You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/applications/non-http/private-network-app.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,14 +7,14 @@ sidebar:
7
7
---
8
8
9
9
:::note
10
-
Not recommended for new deployments. We recommend using a [self-hosted application](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) to secure a private IP address.
10
+
Not recommended for new deployments. We recommend using a [self-hosted application](/cloudflare-one/applications/non-http/self-hosted-private-app/) to secure a private IP address.
11
11
:::
12
12
13
13
You can configure a **Private Network** application to manage access to specific applications on your private network.
14
14
15
15
To create a private network application:
16
16
17
-
1. In Zero Trust, go to **Access** > **Applications** > **Add an application**.
17
+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications** > **Add an application**.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/applications/non-http/self-hosted-private-app.mdx
+74Lines changed: 74 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,3 +5,77 @@ sidebar:
5
5
order: 3
6
6
label: Add a self-hosted private application
7
7
---
8
+
9
+
import { Render } from"~/components"
10
+
11
+
You can configure a self-hosted Access application to manage access to specific IPs or hostnames on your private network.
12
+
13
+
## Prerequisites
14
+
15
+
- Private IPs and hostnames are reachable over Cloudflare WARP, Magic WAN or Browser Isolation. For more details, refer to [Connect a private network](/cloudflare-one/connections/connect-networks/private-net/).
16
+
- Private hostnames route to your custom DNS resolver through [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) or [Gateway resolver policies](/cloudflare-one/policies/gateway/resolver-policies/).
17
+
-[Gateway TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) must be enabled if you would like to present a login page in the browser. Otherwise, users will receive a pop-up notification from the WARP client.
18
+
19
+
## 1. Add your application to Access
20
+
21
+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
22
+
23
+
2. Select **Add an application**.
24
+
25
+
3. Select **Self-hosted**.
26
+
27
+
4. Enter any name for the application.
28
+
29
+
5. In **Session Duration**, choose how often the user's [application token](/cloudflare-one/identity/authorization-cookie/application-token/) should expire.
30
+
31
+
Cloudflare checks every HTTP request to your application for a valid application token. If the user's application token (and global token) has expired, they will be prompted to reauthenticate with the IdP. For more information, refer to [Session management](/cloudflare-one/identity/users/session-management/).
32
+
33
+
6. Add the private IP and/or private hostname that represents the application.
34
+
35
+
:::note
36
+
Private hostnames are currently only available over port `443` over HTTPS.
37
+
:::
38
+
39
+
7. Add [Access policies](/cloudflare-one/policies/access/) to control who can connect to your application.
-[Browser rendering for SSH and VNC](/cloudflare-one/applications/non-http/browser-rendering/)
58
+
-**401 Response for Service Auth policies**: Return a `401` response code when a user (or machine) makes a request to the application without the correct [service token](/cloudflare-one/identity/service-tokens/).
59
+
60
+
14. Select **Save**.
61
+
62
+
## 2. (Optional) Modify order of precedence in Gateway
63
+
64
+
By default, Cloudflare will evaluate Access private application policies after evaluating all Gateway network policies. To evaluate Access private application policies before or after specific Gateway policies, create the following [Gateway network policy](/cloudflare-one/policies/gateway/network-policies/):
65
+
66
+
67
+
| Selector | Operator | Value | Action |
68
+
| -------- | -------- | ------------ | ------ |
69
+
| All Access Private Apps | is |`Enabled`| Allow |
70
+
71
+
You can now drag and drop this policy in the Gateway policy builder to change its [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence).
72
+
73
+
:::note
74
+
All Access applications are deny by default -- a user must match an associated Access Allow policy before they are granted access. The Gateway policy is strictly for routing and connectivity purposes.
75
+
:::
76
+
77
+
## 3. Validate the Access token
78
+
79
+
<Renderfile="access/secure-tunnel-with-access" />
80
+
81
+
Users can now connect to your private application after authenticating with Cloudflare Access.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-networks/private-net/cloudflared/index.mdx
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,14 +32,15 @@ To connect your infrastructure with Cloudflare Tunnel:
32
32
33
33
## 4. (Recommended) Filter network traffic with Gateway
34
34
35
-
By default, all WARP devices enrolled in your Zero Trust organization can connect to your private network through Cloudflare Tunnel. You can configure Gateway to inspect your network traffic and either block or allow access based on user identity and device posture.
35
+
By default, all WARP devices enrolled in your Zero Trust organization can connect to your private network through Cloudflare Tunnel. You can configure Gateway inspect your network traffic and either block or allow access based on user identity and device posture.
36
36
37
37
### Enable the Gateway proxy
38
38
39
39
<Renderfile="tunnel/enable-gateway-proxy" />
40
40
41
-
### Create Zero Trust policies
41
+
### Zero Trust policies
42
42
43
+
Cloudflare Zero Trust allows you to configure security policies using either Access or Gateway. If you have applications clearly defined by IPs or hostnames, we recommend [creating an Access application](/cloudflare-one/applications/non-http/self-hosted-private-app/) and managing user access alongside your SaaS and other web apps. Alternatively, if you prefer to secure a private network using a traditional firewall model, you can build Gateway [network and DNS policies](/learning-paths/replace-vpn/build-policies/) for IP ranges and domains.
-[Destination Continent IP Geolocation](#destination-continent)
@@ -228,6 +229,14 @@ Gateway will only log successful override connections in your [network logs](/cl
228
229
229
230
Gateway matches network traffic against the following selectors, or criteria.
230
231
232
+
### All Access Private Apps
233
+
234
+
All destination IPs and hostnames associated with an [Access self-hosted private application](/cloudflare-one/applications/non-http/self-hosted-private-app/#2-optional-modify-order-of-precedence-in-gateway).
0 commit comments