Skip to content

Commit 1bf6005

Browse files
patriciasantaanaharshil1712
authored andcommitted
[DDoS Protection] Advanced DDoS Systems + sections updates (#17245)
* adv ddos systems reorg * new links * fix broken link * concepts wording * fix step * add link to note * redirects * feedback updates * broken links and edits
1 parent 48aad47 commit 1bf6005

File tree

39 files changed

+775
-553
lines changed

39 files changed

+775
-553
lines changed

public/_redirects

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -303,17 +303,24 @@
303303
# ddos-protection
304304
/ddos-protection/change-log/http/2022-09-19-emergency-emergency/ /ddos-protection/change-log/http/2022-09-19-emergency/
305305
/ddos-protection/change-log/http/2022-12-07-emergency-emergency/ /ddos-protection/change-log/http/2022-12-07-emergency/
306-
/ddos-protection/managed-rulesets/tcp-protection/ /ddos-protection/tcp-protection/ 301
307306
/ddos-protection/managed-rulesets/http/location-aware-protection/ /ddos-protection/managed-rulesets/adaptive-protection/ 301
308307
/ddos-protection/managed-rulesets/network/fields/ /ddos-protection/managed-rulesets/network/override-expressions/ 301
309308
/support/about-cloudflare/attack-preparation-and-response/responding-to-ddos-attacks/ /ddos-protection/best-practices/respond-to-ddos-attacks/ 301
310309
/support/about-cloudflare/attack-preparation-and-response/understanding-cloudflare-ddos-protection/ /ddos-protection/about/ 301
311310
/ddos-protection/change-log/global-changes/ /ddos-protection/change-log/general-updates/ 301
312-
# Redirect the following pages temporarily (using HTTP 307 Temporary redirect)
313-
/ddos-protection/dns-protection/rule-settings/ /ddos-protection/dns-protection/ 307
314-
/ddos-protection/dns-protection/api/ /ddos-protection/dns-protection/ 307
315-
/ddos-protection/dns-protection/api/examples/ /ddos-protection/dns-protection/ 307
316-
/ddos-protection/dns-protection/api/json-objects/ /ddos-protection/dns-protection/ 307
311+
/ddos-protection/tcp-protection/api/examples/ /ddos-protection/advanced-ddos-systems/api/tcp-protection/examples/ 301
312+
/ddos-protection/tcp-protection/api/json-objects/ /ddos-protection/advanced-ddos-systems/api/tcp-protection/json-objects/ 301
313+
/ddos-protection/tcp-protection/concepts/ /ddos-protection/advanced-ddos-systems/concepts/ 301
314+
/ddos-protection/tcp-protection/how-to/add-prefix-allowlist/ /ddos-protection/advanced-ddos-systems/how-to/add-prefix-allowlist/ 301
315+
/ddos-protection/tcp-protection/how-to/add-prefix/ /ddos-protection/advanced-ddos-systems/how-to/add-prefix/ 301
316+
/ddos-protection/tcp-protection/how-to/create-filter/ /ddos-protection/advanced-ddos-systems/how-to/create-filter/ 301
317+
/ddos-protection/tcp-protection/how-to/exclude-prefix/ /ddos-protection/advanced-ddos-systems/how-to/exclude-prefix/ 301
318+
/ddos-protection/tcp-protection/how-to/ /ddos-protection/advanced-ddos-systems/how-to/ 301
319+
/ddos-protection/tcp-protection/ /ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/ 301
320+
/ddos-protection/tcp-protection/mitigation-reasons/ /ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/mitigation-reasons/ 301
321+
/ddos-protection/tcp-protection/rule-settings/ /ddos-protection/advanced-ddos-systems/rule-settings/ 301
322+
/ddos-protection/dns-protection/ /ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/ 301
323+
/ddos-protection/tcp-protection/api/ /ddos-protection/advanced-ddos-systems/api/ 301
317324

