You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/learning-paths/secure-internet-traffic/build-network-policies/recommended-network-policies.mdx
+47Lines changed: 47 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -254,13 +254,60 @@ Allow SSH traffic to specific endpoints on the Internet for specific users. You
254
254
255
255
Optionally, you can include a selector to filter by source IP or IdP group.
description = "Allow SSH traffic to specific endpoints on the Internet for specific users"
299
+
precedence = 0
300
+
enabled = true
301
+
action = "allow"
302
+
filters = ["l4"]
303
+
traffic = "net.dst.ip in ${"$"}${cloudflare_zero_trust_list.ssh_ip_allowlist.id} and net.sni.host in ${"$"}${cloudflare_zero_trust_list.ssh_fqdn_allowlist.id} and net.detected_protocol == \"ssh\""
304
+
identity = "any(identity.groups.name[*] in {\"SSH-Allowed-Users\"})"
305
+
}
306
+
```
307
+
308
+
</TabItem>
309
+
</Tabs>
310
+
264
311
## All-NET-NO-HTTP-HTTPS-Internet-Deny
265
312
266
313
Block all non-web traffic towards the Internet. By using the **Detected Protocol** selector, you will ensure alternative ports for HTTP and HTTPS are allowed.
0 commit comments