• Contact
  • Contact Us
  • Disclamer
  • Home 1
  • Home 2
  • Home 3
  • Privacy Policy
Thursday, July 3, 2025
How VPS - How to use/setup VPS
  • Login
  • Home
  • Management guides
    • Web servers software
      • Directadmin
      • Hocvps Script
      • Centmin Mod
      • CWP
      • Kloxo-MR
      • Plesk
    • Control Panels
    • Securing VPS/Servers
      • SSL Certificates
      • Upgrading
      • Authentication
  • Operating System
    • CentOS
    • Fedora
    • Debian
    • Linux
    • Arch
    • BSD
    • CoreOS
  • Reviews
  • Coupon
    • Domain Coupon
    • Hosting Coupon
No Result
View All Result
  • Home
  • Management guides
    • Web servers software
      • Directadmin
      • Hocvps Script
      • Centmin Mod
      • CWP
      • Kloxo-MR
      • Plesk
    • Control Panels
    • Securing VPS/Servers
      • SSL Certificates
      • Upgrading
      • Authentication
  • Operating System
    • CentOS
    • Fedora
    • Debian
    • Linux
    • Arch
    • BSD
    • CoreOS
  • Reviews
  • Coupon
    • Domain Coupon
    • Hosting Coupon
No Result
View All Result
How VPS - How to use/setup VPS
No Result
View All Result
Home VPS/Servers management guides

How to Configure Cloudflare Security Options

How VPS by How VPS
November 2, 2018
in VPS/Servers management guides
0
How to Configure Cloudflare Security Options
0
SHARES
163
VIEWS
Share on FacebookShare on Twitter

Contents

  1. Introduction
    1. Step 1: Accessing  security options
    2. Step 2 – Setting The Challenge Passage
    3. Step 3 – Configuring The Advanced DDoS Protection
  2. Conclusion
  3. Check out these top 3 CDN services:
    1. Was this article helpful?

Introduction

Cloudflare is a powerful distributed DNS and Content Delivery Network (CDN) services software that allows users to implement fast and secure websites without any extra work on the code or additional functionality on their site. Its an innovative platform built to serve one core purpose; accelerate and protect every website that uses it by acting as the reverse proxy. This incredible program offers many great features, with the Cloudflare Security option being the most important of them all.

The Cloudflare Security Suite provides multiple security settings that can be configured to boost the security of your website. The suite supports many options right from the DDoS protection to the fully integrated Web Application Firewall (WAF). This tutorial will help you activate the security options provided by Cloudflare to boost the performance and security of your web.

Ready? Let’s go!

Step 1: Accessing  security options

To access the security settings go to the Cloudflare Client Area and hit the Firewall button at the top ribbon:

How to Configure Cloudflare Security Options

Here the salient setting is the Security Level Cloudflare. This option is applied when an offending user is detected on your website and has 5 unique security levels.

How to Configure Cloudflare Security Options

These protection levels filter users differently using their IP reputation before presenting the challenge. The IP reputation of each user is computed using a built-in algorithm hosted on the Cloudflare end. The score for the IP reputation ranges between 0 and 100 and here is what each grade means:

  • HIGH: challenges every threat that scores greater than 0. At this level, all visitors that exhibit threatening behavior within the last fourteen days are challenged.
  • MEDIUM: Challenges each threat that scores more than 14. This option test both the most threatening and moderate threat visitors.
  • LOW: This setting ensures every threat greater that 24 is put to challenge. This security level ensures all the most threatening visitors are rigorously scrutinized.
  • ESSENTIALLY OFF: This challenges Threats that score more than 49. The settings challenge all the grievous offenders.  
  • I AM UNDER ATTACK: This is the last security level which comes in handy when your site is under a DDoS attack. The settings display a temporary placeholder for each individual visitor on your website for a short period of time. During this brief period, Cloudflare scrutinizes the activity of every visitor to determine if they are genuine users or are part of the DDoS attack.

How to Configure Cloudflare Security Options

The recommended setting for the security level is Medium. This value offers comprehensive security without causing any inconvenience to your website visitors.

Step 2 – Setting The Challenge Passage

The next step is configuring the Challenge Passage. This option allows you to stipulate how long your website visitor can go unchallenged by the human authentication check on your site. Pick a duration that suits your security needs the most.

