Skip to content

Commit 91166c3

Browse files
[DDoS Protection] Flagged traffic clarification (#20145)
1 parent 5745a48 commit 91166c3

File tree

1 file changed

+15
-5
lines changed

1 file changed

+15
-5
lines changed

src/content/docs/ddos-protection/managed-rulesets/adaptive-protection.mdx

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,6 @@ Adaptive DDoS Protection provides the following types of protection:
2020

2121
Cloudflare Adaptive DDoS Protection is available to Enterprise customers according to the following table:
2222

23-
24-
2523
| Feature | Profiling dimension | WAF/CDN<sup>1</sup> | Magic Transit /<br/>Spectrum BYOIP<sup>2</sup> |
2624
| --------------------------------- | ------------------------------------------ | :-----------------: | :--------------------------------------------: |
2725
| **HTTP Adaptive DDoS Protection** | | | |
@@ -32,8 +30,6 @@ Cloudflare Adaptive DDoS Protection is available to Enterprise customers accordi
3230
| For Protocols | IP protocol || Yes |
3331
| For Protocols | Client IP country and Region for UDP || Yes |
3432

35-
36-
3733
<sup>1</sup> _WAF/CDN customers on the Enterprise plan with the Advanced DDoS Protection subscription._<br/>
3834
<sup>2</sup> _Magic Transit and Spectrum BYOIP customers on an Enterprise plan._
3935

@@ -70,10 +66,24 @@ To view traffic flagged by L3/4 Adaptive DDoS Protection rules:
7066

7167
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
7268
2. Go to Account Home > **Analytics & Logs** > **Network Analytics**.
73-
3. Filter by `Ruleset ID equals 3b64149bfa6e4220bbbc2bd6db589552` (the ID of the Network-layer DDoS Attack Protection managed ruleset) and by rule ID.
69+
3. Filter by rule ID.
7470

7571
You may also obtain information about flagged traffic through [Logpush](/logs/about/) or the [GraphQL API](/analytics/graphql-api/).
7672

73+
To determine if an adaptive rule fits your traffic in a way that will only mitigate attack traffic and will not cause false positives, review the traffic that is _Logged_ by the adaptive rules.
74+
75+
:::note
76+
You may not see any traffic matching the adaptive rules. This can be because there was no deviation from your traffic profile, so you may want to increase the time range and look for any _Logged_ traffic. Another reason why you may not see _Logged_ traffic by the adaptive rules is that there was not sufficient traffic volume to generate a traffic profile for your zone.
77+
:::
78+
79+
If you do see traffic that was _Logged_ by the adaptive rules, use the dashboard to determine if the traffic matches the characteristics of legitimate users or that of attack traffic. As each Internet property is unique, understanding if the traffic is legitimate requires your understanding of how your legitimate traffic looks. For example, the user agent, source country, headers, query string for HTTP requests, and protocols and ports for L3/4 traffic.
80+
81+
- In cases where you are certain that the rule is only flagging attack traffic, you should consider creating an override and enabling that rule with a [Managed Challenge](/waf/reference/cloudflare-challenges/#managed-challenge-recommended) or `Block` action.
82+
- In cases where you see legitimate traffic being flagged, you should lower the sensitivity level of the rule and observe the flagged traffic. You can continue reducing the sensitivity level until you reach a point where legitimate traffic is not flagged. Then, you should create an override to enable the rule with a mitigation action.
83+
- If the rule is still flagging legitimate traffic you can consider using the expression filters to condition the rules to exclude certain types of traffic.
84+
85+
The default rule action for `log` with a sensitivity set to `high` will only show packets or requests with suspected attack traffic over internal `high` thresholds in your logs. For instance, if you set the threshold to `medium` or `low`, then only packets over those thresholds will be logged.
86+
7787
## Configure the rules
7888

7989
You can adjust the action and sensitivity of the Adaptive DDoS Protection rules. The default action is _Log_. Use this action to first observe what traffic is flagged before deciding on a mitigation action.

0 commit comments

Comments
 (0)