318325
# dmarc-management
319326
/dmarc-management/manage-sources/ /dmarc-management/ 301

src/content/docs/analytics/graphql-api/migration-guides/network-analytics-v2/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,6 +113,6 @@ The following example queries the top 20 logs of traffic dropped by mitigation s
113113
The `mitigationSystem` field can take one the following values:
114114

115115
* `dosd` for [DDoS managed rulesets](/ddos-protection/managed-rulesets/) (Network-layer DDoS Attack Protection or HTTP DDoS Attack Protection).
116-
* `flowtrackd` for [Advanced TCP Protection](/ddos-protection/tcp-protection/).
116+
* `flowtrackd` for [Advanced TCP Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/).
117117
* `magic-firewall` for [Magic Firewall](/magic-firewall/).
118118
* Empty string for unmitigated traffic.

src/content/docs/analytics/network-analytics/understand/main-dashboard.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,8 @@ The following table contains a summary of what is shown in each tab:
2525
| --------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------- |
2626
| **All traffic** | Traffic dropped by DDoS managed rules, Advanced TCP Protection, Advanced DNS Protection, and Magic Firewall, and traffic passed to the origin server. | Traffic dropped and passed by DDoS managed rules. |
2727
| **DDoS managed <br/>rules** | Traffic dropped and passed by [DDoS managed rules](/ddos-protection/managed-rulesets/). | Traffic dropped and passed by [DDoS managed rules](/ddos-protection/managed-rulesets/). |
28-
| **TCP <br/>Protection** | Traffic dropped and passed by the [Advanced TCP Protection](/ddos-protection/tcp-protection/) system. Does not include traffic dropped by DDoS managed rules. | N/A |
29-
| **DNS <br/>Protection** | Traffic dropped and passed by the [Advanced DNS Protection](/ddos-protection/dns-protection/) system. Does not include traffic dropped by DDoS managed rules. | N/A |
28+
| **TCP <br/>Protection** | Traffic dropped and passed by the [Advanced TCP Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/) system. Does not include traffic dropped by DDoS managed rules. | N/A |
29+
| **DNS <br/>Protection** | Traffic dropped and passed by the [Advanced DNS Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/) system. Does not include traffic dropped by DDoS managed rules. | N/A |
3030
| **Magic Firewall** | Traffic dropped by [Magic Firewall](/magic-firewall/) and traffic passed to the origin server. Does not include traffic dropped by DDoS managed rules, Advanced TCP Protection, or Advanced DNS Protection. | N/A |
3131

3232

src/content/docs/ddos-protection/about/attack-coverage.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ import { GlossaryTooltip, InlineBadge, Render } from "~/components"
1414

1515
The [DDoS Attack Protection managed rulesets](/ddos-protection/managed-rulesets/) provide protection against a variety of <GlossaryTooltip term="distributed denial-of-service (DDoS) attack">DDoS attacks</GlossaryTooltip> across L3/4 (layers 3/4) and L7 of the OSI model. Cloudflare constantly updates these managed rulesets to improve the attack coverage, increase the mitigation consistency, cover new and emerging threats, and ensure cost-efficient mitigations.
1616

17-
[Advanced TCP Protection](/ddos-protection/tcp-protection/) and [Advanced DNS Protection](/ddos-protection/dns-protection/), available to [Magic Transit](/magic-transit/) customers, provide additional protection against sophisticated TCP-based DDoS attacks and sophisticated and fully randomized DNS attacks, respectively.
17+
[Advanced TCP Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/) and [Advanced DNS Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/), available to [Magic Transit](/magic-transit/) customers, provide additional protection against sophisticated TCP-based DDoS attacks and sophisticated and fully randomized DNS attacks, respectively.
1818

1919
As a general guideline, various Cloudflare products operate on different open systems interconnection (OSI) layers and you are protected up to the layer on which your service operates. You can customize the DDoS settings on the layer in which you onboarded. For example, since the CDN/WAF service is a Layer 7 (HTTP/HTTPS) service, Cloudflare provides protection from DDoS attacks on L7 downwards, including L3/4 attacks.
2020

