Skip to content

Commit bee826f

Browse files
committed
Fix traffic policy links
1 parent bb5b082 commit bee826f

File tree

32 files changed

+353
-352
lines changed

32 files changed

+353
-352
lines changed

src/content/docs/1.1.1.1/infrastructure/network-operators.mdx

Lines changed: 6 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -18,36 +18,30 @@ The 1.1.1.1 resolver was designed with a privacy-first approach. Refer to our [d
1818

1919
There are multiple ways to use 1.1.1.1 as an operator:
2020

21-
* Including a [DNS over HTTPS](/1.1.1.1/encryption/dns-over-https/) or [DNS over TLS](/1.1.1.1/encryption/dns-over-tls/) proxy on end-user routers or devices (best for privacy).
22-
* Pushing 1.1.1.1 to devices via DHCP/PPP within an operator network (recommended; most practical).
23-
* Having a DNS proxy on a edge router make requests to 1.1.1.1 on behalf of all connected devices.
21+
- Including a [DNS over HTTPS](/1.1.1.1/encryption/dns-over-https/) or [DNS over TLS](/1.1.1.1/encryption/dns-over-tls/) proxy on end-user routers or devices (best for privacy).
22+
- Pushing 1.1.1.1 to devices via DHCP/PPP within an operator network (recommended; most practical).
23+
- Having a DNS proxy on a edge router make requests to 1.1.1.1 on behalf of all connected devices.
2424

2525
Where possible, we recommend using encrypted transports (DNS over HTTPS or TLS) for queries, as this provides the highest degree of privacy for users over last-mile networks.
2626

2727
## Available Endpoints
2828

2929
:::note
3030

31-
32-
[Cloudflare Zero Trust](https://www.cloudflare.com/products/zero-trust/) supports customizable [DNS policies](/cloudflare-one/traffic-policies/gateway/dns-policies/), analytics, additional built-in filtering categories, and custom rate limiting capabilities.
31+
[Cloudflare Zero Trust](https://www.cloudflare.com/products/zero-trust/) supports customizable [DNS policies](/cloudflare-one/traffic-policies/dns-policies/), analytics, additional built-in filtering categories, and custom rate limiting capabilities.
3332

3433
If you require additional controls over our public 1.1.1.1 resolver, [contact us](https://www.cloudflare.com/products/zero-trust/).
3534

36-
3735
:::
3836

3937
The publicly available endpoints for 1.1.1.1 are detailed in the following table:
4038

41-
42-
4339
| Resolver | IPv4 address | IPv6 <br /> address | DNS over <br /> HTTPS endpoint | DNS over <br /> TLS endpoint |
4440
| ---------------------------------------- | -------------------------- | ---------------------------------------------------- | ----------------------------------------------- | ----------------------------- |
4541
| 1.1.1.1 <br />(unfiltered) | `1.1.1.1` <br /> `1.0.0.1` | `2606:4700:4700::1111` <br /> `2606:4700:4700::1001` | `https://cloudflare-dns.com/dns-query` | `cloudflare-dns.com` |
4642
| Families <br />(Malware) | `1.1.1.2` <br /> `1.0.0.2` | `2606:4700:4700::1112` <br /> `2606:4700:4700::1002` | `https://security.cloudflare-dns.com/dns-query` | `security.cloudflare-dns.com` |
4743
| Families <br />(Adult Content + Malware) | `1.1.1.3` <br /> `1.0.0.3` | `2606:4700:4700::1113` <br /> `2606:4700:4700::1003` | `https://family.cloudflare-dns.com/dns-query` | `family.cloudflare-dns.com` |
4844

49-
50-
5145
You may wish to provide end users with options to change from the default 1.1.1.1 resolver to one of the [1.1.1.1 for Families](/1.1.1.1/setup/#1111-for-families) endpoints.
5246

5347
## Rate Limiting
@@ -56,8 +50,8 @@ Operators using 1.1.1.1 for typical Internet-facing applications and/or users sh
5650

