Skip to content

Commit 4445fd1

Browse files
patriciasantaananevikashah
authored andcommitted
[DDoS protection] DashButton component (#24871)
* ddos protection dashbutton * edits * spacing * spacing * import * missing import * spacing * possible fix?
1 parent 6033306 commit 4445fd1

File tree

13 files changed

+118
-94
lines changed

13 files changed

+118
-94
lines changed

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/add-prefix-allowlist.mdx

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,17 +8,18 @@ head:
88
content: Add an IP address/prefix to the Advanced DDoS Protection allowlist
99
---
1010

11-
import { Render, Steps } from "~/components";
11+
import { Render, Steps, DashButton } from "~/components";
1212

1313
To add an IP address or prefix to the Advanced DDoS Protection [allowlist](/ddos-protection/advanced-ddos-systems/concepts/#allowlist):
1414

1515
<Steps>
16-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and
17-
select your account. 2. Go to **L3/4 DDoS** > **Advanced Protection**. 3.
18-
Under **General settings** > **Allowlist**, select **Edit**. 4. Enter a prefix
19-
and (optionally) a description in **Prefix** and **Description**,
20-
respectively. 5. To exclude the current prefix from the allowlist instead of
21-
including it, uncheck the **Enabled** checkbox. 6. Select **Add**.
16+
1. In the Cloudflare dashboard, go to the **L3/4 DDoS protection** page.
17+
18+
<DashButton url="/?to=/:account/network-security/ddos" />
19+
2. Go to **Advanced Protection**.
20+
3. Under **General settings** > **Allowlist**, select **Edit**.
21+
4. Enter a prefix and (optionally) a description in **Prefix** and **Description**, respectively.
22+
5. To exclude the current prefix from the allowlist instead of including it, uncheck the **Enabled** checkbox. 6. Select **Add**.
2223
</Steps>
2324

2425
<Render file="allowlist-ip-spoofing" product="ddos-protection" />

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/add-prefix.mdx

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,16 +8,18 @@ head:
88
content: Add a prefix to Advanced DDoS Protection
99

1010
---
11-
import { Steps } from "~/components"
11+
import { Steps, DashButton } from "~/components"
1212

1313
To add a [prefix](/ddos-protection/advanced-ddos-systems/concepts/#prefixes) to Advanced DDoS Protection:
1414

1515
<Steps>
16-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
17-
2. Go to **L3/4 DDoS** > **Advanced Protection**.
18-
3. Under **General settings** > **Prefixes**, select **Edit**.
19-
4. Expand the **Add existing prefix** section and select **Add** next to the prefix you wish to add.<br/>
20-
Alternatively, enter a prefix and (optionally) a description in **Prefix** and **Description**, respectively, and select **Add**.
16+
1. In the Cloudflare dashboard, go to the **L3/4 DDoS protection** page.
17+
18+
<DashButton url="/?to=/:account/network-security/ddos" />
19+
2. Go to **Advanced Protection**.
20+
3. Under **General settings** > **Prefixes**, select **Edit**.
21+
4. Expand the **Add existing prefix** section and select **Add** next to the prefix you wish to add.<br/>
22+
Alternatively, enter a prefix and (optionally) a description in **Prefix** and **Description**, respectively, and select **Add**.
2123
</Steps>
2224

2325
:::note[Note]

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/create-filter.mdx

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ head:
88
content: Create a filter for Advanced TCP Protection
99
---
1010

11-
import { GlossaryTooltip, Render, Steps } from "~/components";
11+
import { GlossaryTooltip, Render, Steps, DashButton } from "~/components";
1212

1313
<Render file="atp-filter-definition" product="ddos-protection" />
1414

@@ -24,15 +24,16 @@ To create a [filter](/ddos-protection/advanced-ddos-systems/concepts/#filter) fo
2424

