{"id":4362,"date":"2026-02-03T15:48:11","date_gmt":"2026-02-03T12:48:11","guid":{"rendered":"https:\/\/www.dchost.com\/blog\/cloudflare-dns-ve-ssl-ayarlarini-dogru-yapmak\/"},"modified":"2026-02-03T15:48:11","modified_gmt":"2026-02-03T12:48:11","slug":"cloudflare-dns-ve-ssl-ayarlarini-dogru-yapmak","status":"publish","type":"post","link":"https:\/\/www.dchost.com\/blog\/cloudflare-dns-ve-ssl-ayarlarini-dogru-yapmak\/","title":{"rendered":"Cloudflare DNS ve SSL Ayarlar\u0131n\u0131 Do\u011fru Yapmak"},"content":{"rendered":"<div class=\"dchost-blog-content-wrapper\"><div id=\"toc_container\" class=\"toc_transparent no_bullets\"><p class=\"toc_title\">\u0130&ccedil;indekiler<\/p><ul class=\"toc_list\"><li><a href=\"#Cloudflare_DNS_ve_SSL_Ayarlarini_Dogru_Yapmak_Neden_Bu_Kadar_Onemli\"><span class=\"toc_number toc_depth_1\">1<\/span> Cloudflare DNS ve SSL Ayarlar\u0131n\u0131 Do\u011fru Yapmak Neden Bu Kadar \u00d6nemli?<\/a><\/li><li><a href=\"#Cloudflare_DNS_Mantigi_Proxy_Orange_Cloud_ve_DNS_Only_Farki\"><span class=\"toc_number toc_depth_1\">2<\/span> Cloudflare DNS Mant\u0131\u011f\u0131: Proxy (Orange Cloud) ve DNS Only Fark\u0131<\/a><ul><li><a href=\"#Orange_Cloud_Proxy_Tam_Olarak_Ne_Yapar\"><span class=\"toc_number toc_depth_2\">2.1<\/span> Orange Cloud (Proxy) Tam Olarak Ne Yapar?<\/a><\/li><li><a href=\"#Hangi_Kayitlar_Orange_Cloud_Olmali\"><span class=\"toc_number toc_depth_2\">2.2<\/span> Hangi Kay\u0131tlar Orange Cloud Olmal\u0131?<\/a><\/li><li><a href=\"#Hangi_Kayitlar_Asla_Proxy_Olmamali_EPosta_ve_Diger_Protokoller\"><span class=\"toc_number toc_depth_2\">2.3<\/span> Hangi Kay\u0131tlar Asla Proxy Olmamal\u0131? (E\u2011Posta ve Di\u011fer Protokoller)<\/a><\/li><\/ul><\/li><li><a href=\"#Cloudflare_Uzerinde_Dogru_DNS_Kurulumu_Adim_Adim\"><span class=\"toc_number toc_depth_1\">3<\/span> Cloudflare \u00dczerinde Do\u011fru DNS Kurulumu: Ad\u0131m Ad\u0131m<\/a><ul><li><a href=\"#www_ve_Kok_Alan_Adi_Root_Icin_DNS_Tasarimi\"><span class=\"toc_number toc_depth_2\">3.1<\/span> www ve K\u00f6k Alan Ad\u0131 (Root) \u0130\u00e7in DNS Tasar\u0131m\u0131<\/a><\/li><li><a href=\"#Alt_Alan_Adlari_panel_api_cdn_static8230\"><span class=\"toc_number toc_depth_2\">3.2<\/span> Alt Alan Adlar\u0131: panel, api, cdn, static&#8230;<\/a><\/li><li><a href=\"#EPosta_Icin_MX_ve_Ilgili_Kayitlar\"><span class=\"toc_number toc_depth_2\">3.3<\/span> E\u2011Posta \u0130\u00e7in MX ve \u0130lgili Kay\u0131tlar<\/a><\/li><\/ul><\/li><li><a href=\"#Cloudflare_SSL_Modlari_Off_Flexible_Full_ve_Full_Strict\"><span class=\"toc_number toc_depth_1\">4<\/span> Cloudflare SSL Modlar\u0131: Off, Flexible, Full ve Full (Strict)<\/a><ul><li><a href=\"#Full_Strict_Icin_Sunucuda_Neler_Gerekli\"><span class=\"toc_number toc_depth_2\">4.1<\/span> Full (Strict) \u0130\u00e7in Sunucuda Neler Gerekli?<\/a><\/li><li><a href=\"#HTTPden_HTTPSe_Gecis_301_Yonlendirme_ve_HSTS\"><span class=\"toc_number toc_depth_2\">4.2<\/span> HTTP\u2019den HTTPS\u2019e Ge\u00e7i\u015f, 301 Y\u00f6nlendirme ve HSTS<\/a><\/li><\/ul><\/li><li><a href=\"#EPosta_DNS_Kayitlari_ve_Cloudflare_MX_SPF_DKIM_DMARC\"><span class=\"toc_number toc_depth_1\">5<\/span> E\u2011Posta DNS Kay\u0131tlar\u0131 ve Cloudflare: MX, SPF, DKIM, DMARC<\/a><ul><li><a href=\"#MX_Kayitlari_Gidis_ve_Gelis_Trafiginin_Ana_Kapisi\"><span class=\"toc_number toc_depth_2\">5.1<\/span> MX Kay\u0131tlar\u0131: Gidi\u015f ve Geli\u015f Trafi\u011finin Ana Kap\u0131s\u0131<\/a><\/li><li><a href=\"#SPF_Hangi_Sunucular_Adima_Mail_Gonderebilir\"><span class=\"toc_number toc_depth_2\">5.2<\/span> SPF: Hangi Sunucular Ad\u0131ma Mail G\u00f6nderebilir?<\/a><\/li><li><a href=\"#DKIM_Icerik_Butunlugu_ve_Sahtecilik_Karsiti_Imza\"><span class=\"toc_number toc_depth_2\">5.3<\/span> DKIM: \u0130\u00e7erik B\u00fct\u00fcnl\u00fc\u011f\u00fc ve Sahtecilik Kar\u015f\u0131t\u0131 \u0130mza<\/a><\/li><li><a href=\"#DMARC_SPF_ve_DKIM_Sonuclarina_Gore_Politika_Uygulamak\"><span class=\"toc_number toc_depth_2\">5.4<\/span> DMARC: SPF ve DKIM Sonu\u00e7lar\u0131na G\u00f6re Politika Uygulamak<\/a><\/li><li><a href=\"#Cloudflare_Uzerinde_Ornek_EPosta_DNS_Yapilandirmasi\"><span class=\"toc_number toc_depth_2\">5.5<\/span> Cloudflare \u00dczerinde \u00d6rnek E\u2011Posta DNS Yap\u0131land\u0131rmas\u0131<\/a><\/li><\/ul><\/li><li><a href=\"#Cloudflare_DCHost_Altyapisinda_Onerilen_En_Iyi_Uygulamalar\"><span class=\"toc_number toc_depth_1\">6<\/span> Cloudflare + DCHost Altyap\u0131s\u0131nda \u00d6nerilen En \u0130yi Uygulamalar<\/a><ul><li><a href=\"#Paylasimli_Hosting_veya_Reseller_Kullananlar_Icin\"><span class=\"toc_number toc_depth_2\">6.1<\/span> Payla\u015f\u0131ml\u0131 Hosting veya Reseller Kullananlar \u0130\u00e7in<\/a><\/li><li><a href=\"#VPS_Dedicated_veya_Colocation_Kullananlar_Icin\"><span class=\"toc_number toc_depth_2\">6.2<\/span> VPS, Dedicated veya Colocation Kullananlar \u0130\u00e7in<\/a><\/li><li><a href=\"#Cloudflare_DNS_mi_Hosting_DNSi_mi\"><span class=\"toc_number toc_depth_2\">6.3<\/span> Cloudflare DNS mi, Hosting DNS\u2019i mi?