Skip to content

Commit 41c1e53

Browse files
committed
Add network partial
1 parent e756577 commit 41c1e53

File tree

4 files changed

+35
-17
lines changed

4 files changed

+35
-17
lines changed

src/content/docs/cloudflare-one/policies/gateway/initial-setup/http.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@ To filter HTTP requests from a device:
3030

3131
## 2. Verify device connectivity
3232

33+
To verify your device is connected to Zero Trust:
34+
3335
<Render
3436
file="gateway/verify-connectivity"
3537
params={{ one: "HTTP", two: "requests" }}

src/content/docs/cloudflare-one/policies/gateway/initial-setup/network.mdx

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ head:
88
content: Set up network filtering
99
---
1010

11-
import { GlossaryTooltip } from "~/components";
11+
import { GlossaryTooltip, Render } from "~/components";
1212

1313
Secure Web Gateway allows you to apply policies at the network level (Layers 3 and 4) to control which websites and non-HTTP applications users can access.
1414

@@ -34,6 +34,8 @@ To filter traffic from private networks, refer to the [Cloudflare Tunnel guide](
3434

3535
## 2. Verify device connectivity
3636

37+
To verify your device is connected to Zero Trust:
38+
3739
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Network**.
3840
2. Under **Gateway logging**, enable activity logging for all Network logs.
3941
3. On your WARP-enabled device, open a browser and visit any website.
@@ -43,6 +45,10 @@ To filter traffic from private networks, refer to the [Cloudflare Tunnel guide](
4345
3. Note the **Public IP**.
4446
5. In Zero Trust, go to **Logs** > **Gateway** > **Network**. Before building Network policies, make sure you see Network logs from the Source IP assigned to your device.
4547

46-
## 3. Add policies
48+
## 3. Create your first network policy
49+
50+
<Render file="gateway/get-started/create-network-policy" />
51+
52+
## 4. Add optional policies
4753

48-
To create a new network policy, go to **Gateway** > **Firewall policies** > **Network** in Zero Trust. Refer to our list of [common network policies](/cloudflare-one/policies/gateway/network-policies/common-policies) for policies you may want to create.
54+
Refer to our list of [common network policies](/cloudflare-one/policies/gateway/network-policies/common-policies) for policies you may want to create.

src/content/docs/learning-paths/secure-internet-traffic/build-network-policies/create-policy.mdx

Lines changed: 4 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -9,17 +9,7 @@ import { Render } from "~/components";
99

1010
You can control network-level traffic by filtering requests by selectors such as IP addresses and ports. You can also integrate network policies with an [identity provider](/cloudflare-one/identity/idp-integration/) to apply identity-based filtering.
1111

12-
To create a new network policy:
13-
14-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **Firewall policies**.
15-
2. In the **Network** tab, select **Add a policy**.
16-
3. Name the policy.
17-
4. Under **Traffic**, build a logical expression that defines the traffic you want to allow or block.
18-
5. Choose an **Action** to take when traffic matches the logical expression.
19-
<Render
20-
file="gateway/policies/enforce-device-posture"
21-
product="cloudflare-one"
22-
/>
23-
6. Select **Create policy**.
24-
25-
For more information, refer to [network policies](/cloudflare-one/policies/gateway/network-policies/).
12+
<Render
13+
file="gateway/get-started/create-network-policy"
14+
product="cloudflare-one"
15+
/>
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
---
2+
{}
3+
---
4+
5+
import { Render } from "~/components";
6+
7+
To create a new network policy:
8+
9+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **Firewall policies**.
10+
2. In the **Network** tab, select **Add a policy**.
11+
3. Name the policy.
12+
4. Under **Traffic**, build a logical expression that defines the traffic you want to allow or block.
13+
5. Choose an **Action** to take when traffic matches the logical expression.
14+
<Render
15+
file="gateway/policies/enforce-device-posture"
16+
product="cloudflare-one"
17+
/>
18+
6. Select **Create policy**.
19+
20+
For more information, refer to [network policies](/cloudflare-one/policies/gateway/network-policies/).

0 commit comments

Comments
 (0)