Skip to content

Commit 27bcb94

Browse files
maxvphyperlint-ai[bot]pedrosousa
authored andcommitted
[ZT] Combine Secure Internet Traffic on-ramps (#17831)
Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com> Co-authored-by: Pedro Sousa <[email protected]>
1 parent f46573a commit 27bcb94

File tree

13 files changed

+120
-113
lines changed

13 files changed

+120
-113
lines changed

public/_redirects

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -648,6 +648,8 @@
648648
/learning-paths/workers/test/intro-to-observability/ /learning-paths/workers/get-started/ 301
649649
/learning-paths/cybersafe/area1-onboarding/area1-api/ /learning-paths/cybersafe/area1-onboarding/ 301
650650
/learning-paths/cybersafe/area1-onboarding/area1-connection-methods/ /learning-paths/cybersafe/area1-onboarding/area1-inline/ 301
651+
/learning-paths/secure-internet-traffic/connect-networks/ /learning-paths/secure-internet-traffic/connect-devices-networks/ 301
652+
/learning-paths/secure-internet-traffic/connect-networks/choose-on-ramp/ /learning-paths/secure-internet-traffic/connect-devices/choose-on-ramp/ 301
651653

652654
## dns-filtering / secure-internet-traffic
653655
/learning-paths/dns-filtering/ /learning-paths/secure-internet-traffic/ 301
@@ -1803,6 +1805,9 @@
18031805
## DNS filtering --> Secure your Internet traffic and SaaS apps
18041806
/learning-paths/dns-filtering/account/* /learning-paths/secure-internet-traffic/initial-setup/:splat 301
18051807
/learning-paths/dns-filtering/create-policy/* /learning-paths/secure-internet-traffic/build-dns-policies/:splat 301
1808+
## Secure your Internet Traffic
1809+
/learning-paths/secure-internet-traffic/connect-devices/* /learning-paths/secure-internet-traffic/connect-devices-networks/:splat 301
1810+
18061811

18071812
# Old WAF changelog entries
18081813
/waf/change-log/2019-* /waf/change-log/historical-2019/ 301

src/content/docs/learning-paths/replace-vpn/connect-devices/index.mdx

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,19 +3,14 @@ title: Connect user devices
33
pcx_content_type: overview
44
sidebar:
55
order: 5
6-
76
---
87

9-
import { Render } from "~/components"
8+
import { Render } from "~/components";
109

1110
Now that your device enrollment policies and WARP profiles are configured, you can begin deploying the WARP client to user devices for testing.
1211

1312
:::note
14-
15-
16-
The following steps are identical to [Connect user devices](/learning-paths/secure-internet-traffic/connect-devices/) in the Secure your Internet traffic and SaaS apps implementation guide. If you have already completed Secure your Internet traffic and SaaS apps, you can skip ahead to [Build secure access policies](/learning-paths/replace-vpn/build-policies/).
17-
18-
13+
The following steps are identical to [Device on-ramps](/learning-paths/secure-internet-traffic/connect-devices-networks/choose-on-ramp/#device-on-ramps) in the Secure your Internet traffic and SaaS apps implementation guide. If you have already completed Secure your Internet traffic and SaaS apps, you can skip ahead to [Build secure access policies](/learning-paths/replace-vpn/build-policies/).
1914
:::
2015

2116
## Objectives

src/content/docs/learning-paths/secure-internet-traffic/build-dns-policies/create-policy.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ import { Render } from "~/components";
99

1010
DNS policies determine how Gateway should handle a DNS request. When a user sends a DNS request, Gateway matches the request against your filters and either allows the query to resolve, blocks the query, or responds to the query with a different IP.
1111

12-
You can filter DNS traffic based on query or response parameters (such as domain, source IP, or geolocation). You can also filter by user identity if you connect your devices to Gateway with the [WARP client or Cloudflare One Agent](/learning-paths/secure-internet-traffic/connect-devices/install-agent/).
12+
You can filter DNS traffic based on query or response parameters (such as domain, source IP, or geolocation). You can also filter by user identity if you connect your devices to Gateway with the [WARP client or Cloudflare One Agent](/learning-paths/secure-internet-traffic/connect-devices-networks/install-agent/).
1313