<\/a><\/li><\/ul><\/li><li><a href=\"#En_Sik_Yapilan_Hatalar_ve_Hizli_Kontrol_Listesi\"><span class=\"toc_number toc_depth_1\">7<\/span> En S\u0131k Yap\u0131lan Hatalar ve H\u0131zl\u0131 Kontrol Listesi<\/a><\/li><li><a href=\"#Sonuc_Cloudflare_DNS_ve_SSL_Ayarlarini_Stratejiyle_Yonetmek\"><span class=\"toc_number toc_depth_1\">8<\/span> Sonu\u00e7: Cloudflare DNS ve SSL Ayarlar\u0131n\u0131 Stratejiyle Y\u00f6netmek<\/a><\/li><\/ul><\/div>\n<h2><span id=\"Cloudflare_DNS_ve_SSL_Ayarlarini_Dogru_Yapmak_Neden_Bu_Kadar_Onemli\">Cloudflare DNS ve SSL Ayarlar\u0131n\u0131 Do\u011fru Yapmak Neden Bu Kadar \u00d6nemli?<\/span><\/h2>\n<p>Bir alan ad\u0131n\u0131 Cloudflare\u2019a ta\u015f\u0131y\u0131p birka\u00e7 tur <strong>orange cloud<\/strong> t\u0131klamas\u0131, SSL modunu \u201cFlexible\u201d yap\u0131p sayfan\u0131n ye\u015fil kilit g\u00f6stermesi \u00e7o\u011fu zaman ilk etapta \u201cher \u015fey \u00e7al\u0131\u015f\u0131yor\u201d hissi verir. Ancak sahada g\u00f6rd\u00fc\u011f\u00fcm\u00fcz vakalar\u0131n \u00f6nemli bir k\u0131sm\u0131 tam bu noktadan sonra ortaya \u00e7\u0131kan sorunlarla ilgili: Siteleriniz rastgele 522 hatas\u0131 vermeye ba\u015flar, e\u2011postalar\u0131n\u0131z spam klas\u00f6r\u00fcne d\u00fc\u015fer ya da hi\u00e7 ula\u015fmaz, baz\u0131 alt alan adlar\u0131 bir anda kaybolur. T\u00fcm bunlar\u0131n ortak nedeni neredeyse her zaman <strong>yanl\u0131\u015f Cloudflare DNS ve SSL konfig\u00fcrasyonu<\/strong>dur.<\/p>\n<p>Bu rehberde DCHost ekibi olarak y\u0131llard\u0131r sahada g\u00f6rd\u00fc\u011f\u00fcm\u00fcz tipik hatalar\u0131 ve bunlar\u0131n kal\u0131c\u0131 \u00e7\u00f6z\u00fcmlerini ad\u0131m ad\u0131m anlataca\u011f\u0131z. <strong>Orange cloud ne zaman a\u00e7\u0131lmal\u0131?<\/strong> Hangi DNS kay\u0131tlar\u0131 <strong>asla proxy olmamal\u0131?<\/strong> <strong>Full (Strict) SSL<\/strong> i\u00e7in sunucu taraf\u0131nda ne haz\u0131rlaman\u0131z gerekiyor? MX, SPF, DKIM ve DMARC gibi <strong>e\u2011posta DNS kay\u0131tlar\u0131n\u0131 Cloudflare\u2019da nas\u0131l do\u011fru y\u00f6netirsiniz?<\/strong> T\u00fcm bu sorulara net, uygulanabilir ve \u00f6rnekli cevaplar verece\u011fiz. Amac\u0131m\u0131z: Cloudflare\u2019\u0131 hem performans hem de g\u00fcvenlik taraf\u0131nda en verimli \u015fekilde kullanman\u0131z\u0131, ayn\u0131 zamanda web sitesi ve e\u2011posta altyap\u0131n\u0131z\u0131n <strong>kararl\u0131 ve \u00f6ng\u00f6r\u00fclebilir<\/strong> \u00e7al\u0131\u015fmas\u0131n\u0131 sa\u011flamak.<\/p>\n<h2><span id=\"Cloudflare_DNS_Mantigi_Proxy_Orange_Cloud_ve_DNS_Only_Farki\">Cloudflare DNS Mant\u0131\u011f\u0131: Proxy (Orange Cloud) ve DNS Only Fark\u0131<\/span><\/h2>\n<p>Cloudflare\u2019\u0131n klasik DNS sa\u011flay\u0131c\u0131lardan en b\u00fcy\u00fck fark\u0131, DNS kay\u0131tlar\u0131n\u0131z\u0131 ister yaln\u0131zca <strong>DNS sunucusu<\/strong> olarak kullanabilmeniz, ister ayn\u0131 zamanda <strong>HTTP\/HTTPS trafi\u011fini proxy etmesini<\/strong> sa\u011flayabilmenizdir. Bu iki davran\u0131\u015f\u0131n ayr\u0131m\u0131n\u0131, aray\u00fczdeki k\u00fc\u00e7\u00fck ama kritik bir ikon belirler: turuncu bulut (proxy) ve gri bulut (yaln\u0131zca DNS).<\/p>\n<h3><span id=\"Orange_Cloud_Proxy_Tam_Olarak_Ne_Yapar\">Orange Cloud (Proxy) Tam Olarak Ne Yapar?<\/span><\/h3>\n<p>Bir A\/AAAA veya CNAME kayd\u0131nda turuncu bulut a\u00e7\u0131ksa Cloudflare \u015fu \u015fekilde davran\u0131r:<\/p>\n<ul>\n<li>Ziyaret\u00e7i <strong>HTTP\/HTTPS<\/strong> iste\u011fini Cloudflare IP\u2019lerine g\u00f6nderir.<\/li>\n<li>Cloudflare, iste\u011fi kendi a\u011f\u0131 \u00fczerinde i\u015fler (WAF, cache, rate limit vb.).<\/li>\n<li>Arka tarafta (origin) sizin ger\u00e7ek sunucunuza ba\u011flan\u0131r.<\/li>\n<li>Cevab\u0131 \u00f6nbelle\u011fe alarak tekrar ziyaret\u00e7ilere da\u011f\u0131t\u0131r.<\/li>\n<\/ul>\n<p>Bu sayede:<\/p>\n<ul>\n<li>Ger\u00e7ek sunucu IP\u2019niz gizlenir (g\u00fcvenlik a\u00e7\u0131s\u0131ndan avantaj).<\/li>\n<li>CDN ve cache sayesinde <strong>performans art\u0131\u015f\u0131<\/strong> elde edersiniz.<\/li>\n<li>Cloudflare WAF ve DDoS korumas\u0131 devreye girer.<\/li>\n<\/ul>\n<p>Ancak bu proxy davran\u0131\u015f\u0131 sadece <strong>HTTP ve HTTPS trafi\u011fi<\/strong> i\u00e7in ge\u00e7erlidir. SMTP, IMAP, POP3, SFTP gibi di\u011fer protokoller Cloudflare \u00fczerinden ge\u00e7emez. Bu nedenle her kayd\u0131 turuncu yapmak ciddi sorunlara yol a\u00e7ar.<\/p>\n<h3><span id=\"Hangi_Kayitlar_Orange_Cloud_Olmali\">Hangi Kay\u0131tlar Orange Cloud Olmal\u0131?