Skip to content

Commit 7ccb535

Browse files
vil02jonesphillip
authored andcommitted
[DDoS Protection] Remove trailing spaces (#19942)
1 parent 8a8b46e commit 7ccb535

File tree

19 files changed

+34
-34
lines changed

19 files changed

+34
-34
lines changed

src/content/docs/ddos-protection/about/attack-coverage.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ As a general guideline, various Cloudflare products operate on different open sy
2020

2121
:::note
2222

23-
For Magic Transit customers, Cloudflare provides some L7 protection with a L3 service (like the Advanced DNS Protection system that is available for Magic Transit customers. DNS is considered a L7 protocol).
23+
For Magic Transit customers, Cloudflare provides some L7 protection with a L3 service (like the Advanced DNS Protection system that is available for Magic Transit customers. DNS is considered a L7 protocol).
2424
:::
2525

2626
The following table includes a sample of covered attack vectors:

src/content/docs/ddos-protection/about/how-ddos-protection-works.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Once attack traffic matches a rule, Cloudflare's systems will track that traffic
3131
| Interactive Challenge | The client that made the request must pass an interactive Challenge. |
3232
| Managed Challenge | Depending on the characteristics of a request, Cloudflare will choose an appropriate type of challenge. |
3333
| Log | Records matching requests in the Cloudflare Logs. |
34-
| Use rule defaults | Uses the default action that is pre-defined for each rule. |
34+
| Use rule defaults | Uses the default action that is pre-defined for each rule. |
3535

3636
## Thresholds
3737

src/content/docs/ddos-protection/advanced-ddos-systems/api/tcp-protection/json-objects.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ The `expression` field is a [Rules language expression](/ruleset-engine/rules-la
7878

7979
:::note
8080

81-
Expressions of SYN flood protection and out-of-state TCP protection filters do not currently support functions.
81+
Expressions of SYN flood protection and out-of-state TCP protection filters do not currently support functions.
8282
:::
8383

8484
The `mode` value must be one of `enabled`, `disabled`, or `monitoring`.

src/content/docs/ddos-protection/advanced-ddos-systems/concepts.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ The default rate sensitivity and recommended setting is _Low_. You should only i
100100

101101
## Filter
102102

103-
<Render file="atp-filter-definition" />
103+
<Render file="atp-filter-definition" />
104104

105105
The filter expression can reference source and destination IP addresses and ports. Each system component (SYN flood protection and out-of-state TCP protection) should have one or more [rules](#rule), but filters are optional.
106106

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/create-rule.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -31,16 +31,16 @@ To create a [SYN flood rule](/ddos-protection/advanced-ddos-systems/overview/adv
3131

3232
## Create an Advanced DNS Protection rule
3333

34-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account.
34+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account.
3535
2. Go to **L3/4 DDoS** > **Advanced Protection** > **General settings**.
3636
3. Add the prefixes you wish to onboard. Advanced DNS Protection will only be applied to the prefixes you onboard. If you already onboarded the desired prefixes when you configured Advanced TCP Protection, you do not need to take any other action.
3737
:::note
3838

3939
Currently, the list of onboarded prefixes is shared with Advanced TCP Protection. Any onboarded prefixes will be subject to both Advanced TCP Protection and Advanced DNS Protection, assuming that your account team has done the initial configuration of both systems. However, you can leave Advanced TCP Protection in monitoring mode.
4040
:::
41-
4. Go to **Advanced DNS Protection**.
42-
5. Select **Create Advanced DNS Protection rule**.
41+
4. Go to **Advanced DNS Protection**.
42+
5. Select **Create Advanced DNS Protection rule**.
4343
6. In **Mode**, select a mode for the rule.
44-
7. Under **Set scope**, select a [scope](/ddos-protection/advanced-ddos-systems/concepts/#scope) to determine the range of packets that will be affected by the rule.
45-
8. Under **Sensitivity**, define the [burst sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#burst-sensitivity), [rate sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#rate-sensitivity), and [profile sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#profile-sensitivity) to determine when to initiate mitigation.
44+
7. Under **Set scope**, select a [scope](/ddos-protection/advanced-ddos-systems/concepts/#scope) to determine the range of packets that will be affected by the rule.
45+
8. Under **Sensitivity**, define the [burst sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#burst-sensitivity), [rate sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#rate-sensitivity), and [profile sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#profile-sensitivity) to determine when to initiate mitigation.
4646
9. Select **Deploy**.

src/content/docs/ddos-protection/advanced-ddos-systems/overview/index.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,11 +26,11 @@ General settings enable and control the use of the Advanced TCP Protection and t
2626

2727
Thresholds are based on your network's unique traffic and are configured by Cloudflare. The sensitivity levels manipulate the thresholds.
2828

29-
When you get access to Advanced DDoS Protection systems, you are automatically provisioned with default settings in monitoring mode.
29+
When you get access to Advanced DDoS Protection systems, you are automatically provisioned with default settings in monitoring mode.
3030

