Skip to content

Commit da9cced

Browse files
updates
1 parent 09ec477 commit da9cced

File tree

3 files changed

+15
-6
lines changed

3 files changed

+15
-6
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains.mdx

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,7 @@ Local Domain Fallback only applies to devices running the WARP client.
1717

1818
Because DNS requests subject to Local Domain Fallback bypass the Gateway resolver, they are not subject to Gateway DNS policies or DNS logging. If you want to route DNS queries to custom resolvers and apply Gateway filtering, use [resolver policies](/cloudflare-one/policies/gateway/resolver-policies/). If both Local Domain Fallback and resolver policies are configured for the same device, Cloudflare will apply client-side Local Domain Fallback rules first.
1919

20-
:::tip[Local Domain Fallback or Gateway Resolver policies?]
21-
22-
If your DNS server can be configured to connect to a Cloudflare <GlossaryTooltip term="on-ramp">on-ramp</GlossaryTooltip>, Cloudflare recommends using Gateway Resolver policies rather than [Local Domain Fallback](/cloudflare-one/policies/gateway/resolver-policies/#local-domain-fallback). Using Gateway Resolver policies will allow you to log your DNS traffic for review.
23-
24-
:::
20+
<Render file="warp/ldf-best-practice" product="cloudflare-one" />
2521

2622
### AWS
2723

src/content/docs/cloudflare-one/policies/gateway/resolver-policies.mdx

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ head:
1010
content: Resolver policies
1111
---
1212

13-
import { Render, Badge } from "~/components";
13+
import { Render, Badge, GlossaryTooltip } from "~/components";
1414

1515
:::note
1616
Only available on Enterprise plans.
@@ -52,6 +52,8 @@ To get started with resolving internal DNS queries with resolver policies, refer
5252

5353
If your resolver is only reachable by a client device and not by Gateway via a Cloudflare tunnel, Magic WAN tunnel, or other public Internet connections, you should configure [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) for your device. If both Local Domain Fallback and resolver policies are configured for the same device, Cloudflare will apply your client-side Local Domain Fallback rules first. If you onboard DNS queries to Gateway with the WARP client and route them with resolver policies, the source IP of the queries will be the IP address assigned by the WARP client.
5454

55+
<Render file="warp/ldf-best-practice" product="cloudflare-one" />
56+
5557
## Resolver connections
5658

5759
Resolver policies support TCP and UDP connections. Custom resolvers can point to the Internet via IPv4 or IPv6, or to a private network service, such as a [Magic tunnel](/magic-transit/how-to/configure-tunnel-endpoints/). Policies default to port `53`. You can change which port your resolver uses by customizing it in your policy.
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
{}
3+
---
4+
5+
import { GlossaryTooltip } from "~/components";
6+
7+
:::tip[Local Domain Fallback or Gateway Resolver policies?]
8+
9+
If your DNS server can be configured to connect to a Cloudflare <GlossaryTooltip term="on-ramp">on-ramp</GlossaryTooltip>, Cloudflare recommends using Gateway Resolver policies rather than Local Domain Fallback. Gateway Resolver policies provide more visibility by allowing you to log and review DNS traffic.
10+
11+
:::

0 commit comments

Comments
 (0)