You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/ddos-protection/advanced-ddos-systems/concepts.mdx
+87Lines changed: 87 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,6 +36,67 @@ A rule configures Advanced DDoS Protection for a given [scope](/ddos-protection/
36
36
37
37
Each system component (SYN flood protection and out-of-state TCP protection) has its own list of rules, and it should have at least one rule.
38
38
39
+
### Rule settings
40
+
Each rule type has the following settings: scope, mode, burst sensitivity, and rate sensitivity.
41
+
42
+
You may need to adjust the burst or rate sensitivity of a rule in case of false positives or due to specific traffic patterns.
43
+
44
+
#### Scope
45
+
46
+
Advanced TCP Protection rules can have one of the following scopes:
47
+
48
+
-**Global**: The rule will apply to all incoming packets.
49
+
-**Region**: The rule will apply to incoming packets in a selected region.
50
+
-**Data center**: The rule will apply to incoming packets in the selected Cloudflare data center.
51
+
52
+
The rule scope allows you to adjust the system's tolerance for out-of-state packets in locations where you may have more or less traffic than usual, or due to any other networking reasons.
53
+
54
+
Besides defining rules with one of the above scopes, you must also select the [prefixes](/ddos-protection/advanced-ddos-systems/concepts/#prefixes) that you wish to protect with Advanced TCP Protection.
55
+
56
+
#### Mode
57
+
58
+
The Advanced TCP Protection system constantly learns your TCP connections to mitigate DDoS attacks. Advanced TCP Protection rules can have one of the following execution modes: monitoring, mitigation (enabled), or disabled.
59
+
60
+
-**Monitoring**
61
+
- In this mode, Advanced TCP Protection will not impact any packets. Instead, the protection system will learn your legitimate TCP connections and show you what it would have mitigated. Check Network Analytics to visualize what actions Advanced TCP Protection would have taken on incoming packets, according to the current configuration.
62
+
63
+
-**Mitigation (Enabled)**
64
+
- In this mode, Advanced TCP Protection will learn your legitimate TCP connections and perform mitigation actions on incoming TCP DDoS attacks based on the rule configuration (burst and rate sensitivity) and your [allowlist](/ddos-protection/advanced-ddos-systems/concepts/#allowlist).
65
+
66
+
-**Disabled**
67
+
- In this mode, a rule will not evaluate any incoming packets.
68
+
69
+
#### Burst sensitivity
70
+
71
+
The burst sensitivity is the rule's sensitivity to short-term bursts in the packet rate:
72
+
73
+
- A low sensitivity means that bigger spikes in the packet rate may trigger a mitigation action.
74
+
- A high sensitivity means that smaller spikes in the packet rate may trigger a mitigation action.
75
+
76
+
The default burst sensitivity is _Medium_.
77
+
78
+
#### Rate sensitivity
79
+
80
+
The rate sensitivity is the rule's sensitivity to the sustained packet rate:
81
+
82
+
- A low sensitivity means that higher sustained packet rates can trigger a mitigation action.
83
+
- A high sensitivity means that lower sustained packet rates may trigger a mitigation action. A high sensitivity offers increased protection, but you may get more false positives (that is, mitigated packets that belong to legitimate traffic).
84
+
85
+
The default rate sensitivity is _Medium_.
86
+
87
+
#### Profile sensitivity
88
+
89
+
:::note
90
+
Profile sensitivity is available for [Advanced DNS Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/) only.
91
+
:::
92
+
93
+
The sensitivity to DNS queries that have not been recently seen.
94
+
95
+
- A higher sensitivity level means that the mitigation system will begin mitigating faster.
96
+
- A lower sensitivity provides more tolerance for potentially suspicious DNS queries.
97
+
98
+
The default rate sensitivity is _Medium_.
99
+
39
100
## Filter
40
101
41
102
<Renderfile="atp-filter-definition" /> The filter expression can reference source and destination IP addresses and ports. Each system component (SYN flood protection and out-of-state TCP protection) should have one or more [rules](#rule), but filters are optional.
@@ -70,3 +131,29 @@ When you have both rules and filters configured, the execution mode is determine
70
131
3. Off filter (filter with `disabled` mode)
71
132
2. If no filter matched, use the execution mode determined by existing rules.
72
133
3. If no rules match, disable Advanced TCP Protection.
134
+
135
+
---
136
+
137
+
## Mitigation reasons
138
+
139
+
The Advanced TCP Protection system applies mitigation actions for different reasons based on the connection states. The **Mitigation reason** field shown in the **Advanced TCP Protection** tab of the [Network Analytics](/analytics/network-analytics/) dashboard will contain more information on why a given packet was dropped by the system.
