Skip to content
Cloudflare Docs

Magic Network Monitoring

With Magic Transit On Demand, you can use Magic Network Monitoring to analyze your network traffic and detect Distributed Denial of Service (DDoS) attacks while Magic Transit is disabled. If an attack is detected, you can automatically or manually enable Magic Transit to mitigate DDoS attacks.

You can create Magic Network Monitoring rules which monitor specific IP prefixes for DDoS attacks. When a DDoS attack is detected, Cloudflare notifies you by email, webhook, or PagerDuty with information about the attack. Then, you can automatically activate IP advertisement and enable Magic Transit to protect the targeted IP prefixes from DDoS attacks. This feature is referred to as auto-advertisement, and you can enable it for individual Magic Network Monitoring rules through the dashboard or API.

After Magic Transit is activated and your traffic is flowing through Cloudflare, Cloudflare blocks malicious DDoS traffic, and your origin servers receive only clean network traffic through IPsec or GRE tunnels.

The following diagrams illustrate this process:

The diagram shows the flow of traffic when you send flow data from your network to Cloudflare for analysis.

Cloudflare automatically notifies you when Cloudflare detects an attack based on your flow data.

You can create rules to activate Magic Transit automatically, to protect your IP addresses from a DDoS attack.

Activate IP auto-advertisement

Enable IP auto-advertisement to use Magic Network Monitoring rules. You can activate IP auto-advertisement through the dashboard or the API.

Dashboard

To activate IP advertisement through the Cloudflare dashboard, refer to Configure dynamic advertisement.

API

To activate IP advertisement through the API, refer to the IP Address Management Dynamic Advertisement API.

Magic Network Monitoring rules

To create Magic Network Monitoring rules with auto-advertisement, refer to Rule Auto-Advertisement.