@@ -31,7 +31,7 @@ The following table includes a sample of covered attack vectors:
3131

3232
The Network-layer DDoS Attack Protection managed ruleset provides protection against some types of DNS attacks.
3333

34-
Magic Transit customers have access to [Advanced DNS Protection](/ddos-protection/dns-protection/) <InlineBadge preset="beta" />. Other customers might consider the following options:
34+
Magic Transit customers have access to [Advanced DNS Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/) <InlineBadge preset="beta" />. Other customers might consider the following options:
3535

3636
- Use Cloudflare as your authoritative DNS provider ([primary DNS](/dns/zone-setups/full-setup/) or [secondary DNS](/dns/zone-setups/zone-transfers/cloudflare-as-secondary/)).
3737
- If you are running your own <GlossaryTooltip term="nameserver">nameservers</GlossaryTooltip>, use [DNS Firewall](/dns/dns-firewall/) to get additional protection against DNS attacks like random prefix attacks.

src/content/docs/ddos-protection/about/components.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ import { GlossaryTooltip } from "~/components"
1414

1515
The Cloudflare Autonomous Edge is powered by the denial-of-service <GlossaryTooltip term="daemon" prepend="A daemon is ">daemon</GlossaryTooltip> (`dosd`), which is a home-grown software-defined system. A `dosd` instance runs in every single server in every one of [Cloudflare global network's data centers](https://www.cloudflare.com/network/) around the world. These `dosd` instances can detect and mitigate DDoS attacks autonomously without requiring centralized consensus. Cloudflare users can configure this system through [DDoS Attack Protection managed rulesets](/ddos-protection/managed-rulesets/).
1616

17-
Another component of Cloudflare’s Autonomous Edge includes the [Advanced TCP Protection](/ddos-protection/tcp-protection/) system. This is Cloudflare's TCP state tracking machine for detecting and mitigating the most randomized and sophisticated TCP-based DDoS attacks in unidirectional routing topologies — such as the case of [Magic Transit](/magic-transit/). Advanced TCP Protection is able to identify the state of a TCP connection and then drops, challenges, or rate-limits packets that do not belong to a legitimate connection.
17+
Another component of Cloudflare’s Autonomous Edge includes the [Advanced TCP Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/) system. This is Cloudflare's TCP state tracking machine for detecting and mitigating the most randomized and sophisticated TCP-based DDoS attacks in unidirectional routing topologies — such as the case of [Magic Transit](/magic-transit/). Advanced TCP Protection is able to identify the state of a TCP connection and then drops, challenges, or rate-limits packets that do not belong to a legitimate connection.
1818

1919
For more information, refer to our blog post [A deep-dive into Cloudflare’s autonomous edge DDoS protection](https://blog.cloudflare.com/deep-dive-cloudflare-autonomous-edge-ddos-protection/).
2020

