Skip to content

Commit b4d77e9

Browse files
authored
[Gateway] Network policies content categories (#18436)
1 parent 1fe4e58 commit b4d77e9

File tree

16 files changed

+93
-81
lines changed

16 files changed

+93
-81
lines changed

src/content/changelogs/gateway.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ productArea: Cloudflare One
66
productAreaLink: /cloudflare-one/changelog/
77
entries:
88
- publish_date: "2024-11-20"
9-
title: Category Filtering in the Network Policy Builder
10-
description: |-
11-
Gateway users can now create Network Policies with Content Categories and Security Risks traffic selectors. This update simplifies malicious traffic blocking and streamlines network monitoring for improved security management.
9+
title: Category filtering in the network policy builder
10+
description: |-
11+
Gateway users can now create network policies with the [Content Categories](/cloudflare-one/policies/gateway/network-policies/#content-categories) and [Security Risks](/cloudflare-one/policies/gateway/network-policies/#security-risks) traffic selectors. This update simplifies malicious traffic blocking and streamlines network monitoring for improved security management.
1212
- publish_date: "2024-10-17"
1313
title: Per-account Cloudflare root certificate
1414
description: |-

src/content/docs/cloudflare-one/identity/idp-integration/signed_authn.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,8 +33,8 @@ To set up Signed AuthN requests:
3333

3434
Cloudflare Access uses a certificate that includes the following 2 distinguished name fields:
3535

36-
- **Issuer Distinguished Name** `CN=cloudflareaccess.com, C=US, ST=Texas, L=Austin, O=Cloudflare`
37-
- **Subject Distinguished Name** `CN=*.cloudflareaccess.com, C=US, ST=Texas, L=Austin, O=Cloudflare`
36+
- **Issuer Distinguished Name** - `CN=cloudflareaccess.com, C=US, ST=Texas, L=Austin, O=Cloudflare`
37+
- **Subject Distinguished Name** - `CN=*.cloudflareaccess.com, C=US, ST=Texas, L=Austin, O=Cloudflare`
3838

3939
Most IdP configurations require 3 components to enforce AuthN signature verification:
4040

src/content/docs/cloudflare-one/policies/gateway/dns-policies/index.mdx

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -286,7 +286,7 @@ Use this selector to match against the IP address of the authoritative nameserve
286286

287287
### Content Categories
288288

289-
<Render file="gateway/selectors/content-categories" />
289+
<Render file="gateway/selectors/dns-content-categories" />
290290

291291
<Render file="gateway/selectors/category-options" />
292292

@@ -359,14 +359,14 @@ Use this selector to filter DNS responses by their `TXT` records.
359359

360360
Use this selector to filter based on the continent that the query resolves to. Geolocation is determined from the IP address in the response. To specify a continent, enter its two-letter code into the **Value** field:
361361

362-
- AF Africa
363-
- AN Antarctica
364-
- AS Asia
365-
- EU Europe
366-
- NA North America
367-
- OC Oceania
368-
- SA South America
369-
- T1 Tor network
362+
- AF - Africa
363+
- AN - Antarctica
364+
- AS - Asia
365+
- EU - Europe
366+
- NA - North America
367+
- OC - Oceania
368+
- SA - South America
369+
- T1 - Tor network
370370

371371
| UI name | API example | Evaluation phase |
372372
| --------------------------------- | ------------------------------- | -------------------- |

src/content/docs/cloudflare-one/policies/gateway/http-policies/index.mdx

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -407,11 +407,10 @@ When using Terraform to create a policy with the [Do Not Inspect](#do-not-inspec
407407

408408
### Content Categories
409409

410-
| UI name | API example |
411-
| ------------------ | ------------------------------------------------ |
412-
| Content Categories | `not(any(http.conn.content_category[*] in {1}))` |
413-
414-
For more information, refer to our list of [content categories](/cloudflare-one/policies/gateway/domain-categories/#content-categories).
410+
<Render
411+
file="gateway/selectors/net-http-content-categories"
412+
params={{ APIendpoint: "http.conn.content_category" }}
413+
/>
415414

416415
### Destination Continent
417416

@@ -566,11 +565,10 @@ Some hostnames (`example.com`) will invisibly redirect to the www subdomain (`ww
566565

567566
### Security Risks
568567

569-
| UI name | API example |
570-
| -------------- | -------------------------------------------- |
571-
| Security Risks | `any(http.conn.security_category[*] in {1})` |
572-
573-
For more information, refer to our list of [security categories](/cloudflare-one/policies/gateway/domain-categories/#security-categories).
568+
<Render
569+
file="gateway/selectors/security-risks"
570+
params={{ APIendpoint: "http.conn.security_category" }}
571+
/>
574572

