You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
2. Go to **Advanced Protection** > **Advanced TCP Protection**.
24
23
3. Depending on the rule you are creating, do one of the following:
25
24
- Under **SYN Flood Protection**, select **Create SYN flood rule**.
@@ -42,7 +41,7 @@ To create a [SYN flood rule](/ddos-protection/advanced-ddos-systems/overview/adv
42
41
2. Go to **Advanced Protection** > **General settings**.
43
42
3. Add the prefixes you wish to onboard. Advanced DNS Protection will only be applied to the prefixes you onboard. If you already onboarded the desired prefixes when you configured Advanced TCP Protection, you do not need to take any other action.
44
43
:::note
45
-
Currently, the list of onboarded prefixes is shared with Advanced TCP Protection. Any onboarded prefixes will be subject to both Advanced TCP Protection and Advanced DNS Protection, assuming that your account team has done the initial configuration of both systems. However, you can leave Advanced TCP Protection in monitoring mode.
44
+
Currently, the list of onboarded prefixes is shared with Advanced TCP Protection. Any onboarded prefixes will be subject to both Advanced TCP Protection and Advanced DNS Protection, assuming that your account team has done the initial configuration of both systems. However, you can leave Advanced TCP Protection in monitoring mode.
46
45
:::
47
46
4. Go to **Advanced DNS Protection**.
48
47
5. Select **Create Advanced DNS Protection rule**.
1. Select the zone that is experiencing DDoS attack false positives.
44
-
2. Go to **Security** > **Events**.
45
-
3. Select **Add filter** and filter by `Service equals HTTP DDoS`.
44
+
1. Select the zone that is experiencing DDoS attack false positives.
45
+
2. Go to **Security** > **Events**.
46
+
3. Select **Add filter** and filter by `Service equals HTTP DDoS`.
46
47
</Details>
47
48
<Detailsheader="For Magic Transit and Spectrum customers">
48
-
1. Go to Account Home > **Analytics & Logs** > **Network Analytics**.
49
-
2. Identify the legitimate traffic that is causing the false positives. Use the Attack ID number included in the DDoS alert (if you received one), or apply dashboard filters such as destination IP address and port.
49
+
1. Go to Account Home > **Analytics & Logs** > **Network Analytics**.
50
+
2. Identify the legitimate traffic that is causing the false positives. Use the Attack ID number included in the DDoS alert (if you received one), or apply dashboard filters such as destination IP address and port.
50
51
</Details>
51
52
3. Scroll down to **Top events by source** > **HTTP DDoS rules**.
1. Select the zone that is experiencing DDoS attack false positives.
65
-
2. Go to **Security** > **Analytics** > **Events** tab.
66
-
3. Select **Add filter** and filter by `Service equals HTTP DDoS`.
66
+
1. Select the zone that is experiencing DDoS attack false positives.
67
+
2. Go to **Security** > **Analytics** > **Events** tab.
68
+
3. Select **Add filter** and filter by `Service equals HTTP DDoS`.
67
69
</Details>
68
70
<Detailsheader="For Magic Transit and Spectrum customers">
69
-
1. Go to Account Home > **Analytics & Logs** > **Network Analytics**.
70
-
1. Identify the legitimate traffic that is causing the false positives. Use the Attack ID number included in the DDoS alert (if you received one), or apply dashboard filters such as destination IP address and port.
71
+
1. Go to Account Home > **Analytics & Logs** > **Network Analytics**.
72
+
2. Identify the legitimate traffic that is causing the false positives. Use the Attack ID number included in the DDoS alert (if you received one), or apply dashboard filters such as destination IP address and port.
71
73
</Details>
72
74
3. Scroll down to **Top events by source** > **HTTP DDoS rules**.
73
75
4. Copy the rule name.
@@ -123,13 +125,13 @@ If you are experiencing a DDoS attack detected by Cloudflare and the applied mit
1. Select the zone that is experiencing an incomplete mitigation of a DDoS attack.
127
-
2. Go to **Security** > **Events**.
128
-
3. Select **Add filter** and filter by `Service equals HTTP DDoS`.
128
+
1. Select the zone that is experiencing an incomplete mitigation of a DDoS attack.
129
+
2. Go to **Security** > **Events**.
130
+
3. Select **Add filter** and filter by `Service equals HTTP DDoS`.
129
131
</Details>
130
132
<Detailsheader="For Magic Transit and Spectrum customers">
131
-
1. Go to Account Home > **Analytics & Logs** > **Network Analytics**.
132
-
2. Identify the DDoS attack that is having incomplete mitigations. Use the Attack ID number included in the DDoS alert (if you received one), or apply dashboard filters such as destination IP address and port.
133
+
1. Go to Account Home > **Analytics & Logs** > **Network Analytics**.
134
+
2. Identify the DDoS attack that is having incomplete mitigations. Use the Attack ID number included in the DDoS alert (if you received one), or apply dashboard filters such as destination IP address and port.
133
135
</Details>
134
136
3. Scroll down to **Top events by source** > **HTTP DDoS rules**.
135
137
4. Copy the rule name.
@@ -144,13 +146,13 @@ If you are experiencing a DDoS attack detected by Cloudflare and the applied mit
1. Select the zone that is experiencing an incomplete mitigation of a DDoS attack.
148
-
2. Go to **Security** > **Analytics** > **Events** tab.
149
-
3. Select **Add filter** and filter by `Service equals HTTP DDoS`.
149
+
1. Select the zone that is experiencing an incomplete mitigation of a DDoS attack.
150
+
2. Go to **Security** > **Analytics** > **Events** tab.
151
+
3. Select **Add filter** and filter by `Service equals HTTP DDoS`.
150
152
</Details>
151
153
<Detailsheader="For Magic Transit and Spectrum customers">
152
-
1. Go to Account Home > **Analytics & Logs** > **Network Analytics**.
153
-
2. Identify the DDoS attack that is having incomplete mitigations. Use the Attack ID number included in the DDoS alert (if you received one), or apply dashboard filters such as destination IP address and port.
154
+
1. Go to Account Home > **Analytics & Logs** > **Network Analytics**.
155
+
2. Identify the DDoS attack that is having incomplete mitigations. Use the Attack ID number included in the DDoS alert (if you received one), or apply dashboard filters such as destination IP address and port.
154
156
</Details>
155
157
3. Scroll down to **Top events by source** > **HTTP DDoS rules**.
0 commit comments