<\/span><\/h3>\n<p>Genel kural basit: <strong>Taray\u0131c\u0131 ile a\u00e7t\u0131\u011f\u0131n\u0131z her \u015fey<\/strong> turuncu olabilir. \u00d6rnekler:<\/p>\n<ul>\n<li><strong>www.example.com<\/strong> (web sitesi)<\/li>\n<li><strong>example.com<\/strong> k\u00f6k alan ad\u0131 (site k\u00f6kten a\u00e7\u0131l\u0131yorsa)<\/li>\n<li><strong>blog.example.com<\/strong>, <strong>shop.example.com<\/strong>, <strong>app.example.com<\/strong> gibi web uygulamas\u0131 alt alan adlar\u0131<\/li>\n<li>Statik i\u00e7erik servis eden <strong>cdn.example.com<\/strong> gibi alt alanlar<\/li>\n<\/ul>\n<p>Bu kay\u0131tlar\u0131n arkas\u0131nda DCHost \u00fczerindeki <a href=\"https:\/\/www.dchost.com\/tr\/web-hosting\">payla\u015f\u0131ml\u0131 hosting<\/a>, VPS, dedicated veya colocation sunucunuz olabilir. \u00d6nemli olan: <strong>o kay\u0131t ger\u00e7ekten sadece HTTP\/HTTPS servis ediyorsa<\/strong> turuncu bulut g\u00fcvenle a\u00e7\u0131labilir.<\/p>\n<h3><span id=\"Hangi_Kayitlar_Asla_Proxy_Olmamali_EPosta_ve_Diger_Protokoller\">Hangi Kay\u0131tlar Asla Proxy Olmamal\u0131? (E\u2011Posta ve Di\u011fer Protokoller)<\/span><\/h3>\n<p>Cloudflare\u2019da en s\u0131k g\u00f6rd\u00fc\u011f\u00fcm\u00fcz kritik hata, <strong>e\u2011posta ile ilgili kay\u0131tlar\u0131n turuncu yap\u0131lmas\u0131<\/strong>. A\u015fa\u011f\u0131daki kay\u0131tlar <strong>her zaman gri (DNS only)<\/strong> olmal\u0131d\u0131r:<\/p>\n<ul>\n<li><strong>MX<\/strong> kay\u0131tlar\u0131 (zaten proxy edilemez, ama i\u015faret etti\u011fi A kay\u0131tlar\u0131 \u00f6nemlidir)<\/li>\n<li><strong>mail.example.com<\/strong> (SMTP\/IMAP\/POP3 sunucusu)<\/li>\n<li><strong>smtp.example.com<\/strong>, <strong>imap.example.com<\/strong>, <strong>pop.example.com<\/strong><\/li>\n<li>SPF kayd\u0131nda referans verdi\u011finiz ve mail g\u00f6nderen sunucuya i\u015faret eden <strong>A\/CNAME<\/strong> kay\u0131tlar\u0131<\/li>\n<li>VoIP, SFTP, FTP, RDP vb. HTTP d\u0131\u015f\u0131 servisler<\/li>\n<\/ul>\n<p>Neden? \u00c7\u00fcnk\u00fc Cloudflare sadece HTTP\/HTTPS trafi\u011fini proxy eder. \u00d6rne\u011fin, MX kayd\u0131n\u0131z <strong>mail.example.com<\/strong>\u2019a i\u015faret ediyor ve bu A kayd\u0131 turuncu ise, gelen SMTP ba\u011flant\u0131lar\u0131 Cloudflare IP\u2019lerine gider. Cloudflare SMTP konu\u015fmas\u0131n\u0131 bilmedi\u011fi i\u00e7in ba\u011flant\u0131 reddedilir veya zaman a\u015f\u0131m\u0131na u\u011frar. Sonu\u00e7: <strong>E\u2011posta alamazs\u0131n\u0131z.<\/strong><\/p>\n<p>Benzer \u015fekilde SPF kayd\u0131n\u0131zda <code>a<\/code> veya <code>mx<\/code> mekanizmalar\u0131n\u0131 kullan\u0131yorsan\u0131z, bu hostlar\u0131n da do\u011fru IP\u2019yi d\u00f6nd\u00fcrmesi gerekir. Turuncu kay\u0131tlar Cloudflare IP\u2019si verdi\u011fi i\u00e7in SPF kontrol\u00fc kar\u015f\u0131 tarafta <strong>hatal\u0131 IP\u2019ye g\u00f6re<\/strong> yap\u0131l\u0131r ve SPF fail ile spam sorunu ya\u015fars\u0131n\u0131z. SPF taraf\u0131nda detayl\u0131 senaryolar i\u00e7in <a href=\"https:\/\/www.dchost.com\/blog\/gelismis-spf-yonetimi-10-dns-lookup-limitine-takilmadan-coklu-e-posta-servisi-kullanmak\/\">Geli\u015fmi\u015f SPF y\u00f6netimi ve 10 DNS lookup limitini a\u015fmadan \u00e7oklu e\u2011posta servisi kullanma rehberimize<\/a> mutlaka g\u00f6z at\u0131n.<\/p>\n<h2><span id=\"Cloudflare_Uzerinde_Dogru_DNS_Kurulumu_Adim_Adim\">Cloudflare \u00dczerinde Do\u011fru DNS Kurulumu: Ad\u0131m Ad\u0131m<\/span><\/h2>\n<p>DCHost \u00fczerinde bar\u0131nan bir sitenizi Cloudflare DNS\u2019e ta\u015f\u0131rken temel senaryo \u015fu \u015fekilde ilerler:<\/p>\n<ol>\n<li>Cloudflare hesab\u0131 a\u00e7\u0131l\u0131r, alan ad\u0131 eklenir.<\/li>\n<li>Cloudflare mevcut DNS kay\u0131tlar\u0131n\u0131 taray\u0131c\u0131 \u00fczerinden i\u00e7eri aktar\u0131r.<\/li>\n<li>Bu kay\u0131tlar DCHost panelinizle kar\u015f\u0131la\u015ft\u0131r\u0131l\u0131r, eksikler tamamlan\u0131r.<\/li>\n<li>Nameserver\u2019lar domain kay\u0131t firmas\u0131ndan Cloudflare\u2019\u0131n verdi\u011fi NS\u2019lere \u00e7evrilir.<\/li>\n<li>TTL ve proxy (turuncu\/gri) ayarlar\u0131 optimize edilir.<\/li>\n<\/ol>\n<p>Bu s\u00fcre\u00e7te <strong>DNS yay\u0131l\u0131m\u0131n\u0131<\/strong> ve TTL stratejilerini do\u011fru anlamak \u00e7ok kritik. \u201cDe\u011fi\u015fiklik yapt\u0131m, neden hemen yans\u0131mad\u0131?\u201d sorusunun arka plan\u0131n\u0131 detayl\u0131ca anlatt\u0131\u011f\u0131m\u0131z <a href=\"https:\/\/www.dchost.com\/blog\/dns-yayilim-suresi-nedir-neden-24-saat-surer-ve-nasil-hizlandirilir\/\">DNS yay\u0131l\u0131m s\u00fcresi ve nas\u0131l h\u0131zland\u0131r\u0131laca\u011f\u0131na dair rehberimize<\/a> mutlaka g\u00f6z atman\u0131z\u0131 \u00f6neririz.<\/p>\n<h3><span id=\"www_ve_Kok_Alan_Adi_Root_Icin_DNS_Tasarimi\">www ve K\u00f6k Alan Ad\u0131 (Root) \u0130\u00e7in DNS Tasar\u0131m\u0131<\/span><\/h3>\n<p>Tipik bir senaryoda:<\/p>\n<ul>\n<li><strong>example.com<\/strong> \u2013 A kayd\u0131 ile DCHost web sunucunuza i\u015faret eder.<\/li>\n<li><strong>www.example.com<\/strong> \u2013 A veya CNAME ile <strong>example.com<\/strong>\u2019a i\u015faret eder.<\/li>\n<\/ul>\n<p>Cloudflare taraf\u0131nda pratik yakla\u015f\u0131m:<\/p>\n<ul>\n<li>Hem <strong>example.com<\/strong> hem <strong>www.example.com<\/strong> i\u00e7in <strong>turuncu bulut (proxy)<\/strong> a\u00e7\u0131k olsun.