Skip to content

Commit 235e06c

Browse files
authored
Update index.mdx
1 parent 997ec47 commit 235e06c

File tree

1 file changed

+2
-2
lines changed
  • src/content/docs/cloudflare-one/applications/non-http

1 file changed

+2
-2
lines changed

src/content/docs/cloudflare-one/applications/non-http/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Non-HTTP applications require [connecting your private network](/cloudflare-one/
1414

1515
## WARP client
1616

17-
Users can connect by installing the Cloudflare WARP client on their device and enrolling in your Zero Trust organization. Remote devices connect to your applications as if they were on your private network. By default, all devices enrolled in your organization can access the application. To secure the application, you can [create a self-hosted application](/cloudflare-one/applications/non-http/self-hosted-private-app/) for a private IP range, port range, and/or hostname and build [Access policies](/cloudflare-one/policies/access/) that allow or block specific users.
17+
Users can connect by installing the Cloudflare WARP client on their device and enrolling in your Zero Trust organization. Remote devices connect to your applications as if they were on your private network. By default, all devices enrolled in your organization can access any private route unless they are protected by an Access policy or Gateway firewall rule. To secure the application, you can [create a self-hosted application](/cloudflare-one/applications/non-http/self-hosted-private-app/) for a private IP range, port range, and/or hostname and build [Access policies](/cloudflare-one/policies/access/) that allow or block specific users.
1818

1919
If you would like to define how users access specific infrastructure servers within your network, [create an infrastructure application](/cloudflare-one/applications/non-http/infrastructure-apps/) in Access for Infrastructure. Access for Infrastructure provides an additional layer of control and visibility over how users access non-HTTP applications, including:
2020
- Define fine-grained policies to govern who has access to specific servers and exactly how a user may access that server.
@@ -42,4 +42,4 @@ To connect to an application over a specific protocol, refer to these tutorials:
4242

4343
* [SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/)
4444
* [SMB](/cloudflare-one/connections/connect-networks/use-cases/smb/)
45-
* [RDP](/cloudflare-one/connections/connect-networks/use-cases/rdp/)
45+
* [RDP](/cloudflare-one/connections/connect-networks/use-cases/rdp/)

0 commit comments

Comments
 (0)