Skip to content

Commit 474e7c4

Browse files
committed
move Tunnel prereq into a step
1 parent 118f54b commit 474e7c4

File tree

1 file changed

+8
-5
lines changed

1 file changed

+8
-5
lines changed

src/content/docs/cloudflare-one/policies/gateway/egress-policies/egress-cloudflared.mdx

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -37,12 +37,15 @@ To learn more about how Gateway applies hostname-based policies, refer to the [C
3737

3838
## Prerequisites
3939

40-
- [Connect your private network](/cloudflare-one/connections/connect-networks/private-net/cloudflared/connect-cidr/) to Cloudflare using `cloudflared`. In the AWS example shown above, you would connect the private CIDR block of your AWS VPC.
4140
- User traffic is on-ramped to Gateway using one of the following methods:
4241

4342
<Render file="gateway/egress-selector-onramps" />
4443

45-
## 1. Add a public hostname route
44+
## 1. Connect your private network
45+
46+
[Connect your private network](/cloudflare-one/connections/connect-networks/private-net/cloudflared/connect-cidr/) to Cloudflare using `cloudflared`. For example, if you want traffic to egress from AWS, connect the private CIDR block of your AWS VPC.
47+
48+
## 2. Add a public hostname route
4649

4750
To route a public hostname through Cloudflare Tunnel:
4851

@@ -56,7 +59,7 @@ To route a public hostname through Cloudflare Tunnel:
5659

5760
5. Select **Create route**.
5861

59-
## 2. Route network traffic through WARP
62+
## 3. Route network traffic through WARP
6063

6164
If your traffic is onboarded using WARP, ensure that traffic to the following IP addresses route through the WARP tunnel to Gateway:
6265

@@ -75,9 +78,9 @@ To route `100.80.0.0/16` through WARP:
7578

7679
To route your private network's CIDR block through WARP, refer to [Connect a private network](/cloudflare-one/connections/connect-networks/private-net/cloudflared/connect-cidr/#3-route-private-network-ips-through-warp).
7780

78-
## 3. (Optional) Configure network policies
81+
## 4. (Optional) Configure network policies
7982

80-
You can bulid [Gateway network policies](/cloudflare-one/policies/gateway/network-policies/) to filter HTTPS traffic to your public hostname on port 443. For example, suppose that you want to block all WARP users from accessing `app.bank.com` except for a specific set of users or groups. Additionally, those authorized users should only access `app.bank.com` using your AWS egress IP. You can accomplish this using two policies: the first allows specific users to reach `app.bank.com`, and the second blocks all other port 443 traffic to `app.bank.com`.
83+
You can build [Gateway network policies](/cloudflare-one/policies/gateway/network-policies/) to filter HTTPS traffic to your public hostname on port 443. For example, suppose that you want to block all WARP users from accessing `app.bank.com` except for a specific set of users or groups. Additionally, those authorized users should only access `app.bank.com` using your AWS egress IP. You can accomplish this using two policies: the first allows specific users to reach `app.bank.com`, and the second blocks all other port 443 traffic to `app.bank.com`.
8184

8285
1. Allow company employees
8386
<Render file="gateway/policies/restrict-access-to-private-networks-allow" product="cloudflare-one" params={{ selector: "SNI", value: "app.bank.com" }} />

0 commit comments

Comments
 (0)