Skip to content

Commit ec339cd

Browse files
more broken links
1 parent e7b313d commit ec339cd

File tree

10 files changed

+16
-16
lines changed

10 files changed

+16
-16
lines changed

src/content/docs/ddos-protection/managed-rulesets/adaptive-protection.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Cloudflare may change the logic of these protection rules from time to time to i
4545

4646
Cloudflare’s network is built to automatically monitor and mitigate large DDoS attacks. Cloudflare also helps mitigate smaller DDoS attacks, based on the following general rules:
4747

48-
- For zones on any plan, Cloudflare will apply mitigations when the HTTP error rate is above the _High_ (default) sensitivity level of 1,000 errors-per-second rate threshold. You can decrease the sensitivity level by [configuring the HTTP DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/http/configure-dashboard/).
48+
- For zones on any plan, Cloudflare will apply mitigations when the HTTP error rate is above the _High_ (default) sensitivity level of 1,000 errors-per-second rate threshold. You can decrease the sensitivity level by [configuring the HTTP DDoS Attack Protection managed ruleset](/ddos-protection/managed-rulesets/http/http-overrides/configure-dashboard/).
4949
- For zones on Pro, Business, and Enterprise plans, Cloudflare performs an additional check for better detection accuracy: the errors-per-second rate must also be at least five times the normal origin traffic levels before applying DDoS mitigations.
5050

5151
Cloudflare determines the error rate based on all HTTP errors in the 52X range (Internal Server Error) and in the 53X range, except for [error 530](/support/troubleshooting/http-status-codes/cloudflare-5xx-errors/error-530). Currently, for DDoS mitigations based on HTTP error rate, you cannot exclude specific HTTP error codes.
@@ -96,6 +96,6 @@ To configure a rule, refer to the instructions in the following pages:
9696
For more information on the available configuration parameters, refer to the following pages:
9797

9898
- For the (L7) DDoS protection rules for Origins, User-Agents, and Locations:<br/>
99-
[HTTP DDoS Attack Protection parameters](/ddos-protection/managed-rulesets/http/http-overrides/override-parameters/)
99+
[HTTP DDoS Attack Protection parameters](/ddos-protection/managed-rulesets/http/override-parameters/)
100100
- For the (L3/4) DDoS protection rules for Protocols:<br/>
101101
[Network-layer DDoS Attack Protection parameters](/ddos-protection/managed-rulesets/network/override-parameters/)

src/content/docs/ddos-protection/managed-rulesets/adjust-rules/false-positive.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Once saved, the rule takes effect within one or two minutes. The rule adjustment
3737

3838
## Update the adjusted rules later
3939

40-
Later, you can change the [sensitivity level](/ddos-protection/managed-rulesets/network/network-overrides/override-parameters/#sensitivity-level) of the rule causing the false positives to avoid future issues, and change the rule action back to its default value.
40+
Later, you can change the [sensitivity level](/ddos-protection/managed-rulesets/network/override-parameters/#sensitivity-level) of the rule causing the false positives to avoid future issues, and change the rule action back to its default value.
4141

4242
:::note[Recommendation: Enable DDoS alerts]
4343

@@ -48,7 +48,7 @@ Cloudflare recommends that you create notifications for [DDoS alerts](/ddos-prot
4848

4949
### Avoid false positives while retaining protection and visibility
5050

51-
To see what DDoS Managed Rules do in a high sensitivity level while remaining protected by blocking attacks at a low sensitivity level, Advanced DDoS protection customers can [create a first override](/ddos-protection/managed-rulesets/network/configure-dashboard/#create-a-ddos-override) that blocks attacks at a low sensitivity and a second override to log at a high sensitivity.
51+
To see what DDoS Managed Rules do in a high sensitivity level while remaining protected by blocking attacks at a low sensitivity level, Advanced DDoS protection customers can [create a first override](/ddos-protection/managed-rulesets/network/network-override/configure-dashboard/#create-a-ddos-override) that blocks attacks at a low sensitivity and a second override to log at a high sensitivity.
5252

5353
The overrides must be set in that order. Otherwise, it will not work. This is because overrides are evaluated in order and will stop at the first override that matches both expression and sensitivity. Setting the overrides in the wrong order would cause the `Log` override at a high sensitivity to match all instances. As a result, Cloudflare will never evaluate the `Block` override that would be placed behind it, causing all rules to be set in `Log` mode.
5454

src/content/docs/learning-paths/data-center-protection/post-prefix-fine-tuning.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ On this page, you can find suggestions to monitor your prefix advertisements and
1313

