Skip to content

Commit bb24f92

Browse files
patriciasantaanathomasgauvin
authored andcommitted
[DDoS Protection] New dash (#23401)
* create http override * new dash edits * network override * change availability * ruleset override availability * missing punctuation
1 parent 55082a2 commit bb24f92

File tree

16 files changed

+196
-96
lines changed

16 files changed

+196
-96
lines changed

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/add-prefix-allowlist.mdx

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,15 +9,17 @@ head:
99

1010
---
1111

12-
import { Render } from "~/components"
12+
import { Render, Steps } from "~/components"
1313

1414
To add an IP address or prefix to the Advanced DDoS Protection [allowlist](/ddos-protection/advanced-ddos-systems/concepts/#allowlist):
1515

16+
<Steps>
1617
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
1718
2. Go to **L3/4 DDoS** > **Advanced Protection**.
1819
3. Under **General settings** > **Allowlist**, select **Edit**.
1920
4. Enter a prefix and (optionally) a description in **Prefix** and **Description**, respectively.
2021
5. To exclude the current prefix from the allowlist instead of including it, uncheck the **Enabled** checkbox.
2122
6. Select **Add**.
23+
</Steps>
2224

2325
<Render file="allowlist-ip-spoofing" />

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/add-prefix.mdx

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,17 @@ head:
88
content: Add a prefix to Advanced DDoS Protection
99

1010
---
11+
import { Steps } from "~/components"
1112

1213
To add a [prefix](/ddos-protection/advanced-ddos-systems/concepts/#prefixes) to Advanced DDoS Protection:
1314

15+
<Steps>
1416
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
1517
2. Go to **L3/4 DDoS** > **Advanced Protection**.
1618
3. Under **General settings** > **Prefixes**, select **Edit**.
1719
4. Expand the **Add existing prefix** section and select **Add** next to the prefix you wish to add.<br/>
1820
Alternatively, enter a prefix and (optionally) a description in **Prefix** and **Description**, respectively, and select **Add**.
21+
</Steps>
1922

2023
:::note[Note]
2124

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/create-filter.mdx

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ head:
99

1010
---
1111

12-
import { GlossaryTooltip, Render } from "~/components"
12+
import { GlossaryTooltip, Render, Steps } from "~/components"
1313

1414
<Render file="atp-filter-definition" />
1515

@@ -23,13 +23,15 @@ Filters only apply to Advanced TCP Protection.
2323

2424
To create a [filter](/ddos-protection/advanced-ddos-systems/concepts/#filter) for one of the system components:
2525

26+
<Steps>
2627
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
2728
2. Go to **L3/4 DDoS** > **Advanced Protection** > **Advanced TCP Protection**.
2829
3. Under the system component for which you are creating the filter (**SYN Flood Protection** or **Out-of-state TCP Protection**), select **Create** next to the type of filter you want to create:
29-
- **Mitigation Filter**: The protection system will drop <GlossaryTooltip term="data packet">packets</GlossaryTooltip> matching the filter expression.
30-
- **Monitoring Filter**: The protection system will log packets matching the filter expression.
31-
- **Off Filter**: The protection system will ignore packets matching the filter expression.
30+
- **Mitigation Filter**: The protection system will drop <GlossaryTooltip term="data packet">packets</GlossaryTooltip> matching the filter expression.
31+
- **Monitoring Filter**: The protection system will log packets matching the filter expression.
32+
- **Off Filter**: The protection system will ignore packets matching the filter expression.
3233
4. Under **When incoming packets match**, define a filter expression using the Expression Builder (specifying one or more values for **Field**, **Operator**, and **Value**), or manually enter an expression using the Expression Editor. For more information, refer to [Edit rule expressions](/ruleset-engine/rules-language/expressions/edit-expressions/).
3334
5. Select **Save**.
35+
</Steps>
3436

3537
<Render file="atp-filters-rules-precedence" />

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/create-rule.mdx

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,28 +9,29 @@ head:
99

1010
---
1111

12-
import { Render } from "~/components"
12+
import { Render, Steps } from "~/components"
1313

