Skip to content

Commit e04a31f

Browse files
authored
Migrate lists (#26043)
1 parent a24b5b5 commit e04a31f

File tree

17 files changed

+31
-31
lines changed

17 files changed

+31
-31
lines changed

public/__redirects

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2401,6 +2401,7 @@
24012401
/cloudflare-one/applications/configure-apps/* /cloudflare-one/access-controls/applications/http-apps/:splat 301
24022402
/cloudflare-one/applications/non-http/* /cloudflare-one/access-controls/applications/non-http/:splat 301
24032403
/cloudflare-one/identity/devices/* /cloudflare-one/reusable-components/posture-checks/:splat 301
2404+
/cloudflare-one/traffic-policies/lists/ /cloudflare-one/reusable-components/lists/ 301
24042405
/cloudflare-one/applications/casb/casb-integrations/* /cloudflare-one/integrations/cloud-and-saas/:splat 301
24052406
/cloudflare-one/applications/casb/troubleshooting/* /cloudflare-one/integrations/cloud-and-saas/troubleshooting/:splat 301
24062407
/cloudflare-one/applications/casb/ /cloudflare-one/cloud-and-saas-findings/ 301

src/content/docs/cloudflare-one/access-controls/policies/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ For example, this second configuration lets any user from Portugal with a `@team
4444

4545
### Block
4646

47-
The Block action prevents users who meet certain critera from reaching an application behind Access. For example, the following policy blocks requests from Russian source IPs that are not on your [list of approved IPs](/cloudflare-one/traffic-policies/lists/).
47+
The Block action prevents users who meet certain critera from reaching an application behind Access. For example, the following policy blocks requests from Russian source IPs that are not on your [list of approved IPs](/cloudflare-one/reusable-components/lists/).
4848

4949
| Action | Rule type | Selector | Value |
5050
| ------ | --------- | -------- | ----------------- |

src/content/docs/cloudflare-one/data-loss-prevention/dlp-policies/common-policies.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Android users can now use the app, but the app traffic will bypass DLP scanning.
5656

5757
In your [DLP logs](/cloudflare-one/data-loss-prevention/dlp-policies/#4-view-dlp-logs), you may find that certain sites are a common source of noise. To exempt these sites from DLP scanning:
5858

59-
1. [Create a list](/cloudflare-one/traffic-policies/lists/) of hostnames or URLs.
59+
1. [Create a list](/cloudflare-one/reusable-components/lists/) of hostnames or URLs.
6060

6161
2. Exclude the list from your DLP policy as shown in the example below:
6262

src/content/docs/cloudflare-one/traffic-policies/lists.mdx renamed to src/content/docs/cloudflare-one/reusable-components/lists.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: how-to
33
title: Lists
44
sidebar:
5-
order: 13
5+
order: 1
66
---
77

88
import { Render } from "~/components";

src/content/docs/cloudflare-one/reusable-components/posture-checks/warp-client-checks/corp-device.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Cloudflare Zero Trust allows you to build Zero Trust rules based on device seria
2222

2323
## Create a list of serial numbers
2424

25-
To create rules based on device serial numbers, you first need to create a [Gateway List](/cloudflare-one/traffic-policies/lists/) of numbers.
25+
To create rules based on device serial numbers, you first need to create a [Gateway List](/cloudflare-one/reusable-components/lists/) of numbers.
2626

2727
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **My Team** > **Lists**.
2828

src/content/docs/cloudflare-one/reusable-components/posture-checks/warp-client-checks/device-uuid.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ You will need to use a [managed deployment tool](/cloudflare-one/team-and-resour
3030

3131
## 2. Create a list of UUIDs
3232

33-
To create rules based on device UUIDs, you first need to create a [Gateway List](/cloudflare-one/traffic-policies/lists/) of UUIDs.
33+
To create rules based on device UUIDs, you first need to create a [Gateway List](/cloudflare-one/reusable-components/lists/) of UUIDs.
3434

3535
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **My Team** > **Lists**.
3636

src/content/docs/cloudflare-one/team-and-resources/devices/agentless/dns/locations/dns-resolver-ips.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ For example, for the DoH hostname `https://65y9p2vm1u.cloudflare-gateway.com/dns
8383

8484
By default, all queries from a configured DNS location will be sent to its DNS resolver IP address to be inspected by Gateway. You can configure Gateway to only filter queries originating from specific networks within a location:
8585

86-
1. [Create an IP list](/cloudflare-one/traffic-policies/lists/) with the IPv4 and/or IPv6 addresses that your organization will source queries from.
86+
1. [Create an IP list](/cloudflare-one/reusable-components/lists/) with the IPv4 and/or IPv6 addresses that your organization will source queries from.
8787
2. Add a [Source IP](/cloudflare-one/traffic-policies/dns-policies/#source-ip) condition to your DNS policies.
8888

8989
For example, to block security threats for specific networks, you could create the following policy:

src/content/docs/cloudflare-one/traffic-policies/managed-service-providers.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ In a tiered account configuration, a top-level parent account enforces global se
3030
- Configuring a [custom block page](/cloudflare-one/traffic-policies/block-page/)
3131
- Generating or uploading [root certificates](/cloudflare-one/team-and-resources/devices/user-side-certificates/)
3232
- Mapping [DNS locations](/cloudflare-one/team-and-resources/devices/agentless/dns/locations/)
33-
- Creating [lists](/cloudflare-one/traffic-policies/lists/)
33+
- Creating [lists](/cloudflare-one/reusable-components/lists/)
3434

3535
Each child account is subject to the default Zero Trust [account limits](/cloudflare-one/account-limits/).
3636

src/content/docs/learning-paths/secure-internet-traffic/build-dns-policies/create-list.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ import { Tabs, TabItem, APIRequest } from "~/components";
99

1010
In the context of DNS filtering, a blocklist is a list of known harmful domains or IP addresses. An allowlist is a list of allowed domains or IP addresses, such as the domains of essential corporate applications.
1111

12-
Gateway supports creating [lists](/cloudflare-one/traffic-policies/lists/) of URLs, hostnames, or other entries to use in your policies.
12+
Gateway supports creating [lists](/cloudflare-one/reusable-components/lists/) of URLs, hostnames, or other entries to use in your policies.
1313

1414
## Example list policy
1515

src/content/docs/reference-architecture/architectures/sase.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -550,7 +550,7 @@ Connecting an IdP to Cloudflare provides the ability to make access decisions ba
550550

551551
Cloudflare's vast intelligent network continually monitors billions of web assets and [categorizes them](/cloudflare-one/traffic-policies/domain-categories/) based on our threat intelligence and general knowledge of Internet content. You can use our free [Cloudflare Radar](https://radar.cloudflare.com/) service to examine what categories might be applied to any specific domain. Policies can then include these categories to block known and potential security risks on the public Internet, as well as specific categories of content.
552552

553-
Additionally, Cloudflare's SWG offers the flexibility to create and maintain customized [lists of data](/cloudflare-one/traffic-policies/lists/). These lists can be uploaded via CSV files, manually maintained, or integrated with other processes and applications using the Cloudflare API. A list can contain the following data:
553+
Additionally, Cloudflare's SWG offers the flexibility to create and maintain customized [lists of data](/cloudflare-one/reusable-components/lists/). These lists can be uploaded via CSV files, manually maintained, or integrated with other processes and applications using the Cloudflare API. A list can contain the following data:
554554

555555
- URLs
556556
- Hostnames

0 commit comments

Comments
 (0)