<\/li>\n<li>Sunucu taraf\u0131nda ya da Cloudflare Page Rules \/ Redirect Rules ile <strong>tek bir canonical alan ad\u0131n\u0131<\/strong> tercih edin (www\u2019li veya \u00e7\u0131plak alan ad\u0131).<\/li>\n<\/ul>\n<p>Hangi domaini canonical se\u00e7ece\u011finiz konusunda karars\u0131zsan\u0131z, <a href=\"https:\/\/www.dchost.com\/blog\/www-mi-ciplak-alan-adi-mi-canonical-domain-301-ve-hsts-icin-dogru-ayarlar\/\">www mi \u00e7\u0131plak alan ad\u0131 m\u0131, canonical domain ve 301 stratejileri rehberimiz<\/a> net bir yol haritas\u0131 sunuyor.<\/p>\n<h3><span id=\"Alt_Alan_Adlari_panel_api_cdn_static8230\">Alt Alan Adlar\u0131: panel, api, cdn, static&#8230;<\/span><\/h3>\n<p>Alt alan adlar\u0131n\u0131 tasarlarken, her birinin arkas\u0131nda <strong>hangi servis\/protokol\u00fcn<\/strong> \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 netle\u015ftirin:<\/p>\n<ul>\n<li><strong>panel.example.com<\/strong> \u2013 cPanel\/DirectAdmin\/Plesk gibi bir web aray\u00fcz\u00fc ise turuncu olabilir.<\/li>\n<li><strong>api.example.com<\/strong> \u2013 REST\/GraphQL servisi ise turuncu olabilir (WAF ve rate limit i\u00e7in de avantajl\u0131).<\/li>\n<li><strong>cdn.example.com<\/strong> \u2013 Statik dosyalar i\u00e7in turuncu yapmak mant\u0131kl\u0131d\u0131r.<\/li>\n<li><strong>sftp.example.com<\/strong> \u2013 SFTP i\u00e7in kullan\u0131l\u0131yorsa <strong>mutlaka gri<\/strong> olmal\u0131d\u0131r.<\/li>\n<li><strong>db.example.com<\/strong> \u2013 Veritaban\u0131 ba\u011flant\u0131lar\u0131 i\u00e7in asla turuncu yap\u0131lmamal\u0131d\u0131r.<\/li>\n<\/ul>\n<p>API ve mikroservis trafi\u011fini Cloudflare \u00fczerinden ge\u00e7irirken, <a href=\"https:\/\/www.dchost.com\/blog\/api-ve-mikroservisler-icin-rate-limiting-stratejileri-nginx-cloudflare-ve-redis-ile-trafik-kontrolu\/\">Cloudflare ile rate limiting stratejileri<\/a> kurarak istek f\u0131rt\u0131nalar\u0131na kar\u015f\u0131 da kendinizi koruyabilirsiniz.<\/p>\n<h3><span id=\"EPosta_Icin_MX_ve_Ilgili_Kayitlar\">E\u2011Posta \u0130\u00e7in MX ve \u0130lgili Kay\u0131tlar<\/span><\/h3>\n<p>E\u2011posta taraf\u0131nda ideal Cloudflare DNS \u015fablonu \u015fu \u015fekildedir:<\/p>\n<ul>\n<li><strong>MX<\/strong>: <code>example.com \u2192 mail.example.com (priority 10)<\/code><\/li>\n<li><strong>A<\/strong>: <code>mail.example.com \u2192 1.2.3.4<\/code> (DCHost mail sunucunuz) \u2013 <strong>gri (DNS only)<\/strong><\/li>\n<li><strong>TXT (SPF)<\/strong>: <code>v=spf1 a mx include:...<\/code><\/li>\n<li><strong>TXT (DKIM)<\/strong>: <code>default._domainkey.example.com \u2192 uzun-public-key<\/code><\/li>\n<li><strong>TXT (DMARC)<\/strong>: <code>_dmarc.example.com \u2192 v=DMARC1; p=quarantine; rua=...<\/code><\/li>\n<\/ul>\n<p>Burada kritik noktalar:<\/p>\n<ul>\n<li><strong>mail.example.com A kayd\u0131 gri<\/strong> olmal\u0131.<\/li>\n<li>SPF kayd\u0131n\u0131zda <code>a<\/code> veya <code>mx<\/code> mekanizmas\u0131 kullan\u0131yorsan\u0131z, bu hostlar\u0131n IP\u2019leri <strong>ger\u00e7ek mail sunucunuza<\/strong> ait olmal\u0131.<\/li>\n<li>DKIM ve DMARC kay\u0131tlar\u0131 TXT olarak girilir, bunlar i\u00e7in proxy se\u00e7ene\u011fi zaten yoktur.<\/li>\n<\/ul>\n<p>SPF, DKIM ve DMARC kavramlar\u0131n\u0131 temelden oturtmak i\u00e7in <a href=\"https:\/\/www.dchost.com\/blog\/spf-dkim-ve-dmarc-nedir-ozel-alan-adi-ile-e-posta-dogrulamasini-cpanel-ve-vpste-sifirdan-kurmak\/\">SPF, DKIM ve DMARC\u2019\u0131 s\u0131f\u0131rdan kurma rehberimizi<\/a> okuman\u0131z b\u00fcy\u00fck avantaj sa\u011flar. E\u2011posta teslim edilebilirli\u011fi taraf\u0131nda daha kapsaml\u0131 bir bak\u0131\u015f istiyorsan\u0131z da <a href=\"https:\/\/www.dchost.com\/blog\/e-postalar-neden-spam-klasorune-dusuyor-paylasimli-hosting-ve-vps-icin-teslim-edilebilirlik-kontrol-listesi\/\">e\u2011postalar neden spam klas\u00f6r\u00fcne d\u00fc\u015f\u00fcyor kontrol listemiz<\/a> \u00e7ok i\u015finize yarayacakt\u0131r.<\/p>\n<h2><span id=\"Cloudflare_SSL_Modlari_Off_Flexible_Full_ve_Full_Strict\">Cloudflare SSL Modlar\u0131: Off, Flexible, Full ve Full (Strict)<\/span><\/h2>\n<p>Cloudflare ayarlar\u0131nda en kritik kararlardan biri, <strong>SSL\/TLS modu<\/strong>dur. D\u00f6rt temel se\u00e7enek var:<\/p>\n<ul>\n<li><strong>Off<\/strong> \u2013 Cloudflare ziyaret\u00e7i ile HTTP \u00fczerinden konu\u015fur, HTTPS yoktur (modern d\u00fcnyada tercih edilmemeli).<\/li>\n<li><strong>Flexible<\/strong> \u2013 Ziyaret\u00e7i \u2192 Cloudflare aras\u0131 HTTPS, Cloudflare \u2192 sunucu aras\u0131 HTTP. Arka tarafta \u015fifreleme <strong>yok<\/strong>.<\/li>\n<li><strong>Full<\/strong> \u2013 Her iki tarafta da HTTPS var, ancak sunucu sertifikas\u0131n\u0131n do\u011frulu\u011fu s\u0131k\u0131 kontrol edilmez.<\/li>\n<li><strong>Full (Strict)<\/strong> \u2013 Hem ziyaret\u00e7i \u2192 Cloudflare hem Cloudflare \u2192 sunucu trafi\u011fi HTTPS ve <strong>sertifika zinciri tam do\u011frulamal\u0131<\/strong>.