Skip to content

Commit 40708e3

Browse files
authored
cgnat IP callout
1 parent abdf8eb commit 40708e3

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

src/content/docs/cloudflare-one/access-controls/applications/non-http/self-hosted-private-app.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ This feature replaces the legacy [private network app type](/cloudflare-one/acce
3232
6. Add the private IP and/or private hostname that represents the application. You can use [wildcards](/cloudflare-one/access-controls/policies/app-paths/) with private hostnames to protect multiple parts of an application that share a root path.
3333

3434
:::note
35-
Private hostnames explicitly set to `443` (not including port ranges, e.g. 441-44) over HTTPS must have a valid Server Name Indicator (SNI). All other ports do not require a valid SNI value. If you are configuring a private IP on any port other than `443` and plan to use Browser Isolation, note that this [will result in a Gateway block page](/cloudflare-one/remote-browser-isolation/known-limitations/#browser-isolation-is-not-compatible-with-private-ips-on-non-443-ports).
35+
Private hostnames explicitly set to `443` (not including port ranges, e.g. 441-44) over HTTPS must have a valid Server Name Indicator (SNI). All other ports do not require a valid SNI value and will be assigned a CGNAT IP address. If you are configuring a private IP on any port other than `443` and plan to use Browser Isolation, note that this [will result in a Gateway block page](/cloudflare-one/remote-browser-isolation/known-limitations/#browser-isolation-is-not-compatible-with-private-ips-on-non-443-ports).
3636
:::
3737

3838
If using a non-443 private hostname, ensure that the following CGNAT IP addresses are not blocked by any firewalls or excluded from Gateway traffic:

0 commit comments

Comments
 (0)