1414
## Create an Advanced TCP Protection rule
1515

1616
To create a [SYN flood rule](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/#syn-flood-protection) or an [out-of-state TCP](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/#out-of-state-tcp-protection) rule:
1717

18+
<Steps>
1819
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
1920
2. Go to **L3/4 DDoS** > **Advanced Protection** > **Advanced TCP Protection**.
2021
3. Depending on the rule you are creating, do one of the following:
21-
2222
- Under **SYN Flood Protection**, select **Create SYN flood rule**.
2323
- Under **Out-of-state TCP Protection**, select **Create out-of-state TCP rule**.
24-
2524
4. In **Mode**, select a [mode](/ddos-protection/advanced-ddos-systems/concepts/#mode) for the rule.
2625
5. Under **Set scope**, select a [scope](/ddos-protection/advanced-ddos-systems/concepts/#scope) for the rule. If you choose to apply the rule to a subset of incoming packets, select a region or a data center.
2726
6. Under **Sensitivity**, define the [burst sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#burst-sensitivity) and [rate sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#rate-sensitivity) of the rule (by default, _Medium_). The sensitivity levels are based on the initially configured thresholds for your specific case.
2827
7. Select **Deploy**.
28+
</Steps>
2929

3030
<Render file="atp-filters-rules-precedence" />
3131

3232
## Create an Advanced DNS Protection rule
3333

34+
<Steps>
3435
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account.
3536
2. Go to **L3/4 DDoS** > **Advanced Protection** > **General settings**.
3637
3. Add the prefixes you wish to onboard. Advanced DNS Protection will only be applied to the prefixes you onboard. If you already onboarded the desired prefixes when you configured Advanced TCP Protection, you do not need to take any other action.
@@ -43,4 +44,5 @@ To create a [SYN flood rule](/ddos-protection/advanced-ddos-systems/overview/adv
4344
6. In **Mode**, select a mode for the rule.
4445
7. Under **Set scope**, select a [scope](/ddos-protection/advanced-ddos-systems/concepts/#scope) to determine the range of packets that will be affected by the rule.
4546
8. Under **Sensitivity**, define the [burst sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#burst-sensitivity), [rate sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#rate-sensitivity), and [profile sensitivity](/ddos-protection/advanced-ddos-systems/concepts/#profile-sensitivity) to determine when to initiate mitigation.
46-
9. Select **Deploy**.
47+
9. Select **Deploy**.
48+
</Steps>

src/content/docs/ddos-protection/advanced-ddos-systems/how-to/exclude-prefix.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,17 @@ sidebar:
66

77
---
88

9+
import { Steps } from "~/components"
10+
911
To exclude a prefix or a prefix subset from Advanced DDoS Protection:
1012

13+
<Steps>
1114
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
1215
2. Go to **L3/4 DDoS** > **Advanced Protection**.
1316
3. [Add the prefix](/ddos-protection/advanced-ddos-systems/how-to/add-prefix/) you previously onboarded to Magic Transit to Advanced TCP Protection.
1417
4. [Add the prefix](/ddos-protection/advanced-ddos-systems/how-to/add-prefix/) (or subset) you wish to exclude as a new, separate prefix in Advanced TCP Protection.
1518
5. For the prefix you added in the previous step, select **Exclude Subset** in the **Enrolled Prefixes** list.
19+
</Steps>
1620

1721
:::note
1822

src/content/docs/ddos-protection/advanced-ddos-systems/overview/index.mdx

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ head:
1010

1111
---
1212

13-
import { GlossaryTooltip, Render } from "~/components"
13+
import { GlossaryTooltip, Render, Steps } from "~/components"
1414

1515
The Advanced DDoS Protection system includes [Advanced TCP Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/) and [Advanced DNS Protection](/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/). Both systems are configured using the general settings, but also comprise of their own dedicated settings.
1616

@@ -62,6 +62,8 @@ Refer to [Concepts](/ddos-protection/advanced-ddos-systems/concepts/) for more i
6262