3131
Thresholds are based on your network's individual behavior, derived from your traffic profile as monitored by Cloudflare. Defining the thresholds will effectively determine what the _High_, _Medium_, and _Low_ [sensitivities](/ddos-protection/advanced-ddos-systems/concepts/#burst-sensitivity) will be for your specific case.
3232

33-
If needed, you can change the sensitivity levels that will manipulate the thresholds for Advanced TCP Protection and Advanced DNS Protection from the default settings.
33+
If needed, you can change the sensitivity levels that will manipulate the thresholds for Advanced TCP Protection and Advanced DNS Protection from the default settings.
3434

3535
Once thresholds are configured, the Advanced DDoS Protection systems have been initialized and enabled in monitoring mode.
3636

@@ -44,7 +44,7 @@ You cannot add unapproved prefixes to Advanced DDoS Protection systems. Contact
4444

4545
### Rules
4646

47-
[Create a rule](/ddos-protection/advanced-ddos-systems/how-to/create-rule/) for Advanced TCP and Advanced DNS Protection (as needed) to enable mitigation.
47+
[Create a rule](/ddos-protection/advanced-ddos-systems/how-to/create-rule/) for Advanced TCP and Advanced DNS Protection (as needed) to enable mitigation.
4848

4949
You can create a rule for SYN Flood Protection and another rule for Out-of-state TCP Protection, both with global scope and in monitoring mode. These rules will apply to all received <GlossaryTooltip term="data packet">packets</GlossaryTooltip>.
5050

src/content/docs/ddos-protection/best-practices/respond-to-ddos-attacks.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ All customers should perform the following steps to better secure their applicat
1818
3. Make sure your origin is not exposed to the public Internet, meaning that access is only possible from [Cloudflare IP addresses](/fundamentals/concepts/cloudflare-ip-addresses/). As an extra security precaution, we recommend contacting your hosting provider and requesting new origin server IPs if they have been targeted directly in the past.
1919
4. If you have [Managed IP Lists](/waf/tools/lists/managed-lists/#managed-ip-lists) or [Bot Management](/bots/plans/bm-subscription/), consider using these in WAF custom rules.
2020
5. Enable [caching](/cache/) as much as possible to reduce the strain on your origin servers, and when using [Workers](/workers/), avoid overwhelming your origin server with more subrequests than necessary.
21-
21+
2222
To help counter attack randomization, Cloudflare recommends to update your cache settings to exclude the query string as a cache key. When the query string is excluded as a cache key, Cloudflare's cache will take in unmitigated attack requests instead of forwarding them to the origin. The cache can be a useful mechanism as part of a multilayered security posture.
2323

2424
## Enterprise customers

src/content/docs/ddos-protection/botnet-threat-feed.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,11 +11,11 @@ head:
1111

1212
The Cloudflare DDoS Botnet Threat Feed is a threat intelligence feed for service providers (SPs) such as hosting providers and Internet service providers (ISPs) that provides information about their own IP addresses that have participated in HTTP DDoS attacks as observed from Cloudflare's global network. The feed aims to help service providers stop the abuse and reduce DDoS attacks originating from within their networks.
1313

14-
Each offense is a mitigated HTTP request from the specific IP address. For example, if an IP has 3,000 offenses, it means that Cloudflare has mitigated 3,000 HTTP requests from that IP.
14+
Each offense is a mitigated HTTP request from the specific IP address. For example, if an IP has 3,000 offenses, it means that Cloudflare has mitigated 3,000 HTTP requests from that IP.
1515

1616
A service provider can only get information about IP addresses associated with their autonomous system numbers (ASNs). The affiliation of a service provider with their ASNs will be checked against [PeeringDB](https://www.peeringdb.com/), a reliable and globally recognized interconnection database.
1717

18-
To ensure the feed's accuracy, Cloudflare will only include IP addresses that have participated in multiple HTTP DDoS attacks and have triggered high-confidence rules.
18+
To ensure the feed's accuracy, Cloudflare will only include IP addresses that have participated in multiple HTTP DDoS attacks and have triggered high-confidence rules.
1919

2020
## Context
2121

src/content/docs/ddos-protection/change-log/network/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ This section contains past and upcoming changes to the [Network-layer DDoS Attac
1818

1919
:::note
2020

21-
The Network-layer DDoS Attack Protection managed ruleset protects Cloudflare customers on all plans. However, only [Magic transit](/magic-transit/) and [Spectrum](/spectrum/) customers on an Enterprise plan can customize the managed ruleset.
21+
The Network-layer DDoS Attack Protection managed ruleset protects Cloudflare customers on all plans. However, only [Magic transit](/magic-transit/) and [Spectrum](/spectrum/) customers on an Enterprise plan can customize the managed ruleset.
2222
:::
2323

2424
<LinkButton variant="primary" href="/ddos-protection/change-log/network/scheduled-changes/">View scheduled changes</LinkButton>

src/content/docs/ddos-protection/get-started.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ You must have one of the following:
4343

4444
:::note
4545

46-
The _Log_ action is only available to Enterprise customers.
46+
The _Log_ action is only available to Enterprise customers.
4747
:::
4848

4949
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account.

0 commit comments

Comments
 (0)