Skip to content

Commit 120126a

Browse files
authored
[Gateway] Update HTTP/3 guidance (#18576)
1 parent 78aba76 commit 120126a

File tree

6 files changed

+22
-24
lines changed

6 files changed

+22
-24
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/agentless/pac-files.mdx

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -201,7 +201,9 @@ You can now use the Proxy Endpoint selector in [network](/cloudflare-one/policie
201201

202202
### Traffic limitations
203203

204-
At this time, the agentless HTTP proxy does not support [identity-based policies](/cloudflare-one/policies/gateway/identity-selectors/), mTLS authentication, or UDP traffic. To enforce HTTP policies for UDP traffic, you must [disable QUIC](/cloudflare-one/policies/gateway/http-policies/http3/#prevent-inspection-bypass) in your users' browsers.
204+
The agentless HTTP proxy does not support [identity-based policies](/cloudflare-one/policies/gateway/identity-selectors/) or mTLS authentication.
205+
206+
To enforce HTTP policies for UDP traffic, you must turn on the [Gateway proxy for UDP](/cloudflare-one/policies/gateway/http-policies/http3/#enable-http3-inspection).
205207

206208
### Gateway DNS and resolver policies
207209

src/content/docs/cloudflare-one/policies/gateway/egress-policies/dedicated-egress-ips.mdx

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,9 @@ To start routing traffic through dedicated egress IPs:
2222

2323
1. Contact your account team to obtain a dedicated egress IP.
2424
2. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Network**.
25-
3. Turn on **Proxy** for TCP.
26-
4. (Optional) Select **UDP**. This will allow HTTP/3 traffic to egress with your dedicated IPs.
25+
3. In **Firewall**, turn on **Proxy**.
26+
4. Select **TCP**.
27+
5. (Optional) Select **UDP**. This will allow HTTP/3 traffic to egress with your dedicated IPs.
2728

2829
Dedicated egress IPs are now turned on for all network and HTTP traffic proxied by Gateway. To selectively turn on dedicated egress IPs for a subset of your traffic, refer to [egress policies](/cloudflare-one/policies/gateway/egress-policies/).
2930

src/content/docs/cloudflare-one/policies/gateway/http-policies/http3.mdx

Lines changed: 9 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
pcx_content_type: concept
3-
title: HTTP/3
3+
title: HTTP/3 inspection
44
sidebar:
55
order: 3
66
---
@@ -13,27 +13,22 @@ Gateway applies HTTP policies to HTTP/3 traffic last. For more information, refe
1313

1414
## Enable HTTP/3 inspection
1515

16-
To enable HTTP/3 inspection:
16+
To enable HTTP/3 inspection, turn on the [Gateway proxy](/cloudflare-one/policies/gateway/proxy/) for UDP:
1717

1818
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Network**.
19-
2. Under **Firewall**, enable **Proxy** and select **UDP**.
20-
3. Enable **TLS decryption**.
19+
2. In **Firewall**, turn on **Proxy**.
20+
3. Select **TCP** and **UDP**.
21+
4. Turn on **TLS decryption**.
2122

2223
### Application limitations
2324

24-
Gateway can inspect HTTP/3 traffic from Microsoft Edge, as well as other HTTP applications, such as cURL.
25+
Gateway can inspect HTTP/3 traffic from Mozilla Firefox and Microsoft Edge, as well as other HTTP applications, such as cURL.
2526

26-
By default, the following browsers do not support HTTP/3 inspection unless you [disable QUIC](#prevent-inspection-bypass):
27+
If the UDP proxy is enabled in Zero Trust, Google Chrome will force all HTTP/3 traffic to fall back to HTTP/2, allowing you to enforce your HTTP policies. If the UDP proxy is not enabled, HTTP/3 traffic from Chrome will bypass inspection.
2728

28-
- Google Chrome
29-
- Safari
30-
- Firefox
29+
## Force HTTP/2 traffic
3130

32-
If the [UDP proxy](#enable-http3-inspection) is enabled in Zero Trust, Gateway will force all HTTP/3 traffic in these browsers to fall back to HTTP/2, allowing you to enforce your HTTP policies. If the UDP proxy is not enabled, HTTP/3 traffic will bypass inspection.
33-
34-
## Prevent inspection bypass
35-
36-
To prevent HTTP/3 traffic from bypassing inspection, disable QUIC in your users' browsers.
31+
To apply Gateway policies to HTTP traffic without turning on the UDP proxy, you must disable QUIC in your users' browsers to ensure only HTTP/2 traffic reaches Gateway.
3732

3833
<Details header="Google Chrome">
3934

src/content/docs/cloudflare-one/policies/gateway/http-policies/tls-decryption.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ By default, TLS decryption can use both TLS version 1.2 and 1.3. However, some e
101101

102102
When FIPS compliance is enabled, Gateway will only choose [FIPS-compliant cipher suites](#cipher-suites) when connecting to the origin. If the origin does not support FIPS-compliant ciphers, the request will fail.
103103

104-
FIPS-compliant traffic defaults to HTTP/3. Gateway does not inspect HTTP/3 traffic from most browsers, including Chrome, Firefox, and Safari. To enforce your HTTP policies for this HTTP/3 traffic, you must [disable QUIC](/cloudflare-one/policies/gateway/http-policies/http3/#prevent-inspection-bypass) in your users' browsers.
104+
FIPS-compliant traffic defaults to [HTTP/3](/cloudflare-one/policies/gateway/http-policies/http3/). To enforce HTTP policies for UDP traffic, you must turn on the [Gateway proxy for UDP](/cloudflare-one/policies/gateway/http-policies/http3/#enable-http3-inspection).
105105

106106
### Cipher suites
107107

src/content/docs/cloudflare-one/policies/gateway/proxy.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,9 @@ pcx_content_type: concept
33
title: Proxy
44
sidebar:
55
order: 14
6-
76
---
87

9-
import { Badge } from "~/components"
8+
import { Badge } from "~/components";
109

1110
You can forward [HTTP](/cloudflare-one/policies/gateway/initial-setup/http/) and [network](/cloudflare-one/policies/gateway/initial-setup/network/) traffic to Gateway for logging and filtering. Gateway can proxy both outbound traffic and traffic directed to resources connected via a Cloudflare Tunnel, GRE tunnel, or IPsec tunnel.
1211

@@ -36,8 +35,9 @@ The ICMP proxy forwards traffic for diagnostic tools such as `ping` and `tracero
3635
Gateway cannot log or filter ICMP traffic.
3736
:::
3837

39-
## Enable the Gateway proxy
38+
## Turn on the Gateway proxy
4039

4140
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Network**.
42-
2. Enable **Proxy** for TCP.
43-
3. (Optional) Depending on your use case, you can enable **UDP** and/or **ICMP**.
41+
2. In **Firewall**, turn on **Proxy**.
42+
3. Select **TCP**.
43+
4. (Optional) Depending on your use case, you can select **UDP** and/or **ICMP**.

src/content/partials/cloudflare-one/tunnel/enable-gateway-proxy.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
import { Tabs, TabItem } from "~/components";
66

77
1. Go to **Settings** > **Network**.
8-
2. Turn on **Proxy**.
8+
2. In **Firewall**, turn on **Proxy**.
99
3. Select **TCP**.
1010
4. (Recommended) To proxy traffic to internal DNS resolvers, select **UDP**.
1111
5. (Recommended) To proxy traffic for diagnostic tools such as `ping` and `traceroute`, select **ICMP**. You may also need to update your system to allow ICMP traffic through `cloudflared`:

0 commit comments

Comments
 (0)