Skip to content

Commit 41c68eb

Browse files
feedback updates
1 parent d82031b commit 41c68eb

File tree

9 files changed

+147
-181
lines changed

9 files changed

+147
-181
lines changed

src/content/docs/ddos-protection/advanced-ddos-systems/concepts.mdx

Lines changed: 87 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,67 @@ A rule configures Advanced DDoS Protection for a given [scope](/ddos-protection/
3636

3737
Each system component (SYN flood protection and out-of-state TCP protection) has its own list of rules, and it should have at least one rule.
3838

39+
### Rule settings
40+
Each rule type has the following settings: scope, mode, burst sensitivity, and rate sensitivity.
41+
42+
You may need to adjust the burst or rate sensitivity of a rule in case of false positives or due to specific traffic patterns.
43+
44+
#### Scope
45+
46+
Advanced TCP Protection rules can have one of the following scopes:
47+
48+
- **Global**: The rule will apply to all incoming packets.
49+
- **Region**: The rule will apply to incoming packets in a selected region.
50+
- **Data center**: The rule will apply to incoming packets in the selected Cloudflare data center.
51+
52+
The rule scope allows you to adjust the system's tolerance for out-of-state packets in locations where you may have more or less traffic than usual, or due to any other networking reasons.
53+
54+
Besides defining rules with one of the above scopes, you must also select the [prefixes](/ddos-protection/advanced-ddos-systems/concepts/#prefixes) that you wish to protect with Advanced TCP Protection.
55+
56+
#### Mode
57+
58+
The Advanced TCP Protection system constantly learns your TCP connections to mitigate DDoS attacks. Advanced TCP Protection rules can have one of the following execution modes: monitoring, mitigation (enabled), or disabled.
59+
60+
- **Monitoring**
61+
- In this mode, Advanced TCP Protection will not impact any packets. Instead, the protection system will learn your legitimate TCP connections and show you what it would have mitigated. Check Network Analytics to visualize what actions Advanced TCP Protection would have taken on incoming packets, according to the current configuration.
62+
63+
- **​​Mitigation (Enabled)**
64+
- In this mode, Advanced TCP Protection will learn your legitimate TCP connections and perform mitigation actions on incoming TCP DDoS attacks based on the rule configuration (burst and rate sensitivity) and your [allowlist](/ddos-protection/advanced-ddos-systems/concepts/#allowlist).
65+
66+
- **Disabled**
67+
- In this mode, a rule will not evaluate any incoming packets.
68+
69+
#### Burst sensitivity
70+
71+
The burst sensitivity is the rule's sensitivity to short-term bursts in the packet rate:
72+
73+
- A low sensitivity means that bigger spikes in the packet rate may trigger a mitigation action.
74+
- A high sensitivity means that smaller spikes in the packet rate may trigger a mitigation action.
75+
76+
The default burst sensitivity is _Medium_.
77+
78+
#### Rate sensitivity
79+
80+
The rate sensitivity is the rule's sensitivity to the sustained packet rate:
81+
82+
- A low sensitivity means that higher sustained packet rates can trigger a mitigation action.
83+
- A high sensitivity means that lower sustained packet rates may trigger a mitigation action. A high sensitivity offers increased protection, but you may get more false positives (that is, mitigated packets that belong to legitimate traffic).
84+
85+
The default rate sensitivity is _Medium_.
86+
87+
#### Profile sensitivity
88+
89+
:::note
90+
Profile sensitivity is available for [Advanced DNS Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/) only.
91+
:::
92+
93+
The sensitivity to DNS queries that have not been recently seen.
94+
95+
- A higher sensitivity level means that the mitigation system will begin mitigating faster.
96+
- A lower sensitivity provides more tolerance for potentially suspicious DNS queries.
97+
98+
The default rate sensitivity is _Medium_.
99+
39100
## Filter
40101

