionally) a description in **Prefix** and **Description**,
20-
respectively. 5. To exclude the current prefix from the allowlist instead of
21-
including it, uncheck the **Enabled** checkbox. 6. Select **Add**.
16+
1. In the Cloudflare dashboard, go to the **L3/4 DDoS** page.
17+
18+
<DashButton url="/?to=/:account/network-security/ddos" />
19+
2. Go to **Advanced Protection**.
20+
3. Under **General settings** > **Allowlist**, select **Edit**.
21+
4. Enter a prefix and (optionally) a description in **Prefix** and **Description**, respectively.
22+
5. To exclude the current prefix from the allowlist instead of including it, uncheck the **Enabled** checkbox. 6. Select **Add**.
2223
</Steps>
2324

2425
<Render file="allowlist-ip-spoofing" product="ddos-protection" />

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/add-prefix.mdx

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,16 +8,18 @@ head:
88
content: Add a prefix to Advanced DDoS Protection
99

1010
---
11-
import { Steps } from "~/components"
11+
import { Steps, DashButton } from "~/components"
1212

1313
To add a [prefix](/ddos-protection/advanced-ddos-systems/concepts/#prefixes) to Advanced DDoS Protection:
1414

1515
<Steps>
16-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
17-
2. Go to **L3/4 DDoS** > **Advanced Protection**.
18-
3. Under **General settings** > **Prefixes**, select **Edit**.
19-
4. Expand the **Add existing prefix** section and select **Add** next to the prefix you wish to add.<br/>
20-
Alternatively, enter a prefix and (optionally) a description in **Prefix** and **Description**, respectively, and select **Add**.
16+
1. In the Cloudflare dashboard, go to the **L3/4 DDoS** page.
17+
18+
<DashButton url="/?to=/:account/network-security/ddos" />
19+
2. Go to **Advanced Protection**.
20+
3. Under **General settings** > **Prefixes**, select **Edit**.
21+
4. Expand the **Add existing prefix** section and select **Add** next to the prefix you wish to add.<br/>
22+
Alternatively, enter a prefix and (optionally) a description in **Prefix** and **Description**, respectively, and select **Add**.
2123
</Steps>
2224

2325
:::note[Note]

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/create-filter.mdx

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -24,15 +24,16 @@ To create a [filter](/ddos-protection/advanced-ddos-systems/concepts/#filter) fo
2424

2525
{/* prettier-ignore */}
2626
<Steps>
27-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and
28-
select your account.
29-
2. Go to **L3/4 DDoS** > **Advanced Protection** > **Advanced TCP Protection**.
30-
3. Under the system component for which you are creating the filter (**SYN Flood Protection** or **Out-of-state TCP Protection**), select **Create** next to the type of filter you want to create:
31-
- **Mitigation Filter**: The protection system will drop <GlossaryTooltip term="data packet">packets</GlossaryTooltip> matching the filter expression. - **Monitoring Filter**: The protection system will log
32-
packets matching the filter expression.
33-
- **Off Filter**: The protection system will ignore packets matching the filter expression.
34-
4. Under **When incoming packets match**, define a filter expression using the Expression Builder (specifying one or more values for **Field**, **Operator**, and **Value**), or manually enter an expression using the Expression Editor. For more information, refer to [Edit rule expressions](/ruleset-engine/rules-language/expressions/edit-expressions/).
35-
5. Select **Save**.
27+
1. In the Cloudflare dashboard, go to the **L3/4 DDoS** page.
28+
29+
<DashButton url="/?to=/:account/network-security/ddos" />
30+
2. Go to **Advanced Protection** > **Advanced TCP Protection**.
31+
3. Under the system component for which you are creating the filter (**SYN Flood Protection** or **Out-of-state TCP Protection**), select **Create** next to the type of filter you want to create:
32+
- **Mitigation Filter**: The protection system will drop <GlossaryTooltip term="data packet">packets</GlossaryTooltip> matching the filter expression. - **Monitoring Filter**: The protection system will log
33+
packets matching the filter expression.
34+
- **Off Filter**: The protection system will ignore packets matching the filter expression.
35+
4. Under **When incoming packets match**, define a filter expression using the Expression Builder (specifying one or more values for **Field**, **Operator**, and **Value**), or manually enter an expression using the Expression Editor. For more information, refer to [Edit rule expressions](/ruleset-engine/rules-language/expressions/edit-expressions/).
36+
5. Select **Save**.
3637
</Steps>
3738

