You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/waf/managed-rules/troubleshooting.mdx
+17-10Lines changed: 17 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,20 +39,27 @@ If you contact Cloudflare Support to verify whether a WAF managed rule triggers
39
39
40
40
To identify false negatives, review the HTTP logs on your origin server. To reduce false negatives, use the following checklist:
41
41
42
-
- Are DNS records that serve HTTP traffic [proxied through Cloudflare](/dns/proxy-status/)?
42
+
- Are DNS records that serve HTTP traffic [proxied through Cloudflare](/dns/proxy-status/)?<br/>
43
+
Cloudflare only mitigates requests in proxied traffic.
43
44
44
-
- Have you deployed any of the [WAF managed rulesets](/waf/managed-rules/#available-managed-rulesets) in your zone?
45
-
- Old dashboard: Go to **Security** > **WAF** > **Managed rules** tab.
46
-
- New security dashboard: Go to **Security** > **Security rules** and filter by **Managed rules**.
45
+
- Have you deployed any of the [WAF managed rulesets](/waf/managed-rules/#available-managed-rulesets) in your zone?<br/>
46
+
You must [deploy a managed ruleset](/waf/managed-rules/deploy-zone-dashboard/#deploy-a-managed-ruleset) to apply its rules.
47
47
48
-
- Are Managed Rules being skipped via an [exception](/waf/managed-rules/waf-exceptions/)?
48
+
- Are Managed Rules being skipped via an [exception](/waf/managed-rules/waf-exceptions/)?<br/>
49
+
Use [Security Events](/waf/analytics/security-events/) to search for requests being skipped. If necessary, adjust the exception expression so that it matches the attack traffic that should have been blocked.
49
50
50
-
- Not all rules of WAF managed rulesets are enabled by default, so you should review individual managed rules.
51
+
- Have you enabled any necessary managed rules that are not enabled by default?<br/>
52
+
Not all rules of WAF managed rulesets are enabled by default, so you should review individual managed rules.
51
53
- For example, Cloudflare allows requests with empty user agents by default. To block requests with an empty user agent, enable the rule with ID <RuleIDid="b57df4f17f7f4ea4b8db33e20a6dbbd3"/> in the Cloudflare Managed Ruleset.
52
-
- Another example: If you are looking to block unmitigated SQL injection (SQLi) attacks, make sure the relevant managed rules tagged with `sqli` are enabled in the Cloudflare Managed Ruleset.
54
+
- Another example: If you want to block unmitigated SQL injection (SQLi) attacks, make sure the relevant managed rules tagged with `sqli` are enabled in the Cloudflare Managed Ruleset.
53
55
54
-
- Is the attack traffic matching a custom rule [skipping all Managed Rules](/waf/custom-rules/skip/)?
56
+
For instructions, refer to [Configure rules in bulk in a managed ruleset](/waf/managed-rules/deploy-zone-dashboard/#configure-rules-in-bulk-in-a-managed-ruleset).
55
57
56
-
- Is the attack traffic matching an allowed ASN, IP range, or IP address in [IP Access rules](/waf/tools/ip-access-rules/)?
58
+
- Is the attack traffic matching a custom rule [skipping all Managed Rules](/waf/custom-rules/skip/)?<br/>
59
+
If necessary, adjust the custom rule expression so that it does not apply to the attack traffic.
57
60
58
-
- Is the malicious traffic reaching your origin IP addresses directly, therefore bypassing Cloudflare protection? Block all traffic except from [Cloudflare's IP addresses](/fundamentals/concepts/cloudflare-ip-addresses/) at your origin server.
61
+
- Is the attack traffic matching an allowed ASN, IP range, or IP address in [IP Access rules](/waf/tools/ip-access-rules/)?<br/>
62
+
Review your IP Access rules and make sure that any allow rules do not match the attack traffic.
63
+
64
+
- Is the malicious traffic reaching your origin IP addresses directly, therefore bypassing Cloudflare protection?<br/>
65
+
Block all traffic except from [Cloudflare's IP addresses](/fundamentals/concepts/cloudflare-ip-addresses/) at your origin server.
0 commit comments