Skip to content

Commit 0451bce

Browse files
[CF1] Local domain fallback best practice (#24169)
* [CF1] LDF best practice * updates
1 parent a53378c commit 0451bce

File tree

3 files changed

+18
-3
lines changed

3 files changed

+18
-3
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains.mdx

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 2
66
---
77

8-
import { Render } from "~/components";
8+
import { GlossaryTooltip, Render } from "~/components";
99

1010
By default, Cloudflare Zero Trust excludes common top-level domains, used for local resolution, from being sent to Gateway for processing. These top-level domains are resolved by the local DNS resolver configured for the device on its primary interface.
1111

@@ -17,6 +17,8 @@ Local Domain Fallback only applies to devices running the WARP client.
1717

1818
Because DNS requests subject to Local Domain Fallback bypass the Gateway resolver, they are not subject to Gateway DNS policies or DNS logging. If you want to route DNS queries to custom resolvers and apply Gateway filtering, use [resolver policies](/cloudflare-one/policies/gateway/resolver-policies/). If both Local Domain Fallback and resolver policies are configured for the same device, Cloudflare will apply client-side Local Domain Fallback rules first.
1919

20+
<Render file="warp/ldf-best-practice" product="cloudflare-one" />
21+
2022
### AWS
2123

2224
<Render file="aws-resolver" product="cloudflare-one" />
@@ -52,4 +54,4 @@ The domain will no longer be excluded from Gateway DNS policies, effective immed
5254
## Related resources
5355

5456
- [Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) - Control which traffic goes through WARP by including or excluding specific IPs or domains.
55-
- [WARP with firewall](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/) - Learn which IPs, domains, and ports to allow so users can deploy and connect WARP successfully behind a firewall.
57+
- [WARP with firewall](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/) - Learn which IPs, domains, and ports to allow so users can deploy and connect WARP successfully behind a firewall.

src/content/docs/cloudflare-one/policies/gateway/resolver-policies.mdx

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ head:
1010
content: Resolver policies
1111
---
1212

13-
import { Render, Badge } from "~/components";
13+
import { Render, Badge, GlossaryTooltip } from "~/components";
1414

1515
:::note
1616
Only available on Enterprise plans.
@@ -52,6 +52,8 @@ To get started with resolving internal DNS queries with resolver policies, refer
5252

5353
If your resolver is only reachable by a client device and not by Gateway via a Cloudflare tunnel, Magic WAN tunnel, or other public Internet connections, you should configure [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) for your device. If both Local Domain Fallback and resolver policies are configured for the same device, Cloudflare will apply your client-side Local Domain Fallback rules first. If you onboard DNS queries to Gateway with the WARP client and route them with resolver policies, the source IP of the queries will be the IP address assigned by the WARP client.
5454

55+
<Render file="warp/ldf-best-practice" product="cloudflare-one" />
56+
5557
## Resolver connections
5658

5759
Resolver policies support TCP and UDP connections. Custom resolvers can point to the Internet via IPv4 or IPv6, or to a private network service, such as a [Magic tunnel](/magic-transit/how-to/configure-tunnel-endpoints/). Policies default to port `53`. You can change which port your resolver uses by customizing it in your policy.
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
{}
3+
---
4+
5+
import { GlossaryTooltip } from "~/components";
6+
7+
:::tip[Local Domain Fallback or Gateway Resolver policies?]
8+
9+
If your DNS server can be configured to connect to a Cloudflare <GlossaryTooltip term="on-ramp">on-ramp</GlossaryTooltip>, Cloudflare recommends using Gateway Resolver policies rather than Local Domain Fallback. Gateway Resolver policies provide more visibility by allowing you to log and review DNS traffic.
10+
11+
:::

0 commit comments

Comments
 (0)