Firewall Policies > DNS or Gateway > Firewall Policies > HTTP",
+ }}
+/>
## Troubleshoot the block page
diff --git a/src/content/docs/cloudflare-one/policies/gateway/dns-policies/index.mdx b/src/content/docs/cloudflare-one/policies/gateway/dns-policies/index.mdx
index fab0ceae606fda6..154070686953d49 100644
--- a/src/content/docs/cloudflare-one/policies/gateway/dns-policies/index.mdx
+++ b/src/content/docs/cloudflare-one/policies/gateway/dns-policies/index.mdx
@@ -3,24 +3,26 @@ pcx_content_type: configuration
title: DNS policies
sidebar:
order: 2
-
---
-import { Details, InlineBadge, Render } from "~/components"
+import { Details, InlineBadge, Render } from "~/components";
When a user makes a DNS request to Gateway, Gateway matches the request against the DNS policies you have set up for your organization. If the domain does not belong to any blocked categories, or if it matches an Override policy, the user's client receives the DNS resolution and initiates an HTTP connection.
A DNS policy consists of an **Action** as well as a logical expression that determines the scope of the action. To build an expression, you need to choose a **Selector** and an **Operator**, and enter a value or range of values in the **Value** field. You can use **And** and **Or** logical operators to evaluate multiple conditions.
-* [Actions](#actions)
-* [Selectors](#selectors)
-* [Comparison operators](#comparison-operators)
-* [Value](#value)
-* [Logical operators](#logical-operators)
+- [Actions](#actions)
+- [Selectors](#selectors)
+- [Comparison operators](#comparison-operators)
+- [Value](#value)
+- [Logical operators](#logical-operators)
-When creating a DNS policy, you can select as many security risk categories and content categories as needed to fully secure your network. Unless a more specific selector is configured in a policy (for example, *User Email* or *Source IP*), then the policy will be evaluated against all DNS queries that reach Gateway from your organization.
+When creating a DNS policy, you can select as many security risk categories and content categories as needed to fully secure your network. Unless a more specific selector is configured in a policy (for example, _User Email_ or _Source IP_), then the policy will be evaluated against all DNS queries that reach Gateway from your organization.
-
+
## Actions
@@ -28,52 +30,50 @@ Just like actions in HTTP policies, actions in DNS policies allow you to choose
These are the action types you can choose from:
-* [Allow](#allow)
-* [Block](#block)
-* [Override](#override)
-* [Safe Search](#safe-search)
-* [YouTube Restricted Mode](#youtube-restricted-mode)
+- [Allow](#allow)
+- [Block](#block)
+- [Override](#override)
+- [Safe Search](#safe-search)
+- [YouTube Restricted Mode](#youtube-restricted-mode)
### Allow
API value: `allow`
-
**Traffic**
-* [Application](#application)
-* [Authoritative Nameserver IP](#authoritative-nameserver-ip)
-* [Content Categories](#content-categories)
-* [DNS CNAME Response Value](#dns-cname-record)
-* [DNS MX Response Value](#dns-mx-record)
-* [DNS PTR Response Value](#dns-ptr-record)
-* [DNS Resolver IP](#dns-resolver-ip)
-* [DNS TXT Response Value](#dns-txt-record)
-* [DOH Subdomain](#doh-subdomain)
-* [Domain](#domain)
-* [Host](#host)
-* [Indicator Feeds](#indicator-feeds)
-* [Location](#location)
-* [Query Record Type](#query-record-type)
-* [Resolved Continent IP Geolocation](#resolved-continent)
-* [Resolved Country IP Geolocation](#resolved-country)
-* [Resolved IP](#resolved-ip)
-* [Security Categories](#security-categories)
-* [Source Continent IP Geolocation](#source-continent)
-* [Source Country IP Geolocation](#source-country)
-* [Source IP](#source-ip)
+- [Application](#application)
+- [Authoritative Nameserver IP](#authoritative-nameserver-ip)
+- [Content Categories](#content-categories)
+- [DNS CNAME Response Value](#dns-cname-record)
