Skip to content

Commit 808f4ef

Browse files
authored
[Gateway] Revamp get started (#18701)
1 parent 433ff9b commit 808f4ef

File tree

9 files changed

+96
-75
lines changed

9 files changed

+96
-75
lines changed

src/content/docs/cloudflare-one/policies/gateway/initial-setup/dns.mdx

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ To filter DNS requests from an individual device such as a laptop or phone:
2525

2626
1. [Install the WARP client](/cloudflare-one/connections/connect-devices/warp/deployment/) on your device.
2727
2. In the WARP client Settings, log in to your organization's <GlossaryTooltip term="team name">Zero Trust instance</GlossaryTooltip>.
28-
3. (Optional) If you want to display a [custom block page](/cloudflare-one/policies/gateway/block-page/), [install the Cloudflare root certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/) on your device.
28+
3. (Optional) If you want to display a [custom block page](/cloudflare-one/policies/gateway/block-page/), [install a Cloudflare root certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/) on your device.
2929

3030
### Connect DNS locations
3131

@@ -44,20 +44,16 @@ Gateway identifies locations differently depending on the DNS query protocol:
4444

4545
## 2. Verify device connectivity
4646

47+
To verify your device is connected to Zero Trust:
48+
4749
<Render
4850
file="gateway/verify-connectivity"
4951
params={{ one: "DNS", two: "queries" }}
5052
/>
5153

52-
## 3. Add recommended policies
53-
54-
To create a new DNS policy, go to **Gateway** > **Firewall policies** > **DNS** in Zero Trust. We recommend adding the following policy:
55-
56-
### Block all security categories
57-
58-
Block [known threats](/cloudflare-one/policies/gateway/domain-categories/#security-categories) such as Command & Control, Botnet and Malware based on Cloudflare's threat intelligence.
54+
## 3. Create your first DNS policy
5955

60-
<Render file="gateway/policies/block-security-categories" />
56+
<Render file="gateway/get-started/create-dns-policy" />
6157

6258
## 4. Add optional policies
6359

src/content/docs/cloudflare-one/policies/gateway/initial-setup/http.mdx

Lines changed: 4 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -30,27 +30,16 @@ To filter HTTP requests from a device:
3030

3131
## 2. Verify device connectivity
3232

33+
To verify your device is connected to Zero Trust:
34+
3335
<Render
3436
file="gateway/verify-connectivity"
3537
params={{ one: "HTTP", two: "requests" }}
3638
/>
3739

38-
## 3. Add recommended policies
39-
40-
To create a new HTTP policy, go to **Gateway** > **Firewall policies** > **HTTP** in Zero Trust.
41-
We recommend adding the following policies:
42-
43-
### Bypass inspection for incompatible applications
44-
45-
Bypass HTTP inspection for applications which use [embedded certificates](/cloudflare-one/policies/gateway/http-policies/tls-decryption/#inspection-limitations). This will help avoid any incompatibilities that may arise from an initial rollout. By the _Do Not Inspect_ app type, Gateway will filter any new applications when they are added to the group.
46-
47-
<Render file="gateway/policies/do-not-inspect-applications" />
48-
49-
### Block all security categories
50-
51-
Block [known threats](/cloudflare-one/policies/gateway/domain-categories/#security-categories) such as Command & Control, Botnet and Malware based on Cloudflare's threat intelligence.
40+
## 3. Create your first HTTP policy
5241

53-
<Render file="gateway/policies/block-security-categories" />
42+
<Render file="gateway/get-started/create-http-policy" />
5443

5544
## 4. Add optional policies
5645

src/content/docs/cloudflare-one/policies/gateway/initial-setup/network.mdx

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ head:
88
content: Set up network filtering
99
---
1010

11-
import { GlossaryTooltip } from "~/components";
11+
import { GlossaryTooltip, Render } from "~/components";
1212

1313
Secure Web Gateway allows you to apply policies at the network level (Layers 3 and 4) to control which websites and non-HTTP applications users can access.
1414

