Skip to content

Commit 27aa005

Browse files
authored
[WAF] Update page titles (#25120)
1 parent c991465 commit 27aa005

File tree

14 files changed

+54
-72
lines changed

14 files changed

+54
-72
lines changed

src/content/docs/waf/managed-rules/check-for-exposed-credentials/configure-api.mdx

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,9 @@
11
---
22
pcx_content_type: how-to
3-
title: Configure via API
3+
title: Configure exposed credentials checks via API
44
sidebar:
55
order: 4
6-
head:
7-
- tag: title
8-
content: Configure exposed credentials checks via API
6+
label: Configure via API
97
---
108

119
import { Render, APIRequest } from "~/components";

src/content/docs/waf/managed-rules/check-for-exposed-credentials/configure-terraform.mdx

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,9 @@
11
---
2-
title: Configure with Terraform
2+
title: Configure exposed credentials checks using Terraform
33
pcx_content_type: configuration
44
sidebar:
55
order: 5
6-
head:
7-
- tag: title
8-
content: Configure Exposed Credentials Check using Terraform
6+
label: Configure using Terraform
97
---
108

119
import { Render } from "~/components";

src/content/docs/waf/managed-rules/check-for-exposed-credentials/how-checks-work.mdx

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,9 @@
11
---
22
pcx_content_type: concept
3-
title: How it works
3+
title: How exposed credentials checks work
44
sidebar:
55
order: 2
6-
head:
7-
- tag: title
8-
content: How exposed credentials checks work
6+
label: How it works
97
---
108

119
import { Render, Example } from "~/components";

src/content/docs/waf/managed-rules/check-for-exposed-credentials/test-configuration.mdx

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,9 @@
11
---
22
pcx_content_type: reference
3-
title: Test your configuration
3+
title: Test your exposed credentials checks configuration
44
sidebar:
55
order: 6
6-
head:
7-
- tag: title
8-
content: Test your exposed credentials checks configuration
6+
label: Test your configuration
97
---
108

119
import { Render } from "~/components";

src/content/docs/waf/rate-limiting-rules/use-cases.mdx

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,9 @@
11
---
2-
title: Rule examples
2+
title: Rate limiting rule examples
33
pcx_content_type: configuration
44
sidebar:
55
order: 20
6-
head:
7-
- tag: title
8-
content: Rate limiting rule examples
6+
label: Rule examples
97
---
108

119
import { Example } from "~/components";

src/content/docs/waf/reference/alerts.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
2-
title: Alerts
2+
title: Alerts for security events
33
pcx_content_type: reference
44
sidebar:
55
order: 1
6+
label: Alerts
67
---
78

89
import { AvailableNotifications } from "~/components";
Lines changed: 10 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,28 @@
11
---
22
pcx_content_type: troubleshooting
33
source: https://support.cloudflare.com/hc/en-us/articles/115000546328-Troubleshooting-Cloudflare-Rate-Limiting
4-
title: Troubleshooting
4+
title: Troubleshoot Rate Limiting (previous version)
55
sidebar:
66
order: 2
7-
head:
8-
- tag: title
9-
content: Troubleshoot Rate Limiting (previous version)
7+
label: Troubleshooting
108
noindex: true
119
---
1210

1311
A few common rate limiting configuration issues prevent proper request matches:
1412

15-
* **Including HTTP or HTTPS protocol schemes in rule patterns** (such as `https://example.com/*`). To restrict rules to match only HTTP or HTTPS traffic, use the schemes array in the request match. For example, `"schemes": [ "HTTPS" ]`.
16-
* **Forgetting a trailing slash character (`/`)**. Cloudflare Rate Limiting only treats requests for the homepage (such as `example.com` and `example.com/`) as equivalent, but not any other path (such as `example.com/path/` and `example.com/path`). To match request paths both with and without the trailing slash, use a wildcard match (for example, `example.com/path*`).
17-
* **Including a query string or anchor** (such as `example.com/path?foo=bar` or `example.com/path#section1`). A rule like `example.com/path` will match requests for `example.com/path?foo=bar`.
18-
* **Overriding a rate limit with [IP Access rules](/waf/tools/ip-access-rules/)**.
19-
* **Including a port number** (such as `example.com:8443/api/`). Rate Limiting does not consider port numbers within rules. Remove the port number from the URL so that the rate limit rule triggers as expected.
13+
- **Including HTTP or HTTPS protocol schemes in rule patterns** (such as `https://example.com/*`). To restrict rules to match only HTTP or HTTPS traffic, use the schemes array in the request match. For example, `"schemes": [ "HTTPS" ]`.
14+
- **Forgetting a trailing slash character (`/`)**. Cloudflare Rate Limiting only treats requests for the homepage (such as `example.com` and `example.com/`) as equivalent, but not any other path (such as `example.com/path/` and `example.com/path`). To match request paths both with and without the trailing slash, use a wildcard match (for example, `example.com/path*`).
15+
- **Including a query string or anchor** (such as `example.com/path?foo=bar` or `example.com/path#section1`). A rule like `example.com/path` will match requests for `example.com/path?foo=bar`.
16+
- **Overriding a rate limit with [IP Access rules](/waf/tools/ip-access-rules/)**.
17+
- **Including a port number** (such as `example.com:8443/api/`). Rate Limiting does not consider port numbers within rules. Remove the port number from the URL so that the rate limit rule triggers as expected.
2018

