Skip to content

Commit 1ba1e3d

Browse files
maxvpharshil1712
authored andcommitted
[Gateway] Surface third-party/iCloud limitation (#17711)
1 parent 0bb054d commit 1ba1e3d

File tree

7 files changed

+37
-31
lines changed

7 files changed

+37
-31
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/agentless/dns/locations/index.mdx

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,10 @@ import { GlossaryDefinition, Render } from "~/components";
1111
<Render file="gateway/add-locations" />
1212

1313
10. Change the DNS resolvers on your router, browser, or OS by following the setup instructions in the UI.
14-
1514
11. Select **Go to DNS Location**. Your location will appear in your list of locations.
1615

1716
You can now apply [DNS policies](/cloudflare-one/policies/gateway/dns-policies/) to your location using the [Location selector](/cloudflare-one/policies/gateway/dns-policies/#location).
1817

19-
<Render file="gateway/add-locations-static-ip-warning" />
20-
2118
## DNS endpoints
2219

2320
### IPv4 and IPv6 DNS
@@ -49,3 +46,13 @@ For more information, refer to [DNS over TLS](/cloudflare-one/connections/connec
4946
<GlossaryDefinition term="DNS over HTTPS" />
5047

5148
Gateway requires a DoH endpoint for default DNS locations. For more information, refer to [DNS over HTTPS](/cloudflare-one/connections/connect-devices/agentless/dns/dns-over-https/).
49+
50+
## Limitations
51+
52+
### Captive portals
53+
54+
<Render file="gateway/add-locations-static-ip-warning" />
55+
56+
### Third-party filtering
57+
58+
<Render file="gateway/third-party-warning" />

src/content/docs/cloudflare-one/policies/gateway/block-page.mdx

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,12 @@ Configuring a custom block page in Zero Trust helps avoid this confusion. Your b
1313

1414
Gateway supports custom block pages for DNS and HTTP policies.
1515

16+
:::caution[Third-party filtering conflict]
17+
18+
<Render file="gateway/third-party-warning" />
19+
20+
:::
21+
1622
## Prerequisites
1723

1824
In order to display the block page as the URL of the blocked domain, your devices must have the [Cloudflare certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/manual-deployment/) installed. Enterprise users can also [deploy their own root CA certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/custom-certificate/).

src/content/docs/cloudflare-one/policies/gateway/dns-policies/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -426,7 +426,7 @@ Use this selector to filter based on the country where the query arrived to Gate
426426

427427
### Third-party filtering conflict
428428

429-
Gateway will not properly filter traffic sent through third-party VPNs or other Internet filtering software, such as [iCloud Private Relay](https://support.apple.com/102602). To ensure your DNS policies apply to your traffic, we recommend restricting software that may interfere with Gateway.
429+
<Render file="gateway/third-party-warning" />
430430

431431
### Magic WAN forwarding
432432

src/content/docs/learning-paths/cybersafe/gateway-onboarding/gateway-locations.mdx

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,16 @@ title: Gateway locations
33
pcx_content_type: learning-unit
44
sidebar:
55
order: 2
6-
76
---
87

9-
import { Render } from "~/components"
8+
import { Render } from "~/components";
109

1110
<Render file="gateway/add-locations" product="cloudflare-one" />
1211

13-
<Render file="gateway/add-locations-static-ip-warning" product="cloudflare-one" />
12+
:::caution[Captive portal limitation]
13+
14+
<Render
15+
file="gateway/add-locations-static-ip-warning"
16+
product="cloudflare-one"
17+
/>
18+
:::
Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,11 @@
11
---
22
{}
3-
43
---
54

6-
:::caution[Captive portal limitation]
7-
8-
95
Deploying Gateway DNS filtering using static IP addresses may prevent users from connecting to public Wi-Fi networks through captive portals. If users are experiencing connectivity issues related to captive portals, they should:
106

117
1. Remove the static IP addresses from the device.
128
2. Connect to the Wi-Fi network.
139
3. Once the connection has been established, add the static IP addresses back.
1410

1511
To avoid this issue, use the [WARP client](/cloudflare-one/connections/connect-devices/warp/) to connect your devices to Cloudflare Zero Trust.
16-
17-
18-
:::
Lines changed: 5 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,8 @@
11
---
22
{}
3-
43
---
54

6-
import { GlossaryDefinition, GlossaryTooltip } from "~/components"
5+
import { GlossaryDefinition, GlossaryTooltip } from "~/components";
76

87
<GlossaryDefinition term="DNS location" />
98

@@ -12,26 +11,15 @@ The fastest way to start filtering DNS queries from a location is by changing th
1211
To add a DNS location to Gateway:
1312

1413
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Gateway** > **DNS Locations**.
15-
1614
2. Select **Add a location**.
17-
1815
3. Choose a name for your DNS location.
19-
2016
4. Choose at least one [DNS endpoint](/cloudflare-one/connections/connect-devices/agentless/dns/locations/#dns-endpoints) to resolve your organization's DNS queries.
21-
2217
5. (Optional) Toggle the following settings:
23-
24-
* **Enable EDNS client subnet** sends a user's IP geolocation to authoritative DNS nameservers. <GlossaryTooltip term="EDNS Client Subnet (ECS)" link="/cloudflare-one/glossary/?term=ecs">EDNS Client Subnet (ECS)</GlossaryTooltip> helps reduce latency by routing the user to the closest origin server. Cloudflare enables EDNS in a privacy preserving way by not sending the user's exact IP address but rather a `/24` range which contains their IP address.
25-
26-
* **Set as Default DNS Location** sets this location as the default DoH endpoint for DNS queries.
27-
18+
- **Enable EDNS client subnet** sends a user's IP geolocation to authoritative DNS nameservers. <GlossaryTooltip term="EDNS Client Subnet (ECS)" link="/cloudflare-one/glossary/?term=ecs">EDNS Client Subnet (ECS)</GlossaryTooltip> helps reduce latency by routing the user to the closest origin server. Cloudflare enables EDNS in a privacy preserving way by not sending the user's exact IP address but rather a `/24` range which contains their IP address.
19+
- **Set as Default DNS Location** sets this location as the default DoH endpoint for DNS queries.
2820
6. Select **Continue**.
29-
3021
7. (Optional) Turn on source IP filtering for your configured endpoints, then add any source IPv4/IPv6 addresses to validate.
31-
32-
* Endpoint authentication is required for standard IPv4 addresses and optional for dedicated IPv4 addresses.
33-
* **DoH endpoint filtering & authentication** lets you restrict DNS resolution to only valid identities or user tokens in addition to IPv4/IPv6 addresses.
34-
22+
- Endpoint authentication is required for standard IPv4 addresses and optional for dedicated IPv4 addresses.
23+
- **DoH endpoint filtering & authentication** lets you restrict DNS resolution to only valid identities or user tokens in addition to IPv4/IPv6 addresses.
3524
8. Select **Continue**.
36-
3725
9. Review the settings for your DNS location, then choose **Done**.
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
---
2+
{}
3+
---
4+
5+
Gateway will not properly filter traffic sent through third-party VPNs or other Internet filtering software, such as [iCloud Private Relay](https://support.apple.com/102602). To ensure your DNS policies apply to your traffic, Cloudflare recommends turning off software that may interfere with Gateway.
6+
7+
To turn off iCloud Private Relay, refer to the Apple user guides for [macOS](https://support.apple.com/guide/mac-help/use-icloud-private-relay-mchlecadabe0/) or [iOS](https://support.apple.com/guide/iphone/protect-web-browsing-icloud-private-relay-iph499d287c2/).

0 commit comments

Comments
 (0)