2525
{/* prettier-ignore */}
2626
<Steps>
27-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and
28-
select your account.
29-
2. Go to **L3/4 DDoS** > **Advanced Protection** > **Advanced TCP Protection**.
30-
3. Under the system component for which you are creating the filter (**SYN Flood Protection** or **Out-of-state TCP Protection**), select **Create** next to the type of filter you want to create:
31-
- **Mitigation Filter**: The protection system will drop <GlossaryTooltip term="data packet">packets</GlossaryTooltip> matching the filter expression. - **Monitoring Filter**: The protection system will log
32-
packets matching the filter expression.
33-
- **Off Filter**: The protection system will ignore packets matching the filter expression.
34-
4. Under **When incoming packets match**, define a filter expression using the Expression Builder (specifying one or more values for **Field**, **Operator**, and **Value**), or manually enter an expression using the Expression Editor. For more information, refer to [Edit rule expressions](/ruleset-engine/rules-language/expressions/edit-expressions/).
35-
5. Select **Save**.
27+
1. In the Cloudflare dashboard, go to the **L3/4 DDoS protection** page.
28+
29+
<DashButton url="/?to=/:account/network-security/ddos" />
30+
2. Go to **Advanced Protection** > **Advanced TCP Protection**.
31+
3. Under the system component for which you are creating the filter (**SYN Flood Protection** or **Out-of-state TCP Protection**), select **Create** next to the type of filter you want to create:
32+
- **Mitigation Filter**: The protection system will drop <GlossaryTooltip term="data packet">packets</GlossaryTooltip> matching the filter expression. - **Monitoring Filter**: The protection system will log
33+
packets matching the filter expression.
34+
- **Off Filter**: The protection system will ignore packets matching the filter expression.
35+
4. Under **When incoming packets match**, define a filter expression using the Expression Builder (specifying one or more values for **Field**, **Operator**, and **Value**), or manually enter an expression using the Expression Editor. For more information, refer to [Edit rule expressions](/ruleset-engine/rules-language/expressions/edit-expressions/).
36+
5. Select **Save**.
3637
</Steps>
3738

3839
<Render file="atp-filters-rules-precedence" product="ddos-protection" />

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/create-rule.mdx

Lines changed: 17 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,16 +8,18 @@ head:
88
content: Create an Advanced DDoS Protection rule
99
---
1010

11-
import { Render, Steps } from "~/components";
11+
import { Render, Steps, DashButton } from "~/components";
1212

1313
## Create an Advanced TCP Protection rule
1414

1515
To create a [SYN flood rule](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/#syn-flood-protection) or an [out-of-state TCP](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/#out-of-state-tcp-protection) rule:
1616

1717
{/* prettier-ignore */}
1818
<Steps>
19-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
20-
2. Go to **L3/4 DDoS** > **Advanced Protection** > **Advanced TCP Protection**.
19+
1. In the Cloudflare dashboard, go to the **L3/4 DDoS protection** page.
20+
21+
<DashButton url="/?to=/:account/network-security/ddos" />
22+
2. Go to **Advanced Protection** > **Advanced TCP Protection**.
2123
3. Depending on the rule you are creating, do one of the following:
2224
- Under **SYN Flood Protection**, select **Create SYN flood rule**.
2325
- Under **Out-of-state TCP Protection**, select **Create out-of-state TCP rule**.
@@ -33,12 +35,17 @@ To create a [SYN flood rule](/ddos-protection/advanced-ddos-systems/overview/adv
3335

3436
{/* prettier-ignore */}
3537
<Steps>
36-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account.
37-
2. Go to **L3/4 DDoS** > **Advanced Protection** > **General settings**.
38-
3. Add the prefixes you wish to onboard. Advanced DNS Protection will only be applied to the prefixes you onboard. If you already onboarded the desired prefixes when you configured Advanced TCP Protection, you do not need to take any other action.
39-
:::note
40-
Currently, the list of onboarded prefixes is shared with Advanced TCP Protection. Any onboarded prefixes will be subject to both Advanced TCP Protection and Advanced DNS Protection, assuming that your account team has done the initial configuration of both systems. However, you can leave Advanced TCP Protection in monitoring mode.
41-
:::
42-
4. Go to **Advanced DNS Protection**. 5. Select **Create Advanced DNS Protection rule**. 6. In **Mode**, select a mode for the rule. 7. Under **Set scope**, select a [scope](/ddos-protection/advanced-ddos-systems/concepts/#scope) to determine the range of packets that will be affected by the rule. 8. Under **Sensitivity**, define the [burst sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#burst-sensitivity), [rate sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#rate-sensitivity), and [profile sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#profile-sensitivity) to determine when to initiate mitigation. 9. Select **Deploy**.
38+
1. In the Cloudflare dashboard, go to the **L3/4 DDoS protection** page.
4339