2119
## Common API errors
2220

23-
The following common errors may prevent configuring rate limiting rules via the [Cloudflare API](/api/resources/rate_limits/methods/create/):  
21+
The following common errors may prevent configuring rate limiting rules via the [Cloudflare API](/api/resources/rate_limits/methods/create/):
2422

25-
* `Decoding is not yet implemented` – Indicates that your request is missing the `Content-Type: application/json` header. Add the header to your API request to fix the issue.
26-
* `Ratelimit.api.not_entitled` – Enterprise customers must contact their account team before adding rules.
23+
- `Decoding is not yet implemented` – Indicates that your request is missing the `Content-Type: application/json` header. Add the header to your API request to fix the issue.
24+
- `Ratelimit.api.not_entitled` – Enterprise customers must contact their account team before adding rules.
2725

2826
:::note
29-
3027
The `origin_traffic` parameter can only be set on Enterprise plans. Setting `"origin_traffic" = false` for a rule on a Free, Pro, or Business domain is automatically converted into `"origin_traffic" = true`.
3128
:::
Lines changed: 20 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,55 +1,52 @@
11
---
22
pcx_content_type: troubleshooting
33
source: https://support.cloudflare.com/hc/en-us/articles/200172016-Understanding-WAF-managed-rules-Web-Application-Firewall-
4-
title: Troubleshooting
4+
title: Troubleshoot WAF managed rules (previous version)
55
sidebar:
66
order: 2
7-
head:
8-
- tag: title
9-
content: Troubleshoot WAF managed rules (previous version)
7+
label: Troubleshooting
108
noindex: true
119
---
1210

1311
By default, WAF managed rules are fully managed via the Cloudflare dashboard and are compatible with most websites and web applications. However, false positives and false negatives may occur:
1412

15-
* **False positives**: Legitimate requests detected and filtered as malicious.
16-
* **False negatives**: Malicious requests not filtered.
13+
- **False positives**: Legitimate requests detected and filtered as malicious.
14+
- **False negatives**: Malicious requests not filtered.
1715

1816
## Troubleshoot false positives
1917

2018
The definition of suspicious content is subjective for each website. For example, PHP code posted to your website is normally suspicious. However, your website may be teaching how to code and it may require PHP code submissions from visitors. In this situation, you should disable related managed rules for this website, since they would interfere with normal website operation.
2119

22-
To test for false positives, set WAF managed rules to *Simulate* mode. This mode allows you to record the response to possible attacks without challenging or blocking incoming requests. Also, review the Security Events' [sampled logs](/waf/analytics/security-events/#sampled-logs) to determine which managed rules caused false positives.
20+
To test for false positives, set WAF managed rules to _Simulate_ mode. This mode allows you to record the response to possible attacks without challenging or blocking incoming requests. Also, review the Security Events' [sampled logs](/waf/analytics/security-events/#sampled-logs) to determine which managed rules caused false positives.
2321

2422
If you find a false positive, there are several potential resolutions:
2523

26-
* **Add the client’s IP addresses to the [IP Access Rules](/waf/tools/ip-access-rules/) allowlist:** If the browser or client visits from the same IP addresses, allowing is recommended.
27-
* **Disable the corresponding managed rule(s)**: Stops blocking or challenging false positives, but reduces overall site security. A request blocked by Rule ID `981176` refers to OWASP rules. Decrease OWASP sensitivity to resolve the issue.
28-
* **Bypass WAF managed rules with a firewall rule (deprecated):** [Create a firewall rule](/firewall/cf-dashboard/create-edit-delete-rules/#create-a-firewall-rule) with the *Bypass* action to deactivate WAF managed rules for a specific combination of parameters. For example, [bypass managed rules](/firewall/cf-firewall-rules/actions/) for a specific URL and a specific IP address or user agent.
29-
* **(Not recommended) Disable WAF managed rules for traffic to a URL:** Lowers security on the particular URL endpoint. Configured via [Page Rules](/rules/page-rules/).
24+
- **Add the client’s IP addresses to the [IP Access Rules](/waf/tools/ip-access-rules/) allowlist:** If the browser or client visits from the same IP addresses, allowing is recommended.
25+
- **Disable the corresponding managed rule(s)**: Stops blocking or challenging false positives, but reduces overall site security. A request blocked by Rule ID `981176` refers to OWASP rules. Decrease OWASP sensitivity to resolve the issue.
26+
- **Bypass WAF managed rules with a firewall rule (deprecated):** [Create a firewall rule](/firewall/cf-dashboard/create-edit-delete-rules/#create-a-firewall-rule) with the _Bypass_ action to deactivate WAF managed rules for a specific combination of parameters. For example, [bypass managed rules](/firewall/cf-firewall-rules/actions/) for a specific URL and a specific IP address or user agent.
27+
- **(Not recommended) Disable WAF managed rules for traffic to a URL:** Lowers security on the particular URL endpoint. Configured via [Page Rules](/rules/page-rules/).
3028

