Learn how to utilize WAF managed rules to protect Jetpack.
Cloudflare and Jetpack for WordPress should require no additional configuration to operate together. However we do have some security features designed to protect your Jetpack installation, read on below to learn more.
Default Jetpack protection from Cloudflare
The Cloudflare WAF managed rule WP0007 protects the
xmlrpc.php file on all Cloudflare plans to allow only Jetpack to use the
xmlrpc.php?for=jetpack query string. Cloudflare does this by only allowing the IP range of Jetpack’s automation systems. As such, any attempt to access
xmlrpc.php?for=jetpack from an IP that is not a genuine Jetpack IP address will be blocked with a
HTTP 403 Forbidden message from Cloudflare. This in itself is nothing to worry about and improves the security of your website and does not affect the functionality of Jetpack whatsoever.
For more information about why this was originally implemented, take a look at our blog post on the subject:
Additional WAF managed rules that can impact Jetpack
There is a specific rule in Web Application Firewall (WAF) managed rules that if enabled will block Jetpack’s servers from administering your settings. The WAF managed rule “WP0002 - Block WordPress XML-RPC” rule is disabled by default, but when enabled it completely disables access to the
xmlrpc.php file. As such, we only recommend enabling this rule as an emergency measure if your
xmlrpc.php endpoint is being attacked.
For further guidance, please contact our Support team.