+- [DNS MX Response Value](#dns-mx-record)
+- [DNS PTR Response Value](#dns-ptr-record)
+- [DNS Resolver IP](#dns-resolver-ip)
+- [DNS TXT Response Value](#dns-txt-record)
+- [DOH Subdomain](#doh-subdomain)
+- [Domain](#domain)
+- [Host](#host)
+- [Indicator Feeds](#indicator-feeds)
+- [Location](#location)
+- [Query Record Type](#query-record-type)
+- [Resolved Continent IP Geolocation](#resolved-continent)
+- [Resolved Country IP Geolocation](#resolved-country)
+- [Resolved IP](#resolved-ip)
+- [Security Categories](#security-categories)
+- [Source Continent IP Geolocation](#source-continent)
+- [Source Country IP Geolocation](#source-country)
+- [Source IP](#source-ip)
**Identity**
-* [SAML Attributes](#users)
-* [User Email](#users)
-* [User Group Emails](#users)
-* [User Group IDs](#users)
-* [User Group Names](#users)
-* [User Name](#users)
-
+- [SAML Attributes](#users)
+- [User Email](#users)
+- [User Group Emails](#users)
+- [User Group IDs](#users)
+- [User Group Names](#users)
+- [User Name](#users)
@@ -91,42 +91,40 @@ When you select **Disable DNSSEC validation**, Gateway will resolve DNS queries
API value: `block`
-
**Traffic**
-* [Application](#application)
-* [Authoritative Nameserver IP](#authoritative-nameserver-ip)
-* [Content Categories](#content-categories)
-* [DNS CNAME Response Value](#dns-cname-record)
-* [DNS MX Response Value](#dns-mx-record)
-* [DNS PTR Response Value](#dns-ptr-record)
-* [DNS Resolver IP](#dns-resolver-ip)
-* [DNS TXT Response Value](#dns-txt-record)
-* [DOH Subdomain](#doh-subdomain)
-* [Domain](#domain)
-* [Host](#host)
-* [Indicator Feeds](#indicator-feeds)
-* [Location](#location)
-* [Query Record Type](#query-record-type)
-* [Resolved Continent IP Geolocation](#resolved-continent)
-* [Resolved Country IP Geolocation](#resolved-country)
-* [Resolved IP](#resolved-ip)
-* [Security Categories](#security-categories)
-* [Source Continent IP Geolocation](#source-continent)
-* [Source Country IP Geolocation](#source-country)
-* [Source IP](#source-ip)
+- [Application](#application)
+- [Authoritative Nameserver IP](#authoritative-nameserver-ip)
+- [Content Categories](#content-categories)
+- [DNS CNAME Response Value](#dns-cname-record)
+- [DNS MX Response Value](#dns-mx-record)
+- [DNS PTR Response Value](#dns-ptr-record)
+- [DNS Resolver IP](#dns-resolver-ip)
+- [DNS TXT Response Value](#dns-txt-record)
+- [DOH Subdomain](#doh-subdomain)
+- [Domain](#domain)
+- [Host](#host)
+- [Indicator Feeds](#indicator-feeds)
+- [Location](#location)
+- [Query Record Type](#query-record-type)
+- [Resolved Continent IP Geolocation](#resolved-continent)
+- [Resolved Country IP Geolocation](#resolved-country)
+- [Resolved IP](#resolved-ip)
+- [Security Categories](#security-categories)
+- [Source Continent IP Geolocation](#source-continent)
+- [Source Country IP Geolocation](#source-country)
+- [Source IP](#source-ip)
**Identity**
-* [SAML Attributes](#users)
-* [User Email](#users)
-* [User Group Emails](#users)
-* [User Group IDs](#users)
-* [User Group Names](#users)
-* [User Name](#users)
-
+- [SAML Attributes](#users)
+- [User Email](#users)
+- [User Group Emails](#users)
+- [User Group IDs](#users)
+- [User Group Names](#users)
+- [User Name](#users)
@@ -138,7 +136,7 @@ Policies with Block actions block DNS queries to reach destinations you specify
#### Custom block page
-When choosing the Block action, turn on **Display custom block page** to respond to queries with a block page and to specify the message you want to display to users who go to blocked websites. If the block page is disabled, Gateway will respond to blocked queries with an `A` record of `0.0.0.0` for IPv4 destinations, or with an `AAAA` record of `::` for IPv6 destinations. For more information, refer to the dedicated documentation on [customizing the block page](/cloudflare-one/policies/gateway/configuring-block-page/).