3129
Additional guidelines are as follows:
3230

33-
* If one specific rule causes false positives, set rule’s **Mode** to *Disable* rather than turning *Off* the entire rule **Group**.
34-
* For false positives with the administrator section of your website, create a [page rule](/rules/page-rules/) to **Disable Security** for the admin section of your site resources — for example, `example.com/admin`.
31+
- If one specific rule causes false positives, set rule’s **Mode** to _Disable_ rather than turning _Off_ the entire rule **Group**.
32+
- For false positives with the administrator section of your website, create a [page rule](/rules/page-rules/) to **Disable Security** for the admin section of your site resources — for example, `example.com/admin`.
3533

3634
## Troubleshoot false negatives
3735

3836
To identify false negatives, review the HTTP logs on your origin web server. To reduce false negatives, use the following checklist:
3937

40-
* Are WAF managed rules enabled in **Security** > **WAF** > **Managed rules**?
38+
- Are WAF managed rules enabled in **Security** > **WAF** > **Managed rules**?
4139

42-
* Are WAF managed rules being disabled via [Page Rules](/rules/page-rules/)?
40+
- Are WAF managed rules being disabled via [Page Rules](/rules/page-rules/)?
4341

44-
* Not all managed rules are enabled by default, so review individual managed rule default actions.
42+
- Not all managed rules are enabled by default, so review individual managed rule default actions.
43+
- For example, Cloudflare allows requests with empty user agents by default. To block requests with an empty user agent, change the rule **Mode** to _Block_.
44+
- Another example: if you are looking to block unmitigated SQL injection attacks, make sure the relevant SQLi rules are enabled and set to _Block_ under the **Cloudflare Specials** group.
4545

46-
* For example, Cloudflare allows requests with empty user agents by default. To block requests with an empty user agent, change the rule **Mode** to *Block*.
47-
* Another example: if you are looking to block unmitigated SQL injection attacks, make sure the relevant SQLi rules are enabled and set to *Block* under the **Cloudflare Specials** group.
46+
- Are DNS records that serve HTTP traffic proxied through Cloudflare?
4847

49-
* Are DNS records that serve HTTP traffic proxied through Cloudflare?
48+
- Is a firewall rule [bypassing](/firewall/cf-firewall-rules/actions/#supported-actions) managed rules?
5049

51-
* Is a firewall rule [bypassing](/firewall/cf-firewall-rules/actions/#supported-actions) managed rules?
50+
- Does an allowed country, ASN, IP range, or IP address in [IP Access rules](/waf/tools/ip-access-rules/) or [firewall rules](/firewall/cf-firewall-rules/) match the attack traffic?
5251

53-
* Does an allowed country, ASN, IP range, or IP address in [IP Access rules](/waf/tools/ip-access-rules/) or [firewall rules](/firewall/cf-firewall-rules/) match the attack traffic?
54-
55-
* Is the malicious traffic reaching your origin IP addresses directly to bypass Cloudflare protection? Block all traffic except from [Cloudflare's IP addresses](/fundamentals/concepts/cloudflare-ip-addresses/) at your origin web server.
52+
- Is the malicious traffic reaching your origin IP addresses directly to bypass Cloudflare protection? Block all traffic except from [Cloudflare's IP addresses](/fundamentals/concepts/cloudflare-ip-addresses/) at your origin web server.

src/content/docs/waf/reference/phases.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
2-
title: Phases
2+
title: WAF phases
33
pcx_content_type: reference
44
sidebar:
55
order: 2
6+
label: Phases
67
tableOfContents: false
78
---
89

src/content/docs/waf/tools/ip-access-rules/actions.mdx

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,9 @@
11
---
2-
title: Actions
2+
title: IP Access rules actions
33
pcx_content_type: reference
44
sidebar:
55
order: 4
6-
head:
7-
- tag: title
8-
content: IP Access rules actions
6+
label: Actions
97
---
108

119
An IP Access rule can perform one of the following actions:

0 commit comments

Comments
 (0)