Skip to content

Commit 87a2da6

Browse files
authored
Apply suggestions from code review
1 parent 0109825 commit 87a2da6

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

src/content/changelog/gateway/2025-07-24-HTTP-Inspection-on-all-ports.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ date: 2025-07-24
1010
[Gateway](/cloudflare-one/policies/gateway/) can now apply [HTTP filtering](/cloudflare-one/policies/gateway/http-policies/) to all proxied HTTP requests, not just traffic on standard HTTP (`80`) and HTTPS (`443`) ports. This means all requests can now be filtered by [A/V scanning](/cloudflare-one/policies/gateway/http-policies/antivirus-scanning/), [file sandboxing](/cloudflare-one/policies/gateway/http-policies/file-sandboxing/), [Data Loss Prevention (DLP)](cloudflare-one/policies/data-loss-prevention/#data-in-transit), and more.
1111

1212
You can turn this [setting](cloudflare-one/policies/gateway/network-policies/protocol-detection/#inspect-on-all-ports) on by going to **Settings** > **Network** > **Firewall** and choosing _Inspect on all ports_.
13+
1314
![HTTP Inspection on all ports setting](~/assets/images/gateway/Gateway-Inspection-all-ports.png)
1415

1516
To learn more, refer to [Inspect on all ports (Beta)](cloudflare-one/policies/gateway/network-policies/protocol-detection/#inspect-on-all-ports).

0 commit comments

Comments
 (0)