Skip to content

Commit ef88048

Browse files
committed
Remove Details tags
1 parent 18a7bf2 commit ef88048

File tree

3 files changed

+15
-29
lines changed

3 files changed

+15
-29
lines changed

src/content/docs/learning-paths/secure-internet-traffic/build-dns-policies/create-list.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ The following DNS policy will allow access to all approved corporate domains inc
2929

3030
```sh
3131
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
32-
--header 'Content-Type: application/JSON' \
32+
--header 'Content-Type: application/json' \
3333
--header "Authorization: Bearer <API_TOKEN>" \
3434
--data '{
3535
"name": "All-DNS-CorporateDomain-AllowList",

src/content/docs/learning-paths/secure-internet-traffic/build-dns-policies/create-policy.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ To create a new DNS policy using cURL:
3838

3939
```sh
4040
curl https://api.cloudflare.com/client/v4/accounts/{account_id}/gateway/rules \
41-
--header 'Content-Type: application/JSON' \
41+
--header 'Content-Type: application/json' \
4242
--header "Authorization: Bearer <API_TOKEN>" \
4343
--data '{
4444
"name": "All-DNS-SecurityCategories-Blocklist",

src/content/docs/learning-paths/secure-internet-traffic/build-dns-policies/recommended-dns-policies.mdx

Lines changed: 13 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ import { Details, Render, Tabs, TabItem } from "~/components";
99

1010
We recommend you add the following DNS policies to build an Internet and SaaS app security strategy for your organization.
1111

12-
<Details header="All-DNS-Domain-Allowlist">
12+
## All-DNS-Domain-Allowlist
1313

1414
Allowlist any known domains and hostnames. With this policy, you ensure that your users can access your organization's domains even if the domains fall under a blocked category, such as **Newly Seen Domains** or **Login Screens**.
1515