3839
<Render file="atp-filters-rules-precedence" product="ddos-protection" />

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/create-rule.mdx

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,16 +8,19 @@ head:
88
content: Create an Advanced DDoS Protection rule
99
---
1010

11-
import { Render, Steps } from "~/components";
11+
import { Render, Steps, DashButton } from "~/components";
1212

1313
## Create an Advanced TCP Protection rule
1414

1515
To create a [SYN flood rule](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/#syn-flood-protection) or an [out-of-state TCP](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/#out-of-state-tcp-protection) rule:
1616

1717
{/* prettier-ignore */}
1818
<Steps>
19-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
20-
2. Go to **L3/4 DDoS** > **Advanced Protection** > **Advanced TCP Protection**.
19+
1. In the Cloudflare dashboard, go to the **L3/4 DDoS** page.
20+
21+
<DashButton url="/?to=/:account/network-security/ddos" />
22+
23+
2. Go to **Advanced Protection** > **Advanced TCP Protection**.
2124
3. Depending on the rule you are creating, do one of the following:
2225
- Under **SYN Flood Protection**, select **Create SYN flood rule**.
2326
- Under **Out-of-state TCP Protection**, select **Create out-of-state TCP rule**.
@@ -33,8 +36,10 @@ To create a [SYN flood rule](/ddos-protection/advanced-ddos-systems/overview/adv
3336

3437
{/* prettier-ignore */}
3538
<Steps>
36-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account.
37-
2. Go to **L3/4 DDoS** > **Advanced Protection** > **General settings**.
39+
1. In the Cloudflare dashboard, go to the **L3/4 DDoS** page.
40+
41+
<DashButton url="/?to=/:account/network-security/ddos" />
42+
2. Go to **Advanced Protection** > **General settings**.
3843
3. Add the prefixes you wish to onboard. Advanced DNS Protection will only be applied to the prefixes you onboard. If you already onboarded the desired prefixes when you configured Advanced TCP Protection, you do not need to take any other action.
3944
:::note
4045
Currently, the list of onboarded prefixes is shared with Advanced TCP Protection. Any onboarded prefixes will be subject to both Advanced TCP Protection and Advanced DNS Protection, assuming that your account team has done the initial configuration of both systems. However, you can leave Advanced TCP Protection in monitoring mode.

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/exclude-prefix.mdx

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,14 @@ sidebar:
66

77
---
88

9-
import { Steps } from "~/components"
9+
import { Steps, DashButton } from "~/components"
1010

1111
To exclude a prefix or a prefix subset from Advanced DDoS Protection:
1212

1313
<Steps>
14-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
15-
2. Go to **L3/4 DDoS** > **Advanced Protection**.
14+
1. In the Cloudflare dashboard, go to the **L3/4 DDoS** page.
15+
<DashButton url="/?to=/:account/network-security/ddos" />
16+
2. Go to **Advanced Protection**.
1617
3. [Add the prefix](/ddos-protection/advanced-ddos-systems/how-to/add-prefix/) you previously onboarded to Magic Transit to Advanced TCP Protection.
1718
4. [Add the prefix](/ddos-protection/advanced-ddos-systems/how-to/add-prefix/) (or subset) you wish to exclude as a new, separate prefix in Advanced TCP Protection.
1819
5. For the prefix you added in the previous step, select **Exclude Subset** in the **Enrolled Prefixes** list.

src/content/docs/ddos-protection/advanced-ddos-systems/overview/index.mdx

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ head:
99
content: Advanced DDoS Protection systems
1010
---
1111