41102
<Render file="atp-filter-definition" /> The filter expression can reference source and destination IP addresses and ports. Each system component (SYN flood protection and out-of-state TCP protection) should have one or more [rules](#rule), but filters are optional.
@@ -70,3 +131,29 @@ When you have both rules and filters configured, the execution mode is determine
70131
3. Off filter (filter with `disabled` mode)
71132
2. If no filter matched, use the execution mode determined by existing rules.
72133
3. If no rules match, disable Advanced TCP Protection.
134+
135+
---
136+
137+
## Mitigation reasons
138+
139+
The Advanced TCP Protection system applies mitigation actions for different reasons based on the connection states. The **Mitigation reason** field shown in the **Advanced TCP Protection** tab of the [Network Analytics](/analytics/network-analytics/) dashboard will contain more information on why a given packet was dropped by the system.
140+
141+
The connection states are the following:
142+
143+
- **New**: A SYN or SYN-ACK packet has been sent to attempt to open a new connection.
144+
- **Open**: The three-way TCP handshake has been completed and the TCP connection is open.
145+
- **Closing**: A FIN or FIN-ACK packet has been seen attempting to close a connection.
146+
- **Closed**: The closing three-way handshake has been completed, or an RST packet has closed the connection.
147+
148+
The mitigation reasons are the following:
149+
150+
| Reason | Description |
151+
| --- | --- |
152+
| **Unexpected** | Packet dropped because it was not expected given the current state of the TCP connection it was associated with. |
153+
| **Challenge needed** | Packet challenged because the system determined that the packet is most likely part of a packet flood. |
154+
| **Challenge passed** | Packet dropped because it belongs to a solved challenge. |
155+
| **Not found** | Packet dropped because it is not part of an existing TCP connection and it is not establishing a new connection. |
156+
| **Out of sequence** | Packet dropped because its properties (for example, TCP flags or sequence numbers) do not match the expected values for the existing connection. |
157+
| **Already closed** | Packet dropped because it belongs to a connection that is already closed. |
158+
159+
Mitigation will only occur based on your Advanced TCP Protection configuration (rule sensitivities, configured allowlists and prefixes). The protection system will provide some tolerance to out-of-state packets to accommodate for the natural randomness of Internet routing.

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/create-filter.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,10 @@ import { GlossaryTooltip, Render } from "~/components"
1515

1616
Each protection system component (SYN flood protection or out-of-state TCP protection) should have at least one [rule](/ddos-protection/advanced-ddos-systems/concepts/#rule), but filters are optional.
1717

18+
:::note
19+
Filters only apply to Advanced TCP Protection.
20+
:::
21+
1822
## Procedure
1923

2024
To create a [filter](/ddos-protection/advanced-ddos-systems/concepts/#filter) for one of the system components:

src/content/docs/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection.mdx

Lines changed: 7 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -25,17 +25,6 @@ The [Network Analytics dashboard](/analytics/network-analytics/) will display sy
2525

2626
[Create a rule](/ddos-protection/advanced-ddos-systems/how-to/create-rule/#create-an-advanced-dns-protection-rule) to enable Advanced DNS Protection.
2727

28-
---
29-
30-
## Troubleshooting
31-
32-
### No data about Advanced DNS Protection in Network Analytics
33-
34-
If you cannot find any data related to Advanced DNS Protection in the **DNS Protection** tab of Network Analytics, it could be because one of these reasons:
35-
36-
- You did not [add your prefixes](/ddos-protection/advanced-ddos-systems/how-to/add-prefix/) to Advanced L3/4 DDoS Protection.
37-
- Cloudflare did not enable the Advanced DNS Protection system yet.
38-
- You do not have any DNS over UDP traffic.
3928

4029
---
4130

@@ -50,11 +39,15 @@ Currently, to disable this data collection you must remove your prefixes either
5039

5140
---
5241

53-
## Availability
42+
## Troubleshooting
5443

55-
Advanced DNS Protection is currently available to [Magic Transit](/magic-transit/) customers.
44+
### No data about Advanced DNS Protection in Network Analytics
5645

57-
Protection for simpler DNS-based DDoS attacks is also included as part of the [Network-layer DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/network/).
46+
If you cannot find any data related to Advanced DNS Protection in the **DNS Protection** tab of Network Analytics, it could be because one of these reasons:
47+
48+
- You did not [add your prefixes](/ddos-protection/advanced-ddos-systems/how-to/add-prefix/) to Advanced L3/4 DDoS Protection.
49+
- Cloudflare did not enable the Advanced DNS Protection system yet.
50+
- You do not have any DNS over UDP traffic.
5851

5952
---
6053

Lines changed: 9 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ head:
1111

1212
Cloudflare's Advanced TCP Protection, powered by [`flowtrackd`](https://blog.cloudflare.com/announcing-flowtrackd/), is a stateful TCP inspection engine used to detect and mitigate sophisticated out-of-state TCP attacks such as randomized and spoofed ACK floods or SYN and SYN-ACK floods.
1313

14+
## How it works
15+
1416
Advanced TCP Protection can simultaneously protect against different kinds of attacks:
1517

1618
- Pinpointed attacks targeting a specific destination IP/port combination.
@@ -25,32 +27,24 @@ The feature offers two types of protection:
2527

