Skip to content

Commit 66ea889

Browse files
committed
Edit steps to account for PAC files
1 parent 5394ed3 commit 66ea889

File tree

2 files changed

+14
-16
lines changed

2 files changed

+14
-16
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/agentless/pac-files.mdx

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Only available on Enterprise plans.
1313

1414
You can apply Gateway HTTP and DNS policies at the browser level by configuring a Proxy Auto-Configuration (PAC) file.
1515

16-
<GlossaryDefinition term="PAC file" prepend="A PAC file is" />
16+
<GlossaryDefinition term="PAC file" prepend="A PAC file is " />
1717

1818
When end users visit a website, their browser will send the request to a Cloudflare proxy server associated with your account to be filtered by Gateway. Note that Gateway [cannot filter every type of HTTP traffic](#limitations) proxied using PAC files.
1919

@@ -217,17 +217,15 @@ To get the domain of a proxy endpoint:
217217

218218
```json {10} output
219219
{
220-
"success": true,
221-
"result": {
222-
"id": "ed35569b41ce4d1facfe683550f54086",
223-
"created_at": "2014-01-01T05:20:00.12345Z",
224-
"ips": [
225-
"192.0.2.1/32"
226-
],
227-
"name": "DevOps team",
228-
"subdomain": "oli3n9zkz5.proxy.cloudflare-gateway.com",
229-
"updated_at": "2014-01-01T05:20:00.12345Z"
230-
}
220+
"success": true,
221+
"result": {
222+
"id": "ed35569b41ce4d1facfe683550f54086",
223+
"created_at": "2014-01-01T05:20:00.12345Z",
224+
"ips": ["192.0.2.1/32"],
225+
"name": "DevOps team",
226+
"subdomain": "oli3n9zkz5.proxy.cloudflare-gateway.com",
227+
"updated_at": "2014-01-01T05:20:00.12345Z"
228+
}
231229
}
232230
```
233231

src/content/docs/cloudflare-one/policies/gateway/proxy.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,11 @@ The Gateway proxy is required for filtering HTTP and network traffic via the WAR
1515

1616
Gatway uses the [Happy Eyeballs algorithm](https://datatracker.ietf.org/doc/html/rfc6555) to proxy traffic in the following order:
1717

18-
1. The user's WARP client initiates the TCP handshake by sending Gateway a TCP SYN segment.
18+
1. The user's browser initiates the TCP handshake by sending Gateway a TCP SYN segment.
1919
2. Gateway sends a SYN segment to the origin server.
20-
3. If the origin server sends a SYN-ACK segment back, Gateway establishes distinct TCP connections between the WARP client and Gateway and between Gateway and the origin server.
21-
4. Gateway inspects and filters traffic received from the WARP client.
22-
5. If the traffic passes inspection, Gateway proxies traffic bidirectionally between the client and the origin server.
20+
3. If the origin server sends a SYN-ACK segment back, Gateway establishes distinct TCP connections between the user and Gateway and between Gateway and the origin server.
21+
4. Gateway inspects and filters traffic received from the user.
22+
5. If the traffic passes inspection, Gateway proxies traffic bidirectionally between the user and the origin server.
2323

2424
```mermaid
2525
flowchart TD

0 commit comments

Comments
 (0)