Skip to content

Commit 8d257c9

Browse files
committed
Add quotes to connections
1 parent 1f24a5c commit 8d257c9

File tree

4 files changed

+45
-44
lines changed

4 files changed

+45
-44
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/agentless/dns/locations/dns-resolver-ips.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,10 +28,10 @@ flowchart TB
2828
2929
gateway-->query{{"Is the DNS query sent over HTTPS?"}}
3030
31-
query--Yes-->hostname["Look up location by<br />unique hostname"]
31+
query--"Yes"-->hostname["Look up location by<br />unique hostname"]
3232
query--"No"-->ipv4{{"Is it over IPv4?"}}
3333
34-
ipv4--Yes-->source["Look up location by<br />source IPv4 address"]
34+
ipv4--"Yes"-->source["Look up location by<br />source IPv4 address"]
3535
ipv4--"No"-->destination["Look up location by<br />destination IPv6 address"]
3636
```
3737

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/captive-portals.mdx

Lines changed: 16 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@ pcx_content_type: concept
33
title: Captive portal detection
44
sidebar:
55
order: 3
6-
76
---
87

98
Captive portals are used by public Wi-Fi networks (such as airports, coffee shops, and hotels) to make a user agree to their Terms of Service or provide payment before allowing access to the Internet. When a user connects to the Wi-Fi, the captive portal blocks all HTTPS traffic until the user completes a captive portal login flow in their browser. This prevents the WARP client from connecting to Cloudflare. At the same time, WARP creates [firewall rules](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture/#ip-traffic) on the device to send all traffic to Cloudflare. The user is therefore unable to access the captive portal login screen unless they temporarily disable WARP.
@@ -14,22 +13,22 @@ To allow users to connect through a captive portal, administrators can configure
1413

1514
### No user interaction required
1615

17-
* Enable [Captive portal detection](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#captive-portal-detection). This allows WARP to temporarily turn off when it detects a captive portal on the network. For more details, refer to [how captive portal detection works](#how-captive-portal-detection-works) and its [limitations](#limitations).
18-
* Set [Device tunnel protocol](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#device-tunnel-protocol) to **MASQUE**. When using MASQUE, WARP traffic will look like standard HTTPS traffic and is therefore less likely to be blocked by captive portals.
16+
- Enable [Captive portal detection](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#captive-portal-detection). This allows WARP to temporarily turn off when it detects a captive portal on the network. For more details, refer to [how captive portal detection works](#how-captive-portal-detection-works) and its [limitations](#limitations).
17+
- Set [Device tunnel protocol](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#device-tunnel-protocol) to **MASQUE**. When using MASQUE, WARP traffic will look like standard HTTPS traffic and is therefore less likely to be blocked by captive portals.
1918

2019
### User interaction required
2120

22-
* Enable [Lock WARP switch](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#lock-warp-switch) and enable [Admin override](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#admin-override). Users can contact the IT administrator for a one-time code that allows them to manually turn off WARP and connect to a portal.
23-
* For employees who travel, disable [Lock WARP switch](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#lock-warp-switch) and set an [Auto connect](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#auto-connect) duration. This allows the user to manually turn off WARP without contacting IT.
21+
- Enable [Lock WARP switch](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#lock-warp-switch) and enable [Admin override](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#admin-override). Users can contact the IT administrator for a one-time code that allows them to manually turn off WARP and connect to a portal.
22+
- For employees who travel, disable [Lock WARP switch](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#lock-warp-switch) and set an [Auto connect](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#auto-connect) duration. This allows the user to manually turn off WARP without contacting IT.
2423

2524
## How captive portal detection works
2625

2726
If WARP cannot establish a connection to Cloudflare, it will:
2827

2928
1. Temporarily open the [system firewall](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture/#ip-traffic) so that the device can send traffic outside of the WARP tunnel. The firewall only allows the following traffic:
3029

31-
* HTTP/HTTPS on TCP ports `80`, `443`, `8080`, and `8443`
32-
* DNS on UDP port `53`
30+
- HTTP/HTTPS on TCP ports `80`, `443`, `8080`, and `8443`
31+
- DNS on UDP port `53`
3332

3433
2. Send a series of requests to the [captive portal test URLs](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#captive-portal). If the HTTPS request is intercepted, WARP assumes the network is behind a captive portal.
3534

@@ -42,18 +41,18 @@ flowchart TB
4241
accTitle: Captive portal detection
4342
4443
45-
A[Send DNS request] --Succeed--> B[Send HTTPS request]--Fail--> C[Send HTTP request] --Succeed--> D[Captive portal detected]--Receive HTTP redirect-->I[Redirect to captive portal login]
46-
A --Fail--> F(CF_NO_NETWORK error)
47-
C --Fail--> F
48-
B --Succeed--> G[No captive portal]--> H[Retry connection to Cloudflare]
44+
A[Send DNS request] -- Succeed --> B[Send HTTPS request]-- Fail --> C[Send HTTP request] -- Succeed --> D[Captive portal detected]-- Receive HTTP redirect -->I[Redirect to captive portal login]
45+
A -- Fail --> F(CF_NO_NETWORK error)
46+
C -- Fail --> F
47+
B -- Succeed --> G[No captive portal]--> H[Retry connection to Cloudflare]
4948
```
5049