@@ -34,6 +34,8 @@ To filter traffic from private networks, refer to the [Cloudflare Tunnel guide](
3434

3535
## 2. Verify device connectivity
3636

37+
To verify your device is connected to Zero Trust:
38+
3739
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Network**.
3840
2. Under **Gateway logging**, enable activity logging for all Network logs.
3941
3. On your WARP-enabled device, open a browser and visit any website.
@@ -43,6 +45,10 @@ To filter traffic from private networks, refer to the [Cloudflare Tunnel guide](
4345
3. Note the **Public IP**.
4446
5. In Zero Trust, go to **Logs** > **Gateway** > **Network**. Before building Network policies, make sure you see Network logs from the Source IP assigned to your device.
4547

46-
## 3. Add policies
48+
## 3. Create your first network policy
49+
50+
<Render file="gateway/get-started/create-network-policy" />
51+
52+
## 4. Add optional policies
4753

48-
To create a new network policy, go to **Gateway** > **Firewall policies** > **Network** in Zero Trust. Refer to our list of [common network policies](/cloudflare-one/policies/gateway/network-policies/common-policies) for policies you may want to create.
54+
Refer to our list of [common network policies](/cloudflare-one/policies/gateway/network-policies/common-policies) for policies you may want to create.

src/content/docs/learning-paths/secure-internet-traffic/build-dns-policies/create-policy.mdx

Lines changed: 1 addition & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -11,17 +11,4 @@ DNS policies determine how Gateway should handle a DNS request. When a user send
1111

1212
You can filter DNS traffic based on query or response parameters (such as domain, source IP, or geolocation). You can also filter by user identity if you connect your devices to Gateway with the [WARP client or Cloudflare One Agent](/learning-paths/secure-internet-traffic/connect-devices-networks/install-agent/).
1313

14-
To create a new DNS policy:
15-
16-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **Firewall policies**.
17-
2. In the **DNS** tab, select **Add a policy**.
18-
3. Name the policy.
19-
4. Under **Traffic**, build a logical expression that defines the traffic you want to allow or block.
20-
5. Choose an **Action** to take when traffic matches the logical expression. For example, we recommend adding a policy to block all [security categories](/cloudflare-one/policies/gateway/domain-categories/#security-categories):
21-
<Render
22-
file="gateway/policies/block-security-categories"
23-
product="cloudflare-one"
24-
/>
25-
6. Select **Create policy**.
26-
27-
For more information, refer to [DNS policies](/cloudflare-one/policies/gateway/dns-policies/).
14+
<Render file="gateway/get-started/create-dns-policy" product="cloudflare-one" />

src/content/docs/learning-paths/secure-internet-traffic/build-http-policies/create-policy.mdx

Lines changed: 4 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -13,26 +13,10 @@ Now that you have considered which devices and applications TLS inspection shoul
1313

1414
Use a standard naming convention when building all policies. Policy names should be unique across the Cloudflare account, follow the same structure, and be as descriptive as possible.
1515

16-
To create a new HTTP policy:
17-
18-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **Firewall policies**.
19-
20-
2. In the **HTTP** tab, select **Add a policy**.
21-
22-
3. Name the policy.
23-
24-
4. Under **Traffic**, build a logical expression that defines the traffic you want to allow or block.
25-
26-
5. Choose an **Action** to take when traffic matches the logical expression. For example, if you have enabled TLS inspection, some applications that use [embedded certificates](/cloudflare-one/policies/gateway/http-policies/tls-decryption/#inspection-limitations) may not support HTTP inspection, such as some Google products. You can create a policy to bypass inspection for these applications:
27-
28-
<Render
29-
file="gateway/policies/do-not-inspect-applications"
30-
product="cloudflare-one"
31-
/>
32-
33-
6. Select **Create policy**.
34-
35-
For more information, refer to [HTTP policies](/cloudflare-one/policies/gateway/http-policies/).
16+
<Render
17+
file="gateway/get-started/create-http-policy"
18+
product="cloudflare-one"
19+
/>
3620

