Skip to content

Commit b2c145c

Browse files
Fix ordering
1 parent 1421137 commit b2c145c

File tree

9 files changed

+16
-14
lines changed

9 files changed

+16
-14
lines changed

src/content/docs/cloudflare-one/traffic-policies/packet-filtering/add-rules.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Add rules
33
pcx_content_type: how-to
44
sidebar:
5-
order: 1
5+
order: 3
66

77
---
88

@@ -137,4 +137,4 @@ curl https://api.cloudflare.com/client/v4/accounts/{account_id}/rulesets \
137137

138138
## Next steps
139139

140-
Refer to [Form expressions](/magic-firewall/how-to/form-expressions/) for more information on how to write rule expressions.
140+
Refer to [Form expressions](/cloudflare-one/traffic-policies/packet-filtering/form-expressions/) for more information on how to write rule expressions.

src/content/docs/cloudflare-one/traffic-policies/packet-filtering/best-practices/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Best practices
33
pcx_content_type: concept
44
sidebar:
5-
order: 6
5+
order: 10
66

77
---
88

src/content/docs/cloudflare-one/traffic-policies/packet-filtering/create-rate-limiting-rules.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ sidebar:
55
label: Create Rate Limiting rules
66
badge:
77
text: Beta
8+
order: 4
89
---
910

1011
import { DashButton } from "~/components";

src/content/docs/cloudflare-one/traffic-policies/packet-filtering/enable-managed-rulesets.mdx

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,16 @@
11
---
22
title: Enable Managed Rulesets
33
pcx_content_type: how-to
4-
4+
sidebar:
5+
order: 5
56
---
67

78
import { DashButton } from "~/components";
89

910
With [managed rulesets](/ruleset-engine/managed-rulesets/), you can quickly deploy rules maintained by Cloudflare, and you can use Magic Firewall to control which rules are enabled.
1011

1112
:::note[Note:]
12-
13-
1413
Before you can begin using managed rulesets with Magic Firewall, your account must first be entitled to use managed rulesets. Contact your account team for access.
15-
16-
1714
:::
1815

1916
To enable or disable a rule, you can specify which properties should be overridden. The overrides occur in the Managed phase, root kind ruleset. Currently, you can only have one rule in the root ruleset, but a single rule can contain multiple overrides.

src/content/docs/cloudflare-one/traffic-policies/packet-filtering/form-expressions.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Form expressions
33
pcx_content_type: concept
44
sidebar:
5-
order: 2
5+
order: 6
66
head:
77
- tag: title
88
content: Form an expression

src/content/docs/cloudflare-one/traffic-policies/packet-filtering/index copy.mdx renamed to src/content/docs/cloudflare-one/traffic-policies/packet-filtering/magic-firewall-overview.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
2-
title: Cloudflare Magic Firewall
2+
title: Overview
33
pcx_content_type: overview
44
sidebar:
5-
order: 1
5+
order: 2
66
head:
77
- tag: title
88
content: Overview
@@ -26,7 +26,7 @@ Magic Firewall is available with the purchase of [Magic Transit](/magic-transit/
2626

2727
## Features
2828

29-
<Feature header="Intrusion Detection System (IDS)" href="/magic-firewall/how-to/enable-ids/">
29+
<Feature header="Intrusion Detection System (IDS)" href="/cloudflare-one/traffic-policies/ids/">
3030
Actively monitor for a wide range of known threat signatures in your traffic.
3131
</Feature>
3232

src/content/docs/cloudflare-one/traffic-policies/packet-filtering/protocol-validation-rules.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
---
22
title: Protocol validation rules
33
pcx_content_type: concept
4-
4+
sidebar:
5+
order: 7
56
---
67

78
Magic Firewall supports [Session Initiation Protocol (SIP)](https://datatracker.ietf.org/doc/html/rfc2543) to inspect traffic validity and enforce a positive security model.

src/content/docs/cloudflare-one/traffic-policies/packet-filtering/ruleset-logic.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
11
---
22
title: Ruleset logic
33
pcx_content_type: concept
4+
sidebar:
5+
order: 8
46
---
57

68
import { GlossaryTooltip } from "~/components"

src/content/docs/cloudflare-one/traffic-policies/packet-filtering/traffic-types.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
---
22
title: Traffic types
33
pcx_content_type: concept
4-
4+
sidebar:
5+
order: 9
56
---
67

78
import { GlossaryTooltip } from "~/components"

0 commit comments

Comments
 (0)