40+
<DashButton url="/?to=/:account/network-security/ddos" />
41+
2. Go to **Advanced Protection** > **General settings**.
42+
3. Add the prefixes you wish to onboard. Advanced DNS Protection will only be applied to the prefixes you onboard. If you already onboarded the desired prefixes when you configured Advanced TCP Protection, you do not need to take any other action.
43+
:::note
44+
Currently, the list of onboarded prefixes is shared with Advanced TCP Protection. Any onboarded prefixes will be subject to both Advanced TCP Protection and Advanced DNS Protection, assuming that your account team has done the initial configuration of both systems. However, you can leave Advanced TCP Protection in monitoring mode.
45+
:::
46+
4. Go to **Advanced DNS Protection**.
47+
5. Select **Create Advanced DNS Protection rule**.
48+
6. In **Mode**, select a mode for the rule.
49+
7. Under **Set scope**, select a [scope](/ddos-protection/advanced-ddos-systems/concepts/#scope) to determine the range of packets that will be affected by the rule.
50+
8. Under **Sensitivity**, define the [burst sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#burst-sensitivity), [rate sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#rate-sensitivity), and [profile sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#profile-sensitivity) to determine when to initiate mitigation. 9. Select **Deploy**.
4451
</Steps>

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/exclude-prefix.mdx

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,16 +6,18 @@ sidebar:
66

77
---
88

9-
import { Steps } from "~/components"
9+
import { Steps, DashButton } from "~/components"
1010

1111
To exclude a prefix or a prefix subset from Advanced DDoS Protection:
1212

1313
<Steps>
14-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
15-
2. Go to **L3/4 DDoS** > **Advanced Protection**.
16-
3. [Add the prefix](/ddos-protection/advanced-ddos-systems/how-to/add-prefix/) you previously onboarded to Magic Transit to Advanced TCP Protection.
17-
4. [Add the prefix](/ddos-protection/advanced-ddos-systems/how-to/add-prefix/) (or subset) you wish to exclude as a new, separate prefix in Advanced TCP Protection.
18-
5. For the prefix you added in the previous step, select **Exclude Subset** in the **Enrolled Prefixes** list.
14+
1. In the Cloudflare dashboard, go to the **L3/4 DDoS protection** page.
15+
16+
<DashButton url="/?to=/:account/network-security/ddos" />
17+
2. Go to **Advanced Protection**.
18+
3. [Add the prefix](/ddos-protection/advanced-ddos-systems/how-to/add-prefix/) you previously onboarded to Magic Transit to Advanced TCP Protection.
19+
4. [Add the prefix](/ddos-protection/advanced-ddos-systems/how-to/add-prefix/) (or subset) you wish to exclude as a new, separate prefix in Advanced TCP Protection.
20+
5. For the prefix you added in the previous step, select **Exclude Subset** in the **Enrolled Prefixes** list.
1921
</Steps>
2022

2123
:::note

src/content/docs/ddos-protection/advanced-ddos-systems/overview/index.mdx

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ head:
99
content: Advanced DDoS Protection systems
1010
---
1111

12-
import { GlossaryTooltip, Render, Steps } from "~/components";
12+
import { GlossaryTooltip, Render, Steps, DashButton } from "~/components";
1313

1414
The Advanced DDoS Protection system includes [Advanced TCP Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/) and [Advanced DNS Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/). Both systems are configured using the general settings, but also comprise of their own dedicated settings.
1515

@@ -115,8 +115,9 @@ Optionally, you can create [filters](/ddos-protection/advanced-ddos-systems/conc
115115
Enable the Advanced DDoS system and begin routing traffic through it.
116116

