Skip to content

Commit e3829c6

Browse files
authored
[Spectrum, WAF] Add limitation (#29718)
1 parent c1bbf09 commit e3829c6

File tree

2 files changed

+8
-3
lines changed

2 files changed

+8
-3
lines changed

src/content/docs/spectrum/reference/limitations.mdx

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ description: Protocol-specific limitations for Spectrum applications.
55
products:
66
- spectrum
77
weight: 0
8-
98
---
109

1110
The following limitations apply to different protocols supported by Spectrum.
@@ -48,3 +47,9 @@ By default, Spectrum is configured to listen on all ports, which can raise conce
4847
When a TCP handshake is initiated to any port for a Spectrum IP, the handshake will always be completed. If there is a Spectrum application configured for the port, the connection will be proxied to origin. If no application is configured, the connection is immediately terminated and no origin connection will be opened.
4948

5049
Spectrum will only ever proxy traffic to an origin if there is a Spectrum application configured for that port.
50+
51+
## IP access control
52+
53+
Currently, [custom rules](/waf/custom-rules/) do not work with Spectrum applications. Use [IP Access rules](/waf/tools/ip-access-rules/) to allowlist, block, and challenge traffic for Spectrum applications based on the request's IP address, Autonomous System Number (ASN), or country.
54+
55+
Refer to [Configuration options](/spectrum/reference/configuration-options/#ip-access-rules) for more information.

src/content/docs/waf/tools/ip-access-rules/create.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,14 +11,14 @@ sidebar:
1111

1212
import { TabItem, Tabs, Steps, DashButton } from "~/components";
1313

14-
:::caution[Recommendation: Use custom rules instead]
14+
:::tip[Recommendation: Use custom rules instead]
1515
Cloudflare recommends that you create [custom rules](/waf/custom-rules/) instead of IP Access rules to perform IP-based or geography-based blocking (geoblocking).
1616
:::
1717

1818
<Tabs syncKey="dashNewNav"> <TabItem label="New dashboard" icon="rocket">
1919

2020
:::note
21-
IP Access Rules are only available in the new security dashboard if you have configured at least one IP access rule. Cloudflare recommends that you use [custom rules](/waf/custom-rules/) instead of IP Access Rules.
21+
IP Access Rules are only available in the new security dashboard if you have configured at least one IP access rule.
2222
:::
2323

2424
<Steps>

0 commit comments

Comments
 (0)