<\/li>\n<\/ul>\n<p>DCHost olarak <strong>her zaman Full (Strict) kullanman\u0131z\u0131<\/strong> \u00f6neriyoruz. Flexible mod k\u0131sa yoldan \u201cHTTPS \u00e7al\u0131\u015fs\u0131n\u201d hissi verse de:<\/p>\n<ul>\n<li>Sunucu taraf\u0131nda HTTP ile \u00e7al\u0131\u015fan uygulamalarda <strong>mixed content<\/strong> ve y\u00f6nlendirme d\u00f6ng\u00fcs\u00fc sorunlar\u0131na yol a\u00e7abilir.<\/li>\n<li>Ger\u00e7ekten u\u00e7tan uca \u015fifreleme sa\u011flamaz, \u00f6zellikle hassas veriler i\u00e7in risklidir.<\/li>\n<\/ul>\n<p>Full (Strict) modun arka plan\u0131n\u0131 ve CDN arkas\u0131nda ger\u00e7ek HTTPS kurulumunu daha derinlemesine ele ald\u0131\u011f\u0131m\u0131z <a href=\"https:\/\/www.dchost.com\/blog\/cdn-arkasinda-gercek-https-ve-full-strict-ssl-kurulumu\/\">CDN arkas\u0131nda Full (Strict) SSL kurulum rehberimizi<\/a> okuman\u0131z\u0131 tavsiye ederiz.<\/p>\n<h3><span id=\"Full_Strict_Icin_Sunucuda_Neler_Gerekli\">Full (Strict) \u0130\u00e7in Sunucuda Neler Gerekli?<\/span><\/h3>\n<p>Full (Strict) modun \u00e7al\u0131\u015fmas\u0131 i\u00e7in origin (DCHost sunucunuz) \u00fczerinde:<\/p>\n<ul>\n<li><strong>Ge\u00e7erli bir <a href=\"https:\/\/www.dchost.com\/tr\/ssl\">SSL sertifikas\u0131<\/a><\/strong> olmal\u0131 (Let\u2019s Encrypt, ticari DV\/OV\/EV veya Cloudflare Origin Certificate).<\/li>\n<li>Sertifika <strong>do\u011fru alan ad\u0131na<\/strong> (CN\/SAN) tan\u0131ml\u0131 olmal\u0131.<\/li>\n<li>Sertifika ve ara sertifikalar <strong>eksiksiz zincir<\/strong> olu\u015fturmal\u0131.<\/li>\n<\/ul>\n<p>DCHost payla\u015f\u0131ml\u0131 hosting ve bir\u00e7ok VPS \u00e7\u00f6z\u00fcm\u00fcm\u00fczde <strong>Let\u2019s Encrypt AutoSSL<\/strong> ile sertifikalar otomatik \u00fcretilip yenilenebiliyor. Cloudflare taraf\u0131nda Full (Strict) se\u00e7ti\u011finizde, Cloudflare origin\u2019e ba\u011flan\u0131rken bu sertifikay\u0131 kontrol ediyor ve zincir tam ise trafi\u011fi g\u00fcvenli kabul ediyor.<\/p>\n<p>Kurumsal veya e\u2011ticaret sitelerinde hangi SSL t\u00fcr\u00fcn\u00fc se\u00e7ece\u011finiz konusunda karars\u0131zsan\u0131z, <a href=\"https:\/\/www.dchost.com\/blog\/dv-ov-ve-ev-ssl-sertifikalari-arasindaki-farklar-kurumsal-ve-e-ticaret-siteleri-icin-yol-haritasi\/\">DV, OV ve EV SSL sertifikalar\u0131 aras\u0131ndaki farklar\u0131 anlatt\u0131\u011f\u0131m\u0131z rehber<\/a> do\u011fru sertifika tipini se\u00e7menize yard\u0131mc\u0131 olacakt\u0131r.<\/p>\n<h3><span id=\"HTTPden_HTTPSe_Gecis_301_Yonlendirme_ve_HSTS\">HTTP\u2019den HTTPS\u2019e Ge\u00e7i\u015f, 301 Y\u00f6nlendirme ve HSTS<\/span><\/h3>\n<p>Sadece Cloudflare\u2019da SSL modunu a\u00e7mak yetmez; <strong>t\u00fcm trafi\u011fi HTTPS\u2019e zorlamak<\/strong> gerekir. Dikkat edilmesi gerekenler:<\/p>\n<ul>\n<li>Sunucuda veya Cloudflare Redirect Rules ile <strong>HTTP \u2192 HTTPS 301<\/strong> y\u00f6nlendirmesi kurun.<\/li>\n<li>Tek bir canonical alan ad\u0131 (www veya k\u00f6k) se\u00e7ip di\u011ferini 301 ile ona y\u00f6nlendirin.<\/li>\n<li>HTTPS ge\u00e7i\u015fi tamamland\u0131ktan ve kararl\u0131 oldu\u011fundan emin olduktan sonra <strong>HSTS<\/strong> ba\u015fl\u0131\u011f\u0131 eklemeyi d\u00fc\u015f\u00fcn\u00fcn.<\/li>\n<\/ul>\n<p>HTTP \u2192 HTTPS ge\u00e7i\u015finde SEO kayb\u0131 ya\u015famamak i\u00e7in, <a href=\"https:\/\/www.dchost.com\/blog\/httpden-httpse-gecis-rehberi-301-yonlendirme-hsts-ve-seoyu-korumak\/\">HTTP\u2019den HTTPS\u2019e ge\u00e7i\u015f rehberimizde<\/a> hem 301 hem HSTS hem de arama motoru taraf\u0131ndaki etkileri ad\u0131m ad\u0131m ele ald\u0131k.<\/p>\n<h2><span id=\"EPosta_DNS_Kayitlari_ve_Cloudflare_MX_SPF_DKIM_DMARC\">E\u2011Posta DNS Kay\u0131tlar\u0131 ve Cloudflare: MX, SPF, DKIM, DMARC<\/span><\/h2>\n<p>Cloudflare kullan\u0131rken en s\u0131k ya\u015fanan kriz alan\u0131 <strong>e\u2011posta altyap\u0131s\u0131<\/strong>. \u201cSite a\u00e7\u0131l\u0131yor ama e\u2011postalar gitmiyor\u201d c\u00fcmlesini ne yaz\u0131k ki \u00e7ok s\u0131k duyuyoruz. \u00c7o\u011funlukla sorun, MX ve ili\u015fkili kay\u0131tlar\u0131n yanl\u0131\u015f proxy edilmesinden veya SPF\/DKIM\/DMARC kay\u0131tlar\u0131n\u0131n eksik\/yanl\u0131\u015f olmas\u0131ndan kaynaklan\u0131yor.<\/p>\n<h3><span id=\"MX_Kayitlari_Gidis_ve_Gelis_Trafiginin_Ana_Kapisi\">MX Kay\u0131tlar\u0131: Gidi\u015f ve Geli\u015f Trafi\u011finin Ana Kap\u0131s\u0131<\/span><\/h3>\n<p>MX (Mail Exchanger) kay\u0131tlar\u0131, alan ad\u0131n\u0131za gelen e\u2011postalar\u0131n hangi sunucuya teslim edilece\u011fini belirtir. \u00d6nemli noktalar:<\/p>\n<ul>\n<li>MX kayd\u0131n\u0131n <strong>kendisi proxy edilemez<\/strong>, ancak i\u015faret etti\u011fi host (\u00f6r. <strong>mail.example.com<\/strong>) edilebilir; i\u015fte burada hata yap\u0131l\u0131r.<\/li>\n<li>MX\u2019in i\u015faret etti\u011fi A kayd\u0131 <strong>her zaman gri (DNS only)<\/strong> olmal\u0131d\u0131r.<\/li>\n<li>MX \u00fczerinde kulland\u0131\u011f\u0131n\u0131z host ad\u0131n\u0131n mutlaka bir A\/AAAA kayd\u0131 olmal\u0131, CNAME olmamal\u0131d\u0131r.