Skip to content

Commit a845405

Browse files
authored
[Gateway] Block page and TLS decryption cert limitations (#18977)
1 parent b4f4666 commit a845405

File tree

15 files changed

+83
-46
lines changed

15 files changed

+83
-46
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/user-side-certificates/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: User-side certificates
44
sidebar:
55
order: 2
66
banner:
7-
content: The default global Cloudflare root certificate will expire on 2025-02-02. If you installed the default Cloudflare certificate before 2024-10-17, you must <a href="#generate-a-cloudflare-root-certificate">generate a new certificate</a> and activate it for your Zero Trust organization to avoid inspection errors.
7+
content: The default global Cloudflare root certificate will expire on 2025-02-02. If you installed the default Cloudflare certificate before 2024-10-17, you must <a href="/cloudflare-one/connections/connect-devices/user-side-certificates/#generate-a-cloudflare-root-certificate">generate a new certificate</a> and activate it for your Zero Trust organization to avoid inspection errors.
88
---
99

1010
Advanced security features such as [HTTPS traffic inspection](/cloudflare-one/policies/gateway/http-policies/tls-decryption/), [Data Loss Prevention](/cloudflare-one/policies/data-loss-prevention/), [anti-virus scanning](/cloudflare-one/policies/gateway/http-policies/antivirus-scanning/), [Access for Infrastructure](/cloudflare-one/applications/non-http/infrastructure-apps/), and [Browser Isolation](/cloudflare-one/policies/browser-isolation/) require users to install and trust a root certificate on their device. You can either install the certificate provided by Cloudflare (default option), or generate your own custom certificate and upload it to Cloudflare.
@@ -60,4 +60,4 @@ Once you deploy and install your certificate, you can turn it on for use in insp
6060
3. Select the certificate you want to turn on.
6161
4. In **Basic information**, select **Confirm and turn on certificate**.
6262

63-
You can set multiple certificates to **Available**, but you can only turn on one certificate for use in inspection at a time. Setting a certificate as **In-Use** will set any other turned on certificates as **Active** and prevent them from being used for inspection until turned on again.
63+
You can set multiple certificates to **Available**, but you can only turn on one certificate for use in inspection at a time. Setting a certificate as **In-Use** will set any other turned on certificates as **Available** and prevent them from being used for inspection until turned on again.

src/content/docs/cloudflare-one/policies/gateway/block-page.mdx

Lines changed: 21 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@ pcx_content_type: how-to
33
title: Block page
44
sidebar:
55
order: 11
6+
banner:
7+
content: The default global Cloudflare root certificate will expire on 2025-02-02. If you installed the default Cloudflare certificate before 2024-10-17, you must <a href="/cloudflare-one/connections/connect-devices/user-side-certificates/#generate-a-cloudflare-root-certificate">generate a new certificate</a> and activate it for your Zero Trust organization to avoid inspection errors.
68
---
79

810
import { Render } from "~/components";
@@ -25,21 +27,18 @@ In order to display the block page as the URL of the blocked domain, your device
2527

2628
## Turn on the block page
2729

28-
For all HTTP Block policies, Gateway automatically displays a generic Cloudflare block page. For DNS Block policies, you will need to enable the block page on a per-policy basis.
30+
For all HTTP Block policies, Gateway automatically displays a generic Cloudflare block page. For DNS Block policies, you will need to turn on the block page on a per-policy basis.
2931

3032
To turn on the block page and specify a custom block message:
3133

3234
<Render
3335
file="gateway/add-block-page"
3436
params={{
35-
one: "Gateway > Firewall Policies > DNS or Gateway > Firewall Policies > HTTP",
37+
firewallPolicyPath:
38+
"**Gateway** > **Firewall policies** > **DNS** or **Gateway** > **Firewall policies** > **HTTP**",
3639
}}
3740
/>
3841

39-
## Troubleshoot the block page
40-
41-
If your users receive a security risk warning in their browser when visiting a blocked page, check that you have correctly [installed a Cloudflare certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/manual-deployment/) on their devices.
42-
4342
## Customize the block page
4443

4544
<Render file="gateway/customize-block-page" />
@@ -52,12 +51,20 @@ If your users receive a security risk warning in their browser when visiting a b
5251