1414
[These rules](/ddos-protection/managed-rulesets/adaptive-protection/) are based on a seven-day rolling window. We recommend reviewing the logs from these adaptive rules in Network Analytics seven days after your last prefix advertisement.
1515

16-
If you see matches for legitimate traffic, consider lowering the sensitivity of the rule and then review the logs again. Once you are satisfied that legitimate traffic is not being flagged, [create a DDoS override](/ddos-protection/managed-rulesets/network/configure-dashboard/#create-a-ddos-override) for this rule with action as `DDOS Dynamic` or `Block`.
16+
If you see matches for legitimate traffic, consider lowering the sensitivity of the rule and then review the logs again. Once you are satisfied that legitimate traffic is not being flagged, [create a DDoS override](/ddos-protection/managed-rulesets/network/network-overrides/configure-dashboard/#create-a-ddos-override) for this rule with action as `DDOS Dynamic` or `Block`.
1717

1818
### Advanced TCP Protection and Advanced DNS Protection
1919

src/content/docs/learning-paths/data-center-protection/troubleshooting.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ If you suspect that Cloudflare mitigations might be dropping legitimate traffic
5050
3. In the **All traffic** tab select **Add filter** to configure the filters for the traffic-flow in question — like source IP, destination IP and protocol/ports.
5151
4. Check the analytics results to determine which Cloudflare mitigation system has dropped the traffic — for example, DDoS Managed Rules, Advanced TCP/DNS Protection or Magic Firewall.
5252
5. If the traffic was dropped by DDoS Managed Rules:
53-
- Check whether the rule that dropped the traffic is customizable. If it is, go to [DDoS Overrides](/ddos-protection/managed-rulesets/network/configure-dashboard/#create-a-ddos-override). There, you can create/amend an existing override to ensure that this endpoint IP is added to the override with a lower sensitivity applied.
53+
- Check whether the rule that dropped the traffic is customizable. If it is, go to [DDoS Overrides](/ddos-protection/managed-rulesets/network/network-overrides/configure-dashboard/#create-a-ddos-override). There, you can create/amend an existing override to ensure that this endpoint IP is added to the override with a lower sensitivity applied.
5454
- If this rule is not customizable and is part of Cloudflare's always-on standard DDoS mitigations, reach out to Cloudflare support team to request for assistance on this.
5555
6. If the traffic was dropped by Advanced TCP Protection (ATP):
5656
- If the mode for the global rule is **Mitigation** you can set up a filter for `monitoring` so that ATP will not drop traffic for this particular traffic flow.

src/content/docs/ruleset-engine/managed-rulesets/override-managed-ruleset.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,8 @@ If you are using Terraform, refer to the following pages:
1919
To define overrides in the Cloudflare dashboard, refer to the following resources:
2020

2121
- [Configure a WAF managed ruleset in the dashboard](/waf/managed-rules/deploy-zone-dashboard/#configure-a-managed-ruleset)
22-
- [Configure HTTP DDoS Attack Protection in the dashboard](/ddos-protection/managed-rulesets/http/configure-dashboard/)
23-
- [Configure Network-layer DDoS Attack Protection in the dashboard](/ddos-protection/managed-rulesets/network/configure-dashboard/)
22+
- [Configure HTTP DDoS Attack Protection in the dashboard](/ddos-protection/managed-rulesets/http/http-overrides/configure-dashboard/)
23+
- [Configure Network-layer DDoS Attack Protection in the dashboard](/ddos-protection/managed-rulesets/network/network-overrides/configure-dashboard/)
2424

2525
## Working with overrides
2626

src/content/docs/ruleset-engine/reference/phases-list.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ The following tables list the [phases](/ruleset-engine/about/phases/) of Cloudfl
1515