575573
### Source Continent
576574

src/content/docs/cloudflare-one/policies/gateway/network-policies/index.mdx

Lines changed: 9 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,7 @@ sidebar:
88
import { Details, InlineBadge, Render } from "~/components";
99

1010
:::note
11-
1211
To enable this feature, download and deploy the [WARP client](/cloudflare-one/connections/connect-devices/warp/deployment/) on your devices.
13-
1412
:::
1513

1614
With Cloudflare Zero Trust, you can configure policies to control network-level traffic leaving your endpoints. Using network selectors like IP addresses and ports, your policies will control access to any network origin. Because Cloudflare Zero Trust [integrates with your identity provider](/cloudflare-one/identity/idp-integration/), it also gives you the ability to create identity-based network policies. This means you can now control access to non-HTTP resources on a per-user basis regardless of where they are or what device they access that resource from.
@@ -222,7 +220,7 @@ Policies with Network Override actions override traffic directed to, or coming f
222220
| -------------- | -------- | --------------- | ----- | ---------------- |
223221
| Destination IP | in | `95.92.143.151` | And | Network Override |
224222
| User Email | in | `*@example.com` | And | |
225-
| Override IP | | 10.0.0.1 | | |
223+
| Override IP | | `10.0.0.1` | | |
226224

227225
## Selectors
228226

@@ -234,11 +232,10 @@ Gateway matches network traffic against the following selectors, or criteria.
234232

235233
### Content Categories
236234

237-
| UI name | API example |
238-
| ------------------ | ------------------------------------------------ |
239-
| Content Categories | `not(any(net.fqdn.content_category[*] in {1}))` |
240-
241-
For more information, refer to our list of [content categories](/cloudflare-one/policies/gateway/domain-categories/#content-categories).
235+
<Render
236+
file="gateway/selectors/net-http-content-categories"
237+
params={{ APIendpoint: "net.fqdn.content_category" }}
238+
/>
242239

243240
### Destination Continent
244241

@@ -286,11 +283,10 @@ To enable Gateway filtering on TCP and UDP, go to **Settings** > **Network** > *
286283

287284
### Security Risks
288285

289-
| UI name | API example |
290-
| -------------- | -------------------------------------------- |
291-
| Security Risks | `any(net.fqdn.security_category[*] in {1})` |
292-
293-
For more information, refer to our list of [security categories](/cloudflare-one/policies/gateway/domain-categories/#security-categories).
286+
<Render
287+
file="gateway/selectors/security-risks"
288+
params={{ APIendpoint: "net.fqdn.security_category" }}
289+
/>
294290

295291
### SNI
296292

src/content/docs/cloudflare-one/policies/gateway/resolver-policies.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ For more information on creating a DNS policy, refer to [DNS policies](/cloudfla
8383

8484
### Content Categories
8585

86-
<Render file="gateway/selectors/content-categories" />
86+
<Render file="gateway/selectors/dns-content-categories" />
8787

8888
### DNS Resolver IP
8989

src/content/partials/cloudflare-one/access/app-launcher.mdx

Lines changed: 16 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,14 @@
11
---
22
{}
3-
43
---
54

6-
import { GlossaryTooltip } from "~/components"
5+
import { GlossaryTooltip } from "~/components";
76

87
With the Access App Launcher, users can open all applications that they have access to from a single dashboard.
98

109
The App Launcher is available at a <GlossaryTooltip term="team domain">team domain</GlossaryTooltip> unique to your Cloudflare Zero Trust account, for example `mycompany.cloudflareaccess.com`.
1110

12-
Users log in using one of the identity providers configured for the account. Once Access authenticates the user, the App Launcher displays applications they are authorized to use, in the form of application tiles. Selecting an application tile launches the applications hostname, sending the user to that tool as part of their SSO flow.
11+
Users log in using one of the identity providers configured for the account. Once Access authenticates the user, the App Launcher displays applications they are authorized to use, in the form of application tiles. Selecting an application tile launches the application's hostname, sending the user to that tool as part of their SSO flow.
1312

1413
![App Launcher portal](~/assets/images/cloudflare-one/applications/app-launcher.png)
1514

@@ -43,7 +42,7 @@ To show an Access application in the App Launcher:
4342

4443
:::note
4544

46-
This toggle does not impact the user's ability to reach the application. Allowed users can always reach the application via a direct link, regardless of whether the toggle is enabled. Blocked users will never have access to the application.
45+
This toggle does not impact the user's ability to reach the application. Allowed users can always reach the application via a direct link, regardless of whether the toggle is enabled. Blocked users will never have access to the application.
4746
:::
4847

