Skip to content

Commit 42323d0

Browse files
authored
[Gateway] Apply suggestions (#24254)
* Apply suggestions * Fix styling * Add obtaining IPv6 links
1 parent 876c107 commit 42323d0

File tree

3 files changed

+4
-8
lines changed

3 files changed

+4
-8
lines changed

src/content/docs/cloudflare-one/policies/gateway/egress-policies/dedicated-egress-ips.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,9 +40,9 @@ When testing against another origin, you may see either an IPv4 or IPv6 address.
4040

4141
## Bring your own IP address (BYOIP)
4242

43-
Enterprise users can use their own authority-provided IPv4 and IPv6 addresses as dedicated egress IPs. Gateway supports bringing your own IPv4 and IPv6 addresses.
43+
Enterprise users can use their own authority-provided IPv4 and IPv6 addresses as dedicated egress IPs. Gateway supports bringing your own IPv4 and IPv6 addresses. To obtain an IPv6 range, refer to [American Registry for Internet Numbers (ARIN)](https://www.arin.net/resources/guide/ipv6/first_request/) or [Regional Internet Registry for Europe, Middle East and Central Asia (RIPE NCC)](https://www.ripe.net/manage-ips-and-asns/ipv6/request-ipv6/).
4444

45-
After you onboard your IP addresses, the IP addresses will appear when you create a [egress policy](/cloudflare-one/policies/gateway/egress-policies/) and choose **Use dedicated egress IPs (Cloudflare or BYOIP)** as the [egress method](/cloudflare-one/policies/gateway/egress-policies/#egress-methods). BYOIP dedicate egress IPs do not support [IP geolocation](#ip-geolocation).
45+
After you onboard your IP addresses, the IP addresses will appear when you create a [egress policy](/cloudflare-one/policies/gateway/egress-policies/) and choose **Use dedicated egress IPs (Cloudflare or BYOIP)** as the [egress method](/cloudflare-one/policies/gateway/egress-policies/#egress-methods). BYOIP dedicated egress IPs do not support [IP geolocation](#ip-geolocation).
4646

4747
For more information, refer to [Cloudflare BYOIP](/byoip/) or contact your account team.
4848

src/content/docs/cloudflare-one/policies/gateway/egress-policies/index.mdx

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Cloudflare does not publish WARP egress IP ranges. WARP egress IPs are not docum
2121

2222
## Load balancing
2323

24-
Gateway traffic that does not match an egress policy will egress from the closest Cloudflare data center with a default Gateway egress IP. If there are two data centers of equal distance from the user, Gateway will split the traffic between the two data centers, and the load balancer will retain the same user selection and egress IP regardless of data center. This logic applies to both the default Cloudflare egress IPs and any dedicated egress IPs.
24+
When using either the default Cloudflare egress IPs or any dedicated egress IPs, Gateway traffic that does not match an egress policy will egress from the closest Cloudflare data center with a default Gateway egress IP. If there are two data centers of equal distance from the user, Gateway will split the traffic between the two data centers, and the load balancer will retain the same user selection and egress IP regardless of data center.
2525

2626
## Force IP version
2727

@@ -254,7 +254,6 @@ Additionally, to use these selectors to filter traffic onboarded with WARP, you
254254
2. In your WARP [device profile](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/), configure your [Split Tunnel](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) depending on the mode:
255255

256256
<Tabs> <TabItem label="Exclude IPs and domains">
257-
258257
1. [Remove the route](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#remove-a-route) to the IP address `100.64.0.0/10` from your Split Tunnel exclude list.
259258
2. [Add routes](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to exclude the following IP addresses:
260259
- `100.64.0.0/12`
@@ -265,7 +264,6 @@ Additionally, to use these selectors to filter traffic onboarded with WARP, you
265264
- `100.96.0.0/11`
266265

267266
</TabItem> <TabItem label="Include IPs and domains">
268-
269267
1. Add the required [Zero Trust domains](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-domains) or [IP addresses](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-ip-addresses) to your Split Tunnel include list.
270268
2. [Add a route](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to include the IP address `100.80.0.0/16`.
271269

src/content/partials/cloudflare-one/gateway/order-of-enforcement.mdx

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ flowchart TB
2424
http1{{"Do Not Inspect policies"}}
2525
http2["Isolate policies <br>(with Browser Isolation add-on)"]
2626
http3["Allow, Block, Do Not Scan, Quarantine, and Redirect policies, DLP, and anti-virus scanning"]
27-
https["HTTP (port 80) or<br>HTTPS (port 443)?"]
27+
https["HTTP or HTTPS?"]
2828
end
2929
subgraph Proxy["Proxy"]
3030
HTTP
@@ -204,12 +204,10 @@ When a user goes to `https://test.example.com`, Gateway performs the following o
204204
1. Evaluate DNS request against DNS policies: <Render file="gateway/order-of-precedence-dns-order" product="cloudflare-one" />
205205

206206
2. Evaluate HTTPS request against HTTP policies:
207-
208207
1. Policy #2 is evaluated first because Do Not Inspect [always takes precedence](#http-policies) over Allow and Block. Since there is no match, move on to check Policy #1.
209208
2. Policy #1 does not match `test.example.com`. Since there are no matching Block policies, the request passes the HTTP filter and moves on to network policy evaluation.
210209

211210
3. Evaluate HTTPS request against network policies:
212-
213211
1. Policy #1 does not match because port 80 is used for standard HTTP, not HTTPS.
214212
2. Policy #2 matches, so the request is allowed and proxied to the upstream server.
215213
3. Policy #3 is not evaluated because there has already been an explicit match.

0 commit comments

Comments
 (0)