Skip to content

Commit ae2f527

Browse files
faq entry (#24501)
1 parent a3a618e commit ae2f527

File tree

8 files changed

+30
-20
lines changed

8 files changed

+30
-20
lines changed

src/content/docs/ddos-protection/about/components.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,12 +14,12 @@ import { GlossaryTooltip } from "~/components"
1414

1515
The Cloudflare Autonomous Edge is powered by the denial-of-service <GlossaryTooltip term="daemon" prepend="A daemon is ">daemon</GlossaryTooltip> (`dosd`), which is a home-grown software-defined system. The flow tracking daemon, `flowtrackd`, is our stateful mitigation platform alongside `dosd`. A `dosd` instance runs in every single server in every one of [Cloudflare global network's data centers](https://www.cloudflare.com/network/) around the world. These `dosd` instances can detect and mitigate DDoS attacks autonomously without requiring centralized consensus. Cloudflare users can configure this system through [DDoS Attack Protection managed rulesets](/ddos-protection/managed-rulesets/).
1616

17-
Another component of Cloudflares Autonomous Edge includes the [Advanced TCP Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/) system. This is Cloudflare's TCP state tracking machine for detecting and mitigating the most randomized and sophisticated TCP-based DDoS attacks in unidirectional routing topologies — such as the case of [Magic Transit](/magic-transit/). Advanced TCP Protection is able to identify the state of a TCP connection and then drops, challenges, or rate-limits packets that do not belong to a legitimate connection.
17+
Another component of Cloudflare's Autonomous Edge includes the [Advanced TCP Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/) system. This is Cloudflare's TCP state tracking machine for detecting and mitigating the most randomized and sophisticated TCP-based DDoS attacks in unidirectional routing topologies — such as the case of [Magic Transit](/magic-transit/). Advanced TCP Protection is able to identify the state of a TCP connection and then drops, challenges, or rate-limits packets that do not belong to a legitimate connection.
1818

19-
For more information, refer to our blog post [A deep-dive into Cloudflares autonomous edge DDoS protection](https://blog.cloudflare.com/deep-dive-cloudflare-autonomous-edge-ddos-protection/).
19+
For more information, refer to our blog post [A deep-dive into Cloudflare's autonomous edge DDoS protection](https://blog.cloudflare.com/deep-dive-cloudflare-autonomous-edge-ddos-protection/).
2020

2121
## Centralized DDoS protection system
2222

23-
Complementary to the Autonomous Edge, Cloudflares entire global network is overwatched by a global version of `dosd`. This component protects Cloudflares entire global network by detecting and mitigating globally distributed volumetric DDoS attacks.
23+
Complementary to the Autonomous Edge, Cloudflare's entire global network is overwatched by a global version of `dosd`. This component protects Cloudflare's entire global network by detecting and mitigating globally distributed volumetric DDoS attacks.
2424

2525
The centralized systems run in Cloudflare's core data centers. They receive samples from every global network data center, analyze them, and automatically send mitigation instructions when detecting an attack. The system is also synchronized to each of our customers' web servers to identify their health and trigger any required mitigation actions.

src/content/docs/ddos-protection/about/how-ddos-protection-works.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,13 @@ learning_center:
1111

1212
import { GlossaryTooltip } from "~/components"
1313

14-
To detect and mitigate <GlossaryTooltip term="distributed denial-of-service (DDoS) attack">DDoS attacks</GlossaryTooltip>, Cloudflares autonomous edge and centralized DDoS systems analyze traffic samples out of path, which allows Cloudflare to asynchronously detect DDoS attacks without causing latency or impacting performance.
14+
To detect and mitigate <GlossaryTooltip term="distributed denial-of-service (DDoS) attack">DDoS attacks</GlossaryTooltip>, Cloudflare's autonomous edge and centralized DDoS systems analyze traffic samples out of path, which allows Cloudflare to asynchronously detect DDoS attacks without causing latency or impacting performance.
1515

1616
The analyzed samples include:
1717

1818
- **Packet fields** such as the source IP, source port, destination IP, destination port, protocol, TCP flags, sequence number, options, and packet rate.
1919
- **HTTP request metadata** such as HTTP headers, user agent, query-string, path, host, HTTP method, HTTP version, TLS cipher version, and request rate.
20-
- **HTTP response metrics** such as error codes returned by customers origin servers and their rates.
20+
- **HTTP response metrics** such as error codes returned by customers' origin servers and their rates.
2121

2222
Cloudflare uses a set of dynamic rules that scan for attack patterns, known attack tools, suspicious patterns, protocol violations, requests causing large amounts of origin errors, excessive traffic hitting the origin or cache, and additional attack vectors. Each rule has a predefined sensitivity level and default action that varies based on the rule's confidence that the traffic is indeed part of an attack.
2323

src/content/docs/ddos-protection/about/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ import { GlossaryTooltip } from "~/components"
1313