+When choosing the Block action, turn on **Display custom block page** to respond to queries with a block page and to specify the message you want to display to users who go to blocked websites. If the block page is disabled, Gateway will respond to blocked queries with an `A` record of `0.0.0.0` for IPv4 destinations, or with an `AAAA` record of `::` for IPv6 destinations. For more information, refer to the dedicated documentation on [customizing the block page](/cloudflare-one/policies/gateway/block-page/).
#### WARP client block notifications
@@ -148,37 +146,35 @@ When choosing the Block action, turn on **Display custom block page** to respond
API value: `override`
-
The Override action cannot be used with selectors evaluated during or after DNS resolution.
**Traffic**
-* [Application](#application)
-* [Content Categories](#content-categories)
-* [DNS Resolver IP](#dns-resolver-ip)
-* [DOH Subdomain](#doh-subdomain)
-* [Domain](#domain)
-* [Host](#host)
-* [Location](#location)
-* [Query Record Type](#query-record-type)
-* [Resolved Continent IP Geolocation](#resolved-continent)
-* [Resolved Country IP Geolocation](#resolved-country)
-* [Security Categories](#security-categories)
-* [Source Continent IP Geolocation](#source-continent)
-* [Source Country IP Geolocation](#source-country)
-* [Source IP](#source-ip)
+- [Application](#application)
+- [Content Categories](#content-categories)
+- [DNS Resolver IP](#dns-resolver-ip)
+- [DOH Subdomain](#doh-subdomain)
+- [Domain](#domain)
+- [Host](#host)
+- [Location](#location)
+- [Query Record Type](#query-record-type)
+- [Resolved Continent IP Geolocation](#resolved-continent)
+- [Resolved Country IP Geolocation](#resolved-country)
+- [Security Categories](#security-categories)
+- [Source Continent IP Geolocation](#source-continent)
+- [Source Country IP Geolocation](#source-country)
+- [Source IP](#source-ip)
**Identity**
-* [SAML Attributes](#users)
-* [User Email](#users)
-* [User Group Emails](#users)
-* [User Group IDs](#users)
-* [User Group Names](#users)
-* [User Name](#users)
-
+- [SAML Attributes](#users)
+- [User Email](#users)
+- [User Group Emails](#users)
+- [User Group IDs](#users)
+- [User Group Names](#users)
+- [User Name](#users)
@@ -192,35 +188,33 @@ Policies with Override actions allow you to respond to all DNS queries for a giv
API value: `safesearch`
-
**Traffic**
-* [Application](#application)
-* [Content Categories](#content-categories)
-* [DNS Resolver IP](#dns-resolver-ip)
-* [DOH Subdomain](#doh-subdomain)
-* [Domain](#domain)
-* [Host](#host)
-* [Location](#location)
-* [Query Record Type](#query-record-type)
-* [Resolved Continent IP Geolocation](#resolved-continent)
-* [Resolved Country IP Geolocation](#resolved-country)
-* [Security Categories](#security-categories)
-* [Source Continent IP Geolocation](#source-continent)
-* [Source Country IP Geolocation](#source-country)
-* [Source IP](#source-ip)
+- [Application](#application)
+- [Content Categories](#content-categories)
+- [DNS Resolver IP](#dns-resolver-ip)
+- [DOH Subdomain](#doh-subdomain)
+- [Domain](#domain)
+- [Host](#host)
+- [Location](#location)
+- [Query Record Type](#query-record-type)
+- [Resolved Continent IP Geolocation](#resolved-continent)
+- [Resolved Country IP Geolocation](#resolved-country)
+- [Security Categories](#security-categories)
+- [Source Continent IP Geolocation](#source-continent)
+- [Source Country IP Geolocation](#source-country)
+- [Source IP](#source-ip)
**Identity**
-* [SAML Attributes](#users)
-* [User Email](#users)
-* [User Group Emails](#users)
-* [User Group IDs](#users)
-* [User Group Names](#users)
-* [User Name](#users)
-
+- [SAML Attributes](#users)
+- [User Email](#users)
+- [User Group Emails](#users)
+- [User Group IDs](#users)
+- [User Group Names](#users)
+- [User Name](#users)
@@ -236,39 +230,37 @@ You can use Cloudflare Gateway to enable SafeSearch on search engines like Googl
API value: `ytrestricted`
-