3721
## Order your policies
3822

src/content/docs/learning-paths/secure-internet-traffic/build-network-policies/create-policy.mdx

Lines changed: 4 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -9,17 +9,7 @@ import { Render } from "~/components";
99

1010
You can control network-level traffic by filtering requests by selectors such as IP addresses and ports. You can also integrate network policies with an [identity provider](/cloudflare-one/identity/idp-integration/) to apply identity-based filtering.
1111

12-
To create a new network policy:
13-
14-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **Firewall policies**.
15-
2. In the **Network** tab, select **Add a policy**.
16-
3. Name the policy.
17-
4. Under **Traffic**, build a logical expression that defines the traffic you want to allow or block.
18-
5. Choose an **Action** to take when traffic matches the logical expression.
19-
<Render
20-
file="gateway/policies/enforce-device-posture"
21-
product="cloudflare-one"
22-
/>
23-
6. Select **Create policy**.
24-
25-
For more information, refer to [network policies](/cloudflare-one/policies/gateway/network-policies/).
12+
<Render
13+
file="gateway/get-started/create-network-policy"
14+
product="cloudflare-one"
15+
/>
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
---
2+
{}
3+
---
4+
5+
import { Render } from "~/components";
6+
7+
To create a new DNS policy:
8+
9+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **Firewall policies**.
10+
2. In the **DNS** tab, select **Add a policy**.
11+
3. Name the policy.
12+
4. Under **Traffic**, build a logical expression that defines the traffic you want to allow or block.
13+
5. Choose an **Action** to take when traffic matches the logical expression. For example, we recommend adding a policy to block all [security categories](/cloudflare-one/policies/gateway/domain-categories/#security-categories):
14+
<Render
15+
file="gateway/policies/block-security-categories"
16+
product="cloudflare-one"
17+
/>
18+
6. Select **Create policy**.
19+
20+
For more information, refer to [DNS policies](/cloudflare-one/policies/gateway/dns-policies/).
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
---
2+
{}
3+
---
4+
5+
import { Render } from "~/components";
6+
7+
To create a new HTTP policy:
8+
9+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **Firewall policies**.
10+
2. In the **HTTP** tab, select **Add a policy**.
11+
3. Name the policy.
12+
4. Under **Traffic**, build a logical expression that defines the traffic you want to allow or block.
13+
5. Choose an **Action** to take when traffic matches the logical expression. For example, if you have enabled TLS inspection, some applications that use [embedded certificates](/cloudflare-one/policies/gateway/http-policies/tls-decryption/#inspection-limitations) may not support HTTP inspection, such as some Google products. You can create a policy to bypass inspection for these applications:
14+
15+
<Render
16+
file="gateway/policies/do-not-inspect-applications"
17+
product="cloudflare-one"
18+
/>
19+
20+
Cloudflare also recommends adding a policy to block [known threats](/cloudflare-one/policies/gateway/domain-categories/#security-categories) such as Command & Control, Botnet and Malware based on Cloudflare's threat intelligence:
21+
22+
<Render
23+
file="gateway/policies/block-security-categories"
24+
product="cloudflare-one"
25+
/>
26+
27+
6. Select **Create policy**.
28+
29+
For more information, refer to [HTTP policies](/cloudflare-one/policies/gateway/http-policies/).
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
---
2+
{}
3+
---
4+
5+
import { Render } from "~/components";
6+
7+
To create a new network policy:
8+
9+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **Firewall policies**.
10+
2. In the **Network** tab, select **Add a policy**.
11+
3. Name the policy.
12+
4. Under **Traffic**, build a logical expression that defines the traffic you want to allow or block.
13+
5. Choose an **Action** to take when traffic matches the logical expression.
14+
<Render
15+
file="gateway/policies/enforce-device-posture"
16+
product="cloudflare-one"
17+
/>
18+
6. Select **Create policy**.
19+
20+
For more information, refer to [network policies](/cloudflare-one/policies/gateway/network-policies/).

0 commit comments

Comments
 (0)