<\/li>\n<\/ul>\n<p>DCHost \u00fczerinde sadece e\u2011posta i\u00e7in hosting tasarl\u0131yorsan\u0131z, <a href=\"https:\/\/www.dchost.com\/blog\/sadece-e-posta-icin-hosting-mimarisi-web-sitesi-olmadan-kurumsal-mail-kurmak\/\">web sitesi olmadan kurumsal mail kurma rehberimiz<\/a> ile Cloudflare DNS taraf\u0131n\u0131 da birlikte d\u00fc\u015f\u00fcnerek sa\u011flam bir mimari kurabilirsiniz.<\/p>\n<h3><span id=\"SPF_Hangi_Sunucular_Adima_Mail_Gonderebilir\">SPF: Hangi Sunucular Ad\u0131ma Mail G\u00f6nderebilir?<\/span><\/h3>\n<p>SPF, alan ad\u0131n\u0131z ad\u0131na <strong>hangi IP\u2019lerin veya hostlar\u0131n e\u2011posta g\u00f6ndermeye yetkili<\/strong> oldu\u011funu tarif eder. Cloudflare ile ili\u015fkili kritik noktalar:<\/p>\n<ul>\n<li>SPF kayd\u0131 bir <strong>TXT kayd\u0131<\/strong>d\u0131r, Cloudflare\u2019da proxy se\u00e7ene\u011fi yoktur; sorun burada de\u011fil.<\/li>\n<li>Sorun, SPF i\u00e7eri\u011finde kulland\u0131\u011f\u0131n\u0131z <code>a<\/code>, <code>mx<\/code> veya <code><\/code> mekanizmalar\u0131n\u0131n i\u015faret etti\u011fi hostlar\u0131n yanl\u0131\u015f proxy edilmesidir.<\/li>\n<li>Mail g\u00f6nderen sunucunuzun IP\u2019si ile SPF\u2019in \u00e7\u00f6z\u00fcmledi\u011fi IP <strong>birebir uyu\u015fmal\u0131<\/strong>d\u0131r.<\/li>\n<\/ul>\n<p>\u00d6rne\u011fin, <code>v=spf1 a mx ~all<\/code> kullan\u0131yorsan\u0131z, <strong>example.com<\/strong> ve MX\u2019in i\u015faret etti\u011fi hostlar\u0131n A kay\u0131tlar\u0131, ger\u00e7ek mail sunucusu IP\u2019nizi vermelidir. Turuncu bulut a\u00e7\u0131ksa SPF, Cloudflare IP\u2019lerini g\u00f6recek ve al\u0131c\u0131 sunucu SPF kontrol\u00fcnde sizi yetkisiz kabul edecektir.<\/p>\n<h3><span id=\"DKIM_Icerik_Butunlugu_ve_Sahtecilik_Karsiti_Imza\">DKIM: \u0130\u00e7erik B\u00fct\u00fcnl\u00fc\u011f\u00fc ve Sahtecilik Kar\u015f\u0131t\u0131 \u0130mza<\/span><\/h3>\n<p>DKIM, g\u00f6nderdi\u011finiz e\u2011postalar\u0131n header\u2019\u0131na <strong>kriptografik bir imza<\/strong> ekler ve al\u0131c\u0131 bu imzay\u0131 DNS\u2019teki public key ile do\u011frular. Cloudflare taraf\u0131nda yapman\u0131z gerekenler:<\/p>\n<ul>\n<li>Mail sunucunuzun \u00fcretti\u011fi DKIM public key\u2019ini TXT kay\u0131t olarak ekleyin.<\/li>\n<li>Genellikle ad format\u0131 <code>selector._domainkey.example.com<\/code> \u015feklindedir.<\/li>\n<li>Bu TXT kayd\u0131nda proxy se\u00e7ene\u011fi yoktur; tek yapman\u0131z gereken <strong>kayd\u0131 eksiksiz ve tam<\/strong> girmek.<\/li>\n<\/ul>\n<p>DKIM\u2019in d\u00fczg\u00fcn \u00e7al\u0131\u015fmas\u0131, DMARC politikalar\u0131n\u0131z i\u00e7in de temel bir gereklilik oldu\u011fundan, e\u2011posta servisinizde DKIM\u2019i mutlaka aktif hale getirin.<\/p>\n<h3><span id=\"DMARC_SPF_ve_DKIM_Sonuclarina_Gore_Politika_Uygulamak\">DMARC: SPF ve DKIM Sonu\u00e7lar\u0131na G\u00f6re Politika Uygulamak<\/span><\/h3>\n<p>DMARC, SPF ve DKIM sonu\u00e7lar\u0131na bakarak, al\u0131c\u0131 sunuculara \u201ce\u011fer her ikisi de ba\u015far\u0131s\u0131zsa bu maille ne yapmal\u0131s\u0131n?\u201d sorusuna cevap veren bir politika katman\u0131d\u0131r. Cloudflare taraf\u0131nda:<\/p>\n<ul>\n<li><code>_dmarc.example.com<\/code> ad\u0131nda bir TXT kayd\u0131 olu\u015fturman\u0131z gerekir.<\/li>\n<li>\u00d6rnek kay\u0131t: <code>v=DMARC1; p=quarantine; rua=mailto:dmarc@example.com<\/code><\/li>\n<li>Bu kay\u0131t da proxy edilmez; do\u011fru format ve kademeli strateji \u00f6nemlidir.<\/li>\n<\/ul>\n<p>DMARC raporlar\u0131n\u0131 nas\u0131l okuyaca\u011f\u0131n\u0131z\u0131 ve politikay\u0131 <code>p=none<\/code>\u2019dan <code>p=reject<\/code> seviyesine nas\u0131l kademeli ta\u015f\u0131yaca\u011f\u0131n\u0131z\u0131 ad\u0131m ad\u0131m anlatt\u0131\u011f\u0131m\u0131z <a href=\"https:\/\/www.dchost.com\/blog\/dmarc-raporlari-aggregate-ve-forensic-analiz-ile-pnonedan-prejecte-gecis\/\">DMARC raporlar\u0131 ve p=reject\u2019e ge\u00e7i\u015f rehberimiz<\/a> ile Cloudflare DNS taraf\u0131ndaki kay\u0131tlar\u0131n\u0131z\u0131 \u00e7ok daha bilin\u00e7li y\u00f6netebilirsiniz.<\/p>\n<h3><span id=\"Cloudflare_Uzerinde_Ornek_EPosta_DNS_Yapilandirmasi\">Cloudflare \u00dczerinde \u00d6rnek E\u2011Posta DNS Yap\u0131land\u0131rmas\u0131<\/span><\/h3>\n<p>\u00d6rnek bir Cloudflare DNS tablosu \u015f\u00f6yle g\u00f6r\u00fcnebilir:<\/p>\n<ul>\n<li><strong>A<\/strong> \u2013 <code>example.com \u2192 203.0.113.10<\/code> \u2013 turuncu<\/li>\n<li><strong>A<\/strong> \u2013 <code>www \u2192 203.0.113.10<\/code> \u2013 turuncu<\/li>\n<li><strong>A<\/strong> \u2013 <code>mail \u2192 203.0.113.20<\/code> \u2013 gri (DNS only)<\/li>\n<li><strong>MX<\/strong> \u2013 <code>example.com \u2192 mail.example.com (priority 10)<\/code><\/li>\n<li><strong>TXT<\/strong> \u2013 <code>example.com \u2192 v=spf1 a mx -all<\/code><\/li>\n<li><strong>TXT<\/strong> \u2013 <code>default._domainkey \u2192 uzun-dkim-key<\/code><\/li>\n<li><strong>TXT<\/strong> \u2013 <code>_dmarc \u2192 v=DMARC1; p=quarantine; rua=mailto:dmarc@example.com<\/code><\/li>\n<\/ul>\n<p>Bu yap\u0131land\u0131rmada web trafi\u011fi Cloudflare \u00fczerinden g\u00fcvenli ve h\u0131zl\u0131 gelirken, e\u2011posta trafi\u011fi do\u011frudan DCHost mail sunucunuza gider; b\u00f6ylece <strong>iki d\u00fcnyay\u0131 temiz \u015fekilde ay\u0131rm\u0131\u015f<\/strong> olursunuz.