**Traffic**
-* [Application](#application)
-* [Content Categories](#content-categories)
-* [DNS Resolver IP](#dns-resolver-ip)
-* [DOH Subdomain](#doh-subdomain)
-* [Domain](#domain)
-* [Host](#host)
-* [Location](#location)
-* [Query Record Type](#query-record-type)
-* [Resolved Continent IP Geolocation](#resolved-continent)
-* [Resolved Country IP Geolocation](#resolved-country)
-* [Security Categories](#security-categories)
-* [Source Continent IP Geolocation](#source-continent)
-* [Source Country IP Geolocation](#source-country)
-* [Source IP](#source-ip)
+- [Application](#application)
+- [Content Categories](#content-categories)
+- [DNS Resolver IP](#dns-resolver-ip)
+- [DOH Subdomain](#doh-subdomain)
+- [Domain](#domain)
+- [Host](#host)
+- [Location](#location)
+- [Query Record Type](#query-record-type)
+- [Resolved Continent IP Geolocation](#resolved-continent)
+- [Resolved Country IP Geolocation](#resolved-country)
+- [Security Categories](#security-categories)
+- [Source Continent IP Geolocation](#source-continent)
+- [Source Country IP Geolocation](#source-country)
+- [Source IP](#source-ip)
**Identity**
-* [SAML Attributes](#users)
-* [User Email](#users)
-* [User Group Emails](#users)
-* [User Group IDs](#users)
-* [User Group Names](#users)
-* [User Name](#users)
-
+- [SAML Attributes](#users)
+- [User Email](#users)
+- [User Group Emails](#users)
+- [User Group IDs](#users)
+- [User Group Names](#users)
+- [User Name](#users)
-Similarly, you can enforce YouTube Restricted mode by choosing the *YouTube Restricted* action. YouTube Restricted Mode is an automated filter for adult and offensive content built into YouTube. To enable YouTube Restricted Mode, you could set up a policy like the following:
+Similarly, you can enforce YouTube Restricted mode by choosing the _YouTube Restricted_ action. YouTube Restricted Mode is an automated filter for adult and offensive content built into YouTube. To enable YouTube Restricted Mode, you could set up a policy like the following:
| Selector | Operator | Value | Action |
| ---------- | -------- | ------------- | ------------------ |
@@ -308,7 +300,7 @@ Use this selector to filter DNS responses by their `CNAME` records.
:::note
-If one CNAME record points to another CNAME record, each record in the chain will be evaluated. For example, if `abc.example.com` points to `xyz.example.com`, then your DNS policy will evaluate both `abc.example.com` and `xyz.example.com`.
+If one CNAME record points to another CNAME record, each record in the chain will be evaluated. For example, if `abc.example.com` points to `xyz.example.com`, then your DNS policy will evaluate both `abc.example.com` and `xyz.example.com`.
:::
### DNS MX Record
@@ -367,14 +359,14 @@ Use this selector to filter DNS responses by their `TXT` records.
Use this selector to filter based on the continent that the query resolves to. Geolocation is determined from the IP address in the response. To specify a continent, enter its two-letter code into the **Value** field:
-* AF – Africa
-* AN – Antarctica
-* AS – Asia
-* EU – Europe
-* NA – North America
-* OC – Oceania
-* SA – South America
-* T1 – Tor network
+- AF – Africa
+- AN – Antarctica
+- AS – Asia
+- EU – Europe
+- NA – North America
+- OC – Oceania
+- SA – South America
+- T1 – Tor network
| UI name | API example | Evaluation phase |
| --------------------------------- | ------------------------------- | -------------------- |
diff --git a/src/content/docs/cloudflare-one/policies/gateway/dns-policies/test-dns-filtering.mdx b/src/content/docs/cloudflare-one/policies/gateway/dns-policies/test-dns-filtering.mdx
index e81936c45b87084..4bcad30dbe5a2d3 100644
--- a/src/content/docs/cloudflare-one/policies/gateway/dns-policies/test-dns-filtering.mdx
+++ b/src/content/docs/cloudflare-one/policies/gateway/dns-policies/test-dns-filtering.mdx
@@ -23,7 +23,7 @@ For example, if you created a policy to block `example.com`, you can do the foll