1414
Cloudflare provides unmetered and unlimited <GlossaryTooltip term="distributed denial-of-service (DDoS) attack" link="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">distributed denial-of-service (DDoS)</GlossaryTooltip> protection at layers 3, 4, and 7 to all customers on all plans and services.
1515

16-
The protection is enabled by Cloudflares [Autonomous DDoS Protection Edge](/ddos-protection/about/components/#autonomous-edge), which automatically detects and mitigates DDoS attacks.
16+
The protection is enabled by Cloudflare's [Autonomous DDoS Protection Edge](/ddos-protection/about/components/#autonomous-edge), which automatically detects and mitigates DDoS attacks.
1717

1818
The Autonomous Edge includes multiple dynamic mitigation rules exposed as [managed rulesets](/ddos-protection/managed-rulesets/), which provide comprehensive protection against a variety of DDoS attacks across layers 3/4 and layer 7 of the OSI model.
1919

src/content/docs/ddos-protection/best-practices/third-party.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -32,13 +32,13 @@ If you are using a CDN or proxy in front of Cloudflare, it is recommended that y
3232
- `HTTP requests with unusual HTTP headers or URI path (signature #57)` with the rule ID <RuleID id="12b9aecf1f6245b29d7e842bf35a42a0" />
3333
- `Requests coming from known bad sources` with the rule ID <RuleID id="6e3ccc23900c428e8ec0fb8a3a679c52" />
3434

35-
You should change the rules action to _Log_ (only available on Enterprise plans) to view the flagged traffic in the [analytics dashboard](/ddos-protection/reference/analytics/). Alternatively, change the rule's **Sensitivity Level** to _Essentially Off_ to prevent the rule from being triggered.
35+
You should change the rule's action to _Log_ (only available on Enterprise plans) to view the flagged traffic in the [analytics dashboard](/ddos-protection/reference/analytics/). Alternatively, change the rule's **Sensitivity Level** to _Essentially Off_ to prevent the rule from being triggered.
3636

3737
For more information, refer to [HTTP DDoS Attack Protection managed ruleset: Ruleset configuration](/ddos-protection/managed-rulesets/http/#ruleset-configuration).
3838

3939
## Using VPNs, NATs, and other third-party services
4040

41-
Some Cloudflare Magic Transit customers operate <GlossaryTooltip term="Virtual Private Network (VPN)">Virtual Private Networks (VPN)</GlossaryTooltip> so that their remote employees can connect securely to the organizations services. Additionally, larger organizations have Network Addressing Translation (NAT) systems that manage connections in and out of their network.
41+
Some Cloudflare Magic Transit customers operate <GlossaryTooltip term="Virtual Private Network (VPN)">Virtual Private Networks (VPN)</GlossaryTooltip> so that their remote employees can connect securely to the organization's services. Additionally, larger organizations have Network Addressing Translation (NAT) systems that manage connections in and out of their network.
4242

4343
Cloudflare Magic Transit customers may also use third-party services such as Zoom, Webex, Microsoft Teams, and others for their internal organization communication. Because traffic to Cloudflare will be originating from a limited set of IP addresses belonging to these third-party services, it may appear as if the services are launching a DDoS attack against Cloudflare due to the amount of traffic from limited IP addresses.
4444

@@ -51,4 +51,4 @@ If your organization uses VPNs, NATs, or third-party services at high rates of o
5151
- Change the **Sensitivity Level** of the relevant rules to a lower level. Changing the level to _Essentially Off_ will prevent the rules from being triggered. Refer to [HTTP DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/http/) and [Network-layer DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/network/) for more information on the available adjustments per ruleset and how to perform them.
5252
- Exclude the desired traffic from the Managed DDoS rule using expression filters. You can exclude a combination of source ports, source IP addresses, destination ports, destination IP addresses, and protocol. For more information, refer to [Configure Network-layer DDoS Attack Protection via API](/ddos-protection/managed-rulesets/network/network-overrides/configure-api/).
5353

54-
If you are on an Enterprise plan, you can change a rules action to _Log_ to view the flagged traffic in the [analytics dashboard](/ddos-protection/reference/analytics/). After gathering this information, you can later define rule adjustments as previously described.
54+
If you are on an Enterprise plan, you can change a rule's action to _Log_ to view the flagged traffic in the [analytics dashboard](/ddos-protection/reference/analytics/). After gathering this information, you can later define rule adjustments as previously described.

