You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **Firewall policies**.
10
12
2. In the **HTTP** tab, select **Add a policy**.
11
13
3. Name the policy.
12
14
4. Under **Traffic**, build a logical expression that defines the traffic you want to allow or block.
13
-
5. Choose an **Action** to take when traffic matches the logical expression. For example, if you have enabled TLS inspection, some applications that use [embedded certificates](/cloudflare-one/policies/gateway/http-policies/tls-decryption/#inspection-limitations) may not support HTTP inspection, such as some Google products. You can create a policy to bypass inspection for these applications:
15
+
5. Choose an **Action** to take when traffic matches the logical expression. For example, if you have enabled TLS decryption, some applications that use [embedded certificates](/cloudflare-one/policies/gateway/http-policies/tls-decryption/#inspection-limitations) may not support HTTP inspection, such as some Google products. You can create a policy to bypass inspection for these applications:
1.[Create an API token](/fundamentals/api/get-started/create-token/) with the following permissions:
36
+
37
+
| Type | Item | Permission |
38
+
| ------- | ---------- | ---------- |
39
+
| Account | Zero Trust | Edit |
40
+
41
+
2. (Optional) Configure your API environment variables to include your [account ID](/fundamentals/setup/find-account-and-zone-ids/), email address, and API token.
42
+
3. Send a `POST` request to the [Create a Zero Trust Gateway rule](/api/operations/zero-trust-gateway-rules-create-zero-trust-gateway-rule) endpoint. For example, if you have enabled TLS decryption, some applications that use [embedded certificates](/cloudflare-one/policies/gateway/http-policies/tls-decryption/#inspection-limitations) may not support HTTP inspection, such as some Google products. You can create a policy to bypass inspection for these applications:
"description": "Bypass TLS decryption for unsupported applications",
51
+
"precedence": 0,
52
+
"enabled": true,
53
+
"action": "off",
54
+
"filters": [
55
+
"http"
56
+
],
57
+
"traffic": "any(app.type.ids[*] in {16})",
58
+
"identity": "",
59
+
"device_posture": ""
60
+
}'
61
+
```
62
+
63
+
Cloudflare also recommends adding a policy to block [known threats](/cloudflare-one/policies/gateway/domain-categories/#security-categories) such as Command & Control, Botnet and Malware based on Cloudflare's threat intelligence:
0 commit comments