2. Type `dig example.com` (`nslookup example.com` if you are using Windows) and press **Enter**.
-3. If the [block page](/cloudflare-one/policies/gateway/configuring-block-page/) is disabled for the policy, you should see `REFUSED` in the answer section:
+3. If the [block page](/cloudflare-one/policies/gateway/block-page/) is disabled for the policy, you should see `REFUSED` in the answer section:
```sh
dig example.com
@@ -46,7 +46,7 @@ For example, if you created a policy to block `example.com`, you can do the foll
;; MSG SIZE rcvd: 29
```
- If the [block page](/cloudflare-one/policies/gateway/configuring-block-page/) is enabled for the policy, you should see `NOERROR` in the answer section and `162.159.36.12` and `162.159.46.12` as the answers:
+ If the [block page](/cloudflare-one/policies/gateway/block-page/) is enabled for the policy, you should see `NOERROR` in the answer section with `162.159.36.12` and `162.159.46.12` as the answers:
```sh null
dig example.com
diff --git a/src/content/docs/cloudflare-one/policies/gateway/http-policies/index.mdx b/src/content/docs/cloudflare-one/policies/gateway/http-policies/index.mdx
index cd6bc2ac89f394c..89fcf78292e8358 100644
--- a/src/content/docs/cloudflare-one/policies/gateway/http-policies/index.mdx
+++ b/src/content/docs/cloudflare-one/policies/gateway/http-policies/index.mdx
@@ -96,7 +96,7 @@ The **Untrusted certificate action** determines how to handle insecure requests.
| Option | Action |
| ------------ | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| Error | Display Gateway error page. Matches the default behavior when no action is configured. |
-| Block | Display [block page](/cloudflare-one/policies/gateway/configuring-block-page/) as set in Zero Trust. |
+| Block | Display [block page](/cloudflare-one/policies/gateway/block-page/) as set in Zero Trust. |
| Pass through | Bypass insecure connection warnings and seamlessly connect to the upstream. To use this feature, deploy a [custom root certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/custom-certificate/). For more information on what statuses are bypassed, refer to the [troubleshooting FAQ](/cloudflare-one/faq/troubleshooting/#i-see-error-526-when-browsing-to-a-website). |
### Block
diff --git a/src/content/docs/cloudflare-one/policies/gateway/initial-setup/dns.mdx b/src/content/docs/cloudflare-one/policies/gateway/initial-setup/dns.mdx
index 6deaa38dd79d356..87485468a178232 100644
--- a/src/content/docs/cloudflare-one/policies/gateway/initial-setup/dns.mdx
+++ b/src/content/docs/cloudflare-one/policies/gateway/initial-setup/dns.mdx
@@ -25,7 +25,7 @@ To filter DNS requests from an individual device such as a laptop or phone:
1. [Install the WARP client](/cloudflare-one/connections/connect-devices/warp/deployment/) on your device.
2. In the WARP client Settings, log in to your organization's Zero Trust instance.
-3. (Optional) If you want to display a [custom block page](/cloudflare-one/policies/gateway/configuring-block-page/), [install the Cloudflare root certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/) on your device.
+3. (Optional) If you want to display a [custom block page](/cloudflare-one/policies/gateway/block-page/), [install the Cloudflare root certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/) on your device.
### Connect DNS locations
diff --git a/src/content/docs/cloudflare-one/policies/gateway/initial-setup/network.mdx b/src/content/docs/cloudflare-one/policies/gateway/initial-setup/network.mdx
index 22cbf7d684d72e0..191be9903336aaa 100644
--- a/src/content/docs/cloudflare-one/policies/gateway/initial-setup/network.mdx
+++ b/src/content/docs/cloudflare-one/policies/gateway/initial-setup/network.mdx
@@ -25,7 +25,7 @@ To filter network traffic from a device such as a laptop or phone:
1. [Install the WARP client](/cloudflare-one/connections/connect-devices/warp/deployment/) on your device.