140
+
141
+
The connection states are the following:
142
+
143
+
-**New**: A SYN or SYN-ACK packet has been sent to attempt to open a new connection.
144
+
-**Open**: The three-way TCP handshake has been completed and the TCP connection is open.
145
+
-**Closing**: A FIN or FIN-ACK packet has been seen attempting to close a connection.
146
+
-**Closed**: The closing three-way handshake has been completed, or an RST packet has closed the connection.
147
+
148
+
The mitigation reasons are the following:
149
+
150
+
| Reason | Description |
151
+
| --- | --- |
152
+
|**Unexpected**| Packet dropped because it was not expected given the current state of the TCP connection it was associated with. |
153
+
|**Challenge needed**| Packet challenged because the system determined that the packet is most likely part of a packet flood. |
154
+
|**Challenge passed**| Packet dropped because it belongs to a solved challenge. |
155
+
|**Not found**| Packet dropped because it is not part of an existing TCP connection and it is not establishing a new connection. |
156
+
|**Out of sequence**| Packet dropped because its properties (for example, TCP flags or sequence numbers) do not match the expected values for the existing connection. |
157
+
|**Already closed**| Packet dropped because it belongs to a connection that is already closed. |
158
+
159
+
Mitigation will only occur based on your Advanced TCP Protection configuration (rule sensitivities, configured allowlists and prefixes). The protection system will provide some tolerance to out-of-state packets to accommodate for the natural randomness of Internet routing.
Each protection system component (SYN flood protection or out-of-state TCP protection) should have at least one [rule](/ddos-protection/advanced-ddos-systems/concepts/#rule), but filters are optional.
17
17
18
+
:::note
19
+
Filters only apply to Advanced TCP Protection.
20
+
:::
21
+
18
22
## Procedure
19
23
20
24
To create a [filter](/ddos-protection/advanced-ddos-systems/concepts/#filter) for one of the system components:
Copy file name to clipboardExpand all lines: src/content/docs/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection.mdx
+7-14Lines changed: 7 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,17 +25,6 @@ The [Network Analytics dashboard](/analytics/network-analytics/) will display sy
25
25
26
26
[Create a rule](/ddos-protection/advanced-ddos-systems/how-to/create-rule/#create-an-advanced-dns-protection-rule) to enable Advanced DNS Protection.
27
27
28
-
---
29
-
30
-
## Troubleshooting
31
-
32
-
### No data about Advanced DNS Protection in Network Analytics
33
-
34
-
If you cannot find any data related to Advanced DNS Protection in the **DNS Protection** tab of Network Analytics, it could be because one of these reasons:
35
-
36
-
- You did not [add your prefixes](/ddos-protection/advanced-ddos-systems/how-to/add-prefix/) to Advanced L3/4 DDoS Protection.
37
-
- Cloudflare did not enable the Advanced DNS Protection system yet.
38
-
- You do not have any DNS over UDP traffic.
39
28
40
29
---
41
30
@@ -50,11 +39,15 @@ Currently, to disable this data collection you must remove your prefixes either
50
39
51
40
---
52
41
53
-
## Availability
42
+
## Troubleshooting
54
43
55
-
Advanced DNS Protection is currently available to [Magic Transit](/magic-transit/) customers.
44
+
### No data about Advanced DNS Protection in Network Analytics
56
45
57
-
Protection for simpler DNS-based DDoS attacks is also included as part of the [Network-layer DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/network/).
46
+
If you cannot find any data related to Advanced DNS Protection in the **DNS Protection** tab of Network Analytics, it could be because one of these reasons:
47
+
48
+
- You did not [add your prefixes](/ddos-protection/advanced-ddos-systems/how-to/add-prefix/) to Advanced L3/4 DDoS Protection.
49
+
- Cloudflare did not enable the Advanced DNS Protection system yet.
Copy file name to clipboardExpand all lines: src/content/docs/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection.mdx
+9-15Lines changed: 9 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,8 @@ head:
11
11
12
12
Cloudflare's Advanced TCP Protection, powered by [`flowtrackd`](https://blog.cloudflare.com/announcing-flowtrackd/), is a stateful TCP inspection engine used to detect and mitigate sophisticated out-of-state TCP attacks such as randomized and spoofed ACK floods or SYN and SYN-ACK floods.
13
13
14
+
## How it works
15
+
14
16
Advanced TCP Protection can simultaneously protect against different kinds of attacks:
15
17
16
18
- Pinpointed attacks targeting a specific destination IP/port combination.
