Cloudflare Docs
Magic Network Monitoring
Edit this page on GitHub
Set theme to dark (⇧+D)

Magic Transit integration

Magic Transit On Demand customers can use Magic Network Monitoring to analyze their network traffic and detect DDoS attacks while Magic Transit is disabled. If an attack is detected, customers can automatically or manually enable Magic Transit to mitigate DDoS attacks.

Customers can create Magic Network Monitoring rules which will monitor specific IP prefixes for DDoS attacks. When a DDoS attack is detected, Cloudflare will notify you by email, webhook, or PagerDuty with information about the attack. Then, you can choose to automatically activate IP advertisement and enable Magic Transit to protect the targeted IP prefixes from DDoS attacks. This feature is referred to as auto-advertisement, and you can enable it for individual Magic Network Monitoring rules via the dashboard or API.

After Magic Transit is activated and your traffic is flowing through Cloudflare, malicious DDoS traffic will be blocked, and your origin servers will only receive clean network traffic via IPsec or GRE tunnels.

The diagrams below illustrate this process:

The diagram shows the flow of traffic when you send flow data from your network to Cloudflare for analysis.

Cloudflare automatically notifies you when we detect an attack based on your flow data.

You can create rules to activate Magic Transit automatically, to protect your IP addresses from a DDoS atack.

​​ Activate IP auto-advertisement

You need to enable IP auto-advertisement in order to use Magic Network Monitoring rules. You can activate IP auto-advertisement via the dashboard or the API.

​​ Dashboard

To activate IP advertisement via the Cloudflare dashboard, refer to Configure dynamic advertisement.

​​ API

To activate IP advertisement via the API, refer to the IP Address Management Dynamic Advertisement API.

​​ Magic Network Monitoring rules

To create Magic Network Monitoring rules with auto-advertisement, refer to Rule Auto-Advertisement.