1616
| Phase name | Used in product/feature |
1717
| ---------------- | ------------------------------------------------------------------------------------------------ |
18-
| `ddos_l4` | [Network-layer DDoS Attack Protection](/ddos-protection/managed-rulesets/network/configure-api/) |
18+
| `ddos_l4` | [Network-layer DDoS Attack Protection](/ddos-protection/managed-rulesets/network/network-overrides/configure-api/) |
1919
| `magic_transit` | [Magic Firewall](/magic-firewall/how-to/add-rules/) |
2020
| `mt_managed` | [Magic Firewall managed rulesets](/magic-firewall/how-to/enable-managed-rulesets/) |
2121
| `mt_ids_managed` | [Magic Firewall Intrusion Detection System (IDS)](/magic-firewall/about/ids/) |

src/content/docs/security/rules.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,8 @@ The **DDoS Protection** tab shows the multiple DDoS mitigation services provided
4545

4646
To learn more about DDoS protection overrides, refer to the following resources:
4747

48-
- [HTTP DDoS attack protection overrides](/ddos-protection/managed-rulesets/http/override-expressions/)
49-
- [Network-layer DDoS attack protection overrides](/ddos-protection/managed-rulesets/network/override-expressions/)
48+
- [HTTP DDoS attack protection overrides](/ddos-protection/managed-rulesets/http/http-overrides/override-expressions/)
49+
- [Network-layer DDoS attack protection overrides](/ddos-protection/managed-rulesets/network/network-overrides/override-expressions/)
5050

5151
:::note
5252
You define overrides for the Network-layer DDoS attack protection managed ruleset at the account level in Account Home > **L3/4 DDoS** > **Network-layer DDoS Protection**.

src/content/docs/security/settings.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,8 @@ The **DDoS protection** security module shows the multiple DDoS mitigation servi
3434

3535
To learn more about DDoS protection overrides, refer to the following resources:
3636

37-
- [HTTP DDoS attack protection overrides](/ddos-protection/managed-rulesets/http/override-expressions/)
38-
- [Network-layer DDoS attack protection overrides](/ddos-protection/managed-rulesets/network/override-expressions/)
37+
- [HTTP DDoS attack protection overrides](/ddos-protection/managed-rulesets/http/http-overrides/override-expressions/)
38+
- [Network-layer DDoS attack protection overrides](/ddos-protection/managed-rulesets/network/network-overrides/override-expressions/)
3939

4040
:::note
4141
You define overrides for the Network-layer DDoS attack protection managed ruleset at the account level in Account Home > **L3/4 DDoS** > **Network-layer DDoS Protection**.

src/content/docs/terraform/additional-configurations/ddos-managed-rulesets.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,8 @@ DDoS managed rulesets are always enabled. Depending on your Cloudflare services,
2121

2222
If you are using the Cloudflare API, refer to the following resources:
2323

24-
- [Configure HTTP DDoS Attack Protection via API](/ddos-protection/managed-rulesets/http/configure-api/)
25-
- [Configure Network-layer DDoS Attack Protection via API](/ddos-protection/managed-rulesets/network/configure-api/)
24+
- [Configure HTTP DDoS Attack Protection via API](/ddos-protection/managed-rulesets/http/http-overrides/configure-api/)
25+
- [Configure Network-layer DDoS Attack Protection via API](/ddos-protection/managed-rulesets/network/network-overrides/configure-api/)
2626

2727
For more information on deploying and configuring rulesets using the Rulesets API, refer to [Work with managed rulesets](/ruleset-engine/managed-rulesets/) in the Ruleset Engine documentation.
2828

src/content/partials/ddos-protection/managed-rulesets/create-override.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ import { Details, Render } from "~/components"
88
2. Go to Account Home > **L3/4 DDoS** > **Network-layer DDoS Protection**.
99
3. Select **Deploy a DDoS override**.
1010
4. In **Set scope**, specify if you wish to apply the override to all incoming packets or to a subset of the packets.
11-
5. If you are creating an override for a subset of the incoming packets, define the [custom expression](/ddos-protection/managed-rulesets/network/override-expressions/) that matches the incoming packets you wish to target in the override, using either the Rule Builder or the Expression Editor.
11+
5. If you are creating an override for a subset of the incoming packets, define the [custom expression](/ddos-protection/managed-rulesets/network/network-overrides/override-expressions/) that matches the incoming packets you wish to target in the override, using either the Rule Builder or the Expression Editor.
1212
6. Select **Next**.
1313
7. Depending on what you wish to override, refer to the following sections (you can perform both configurations on the same override):
1414
<Details header="Configure all the rules in the ruleset (ruleset override)">

0 commit comments

Comments
 (0)