You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
With Cloudflare Zero Trust, you can deliver actionable feedback to users when they are blocked by a Gateway policy. Custom block messages can reduce user confusion and decrease your IT ticket load.
11
11
@@ -35,6 +35,8 @@ The Gateway custom block page is a different concept from [Access custom block p
35
35
36
36
For DNS policies, you will need to enable the block page on a per-policy basis.
@@ -45,6 +47,47 @@ For DNS policies, you will need to enable the block page on a per-policy basis.
45
47
46
48
/>
47
49
50
+
</TabItem>
51
+
<TabItemlabel="Terraform (v5)">
52
+
53
+
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token):
54
+
-`Zero Trust Write`
55
+
56
+
2. Choose a DNS policy with a Block action.
57
+
58
+
3. In the policy's [`rule_settings`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_gateway_policy), turn on `block_page_enabled`. If you have configured a [custom Gateway block page](/cloudflare-one/policies/gateway/block-page/#customize-the-block-page), you can optionally show an additional `block_reason` when traffic is blocked by this policy.
block_reason = "This domain has been flagged as a potential security risk." // Adds an additional message to the custom block page. Requires enabling custom block page in cloudflare_zero_trust_gateway_settings.
Copy file name to clipboardExpand all lines: src/content/partials/cloudflare-one/gateway/customize-block-page.mdx
+35Lines changed: 35 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,10 +2,14 @@
2
2
{}
3
3
---
4
4
5
+
import { Tabs, TabItem } from"~/components";
6
+
5
7
You can customize the Cloudflare-hosted block page by making global changes that Gateway will display every time a user reaches your block page. Customizations will apply regardless of the type of policy (DNS or HTTP) that blocks the traffic.
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Custom Pages**.
10
14
2. Under **Account Gateway block page**, select **Customize**.
11
15
3. Choose **Custom Gateway block page**. Gateway will display a preview of your custom block page. Available customizations include:
@@ -17,4 +21,35 @@ To customize your block page:
17
21
- Background color
18
22
4. Select **Save**.
19
23
24
+
25
+
</TabItem>
26
+
<TabItemlabel="Terraform (v5)">
27
+
28
+
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token):
29
+
-`Zero Trust Write`
30
+
31
+
2. In [`cloudflare_zero_trust_gateway_settings`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_gateway_settings), configure the `block_page` argument with your customizations:
Copy file name to clipboardExpand all lines: src/content/partials/cloudflare-one/warp/warp-sessions-gateway.mdx
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,9 @@ To configure a session timeout for a Gateway policy:
25
25
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token):
26
26
-`Zero Trust Write`
27
27
28
-
2. Choose a Network (`l4`) or HTTP (`http`) Allow policy. Use the [`check_session` argument](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_gateway_policy) to enable and configure a session timeout:
28
+
2. Choose a Network (`l4`) or HTTP (`http`) policy with an Allow action.
29
+
30
+
3. In the policy's [`rule_settings`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_gateway_policy), use the `check_session` argument to enable and configure a session timeout:
0 commit comments