Lines changed: 117 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,117 @@
1+
---
2+
title: Common API calls
3+
pcx_content_type: configuration
4+
sidebar:
5+
order: 2
6+
7+
---
8+
9+
The following sections contain example requests for common API calls. For a list of available API endpoints, refer to [Endpoints](/ddos-protection/advanced-ddos-systems/api/dns-protection/#endpoints).
10+
11+
## Get all DNS protection rules
12+
13+
The following example retrieves the currently configured rules for Advanced DNS Protection.
14+
15+
```bash
16+
curl "https://api.cloudflare.com/client/v4/accounts/{account_id}/magic/advanced_dns_protection/configs/dns_protection/rules" \
17+
--header "Authorization: Bearer <API_TOKEN>"
18+
```
19+
20+
```json title="Example response"
21+
---
22+
{
23+
"result": [
24+
{
25+
"id": "<RULE_ID>",
26+
"scope": "<SCOPE>",
27+
"name": "<NAME>",
28+
"mode": "<MODE>",
29+
"profile_sensitivity": "<SENSITIVITY>",
30+
"rate_sensitivity": "<RATE>",
31+
"burst_sensitivity": "<BURST>",
32+
"created_on": "2023-10-01T13:10:38.762503+01:00",
33+
"modified_on": "2023-10-01T13:10:38.762503+01:00",
34+
}
35+
],
36+
"success": true,
37+
"errors": [],
38+
"messages": []
39+
}
40+
```
41+
42+
### Create DNS protection rule
43+
44+
The following example creates an Advanced DNS Protection rule with a global scope.
45+
46+
```bash
47+
curl "https://api.cloudflare.com/client/v4/accounts/{account_id}/magic/advanced_dns_protection/configs/dns_protection/rules" \
48+
--header "Authorization: Bearer <API_TOKEN>" \
49+
--data '{
50+
"scope": "global",
51+
"name": "global",
52+
"mode": "<MODE>",
53+
"rate_sensitivity": "<RATE>",
54+
"burst_sensitivity": "<BURST>",
55+
"profile_sensitivity": "<SENSITIVITY>"
56+
}'
57+
```
58+
59+
```json title="Example response"
60+
{
61+
"result": {
62+
"id": "<RULE_ID>",
63+
"scope": "global",
64+
"name": "global",
65+
"mode": "<MODE>",
66+
"rate_sensitivity": "<RATE>",
67+
"burst_sensitivity": "<BURST>",
68+
"profile_sensitivity": "<SENSITIVITY>",
69+
"created_on": "2023-10-01T13:10:38.762503+01:00",
70+
"modified_on": "2023-10-01T13:10:38.762503+01:00",
71+
},
72+
"success": true,
73+
"errors": [],
74+
"messages": []
75+
}
76+
```
77+
78+
Refer to [JSON objects](/ddos-protection/advanced-ddos-systems/api/dns-protection/json-objects/) for more information on the fields in the JSON body.
79+
80+
### Update DNS protection rule
81+
82+
The following example updates an existing DNS protection rule with ID `{rule_id}`.
83+
84+
The request body can contain only the fields you want to update (from `mode`, `profile_sensitivity`, `rate_sensitivity`, and `burst_sensitivity`).
85+
86+
```bash
87+
curl --request PATCH \
88+
"https://api.cloudflare.com/client/v4/accounts/{account_id}/magic/advanced_dns_protection/configs/dns_protection/rules/{rule_id}" \
89+
--header "Authorization: Bearer <API_TOKEN>" \
90+
--data '{
91+
"mode": "<NEW_MODE>",
92+
"profile_sensitivity": "<NEW_SENSITIVITY>",
93+
"rate_sensitivity": "<NEW_RATE>",
94+
"burst_sensitivity": "<NEW_BURST>"
95+
}'
96+
```
97+
98+
```json title="Example response"
99+
{
100+
"result": {
101+
"id": "<RULE_ID>",
102+
"scope": "<SCOPE>",
103+
"name": "<NAME>",
104+
"mode": "<NEW_MODE>",
105+
"profile_sensitivity": "<NEW_SENSITIVITY>",
106+
"rate_sensitivity": "<NEW_RATE>",
107+
"burst_sensitivity": "<NEW_BURST>",
108+
"created_on": "2023-10-01T13:10:38.762503+01:00",
109+
"modified_on": "2023-10-01T13:10:38.762503+01:00",
110+
},
111+
"success": true,
112+
"errors": [],
113+
"messages": []
114+
}
115+
```
116+
117+
Refer to [JSON objects](/ddos-protection/advanced-ddos-systems/api/dns-protection/json-objects/) for more information on the fields in the JSON body.
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
pcx_content_type: how-to
3+
title: Advanced DNS Protection
4+
sidebar:
5+
order: 4
6+
label: Configure via the API