@@ -25,32 +27,24 @@ The feature offers two types of protection:
25
27
26
28
Each protection type is configured independently using rules and (optionally) filters. You should configure at least one rule for each type of protection before enabling Advanced TCP Protection.
27
29
28
-
---
29
-
30
-
## SYN Flood Protection
30
+
### SYN Flood Protection
31
31
32
32
This system protects against attacks such as fully randomized SYN and SYN-ACK floods. You should configure at least one SYN flood rule before enabling Advanced TCP Protection.
33
33
34
-
In mitigation mode, SYN flood rules will challenge new connection initiation requests (SYN, SYN-ACK) if they exceed the configured packet-per-second thresholds. The threshold should be higher than the normal rate of legitimate SYN and SYN-ACK packets that your network receives. Packets below the threshold will not be challenged. Using the [rate sensitivity](/ddos-protection/advanced-ddos-systems/rule-settings/#rate-sensitivity) and [burst sensitivity](/ddos-protection/advanced-ddos-systems/rule-settings/#burst-sensitivity) settings you can increase or decrease the tolerance of SYN and SYN-ACK packets.
34
+
In mitigation mode, SYN flood rules will challenge new connection initiation requests (SYN, SYN-ACK) if they exceed the configured packet-per-second thresholds. The threshold should be higher than the normal rate of legitimate SYN and SYN-ACK packets that your network receives. Packets below the threshold will not be challenged. Using the [rate sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#rate-sensitivity) and [burst sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#burst-sensitivity) settings you can increase or decrease the tolerance of SYN and SYN-ACK packets.
35
35
36
-
For more information on the configuration settings of SYN flood rules, refer to [Rule settings](/ddos-protection/advanced-ddos-systems/rule-settings/).
36
+
For more information on the configuration settings of SYN flood rules, refer to [Rule settings](/ddos-protection/advanced-ddos-systems/concepts/#rule-settings).
37
37
38
-
## Out-of-state TCP Protection
38
+
###Out-of-state TCP Protection
39
39
40
40
This system protects against out-of-state TCP DDoS attacks such as fully randomized ACK floods and RST floods. You should configure one out-of-state TCP rule before enabling Advanced TCP Protection.
41
41
42
-
In mitigation mode, out-of-state TCP rules will drop out-of-state packets that do not belong to existing (and tracked) TCP connections if their rates exceed the configured thresholds. The threshold should be higher than the normal rate of non SYN or SYN-ACK TCP packets that your network receives. Packets below the threshold will not be evaluated. Using the [rate sensitivity](/ddos-protection/advanced-ddos-systems/rule-settings/#rate-sensitivity) and [burst sensitivity](/ddos-protection/advanced-ddos-systems/rule-settings/#burst-sensitivity) settings you can increase or decrease the tolerance of out-of-state TCP packets.
42
+
In mitigation mode, out-of-state TCP rules will drop out-of-state packets that do not belong to existing (and tracked) TCP connections if their rates exceed the configured thresholds. The threshold should be higher than the normal rate of non SYN or SYN-ACK TCP packets that your network receives. Packets below the threshold will not be evaluated. Using the [rate sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#rate-sensitivity) and [burst sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#burst-sensitivity) settings you can increase or decrease the tolerance of out-of-state TCP packets.
43
43
44
-
For more information on the configuration settings of out-of-state TCP rules, refer to [Rule settings](/ddos-protection/advanced-ddos-systems/rule-settings/).
44
+
For more information on the configuration settings of out-of-state TCP rules, refer to [Rule settings](/ddos-protection/advanced-ddos-systems/concepts/#rule-settings).
45
45
46
46
---
47
47
48
48
## Setup
49
49
50
-
[Create a global configuration](/ddos-protection/advanced-ddos-systems/setup/#3-create-a-global-configuration) to set up SYN Flood and Out-of-state TCP rules and filters for Advanced TCP Protection.
51
-
52
-
---
53
-
54
-
## Availability
55
-
56
-
Advanced TCP Protection is available to all [Magic Transit](/magic-transit/) customers, and is disabled by default. Protection for simpler TCP-based DDoS attacks is also included as part of the [Network-layer DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/network/).
50
+
[Create a global configuration](/ddos-protection/advanced-ddos-systems/overview/#rules) to set up SYN Flood and Out-of-state TCP rules and filters for Advanced TCP Protection.
Copy file name to clipboardExpand all lines: src/content/docs/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/mitigation-reasons.mdx
Advanced DDoS Protection systems are configured using the general settings, [Advanced TCP Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/), and [Advanced DNS Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/).
