Skip to content

Commit 99d90af

Browse files
maxvpthomasgauvin
authored andcommitted
[Gateway] H3 DNI recommendation (#24400)
1 parent a506dfd commit 99d90af

File tree

1 file changed

+4
-0
lines changed
  • src/content/docs/cloudflare-one/policies/gateway/http-policies

1 file changed

+4
-0
lines changed

src/content/docs/cloudflare-one/policies/gateway/http-policies/http3.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,10 @@ Gateway can inspect HTTP/3 traffic from Mozilla Firefox and Microsoft Edge by es
2626

2727
If the UDP proxy is turned on in Zero Trust, Google Chrome will cancel all HTTP/3 connections and retry them with HTTP/2, allowing you to enforce your HTTP policies. If the UDP proxy is turned off, HTTP/3 traffic from Chrome will bypass inspection.
2828

29+
## Exempt HTTP/3 traffic from inspection
30+
31+
If you require HTTP/3 traffic with end-to-end encryption from the client to the origin while still using the Gateway proxy, you can create a [Do Not Inspect HTTP policy](/cloudflare-one/policies/gateway/http-policies/#do-not-inspect) to match the desired traffic. Using a Do Not Inspect policy allows HTTP/3 traffic to preserve proxy performance and end-to-end encryption by bypassing Gateway's TLS decryption and inspection.
32+
2933
## Force HTTP/2 traffic
3034

3135
To apply Gateway policies to HTTP traffic without turning on the UDP proxy, you must turn off QUIC in your users' browsers to ensure only HTTP/2 traffic reaches Gateway.

0 commit comments

Comments
 (0)