Skip to content

Commit a29f2f2

Browse files
Update securing-guest-wireless-networks.mdx
1 parent ac4aa37 commit a29f2f2

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

src/content/docs/reference-architecture/design-guides/securing-guest-wireless-networks.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ While it may be unlikely that your organization could face criminal charges, you
2626
This reference architecture is designed for IT or security professionals who are looking at Cloudflare to help secure their guest wireless networks. To build a stronger baseline understanding of Cloudflare, we recommend the following resources:
2727

2828
- What is Cloudflare? | [Website](https://www.cloudflare.com/what-is-cloudflare/) (5 minute read) or [video](https://www.youtube.com/watch?v=XHvmX3FhTwU) (2 minutes)
29-
- Cloudflare Zero Trust \- [https://www.cloudflare.com/zero-trust/](https://www.cloudflare.com/zero-trust/)
30-
- SASE Architecture with Cloudflare \- [/reference-architecture/architectures/sase/](/reference-architecture/architectures/sase/)
29+
- Cloudflare Zero Trust | [https://www.cloudflare.com/zero-trust/](https://www.cloudflare.com/zero-trust/)
30+
- SASE Architecture with Cloudflare | [/reference-architecture/architectures/sase/](/reference-architecture/architectures/sase/)
3131

3232
This reference architecture guide will help readers understand:
3333

@@ -59,7 +59,7 @@ To route all DNS queries through Cloudflare, update your router's DNS settings i
5959

6060
For enhanced security, prevent wireless guests from accessing other DNS services by creating a firewall rule on the router (if supported). This rule should allow access only to Cloudflare's DNS servers and block all other DNS destinations on UDP/TCP port 53\. Additionally, some advanced wireless routers support content filtering. If available, enable options to block DNS over TLS (DoT) or DNS over HTTPS (DoH) to ensure endpoints cannot bypass your configured DNS security settings in Cloudflare.
6161

62-
![Figure 2: When DNS queries are forwarded to Cloudflare, policies can be implemented to prevent access to malicious and high risk destinations. Guest-Security-Block and Guest-Content-Block refer to the specific DNS policies applied to the wireless guest devices.](~/assets/images/reference-architecture/securing-guest-wireless-networks/figure2.svg "Figure 2: When DNS queries are forwarded to Cloudflare, policies can be implemented to prevent access to malicious and high risk destinations. Guest-Security-Block and Guest-Content-Block refer to the specific DNS policies applied to the wireless guest devices.")
62+
![Figure 2: When DNS queries are forwarded to Cloudflare, policies can be implemented to prevent access to malicious and high risk destinations. "Guest-Security-Block" and "Guest-Content-Block" refer to the specific DNS policies applied to the wireless guest devices.](~/assets/images/reference-architecture/securing-guest-wireless-networks/figure2.svg "Figure 2: When DNS queries are forwarded to Cloudflare, policies can be implemented to prevent access to malicious and high risk destinations. "Guest-Security-Block" and "Guest-Content-Block" refer to the specific DNS policies applied to the wireless guest devices.")
6363

6464
## Secure guest traffic sourced from an enterprise network
6565

0 commit comments

Comments
 (0)