<\/p>\n<h2><span id=\"Cloudflare_DCHost_Altyapisinda_Onerilen_En_Iyi_Uygulamalar\">Cloudflare + DCHost Altyap\u0131s\u0131nda \u00d6nerilen En \u0130yi Uygulamalar<\/span><\/h2>\n<p>DCHost altyap\u0131s\u0131nda Cloudflare ile birlikte \u00e7al\u0131\u015fan y\u00fczlerce site g\u00f6rd\u00fc\u011f\u00fcm\u00fcz i\u00e7in, pratikte iyi \u00e7al\u0131\u015fan birka\u00e7 kal\u0131p yakla\u015f\u0131m\u0131 \u00f6zetleyelim.<\/p>\n<h3><span id=\"Paylasimli_Hosting_veya_Reseller_Kullananlar_Icin\">Payla\u015f\u0131ml\u0131 Hosting veya Reseller Kullananlar \u0130\u00e7in<\/span><\/h3>\n<ul>\n<li>Cloudflare\u2019\u0131 <strong>sadece DNS ve HTTP proxy<\/strong> katman\u0131 olarak d\u00fc\u015f\u00fcn\u00fcn; e\u2011posta, FTP, cPanel gibi servisler do\u011frudan DCHost sunucular\u0131na ba\u011flans\u0131n.<\/li>\n<li><code>mail.example.com<\/code>, <code>cpanel.example.com<\/code>, <code>ftp.example.com<\/code> gibi kay\u0131tlar\u0131 <strong>gri (DNS only)<\/strong> b\u0131rak\u0131n.<\/li>\n<li>Web siteniz i\u00e7in <strong>Full (Strict)<\/strong> modda \u00e7al\u0131\u015f\u0131n, AutoSSL (Let\u2019s Encrypt) ile sertifikalar\u0131 g\u00fcncel tutun.<\/li>\n<li>DNS kay\u0131tlar\u0131n\u0131z\u0131n temel mant\u0131\u011f\u0131n\u0131 tazelemek isterseniz, <a href=\"https:\/\/www.dchost.com\/blog\/dns-kayitlari-nedir-a-aaaa-cname-mx-txt-ve-srv-rehberi\/\">A, AAAA, CNAME, MX, TXT ve SRV kay\u0131tlar\u0131 rehberimize<\/a> g\u00f6z at\u0131n.<\/li>\n<\/ul>\n<h3><span id=\"VPS_Dedicated_veya_Colocation_Kullananlar_Icin\">VPS, Dedicated veya Colocation Kullananlar \u0130\u00e7in<\/span><\/h3>\n<ul>\n<li>Cloudflare\u2019\u0131 hem <strong>g\u00fcvenlik (WAF, DDoS koruma)<\/strong> hem de <strong>performans<\/strong> i\u00e7in aktif kullan\u0131n.<\/li>\n<li>Nginx\/Apache \u00fczerinde TLS 1.3, modern \u015fifre k\u00fcmeleri ve OCSP stapling gibi ayarlarla origin taraf\u0131n\u0131 sertle\u015ftirin; bu konuyu <a href=\"https:\/\/www.dchost.com\/blog\/tls-1-3-ve-modern-sifrelerin-sicacik-mutfagi-nginx-apachede-ocsp-stapling-hsts-preload-ve-pfs-nasil-kurulur\/\">TLS 1.3 ve modern \u015fifreler rehberimizde<\/a> detayland\u0131rd\u0131k.<\/li>\n<li>Cloudflare \u00fczerinde orange cloud\u2019u <strong>sadece HTTP\/HTTPS servis eden<\/strong> alt alanlarda a\u00e7\u0131n.<\/li>\n<li>E\u2011posta i\u00e7in ayr\u0131 bir g\u00f6nderim alan\u0131 veya alt alan kullanma senaryosunu d\u00fc\u015f\u00fcn\u00fcyorsan\u0131z, <a href=\"https:\/\/www.dchost.com\/blog\/e-posta-icin-ayri-gonderim-alan-adi-kullanmak-transactional-ve-pazarlama-e-postalari-icin-dogru-domain-ve-dns-stratesjisi\/\">ayr\u0131 g\u00f6nderim alan ad\u0131 ve DNS stratejisi rehberimiz<\/a> size yol g\u00f6sterebilir.<\/li>\n<\/ul>\n<h3><span id=\"Cloudflare_DNS_mi_Hosting_DNSi_mi\">Cloudflare DNS mi, Hosting DNS\u2019i mi?<\/span><\/h3>\n<p>Her projede mutlaka Cloudflare DNS kullan\u0131lmak zorunda de\u011fil. Baz\u0131 mimarilerde DCHost DNS altyap\u0131s\u0131n\u0131 kullanmak daha pratik olabilir. Bu karar; \u00e7ok b\u00f6lgeli mimari, SLA beklentiniz, anycast gereksinimi, y\u00f6netim kolayl\u0131\u011f\u0131 gibi kriterlere g\u00f6re verilmeli. Bu konuyu art\u0131lar\u0131 ve eksileriyle tartt\u0131\u011f\u0131m\u0131z <a href=\"https:\/\/www.dchost.com\/blog\/cloudflare-dns-mi-hosting-dnsi-mi-en-dogru-nameserver-stratesjisi\/\">Cloudflare DNS mi, hosting DNS\u2019i mi? En do\u011fru nameserver stratejisi yaz\u0131m\u0131z\u0131<\/a> mutlaka okuman\u0131z\u0131 tavsiye ederiz.<\/p>\n<h2><span id=\"En_Sik_Yapilan_Hatalar_ve_Hizli_Kontrol_Listesi\">En S\u0131k Yap\u0131lan Hatalar ve H\u0131zl\u0131 Kontrol Listesi<\/span><\/h2>\n<p>Cloudflare \u2013 DNS \u2013 SSL \u2013 e\u2011posta \u00fc\u00e7geninde sahada en s\u0131k rastlad\u0131\u011f\u0131m\u0131z hatalar\u0131 k\u0131sa bir liste halinde toparlayal\u0131m:<\/p>\n<ul>\n<li><strong>mail.example.com A kayd\u0131n\u0131n turuncu yap\u0131lmas\u0131<\/strong> \u2192 E\u2011postalar gelmez\/gidemez.<\/li>\n<li><strong>MX\u2019in var olup i\u015faret etti\u011fi A kayd\u0131n\u0131n olmamas\u0131<\/strong> \u2192 Mail sunucusuna ula\u015f\u0131lamaz.<\/li>\n<li><strong>Flexible SSL kullan\u0131p sunucuyu HTTP bekleyecek \u015fekilde ayarlamamak<\/strong> \u2192 Y\u00f6nlendirme d\u00f6ng\u00fcs\u00fc, 525\/526 hatalar\u0131.<\/li>\n<li><strong>Hem Cloudflare hem sunucu taraf\u0131nda agresif y\u00f6nlendirme kural\u0131<\/strong> \u2192 Sonsuz 301 d\u00f6ng\u00fcleri.