diff --git a/src/content/docs/cloudflare-one/insights/logs/enable-logs.mdx b/src/content/docs/cloudflare-one/insights/logs/enable-logs.mdx index 766384c98cdd362..e8a18bdf972994b 100644 --- a/src/content/docs/cloudflare-one/insights/logs/enable-logs.mdx +++ b/src/content/docs/cloudflare-one/insights/logs/enable-logs.mdx @@ -5,6 +5,8 @@ sidebar: order: 9 --- +import { DashButton} from "~/components" + Email Security allows you to configure Logpush to send detection data to an endpoint of your choice. ## Enable detection logs @@ -23,12 +25,14 @@ Before you can enable audit logs for Email Security, you will have to enable log Once you have configured your destination, you can set up audit logs for user action: -1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/). -2. Select **Analytics & Logs** > **Logpush**. -3. Select **Audit logs**. +1. In the Cloudflare dashboard, go to the **Logpush** page. + + +2. Select your storage destination. +3. Select the three dots > **Edit**. 4. Under **Configure logpush job**: - - **Job name**: Enter the job name. - - **If logs match**: Select **Filtered logs**: + - **Job name**: Enter the job name, if it is not already prepopulated. + - **If logs match** > Select **Filtered logs**: - **Field**: Choose `ResourceType`. - **Operator**: Choose `starts with`. - **Value**: Enter `email_security`. diff --git a/src/content/docs/magic-firewall/how-to/create-rate-limiting-rules.mdx b/src/content/docs/magic-firewall/how-to/create-rate-limiting-rules.mdx index 323feffa39a14d1..4f9a9c2fb6663ab 100644 --- a/src/content/docs/magic-firewall/how-to/create-rate-limiting-rules.mdx +++ b/src/content/docs/magic-firewall/how-to/create-rate-limiting-rules.mdx @@ -7,6 +7,8 @@ sidebar: text: Beta --- +import { DashButton } from "~/components"; + Rate limiting rules (beta) allow you to manage incoming traffic to your network for specific locations. This guide will teach you how to create a rule for when incoming packets match, and in cases where your rate exceeds a certain value (in packets or bits). @@ -19,8 +21,10 @@ For Advanced Magic Firewall customers, rate limiting (beta) is available by requ To add a rule: -1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account. -2. On the sidebar, select **Magic Firewall** > **Rate limiting**. +1. In the Cloudflare dashboard, go to the **Magic Firewall** page. + + +2. On the sidebar, select **Rate limiting**. 3. Fill out the information for your new rule: - Select the **Field**: At the moment, you can only choose a [colo name](https://developers.cloudflare.com/ruleset-engine/rules-language/fields/magic-firewall/). - Select the **Operator**: Choose among **equals** or **is in**. @@ -31,8 +35,10 @@ To add a rule: To edit a rule: -1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account. -2. On the sidebar, select **Magic Firewall** > **Rate limiting**. +1. In the Cloudflare dashboard, go to the **Magic Firewall** page. + + +2. On the sidebar, select **Rate limiting**. 3. Locate the rule you want to edit in the list and select **View**. 4. Edit the rule with your changes and select **Add new rule**. @@ -40,8 +46,10 @@ To edit a rule: To delete an existing rule: -1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account. -2. On the sidebar, select **Magic Firewall** > **Rate limiting**. +1. In the Cloudflare dashboard, go to the **Magic Firewall** page. + + +2. On the sidebar, select **Rate limiting**. 3. Locate the rule you want to delete from the list. 4. From the end of the row, select **Delete**. 