Skip to content
Firewall
Visit Firewall on GitHub
Set theme to dark (⇧+D)

Actions

Overview

Actions tell Cloudflare how to handle HTTP requests that have matched a firewall rule expression.

Supported Actions

The table below lists the actions available in Firewall Rules. These actions are listed in order of precedence. If the same request matches two different rules which have the same priority, precedence determines the action to take.

For example, the Allow action takes precedence over the Block action. In a case where a request matches a rule with the Allow action and another with the Block action, precedence resolves the tie, and Cloudflare allows the request.

The only exception to this behavior involves the Log action. Unlike the other actions, Log does not terminate further evaluation within Firewall Rules. This means that if a request matches two different rules and one of those rules specifies the Log action, the second action will be triggered instead, even though Log has precedence. Although Firewall Rules would not trigger the Log action in this case, Firewall Analytics would still record the hit as an “additional match.”

ActionDescriptionOrder of Precedence
Log
  • Records matching requests in the Cloudflare Logs
  • Only available for Enterprise plans
  • Recommended for validating rules before committing to a more severe action
1
Bypass
  • Allows user to dynamically disable Cloudflare security features for a request
  • Available to all plans
  • Matching requests exempt from evaluation by a user-defined list containing one or more of the following Cloudflare Firewall products/features:
    • User-agent Blocking
    • Browser Integrity Check
    • Hotlinking Protection
    • Security Level (IP Reputation)
    • Rate Limiting
    • Zone Lockdown (PRO, BIZ, ENT)
    • WAF Managed Rules (PRO, BIZ, ENT)
  • Requests which match the Bypass action are still subject to evaluation (and thus a challenge or block) within Firewall Rules, based on the order of execution.
2
Allow
  • Matching requests are exempt from challenge and block actions triggered by other Firewall Rules content.
  • The scope of the Allow action is limited to Firewall Rules; matching requests are not exempt from action by other Cloudflare Firewall products, such as IP Access Rules, WAF, etc.
  • Matched requests will be mitigated if they are part of a DDoS attack.
3
Challenge (Captcha)
  • Useful for ensuring that the visitor accessing the site is human, not automated
  • The client that made the request must pass a Captcha Challenge.
  • If successful, Cloudflare accepts the matched request; otherwise, it is blocked.
4
JS Challenge
  • Useful for ensuring that bots and spam cannot access the requested resource; browsers, however, are free to satisfy the challenge automatically.
  • The client that made the request must pass a Cloudflare JavaScript Challenge before proceeding.
  • If successful, Cloudflare accepts the matched request; otherwise, it is blocked.
5
BlockMatching requests are denied access to the site.6

Choosing Actions in the Rule Builder

Choosing an action in the Cloudflare Expression Builder is simple. After naming a rule and building your expression, pick the appropriate option from the Choose an action drop-down list. In this example, the chosen action is Block:

Create Firewall Rule page

For more on building firewall rules in the Firewall App, see Create, edit, and delete rules.