Skip to content

Commit e7ec0f4

Browse files
committed
Change source of truth
1 parent cc27f90 commit e7ec0f4

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

src/content/docs/cloudflare-one/policies/gateway/http-policies/tls-decryption.mdx

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -44,13 +44,9 @@ Gateway does not support TLS decryption for applications which use:
4444

4545
### Inspect on all ports <Badge text="Beta" variant="caution" size="small" />
4646

47-
By default, Gateway will only inspect HTTP traffic through port `80`. Additionally, if you turn on TLS decryption, Gateway will inspect HTTPS traffic through port `443`. To detect HTTP and HTTPS traffic on ports other than `80` and `443`, you can turn on [protocol detection](/cloudflare-one/policies/gateway/network-policies/protocol-detection/):
47+
By default, Gateway will only inspect HTTP traffic through port `80`. Additionally, if you turn on TLS decryption, Gateway will inspect HTTPS traffic through port `443`.
4848

49-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Network** > **Firewall**.
50-
2. Turn on **Protocol Detection**.
51-
3. Under **HTTP inspection ports**, choose _Inspect on all ports_.
52-
53-
Gateway will detect and filter HTTP and HTTPS traffic on any port.
49+
To detect and inspect HTTP and HTTPS traffic on ports other than `80` and `443`, you can turn on [protocol detection](/cloudflare-one/policies/gateway/network-policies/protocol-detection/) and configure Gateway to [inspect traffic on all ports](/cloudflare-one/policies/gateway/network-policies/protocol-detection/#inspect-on-all-ports).
5450

5551
### Incompatible certificates
5652

src/content/docs/cloudflare-one/policies/gateway/network-policies/protocol-detection.mdx

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,8 @@ sidebar:
55
order: 2
66
---
77

8+
import { Badge } from "~/components";
9+
810
Gateway supports the detection, logging, and filtering of network protocols using packet attributes.
911

1012
Protocol detection only applies to devices connected to Zero Trust via the WARP client in [Gateway with WARP](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#gateway-with-warp-default) mode.
@@ -18,9 +20,11 @@ To turn on protocol detection:
1820

1921
You can now use _Detected Protocol_ as a selector in a [Network policy](/cloudflare-one/policies/gateway/network-policies/#detected-protocol).
2022

21-
### HTTP inspection ports
23+
### Inspect on all ports <Badge text="Beta" variant="caution" size="small" />
24+
25+
By default, Gateway will only inspect HTTP traffic through port `80`. Additionally, if you turn on [TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/), Gateway will inspect HTTPS traffic through port `443`.
2226

23-
By default, Gateway will only inspect HTTP traffic through port `80`. Additionally, if you turn on [TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/), Gateway will inspect HTTPS traffic through port `443`. To detect HTTP and HTTPS traffic on ports other than `80` and `443`, under **HTTP inspection ports**, choose _Inspect on all ports_.
27+
To detect and inspect HTTP and HTTPS traffic on ports other than `80` and `443`, under **HTTP inspection ports**, choose _Inspect on all ports_.
2428

2529
## Supported protocols
2630

0 commit comments

Comments
 (0)