<\/li>\n<li><strong>SPF kayd\u0131nda turuncu hostlara <code>a<\/code>\/<code>mx<\/code> ile referans vermek<\/strong> \u2192 SPF fail, spam sorunlar\u0131.<\/li>\n<li><strong>DKIM veya DMARC eklememek<\/strong> \u2192 G\u00fcvenilirlik d\u00fc\u015f\u00fck, sahtecilik riski y\u00fcksek.<\/li>\n<li><strong>www ve \u00e7\u0131plak alan i\u00e7in farkl\u0131 i\u00e7erik sunmak<\/strong> \u2192 SEO karma\u015fas\u0131, canonical hatalar\u0131.<\/li>\n<\/ul>\n<p>DNS kay\u0131tlar\u0131n\u0131z\u0131 ba\u015ftan sona g\u00f6zden ge\u00e7irmek isterseniz, <a href=\"https:\/\/www.dchost.com\/blog\/dns-kayitlari-adan-zye-a-aaaa-cname-mx-txt-srv-caa-ve-sizi-yakan-o-kucuk-hatalar\/\">A\u2019dan Z\u2019ye DNS kay\u0131tlar\u0131 ve sizi yakan k\u00fc\u00e7\u00fck hatalar rehberimiz<\/a> ile bu listeyi daha da detayland\u0131rabilirsiniz.<\/p>\n<h2><span id=\"Sonuc_Cloudflare_DNS_ve_SSL_Ayarlarini_Stratejiyle_Yonetmek\">Sonu\u00e7: Cloudflare DNS ve SSL Ayarlar\u0131n\u0131 Stratejiyle Y\u00f6netmek<\/span><\/h2>\n<p>Cloudflare, do\u011fru kullan\u0131ld\u0131\u011f\u0131nda hem g\u00fcvenlik hem performans hem de esneklik a\u00e7\u0131s\u0131ndan inan\u0131lmaz g\u00fc\u00e7l\u00fc bir katman sunuyor. Ancak k\u00fc\u00e7\u00fck bir turuncu bulut t\u0131klamas\u0131 veya yanl\u0131\u015f se\u00e7ilmi\u015f bir SSL modu; web sitesinin kapanmas\u0131na, e\u2011postalar\u0131n kaybolmas\u0131na ve SEO taraf\u0131nda ciddi sorunlara yol a\u00e7abiliyor. Bu y\u00fczden Cloudflare\u2019\u0131 \u201csihirli kutu\u201d de\u011fil, <strong>DNS, SSL\/TLS ve e\u2011posta altyap\u0131n\u0131z\u0131n bir par\u00e7as\u0131<\/strong> olarak ele almak gerekiyor.<\/p>\n<p>DCHost olarak amac\u0131m\u0131z, altyap\u0131n\u0131z\u0131n her katman\u0131n\u0131n birbirini tamamlamas\u0131n\u0131 sa\u011flamak. \u0130ster payla\u015f\u0131ml\u0131 hosting, ister y\u00f6netilen VPS, ister <a href=\"https:\/\/www.dchost.com\/tr\/fiziksel-sunucu\">dedicated sunucu<\/a> veya colocation kullan\u0131n; Cloudflare yap\u0131land\u0131rman\u0131z\u0131 do\u011fru yapt\u0131\u011f\u0131n\u0131zda hem sunucu kaynaklar\u0131n\u0131 daha verimli kullan\u0131r, hem de son kullan\u0131c\u0131lara \u00e7ok daha tutarl\u0131 bir deneyim sunars\u0131n\u0131z. DNS kay\u0131tlar\u0131n\u0131z\u0131 ve SSL modunuzu bu rehberde anlatt\u0131\u011f\u0131m\u0131z prensiplere g\u00f6re g\u00f6zden ge\u00e7irerek ba\u015flayabilir, ard\u0131ndan ihtiya\u00e7 duyarsan\u0131z DCHost destek ekibinden Cloudflare \u2013 DNS \u2013 SSL \u2013 e\u2011posta mimarinizi birlikte kontrol etmesini isteyebilirsiniz.<\/p>\n<p>Sonraki ad\u0131m olarak \u00f6zellikle \u015fu yaz\u0131lar\u0131m\u0131za g\u00f6z atman\u0131z\u0131 \u00f6neririz:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.dchost.com\/blog\/cdn-arkasinda-gercek-https-ve-full-strict-ssl-kurulumu\/\">CDN arkas\u0131nda ger\u00e7ek HTTPS ve Full (Strict) SSL kurulumu<\/a><\/li>\n<li><a href=\"https:\/\/www.dchost.com\/blog\/spf-dkim-ve-dmarc-nedir-ozel-alan-adi-ile-e-posta-dogrulamasini-cpanel-ve-vpste-sifirdan-kurmak\/\">SPF, DKIM ve DMARC ile e\u2011posta do\u011frulamas\u0131n\u0131 s\u0131f\u0131rdan kurma rehberi<\/a><\/li>\n<li><a href=\"https:\/\/www.dchost.com\/blog\/cloudflare-dns-mi-hosting-dnsi-mi-en-dogru-nameserver-stratesjisi\/\">Cloudflare DNS mi, hosting DNS\u2019i mi? En do\u011fru nameserver stratejisi<\/a><\/li>\n<\/ul>\n<p>B\u00f6ylece Cloudflare katman\u0131n\u0131 da DCHost altyap\u0131n\u0131z\u0131n tutarl\u0131 bir par\u00e7as\u0131 haline getirip, hem web siteniz hem de e\u2011posta altyap\u0131n\u0131z i\u00e7in <strong>sa\u011flam, g\u00fcvenli ve \u00f6l\u00e7eklenebilir<\/strong> bir temel kurabilirsiniz.<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>\u0130&ccedil;indekiler1 Cloudflare DNS ve SSL Ayarlar\u0131n\u0131 Do\u011fru Yapmak Neden Bu Kadar \u00d6nemli?2 Cloudflare DNS Mant\u0131\u011f\u0131: Proxy (Orange Cloud) ve DNS Only Fark\u01312.1 Orange Cloud (Proxy) Tam Olarak Ne Yapar?2.2 Hangi Kay\u0131tlar Orange Cloud Olmal\u0131?2.3 Hangi Kay\u0131tlar Asla Proxy Olmamal\u0131? (E\u2011Posta ve Di\u011fer Protokoller)3 Cloudflare \u00dczerinde Do\u011fru DNS Kurulumu: Ad\u0131m Ad\u0131m3.1 www ve K\u00f6k Alan Ad\u0131 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4363,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-4362","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-teknoloji"],"_links":{"self":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts\/4362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/comments?post=4362"}],"version-history":[{"count":0,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts\/4362\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/media\/4363"}],"wp:attachment":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/media?parent=4362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/categories?post=4362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/tags?post=4362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}