Skip to content

Commit 760a724

Browse files
auto provisioning
1 parent 3834ef5 commit 760a724

File tree

3 files changed

+13
-14
lines changed

3 files changed

+13
-14
lines changed

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/create-rule.mdx

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -31,17 +31,16 @@ To create a [SYN flood rule](/ddos-protection/advanced-ddos-systems/overview/adv
3131

3232
## Create an Advanced DNS Protection rule
3333

34-
1. Contact your account team to enable Advanced DNS Protection and make the initial configuration. The initial thresholds are based on your network’s individual behavior.
35-
2. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account.
36-
3. Go to **L3/4 DDoS** > **Advanced Protection** > **General settings**.
37-
4. Add the prefixes you wish to onboard. Advanced DNS Protection will only be applied to the prefixes you onboard. If you already onboarded the desired prefixes when you configured Advanced TCP Protection, you do not need to take any other action.
34+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account.
35+
2. Go to **L3/4 DDoS** > **Advanced Protection** > **General settings**.
36+
3. Add the prefixes you wish to onboard. Advanced DNS Protection will only be applied to the prefixes you onboard. If you already onboarded the desired prefixes when you configured Advanced TCP Protection, you do not need to take any other action.
3837
:::note
3938

4039
Currently, the list of onboarded prefixes is shared with Advanced TCP Protection. Any onboarded prefixes will be subject to both Advanced TCP Protection and Advanced DNS Protection, assuming that your account team has done the initial configuration of both systems. However, you can leave Advanced TCP Protection in monitoring mode.
4140
:::
42-
5. Go to **Advanced DNS Protection**.
43-
6. Select **Create Advanced DNS Protection rule**.
44-
7. In **Mode**, select a mode for the rule.
45-
8. Under **Set scope**, select a [scope](/ddos-protection/advanced-ddos-systems/concepts/#scope) to determine the range of packets that will be affected by the rule.
46-
9. Under **Sensitivity**, define the [burst sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#burst-sensitivity), [rate sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#rate-sensitivity), and [profile sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#profile-sensitivity) to determine when to initiate mitigation.
47-
10. Select **Deploy**.
41+
4. Go to **Advanced DNS Protection**.
42+
5. Select **Create Advanced DNS Protection rule**.
43+
6. In **Mode**, select a mode for the rule.
44+
7. Under **Set scope**, select a [scope](/ddos-protection/advanced-ddos-systems/concepts/#scope) to determine the range of packets that will be affected by the rule.
45+
8. Under **Sensitivity**, define the [burst sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#burst-sensitivity), [rate sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#rate-sensitivity), and [profile sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#profile-sensitivity) to determine when to initiate mitigation.
46+
9. Select **Deploy**.

src/content/docs/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Currently, to disable this data collection you must remove your prefixes either
5050
If you cannot find any data related to Advanced DNS Protection in the **DNS Protection** tab of Network Analytics, it could be because one of these reasons:
5151

5252
- You did not [add your prefixes](/ddos-protection/advanced-ddos-systems/how-to/add-prefix/) to Advanced L3/4 DDoS Protection.
53-
- Cloudflare did not enable the Advanced DNS Protection system yet.
53+
- You were not automatically provisioned and the Advanced DNS Protection system was not enabled yet. This does not apply to users who were automatically provisioned to the Advanced DDoS Protection system.
5454
- You do not have any DNS over UDP traffic.
5555

5656
---

src/content/docs/ddos-protection/advanced-ddos-systems/overview/index.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,13 +26,13 @@ General settings enable and control the use of the Advanced TCP Protection and t
2626

2727
Thresholds are based on your network's unique traffic and are configured by Cloudflare. The sensitivity levels manipulate the thresholds.
2828

29-
When you get access to Advanced DDoS Protection systems, there are no configured thresholds in your account.
29+
When you get access to Advanced DDoS Protection systems, you are automatically provisioned with default settings.
3030

3131
Thresholds are based on your network's individual behavior, derived from your traffic profile as monitored by Cloudflare. Defining the thresholds will effectively determine what the _High_, _Medium_, and _Low_ [sensitivities](/ddos-protection/advanced-ddos-systems/concepts/#burst-sensitivity) will be for your specific case.
3232

33-
Ask your Implementation Manager to configure initial threshold values. Separate thresholds need to be configured for Advanced TCP Protection and Advanced DNS Protection.
33+
If needed, you can change the thresholds for Advanced TCP Protection and Advanced DNS Protection from the default settings.
3434

35-
Once thresholds are configured, the Implementation Manager will let you know that Advanced DDoS Protection systems have been initialized and can be configured and enabled.
35+
Once thresholds are configured, the Advanced DDoS Protection systems have been initialized and enabled.
3636

3737
### Prefixes
3838

0 commit comments

Comments
 (0)