Skip to content

Commit 0bedb83

Browse files
pedrosousasdnts
authored andcommitted
[Docs] Update geolocation references (cloudflare#22548)
1 parent b17e361 commit 0bedb83

File tree

8 files changed

+16
-18
lines changed

8 files changed

+16
-18
lines changed

src/content/docs/client-ip-geolocation/about/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Because our cell list includes Designated Market Areas in the United States, you
3838

3939
## Example scenario
4040

41-
Jane is a Cloudflare WARP user in Glendive, Montana, USA. She is interested in the privacy benefits of using a VPN. Her client IP address is `108.59.112.0`, which is owned by [Mid-Rivers Telephone Cooperative](https://bgp.he.net/AS11961) and geolocates to 47.0984,-104.7275 (with a location accuracy of 50km using MaxMind’s GeoIP service).
41+
Jane is a Cloudflare WARP user in Glendive, Montana, USA. She is interested in the privacy benefits of using a VPN. Her client IP address is `108.59.112.0`, which is owned by [Mid-Rivers Telephone Cooperative](https://bgp.he.net/AS11961) and geolocates to 47.0984,-104.7275, approximately.
4242

4343
![Diagram of how Cloudflare reports accurate location information over VPN](~/assets/images/client-ip-geolocation/client-ip-geolocation-example.png)
4444

src/content/docs/cloudflare-one/insights/dex/tests/traceroute.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ A traceroute test measures the following data:
5353
| Number of hops | Number of routers encountered between the device and the target. |
5454
| Packet loss | Percentage of IP packets that failed to receive a response. |
5555
| Availability | Percentage of tests where at least one packet reached the destination. |
56-
| Last seen ISP | The Internet Service Provider that is managing the connection from the device to Cloudflare. (Only available on macOS and Windows.) <br/> <br/> DEX looks up the IP address of the ISP in the [MaxMind GeoIP2 database](https://www.maxmind.com/en/geoip2-services-and-databases) and returns the corresponding [ASO and ASN](https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/). If the ASO and ASN are `Unknown`, it means this information is unavailable in MaxMind. |
56+
| Last seen ISP | The Internet Service Provider that is managing the connection from the device to Cloudflare. (Only available on macOS and Windows.) <br/> <br/> DEX looks up the IP address of the ISP in a geolocation database and returns the corresponding [ASO and ASN](https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/). If the ASO and ASN are `Unknown`, it means this information is unavailable in the geolocation data provider. |
5757

5858
## Related resources
5959

src/content/docs/load-balancing/understand-basics/traffic-steering/steering-policies/index.mdx

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ import { DirectoryListing, GlossaryTooltip, Render } from "~/components"
2121

2222
Customers can configure their load balancer using the `location_strategy` parameter, which includes the properties `prefer_ecs` and `mode`.
2323

24-
`prefer_ecs` determines whether the ECS GeoIP should be preferred as the authoritative location.
24+
`prefer_ecs` determines whether the ECS geolocation should be preferred as the authoritative location.
2525

2626
| Type | Description |
2727
| ------------- | --------------------------------------------------------------------------------------- |
@@ -30,17 +30,15 @@ Customers can configure their load balancer using the `location_strategy` parame
3030
| `"proximity"` | Prefers ECS only when `steering_policy="proximity"`. |
3131
| `"geo"` | Prefers ECS only when `steering_policy="geo"` and only supports country-level steering. |
3232

33-
`mode` determines the authoritative location when ECS is not preferred, does not exist in the request, or its GeoIP lookup is unsuccessful.
33+
`mode` determines the authoritative location when ECS is not preferred, does not exist in the request, or its geolocation lookup is unsuccessful.
3434

35-
| Type | Description |
36-
| --------------- | --------------------------------------------------------------------------------------------------------------- |
37-
| `"pop"` | Uses the Cloudflare PoP location. |
38-
| `"resolver_ip"` | Uses the DNS resolver GeoIP location. If the GeoIP lookup is unsuccessful, it uses the Cloudflare PoP location. |
35+
| Type | Description |
36+
| --------------- | ----------------------------------------------------------------------------------------------------------------------- |
37+
| `"pop"` | Uses the Cloudflare PoP location. |
38+
| `"resolver_ip"` | Uses the DNS resolver geolocation data. If the geolocation lookup is unsuccessful, it uses the Cloudflare PoP location. |
3939

4040
:::note
4141

42-
4342
ECS support applies to DNS-only load balancers.
4443

45-
4644
:::

src/content/docs/magic-firewall/best-practices/minimal-ruleset.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,6 @@ The list below is a common list of traffic types you should also consider blocki
7070
* HTTP and HTTPS
7171
* If you only have servers on your Magic Transit prefixes, consider blocking ingress traffic on TCP source ports 80 and 443 from outside. If you have endpoints on your Magic Transit prefixes, you can allow traffic on the source ports but consider creating a disabled rule you can activate to respond to reflection attacks as needed.
7272