src/content/docs/ddos-protection/change-log/http/2022-07-06.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ sidebar:
2727
<td>
2828
Added new Location-Aware DDoS Protection for Enterprise accounts that
2929
are subscribed to the Advanced DDoS service. Location Aware DDoS
30-
Protection constantly learns a zones traffic levels per country and
30+
Protection constantly learns a zone's traffic levels per country and
3131
region over time, creates a traffic profile and then flags or mitigates
3232
traffic that deviates from the profile.
3333
</td>

src/content/docs/ddos-protection/frequently-asked-questions.mdx

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,4 +170,14 @@ DDoS managed rules and Advanced DDoS Protection are autonomous and run on every
170170

171171
- **DDoS managed rules**: Detects and mitigates DDoS attacks in real-time. When it detects an attack, it deploys rules within seconds to mitigate the malicious traffic.
172172
- **Advanced TCP Protection**: Identifies and drops abnormal TCP/IP behavior before it hits application servers.
173-
- **Advanced DNS Protection**: Identifies and drops abnormal DNS queries behavior before it hits DNS servers.
173+
- **Advanced DNS Protection**: Identifies and drops abnormal DNS queries behavior before it hits DNS servers.
174+
175+
---
176+
177+
## What is Advanced TCP Protection's Protected Learning functionality?
178+
179+
The Protected Learning functionality enables the [Advanced TCP Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/) system to overcome Internet routing chaos while allowing your legitimate traffic through and blocking DDoS attacks at the edge.
180+
181+
Anycast and BGP are protocols that help route Internet traffic by sending it to the nearest or most optimal data center. Occasional network events—such as a data center being taken offline for maintenance or changes in Internet routing—can cause an established connection to be rerouted to a different data center.
182+
183+
Cloudflare's flow inference functionality, also known as Protected Learning, is specifically designed to handle this. When a TCP connection, such as a flow, shifts to a new data center, our system observes that it is an existing connection that does not appear in the local flow table. Instead of immediately blocking the flow as an unknown connection that may be part of a DDoS attack, our system uses a proprietary process to verify if the connection is legitimate. It might challenge the acknowledgment (ACK) packets of the flow to ensure it is not part of a DDoS attack. Once the flow passes our checks, we allow it to continue without interruption. This ensures that even rare, legitimate shifts in traffic do not break your long-running connections while keeping your network protected against DDoS attacks.

src/content/docs/ddos-protection/managed-rulesets/adaptive-protection.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ Adaptive DDoS Protection provides the following types of protection:
1515

1616
- **Adaptive DDoS Protection for Origins**: Detects and mitigates traffic that deviates from your site's origin errors profile.
1717
- **Adaptive DDoS Protection for User-Agents**: Detects and mitigates traffic that deviates from the top User Agents seen by Cloudflare on the network. The User Agent profile is built from the entire Cloudflare network and not only from the customer's zone.
18-
- **Adaptive DDoS Protection for Locations**: Detects and mitigates traffic that deviates from your sites geo-distribution profile. The profile is calculated from the rate for every client country and region, using the rates from the past seven days.
19-
- **Adaptive DDoS Protection for Protocols**: Detects and mitigates traffic that deviates from your traffics IP protocol profile. The profile is calculated as a global rate for each of your prefixes.
18+
- **Adaptive DDoS Protection for Locations**: Detects and mitigates traffic that deviates from your site's geo-distribution profile. The profile is calculated from the rate for every client country and region, using the rates from the past seven days.
19+
- **Adaptive DDoS Protection for Protocols**: Detects and mitigates traffic that deviates from your traffic's IP protocol profile. The profile is calculated as a global rate for each of your prefixes.
2020

2121
## Availability
2222

@@ -39,7 +39,7 @@ Cloudflare Adaptive DDoS Protection is available to Enterprise customers accordi
3939

4040
Adaptive DDoS Protection creates a traffic profile by looking at the maximum rates of traffic every day, for the past seven days. These profiles are recalculated every day, keeping the seven-day time window. Adaptive DDoS Protection stores the maximal traffic rates seen for every predefined dimension value (the profiling dimension varies for each rule). Every profile uses one dimension, such as the source country of the request, the user agent, and the IP protocol. Incoming traffic that deviates from your profile may be malicious.
4141

42-
To eliminate outliers, rate calculations only consider the 95th percentile rates (discarding the top 5% of the highest rates). Cloudflare requires a minimum amount of requests per second (rps) to build traffic profiles. HTTP Adaptive DDoS Protection rules also take into account Cloudflares [Machine Learning (ML) models](/bots/concepts/bot-score/#machine-learning) to identify traffic that is likely automated.
42+
To eliminate outliers, rate calculations only consider the 95th percentile rates (discarding the top 5% of the highest rates). Cloudflare requires a minimum amount of requests per second (rps) to build traffic profiles. HTTP Adaptive DDoS Protection rules also take into account Cloudflare's [Machine Learning (ML) models](/bots/concepts/bot-score/#machine-learning) to identify traffic that is likely automated.
4343