1414
To create a new DNS policy:
1515

Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
---
2+
title: Choose an on-ramp
3+
pcx_content_type: learning-unit
4+
sidebar:
5+
order: 1
6+
---
7+
8+
import { GlossaryDefinition, GlossaryTooltip, Badge } from "~/components";
9+
10+
Similar to the network onboarding practices in the [Replace your VPN](/learning-paths/replace-vpn/connect-private-network/) implementation guide, there are a number of ways to on-ramp your network traffic to the Cloudflare global network. This guide will quickly explore all of the options to on-ramp traffic to Cloudflare Gateway to inspect, apply policies, and filter.
11+
12+
:::note
13+
The following steps are identical to [Connect user devices](/learning-paths/replace-vpn/connect-devices/) in the Replace your VPN implementation guide. If you have already completed Replace your VPN, you can skip ahead to [Network on-ramps](#network-on-ramps).
14+
:::
15+
16+
## Device on-ramps
17+
18+
The most common way to protect and filter your end-user traffic is by using a device client. The standard Cloudflare device client supports a number of operating systems and deployment methodologies, but there can still be scenarios in which an alternative path makes sense.
19+
20+
### Zero Trust Client
21+
22+
Cloudflare WARP is the most common onramp to send user traffic to Gateway. It is a lightweight device client, which builds proxy tunnels using either Wireguard or MASQUE, and builds a DNS proxy using DNS-over-HTTPS. It supports all major operating systems, supports all common forms of endpoint management tooling, and has a robust series of management parameters and profiles to accurately scope the needs of a diverse user base. It has flexible operating modes and can control device traffic as a proxy, control device DNS traffic as a DNS proxy, or both. It is the most common method to send traffic from user devices to be filtered and decrypted by Cloudflare Gateway.
23+
24+
### PAC files (Enterprise only)
25+
26+
Cloudflare supports filtering HTTP/S traffic sent via a PAC file on a user device. PAC files configured to send traffic to Cloudflare target a domain specific to your account tenant, and receive and process all URL traffic for that device that fits the proxy profile. PAC files are most commonly used in scenarios in which the device client is not appropriate or cannot be installed -- specifically Windows pre-2008 and Windows Server 2012, and devices which cannot install client software at all.
27+
28+
### Clientless Browser Isolation
29+
30+
Cloudflare Browser Isolation runs a headless, Chromium-based browser for your users to accomplish their secure browsing needs. It can be activated via an Access application, a Gateway policy, or by using link-based isolation (reverse proxy). In this model, your users can connect from any device to a proxy website to browse the Internet while applying all your Gateway HTTP policies and inspection requirements.
31+
32+
| | WARP | PAC Files | Clientless Browser Isolation |
33+
| --------------------------------- | ------------------------------------ | -------------- | ------------------------------------- |
34+
| Supported OS | macOS, Windows, Linux, iOS, Android | All desktop OS | All OS (with HTML5 compliant browser) |
35+
| Configurable via MDM | Yes | Yes | N/A |
36+
| Gateway policy types supported | DNS, Network, HTTP, Resolver, Egress | HTTP | HTTP, Resolver, Egress |
37+
| Identity-based policies supported | Yes | No | Yes |
38+
39+
## Network on-ramps
40+
41+
The primary ways to source multi-device or network traffic to Cloudflare Gateway are via Magic WAN using GRE or IPsec tunnels, the [WARP Connector](#warp-connector-) as a software-defined all-ports traffic proxy, or via upstream DNS for a whole network using [DNS filtering locations](#dns-filtering-locations).
42+
43+
### Magic WAN
44+
45+
:::note
46+
Only available on Enterprise plans.
47+
:::
48+
49+
[Magic WAN](/magic-wan/) is Cloudflare's offering most analogous to a traditional SD-WAN. Magic WAN is typically deployed via an IPsec or GRE tunnel terminating on customer devices (such as firewalls or routers), or via our Magic WAN Connector hardware device. You can also be deploy Magic WAN using [Cloudflare Network Interconnect](/network-interconnect/) (CNI) at private peering locations or some public cloud instances (where compatible).