2628
Each protection type is configured independently using rules and (optionally) filters. You should configure at least one rule for each type of protection before enabling Advanced TCP Protection.
2729

28-
---
29-
30-
## SYN Flood Protection
30+
### SYN Flood Protection
3131

3232
This system protects against attacks such as fully randomized SYN and SYN-ACK floods. You should configure at least one SYN flood rule before enabling Advanced TCP Protection.
3333

34-
In mitigation mode, SYN flood rules will challenge new connection initiation requests (SYN, SYN-ACK) if they exceed the configured packet-per-second thresholds. The threshold should be higher than the normal rate of legitimate SYN and SYN-ACK packets that your network receives. Packets below the threshold will not be challenged. Using the [rate sensitivity](/ddos-protection/advanced-ddos-systems/rule-settings/#rate-sensitivity) and [burst sensitivity](/ddos-protection/advanced-ddos-systems/rule-settings/#burst-sensitivity) settings you can increase or decrease the tolerance of SYN and SYN-ACK packets.
34+
In mitigation mode, SYN flood rules will challenge new connection initiation requests (SYN, SYN-ACK) if they exceed the configured packet-per-second thresholds. The threshold should be higher than the normal rate of legitimate SYN and SYN-ACK packets that your network receives. Packets below the threshold will not be challenged. Using the [rate sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#rate-sensitivity) and [burst sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#burst-sensitivity) settings you can increase or decrease the tolerance of SYN and SYN-ACK packets.
3535

36-
For more information on the configuration settings of SYN flood rules, refer to [Rule settings](/ddos-protection/advanced-ddos-systems/rule-settings/).
36+
For more information on the configuration settings of SYN flood rules, refer to [Rule settings](/ddos-protection/advanced-ddos-systems/concepts/#rule-settings).
3737

38-
## Out-of-state TCP Protection
38+
### Out-of-state TCP Protection
3939

4040
This system protects against out-of-state TCP DDoS attacks such as fully randomized ACK floods and RST floods. You should configure one out-of-state TCP rule before enabling Advanced TCP Protection.
4141

42-
In mitigation mode, out-of-state TCP rules will drop out-of-state packets that do not belong to existing (and tracked) TCP connections if their rates exceed the configured thresholds. The threshold should be higher than the normal rate of non SYN or SYN-ACK TCP packets that your network receives. Packets below the threshold will not be evaluated. Using the [rate sensitivity](/ddos-protection/advanced-ddos-systems/rule-settings/#rate-sensitivity) and [burst sensitivity](/ddos-protection/advanced-ddos-systems/rule-settings/#burst-sensitivity) settings you can increase or decrease the tolerance of out-of-state TCP packets.
42+
In mitigation mode, out-of-state TCP rules will drop out-of-state packets that do not belong to existing (and tracked) TCP connections if their rates exceed the configured thresholds. The threshold should be higher than the normal rate of non SYN or SYN-ACK TCP packets that your network receives. Packets below the threshold will not be evaluated. Using the [rate sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#rate-sensitivity) and [burst sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#burst-sensitivity) settings you can increase or decrease the tolerance of out-of-state TCP packets.
4343

44-
For more information on the configuration settings of out-of-state TCP rules, refer to [Rule settings](/ddos-protection/advanced-ddos-systems/rule-settings/).
44+
For more information on the configuration settings of out-of-state TCP rules, refer to [Rule settings](/ddos-protection/advanced-ddos-systems/concepts/#rule-settings).
4545

4646
---
4747

4848
## Setup
4949

50-
[Create a global configuration](/ddos-protection/advanced-ddos-systems/setup/#3-create-a-global-configuration) to set up SYN Flood and Out-of-state TCP rules and filters for Advanced TCP Protection.
51-
52-
---
53-
54-
## Availability
55-
56-
Advanced TCP Protection is available to all [Magic Transit](/magic-transit/) customers, and is disabled by default. Protection for simpler TCP-based DDoS attacks is also included as part of the [Network-layer DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/network/).
50+
[Create a global configuration](/ddos-protection/advanced-ddos-systems/overview/#rules) to set up SYN Flood and Out-of-state TCP rules and filters for Advanced TCP Protection.

src/content/docs/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/mitigation-reasons.mdx

Lines changed: 0 additions & 30 deletions
This file was deleted.

src/content/docs/ddos-protection/advanced-ddos-systems/overview/index.mdx

Lines changed: 39 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -10,26 +10,58 @@ head:
1010

1111
---
1212

13-
import { GlossaryTooltip } from "~/components"
13+
import { GlossaryTooltip, Render } from "~/components"
1414