5150
## Limitations
5251

53-
* Due to [how captive portal detection works](#how-captive-portal-detection-works), it may be possible for an employee to spoof a captive portal in order to turn off WARP.
54-
* Some captive portals, particularly those on airlines, may be slow to respond and exceed the captive portal detection timeout. Users will likely see a [CF\_CAPTIVE\_PORTAL\_TIMED\_OUT](/cloudflare-one/connections/connect-devices/warp/troubleshooting/client-errors/#cf_captive_portal_timed_out) error when they try to connect.
55-
* WARP may not be able to detect multi-stage captive portals, which redirect the user to different networks during the login process. Users will need to manually turn off WARP to get through the captive portal.
56-
* Some public Wi-Fi networks are incompatible with running WARP:
52+
- Due to [how captive portal detection works](#how-captive-portal-detection-works), it may be possible for an employee to spoof a captive portal in order to turn off WARP.
53+
- Some captive portals, particularly those on airlines, may be slow to respond and exceed the captive portal detection timeout. Users will likely see a [CF_CAPTIVE_PORTAL_TIMED_OUT](/cloudflare-one/connections/connect-devices/warp/troubleshooting/client-errors/#cf_captive_portal_timed_out) error when they try to connect.
54+
- WARP may not be able to detect multi-stage captive portals, which redirect the user to different networks during the login process. Users will need to manually turn off WARP to get through the captive portal.
55+
- Some public Wi-Fi networks are incompatible with running WARP:
5756

58-
* Captive portals that intercept all DNS traffic will block WARP's [DoH connection](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture/#overview). Users will likely see a [CF\_NO\_NETWORK](/cloudflare-one/connections/connect-devices/warp/troubleshooting/client-errors/#cf_no_network) error after they login to the captive portal.
59-
* Captive portals that only allow HTTPS traffic will block WARP's [Wireguard UDP connection](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture/#overview). Users will likely see a [CF\_HAPPY\_EYEBALLS\_MITM\_FAILURE](/cloudflare-one/connections/connect-devices/warp/troubleshooting/client-errors/#cf_happy_eyeballs_failure) error after they login to the captive portal.
57+
- Captive portals that intercept all DNS traffic will block WARP's [DoH connection](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture/#overview). Users will likely see a [CF_NO_NETWORK](/cloudflare-one/connections/connect-devices/warp/troubleshooting/client-errors/#cf_no_network) error after they login to the captive portal.
58+
- Captive portals that only allow HTTPS traffic will block WARP's [Wireguard UDP connection](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture/#overview). Users will likely see a [CF_HAPPY_EYEBALLS_MITM_FAILURE](/cloudflare-one/connections/connect-devices/warp/troubleshooting/client-errors/#cf_happy_eyeballs_failure) error after they login to the captive portal.

src/content/docs/cloudflare-one/policies/gateway/order-of-enforcement.mdx

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,9 @@ pcx_content_type: concept
33
title: Order of enforcement
44
sidebar:
55
order: 12
6-
76
---
87

9-
import { Render } from "~/components"
8+
import { Render } from "~/components";
109

1110
With Cloudflare Gateway, you can [enable and configure](/cloudflare-one/policies/gateway/initial-setup/) any combination of DNS, network, and HTTP policies.
1211

src/content/partials/cloudflare-one/gateway/order-of-enforcement.mdx

Lines changed: 26 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,8 @@
11
---
22
{}
3-
43
---
54

6-
import { Render } from "~/components"
5+
import { Render } from "~/components";
76

87
```mermaid
98
flowchart TB
@@ -14,20 +13,20 @@ flowchart TB
1413
%% In with user traffic
1514
start(["Traffic"])-->dns0[/"DNS query"/]-->dns1
1615
start-->http0{{"HTTP(S) request on port 80 or 443?"}}
17-
http0--Yes-->http1
18-
http0--No-->network0
16+
http0-- "Yes" -->http1
17+
http0-- "No" -->network0
1918
2019
%% DNS policies
2120
subgraph DNS
2221
dns1["DNS policies"]
2322
style DNS text-align:left
24-
dns1--Resolved by-->dns2["1.1.1.1"]
23+
dns1-- "Resolved by" -->dns2["1.1.1.1"]
2524
dns1-.->dns3
2625
2726
%% DNS resolution
2827
subgraph Resolution
2928
dns2["1.1.1.1"]
30-
dns3["Resolver policies <br />(Enterprise users only)"]--Resolved by-->dns4["Custom resolver"]
29+
dns3["Resolver policies <br />(Enterprise users only)"]-- "Resolved by" -->dns4["Custom resolver"]
3130
end
3231
3332
end
@@ -46,7 +45,7 @@ flowchart TB
4645
http2-->http3["Allow, Block, Do Not Scan policies"]
4746
end
4847
49-
http1--Do Not Inspect-->network0
48+
http1-- "Do Not Inspect" -->network0
5049
http3-->network0
5150
network0[/"Network connections"/]-->network1
5251
@@ -62,8 +61,8 @@ flowchart TB
6261
end
6362
6463
%% Finish
65-
network1--Egress with Cloudflare IP-->internet([Internet])
66-
egress1--Egress with dedicated IP-->internet
64+
network1-- "Egress with Cloudflare IP" -->internet([Internet])
65+
egress1-- "Egress with dedicated IP" -->internet
6766
```
6867