15
+
The Advanced DDoS Protection system includes [Advanced TCP Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/) and Advanced DNS Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/). Both systems are configured using the general settings, but also comprise of their own dedicated settings.
16
+
17
+
Advanced DDoS Protection systems is available to [Magic Transit](/magic-transit/) customers.
18
+
19
+
Protection for simpler TCP or DNS-based DDoS attacks is included as part of the [Network-layer DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/network/).
16
20
17
21
## General settings
18
22
19
-
General settings enable and control the use of the Advanced TCP Protection and the Advanced DNS Protection systems, and are composed of thresholds, prefixes, rules, and enablement. To configure the general settings, refer to [Setup](/ddos-protection/advanced-ddos-systems/setup/).
23
+
General settings enable and control the use of the Advanced TCP Protection and the Advanced DNS Protection systems, and are composed of thresholds, prefixes, rules, and enablement.
20
24
21
25
### Thresholds
22
26
23
-
Thresholds are based on your network's unique traffic, they define the sensitivity levels, and are configured by Cloudflare.
27
+
Thresholds are based on your network's unique traffic and are configured by Cloudflare. The sensitivity levels manipulate the thresholds.
28
+
29
+
When you get access to Advanced DDoS Protection systems, there are no configured thresholds in your account.
30
+
31
+
Thresholds are based on your network's individual behavior, derived from your traffic profile as monitored by Cloudflare. Defining the thresholds will effectively determine what the _High_, _Medium_, and _Low_[sensitivities](/ddos-protection/advanced-ddos-systems/concepts/#burst-sensitivity) will be for your specific case.
32
+
33
+
Ask your Implementation Manager to configure initial threshold values. Separate thresholds need to be configured for Advanced TCP Protection and Advanced DNS Protection.
34
+
35
+
Once thresholds are configured, the Implementation Manager will let you know that Advanced DDoS Protection systems have been initialized and can be configured and enabled.
24
36
25
37
### Prefixes
26
38
27
-
Add prefixes to instruct the system on which traffic to route through the system.
39
+
The prefixes that you have [onboarded](/magic-transit/how-to/advertise-prefixes/) to and approved by Cloudflare instruct the system on which traffic to route through the system.
40
+
41
+
[Add the prefixes](/ddos-protection/advanced-ddos-systems/how-to/add-prefix/) you would like to use with Advanced TCP and DNS Protection. You will be able to register prefixes that you previously [onboarded to Magic Transit](/magic-transit/how-to/advertise-prefixes/) or a subset of these prefixes.
42
+
43
+
You cannot add unapproved prefixes to Advanced DDoS Protection systems. Contact your account team to get help with prefix approvals.
28
44
29
45
### Rules
30
46
31
-
Create rules for the TCP and DNS Protection systems to enable mitigation. Start with Monitoring mode.
47
+
[Create a rule](/ddos-protection/advanced-ddos-systems/how-to/create-rule/) for Advanced TCP and Advanced DNS Protection (as needed) to enable mitigation.
48
+
49
+
You can create a rule for SYN Flood Protection and another rule for Out-of-state TCP Protection, both with global scope and in monitoring mode. These rules will apply to all received <GlossaryTooltipterm="data packet">packets</GlossaryTooltip>.
50
+
51
+
Optionally, you can create [filters](/ddos-protection/advanced-ddos-systems/concepts/#filter) for each protection system component (SYN flood protection and out-of-state TCP protection). <Renderfile="atp-filter-definition" />
52
+
53
+
### Prefixes
54
+
55
+
Optionally, you can [add prefixes to the allowlist](/ddos-protection/advanced-ddos-systems/how-to/add-prefix-allowlist/) if your traffic should bypass Advanced DDoS Protection rules.
56
+
57
+
The <GlossaryTooltipterm="allowlist">allowlist</GlossaryTooltip> only applies to source IPs — it does not apply to your own IPs or prefixes. You can also [exclude a subset of an onboarded prefix](/ddos-protection/advanced-ddos-systems/how-to/exclude-prefix/) from Advanced TCP Protection.
58
+
59
+
Refer to [Concepts](/ddos-protection/advanced-ddos-systems/concepts/) for more information.
32
60
33
61
### Enablement
34
62
35
-
Enable the Advanced DDoS system and begin routing traffic through it.
63
+
Enable the Advanced DDoS system and begin routing traffic through it.
64
+
65
+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
66
+
2. Go to **L3/4 DDoS** > **Advanced Protection** > **General settings**.
67
+
3. Under **General settings**, toggle the feature status **On**.
0 commit comments