Skip to content

Commit e716c38

Browse files
feedback
1 parent 3f88824 commit e716c38

File tree

1 file changed

+5
-8
lines changed
  • src/content/docs/ddos-protection/advanced-ddos-systems/overview

1 file changed

+5
-8
lines changed

src/content/docs/ddos-protection/advanced-ddos-systems/overview/index.mdx

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -46,13 +46,9 @@ The automatic threshold system calculates thresholds every 10 minutes for both n
4646

4747
These checks are performed independently for SYN Flood Protection, Out-of-State TCP Flood Protection, and Advanced DNS Protection. The criteria does not require the presence of any rules to be configured. Accounts initially provisioned by the automatic system will have default thresholds. Otherwise, thresholds may be unconfigured if they are not set by Cloudflare.
4848

49-
After seven days, the system calculates a rate and burst threshold for each of the protection components.
49+
After seven days, the system calculates a rate and burst threshold for each of the protection components. The burst threshold is calculated as five times the rate threshold.
5050

51-
Thresholds are applied globally per account.
52-
53-
There is no minimum packets-per-second (pps) requirement for threshold calculation.
54-
55-
The burst threshold is calculated as five times the rate threshold.
51+
Thresholds are applied globally per account and there is no minimum packets-per-second (pps) requirement for threshold calculation.
5652

5753
Thresholds are derived using the 95th percentile (P95) of observed traffic over the preceding seven days:
5854

@@ -66,8 +62,9 @@ The automatic threshold calculation system does not differentiate between legiti
6662

6763
#### Implementation
6864

69-
You should enable the automatically provisioned rules. Initially, these rules will have default values and operate in Monitor mode. After seven days, once thresholds are calculated, you can use the Network Analytics dashboard to observe what packets would have been dropped or allowed, then safely enable the rules in mitigation mode. Depending on what is observed in the Network Analytics dashboard (e.g. legitimate traffic is being flagged in Monitor mode), you may want to change the sensitivity level and continue observation before enabling in mitigation mode. Rules and Filters, where supported, can also be scoped to allow for additional granularity.
70-
Recalculation
65+
You should enable the automatically provisioned rules. Initially, these rules will have default values and operate in Monitor mode. After seven days, once thresholds are calculated, you can use the Network Analytics dashboard to observe what packets would have been dropped or allowed, then safely enable the rules in mitigation mode. Depending on what is observed in the Network Analytics dashboard (for example, legitimate traffic is being flagged in Monitor mode), you may want to change the sensitivity level and continue observation before enabling in mitigation mode. Rules and Filters, where supported, can also be scoped to allow for additional granularity.
66+
67+
#### Recalculation
7168

7269
Automatic thresholds are calculated only once. Cloudflare can manually trigger a recalculation. Adding, approving, removing, delegating, advertising, or withdrawing prefixes after initial onboarding does not automatically re-trigger the calculation. It is recommended to move the relevant systems to Monitor mode before making changes that impact traffic levels and requesting a recalculation from Cloudflare. Future improvements will take these events into consideration.
7370

0 commit comments

Comments
 (0)