Skip to content

Commit 91c674a

Browse files
authored
[Gateway] VNet routing for resolver policies (#16377)
1 parent 1265ab9 commit 91c674a

File tree

2 files changed

+33
-18
lines changed

2 files changed

+33
-18
lines changed

src/content/docs/cloudflare-one/policies/gateway/resolver-policies.mdx

Lines changed: 28 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,17 +8,36 @@ sidebar:
88
head:
99
- tag: title
1010
content: Resolver policies
11-
1211
---
1312

14-
import { Render } from "~/components"
13+
import { Render } from "~/components";
1514

1615
:::note
17-
Only available on Enterprise plans.
16+
Only available on Enterprise plans.
1817
:::
1918

2019
By default, Gateway sends DNS requests to [1.1.1.1](/1.1.1.1/), Cloudflare's public DNS resolver, for resolution. Enterprise users can instead create Gateway policies to route DNS queries to custom resolvers.
2120

21+
```mermaid
22+
flowchart TD
23+
%% Accessibility
24+
accTitle: How Gateway routes DNS queries
25+
accDescr: Flowchart describing the order Cloudflare Gateway routes a DNS query from an endpoint through DNS and resolver policies back to the user.
26+
27+
%% Flowchart
28+
user(["User"])-->endpoint[/"Gateway DNS endpoint"/]
29+
30+
endpoint-->query["DNS policy (query)"]
31+
32+
query-->resolver["Resolver policy"]
33+
34+
resolver--"Routes to </br>custom resolver"-->response["DNS policy (response)"]
35+
36+
response--"Returns response"-->user
37+
```
38+
39+
Gateway will route user traffic to your configured DNS resolver based on the matching policy, even if your resolvers' IP addresses overlap.
40+
2241
## Use cases
2342

2443
You may use resolver policies if you require access to non-publicly routed domains, such as private network services or internal resources. You may also use resolver policies if you need to access a protected DNS service or want to simplify DNS management for multiple locations.
@@ -45,12 +64,12 @@ To enable connections to a private resolver connected to Cloudflare via [Magic W
4564

4665
Resolver policies can route queries for resolution from the following DNS endpoints:
4766

48-
* IPv4
49-
* IPv6
50-
* [DNS over HTTPS (DoH)](/cloudflare-one/connections/connect-devices/agentless/dns/dns-over-https/)
51-
* [DNS over TLS (DoT)](/cloudflare-one/connections/connect-devices/agentless/dns/dns-over-tls/)
52-
* DNS queries generated by Cloudflare [Browser Isolation](/cloudflare-one/policies/browser-isolation/) and [Clientless Web Isolation](/cloudflare-one/policies/browser-isolation/setup/clientless-browser-isolation/)
53-
* DNS queries generated by [proxy endpoints](/cloudflare-one/connections/connect-devices/agentless/pac-files/)
67+
- IPv4
68+
- IPv6
69+
- [DNS over HTTPS (DoH)](/cloudflare-one/connections/connect-devices/agentless/dns/dns-over-https/)
70+
- [DNS over TLS (DoT)](/cloudflare-one/connections/connect-devices/agentless/dns/dns-over-tls/)
71+
- DNS queries generated by Cloudflare [Browser Isolation](/cloudflare-one/policies/browser-isolation/) and [Clientless Web Isolation](/cloudflare-one/policies/browser-isolation/setup/clientless-browser-isolation/)
72+
- DNS queries generated by [proxy endpoints](/cloudflare-one/connections/connect-devices/agentless/pac-files/)
5473

5574
Gateway will filter, resolve, and log your queries regardless of endpoint.
5675

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,9 @@
11
---
22
{}
3-
43
---
54

65
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **Resolver policies**.
7-
86
2. Select **Add a policy**.
9-
107
3. Create an expression for your desired traffic. For example, you can resolve a hostname for an internal service:
118

129
| Selector | Operator | Value |
@@ -15,22 +12,21 @@
1512

1613
Make sure your destination is not subject to [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#manage-local-domains).
1714

18-
4. In **Select DNS resolver**, choose *Configure custom DNS resolvers*.
19-
15+
4. In **Select DNS resolver**, choose _Configure custom DNS resolvers_.
2016
5. Enter the IP addresses of your custom DNS resolver.
21-
17+
:::tip[Search virtual networks]
18+
As you enter an IP address, Gateway will search through your [virtual networks](/cloudflare-one/connections/connect-networks/private-net/cloudflared/tunnel-virtual-networks/) configured in Zero Trust.
19+
:::
2220
6. In **Network**, choose whether to route queries publicly (to the Internet) or privately (to a private network service).
23-
2421
7. (Optional) Enter a custom port for each IP address.
25-
2622
8. Select **Create policy**.
2723

2824
Custom resolvers are saved to your account for future use. You can add up to 10 IPv4 and 10 IPv6 addresses to a policy.
2925

3026
When a user's query matches a resolver policy, Gateway will send the query to your listed resolvers in the following order:
3127

3228
1. Public resolvers
33-
2. Private resolvers behind the default [virtual network](/cloudflare-one/connections/connect-networks/private-net/cloudflared/tunnel-virtual-networks/) for your account
29+
2. Private resolvers behind the default virtual network for your account
3430
3. Private resolvers behind a custom virtual network
3531

3632
Gateway will cache the fastest resolver for use in subsequent queries. Resolver priority is cached on a per user basis for each data center.

0 commit comments

Comments
 (0)