You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/magic-wan/zero-trust/cloudflare-gateway.mdx
+24-1Lines changed: 24 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ import { Render } from "~/components";
10
10
11
11
[Cloudflare Gateway](/cloudflare-one/policies/gateway/), our comprehensive Secure Web Gateway, allows you to set up policies to inspect DNS, network, HTTP, and egress traffic.
12
12
13
-
You can apply network and HTTP Gateway policies alongside [Magic Firewall](/magic-firewall/) policies (for L3/4 traffic filtering) to Internet-bound traffic or private traffic entering the Cloudflare network via Magic WAN.
13
+
You can apply network and HTTP Gateway policies alongside [Magic Firewall](/magic-firewall/) policies (for L3/4 traffic filtering) to Internet-bound traffic or private traffic entering the Cloudflare network via Magic WAN. Additionally, you can configure Gateway to [resolve DNS queries](#dns-filtering) from Magic WAN.
14
14
15
15
## HTTPS filtering
16
16
@@ -32,6 +32,28 @@ If your organization onboards users to Magic WAN via an [on-ramp other than WARP
| Source IP | in |`203.0.113.0/24`| Do Not Inspect |
34
34
35
+
## DNS filtering
36
+
37
+
You can configure the DNS resolver for your Magic WAN networks to the shared IP addresses for the Gateway DNS resolver. The Gateway DNS resolver IPs are `172.64.36.1` and `172.64.36.2`. When you resolve DNS queries from Magic WAN through Gateway, Gateway will log the queries with the private source IP. You can use the private source IP to create [resolver policies](/cloudflare-one/policies/gateway/resolver-policies/) for queries intended for [internal DNS records](/cloudflare-one/policies/gateway/resolver-policies/#internal-dns).
38
+
39
+
```mermaid
40
+
flowchart LR
41
+
subgraph subGraph0["Data center"]
42
+
direction TB
43
+
InternalDNS(["Internal DNS"])
44
+
ResolverPolicies["Resolver policies"]
45
+
CloudflareGatewayDNSResolver["Gateway DNS resolver"]
46
+
end
47
+
ResolverPolicies -- Retain and use</br>Source Internal IP --> InternalDNS
IPSecTunnel -- Shared IP endpoints --> CloudflareGatewayDNSResolver
52
+
ResolverPolicies@{ shape: proc}
53
+
WarpConnector@{ shape: in-out}
54
+
MagicWAN@{ shape: in-out}
55
+
```
56
+
35
57
## Outbound Internet traffic
36
58
37
59
By default, the following traffic routed through Magic WAN tunnels and destined to public IP addresses is proxied/filtered through Cloudflare Gateway:
@@ -50,6 +72,7 @@ By default, TCP, UDP, and ICMP traffic routed through Magic WAN tunnels and dest
50
72
Contact your account team to enable Gateway filtering for traffic destined to routes behind Magic WAN tunnels.
51
73
52
74
If enabled, by default TCP/UDP traffic meeting **all** the following criteria will be proxied/filtered by Cloudflare Gateway:
75
+
53
76
- Both source and destination IPs are part of either [RFC1918](https://datatracker.ietf.org/doc/html/rfc1918) space, [WARP](/cloudflare-one/connections/connect-devices/warp/), [BYO](/byoip/) or [Leased IPs](/magic-transit/cloudflare-ips/)
54
77
- Source port must be a client port strictly higher than `1023`
55
78
- Destination port is a well-known port lower than `1024`
0 commit comments