Skip to content

Commit ab2a1d0

Browse files
committed
Implementing feedback
1 parent 6fcde4a commit ab2a1d0

File tree

4 files changed

+33
-30
lines changed

4 files changed

+33
-30
lines changed

src/content/docs/learning-paths/surge-readiness/security/block-agents-lock-zones.mdx

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,3 @@ Actions:
1717
## Zone Lockdown
1818

1919
[Zone lockdown](/waf/tools/zone-lockdown/) rules allow you to define paths and only allow specific, trusted IPs to those paths. Any requests to those paths from non-whitelisted IPs will be automatically blocked with an 1106 HTTP code. This ability is particularly useful for locking down administrative or staging portions of your application.
20-
21-
# Defend content with Scrape Shield
22-
23-
Scrape Shield is a collection of settings meant to protect your site's content.

src/content/docs/learning-paths/surge-readiness/security/control-domain-access.mdx

Lines changed: 0 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -35,28 +35,3 @@ Actions:
3535
Challenge Passage timeout applies to IP reputation, IUAM mode and user IP Firewall (CAPTCHA or JS Challenge): [cf_clearance cookie](/fundamentals/reference/policies-compliances/cloudflare-cookies/#additional-cookies-used-by-the-challenge-platform) is set with `Max-age=Challenge Passage`.
3636
:::
3737

38-
## Enable "I'm Under Attack" mode (IAUM)
39-
40-
If you are under attack and have this feature enabled during the attack, visitors will receive an interstitial page for about five seconds while the traffic is analyzed to make sure it is a legitimate human visitor. The vast majority of Layer 7 attack scripts are defeated by IUAM and can be honed via Page Rules.
41-
42-
Refer to [I'm Under Attack Mode](https://developers.cloudflare.com/fundamentals/reference/under-attack-mode/) for more information.
43-
44-
45-
## Change Access Control List (ACL)
46-
47-
An ACL refers to rules that are applied to port numbers or IP addresses that are available on a host permitting use of the service. When you only allow Cloudflare IPs, you eliminate threats attempting to attack your origin IP range.
48-
49-
Refer to [Cloudflare IP Ranges](https://www.cloudflare.com/ips) for more information.
50-
51-
52-
## Change Origin IPs and update Cloudflare DNS records
53-
54-
If your origin is still being attacked, consider moving your Origin IPs and updating your Cloudflare DNS records.
55-
56-
Refer to [Prevent DDoS attacks](/learning-paths/prevent-ddos-attacks/concepts/) for detailed guidance.
57-
58-
:::note
59-
60-
To learn about best practices for DDoS protection, review [Respond to DDoS attacks](/ddos-protection/best-practices/respond-to-ddos-attacks/).
61-
62-
:::

src/content/docs/learning-paths/surge-readiness/security/control-incoming-requests.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar:
77

88
Use [Custom rules](/waf/custom-rules/) to allow you to control incoming traffic by filtering requests to a zone. They work as customized web application firewall (WAF) rules that you can use to perform actions like Block or Managed Challenge on incoming requests.
99

10-
UseWAF [Managed Rules](/waf/managed-rules/) to apply custom criteria for all incoming HTTP requests.
10+
Use WAF [Managed Rules](/waf/managed-rules/) to apply custom criteria for all incoming HTTP requests.
1111

1212
## Understand hosting plan limits
1313

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
---
2+
title: What to do when under attack
3+
pcx_content_type: overview
4+
sidebar:
5+
order: 9
6+
---
7+
8+
## Enable "I'm Under Attack" mode (IAUM)
9+
10+
If you are under attack and have this feature enabled during the attack, visitors will receive an interstitial page for about five seconds while the traffic is analyzed to make sure it is a legitimate human visitor. The vast majority of Layer 7 attack scripts are defeated by IUAM and can be honed via Page Rules.
11+
12+
Refer to [I'm Under Attack Mode](https://developers.cloudflare.com/fundamentals/reference/under-attack-mode/) for more information.
13+
14+
15+
## Change Access Control List (ACL)
16+
17+
An ACL refers to rules that are applied to port numbers or IP addresses that are available on a host permitting use of the service. When you only allow Cloudflare IPs, you eliminate threats attempting to attack your origin IP range.
18+
19+
Refer to [Cloudflare IP Ranges](https://www.cloudflare.com/ips) for more information.
20+
21+
22+
## Change Origin IPs and update Cloudflare DNS records
23+
24+
If your origin is still being attacked, consider moving your Origin IPs and updating your Cloudflare DNS records.
25+
26+
Refer to [Prevent DDoS attacks](/learning-paths/prevent-ddos-attacks/concepts/) for detailed guidance.
27+
28+
:::note
29+
30+
To learn about best practices for DDoS protection, review [Respond to DDoS attacks](/ddos-protection/best-practices/respond-to-ddos-attacks/).
31+
32+
:::

0 commit comments

Comments
 (0)