Skip to content

Commit 8c2a4fd

Browse files
authored
Remove ENT requirement (#22639)
1 parent 9dc1d06 commit 8c2a4fd

File tree

2 files changed

+4
-14
lines changed

2 files changed

+4
-14
lines changed

src/content/docs/cloudflare-one/policies/gateway/network-policies/protocol-detection.mdx

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,8 @@ title: Protocol detection
33
pcx_content_type: how-to
44
sidebar:
55
order: 2
6-
76
---
87

9-
:::note
10-
Only available on Enterprise plans.
11-
:::
12-
138
Gateway supports the detection, logging, and filtering of network protocols using packet attributes.
149

1510
Protocol detection only applies to devices connected to Zero Trust via the WARP client in [Gateway with WARP](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#gateway-with-warp-default) mode.
@@ -19,7 +14,7 @@ Protocol detection only applies to devices connected to Zero Trust via the WARP
1914
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Network** > **Firewall**.
2015
2. Turn on **Protocol Detection**.
2116

22-
You can now use *Detected Protocol* as a selector in a [Network policy](/cloudflare-one/policies/gateway/network-policies/#detected-protocol).
17+
You can now use _Detected Protocol_ as a selector in a [Network policy](/cloudflare-one/policies/gateway/network-policies/#detected-protocol).
2318

2419
## Supported protocols
2520

@@ -29,7 +24,7 @@ Gateway supports detection and filtering of the following protocols:
2924
| -------- | ------------------------------------------------------------------------------------------- |
3025
| HTTP | The policy builder includes separate values for HTTP/1.1 and HTTP/2. |
3126
| SSH | |
32-
| TLS | Gateway detects TLS versions 1.1 through 1.3 with the *TLS* value. |
27+
| TLS | Gateway detects TLS versions 1.1 through 1.3 with the _TLS_ value. |
3328
| DCE/RPC | |
3429
| MQTT | |
3530
| TPKT | TPKT commonly initiates RDP sessions, so you can use it to identify and filter RDP traffic. |
@@ -41,4 +36,4 @@ You can create network policies that filter traffic based on protocol detections
4136

4237
| Selector | Operator | Value | Action |
4338
| ----------------- | -------- | ----- | ------ |
44-
| Detected Protocol | in | *SSH* | Block |
39+
| Detected Protocol | in | _SSH_ | Block |
Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,9 @@
11
---
22
{}
3-
43
---
54

6-
The inferred network protocol based on our [protocol detection](/cloudflare-one/policies/gateway/network-policies/protocol-detection/).
5+
The inferred network protocol based on Cloudflare's [protocol detection](/cloudflare-one/policies/gateway/network-policies/protocol-detection/).
76

87
| UI name | API example |
98
| ----------------- | --------------------------------- |
109
| Detected Protocol | `net.protocol.detection == "ssh"` |
11-
12-
:::note
13-
This selector is available in early access for Enterprise users. For more information, contact your account team.
14-
:::

0 commit comments

Comments
 (0)