Skip to content

Commit 745ee74

Browse files
authored
[Gateway] TLS version support (#18056)
1 parent 93e2897 commit 745ee74

File tree

2 files changed

+8
-6
lines changed

2 files changed

+8
-6
lines changed

src/content/docs/cloudflare-one/policies/gateway/http-policies/http3.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
pcx_content_type: concept
33
title: HTTP/3
44
sidebar:
5-
order: 2
5+
order: 3
66
---
77

88
import { Details } from "~/components";
99

10-
Gateway supports inspection of HTTP/3 traffic, which uses the QUIC protocol over UDP. HTTP/3 inspection requires traffic to be proxied over UDP.
10+
Gateway supports inspection of HTTP/3 traffic, which uses the QUIC protocol over UDP. HTTP/3 inspection requires a [user-side certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/) to be deployed and traffic to be proxied over UDP with [TLS version 1.3](/cloudflare-one/policies/gateway/http-policies/tls-decryption/).
1111

1212
Gateway applies HTTP policies to HTTP/3 traffic last. For more information, refer to the [order of enforcement](/cloudflare-one/policies/gateway/order-of-enforcement/#http3-traffic).
1313

src/content/docs/cloudflare-one/policies/gateway/http-policies/tls-decryption.mdx

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: concept
33
title: TLS decryption
44
sidebar:
5-
order: 3
5+
order: 2
66
---
77

88
import {
@@ -19,6 +19,8 @@ When you enable TLS decryption, Gateway will decrypt all traffic sent over HTTPS
1919

2020
Cloudflare prevents interference by decrypting, inspecting, and re-encrypting HTTPS requests in its data centers in memory only. Gateway only stores eligible cache content at rest. All cache disks are encrypted at rest. You can configure where TLS decryption takes place with [Regional Services](/data-localization/regional-services/) in the [Cloudflare Data Localization Suite (DLS)](/data-localization/).
2121

22+
Cloudflare supports connections from users to Gateway over TLS 1.1, 1.2, and 1.3.
23+
2224
## Enable TLS decryption
2325

2426
<Render file="gateway/enable-tls-decryption" product="cloudflare-one" />
@@ -51,7 +53,7 @@ Google Chrome can automatically upgrade HTTP requests to HTTPS requests, even wh
5153

5254
You can turn off automatic HTTPS upgrades via a Gateway pass through policy, a Chrome browser flag, or a Chrome Enterprise policy.
5355

54-
<Tabs> <TabItem label="pass through policy">
56+
<Tabs> <TabItem label="Pass through policy">
5557

5658
To disable automatic HTTPS upgrades for a URL across your Zero Trust organization, create a Gateway pass through policy.
5759

@@ -69,11 +71,11 @@ To disable automatic HTTPS upgrades for a URL across your Zero Trust organizatio
6971

7072
The pass through policy will bypass insecure connection upgrades for any device connected to your Zero Trust organization. For more information, refer to [Untrusted certificates](/cloudflare-one/policies/gateway/http-policies/#untrusted-certificates).
7173

72-
</TabItem> <TabItem label="chrome browser flag">
74+
</TabItem> <TabItem label="Chrome browser flag">
7375

7476
To disable automatic HTTPS upgrades on a per-browser basis, go to [Chrome flags](chrome://flags/#https-upgrades) and turn off **HTTPS Upgrades**.
7577

76-
</TabItem> <TabItem label="chrome enterprise policy">
78+
</TabItem> <TabItem label="Chrome enterprise policy">
7779

7880
Chrome Enterprise users can turn off automatic HTTPS upgrades for all URLs with a [`HttpsUpgradesEnabled` management policy](https://chromeenterprise.google/policies/#HttpsUpgradesEnabled).
7981

0 commit comments

Comments
 (0)