You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/ddos-protection/frequently-asked-questions.mdx
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -110,7 +110,7 @@ These tools and attacks exploit different aspects of network protocols and behav
110
110
111
111
---
112
112
113
-
## Can I exclude a specific user agents from HTTP DDoS protection?
113
+
## Can I exclude specific user agents from HTTP DDoS protection?
114
114
115
115
Yes, you can create an [override](/ddos-protection/managed-rulesets/http/override-expressions/) and use the expression fields to match against HTTP requests with the user agent. There are a variety of [fields](/ddos-protection/managed-rulesets/http/override-expressions/#available-expression-fields) that you can use.
116
116
@@ -138,7 +138,7 @@ When SYN flood packets are highly randomized or indistinguishable from legitimat
138
138
139
139
## How does Cloudflare handle hyper-localized DDoS attacks that may aim to overwhelm a specific Point of Presence (PoP)?
140
140
141
-
Cloudflare uses a combination of intelligent traffic engineering, global anycast, and real-time, autonomous DDoS mitigation to handle hyper-localized DDoS attacks—even those that may temporarily exceed the capacity of a specific Point of Presence (PoP).
141
+
Cloudflare uses a combination of intelligent traffic engineering, global anycast, and real-time, autonomous DDoS mitigation to handle hyper-localized DDoS attacks — even those that may temporarily exceed the capacity of a specific Point of Presence (PoP).
142
142
143
143
### Global Anycast Network
144
144
@@ -154,7 +154,7 @@ Cloudflare uses real-time data and intelligence systems to make decisions about
154
154
155
155
#### Process
156
156
157
-
If a specific PoP becomes saturated or experiences attack traffic, Cloudflare's internal traffic engineering systems dynamically steer traffic across alternative paths using: traffic shaping, path-aware routing, and dynamic DNS responses
157
+
If a specific PoP becomes saturated or experiences attack traffic, Cloudflare's internal traffic engineering systems dynamically steer traffic across alternative paths using traffic shaping, path-aware routing, and dynamic DNS responses.
158
158
159
159
The system monitors CPU load, network congestion, and traffic type to make smart decisions about whether to reroute or throttle connections.
0 commit comments