You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If your users receive a security risk warning in their browser when visiting a blocked page, check that you have correctly [installed a Cloudflare certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/manual-deployment/) on their devices.
44
-
45
42
## Customize the block page
46
43
47
44
<Renderfile="gateway/customize-block-page" />
@@ -63,3 +60,11 @@ You can add a Mailto link to your custom block page, which allows users to direc
63
60
| User ID | The ID of the user who visited the page. Currently, User IDs are not surfaced in the dashboard and can only be viewed by calling the [API](/api/resources/zero_trust/subresources/access/subresources/users/methods/list/). |
64
61
| Device ID | The ID of the device that visited the page. This is generated by the WARP client. |
65
62
| Block Reason | Your policy-specific block message. |
63
+
64
+
## Limitations
65
+
66
+
If your users receive a security risk warning in their browser when visiting a blocked page, check that you have correctly [installed a Cloudflare certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/manual-deployment/) on their devices.
67
+
68
+
If an HTTP request to be blocked does not arrive at the same Cloudflare data center as its DNS query, Gateway will display the default block page instead of your custom block page.
69
+
70
+
If the HTTP request comes from a different IP address from the DNS request, they cannot be correlated and the rule Id, custom message, and some other fields may be missing. This can happen when a recursive resolver source IP differs from the device IP
Copy file name to clipboardExpand all lines: src/content/docs/learning-paths/replace-vpn/build-policies/block-page.mdx
+19-14Lines changed: 19 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,41 +3,46 @@ title: Gateway block page
3
3
pcx_content_type: overview
4
4
sidebar:
5
5
order: 5
6
-
7
6
---
8
7
9
-
import { Render } from"~/components"
8
+
import { Render } from"~/components";
10
9
11
10
With Cloudflare Zero Trust, you can deliver actionable feedback to users when they are blocked by a Gateway policy. Custom block messages can reduce user confusion and decrease your IT ticket load.
12
11
13
12
There are two different ways to surface block messages:
You can display a custom block page in the browser when users are blocked by a Gateway DNS or HTTP policy. This is a static page that educates users on why they were blocked and how to contact IT.
21
20
22
21
The custom block page has a few drawbacks:
23
22
24
-
* To display the block page, you must install a [user-side certificate](/learning-paths/replace-vpn/configure-device-agent/enable-tls-decryption/#configure-user-side-certificates) on the end user device.
25
-
* You cannot customize the block message for individual DNS policies.
26
-
* The block page does not appear when users are blocked by a Gateway network policy.
27
-
* The custom block page only displays when the user loads a site in a browser. If, for instance, the user is allowed to visit a site but not allowed to upload a file, the file upload would fail silently and the user would not get a block page.
23
+
- To display the block page, you must install a [user-side certificate](/learning-paths/replace-vpn/configure-device-agent/enable-tls-decryption/#configure-user-side-certificates) on the end user device.
24
+
- You cannot customize the block message for individual DNS policies.
25
+
- The block page does not appear when users are blocked by a Gateway network policy.
26
+
- The custom block page only displays when the user loads a site in a browser. If, for instance, the user is allowed to visit a site but not allowed to upload a file, the file upload would fail silently and the user would not get a block page.
28
27
29
28
To work around these limitations, we recommend using [WARP client block notifications](#warp-client-block-notifications).
30
29
31
30
:::note
32
31
33
-
The Gateway custom block page is a different concept from [Access custom block pages](/cloudflare-one/applications/block-page/), which are used in conjunction with Cloudflare Access policies.
32
+
The Gateway custom block page is a different concept from [Access custom block pages](/cloudflare-one/applications/block-page/), which are used in conjunction with Cloudflare Access policies.
34
33
:::
35
34
36
35
### Enable the block page for DNS policies
37
36
38
37
For DNS policies, you will need to enable the block page on a per-policy basis.
@@ -47,13 +52,13 @@ For DNS policies, you will need to enable the block page on a per-policy basis.
47
52
48
53
:::note
49
54
50
-
Only available on Enterprise plans.
55
+
Only available on Enterprise plans.
51
56
:::
52
57
53
-
For more granular user feedback, you can enable WARP client block notifications on any Gateway DNS or Network *Block* policy. Blocked users will receive an operating system notification from the WARP client with a custom message you set.
58
+
For more granular user feedback, you can enable WARP client block notifications on any Gateway DNS or Network _Block_ policy. Blocked users will receive an operating system notification from the WARP client with a custom message you set.
54
59
55
60
Client notifications provide additional functionality over the [custom block page](#custom-block-page):
56
61
57
-
* Client notifications work with network policies, which means you can surface feedback for all partial actions on user traffic including blocking a specific port, file upload, or protocol.
62
+
- Client notifications work with network policies, which means you can surface feedback for all partial actions on user traffic including blocking a specific port, file upload, or protocol.
58
63
59
-
* Client notifications allow you to direct users to a unique link per individual policy. For example, you could link users to your organization's acceptable use policy, data protection policy, or any existing IT troubleshooting infrastructure. If no infrastructure for this exists within your organization, you can quickly deploy an HTML site on [Cloudflare Pages](/pages/), put the site behind a [Cloudflare Access policy](/cloudflare-one/policies/access/), and provide dynamic feedback based on the identity and device posture values found in the user's [Access JWT](/cloudflare-one/identity/authorization-cookie/application-token/).
64
+
- Client notifications allow you to direct users to a unique link per individual policy. For example, you could link users to your organization's acceptable use policy, data protection policy, or any existing IT troubleshooting infrastructure. If no infrastructure for this exists within your organization, you can quickly deploy an HTML site on [Cloudflare Pages](/pages/), put the site behind a [Cloudflare Access policy](/cloudflare-one/policies/access/), and provide dynamic feedback based on the identity and device posture values found in the user's [Access JWT](/cloudflare-one/identity/authorization-cookie/application-token/).
0 commit comments