7+
head:
8+
- tag: title
9+
content: Configure Advanced DNS Protection via API
10+
11+
---
12+
13+
Use the [Cloudflare API](/api/) to configure Advanced DNS Protection via API.
14+
15+
For examples of API calls, refer to [Common API calls](/ddos-protection/advanced-ddos-systems/api/dns-protection/examples/).
16+
17+
## Endpoints
18+
19+
To obtain the complete endpoint, append the Advanced DNS Protection API endpoints listed below to the Cloudflare API base URL:
20+
21+
```txt
22+
https://api.cloudflare.com/client/v4
23+
```
24+
25+
The `{account_id}` argument is the [account ID](/fundamentals/setup/find-account-and-zone-ids/) (a hexadecimal string). You can find this value in the Cloudflare dashboard.
26+
27+
The following table summarizes the available operations.
28+
29+
| Operation | Verb + Endpoint |
30+
| --- | --- |
31+
| List DNS protection rules | <p>`GET accounts/{account_id}/magic/advanced_dns_protection/configs/dns_protection/rules`</p>Fetches all DNS protection rules in the account. |
32+
| Add a DNS protection rule | <p>`POST accounts/{account_id}/magic/advanced_dns_protection/configs/dns_protection/rules`</p>Adds a DNS protection rule to the account. |
33+
| Get a DNS protection rule | <p>`GET accounts/{account_id}/magic/advanced_dns_protection/configs/dns_protection/rules/{rule_id}`</p>Fetches the details of an existing DNS protection rule in the account. |
34+
| Update a DNS protection rule | <p>`PATCH accounts/{account_id}/magic/advanced_dns_protection/configs/dns_protection/rules/{rule_id}`</p>Updates an existing DNS protection rule in the account. |
35+
| Delete a DNS protection rule | <p>`DELETE accounts/{account_id}/magic/advanced_dns_protection/configs/dns_protection/rules/{rule_id}`</p>Deletes an existing DNS protection rule from the account. |
36+
| Delete all DNS protection rules | <p>`DELETE accounts/{account_id}/magic/advanced_dns_protection/configs/dns_protection/rules`</p>Deletes all existing DNS protection rules from the account. |
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
title: JSON objects
3+
pcx_content_type: reference
4+
sidebar:
5+
order: 3
6+
head:
7+
- tag: title
8+
content: Advanced TCP Protection API - JSON objects
9+
10+
---
11+
12+
# JSON object
13+
14+
This page contains an example of the DNS protection rule JSON object used in the API.
15+
16+
```json
17+
{
18+
"id": "31c70c65-9f81-4669-94ed-1e1e041e7b06",
19+
"scope": "region",
20+
"name": "WEUR",
21+
"mode": "monitoring",
22+
"profile_sensitivity": "medium",
23+
"rate_sensitivity": "medium",
24+
"burst_sensitivity": "medium",
25+
"created_on": "2023-10-01T13:10:38.762503+01:00",
26+
"modified_on": "2023-10-01T13:10:38.762503+01:00"
27+
}
28+
```
29+
30+
The `scope` field value must be one of `global`, `region`, or `datacenter`. You must provide a region code (or data center code) in the `name` field when specifying a `region` (or `datacenter`) scope.
31+
32+
The `mode` value must be one of `enabled`, `disabled`, or `monitoring`.
33+
34+
The `profile_sensitivity` field value must be one of `low` (default), `medium`, `high`, or `very_high`.
35+
36+
The `rate_sensitivity` and `burst_sensitivity` field values must be one of `low`, `medium`, or `high`.
37+
38+
For more information on the rule settings, refer to [Rule settings](/ddos-protection/advanced-ddos-systems/concepts/#rule-settings).
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
title: API configuration
3+
pcx_content_type: overview
4+
sidebar:
5+
order: 4
6+
group:
7+
hideIndex: true
8+
head:
9+
- tag: title
10+
content: Configure Advanced TCP Protection and Advanced DNS Protection via the API
11+
12+
---
13+
14+
import { DirectoryListing } from "~/components"
15+
16+
Refer to the following pages to configure Advanced TCP Protection and Advanced DNS Protection via the API.
17+
18+
<DirectoryListing />

0 commit comments

Comments
 (0)