5. Select **Delete** again to confirm deletion. \ No newline at end of file diff --git a/src/content/docs/magic-firewall/how-to/enable-ids.mdx b/src/content/docs/magic-firewall/how-to/enable-ids.mdx index ef06a112b2c555b..dac0bb975f8df4e 100644 --- a/src/content/docs/magic-firewall/how-to/enable-ids.mdx +++ b/src/content/docs/magic-firewall/how-to/enable-ids.mdx @@ -8,7 +8,7 @@ head: content: Enable Intrusion Detection System (IDS) --- -import { TabItem, Tabs } from "~/components"; +import { TabItem, Tabs, DashButton } from "~/components"; Cloudflare's IDS takes advantage of the threat intelligence powered by our global network and extends the capabilities of the Cloudflare Firewall to monitor and protect your network from malicious actors. @@ -20,9 +20,10 @@ This feature is available for Advanced Magic Firewall users. For access, contact -1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select your account. -2. Select **Magic Firewall** > **IDS**. -3. Enable IDS. +1. In the Cloudflare dashboard, go to the **Magic Firewall** page. + + +2. Select **IDS** and turn on **IDS**. diff --git a/src/content/docs/magic-firewall/packet-captures/collect-pcaps.mdx b/src/content/docs/magic-firewall/packet-captures/collect-pcaps.mdx index 8306e36a567c2f8..e05ef578c23aa7d 100644 --- a/src/content/docs/magic-firewall/packet-captures/collect-pcaps.mdx +++ b/src/content/docs/magic-firewall/packet-captures/collect-pcaps.mdx @@ -5,7 +5,7 @@ sidebar: order: 3 --- -import { Details, GlossaryTooltip, TabItem, Tabs } from "~/components"; +import { Details, GlossaryTooltip, TabItem, Tabs, DashButton } from "~/components"; After a packet capture is requested and the capture is collected, the output is contained within one or more files in PCAP file format. Before starting a `full` type packet capture, you must first follow instructions for [configuring a bucket](/magic-firewall/packet-captures/pcaps-bucket-setup/). @@ -38,12 +38,16 @@ For help determining which data center to select for a packet capture, visit [ht -1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account. -2. Select **Magic Transit** or **Magic WAN**. -3. In **Captures**, select **Start a capture**. -4. Select the **Captures** tab > **Start a capture**. -5. Choose the type of capture you want to perform, and select **Next**. -6. Fill out the required fields to begin the capture and then select **Start**. +1. In the Cloudflare dashboard, go to the **Packet captures** page in Magic Transit or Magic WAN. + + To set up a packet capture in Magic Transit: + + To set up a packet capture in Magic WAN: + +2. In **Captures**, select **Start a capture**. +3. Select the **Captures** tab > **Start a capture**. +4. Choose the type of capture you want to perform, and select **Next**. +5. Fill out the required fields to begin the capture and then select **Start**. The main **Packet captures** page displays a list of captures. @@ -163,10 +167,13 @@ The response is a JSON body that contains the details of the job running to buil -1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account. -2. Select **Magic Transit** or **Magic WAN**. -3. In **Packet captures**, select **Start a capture**. -4. Select the **Captures** tab. +1. In the Cloudflare dashboard, go to the **Packet captures** page in Magic Transit or Magic WAN. + + To set up a packet capture in Magic Transit: + + To set up a packet capture in Magic WAN: +2. In **Packet captures**, select **Start a capture**. +3. Select the **Captures** tab. @@ -218,11 +225,14 @@ After your request finishes processing, you can download your packet captures. -1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account. -2. Select **Magic Transit** or **Magic WAN**. -3. In **Packet captures**, select **Start a capture**. -4. Select the **Captures** tab. -5. Locate your packet capture you want to download, and select **Download**. +1. In the Cloudflare dashboard, go to the **Packet captures** page in Magic Transit or Magic WAN. + + To set up a packet capture in Magic Transit: + + To set up a packet capture in Magic WAN: +2. In **Packet captures**, select **Start a capture**. +3. Select the **Captures** tab. +4. Locate your packet capture you want to download, and select **Download**. Packet captures are available to download when the **Status** displays **Success**. @@ -251,10 +261,13 @@ curl https://api.cloudflare.com/client/v4/accounts/{account_id}/pcaps/{pcap_id}/ -1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account. -2. Select **Magic Transit** or **Magic WAN**. -3. In **Packet captures**, select **Start a capture**. -4. Select the **Captures** tab. +1. In the Cloudflare dashboard, go to the **Packet captures** page in Magic Transit or Magic WAN. + + To set up a packet capture in Magic Transit: + + To set up a packet capture in Magic WAN: +2. In **Packet captures**, select **Start a capture**. +3. Select the **Captures** tab. The list of packet captures associated with your account displays. diff --git a/src/content/docs/magic-firewall/packet-captures/pcaps-bucket-setup.mdx b/src/content/docs/magic-firewall/packet-captures/pcaps-bucket-setup.mdx index d55e6df827607d2..647eb6c0cbf9784 100644 --- a/src/content/docs/magic-firewall/packet-captures/pcaps-bucket-setup.mdx +++ b/src/content/docs/magic-firewall/packet-captures/pcaps-bucket-setup.mdx @@ -5,7 +5,7 @@ sidebar: order: 2 --- -import { GlossaryTooltip, TabItem, Tabs } from "~/components"; +import { GlossaryTooltip, TabItem, Tabs, DashButton } from "~/components"; Before you can begin a full packet capture, you must first configure a bucket that Cloudflare can use to upload your files. Setting up a bucket is not required for sample packet captures. @@ -17,13 +17,16 @@ Learn how to set up a bucket for use with full packet captures. -1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account. -2. Select **Magic Transit** or **Magic WAN**. -3. From the **Packet captures** page, select the **Buckets** tab. -4. Select **Add a bucket**. -5. Under **Bucket configuration**, select a bucket service and select **Next**. -6. Enter the information related to your bucket for your service provider. -7. When you are done, select **Next**. +1. In the Cloudflare dashboard, go to the **Packet captures** page in Magic Transit or Magic WAN. + + To set up a bucket in Magic Transit: + + To set up a bucket in Magic WAN: +2. Select the **Buckets** tab. +3. Select **Add a bucket**. +4. Under **Bucket configuration**, select a bucket service and select **Next**. +5. Enter the information related to your bucket for your service provider. +6. When you are done, select **Next**. The **Prove ownership** step of the **Bucket configuration** displays. @@ -126,10 +129,13 @@ View a list of all buckets configured on your account. -1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account. -2. Select **Magic Transit** or **Magic WAN**. -3. In **Packet captures**, select **Start a capture**. -4. Select the **Buckets** tab. +1. In the Cloudflare dashboard, go to the **Packet captures** page in Magic Transit or Magic WAN. + + To set up a packet capture in Magic Transit: + + To set up a packet capture in Magic WAN: +2. In **Packet captures**, select **Start a capture**. +3. Select the **Buckets** tab. The list of buckets associated with your account displays. @@ -169,8 +175,11 @@ To start collecting packet captures with R2, you first need to configure it prop ### Create bucket and API token -1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account. -2. Select **R2** > **Create bucket**. +1. In the Cloudflare dashboard, go to the **R2** page. + + + +2. Select **Create bucket**. 3. Give your bucket a name > **Create bucket**. 4. Go to the R2 Overview page, and select **Manage R2 API Tokens**. 5. Select **Create API Token**. @@ -212,4 +221,4 @@ The [response](/api/resources/magic_transit/subresources/pcaps/subresources/owne ### Validate bucket ownership -Refer to the [Validate a bucket](#validate-a-bucket) API instructions for more details on the entire process to [validate your R2 bucket](/api/resources/magic_transit/subresources/pcaps/subresources/ownership/methods/validate/). When specifying the R2 destination for this validation, exclude the secret and access keys from the URL. +Refer to the [Validate a bucket](#validate-a-bucket) API instructions for more details on the entire process to [validate your R2 bucket](/api/resources/magic_transit/subresources/pcaps/subresources/ownership/methods/validate/). When specifying the R2 destination for this validation, exclude the secret and access keys from the URL. \ No newline at end of file