Cloudflare Docs
DDoS Protection
Edit this page
Give us feedback
Set theme to dark (⇧+D)

Rule categories

The main categories (or tags) of Network-layer DDoS Attack Protection managed rules are the following:

greRules for DDoS attacks over Generic Routing Encapsulation (GRE) that usually target GRE endpoints.
espRules for DDoS attacks related to the Encapsulating Security Payload (ESP) protocol, which is part of the IPsec secure network protocol suite.
advancedRules related to features available to Enterprise customers, such as Adaptive DDoS Protection.
genericRules for detecting and mitigating floods of packets. These rules are useful for mitigating attacks that have no known signatures, but they may also trigger on unusually high volumes of legitimate traffic. To reduce the risk of false positives, their packet per second (pps) activation threshold is higher. These rules rate-limit traffic by default, but you can override them to block traffic if necessary.
read-onlyHighly targeted rules for mitigating DDoS attacks with a high confidence rate. These rules are read-only — you cannot override their sensitivity level or action.
testRules used for testing the detection, mitigation, and alerting capabilities of Cloudflare’s DDoS protection products.

There are other rule categories based on the attack vector/protocol, such as dns, quic, and sip. The categories list is dynamic and may change over time.