Skip to content

Commit 9943a86

Browse files
redirects + fix false positive use case
1 parent 98c8f28 commit 9943a86

File tree

2 files changed

+51
-50
lines changed

2 files changed

+51
-50
lines changed

public/__redirects

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -417,7 +417,14 @@
417417
/ddos-protection/tcp-protection/rule-settings/ /ddos-protection/advanced-ddos-systems/rule-settings/ 301
418418
/ddos-protection/dns-protection/ /ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/ 301
419419
/ddos-protection/tcp-protection/api/ /ddos-protection/advanced-ddos-systems/api/ 301
420-
420+
/ddos-protection/managed-rulesets/http/configure-api/ /ddos-protection/managed-rulesets/http/http-overrides/configure-api/ 301
421+
/ddos-protection/managed-rulesets/http/configure-dashboard/ /ddos-protection/managed-rulesets/http/http-overrides/configure-dashboard/ 301
422+
/ddos-protection/managed-rulesets/http/link-configure-terraform/ /ddos-protection/managed-rulesets/http/http-overrides/link-configure-terraform/ 301
423+
/ddos-protection/managed-rulesets/http/override-expressions/ /ddos-protection/managed-rulesets/http/http-overrides/override-expressions/ 301
424+
/ddos-protection/managed-rulesets/network/configure-api/ /ddos-protection/managed-rulesets/network/network-overrides/configure-api/ 301
425+
/ddos-protection/managed-rulesets/network/configure-dashboard/ /ddos-protection/managed-rulesets/network/network-overrides/configure-dashboard/ 301
426+
/ddos-protection/managed-rulesets/network/link-configure-terraform/ /ddos-protection/managed-rulesets/network/network-overrides/link-configure-terraform/ 301
427+
/ddos-protection/managed-rulesets/network/override-expressions/ /ddos-protection/managed-rulesets/network/network-overrides/override-expressions/ 301
421428
# dns
422429
/dns/additional-options/cname-flattening/ /dns/cname-flattening/ 301
423430
/dns/additional-options/dnssec/ /dns/dnssec/ 301

src/content/docs/ddos-protection/managed-rulesets/http/http-overrides/override-examples.mdx

Lines changed: 43 additions & 49 deletions
Original file line numberDiff line numberDiff line change
@@ -26,11 +26,50 @@ If you have access to filter expressions, you can create an override to target t
2626

2727
If you recognize that the traffic flagged by an adaptive rule may be considered an attack, you can create an override rule to enable the adaptive rule in mitigation mode to `challenge` (if it is browser traffic) or `block` (for other suspicious traffic).
2828

29-
### An end user is experiencing a false positive
29+
### Legitimate traffic is incorrectly identified as an attack and causes a false positive
30+
31+
A false positive is an incorrect identification. In the case of DDoS protection, there is a false positive when legitimate traffic is mistakenly classified as attack traffic. This can occur when legacy applications, Internet services, or faulty client applications generate legitimate traffic that appears suspicious, has odd traffic patterns, deviates from best practices, or violates protocols.
32+
33+
In these cases, Cloudflare’s DDoS Protection systems may flag that traffic as malicious and apply mitigation actions. If the traffic is in fact legitimate and not part of an attack, the mitigation actions can cause service disruptions and outages to your Internet properties.
34+
35+
To remedy a false positive:
36+
37+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
38+
2. Go to the analytics dashboard and apply filters to the displayed data.
39+
<Details header="For WAF/CDN customers">
40+
3. Select the zone that is experiencing DDoS attack false positives.
41+
4. Go to **Security** > **Events**.
42+
5. Select **Add filter** and filter by `Service equals HTTP DDoS`.
43+
</Details>
44+
<Details header="For Magic Transit and Spectrum customers">
45+
6. Go to Account Home > **Analytics & Logs** > **Network Analytics**.
46+
7. Identify the legitimate traffic that is causing the false positives. Use the Attack ID number included in the DDoS alert (if you received one), or apply dashboard filters such as destination IP address and port.
47+
</Details>
48+
8. Scroll down to **Top events by source** > **HTTP DDoS rules**.
49+
9. Copy the rule name.
50+
10. Go to your zone > **Security** > **DDoS** and select **Deploy a DDoS override**. If you cannot deploy any additional overrides, edit an existing override to adjust rule configuration.
51+
11. Select **Browse rules** and paste the rule name in the search field.
52+
12. Decrease the rule’s **Sensitivity Level** to _Essentially Off_ or change the rule action to _Log_ (if supported by your current plan and subscriptions).
53+
13. Select **Next** and then select **Save**.
54+
55+
Once saved, the rule takes effect within one or two minutes. The rule adjustment should provide immediate remedy, which you can view in the [analytics dashboard](/ddos-protection/reference/analytics/).
56+
57+
#### Update the adjusted rules later
58+
59+
Later, you can change the [sensitivity level](/ddos-protection/managed-rulesets/network/override-parameters/#sensitivity-level) of the rule causing the false positives to avoid future issues, and change the rule action back to its default value.
60+
61+
:::note[Recommendation: Enable DDoS alerts]
3062

31-
If you observe that one of your end users is experiencing a false positive, you can create an override for the rule that caused the false positive and use the filter expressions to apply it only to the hostname.
63+
Cloudflare recommends that you create notifications for [DDoS alerts](/ddos-protection/reference/alerts/) to get real-time notifications on detected and mitigated attacks automatically performed by Cloudflare’s systems. When you receive these notifications, you can review if it is in fact a real DDoS attack, or if it is a false positive, and then take action to remedy it.
64+
:::
65+
66+
#### Avoid false positives while retaining protection and visibility
3267

