You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/policies/gateway/resolver-policies.mdx
+28-9Lines changed: 28 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,17 +8,36 @@ sidebar:
8
8
head:
9
9
- tag: title
10
10
content: Resolver policies
11
-
12
11
---
13
12
14
-
import { Render } from"~/components"
13
+
import { Render } from"~/components";
15
14
16
15
:::note
17
-
Only available on Enterprise plans.
16
+
Only available on Enterprise plans.
18
17
:::
19
18
20
19
By default, Gateway sends DNS requests to [1.1.1.1](/1.1.1.1/), Cloudflare's public DNS resolver, for resolution. Enterprise users can instead create Gateway policies to route DNS queries to custom resolvers.
21
20
21
+
```mermaid
22
+
flowchart TD
23
+
%% Accessibility
24
+
accTitle: How Gateway routes DNS queries
25
+
accDescr: Flowchart describing the order Cloudflare Gateway routes a DNS query from an endpoint through DNS and resolver policies back to the user.
26
+
27
+
%% Flowchart
28
+
user(["User"])-->endpoint[/"Gateway DNS endpoint"/]
29
+
30
+
endpoint-->query["DNS policy (query)"]
31
+
32
+
query-->resolver["Resolver policy"]
33
+
34
+
resolver--"Routes to </br>custom resolver"-->response["DNS policy (response)"]
35
+
36
+
response--"Returns response"-->user
37
+
```
38
+
39
+
Gateway will route user traffic to your configured DNS resolver based on the matching policy, even if your resolvers' IP addresses overlap.
40
+
22
41
## Use cases
23
42
24
43
You may use resolver policies if you require access to non-publicly routed domains, such as private network services or internal resources. You may also use resolver policies if you need to access a protected DNS service or want to simplify DNS management for multiple locations.
@@ -45,12 +64,12 @@ To enable connections to a private resolver connected to Cloudflare via [Magic W
45
64
46
65
Resolver policies can route queries for resolution from the following DNS endpoints:
47
66
48
-
* IPv4
49
-
* IPv6
50
-
*[DNS over HTTPS (DoH)](/cloudflare-one/connections/connect-devices/agentless/dns/dns-over-https/)
51
-
*[DNS over TLS (DoT)](/cloudflare-one/connections/connect-devices/agentless/dns/dns-over-tls/)
52
-
* DNS queries generated by Cloudflare [Browser Isolation](/cloudflare-one/policies/browser-isolation/) and [Clientless Web Isolation](/cloudflare-one/policies/browser-isolation/setup/clientless-browser-isolation/)
53
-
* DNS queries generated by [proxy endpoints](/cloudflare-one/connections/connect-devices/agentless/pac-files/)
67
+
- IPv4
68
+
- IPv6
69
+
-[DNS over HTTPS (DoH)](/cloudflare-one/connections/connect-devices/agentless/dns/dns-over-https/)
70
+
-[DNS over TLS (DoT)](/cloudflare-one/connections/connect-devices/agentless/dns/dns-over-tls/)
71
+
- DNS queries generated by Cloudflare [Browser Isolation](/cloudflare-one/policies/browser-isolation/) and [Clientless Web Isolation](/cloudflare-one/policies/browser-isolation/setup/clientless-browser-isolation/)
72
+
- DNS queries generated by [proxy endpoints](/cloudflare-one/connections/connect-devices/agentless/pac-files/)
54
73
55
74
Gateway will filter, resolve, and log your queries regardless of endpoint.
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **Resolver policies**.
7
-
8
6
2. Select **Add a policy**.
9
-
10
7
3. Create an expression for your desired traffic. For example, you can resolve a hostname for an internal service:
11
8
12
9
| Selector | Operator | Value |
@@ -15,22 +12,21 @@
15
12
16
13
Make sure your destination is not subject to [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#manage-local-domains).
17
14
18
-
4. In **Select DNS resolver**, choose *Configure custom DNS resolvers*.
19
-
15
+
4. In **Select DNS resolver**, choose _Configure custom DNS resolvers_.
20
16
5. Enter the IP addresses of your custom DNS resolver.
21
-
17
+
:::tip[Search virtual networks]
18
+
As you enter an IP address, Gateway will search through your [virtual networks](/cloudflare-one/connections/connect-networks/private-net/cloudflared/tunnel-virtual-networks/) configured in Zero Trust.
19
+
:::
22
20
6. In **Network**, choose whether to route queries publicly (to the Internet) or privately (to a private network service).
23
-
24
21
7. (Optional) Enter a custom port for each IP address.
25
-
26
22
8. Select **Create policy**.
27
23
28
24
Custom resolvers are saved to your account for future use. You can add up to 10 IPv4 and 10 IPv6 addresses to a policy.
29
25
30
26
When a user's query matches a resolver policy, Gateway will send the query to your listed resolvers in the following order:
31
27
32
28
1. Public resolvers
33
-
2. Private resolvers behind the default [virtual network](/cloudflare-one/connections/connect-networks/private-net/cloudflared/tunnel-virtual-networks/) for your account
29
+
2. Private resolvers behind the default virtual network for your account
34
30
3. Private resolvers behind a custom virtual network
35
31
36
32
Gateway will cache the fastest resolver for use in subsequent queries. Resolver priority is cached on a per user basis for each data center.
0 commit comments