You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/learning-paths/secure-internet-traffic/build-network-policies/recommended-network-policies.mdx
Block all non-web traffic towards the Internet. By using the **Detected Protocol** selector, you will ensure alternative ports for HTTP and HTTPS are allowed.
description = "Block all non-web traffic towards the Internet"
354
+
precedence = 0
355
+
enabled = true
356
+
action = "block"
357
+
filters = ["l4"]
358
+
traffic = "not(net.dst.ip in ${"$"}${cloudflare_zero_trust_list.internal_network_ip_list.id}) and not(net.detected_protocol in {\"http\" \"http2\"})"
359
+
}
360
+
```
361
+
362
+
</TabItem>
363
+
</Tabs>
364
+
320
365
## All-NET-InternalNetwork-ImplicitDeny
321
366
322
367
Implicitly deny all of your internal IP ranges included in a list. We recommend you place this policy at the [bottom of your policy list](/learning-paths/secure-internet-traffic/understand-policies/order-of-enforcement/#order-of-precedence) to ensure you explicitly approve traffic defined in the above policies.
0 commit comments