@@ -39,7 +39,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
3939
"filters": [
4040
"dns"
4141
],
42-
"traffic": "any(dns.domains[*] in $<Global Whitelist UUID>) or dns.fqdn in $<Global Whitelist UUID>"
42+
"traffic": "any(dns.domains[*] in $<KNOWN_DOMAINS_LIST_UUID>) or dns.fqdn in $<KNOWN_DOMAINS_LIST_UUID>"
4343
}'
4444
```
4545

@@ -62,9 +62,8 @@ resource "cloudflare_zero_trust_gateway_policy" "dns_whitelist_policy" {
6262

6363
</TabItem>
6464
</Tabs>
65-
</Details>
6665

67-
<Details header="Quarantined-Users-DNS-Restricted-Access">
66+
## Quarantined-Users-DNS-Restricted-Access
6867

6968
<Render file="zero-trust/blocklist-restricted-users" />
7069

@@ -95,7 +94,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
9594
"filters": [
9695
"dns"
9796
],
98-
"traffic": "not(any(dns.domains[*] in $<Allowed Remediation Domains list UUID>)) or not(any(dns.domains[*] in $<Allowed Remediation Domains list UUID>))",
97+
"traffic": "not(any(dns.domains[*] in $<ALLOWED_REMEDIATION_DOMAINS_LIST_UUID>)) or not(any(dns.domains[*] in $<ALLOWED_REMEDIATION_DOMAINS_LIST_UUID>))",
9998
"identity": "any(identity.groups.name[*] in {\"Quarantined Users\"})",
10099
"rule_settings": {
101100
"block_page_enabled": true,
@@ -131,9 +130,8 @@ resource "cloudflare_zero_trust_gateway_policy" "dns_restrict_quarantined_users"
131130

132131
</TabItem>
133132
</Tabs>
134-
</Details>
135133

136-
<Details header="All-DNS-SecurityCategories-Blocklist">
134+
## All-DNS-SecurityCategories-Blocklist
137135

138136
<Render file="zero-trust/blocklist-security-categories" />
139137

@@ -142,9 +140,7 @@ resource "cloudflare_zero_trust_gateway_policy" "dns_restrict_quarantined_users"
142140
product="cloudflare-one"
143141
/>
144142

145-
</Details>
146-
147-
<Details header="All-DNS-ContentCategories-Blocklist">
143+
## All-DNS-ContentCategories-Blocklist
148144

149145
<Render
150146
file="zero-trust/content-categories-description"
@@ -156,9 +152,7 @@ resource "cloudflare_zero_trust_gateway_policy" "dns_restrict_quarantined_users"
156152
product="cloudflare-one"
157153
/>
158154

159-
</Details>
160-
161-
<Details header="All-DNS-Application-Blocklist">
155+
## All-DNS-Application-Blocklist
162156

163157
<Render file="zero-trust/blocklist-application" />
164158

@@ -167,9 +161,7 @@ resource "cloudflare_zero_trust_gateway_policy" "dns_restrict_quarantined_users"
167161
product="cloudflare-one"
168162
/>
169163

170-
</Details>
171-
172-
<Details header="All-DNS-GeoCountryIP-Blocklist">
164+
## All-DNS-GeoCountryIP-Blocklist
173165

174166
Block websites hosted in countries categorized as high risk. The designation of such countries may result from your organization's users or through the implementation of regulations including [EAR](https://www.tradecompliance.pitt.edu/embargoed-and-sanctioned-countries), [OFAC](https://orpa.princeton.edu/export-controls/sanctioned-countries), and [ITAR](https://www.tradecompliance.pitt.edu/embargoed-and-sanctioned-countries).
175167

@@ -229,9 +221,8 @@ resource "cloudflare_zero_trust_gateway_policy" "dns_geolocation_block_policy" {
229221

230222
</TabItem>
231223
</Tabs>
232-
</Details>
233224

234-
<Details header="All-DNS-DomainTopLevel-Blocklist">
225+
## All-DNS-DomainTopLevel-Blocklist
235226

236227
Block frequently misused top-level domains (TLDs) to reduce security risks, especially when there is no discernible advantage to be gained from allowing access. Similarly, restricting access to specific country-level TLDs may be necessary to comply with regulations such as [OFAC](https://orpa.princeton.edu/export-controls/sanctioned-countries) and [ITAR](https://www.tradecompliance.pitt.edu/embargoed-and-sanctioned-countries).
237228

@@ -291,9 +282,8 @@ resource "cloudflare_zero_trust_gateway_policy" "dns_blacklist_policy" {
291282

292283
</TabItem>
293284
</Tabs>
294-
</Details>
295285

296-
<Details header="All-DNS-DomainPhishing-Blocklist">
286+
## All-DNS-DomainPhishing-Blocklist
297287

298288
Block misused domains to protect your users against sophisticated phishing attacks, such as domains that specifically target your organization. For example, the following policy blocks specific keywords associated with an organization or its authentication services (such as `okta`, `2fa`, `cloudflare` and `sso`) while still allowing access to known domains.
299289

@@ -355,9 +345,8 @@ resource "cloudflare_zero_trust_gateway_policy" "dns_phishing_domains_block" {
355345

356346
</TabItem>
357347
</Tabs>
358-
</Details>
359348

360-
<Details header="All-DNS-ResolvedIP-Blocklist">
349+
## All-DNS-ResolvedIP-Blocklist
361350

362351
Block specific IP addresses that are malicious or pose a threat to your organization.
363352

@@ -388,7 +377,7 @@ curl https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/rules \
388377
"filters": [
389378
"dns"
390379
],
391-
"traffic": "any(dns.resolved_ips[*] in $<IP Blocklist UUID>)",
380+
"traffic": "any(dns.resolved_ips[*] in $<IP_BLOCKLIST_UUID>)",
392381
"rule_settings": {
393382
"block_page_enabled": true,
394383
"block_reason": "This domain was blocked due to being classified as a security risk to the organization"
@@ -419,9 +408,8 @@ resource "cloudflare_zero_trust_gateway_policy" "dns_resolvedip_blocklist_rule"
419408

420409
</TabItem>
421410
</Tabs>
422-
</Details>
423411

424-
<Details header="All-DNS-DomainHost-Blocklist">
412+
## All-DNS-DomainHost-Blocklist
425413

426414
<Render
427415
file="zero-trust/blocklist-domain-host"
@@ -486,5 +474,3 @@ resource "cloudflare_zero_trust_gateway_policy" "block_dns_domain_host" {
486474

487475
</TabItem>
488476
</Tabs>
489-
490-
</Details>

0 commit comments

Comments
 (0)