Skip to content

Commit 0ca2d55

Browse files
authored
[Gateway] FQDN follow-up (#22517)
1 parent 5d0ba8d commit 0ca2d55

File tree

1 file changed

+19
-2
lines changed
  • src/content/docs/cloudflare-one/policies/gateway/egress-policies

1 file changed

+19
-2
lines changed

src/content/docs/cloudflare-one/policies/gateway/egress-policies/index.mdx

Lines changed: 19 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 5
66
---
77

8-
import { Render, Badge, Tabs, TabItem } from "~/components";
8+
import { Render, Badge, Tabs, TabItem, Details } from "~/components";
99

1010
:::note
1111
Only available on Enterprise plans.
@@ -180,6 +180,23 @@ Gateway uses Rust to evaluate regular expressions. The Rust implementation is sl
180180

181181
### Selector prerequisites
182182

183+
<Details header="Feature availability">
184+
185+
| [WARP modes](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/) | [Zero Trust plans](https://www.cloudflare.com/teams-pricing/) |
186+
| ----------------------------------------------------------------------------------------- | ------------------------------------------------------------- |
187+
| Gateway with WARP | Enterprise |
188+
189+
| System | Availability | Minimum WARP version |
190+
| -------- | ------------ | -------------------- |
191+
| Windows || 2025.4.929.0 |
192+
| macOS || 2025.4.929.0 |
193+
| Linux || 2025.4.929.0 |
194+
| iOS || |
195+
| Android || |
196+
| ChromeOS || |
197+
198+
</Details>
199+
183200
The [Application](#application), [Content Categories](#content-categories), [Domain](#domain), and [Host](#host) selectors are only available for traffic on-ramped to Gateway with the following methods:
184201

185202
| On-ramp method | Compatibility |
@@ -190,7 +207,7 @@ The [Application](#application), [Content Categories](#content-categories), [Dom
190207
| [WARP Connector](/cloudflare-one/connections/connect-networks/private-net/warp-connector/) ||
191208
| [Magic WAN](/magic-wan/zero-trust/cloudflare-gateway/) ||
192209

193-
When you use these selectors in an egress policy for traffic from a supported on-ramp, Gateway will assign initial resolved IPs to the DNS queries, then apply the correct egress IP according to the egress policy. Unsupported traffic will be resolved with your default Gateway settings. Gateway will only overwrite the DNS response when the query matches a condition in the egress policy. If you use [DNS locations](/cloudflare-one/connections/connect-devices/agentless/dns/locations/) to send a DNS query to Gateway with IPv4, IPv6, DoT, or DoH, Gateway will not return the initial resolved IP.
210+
When you use these selectors in an egress policy for traffic from a supported on-ramp, Gateway will assign initial resolved IPs in the `100.80.0.0/16` range to the DNS queries, then apply the correct egress IP according to the egress policy. Unsupported traffic will be resolved with your default Gateway settings. Gateway will only overwrite the DNS response when the query matches a condition in the egress policy. If you use [DNS locations](/cloudflare-one/connections/connect-devices/agentless/dns/locations/) to send a DNS query to Gateway with IPv4, IPv6, DoT, or DoH, Gateway will not return the initial resolved IP for supported traffic nor resolve unsupported traffic.
194211

195212
To turn on the selectors for your account, use the [Patch Zero Trust account configuration](/api/resources/zero_trust/subresources/gateway/subresources/configurations/methods/edit/) endpoint. For example:
196213

0 commit comments

Comments
 (0)