5751
Best practices include:
5852

59-
* Avoiding tunneling or proxying all queries from a single IP address at high rates. Distributing queries across multiple public IPs will improve this without impacting cache hit rates (caches are regional).
60-
* A high rate of "uncacheable" responses (such as `SERVFAIL`) against the same domain may be rate limited to protect upstream, authoritative nameservers. Many authoritative nameservers enforce their own rate limits, and we strive to avoid overloading third party infrastructure where possible.
53+
- Avoiding tunneling or proxying all queries from a single IP address at high rates. Distributing queries across multiple public IPs will improve this without impacting cache hit rates (caches are regional).
54+
- A high rate of "uncacheable" responses (such as `SERVFAIL`) against the same domain may be rate limited to protect upstream, authoritative nameservers. Many authoritative nameservers enforce their own rate limits, and we strive to avoid overloading third party infrastructure where possible.
6155

6256
## Help
6357

src/content/docs/1.1.1.1/infrastructure/sla-and-support.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,6 @@ As you use 1.1.1.1 in your infrastructure or service, note that dedicated techni
1111

1212
You are subject to the [Cloudflare Website and Online Services Terms of Use](https://www.cloudflare.com/website-terms/) and no service level agreements (SLAs) are provided.
1313

14-
If you need SLAs and dedicated support, consider using [Cloudflare Gateway](/cloudflare-one/traffic-policies/gateway/) instead.
14+
If you need SLAs and dedicated support, consider using [Cloudflare Gateway](/cloudflare-one/traffic-policies/) instead.
1515

16-
Gateway includes other advanced options such as domain categories, customized filtering, and scheduling capabilities. For example, if you are a device manufacturer or network operator, you can use a multi-tenant environment to allow your customers to configure their own individual filters.
16+
Gateway includes other advanced options such as domain categories, customized filtering, and scheduling capabilities. For example, if you are a device manufacturer or network operator, you can use a multi-tenant environment to allow your customers to configure their own individual filters.

src/content/docs/1.1.1.1/setup/google-cloud.mdx

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,18 +7,15 @@ head:
77
- tag: title
88
content: Set up 1.1.1.1 on Google Cloud
99
slug: 1.1.1.1/setup/google-cloud
10-
1110
---
1211

13-
import { Render } from "~/components"
12+
import { Render } from "~/components";
1413

1514
Google Cloud supports configuring [outbound server policy](https://cloud.google.com/dns/docs/server-policies-overview#dns-server-policy-out) within Cloud DNS. Policies are applied per Virtual Private Cloud (VPC) network, and will affect all resources within that VPC network, including any existing virtual machines.
1615

1716
:::note
1817

19-
20-
If you are using [Cloudflare Zero Trust](/cloudflare-one/), you can choose assigned [locations](/cloudflare-one/team-and-resources/devices/agentless/dns/locations/) to apply custom [DNS policies](/cloudflare-one/traffic-policies/gateway/dns-policies/) via Gateway.
21-
18+
If you are using [Cloudflare Zero Trust](/cloudflare-one/), you can choose assigned [locations](/cloudflare-one/team-and-resources/devices/agentless/dns/locations/) to apply custom [DNS policies](/cloudflare-one/traffic-policies/dns-policies/) via Gateway.
2219

2320
:::
2421

src/content/docs/browser-rendering/rest-api/json-endpoint.mdx

Lines changed: 31 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ curl --request POST 'https://api.cloudflare.com/client/v4/accounts/CF_ACCOUNT_ID
210210
},
211211
{
212212
"name": "Gateway",
213-
"link": "https://developers.cloudflare.com/cloudflare-one/traffic-policies/gateway/"
213+
"link": "https://developers.cloudflare.com/cloudflare-one/traffic-policies/"
214214
},
215215
{
216216
"name": "Browser Isolation",
@@ -233,40 +233,37 @@ Below is an example using the TypeScript SDK:
233233
import Cloudflare from "cloudflare";
234234

235235
const client = new Cloudflare({
236-
apiToken: process.env["CLOUDFLARE_API_TOKEN"], // This is the default and can be omitted
236+
apiToken: process.env["CLOUDFLARE_API_TOKEN"], // This is the default and can be omitted
237237
});
238238