5352
You can add a Mailto link to your custom block page, which allows users to directly email you about the blocked site. When users select **Contact your Administrator** on your block page, an email template opens with the email address and subject line you configure, as well as the following diagnostic information:
5453

55-
| Field | Description |
56-
| ------------ | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
57-
| Site URL | The URL of the blocked page. |
58-
| Rule ID | The ID of the Gateway policy that blocked the page. |
59-
| Source IP | The public source IP of the user device. |
60-
| Account ID | The Cloudflare account associated with the block policy. |
54+
| Field | Description |
55+
| ------------ | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
56+
| Site URL | The URL of the blocked page. |
57+
| Rule ID | The ID of the Gateway policy that blocked the page. |
58+
| Source IP | The public source IP of the user device. |
59+
| Account ID | The Cloudflare account associated with the block policy. |
6160
| User ID | The ID of the user who visited the page. Currently, User IDs are not surfaced in the dashboard and can only be viewed by calling the [API](/api/resources/zero_trust/subresources/access/subresources/users/methods/list/). |
62-
| Device ID | The ID of the device that visited the page. This is generated by the WARP client. |
63-
| Block Reason | Your policy-specific block message. |
61+
| Device ID | The ID of the device that visited the page. This is generated by the WARP client. |
62+
| Block Reason | Your policy-specific block message. |
63+
64+
## Limitations
65+
66+
If your users receive a security risk warning in their browser when visiting a blocked page, check that you have correctly [installed a Cloudflare certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/manual-deployment/) on their devices.
67+
68+
If an HTTP request that matches a block policy does not arrive at the same Cloudflare data center as its DNS query, Gateway will display the default block page instead of your custom block page.
69+
70+
If the HTTP request comes from a different IP address than the DNS request, Gateway may not display the rule ID, custom message, or other fields on the block page. This can happen when a recursive DNS resolver's source IP address differs from the user device's IP address.

src/content/docs/cloudflare-one/policies/gateway/http-policies/antivirus-scanning.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@ pcx_content_type: concept
33
title: AV scanning
44
sidebar:
55
order: 5
6+
banner:
7+
content: The default global Cloudflare root certificate will expire on 2025-02-02. If you installed the default Cloudflare certificate before 2024-10-17, you must <a href="/cloudflare-one/connections/connect-devices/user-side-certificates/#generate-a-cloudflare-root-certificate">generate a new certificate</a> and activate it for your Zero Trust organization to avoid inspection errors.
68
---
79

810
import { Render, Details } from "~/components";

src/content/docs/cloudflare-one/policies/gateway/http-policies/common-policies.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,8 @@ sidebar:
66
head:
77
- tag: title
88
content: Common HTTP policies
9+
banner:
10+
content: The default global Cloudflare root certificate will expire on 2025-02-02. If you installed the default Cloudflare certificate before 2024-10-17, you must <a href="/cloudflare-one/connections/connect-devices/user-side-certificates/#generate-a-cloudflare-root-certificate">generate a new certificate</a> and activate it for your Zero Trust organization to avoid inspection errors.
911
---
1012

1113
import { Render, Tabs, TabItem } from "~/components";

src/content/docs/cloudflare-one/policies/gateway/http-policies/file-sandboxing.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@ pcx_content_type: concept
33
title: File sandboxing
44
sidebar:
55
order: 6
6+
banner:
7+
content: The default global Cloudflare root certificate will expire on 2025-02-02. If you installed the default Cloudflare certificate before 2024-10-17, you must <a href="/cloudflare-one/connections/connect-devices/user-side-certificates/#generate-a-cloudflare-root-certificate">generate a new certificate</a> and activate it for your Zero Trust organization to avoid inspection errors.
68
---
79

810
import { Render, Details } from "~/components";

src/content/docs/cloudflare-one/policies/gateway/http-policies/http3.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@ pcx_content_type: concept
33
title: HTTP/3 inspection
44
sidebar:
55
order: 3
6+
banner:
7+
content: The default global Cloudflare root certificate will expire on 2025-02-02. If you installed the default Cloudflare certificate before 2024-10-17, you must <a href="/cloudflare-one/connections/connect-devices/user-side-certificates/#generate-a-cloudflare-root-certificate">generate a new certificate</a> and activate it for your Zero Trust organization to avoid inspection errors.
68
---
79