12-
import { GlossaryTooltip, Render, Steps } from "~/components";
12+
import { GlossaryTooltip, Render, Steps, DashButton } from "~/components";
1313

1414
The Advanced DDoS Protection system includes [Advanced TCP Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/) and [Advanced DNS Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/). Both systems are configured using the general settings, but also comprise of their own dedicated settings.
1515

@@ -115,8 +115,9 @@ Optionally, you can create [filters](/ddos-protection/advanced-ddos-systems/conc
115115
Enable the Advanced DDoS system and begin routing traffic through it.
116116

117117
<Steps>
118-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and
119-
select your account.
120-
2. Go to **L3/4 DDoS** > **Advanced Protection** > **General settings**.
118+
1. In the Cloudflare dashboard, go to the **L3/4 DDoS** page.
119+
120+
<DashButton url="/?to=/:account/network-security/ddos" />
121+
2. Go to **Advanced Protection** > **General settings**.
121122
3. Under **General settings**, toggle the feature status **On**.
122123
</Steps>

src/content/docs/ddos-protection/botnet-threat-feed.mdx

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ learning_center:
1111
link: https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/
1212

1313
---
14-
import { Steps, APIRequest } from "~/components"
14+
import { Steps, APIRequest, DashButton } from "~/components"
1515

1616
The Cloudflare DDoS Botnet Threat Feed is a threat intelligence feed for service providers (SPs) such as hosting providers and Internet service providers (ISPs) that provides information about their own IP addresses that have participated in HTTP DDoS attacks as observed from Cloudflare's global network. The feed aims to help service providers stop the abuse and reduce DDoS attacks originating from within their networks.
1717

@@ -46,11 +46,12 @@ Make sure that:
4646
### 1. Authenticate your ASN via PeeringDB
4747

4848
<Steps>
49-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
50-
2. Go to **Manage Account** > **Configurations**.
51-
3. Select **DDoS Threat Feed ASNs**.
52-
4. On the list of ASNs configured for your threat feed, select **Add ASN**.
53-
5. You will be redirected to the PeeringDB authentication page, where you can log in and consent to share the affiliation data with us. You will be redirected back to the configuration page once it is successful.
49+
1. In the Cloudflare dashboard, go to your account settings page.
50+
51+
<DashButton url="/?to=/:account/configurations" />
52+
2. Select **DDoS Threat Feed ASNs**.
53+
3. On the list of ASNs configured for your threat feed, select **Add ASN**.
54+
4. You will be redirected to the PeeringDB authentication page, where you can log in and consent to share the affiliation data with us. You will be redirected back to the configuration page once it is successful.
5455
</Steps>
5556

5657
:::note

src/content/docs/ddos-protection/get-started.mdx

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,9 +51,8 @@ The _Log_ action is only available to Enterprise customers.
5151
:::
5252

5353
<Steps>
54-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account.
55-
2. [Configure all the rules in the HTTP DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/http/http-overrides/configure-dashboard/#create-a-ddos-override), setting their action to _Log_.
56-
3. [Configure all the rules in the Network-layer DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/network/network-overrides/configure-dashboard/#create-a-ddos-override), setting the action to _Log_.
54+
1. [Configure all the rules in the HTTP DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/http/http-overrides/configure-dashboard/#access), setting their action to _Log_.
55+
2. [Configure all the rules in the Network-layer DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/network/network-overrides/configure-dashboard/#create-a-ddos-override), setting the action to _Log_.
5756
</Steps>
5857

5958
Alternatively, if you are using the API, define an override at the ruleset level to set the action of all managed ruleset rules to `log` by following these instructions:

src/content/docs/ddos-protection/managed-rulesets/adaptive-protection.mdx

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar:
77

88
---
99

10-
import { Tabs, TabItem, Steps } from "~/components"
10+
import { Tabs, TabItem, Steps, DashButton } from "~/components"
1111