239239
const json = await client.browserRendering.json.create({
240-
account_id: process.env["CLOUDFLARE_ACCOUNT_ID"],
241-
url: "https://developers.cloudflare.com/",
242-
prompt: "Get me the list of AI products",
243-
response_format: {
244-
type: "json_schema",
245-
schema: {
246-
type: "object",
247-
properties: {
248-
products: {
249-
type: "array",
250-
items: {
251-
type: "object",
252-
properties: {
253-
name: {
254-
type: "string"
255-
},
256-
link: {
257-
type: "string"
258-
}
259-
},
260-
required: [
261-
"name"
262-
]
263-
}
264-
}
265-
}
266-
}
267-
}
268-
}
269-
);
240+
account_id: process.env["CLOUDFLARE_ACCOUNT_ID"],
241+
url: "https://developers.cloudflare.com/",
242+
prompt: "Get me the list of AI products",
243+
response_format: {
244+
type: "json_schema",
245+
schema: {
246+
type: "object",
247+
properties: {
248+
products: {
249+
type: "array",
250+
items: {
251+
type: "object",
252+
properties: {
253+
name: {
254+
type: "string",
255+
},
256+
link: {
257+
type: "string",
258+
},
259+
},
260+
required: ["name"],
261+
},
262+
},
263+
},
264+
},
265+
},
266+
});
270267
console.log(json);
271268
```
272269

@@ -354,12 +351,6 @@ In this example, Browser Rendering first calls Anthropic's Claude Sonnet 4 model
354351
]
355352
```
356353
357-
<Render
358-
file="setting-custom-user-agent"
359-
product="browser-rendering"
360-
/>
354+
<Render file="setting-custom-user-agent" product="browser-rendering" />
361355
362-
<Render
363-
file="faq"
364-
product="browser-rendering"
365-
/>
356+
<Render file="faq" product="browser-rendering" />