15-
Advanced DDoS Protection systems are configured using the general settings, [Advanced TCP Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/), and [Advanced DNS Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/).
15+
The Advanced DDoS Protection system includes [Advanced TCP Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/) and Advanced DNS Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/). Both systems are configured using the general settings, but also comprise of their own dedicated settings.
16+
17+
Advanced DDoS Protection systems is available to [Magic Transit](/magic-transit/) customers.
18+
19+
Protection for simpler TCP or DNS-based DDoS attacks is included as part of the [Network-layer DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/network/).
1620

1721
## General settings
1822

19-
General settings enable and control the use of the Advanced TCP Protection and the Advanced DNS Protection systems, and are composed of thresholds, prefixes, rules, and enablement. To configure the general settings, refer to [Setup](/ddos-protection/advanced-ddos-systems/setup/).
23+
General settings enable and control the use of the Advanced TCP Protection and the Advanced DNS Protection systems, and are composed of thresholds, prefixes, rules, and enablement.
2024

2125
### Thresholds
2226

23-
Thresholds are based on your network's unique traffic, they define the sensitivity levels, and are configured by Cloudflare.
27+
Thresholds are based on your network's unique traffic and are configured by Cloudflare. The sensitivity levels manipulate the thresholds.
28+
29+
When you get access to Advanced DDoS Protection systems, there are no configured thresholds in your account.
30+
31+
Thresholds are based on your network's individual behavior, derived from your traffic profile as monitored by Cloudflare. Defining the thresholds will effectively determine what the _High_, _Medium_, and _Low_ [sensitivities](/ddos-protection/advanced-ddos-systems/concepts/#burst-sensitivity) will be for your specific case.
32+
33+
Ask your Implementation Manager to configure initial threshold values. Separate thresholds need to be configured for Advanced TCP Protection and Advanced DNS Protection.
34+
35+
Once thresholds are configured, the Implementation Manager will let you know that Advanced DDoS Protection systems have been initialized and can be configured and enabled.
2436

2537
### Prefixes
2638

27-
Add prefixes to instruct the system on which traffic to route through the system.
39+
The prefixes that you have [onboarded](/magic-transit/how-to/advertise-prefixes/) to and approved by Cloudflare instruct the system on which traffic to route through the system.
40+
41+
[Add the prefixes](/ddos-protection/advanced-ddos-systems/how-to/add-prefix/) you would like to use with Advanced TCP and DNS Protection. You will be able to register prefixes that you previously [onboarded to Magic Transit](/magic-transit/how-to/advertise-prefixes/) or a subset of these prefixes.
42+
43+
You cannot add unapproved prefixes to Advanced DDoS Protection systems. Contact your account team to get help with prefix approvals.
2844

2945
### Rules
3046

31-
Create rules for the TCP and DNS Protection systems to enable mitigation. Start with Monitoring mode.
47+
[Create a rule](/ddos-protection/advanced-ddos-systems/how-to/create-rule/) for Advanced TCP and Advanced DNS Protection (as needed) to enable mitigation.
48+
49+
You can create a rule for SYN Flood Protection and another rule for Out-of-state TCP Protection, both with global scope and in monitoring mode. These rules will apply to all received <GlossaryTooltip term="data packet">packets</GlossaryTooltip>.
50+
51+
Optionally, you can create [filters](/ddos-protection/advanced-ddos-systems/concepts/#filter) for each protection system component (SYN flood protection and out-of-state TCP protection). <Render file="atp-filter-definition" />
52+
53+
### Prefixes
54+
55+
Optionally, you can [add prefixes to the allowlist](/ddos-protection/advanced-ddos-systems/how-to/add-prefix-allowlist/) if your traffic should bypass Advanced DDoS Protection rules.
56+
57+
The <GlossaryTooltip term="allowlist">allowlist</GlossaryTooltip> only applies to source IPs — it does not apply to your own IPs or prefixes. You can also [exclude a subset of an onboarded prefix](/ddos-protection/advanced-ddos-systems/how-to/exclude-prefix/) from Advanced TCP Protection.
58+
59+
Refer to [Concepts](/ddos-protection/advanced-ddos-systems/concepts/) for more information.
3260

3361
### Enablement
3462

35-
Enable the Advanced DDoS system and begin routing traffic through it.
63+
Enable the Advanced DDoS system and begin routing traffic through it.
64+
65+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
66+
2. Go to **L3/4 DDoS** > **Advanced Protection** > **General settings**.
67+
3. Under **General settings**, toggle the feature status **On**.

0 commit comments

Comments
 (0)