4444
Cloudflare may change the logic of these protection rules from time to time to improve them. Any rule changes will appear in the [Managed rulesets changelog](/ddos-protection/change-log/) page.
4545

src/content/docs/ddos-protection/managed-rulesets/http/http-overrides/override-examples.mdx

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ If you recognize that the traffic flagged by an adaptive rule may be considered
3030

3131
A false positive is an incorrect identification. In the case of DDoS protection, there is a false positive when legitimate traffic is mistakenly classified as attack traffic. This can occur when legacy applications, Internet services, or faulty client applications generate legitimate traffic that appears suspicious, has odd traffic patterns, deviates from best practices, or violates protocols.
3232

33-
In these cases, Cloudflares DDoS Protection systems may flag that traffic as malicious and apply mitigation actions. If the traffic is in fact legitimate and not part of an attack, the mitigation actions can cause service disruptions and outages to your Internet properties.
33+
In these cases, Cloudflare's DDoS Protection systems may flag that traffic as malicious and apply mitigation actions. If the traffic is in fact legitimate and not part of an attack, the mitigation actions can cause service disruptions and outages to your Internet properties.
3434

3535
To remedy a false positive:
3636

@@ -51,7 +51,7 @@ To remedy a false positive:
5151
4. Copy the rule name.
5252
5. Go to your zone > **Security** > **DDoS** and select **Deploy a DDoS override**. If you cannot deploy any additional overrides, edit an existing override to adjust rule configuration.
5353
6. Select **Browse rules** and paste the rule name in the search field.
54-
7. Decrease the rules **Sensitivity Level** to _Essentially Off_ or change the rule action to _Log_ (if supported by your current plan and subscriptions).
54+
7. Decrease the rule's **Sensitivity Level** to _Essentially Off_ or change the rule action to _Log_ (if supported by your current plan and subscriptions).
5555
8. Select **Next** and then select **Save**.
5656

5757
</TabItem> <TabItem label="New dashboard" icon="rocket">
@@ -71,7 +71,7 @@ To remedy a false positive:
7171
4. Copy the rule name.
7272
5. Go to your zone > **Security** > **Security rules** > **DDoS protection** tab and select **Create override**. If you cannot deploy any additional overrides, edit an existing override to adjust rule configuration.
7373
6. Select **Browse rules** and paste the rule name in the search field.
74-
7. Decrease the rules **Sensitivity Level** to _Essentially Off_ or change the rule action to _Log_ (if supported by your current plan and subscriptions).
74+
7. Decrease the rule's **Sensitivity Level** to _Essentially Off_ or change the rule action to _Log_ (if supported by your current plan and subscriptions).
7575
8. Select **Next** and then select **Save**.
7676

7777
</TabItem> </Tabs>
@@ -84,7 +84,7 @@ Later, you can change the [sensitivity level](/ddos-protection/managed-rulesets/
8484

8585
:::note[Recommendation: Enable DDoS alerts]
8686

87-
Cloudflare recommends that you create notifications for [DDoS alerts](/ddos-protection/reference/alerts/) to get real-time notifications on detected and mitigated attacks automatically performed by Cloudflares systems. When you receive these notifications, you can review if it is in fact a real DDoS attack, or if it is a false positive, and then take action to remedy it.
87+
Cloudflare recommends that you create notifications for [DDoS alerts](/ddos-protection/reference/alerts/) to get real-time notifications on detected and mitigated attacks automatically performed by Cloudflare's systems. When you receive these notifications, you can review if it is in fact a real DDoS attack, or if it is a false positive, and then take action to remedy it.
8888
:::
8989

9090
#### Avoid false positives while retaining protection and visibility
@@ -132,7 +132,7 @@ If you are experiencing a DDoS attack detected by Cloudflare and the applied mit
132132
4. Copy the rule name.
133133
5. Go to your zone > **Security** > **DDoS** and select **Deploy a DDoS override**. If you cannot deploy any additional overrides, edit an existing override to adjust rule configuration.
134134
6. Select **Browse rules** and paste the rule name in the search field.
135-
7. Change the rules **Action** to *Block*.
135+
7. Change the rule's **Action** to *Block*.
136136
8. Select **Next** and then select **Save**.
137137

138138
</TabItem> <TabItem label="New dashboard" icon="rocket">
@@ -152,7 +152,7 @@ If you are experiencing a DDoS attack detected by Cloudflare and the applied mit
152152
4. Copy the rule name.
153153
5. Go to your zone > **Security** > **Security rules** > **DDoS protection** tab and select **Create override**. If you cannot deploy any additional overrides, edit an existing override to adjust rule configuration.
154154
6. Select **Browse rules** and paste the rule name in the search field.
155-
7. Change the rules **Action** to *Block*.
155+
7. Change the rule's **Action** to *Block*.
156156
8. Select **Next** and then select **Save**.
157157

158158
</TabItem> </Tabs>

0 commit comments

Comments
 (0)