Skip to content

Commit 379f790

Browse files
authored
[Gateway] Update selector descriptions (#24374)
* Update security category * Add Radar cross link * Add source selectors * Update destination IP * Update source IP * Add descriptions to URL selectors
1 parent 7abf4dc commit 379f790

File tree

10 files changed

+70
-41
lines changed

10 files changed

+70
-41
lines changed

src/content/docs/cloudflare-one/policies/gateway/egress-policies/index.mdx

Lines changed: 18 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,10 @@ Gateway matches egress traffic against the following selectors, or criteria:
8989

9090
### Destination IP
9191

92-
<Render file="gateway/selectors/destination-ip" />
92+
<Render
93+
file="gateway/selectors/destination-ip"
94+
params={{ APIendpoint: "net.dst.ip" }}
95+
/>
9396

9497
### Destination Port
9598

@@ -142,7 +145,10 @@ The country of the user making the request. <Render file="gateway/selectors/sour
142145

143146
### Source IP
144147

145-
<Render file="gateway/selectors/source-ip-net" />
148+
<Render
149+
file="gateway/selectors/source-ip"
150+
params={{ APIendpoint: "net.src.ip" }}
151+
/>
146152

147153
### Source Port
148154

@@ -253,20 +259,25 @@ Additionally, to use these selectors to filter traffic onboarded with WARP, you
253259

254260
2. In your WARP [device profile](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/), configure your [Split Tunnel](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) depending on the mode:
255261

256-
<Tabs> <TabItem label="Exclude IPs and domains">
262+
<Tabs>
263+
264+
<TabItem label="Exclude IPs and domains">
257265
1. [Remove the route](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#remove-a-route) to the IP address `100.64.0.0/10` from your Split Tunnel exclude list.
258-
2. [Add routes](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to exclude the following IP addresses:
259-
- `100.64.0.0/12`
266+
2. [Add routes](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to exclude the following IP addresses: - `100.64.0.0/12`
260267
- `100.81.0.0/16`
261268
- `100.82.0.0/15`
262269
- `100.84.0.0/14`
263270
- `100.88.0.0/13`
264271
- `100.96.0.0/11`
265272

266-
</TabItem> <TabItem label="Include IPs and domains">
273+
</TabItem>
274+
275+
<TabItem label="Include IPs and domains">
267276
1. Add the required [Zero Trust domains](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-domains) or [IP addresses](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-ip-addresses) to your Split Tunnel include list.
268277
2. [Add a route](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to include the IP address `100.80.0.0/16`.
269278

270-
</TabItem> </Tabs>
279+
</TabItem>
280+
281+
</Tabs>
271282

272283
The WARP client must be set to _Gateway with WARP_ mode for traffic affected by these selectors to route correctly.

src/content/docs/cloudflare-one/policies/gateway/http-policies/index.mdx

Lines changed: 21 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -436,9 +436,10 @@ Only applies to traffic sent through the [WARP client](/cloudflare-one/connectio
436436
Only applies to traffic sent through the [WARP client](/cloudflare-one/connections/connect-devices/warp/set-up-warp/#gateway-with-warp-default).
437437
:::
438438

439-
| UI name | API example |
440-
| -------------- | ---------------------------------- |
441-
| Destination IP | `http.conn.dst_ip == "10.0.0.0/8"` |
439+
<Render
440+
file="gateway/selectors/destination-ip"
441+
params={{ APIendpoint: "http.conn.dst_ip" }}
442+
/>
442443

443444
### Device Posture
444445

@@ -555,12 +556,16 @@ Scans HTTP traffic for the presence of social security numbers and other PII. Yo
555556

556557
### HTTP Method
557558

559+
The HTTP request method used in the traffic.
560+
558561
| UI name | API example |
559562
| ----------- | ------------------------------ |
560563
| HTTP Method | `http.request.method == "GET"` |
561564

562565
### HTTP Response
563566

567+
The HTTP response status code received by the traffic.
568+
564569
| UI name | API example |
565570
| ------- | ------------------------------------ |
566571
| URL | `http.response.status_code == "200"` |
@@ -593,9 +598,10 @@ The country of the user making the request. <Render file="gateway/selectors/sour
593598

594599
### Source IP
595600

596-
| UI name | API example |
597-
| --------- | ---------------------------------- |
598-
| Source IP | `http.conn.src_ip == "10.0.0.0/8"` |
601+
<Render
602+
file="gateway/selectors/source-ip"
603+
params={{ APIendpoint: "http.conn.src_ip" }}
604+
/>
599605

600606
### URL
601607

@@ -607,21 +613,27 @@ The country of the user making the request. <Render file="gateway/selectors/sour
607613

608614
### URL Path
609615

616+
The pathname of a webpage's URL.
617+
610618
| UI name | API example |
611619
| -------- | --------------------------------------- |
612620
| URL Path | `http.request.uri.path == \"/foo/bar\"` |
613621

614622
### URL Path and Query
615623

624+
The pathname and query of a webpage's URL.
625+
616626
| UI name | API example |
617627
| ------------------ | --------------------------------------------------------------- |
618628
| URL Path and Query | `http.request.uri.path_and_query == \"/foo/bar?ab%242=%2A342\"` |
619629

620630
### URL Query
621631

622-
| UI name | API example |
623-
| --------- | ------------------------------------ |
624-
| URL Query | `not(http.request.uri.query in $%s)` |
632+
The query of a webpage's URL.
633+
634+
| UI name | API example |
635+
| --------- | ------------------------------------------- |
636+
| URL Query | `http.request.uri.query == "ab%242=%2A342"` |
625637