50+
51+
Magic WAN on-ramps traffic via your connections and can send all network and HTTP traffic through Cloudflare Gateway for inspection.
52+
53+
For more information on how Magic WAN integrates with Zero Trust, refer to [Zero Trust integration](/magic-wan/zero-trust/).
54+
55+
### WARP Connector <Badge text="Beta" variant="caution" size="small" />
56+
57+
[WARP Connector](/cloudflare-one/connections/connect-networks/private-net/warp-connector/), a software agent similar to our device client, functions as a virtual device to establish a connection between your network and the Cloudflare global network. You can install WARP Connector on a dedicated Linux server or virtual machine.
58+
59+
WARP Connector supports egressing traffic from your private network to the Internet as a gateway. This means it can allow traffic initiated from a network to be on-ramped to Cloudflare for either public or private destinations. You can use WARP Connector to establish a secure egress path for servers or users on a network which may not each be able to run the WARP client and still apply Gateway network and HTTP inspection policies. This connection is most analogous to proxy server connectivity or site-to-site VPN.
60+
61+
For more information on setting up Cloudflare Tunnel via WARP Connector, refer to [Set up WARP Connector](/cloudflare-one/connections/connect-networks/private-net/warp-connector/).
62+
63+
### DNS filtering locations
64+
65+
<GlossaryDefinition term="DNS location" />
66+
67+
The fastest way to start filtering DNS queries from a location is by changing the DNS resolvers at the router or updating the upstream resolution to Cloudflare DNS resolution endpoints. This can also be accomplished from individual devices, or an network or subnet which sets resolver IPs for clients via DHCP.
68+
69+
For more information on setting up DNS locations, refer to [Add locations](/cloudflare-one/connections/connect-devices/agentless/dns/locations/).
70+
71+
| | Magic WAN | WARP Connector | DNS Locations |
72+
| ------------------------------ | --------------------- | --------------------- | ------------- |
73+
| Gateway policy types supported | Network, HTTP, Egress | Network, HTTP, Egress | DNS, Resolver |
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
title: Connect devices and networks to Cloudflare
3+
pcx_content_type: overview
4+
sidebar:
5+
order: 2
6+
---
7+
8+
import { Render } from "~/components";
9+
10+
After setting up your Cloudflare account and Zero Trust organization, you can begin connecting your users' devices and networks to Cloudflare.
11+
12+
## Objectives
13+
14+
By the end of this module, you will be able to:
15+
16+
<Render file="zero-trust/connect-devices-objectives" />
17+
18+
- Determine when and how to use PAC files.
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: Download and install WARP
3+
pcx_content_type: learning-unit
4+
sidebar:
5+
order: 2
6+
---
7+
8+
import { Render } from "~/components";
9+
10+
<Render
11+
file="zero-trust/install-agent"
12+
params={{
13+
one: "The device is now connected to your organization and secured with Cloudflare Zero Trust.",
14+
}}
15+
/>

src/content/docs/learning-paths/secure-internet-traffic/connect-devices/mdm.mdx renamed to src/content/docs/learning-paths/secure-internet-traffic/connect-devices-networks/mdm.mdx

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,9 @@
22
title: MDM deployment
33
pcx_content_type: learning-unit
44
sidebar:
5-
order: 2
6-
5+
order: 3
76
---
87

9-
import { Render } from "~/components"
8+
import { Render } from "~/components";
109

1110
<Render file="zero-trust/mdm" />
Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,10 @@
22
title: Verify device connectivity
33
pcx_content_type: learning-unit
44
sidebar:
5-
order: 3
6-
5+
order: 4
76
---
87

9-
import { Render } from "~/components"
8+
import { Render } from "~/components";
109

1110
<Render file="zero-trust/validate-traffic-in-gateway" />
1211

src/content/docs/learning-paths/secure-internet-traffic/connect-devices/index.mdx

Lines changed: 0 additions & 27 deletions
This file was deleted.

src/content/docs/learning-paths/secure-internet-traffic/connect-devices/install-agent.mdx

Lines changed: 0 additions & 11 deletions
This file was deleted.

0 commit comments

Comments
 (0)