6363
Enable the Advanced DDoS system and begin routing traffic through it.
6464

65+
<Steps>
6566
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
6667
2. Go to **L3/4 DDoS** > **Advanced Protection** > **General settings**.
67-
3. Under **General settings**, toggle the feature status **On**.
68+
3. Under **General settings**, toggle the feature status **On**.
69+
</Steps>

src/content/docs/ddos-protection/best-practices/respond-to-ddos-attacks.mdx

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,21 +5,23 @@ title: Respond to DDoS attacks
55

66
---
77

8-
import { GlossaryTooltip } from "~/components"
8+
import { GlossaryTooltip, Steps } from "~/components"
99

1010
Cloudflare's network automatically mitigates large <GlossaryTooltip term="distributed denial-of-service (DDoS) attack" link="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attacks</GlossaryTooltip>, but these attacks can still affect your application.
1111

1212
## All customers
1313

1414
All customers should perform the following steps to better secure their application:
1515

16+
<Steps>
1617
1. Make sure all [DDoS managed rulesets](/ddos-protection/managed-rulesets/) are set to default settings (_High_ sensitivity level and mitigation actions) for optimal DDoS activation.
1718
2. Deploy [WAF custom rules](/waf/custom-rules/) and [rate limiting rules](/waf/rate-limiting-rules/) to enforce a combined positive and negative security model. Reduce the traffic allowed to your website based on your known usage.
1819
3. Make sure your origin is not exposed to the public Internet, meaning that access is only possible from [Cloudflare IP addresses](/fundamentals/concepts/cloudflare-ip-addresses/). As an extra security precaution, we recommend contacting your hosting provider and requesting new origin server IPs if they have been targeted directly in the past.
1920
4. If you have [Managed IP Lists](/waf/tools/lists/managed-lists/#managed-ip-lists) or [Bot Management](/bots/plans/bm-subscription/), consider using these in WAF custom rules.
2021
5. Enable [caching](/cache/) as much as possible to reduce the strain on your origin servers, and when using [Workers](/workers/), avoid overwhelming your origin server with more subrequests than necessary.
2122

2223
To help counter attack randomization, Cloudflare recommends to update your cache settings to exclude the query string as a cache key. When the query string is excluded as a cache key, Cloudflare's cache will take in unmitigated attack requests instead of forwarding them to the origin. The cache can be a useful mechanism as part of a multilayered security posture.
24+
</Steps>
2325

2426
## Enterprise customers
2527

src/content/docs/ddos-protection/botnet-threat-feed.mdx

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ learning_center:
1111
link: https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/
1212

1313
---
14+
import { Steps } from "~/components"
1415

1516
The Cloudflare DDoS Botnet Threat Feed is a threat intelligence feed for service providers (SPs) such as hosting providers and Internet service providers (ISPs) that provides information about their own IP addresses that have participated in HTTP DDoS attacks as observed from Cloudflare's global network. The feed aims to help service providers stop the abuse and reduce DDoS attacks originating from within their networks.
1617

@@ -44,11 +45,13 @@ Make sure that:
4445

4546
### 1. Authenticate your ASN via PeeringDB
4647

48+
<Steps>
4749
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
4850
2. Go to **Manage Account** > **Configurations**.
4951
3. Select **DDoS Threat Feed ASNs**.
5052
4. On the list of ASNs configured for your threat feed, select **Add ASN**.
5153
5. You will be redirected to the PeeringDB authentication page, where you can log in and consent to share the affiliation data with us. You will be redirected back to the configuration page once it is successful.
54+
</Steps>
5255

5356
:::note
5457
You can add multiple ASNs to your threat feed.

src/content/docs/ddos-protection/get-started.mdx

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,8 @@ sidebar:
66

77
---
88

9+
import { Steps } from "~/components"
10+
911
## Free, Pro, and Business plans
1012

1113
The DDoS Attack Protection managed rulesets provided by Cloudflare are enabled by default on zones onboarded to Cloudflare, IP applications onboarded to Spectrum, and IP Prefixes onboarded to Magic Transit.
@@ -26,10 +28,12 @@ Cloudflare's DDoS protection systems automatically detect and mitigate DDoS atta
2628

