Skip to content

Commit b201f49

Browse files
committed
add link to CF blog
1 parent 51d3281 commit b201f49

File tree

2 files changed

+1
-3
lines changed

2 files changed

+1
-3
lines changed

src/content/docs/cloudflare-one/connections/connect-networks/private-net/cloudflared/connect-private-hostname.mdx

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,6 @@ As shown in Figure 2 below, the WARP client will now send `wiki.internal.local`
4343

4444
The initial resolved IP mechanism is required because Gateway's network engine operates at L3/L4 and can only see IPs (not hostnames) when processing the connection. Because the packet's destination IP falls within the designated CGNAT range, Gateway knows that it corresponds to a hostname route and can apply hostname-based policies. Traffic that passes your Gateway policies will route through Cloudflare Tunnel to the application's actual origin IP. When the initial resolved IP expires, WARP will send a new DNS request (Figure 1) to refresh the initial resolved IP.
4545

46-
To learn more about hostname routing, refer to the [Cloudflare blog]().
47-
4846
## Connect to a private hostname
4947

5048
This section covers how to enable remote access to a private hostname application using `cloudflared` and WARP.

src/content/docs/cloudflare-one/policies/gateway/egress-policies/egress-cloudflared.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ For example, assume that your organization's banking service, `app.bank.com`, ex
3333
aws--AWS egress IP -->app
3434
```
3535

36-
To learn more about how Gateway applies hostname-based policies, refer to the [Cloudflare blog]().
36+
To learn more about how Gateway applies hostname-based egress policies, refer to the [Cloudflare blog](https://blog.cloudflare.com/egress-policies-by-hostname/).
3737

3838
## Prerequisites
3939

0 commit comments

Comments
 (0)