How to Configure Cloudflare Security Options

Hit the Web Application Firewall (WAF) button. The WAF option  allows you to set the rules to safeguard your site from potential web vulnerabilities. Set the WAF option ON.

How to Configure Cloudflare Security Options

Next, go to  the Browser integrity check which is designed to evaluate HTTP headers to pinpoint threats from the browser used by your visitor. To activate this option set it ON.

How to Configure Cloudflare Security Options

Once you activate the Browser Integrity Check, click on the IP Firewall tab.

How to Configure Cloudflare Security Options

This will give you access to the Access Rule window. Here you can easily Block, Whitelist, or challenge IPs and leave a note where necessary.

How to Configure Cloudflare Security Options

Step 3 – Configuring The Advanced DDoS Protection

Setting the Advanced DDoS protection is another important security option. This setting offers optimal security when your website is under a distributed denial of service (DDoS) and Distributed reflector (DRDoS) attacks. These settings enable Cloudflare to stand as the first line of defense to your website regardless of the size or duration of the attack. It protects your website against the following attacks:

  • Layer ¾ attacks
  • SMURF attacks
  • ACK attacks
  • DNS amplification attacks
  • Layer 7 attacks

Access the Advanced DDoS Protection page and activate the option.

How to Configure Cloudflare Security Options

Conclusion

That’s all! You have successfully configured the most important Cloudflare security options for your website through your Cloudflare Client Area. By now your website is operating securely and should present fast and seamless browsing to your visitors.

Special Note: If you are looking to purchase a CDN service but are not yet sure which, we recommend that you consult our list of best CDN services of 2018.

 

Check out these top 3 CDN services:

0

Was this article helpful?

Submit
Previous Post

How To Prepare For Migration To Windows Server 2019

Next Post

10 Useful ‘locate’ Command Practical Examples for Linux Newbies

Next Post

10 Useful ‘locate’ Command Practical Examples for Linux Newbies

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

No Result
View All Result

Recent Post

Install Imagemagick on CentOS
CentOS

Install Imagemagick on CentOS

by How VPS
June 28, 2023
0

This is how I installed Imagemagick on a vanilla CentOS server Start off by installing the prerequisites yum install php-pear...

Read more
how to Check phpinfo

How to Check phpinfo of Hosting or VPS?

June 28, 2023
Failed to download metadata for repo 'appstream' on Centos 8

How to fix error: Failed to download metadata for repo ‘appstream’ on Centos 8

February 25, 2022
How to Fix MySQL Error "Plugin 'InnoDB' registration as a STORAGE ENGINE failed"?

How to Fix MySQL Error “Plugin ‘InnoDB’ registration as a STORAGE ENGINE failed”?

November 17, 2020
How to optimize Mysql or MariaDB

How to optimize Mysql or MariaDB

November 3, 2020

Recent News

  • Install Imagemagick on CentOS
  • How to Check phpinfo of Hosting or VPS?
  • How to fix error: Failed to download metadata for repo ‘appstream’ on Centos 8

Category

  • Arch
  • Authentication
  • Backups
  • BSD
  • Centmin Mod
  • CentOS
  • Control Panels
  • CoreOS
  • CWP
  • Debian
  • Directadmin
  • Encryption
  • Fedora
  • Firewalls
  • Hocvps Script
  • Hosting providers
  • Kloxo-MR
  • Linux
  • Mitigations
  • Operating System
  • Plesk
  • Reviews
  • Securing VPS/Servers
  • Security Patches
  • SSL Certificates
  • Uncategorized
  • Upgrading
  • VPS/Servers management guides
  • Vulnerability Detection
  • Web servers software
  • Webhosting Control Panel
  • About
  • Advertise
  • Careers
  • Contact

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Home
  • Management guides
    • Web servers software
      • Directadmin
      • Hocvps Script
      • Centmin Mod
      • CWP
      • Kloxo-MR
      • Plesk
    • Control Panels
    • Securing VPS/Servers
      • SSL Certificates
      • Upgrading
      • Authentication
  • Operating System
    • CentOS
    • Fedora
    • Debian
    • Linux
    • Arch
    • BSD
    • CoreOS
  • Reviews
  • Coupon
    • Domain Coupon
    • Hosting Coupon

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In