2729
To prevent this situation, Cloudflare recommends that you perform these steps to get started:
2830

31+
<Steps>
2932
1. Set the ruleset actions for all the [DDoS Attack Protection managed rulesets](/ddos-protection/managed-rulesets/) to _Log_.
3033
2. Analyze the flagged traffic.
3134
3. Adjust the sensitivity or action of individual managed ruleset rules, if required.
3235
4. Switch ruleset actions from _Log_ back to the default.
36+
</Steps>
3337

3438
### Prerequisites
3539

@@ -46,9 +50,11 @@ You must have one of the following:
4650
The _Log_ action is only available to Enterprise customers.
4751
:::
4852

53+
<Steps>
4954
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account.
5055
2. [Configure all the rules in the HTTP DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/http/http-overrides/configure-dashboard/#create-a-ddos-override), setting their action to _Log_.
5156
3. [Configure all the rules in the Network-layer DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/network/network-overrides/configure-dashboard/#create-a-ddos-override), setting the action to _Log_.
57+
</Steps>
5258

5359
Alternatively, if you are using the API, define an override at the ruleset level to set the action of all managed ruleset rules to `log` by following these instructions:
5460

@@ -57,8 +63,10 @@ Alternatively, if you are using the API, define an override at the ruleset level
5763

5864
### 2. Review flagged traffic
5965

66+
<Steps>
6067
1. Go to your [analytics dashboard](/ddos-protection/reference/analytics/) (the exact dashboard depends on your Cloudflare services).
6168
2. Apply one or more filters, if required, and identify any rules that would have blocked legitimate traffic if _Log_ mode were disabled. Take note of the rule IDs.
69+
</Steps>
6270

6371
### 3. Customize managed ruleset rules
6472

src/content/docs/ddos-protection/managed-rulesets/adaptive-protection.mdx

Lines changed: 34 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,8 @@ sidebar:
77

88
---
99

10+
import { Tabs, TabItem, Steps } from "~/components"
11+
1012
Adaptive DDoS Protection learns your unique traffic patterns and adapts to them to provide better protection against sophisticated DDoS attacks on layer 7 and layers 3/4, depending on your subscribed Cloudflare services.
1113

1214
Adaptive DDoS Protection provides the following types of protection:
@@ -58,15 +60,41 @@ For more information on the types of DDoS attacks covered by Cloudflare's DDoS p
5860

5961
To view traffic flagged by HTTP Adaptive DDoS Protection rules:
6062

61-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and website.
62-
2. Go to **Security** > **Events**.
63-
3. Filter by `Service equals HTTP DDoS` and by rule ID.
63+
<Tabs syncKey="dashNewNav">
64+
<TabItem label="Old dashboard">
65+
<Steps>
66+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and domain.
67+
2. Go to **Security** > **Events**.
68+
3. Filter by `Service equals HTTP DDoS` and by rule ID.
69+
</Steps>
70+
</TabItem>
71+
<TabItem label="New dashboard" icon="rocket">
72+
<Steps>
73+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and domain.
74+
2. Go to **Security** > **Analytics** > **Events**.
75+
3. Filter by `Service equals HTTP DDoS` and by rule ID.
76+
</Steps>
77+
</TabItem>
78+
</Tabs>
6479

6580
To view traffic flagged by L3/4 Adaptive DDoS Protection rules:
6681

67-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
68-
2. Go to Account Home > **Analytics & Logs** > **Network Analytics**.
69-
3. Filter by rule ID.
82+
<Tabs syncKey="dashNewNav">
83+
<TabItem label="Old dashboard">
84+
<Steps>
85+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
86+
2. Go to Account Home > **Analytics & Logs** > **Network Analytics**.
87+
3. Filter by rule ID.
88+
</Steps>
89+
</TabItem>
90+
<TabItem label="New dashboard" icon="rocket">
91+
<Steps>
92+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and domain.
93+
2. Go to **Security** > **Analytics** > **Events**.
94+
3. Filter by rule ID.
95+
</Steps>
96+
</TabItem>
97+
</Tabs>
7098

7199
You may also obtain information about flagged traffic through [Logpush](/logs/about/) or the [GraphQL API](/analytics/graphql-api/).
72100

0 commit comments

Comments
 (0)