33-
[INSERT false-positive.mdx PAGE CONTENT HERE]
68+
To see what DDoS Managed Rules do in a high sensitivity level while remaining protected by blocking attacks at a low sensitivity level, Advanced DDoS protection customers can [create a first override](/ddos-protection/managed-rulesets/network/network-overrides/configure-dashboard/#create-a-ddos-override) that blocks attacks at a low sensitivity and a second override to log at a high sensitivity.
69+
70+
The overrides must be set in that order. Otherwise, it will not work. This is because overrides are evaluated in order and will stop at the first override that matches both expression and sensitivity. Setting the overrides in the wrong order would cause the `Log` override at a high sensitivity to match all instances. As a result, Cloudflare will never evaluate the `Block` override that would be placed behind it, causing all rules to be set in `Log` mode.
71+
72+
If an override without an expression matches, Cloudflare will not evaluate the expressions that follow it.
3473

3574
### An attack is incorrectly identified as legitimate traffic and causes a false negative
3675

@@ -80,49 +119,4 @@ If you cannot stop an attack from overloading your origin web server using the a
80119
- Domain/path being targeted (zone name/ID)
81120
- Attack frequency
82121
- Steps to reproduce the issue, with actual results versus expected results
83-
- Any relevant additional information such as site URLs, error messages, screenshots, or relevant logs from your origin web server
84-
85-
### Legitimate traffic is incorrectly identified as an attack and causes a false positive
86-
87-
A false positive is an incorrect identification. In the case of DDoS protection, there is a false positive when legitimate traffic is mistakenly classified as attack traffic. This can occur when legacy applications, Internet services, or faulty client applications generate legitimate traffic that appears suspicious, has odd traffic patterns, deviates from best practices, or violates protocols.
88-
89-
In these cases, Cloudflare’s DDoS Protection systems may flag that traffic as malicious and apply mitigation actions. If the traffic is in fact legitimate and not part of an attack, the mitigation actions can cause service disruptions and outages to your Internet properties.
90-
91-
To remedy a false positive:
92-
93-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
94-
2. Go to the analytics dashboard and apply filters to the displayed data.
95-
<Details header="For WAF/CDN customers">
96-
3. Select the zone that is experiencing DDoS attack false positives.
97-
4. Go to **Security** > **Events**.
98-
5. Select **Add filter** and filter by `Service equals HTTP DDoS`.
99-
</Details>
100-
<Details header="For Magic Transit and Spectrum customers">
101-
6. Go to Account Home > **Analytics & Logs** > **Network Analytics**.
102-
7. Identify the legitimate traffic that is causing the false positives. Use the Attack ID number included in the DDoS alert (if you received one), or apply dashboard filters such as destination IP address and port.
103-
</Details>
104-
8. Scroll down to **Top events by source** > **HTTP DDoS rules**.
105-
9. Copy the rule name.
106-
10. Go to your zone > **Security** > **DDoS** and select **Deploy a DDoS override**. If you cannot deploy any additional overrides, edit an existing override to adjust rule configuration.
107-
11. Select **Browse rules** and paste the rule name in the search field.
108-
12. Decrease the rule’s **Sensitivity Level** to _Essentially Off_ or change the rule action to _Log_ (if supported by your current plan and subscriptions).
109-
13. Select **Next** and then select **Save**.
110-
111-
Once saved, the rule takes effect within one or two minutes. The rule adjustment should provide immediate remedy, which you can view in the [analytics dashboard](/ddos-protection/reference/analytics/).
112-
113-
#### Update the adjusted rules later
114-
115-
Later, you can change the [sensitivity level](/ddos-protection/managed-rulesets/network/override-parameters/#sensitivity-level) of the rule causing the false positives to avoid future issues, and change the rule action back to its default value.
116-
117-
:::note[Recommendation: Enable DDoS alerts]
118-
119-
Cloudflare recommends that you create notifications for [DDoS alerts](/ddos-protection/reference/alerts/) to get real-time notifications on detected and mitigated attacks automatically performed by Cloudflare’s systems. When you receive these notifications, you can review if it is in fact a real DDoS attack, or if it is a false positive, and then take action to remedy it.
120-
:::
121-
122-
#### Avoid false positives while retaining protection and visibility
123-
124-
To see what DDoS Managed Rules do in a high sensitivity level while remaining protected by blocking attacks at a low sensitivity level, Advanced DDoS protection customers can [create a first override](/ddos-protection/managed-rulesets/network/network-overrides/configure-dashboard/#create-a-ddos-override) that blocks attacks at a low sensitivity and a second override to log at a high sensitivity.
125-
126-
The overrides must be set in that order. Otherwise, it will not work. This is because overrides are evaluated in order and will stop at the first override that matches both expression and sensitivity. Setting the overrides in the wrong order would cause the `Log` override at a high sensitivity to match all instances. As a result, Cloudflare will never evaluate the `Block` override that would be placed behind it, causing all rules to be set in `Log` mode.
127-
128-
If an override without an expression matches, Cloudflare will not evaluate the expressions that follow it.
122+
- Any relevant additional information such as site URLs, error messages, screenshots, or relevant logs from your origin web server

0 commit comments

Comments
 (0)