src/content/docs/browser-rendering/rest-api/links-endpoint.mdx

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ curl -X POST 'https://api.cloudflare.com/client/v4/accounts/<accountId>/browser-
5757
"https://developers.cloudflare.com/products/?product-group=AI",
5858
"https://developers.cloudflare.com/cloudflare-one/access-controls/policies/access/",
5959
"https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/",
60-
"https://developers.cloudflare.com/cloudflare-one/traffic-policies/gateway/",
60+
"https://developers.cloudflare.com/cloudflare-one/traffic-policies/",
6161
"https://developers.cloudflare.com/cloudflare-one/traffic-policies/browser-isolation/",
6262
"https://developers.cloudflare.com/learning-paths/replace-vpn/concepts/",
6363
"https://developers.cloudflare.com/products/?product-group=Cloudflare+One",
@@ -173,7 +173,7 @@ curl -X POST 'https://api.cloudflare.com/client/v4/accounts/<accountId>/browser-
173173
"https://developers.cloudflare.com/products/?product-group=AI",
174174
"https://developers.cloudflare.com/cloudflare-one/access-controls/policies/access/",
175175
"https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/",
176-
"https://developers.cloudflare.com/cloudflare-one/traffic-policies/gateway/",
176+
"https://developers.cloudflare.com/cloudflare-one/traffic-policies/",
177177
"https://developers.cloudflare.com/cloudflare-one/traffic-policies/browser-isolation/",
178178
"https://developers.cloudflare.com/learning-paths/replace-vpn/concepts/",
179179
"https://developers.cloudflare.com/products/?product-group=Cloudflare+One",
@@ -233,12 +233,6 @@ curl -X POST 'https://api.cloudflare.com/client/v4/accounts/<accountId>/browser-
233233
}'
234234
```
235235

236-
<Render
237-
file="setting-custom-user-agent"
238-
product="browser-rendering"
239-
/>
236+
<Render file="setting-custom-user-agent" product="browser-rendering" />
240237

241-
<Render
242-
file="faq"
243-
product="browser-rendering"
244-
/>
238+
<Render file="faq" product="browser-rendering" />

src/content/docs/byoip/index.mdx

Lines changed: 27 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,17 +9,23 @@ head:
99
content: Bringing Your Own IPs to Cloudflare
1010
---
1111

12-
import { Plan, Description, Feature, CardGrid, LinkTitleCard } from "~/components";
12+
import {
13+
Plan,
14+
Description,
15+
Feature,
16+
CardGrid,
17+
LinkTitleCard,
18+
} from "~/components";
1319

1420
<Description>
15-
Get Cloudflare's security and performance while using your own IPs.
21+
Get Cloudflare's security and performance while using your own IPs.
1622
</Description>
1723

1824
<Plan type="enterprise" />
1925

2026
Considering [how Cloudflare works as a reverse proxy](/fundamentals/concepts/how-cloudflare-works/), for some customers it may be important to maintain this functionality while also keeping their website or application associated with their own public IP space (instead of Cloudflare's[^1]).
2127

22-
With Bring Your Own IP (BYOIP), Cloudflare announces your IPs in all our locations. Use your IPs with [Magic Transit](/magic-transit/), [Spectrum](/spectrum/), [CDN services](/cache/), or Gateway [DNS locations](/cloudflare-one/team-and-resources/devices/agentless/dns/locations/) and [dedicated egress IPs](/cloudflare-one/traffic-policies/gateway/egress-policies/dedicated-egress-ips/).
28+
With Bring Your Own IP (BYOIP), Cloudflare announces your IPs in all our locations. Use your IPs with [Magic Transit](/magic-transit/), [Spectrum](/spectrum/), [CDN services](/cache/), or Gateway [DNS locations](/cloudflare-one/team-and-resources/devices/agentless/dns/locations/) and [dedicated egress IPs](/cloudflare-one/traffic-policies/egress-policies/dedicated-egress-ips/).
2329

2430
Learn how to [get started](/byoip/get-started/).
2531

@@ -28,11 +34,13 @@ Learn how to [get started](/byoip/get-started/).
2834
## Features
2935

3036
<Feature header="Service bindings" href="/byoip/service-bindings/">
31-
Control whether traffic destined for a given IP address is routed to Magic Transit, CDN, or Spectrum.
37+
Control whether traffic destined for a given IP address is routed to Magic
38+
Transit, CDN, or Spectrum.
3239
</Feature>
3340

3441
<Feature header="Address maps" href="/byoip/address-maps/">
35-
Specify which IP addresses should be mapped to DNS records when they are proxied through Cloudflare.
42+
Specify which IP addresses should be mapped to DNS records when they are
43+
proxied through Cloudflare.
3644
</Feature>
3745

3846
---
@@ -41,14 +49,23 @@ Specify which IP addresses should be mapped to DNS records when they are proxied
4149

4250
<CardGrid>
4351

44-
<LinkTitleCard title="RPKI blog post" href="https://blog.cloudflare.com/rpki/" icon="open-book">
45-
An overview of BGP, RPKI, and other important aspects of Internet routing.
52+
<LinkTitleCard
53+
title="RPKI blog post"
54+
href="https://blog.cloudflare.com/rpki/"
55+
icon="open-book"
56+
>
57+
