You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/policies/gateway/http-policies/tls-decryption.mdx
+12-6Lines changed: 12 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ Cloudflare Gateway can perform [SSL/TLS decryption](https://www.cloudflare.com/l
17
17
18
18
When you turn on TLS decryption, Gateway will decrypt all traffic sent over HTTPS, apply your HTTP policies, and then re-encrypt the request with a [user-side certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/).
19
19
20
-
Cloudflare prevents traffic interference by decrypting, inspecting, and re-encrypting HTTPS requests in its data centers in memory only. Gateway only stores eligible cache content at rest. All cache disks are encrypted at rest. You can configure where TLS decryption takes place with [Regional Services](/data-localization/regional-services/) in the [Cloudflare Data Localization Suite (DLS)](/data-localization/), including [FedRAMP compliant data centers](#fedramp-compliance). To further control what data centers traffic egresses from, you can use [dedicated egress IPs](/cloudflare-one/policies/gateway/egress-policies/dedicated-egress-ips/).
20
+
Cloudflare prevents traffic interference by decrypting, inspecting, and re-encrypting HTTPS requests in its data centers in memory only. Gateway only stores eligible cache content at rest. All cache disks are encrypted at rest. You can configure where TLS decryption takes place with [Regional Services](/data-localization/regional-services/) in the [Cloudflare Data Localization Suite (DLS)](/data-localization/). To further control what data centers traffic egresses from, you can use [dedicated egress IPs](/cloudflare-one/policies/gateway/egress-policies/dedicated-egress-ips/).
21
21
22
22
Cloudflare supports connections from users to Gateway over TLS 1.1, 1.2, and 1.3.
23
23
@@ -117,24 +117,30 @@ FIPS-compliant traffic defaults to [HTTP/3](/cloudflare-one/policies/gateway/htt
117
117
118
118
## FedRAMP compliance
119
119
120
-
When using [Cloudflare Regional Services](/data-localization/regional-services/)with the WARP client to on-ramp TLS traffic to Gateway, traffic will egress from a Cloudflare data center within Cloudflare's FedRAMP boundary. If a user's closest data center is non-FedRAMP compliant, their traffic will still egress from a FedRAMP compliant data center, maintaining FedRAMP compliance for the traffic.
120
+
When you use [Cloudflare Regional Services](/data-localization/regional-services/)in the United States and the WARP client to on-ramp TLS traffic to Gateway, traffic will egress from a Cloudflare data center within Cloudflare's FedRAMP boundary. If a user's closest data center is non-FedRAMP compliant, their traffic will still egress from a FedRAMP compliant data center, maintaining FedRAMP compliance for the traffic.
121
121
122
122
```mermaid
123
123
flowchart LR
124
+
%% Accessibility
125
+
accTitle: How Gateway routes FedRAMP compliant traffic with Regional Services
126
+
accDescr: Flowchart describing how WARP with Gateway routes traffic to egress from a FedRAMP compliant data center when used with Regional Services in the United States.
127
+
128
+
%% Flowchart
124
129
subgraph s1["Non-FedRAMP data center"]
125
130
n2["WARP TLS encryption terminated"]
126
131
end
127
132
subgraph s2["FedRAMP data center"]
128
133
n3["Gateway TLS encryption (FIPS) terminated"]
129
134
end
130
135
subgraph s3["Private internal network"]
131
-
n5["FedRAMP-compliant cloudflared"]
136
+
n5["FedRAMPcompliant cloudflared"]
132
137
n6(["Private server"])
133
138
end
134
-
n1(["User near non-FedRAMP compliant data center"]) -- Gateway TLS connection wrapped with WARP TLS --> n2
135
-
n2 --> n3
136
-
n3 --> n4(["HTTPS server"]) & n5
139
+
n1(["User near non-FedRAMP compliant data center"]) -- Gateway TLS connection wrapped with WARP TLS (MASQUE) --> n2
0 commit comments