You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To get the UUIDs of your lists, use the [List Zero Trust lists](/api/resources/zero_trust/subresources/gateway/subresources/lists/methods/list/) endpoint.
"description": "Block access to Salesforce by temporary employees and contractors",
73
+
"enabled": true,
74
+
"action": "block",
75
+
"filters": [
76
+
"l4"
77
+
],
78
+
"traffic": "any(app.ids[*] in {606})",
79
+
"identity": "any(identity.groups.name[*] in {\"Contractors\"})",
80
+
"device_posture": ""
81
+
}'
82
+
```
83
+
84
+
</TabItem> </Tabs>
85
+
34
86
## Enforce device posture
35
87
36
-
Require devices to have certain software installed or other configuration attributes. For instructions on enabling a device posture check, refer to the [device posture section](/cloudflare-one/identity/devices/).
88
+
Require devices to have certain software installed or other configuration attributes. For instructions on enabling a device posture check, refer to the [device posture section](/cloudflare-one/identity/devices/). For example, you can use a list of [device serial numbers](/cloudflare-one/identity/devices/warp-client-checks/corp-device/) to ensure users can only access an application if they connect with the WARP client from a company device:
"device_posture": "not(any(device_posture.checks.passed[*] in {\"<POSTURE_CHECK_UUID>\"}))"
113
+
}'
114
+
```
115
+
116
+
To get the UUIDs of your device posture checks, use the [List device posture rules](/api/resources/zero_trust/subresources/devices/subresources/posture/methods/list/) endpoint.
117
+
118
+
</TabItem> </Tabs>
119
+
40
120
## Enforce session duration
41
121
42
122
To require users to re-authenticate after a certain amount of time has elapsed, configure [WARP sessions](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions/).
@@ -47,32 +127,136 @@ Restrict user access to only the specific sites or applications configured in yo
"description": "Block all other traffic that is not HTTP or HTTPS",
180
+
"enabled": true,
181
+
"action": "block",
182
+
"filters": [
183
+
"l4"
184
+
],
185
+
"traffic": "net.protocol in {\"tcp\" \"udp\"}",
186
+
"identity": "",
187
+
"device_posture": ""
188
+
}'
189
+
```
190
+
191
+
</TabItem> </Tabs>
60
192
61
193
## Restrict access to private networks
62
194
63
195
Restrict access to resources which you have connected through [Cloudflare Tunnel](/cloudflare-one/connections/connect-networks/).
64
196
65
-
The following example consists of two policies: the first allows specific users to reach your application, and the second blocks all other traffic. Make sure that the Allow policy has higher priority (by positioning it towards the top of the list in the UI).
197
+
The following example consists of two policies: the first allows specific users to reach your application, and the second blocks all other traffic.
Copy file name to clipboardExpand all lines: src/content/partials/cloudflare-one/gateway/get-started/create-network-policy.mdx
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,11 +12,13 @@ To create a new network policy:
12
12
2. In the **Network** tab, select **Add a policy**.
13
13
3. Name the policy.
14
14
4. Under **Traffic**, build a logical expression that defines the traffic you want to allow or block.
15
-
5. Choose an **Action** to take when traffic matches the logical expression.
15
+
5. Choose an **Action** to take when traffic matches the logical expression. For example, you can use a list of [device serial numbers](/cloudflare-one/identity/devices/warp-client-checks/corp-device/) to ensure users can only access an application if they connect with the WARP client from a company device:
Copy file name to clipboardExpand all lines: src/content/partials/cloudflare-one/gateway/policies/enforce-device-posture.mdx
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,9 +2,7 @@
2
2
{}
3
3
---
4
4
5
-
For example, you can use a list of [device serial numbers](/cloudflare-one/identity/devices/warp-client-checks/corp-device/) to ensure users can only access an application if they connect with the WARP client from a company device:
0 commit comments