1212
Adaptive DDoS Protection learns your unique traffic patterns and adapts to them to provide better protection against sophisticated DDoS attacks on layer 7 and layers 3/4, depending on your subscribed Cloudflare services.
1313

@@ -71,9 +71,10 @@ To view traffic flagged by L3/4 Adaptive DDoS Protection rules:
7171
<Tabs syncKey="dashNewNav">
7272
<TabItem label="Old dashboard">
7373
<Steps>
74-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
75-
2. Go to Account Home > **Analytics & Logs** > **Network Analytics**.
76-
3. Filter by rule ID.
74+
1. In the [Cloudflare dashboard](https://dash.cloudflare.com), go to the Network analytics page.
75+
76+
<DashButton url="/?to=/:account/network-analytics" />
77+
2. Filter by rule ID.
7778
</Steps>
7879
</TabItem>
7980
<TabItem label="New dashboard" icon="rocket">

src/content/docs/ddos-protection/managed-rulesets/http/http-overrides/override-examples.mdx

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ head:
88
content: Override examples for HTTP DDoS Attack Protection
99
---
1010

11-
import { Details, GlossaryTooltip, Tabs, TabItem } from "~/components"
11+
import { Details, GlossaryTooltip, Tabs, TabItem, DashButton } from "~/components"
1212

1313
## Use cases
1414

@@ -36,8 +36,9 @@ To remedy a false positive:
3636

3737
<Tabs syncKey="dashNewNav"> <TabItem label="Old dashboard">
3838

39-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
40-
2. Go to the analytics dashboard and apply filters to the displayed data.
39+
1. In the [Cloudflare dashboard](https://dash.cloudflare.com), go to the Network analytics page.
40+
<DashButton url="/?to=/:account/network-analytics" />
41+
2. Apply filters to the displayed data.
4142
<Details header="For WAF/CDN customers">
4243
1. Select the zone that is experiencing DDoS attack false positives.
4344
2. Go to **Security** > **Events**.
@@ -56,8 +57,9 @@ To remedy a false positive:
5657

5758
</TabItem> <TabItem label="New dashboard" icon="rocket">
5859

59-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
60-
2. Go to the analytics dashboard and apply filters to the displayed data.
60+
1. In the [Cloudflare dashboard](https://dash.cloudflare.com), go to the Network analytics page.
61+
<DashButton url="/?to=/:account/network-analytics" />
62+
2. Apply filters to the displayed data.
6163
<Details header="For WAF/CDN customers">
6264
1. Select the zone that is experiencing DDoS attack false positives.
6365
2. Go to **Security** > **Analytics** > **Events** tab.
@@ -117,8 +119,9 @@ If you are experiencing a DDoS attack detected by Cloudflare and the applied mit
117119

118120
<Tabs syncKey="dashNewNav"> <TabItem label="Old dashboard">
119121

120-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
121-
2. Go to the analytics dashboard and apply filters to the displayed data.
122+
1. In the [Cloudflare dashboard](https://dash.cloudflare.com), go to the Network analytics page.
123+
<DashButton url="/?to=/:account/network-analytics" />
124+
2. Apply filters to the displayed data.
122125
<Details header="For WAF/CDN customers">
123126
1. Select the zone that is experiencing an incomplete mitigation of a DDoS attack.
124127
2. Go to **Security** > **Events**.
@@ -137,8 +140,9 @@ If you are experiencing a DDoS attack detected by Cloudflare and the applied mit
137140

138141
</TabItem> <TabItem label="New dashboard" icon="rocket">
139142

140-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
141-
2. Go to the analytics dashboard and apply filters to the displayed data.
143+
1. In the [Cloudflare dashboard](https://dash.cloudflare.com), go to the Network analytics page.
144+
<DashButton url="/?to=/:account/network-analytics" />
145+
2. Apply filters to the displayed data.
142146
<Details header="For WAF/CDN customers">
143147
1. Select the zone that is experiencing an incomplete mitigation of a DDoS attack.
144148
2. Go to **Security** > **Analytics** > **Events** tab.

0 commit comments

Comments
 (0)