4948
4. Choose a domain to use for the App Launcher link.
@@ -52,14 +51,14 @@ This toggle does not impact the user's ability to reach the application. Allowed
5251

5352
:::note
5453

55-
If you are having issues specifying a custom logo, check that the image is served from an HTTPS endpoint. For example, `http://www.example.com/upload/logo.png` will not work. However, `https://www.example.com/upload/logo.png` will.
54+
If you are having issues specifying a custom logo, check that the image is served from an HTTPS endpoint. For example, `http://www.example.com/upload/logo.png` will not work. However, `https://www.example.com/upload/logo.png` will.
5655
:::
5756

5857
## Customize App Launcher appearance
5958

6059
:::note
6160

62-
Only available on Pay-as-you-go and Enterprise plans.
61+
Only available on Pay-as-you-go and Enterprise plans.
6362
:::
6463

6564
You can display your own branding, messages, and links to users when they open the App Launcher.
@@ -69,24 +68,24 @@ To customize the App Launcher appearance:
6968
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Custom Pages**.
7069
2. Find the **Customize App Launcher** setting and select **Customize**.
7170
3. Give the App Launcher the look and feel of your organization by adding:
72-
* Your organization's name
73-
* A logo
74-
* A preferred background color for the header
75-
* A preferred background color for the page
76-
* A custom footer with links to your organization's help desk or other internal resources.
71+
- Your organization's name
72+
- A logo
73+
- A preferred background color for the header
74+
- A preferred background color for the page
75+
- A custom footer with links to your organization's help desk or other internal resources.
7776

7877
:::note
7978

80-
We recommend lighter background colors because the font defaults to black.
79+
We recommend lighter background colors because the font defaults to black.
8180
:::
8281

8382
4. Next, customize the landing page that users will see when they login to the App Launcher. Available properties include:
8483

85-
* A custom title
86-
* A custom subtitle
87-
* An image
88-
* A preferred color for the **Log in** button
89-
* A preferred color for the **Log in** button text
84+
- A custom title
85+
- A custom subtitle
86+
- An image
87+
- A preferred color for the **Log in** button
88+
- A preferred color for the **Log in** button text
9089

9190
All of the properties configured in Step 3 will also apply to the landing page.
9291

src/content/partials/cloudflare-one/gateway/policies/content-categories.mdx

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
11
---
22
{}
3-
43
---
54

65
## Block content categories
76

8-
Block content categories which go against your organizations acceptable use policy.
7+
Block content categories which go against your organization's acceptable use policy.
98

109
| Selector | Operator | Value | Action |
1110
| ------------------ | -------- | ---------------------- | ------ |

src/content/partials/cloudflare-one/gateway/policies/recommended-dns-policies.mdx

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,8 @@
11
---
22
{}
3-
43
---
54

6-
import { Render } from "~/components"
5+
import { Render } from "~/components";
76

87
## Allow corporate domains
98

@@ -15,7 +14,7 @@ This policy allows users to access official corporate domains. By deploying the
1514

1615
## Block security threats
1716

18-
Block [security categories](/cloudflare-one/policies/gateway/domain-categories/#security-categories) such as Command & Control, Botnet and Malware based on Cloudflares threat intelligence. <Render file="gateway/policies/block-security-categories" product="cloudflare-one" />
17+
Block [security categories](/cloudflare-one/policies/gateway/domain-categories/#security-categories) such as Command & Control, Botnet and Malware based on Cloudflare's threat intelligence. <Render file="gateway/policies/block-security-categories" product="cloudflare-one" />
1918

2019
## Block content categories
2120

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,22 @@
11
---
22
inputParameters: param1
3-
43
---
54

6-
import { Markdown } from "~/components"
5+
import { Markdown } from "~/components";
76

87
The continent where the request is destined. Geolocation is determined from the target IP address. To specify a continent, enter its two-letter code into the **Value** field:
98

10-
* AF – Africa
11-
* AN – Antarctica
12-
* AS – Asia
13-
* EU – Europe
14-
* NA – North America
15-
* OC – Oceania
16-
* SA – South America
17-
* T1 – Tor network
9+
| Continent | Code |
10+
| ------------- | ---- |
11+
| Africa | `AF` |
12+
| Antarctica | `AN` |
13+
| Asia | `AS` |
14+
| Europe | `EU` |
15+
| North America | `NA` |
16+
| Oceania | `OC` |
17+
| South America | `SA` |
18+
| Tor network | `T1` |
1819

19-
| UI name | API example |
20-
| ------------------------------------ | -------------------------- |
20+
| UI name | API example |
21+
| ------------------------------------ | ---------------------------------------------- |
2122
| Destination Continent IP Geolocation | <code>{props.one}.geo.continent == "EU"</code> |

0 commit comments

Comments
 (0)