626638
### Users
627639

src/content/docs/cloudflare-one/policies/gateway/network-policies/index.mdx

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -278,7 +278,10 @@ Gateway matches network traffic against the following selectors, or criteria.
278278

279279
### Destination IP
280280

281-
<Render file="gateway/selectors/destination-ip" />
281+
<Render
282+
file="gateway/selectors/destination-ip"
283+
params={{ APIendpoint: "net.dst.ip" }}
284+
/>
282285

283286
### Destination Port
284287

@@ -301,16 +304,14 @@ The inferred network protocol based on Cloudflare's [protocol detection](/cloudf
301304
<Render file="gateway/selectors/protocol" />
302305

303306
:::note
304-
305307
To enable Gateway filtering on TCP and UDP, go to **Settings** > **Network** > **Proxy**. Network policies apply to all enabled protocols unless you use the **Protocol** selector within a policy.
306-
307308
:::
308309

309310
### Proxy Endpoint
310311

311312
<Render file="gateway/selectors/proxy-endpoint" />
312313

313-
### Security Risks
314+
### Security Categories
314315

315316
<Render
316317
file="gateway/selectors/security-risks"
@@ -354,7 +355,10 @@ The country of the user making the request. <Render file="gateway/selectors/sour
354355

355356
### Source IP
356357

357-
<Render file="gateway/selectors/source-ip-net" />
358+
<Render
359+
file="gateway/selectors/source-ip"
360+
params={{ APIendpoint: "net.src.ip" }}
361+
/>
358362

359363
### Source Port
360364

@@ -376,9 +380,7 @@ The country of the user making the request. <Render file="gateway/selectors/sour
376380
<Render file="gateway/comparison-operators" />
377381

378382
:::note
379-
380383
The _in_ operator allows you to specify IP addresses or networks using CIDR notation.
381-
382384
:::
383385

384386
## Value

src/content/docs/radar/glossary.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ Cloudflare Speed Test measures latency multiple times over the course of the tes
123123

124124
## Content categories
125125

126-
Cloudflare uses a variety of data sources to categorize domains. Using Cloudflare Radar, you can view the content categories associated with a given domain. Cloudflare customers using Cloudflare Gateway or [1.1.1.1 for Families](/1.1.1.1/setup/#1111-for-families) can decide to block certain categories, like "Adult Content", in addition to security threats like malware and phishing.
126+
Cloudflare uses a variety of data sources to categorize domains. Using Cloudflare Radar, you can view the content categories associated with a given domain. Cloudflare customers using [Cloudflare Gateway](/cloudflare-one/policies/gateway/domain-categories/) or [1.1.1.1 for Families](/1.1.1.1/setup/#1111-for-families) can decide to block certain categories, like "Adult Content", in addition to security threats like malware and phishing.
127127

128128
In some cases, a domain may be miscategorized. For example, a social media site might be categorized as "Shopping & Auctions". If you believe a domain is miscategorized, or a domain has not yet been categorized, please provide your suggested category using [this form](https://radar.cloudflare.com/domains/feedback) to bring it to our attention.
129129

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,10 @@
11
---
2-
{}
2+
params:
3+
- APIendpoint
34
---
45

56
The IP address of the request's target.
67

7-
| UI name | API example |
8-
| -------------- | ------------------------- |
9-
| Destination IP | `net.dst.ip == 192.0.2.0` |
8+
| UI name | API example |
9+
| -------------- | ---------------------------------------------------------- |
10+
| Destination IP | <code>any({props.APIendpoint}[*] in \{10.0.0.0/8\})</code> |

src/content/partials/cloudflare-one/gateway/selectors/net-http-content-categories.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ params:
33
- APIendpoint
44
---
55

6+
Applications within a specific [security category](/cloudflare-one/policies/gateway/domain-categories/#content-categories) as categorized by [Cloudflare Radar](/radar/glossary/#content-categories).
7+
68
| UI name | API example |
79
| ------------------ | ------------------------------------------------- |
810
| Content Categories | <code>any({props.APIendpoint}[*] in \{1\})</code> |
9-
10-
For more information, refer to the list of [content categories](/cloudflare-one/policies/gateway/domain-categories/#content-categories).

src/content/partials/cloudflare-one/gateway/selectors/security-risks.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ params:
55

66
import { Markdown } from "~/components";
77

8+
Applications within a specific [security category](/cloudflare-one/policies/gateway/domain-categories/#security-categories) as categorized by [Cloudflare Radar](/radar/glossary/#content-categories).
9+
810
| UI name | API example |
911
| -------------- | ------------------------------------------------- |
1012
| Security Risks | <code>any({props.APIendpoint}[*] in \{1\})</code> |
11-
12-
For more information, refer to the list of [security categories](/cloudflare-one/policies/gateway/domain-categories/#security-categories).

src/content/partials/cloudflare-one/gateway/selectors/source-ip-net.mdx

Lines changed: 0 additions & 8 deletions
This file was deleted.
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
---
2+
params:
3+
- APIendpoint
4+
---
5+
6+
The originating IP address or addresses of a device proxied by Gateway.
7+
8+
| UI name | API example |
9+
| --------- | ----------------------------------------------------- |
10+
| Source IP | <code>{props.APIendpoint}[*] in \{10.0.0.0/8\}</code> |
Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
{}
3-
43
---
54

5+
The originating port of a device proxied by Gateway.
6+
67
| UI name | API example |
78
| ----------- | ------------------------ |
89
| Source Port | `net.src.port == "2222"` |

0 commit comments

Comments
 (0)