73-
If relevant to your environment, consider blocking based on GeoIP, which blocks traffic based on the country or user when an end user's IP address is registered in the GeoIP database.
73+
If relevant to your environment, consider blocking based on geolocation data, which blocks traffic based on the country or user when an end user's IP address is registered in the geolocation database.
7474

7575
If you are interested in participating in the beta for [Session Initiation Protocol (SIP) Validation](https://blog.cloudflare.com/programmable-packet-filtering-with-magic-firewall/), contact your Implementation Manager.

src/content/docs/magic-firewall/how-to/add-rules.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ curl https://api.cloudflare.com/client/v4/accounts/{account_id}/rulesets \
100100
"rules": [
101101
{
102102
"action": "block",
103-
"expression": "ip.geoip.country == \"BR\"",
103+
"expression": "ip.src.country == \"BR\"",
104104
"description": "Block traffic from Brazil"
105105
}
106106
]

src/content/docs/network/ip-geolocation.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ import { FeatureTable, TabItem, Tabs } from "~/components";
88

99
IP geolocation adds the [`CF-IPCountry` header](/fundamentals/reference/http-headers/#cf-ipcountry) to all requests to your origin server.
1010

11-
Cloudflare automatically updates its IP geolocation database using MaxMind and other data sources, typically twice a week.
11+
Cloudflare automatically updates its IP geolocation database from several data sources, typically twice a week.
1212

1313
## Availability
1414

@@ -25,8 +25,8 @@ If you only want the request header for the visitor's country, you can enable **
2525
To enable **IP Geolocation** in the dashboard:
2626

2727
1. Log in to your [Cloudflare account](https://dash.cloudflare.com) and go to a specific domain.
28-
2. Go to **Network**.
29-
3. For **IP Geolocation**, switch the toggle to **On**.
28+
2. Go to **Network**.
29+
3. For **IP Geolocation**, switch the toggle to **On**.
3030

3131
</TabItem> <TabItem label="API">
3232

@@ -46,5 +46,5 @@ In order to use this data, you will need to then retrieve it from the [`CF-IPCou
4646

4747
If you find an incorrect IP location, consider the following:
4848

49-
- If the IP is part of the [current Cloudflare IP ranges](https://www.cloudflare.com/ips/), report to `geoip@cloudflare.com`.
49+
- If the IP is part of the [current Cloudflare IP ranges](https://www.cloudflare.com/ips/), report to `ip-corrections@cloudflare.com`.
5050
- If the IP is **not** listed within the [current Cloudflare IP ranges](https://www.cloudflare.com/ips/), [report to MaxMind](https://www.maxmind.com/en/geoip-data-correction-request).

src/content/docs/radar/investigate/url-scanner.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ Some examples of more specific properties include:
106106
* `meta.processors.radarRank` - [Cloudflare Radar Rank](http://blog.cloudflare.com/radar-domain-rankings/) of the main hostname contacted.
107107
* `meta.processors.wappa` - The kind of technologies detected as being in use by the website, with the help of [Wappalyzer](https://github.com/Lissy93/wapalyzer).
108108
* `page.url` - URL of the primary request, after all HTTP redirects.
109-
* `page.country` - GeoIP country name of the main IP address contacted.
109+
* `page.country` - Country name from geolocation data associated with the main IP address contacted.
110110
* `page.history` - Main page history, including any HTTP redirects.
111111
* `page.screenshot` - Various hashes of the main screenshot. Can be used to search for sites with similar screenshots.
112112
* `page.domStructHash` - HTML structure hash. Use it to search for sites with similar structure.

src/content/docs/reference-architecture/architectures/load-balancing.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -315,7 +315,7 @@ Proximity steering is a traffic steering algorithm available to enterprise plan
315315
Cloudflare determines the requester’s physical location using the following methods, in this order:
316316

317317
1. [EDNS Client Subnet](https://developers.google.com/speed/public-dns/docs/ecs) information, if provided in the DNS request
318-
2. GeoIP information of the resolver used to reach Cloudflare
318+
2. Geolocation information of the resolver used to reach Cloudflare
319319
3. GPS location of the Cloudflare data center handling the request
320320

321321
Proximity steering requires providing GPS coordinates for all endpoint pools, allowing Cloudflare to calculate the closest endpoint pool based on the requesting IP, DNS resolver, or Cloudflare data center.

0 commit comments

Comments
 (0)