You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/partials/cloudflare-one/gateway/create-resolver-policy.mdx
+38-35Lines changed: 38 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,12 @@
4
4
5
5
import { TabItem, Tabs } from"~/components";
6
6
7
+
:::caution[Virtual network limitation]
8
+
Resolver policies do not automatically update when you change the virtual networks associated with a route. If you move a route from one virtual network to another, the resolver policy will still reference the old virtual network. You will need to manually remove and recreate the resolver policy to update the route.
Make sure your destination is not subject to [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#manage-local-domains).
18
24
19
25
4. In **Select DNS resolver**, choose _Configure custom DNS resolvers_.
20
-
5. Enter the IP addresses of your custom DNS resolver.
21
-
:::note[Search virtual networks]
22
-
As you enter an IP address, Gateway will search through your [virtual networks](/cloudflare-one/connections/connect-networks/private-net/cloudflared/tunnel-virtual-networks/) configured in Zero Trust.
23
-
:::
26
+
5. Enter the IP addresses of your custom DNS resolver. As you enter an IP address, Gateway will search through your [virtual networks](/cloudflare-one/connections/connect-networks/private-net/cloudflared/tunnel-virtual-networks/) configured in Zero Trust.
24
27
6. In **Network**, choose whether to route queries publicly (to the Internet) or privately (to a private network service).
25
28
7. (Optional) Enter a custom port for each IP address.
26
29
8. Select **Create policy**.
@@ -31,40 +34,40 @@ Custom resolvers are saved to your account for future use. You can add up to 10
31
34
<TabItemlabel="Terraform (v5)">
32
35
33
36
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token):
34
-
-`Zero Trust Write`
35
37
36
-
2. Create a resolver policy using the [`cloudflare_zero_trust_gateway_policy`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_gateway_policy) resource:
2. Create a resolver policy using the [`cloudflare_zero_trust_gateway_policy`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_gateway_policy) resource:
Copy file name to clipboardExpand all lines: src/content/partials/learning-paths/zero-trust/private-dns.mdx
+3-5Lines changed: 3 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,13 @@
1
1
---
2
2
{}
3
-
4
3
---
5
4
6
-
import { Render } from"~/components"
5
+
import { Render } from"~/components";
7
6
8
7
By default, all DNS requests on the user device are resolved by Cloudflare's [public DNS resolver](/1.1.1.1/) except for common top level domains used for local resolution (such as `localhost`). To allow users to connect to internal server names or domains that do not resolve on the public Internet, you have two options:
9
8
10
-
*[Add internal domains to Local Domain Fallback](#local-domain-fallback)
0 commit comments