6968
## Priority between policy builders
@@ -103,7 +102,7 @@ When DNS queries are received, Gateway evaluates policies with pre-resolution se
103102
| 1 | Resolved Country IP Geolocation | is | United States | Allow |
104103
| 2 | Domain | is | `example.com` | Block |
105104

106-
Despite an explicit Allow policy ordered first, policy 2 takes precedence because the *Domain* selector is evaluated before DNS resolution.
105+
Despite an explicit Allow policy ordered first, policy 2 takes precedence because the _Domain_ selector is evaluated before DNS resolution.
107106

108107
If a policy contains both pre-resolution and post-resolution selectors, Gateway will evaluate the entire policy after DNS resolution. For information on when each selector is evaluated, refer to the [list of DNS selectors](/cloudflare-one/policies/gateway/dns-policies/#selectors).
109108

@@ -123,7 +122,7 @@ This order of enforcement allows Gateway to first determine whether decryption s
123122

124123
:::note
125124

126-
The only exception is if you are using [Clientless Web Isolation](/cloudflare-one/policies/browser-isolation/setup/clientless-browser-isolation/) — all sites within the clientless remote browser are implicitly isolated even if they match a Do Not Inspect policy.
125+
The only exception is if you are using [Clientless Web Isolation](/cloudflare-one/policies/browser-isolation/setup/clientless-browser-isolation/) — all sites within the clientless remote browser are implicitly isolated even if they match a Do Not Inspect policy.
127126
:::
128127

129128
Next, Gateway checks decrypted traffic against your Isolate policies. When a user makes a request which triggers an Isolate policy, the request will be rerouted to a [remote browser](/cloudflare-one/policies/browser-isolation/).
@@ -132,29 +131,33 @@ Lastly, Gateway evaluates all Allow, Block, and Do Not Scan policies. These poli
132131

133132
### Order of precedence
134133

135-
<Render file="gateway/order-of-precedence" product="cloudflare-one" params={{ one: "DNS, network, or HTTP" }} />
134+
<Render
135+
file="gateway/order-of-precedence"
136+
product="cloudflare-one"
137+
params={{ one: "DNS, network, or HTTP" }}
138+
/>
136139

137140
:::caution[Terraform precedence limitation]
138141

139-
To avoid conflicts, Terraform applies a hash calculation to precedences. For example, a precedence of `1000` may become `1000901`. This can cause errors when reordering policies. To avoid this issue, manually set the precedence of your policies via the [Cloudflare API](/api/operations/zero-trust-gateway-rules-update-zero-trust-gateway-rule).
142+
To avoid conflicts, Terraform applies a hash calculation to precedences. For example, a precedence of `1000` may become `1000901`. This can cause errors when reordering policies. To avoid this issue, manually set the precedence of your policies via the [Cloudflare API](/api/operations/zero-trust-gateway-rules-update-zero-trust-gateway-rule).
140143
:::
141144

142145
## Example
143146

144147
Suppose you have a list of policies arranged in the following order of precedence:
145148

146-
* DNS policies: <Render file="gateway/order-of-precedence-dns" product="cloudflare-one" />
147-
* HTTP policies:
148-
| Precedence | Selector | Operator | Value | Action |
149+
- DNS policies: <Render file="gateway/order-of-precedence-dns" product="cloudflare-one" />
150+
- HTTP policies:
151+
| Precedence | Selector | Operator | Value | Action |
149152
| ---------- | -------- | -------- | ------------------- | -------------- |
150-
| 1 | Host | is | `example.com` | Block |
151-
| 2 | Host | is | `test2.example.com` | Do Not Inspect |
152-
* Network policies:
153-
| Precedence | Selector | Operator | Value | Action |
153+
| 1 | Host | is | `example.com` | Block |
154+
| 2 | Host | is | `test2.example.com` | Do Not Inspect |
155+
- Network policies:
156+
| Precedence | Selector | Operator | Value | Action |
154157
| ---------- | ---------------- | -------- | ------------------ | ------ |
155-
| 1 | Destination Port | is | `80` | Block |
156-
| 2 | Destination port | is | `443` | Allow |
157-
| 3 | SNI Domain | is | `test.example.com` | Block |
158+
| 1 | Destination Port | is | `80` | Block |
159+
| 2 | Destination port | is | `443` | Allow |
160+
| 3 | SNI Domain | is | `test.example.com` | Block |
158161

159162
When a user goes to `https://test.example.com`, Gateway performs the following operations:
160163

0 commit comments

Comments
 (0)