Create a rule
-
In the Cloudflare dashboard, go to the L3/4 DDoS protection page.
Go to DDoS Managed Rules -
Go to Advanced Protection > Advanced DNS Protection.
-
Select Create Advanced DNS Protection rule.
-
In Mode, select a mode for the rule.
-
Under Set scope, select a scope to determine the range of packets that will be affected by the rule.
-
Under Sensitivity, define the burst sensitivity, rate sensitivity, and profile sensitivity to determine when to initiate mitigation. 9. Select Deploy.
To create a SYN flood rule or an out-of-state TCP rule:
-
In the Cloudflare dashboard, go to the L3/4 DDoS protection page.
Go to DDoS Managed Rules -
Go to Advanced Protection > Advanced TCP Protection.
-
Depending on the rule you are creating, do one of the following:
- Under SYN Flood Protection, select Create SYN flood rule.
- Under Out-of-state TCP Protection, select Create out-of-state TCP rule.
-
In Mode, select a mode for the rule.
-
Under Set scope, select a scope for the rule. If you choose to apply the rule to a subset of incoming packets, select a region or a data center.
-
Under Sensitivity, define the burst sensitivity and rate sensitivity of the rule (by default, Medium). The sensitivity levels are based on the initially configured thresholds for your specific case.
-
Select Deploy.
To create a Programmable Flow Protection rule:
-
In the Cloudflare dashboard, go to the L3/4 DDoS protection page.
Go to DDoS Managed Rules -
Go to Advanced Protection > Programmable Flow Protection.
-
In General Settings, select a program. The chosen program must have a status of
success, indicating it has successfully compiled and passed verification. This field is required. -
In General Settings, select a mode for the rule. This field is required.
-
Under Set scope, optionally select a scope for the rule. If you choose to apply the rule to a subset of incoming packets, select a region or a data center. The default scope setting is global.
-
Under Set scope, optionally select a packet filter expression. If you choose to apply a rule to a subset of incoming packets, select the IP and UDP characteristics to filter on. The default setting applies a rule to all UDP packets.
-
Select Deploy.