117117
<Steps>
118-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and
119-
select your account.
120-
2. Go to **L3/4 DDoS** > **Advanced Protection** > **General settings**.
118+
1. In the Cloudflare dashboard, go to the **L3/4 DDoS protection** page.
119+
120+
<DashButton url="/?to=/:account/network-security/ddos" />
121+
2. Go to **Advanced Protection** > **General settings**.
121122
3. Under **General settings**, toggle the feature status **On**.
122123
</Steps>

src/content/docs/ddos-protection/botnet-threat-feed.mdx

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ learning_center:
1111
link: https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/
1212

1313
---
14-
import { Steps, APIRequest } from "~/components"
14+
import { Steps, APIRequest, DashButton } from "~/components"
1515

1616
The Cloudflare DDoS Botnet Threat Feed is a threat intelligence feed for service providers (SPs) such as hosting providers and Internet service providers (ISPs) that provides information about their own IP addresses that have participated in HTTP DDoS attacks as observed from Cloudflare's global network. The feed aims to help service providers stop the abuse and reduce DDoS attacks originating from within their networks.
1717

@@ -46,11 +46,12 @@ Make sure that:
4646
### 1. Authenticate your ASN via PeeringDB
4747

4848
<Steps>
49-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
50-
2. Go to **Manage Account** > **Configurations**.
51-
3. Select **DDoS Threat Feed ASNs**.
52-
4. On the list of ASNs configured for your threat feed, select **Add ASN**.
53-
5. You will be redirected to the PeeringDB authentication page, where you can log in and consent to share the affiliation data with us. You will be redirected back to the configuration page once it is successful.
49+
1. In the Cloudflare dashboard, go to your account settings page.
50+
51+
<DashButton url="/?to=/:account/configurations" />
52+
2. Select **DDoS Threat Feed ASNs**.
53+
3. On the list of ASNs configured for your threat feed, select **Add ASN**.
54+
4. You will be redirected to the PeeringDB authentication page, where you can log in and consent to share the affiliation data with us. You will be redirected back to the configuration page once it is successful.
5455
</Steps>
5556

5657
:::note

src/content/docs/ddos-protection/get-started.mdx

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,9 +51,8 @@ The _Log_ action is only available to Enterprise customers.
5151
:::
5252

5353
<Steps>
54-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account.
55-
2. [Configure all the rules in the HTTP DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/http/http-overrides/configure-dashboard/#create-a-ddos-override), setting their action to _Log_.
56-
3. [Configure all the rules in the Network-layer DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/network/network-overrides/configure-dashboard/#create-a-ddos-override), setting the action to _Log_.
54+
1. [Configure all the rules in the HTTP DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/http/http-overrides/configure-dashboard/#access), setting their action to _Log_.
55+
2. [Configure all the rules in the Network-layer DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/network/network-overrides/configure-dashboard/#create-a-ddos-override), setting the action to _Log_.
5756
</Steps>
5857

5958
Alternatively, if you are using the API, define an override at the ruleset level to set the action of all managed ruleset rules to `log` by following these instructions:

src/content/docs/ddos-protection/managed-rulesets/adaptive-protection.mdx

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar:
77

88
---
99

10-
import { Tabs, TabItem, Steps } from "~/components"
10+
import { Tabs, TabItem, Steps, DashButton } from "~/components"
1111

1212
Adaptive DDoS Protection learns your unique traffic patterns and adapts to them to provide better protection against sophisticated DDoS attacks on layer 7 and layers 3/4, depending on your subscribed Cloudflare services.
1313

@@ -71,9 +71,10 @@ To view traffic flagged by L3/4 Adaptive DDoS Protection rules:
7171
<Tabs syncKey="dashNewNav">
7272
<TabItem label="Old dashboard">
7373
<Steps>
74-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
75-
2. Go to Account Home > **Analytics & Logs** > **Network Analytics**.
76-
3. Filter by rule ID.
74+
1. In the Cloudflare dashboard, go to the Network analytics page.
75+
76+
<DashButton url="/?to=/:account/network-analytics" />
77+
2. Filter by rule ID.
7778
</Steps>
7879
</TabItem>
7980
<TabItem label="New dashboard" icon="rocket">

0 commit comments

Comments
 (0)