An overview of BGP, RPKI, and other important aspects of Internet routing.
4658
</LinkTitleCard>
4759

48-
<LinkTitleCard title="Reference Architectures" href="/reference-architecture/" icon="document">
49-
Explore how you can leverage Cloudflare's platform to create solutions based on your business needs.
60+
<LinkTitleCard
61+
title="Reference Architectures"
62+
href="/reference-architecture/"
63+
icon="document"
64+
>
65+
Explore how you can leverage Cloudflare's platform to create solutions based
66+
on your business needs.
5067
</LinkTitleCard>
5168

5269
</CardGrid>
5370

54-
[^1]: Without BYOIP, when your domain's records are `proxied`, Cloudflare responds with a Cloudflare-owned [anycast IP address](/fundamentals/concepts/cloudflare-ip-addresses/).
71+
[^1]: Without BYOIP, when your domain's records are `proxied`, Cloudflare responds with a Cloudflare-owned [anycast IP address](/fundamentals/concepts/cloudflare-ip-addresses/).

src/content/docs/data-localization/compatibility.mdx

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ The table below provides a summary of the Data Localization Suite product's beha
4343
| Advanced Certificate Manager | ⚫️ | ⚫️ | ⚫️ |
4444
| Advanced DDoS Protection ||| 🚧 [^3] |
4545
| API Shield ||| 🚧 [^4] |
46-
| Bot Management ||||
46+
| Bot Management ||| |
4747
| DNS Firewall | ⚫️ | ⚫️ | 🚧 [^22] |
4848
| Page Shield ||||
4949
| Rate Limiting |||[^37] |
@@ -84,7 +84,7 @@ The table below provides a summary of the Data Localization Suite product's beha
8484
| Static IP/BYOIP | ⚫️ |[^26] | ⚫️ |
8585
| Magic Firewall | ⚫️ | ⚫️ ||
8686
| Magic Network Monitoring | ⚫️ | ⚫️ | 🚧 [^1] |
87-
| Magic Transit | ⚫️ | ⚫️ ||
87+
| Magic Transit | ⚫️ | ⚫️ | |
8888
| Magic WAN | ⚫️ | ⚫️ ||
8989
| Spectrum ||[^42] ||
9090

@@ -116,9 +116,9 @@ The table below provides a summary of the Data Localization Suite product's beha
116116

117117
[^2]: Regular and Custom Tiered Cache works; Smart Tiered Caching not available with Regional Services.
118118

119-
[^3]: [Adaptive DDoS Protection](/ddos-protection/managed-rulesets/adaptive-protection/) is only supported for CMB = US. All other features are available to all CMB regions.
119+
[^3]: [Adaptive DDoS Protection](/ddos-protection/managed-rulesets/adaptive-protection/) is only supported for CMB = US. All other features are available to all CMB regions.
120120

121-
[^4]: API Discovery, Volumetric Abuse Detection and [Sequence Analytics and Mitigation](/api-shield/security/sequence-analytics/) will not work with CMB = EU. All other features are available to all CMB regions.
121+
[^4]: API Discovery, Volumetric Abuse Detection and [Sequence Analytics and Mitigation](/api-shield/security/sequence-analytics/) will not work with CMB = EU. All other features are available to all CMB regions.
122122

123123
[^6]: Only when using a Custom Domain set to a region, either through Workers or [Transform Rules](/images/transform-images/serve-images-custom-paths/) within the same zone.
124124

@@ -143,12 +143,14 @@ The table below provides a summary of the Data Localization Suite product's beha
143143
[^16]: Customer Metadata Boundary can be used to limit data transfer outside region, but Access User Logs will not be available outside US region. EU customers must use Logpush to retain logs.
144144

145145
[^17]: Currently may only be used with US FedRAMP region.
146+
146147
[^18]: When Cloudflare Tunnel connects to Cloudflare, the connectivity options available are the Global Region (default) and [US FedRAMP Moderate Domestic region](/cloudflare-one/networks/connectors/cloudflare-tunnel/configure-tunnels/cloudflared-parameters/run-parameters/#region). For incoming requests to the Cloudflare Edge, Regional Services only applies when using [published applications](/cloudflare-one/networks/connectors/cloudflare-tunnel/routing-to-tunnel/). In this case, the region associated with the DNS record will apply.
148+
147149
[^19]: Uses Gateway HTTP and CASB.
148150

149151
[^20]: You can [bring your own certificate](https://blog.cloudflare.com/bring-your-certificates-cloudflare-gateway/) to Gateway but these cannot yet be restricted to a specific region.
150152

151-
[^21]: Gateway HTTP supports Regional Services. Gateway DNS does not yet support regionalization. <br/> ICMP proxy and WARP-to-WARP proxy are not available to Regional Services users. [File Sandboxing](/cloudflare-one/traffic-policies/gateway/http-policies/file-sandboxing/) (add-on) is incompatible with DLS.
153+
[^21]: Gateway HTTP supports Regional Services. Gateway DNS does not yet support regionalization. <br/> ICMP proxy and WARP-to-WARP proxy are not available to Regional Services users. [File Sandboxing](/cloudflare-one/traffic-policies/http-policies/file-sandboxing/) (add-on) is incompatible with DLS.
152154

153155
[^22]: Dashboard Analytics and Logs are empty when using CMB outside the US region. Use Logpush instead.
154156

0 commit comments

Comments
 (0)