810
import { Details } from "~/components";

src/content/docs/cloudflare-one/policies/gateway/http-policies/index.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@ pcx_content_type: configuration
33
title: HTTP policies
44
sidebar:
55
order: 4
6+
banner:
7+
content: The default global Cloudflare root certificate will expire on 2025-02-02. If you installed the default Cloudflare certificate before 2024-10-17, you must <a href="/cloudflare-one/connections/connect-devices/user-side-certificates/#generate-a-cloudflare-root-certificate">generate a new certificate</a> and activate it for your Zero Trust organization to avoid inspection errors.
68
---
79

810
import { Details, InlineBadge, Render } from "~/components";

src/content/docs/cloudflare-one/policies/gateway/http-policies/tenant-control.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@ pcx_content_type: how-to
33
title: Tenant control
44
sidebar:
55
order: 4
6+
banner:
7+
content: The default global Cloudflare root certificate will expire on 2025-02-02. If you installed the default Cloudflare certificate before 2024-10-17, you must <a href="/cloudflare-one/connections/connect-devices/user-side-certificates/#generate-a-cloudflare-root-certificate">generate a new certificate</a> and activate it for your Zero Trust organization to avoid inspection errors.
68
---
79

810
With Gateway tenant control, you can allow your users access to corporate SaaS applications while blocking access to personal applications. This helps prevent the loss of sensitive or confidential data from a corporate network.

src/content/docs/cloudflare-one/policies/gateway/http-policies/tls-decryption.mdx

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@ pcx_content_type: concept
33
title: TLS decryption
44
sidebar:
55
order: 2
6+
banner:
7+
content: The default global Cloudflare root certificate will expire on 2025-02-02. If you installed the default Cloudflare certificate before 2024-10-17, you must <a href="/cloudflare-one/connections/connect-devices/user-side-certificates/#generate-a-cloudflare-root-certificate">generate a new certificate</a> and activate it for your Zero Trust organization to avoid inspection errors.
68
---
79

810
import {
@@ -21,7 +23,13 @@ Cloudflare prevents interference by decrypting, inspecting, and re-encrypting HT
2123

2224
Cloudflare supports connections from users to Gateway over TLS 1.1, 1.2, and 1.3.
2325

24-
## Enable TLS decryption
26+
## Turn on TLS decryption
27+
28+
:::note[Prerequisite]
29+
Before you turn on TLS decryption, ensure you have installed either a [Cloudflare-generated certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/) or [custom certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/custom-certificate/) on your users' devices.
30+
:::
31+
32+
To turn on TLS decryption:
2533

2634
<Render file="gateway/enable-tls-decryption" product="cloudflare-one" />
2735

src/content/docs/cloudflare-one/policies/gateway/http-policies/websocket.mdx

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,12 @@ pcx_content_type: how-to
33
title: WebSocket traffic
44
sidebar:
55
order: 7
6-
6+
banner:
7+
content: The default global Cloudflare root certificate will expire on 2025-02-02. If you installed the default Cloudflare certificate before 2024-10-17, you must <a href="/cloudflare-one/connections/connect-devices/user-side-certificates/#generate-a-cloudflare-root-certificate">generate a new certificate</a> and activate it for your Zero Trust organization to avoid inspection errors.
78
---
89

910
Gateway does not inspect or log [WebSocket](https://datatracker.ietf.org/doc/html/rfc6455) traffic. Instead, Gateway will only log the HTTP details used to make the WebSocket connection, as well as [network session information](/logs/reference/log-fields/account/zero_trust_network_sessions/). To filter your WebSocket traffic, create a policy with the `101` HTTP response code.
1011

11-
| Selector | Operator | Value | Action |
12-
| ------------- | -------- | ------------------------ | ------ |
13-
| HTTP Response | is | 101 SWITCHING\_PROTOCOLS | Allow |
12+
| Selector | Operator | Value | Action |
13+
| ------------- | -------- | ----------------------- | ------ |
14+
| HTTP Response | is | 101 SWITCHING_PROTOCOLS | Allow |

0 commit comments

Comments
 (0)