2. In the WARP client Settings, log in to your organization's Zero Trust instance.
-3. (Optional) If you want to display a [custom block page](/cloudflare-one/policies/gateway/configuring-block-page/), [install the Cloudflare root certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/) on your device .
+3. (Optional) If you want to display a [custom block page](/cloudflare-one/policies/gateway/block-page/), [install the Cloudflare root certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/) on your device .
4. [Enable the Gateway proxy](/cloudflare-one/policies/gateway/proxy/#enable-the-gateway-proxy) for TCP. Optionally, you can enable the UDP proxy to inspect all port 443 UDP traffic.
### Connect private networks
diff --git a/src/content/docs/learning-paths/secure-internet-traffic/build-dns-policies/test-policy.mdx b/src/content/docs/learning-paths/secure-internet-traffic/build-dns-policies/test-policy.mdx
index 05bdf06bdc14e9d..ae125b90869fae6 100644
--- a/src/content/docs/learning-paths/secure-internet-traffic/build-dns-policies/test-policy.mdx
+++ b/src/content/docs/learning-paths/secure-internet-traffic/build-dns-policies/test-policy.mdx
@@ -16,12 +16,12 @@ It is common for a misconfigured Gateway policy to accidentally block traffic to
3. Turn on any existing security policies or create a policy to block all security categories:
4. Ensure that your browser is not configured to use an alternate DNS resolver. For example, Chrome has a **Use secure DNS** setting that will cause the browser to send requests to 1.1.1.1 and bypass your DNS policies.
5. In the browser, go to `malware.testcategory.com`. Your browser will display:
- - The Gateway block page, if your device is connected via the WARP client in Gateway with WARP mode.
- - A generic error page, if your device is connected via another method, such as Gateway with DoH mode.
+ - The Gateway block page, if your device is connected through the WARP client in Gateway with WARP mode.
+ - A generic error page, if your device is connected through another method, such as Gateway with DoH mode.
:::note
-[Custom block pages](/cloudflare-one/policies/gateway/configuring-block-page/) require you to install a root certificate on the device.
+[Custom block pages](/cloudflare-one/policies/gateway/block-page/) require you to install a root certificate on the device.
:::
diff --git a/src/content/docs/reference-architecture/diagrams/security/securing-data-in-transit.mdx b/src/content/docs/reference-architecture/diagrams/security/securing-data-in-transit.mdx
index 1bc39e748bea2a3..83b0160f94deb39 100644
--- a/src/content/docs/reference-architecture/diagrams/security/securing-data-in-transit.mdx
+++ b/src/content/docs/reference-architecture/diagrams/security/securing-data-in-transit.mdx
@@ -4,6 +4,9 @@ pcx_content_type: reference-architecture-diagram
sidebar:
order: 1
label: Securing data in transit
+head:
+ - tag: title
+ content: "Reference Architecture Diagram: Securing data in transit"
updated: 2024-05-01
---
@@ -13,7 +16,7 @@ Data in transit typically means when it's traveling over the network. Because th
- Browsing online and uploading/download data to/from cloud applications
- Sending texts, pictures and emails
-- Applications exposing and consuming data via APIs
+- Applications exposing and consuming data through APIs
Data in transit is often considered vulnerable to interception or tampering during transmission, so it is important to secure it through encryption techniques such as [QUIC](https://cloudflare-quic.com/), Transport Layer Security (TLS) or Secure Sockets Layer (SSL). This helps to ensure that the data remains confidential and protected from unauthorized access during its journey. There are other methods of inspecting data as it passes network boundaries to make decisions on if that data should continue to travel or not, Data Loss Prevention (DLP) technologies can be used to inspect the contents of network traffic and block sensitive data from going to a risky destination. This document outlines the methods Cloudflare has available to protect data in transit.
@@ -54,9 +57,9 @@ The following diagram shows a common flow for how Cloudflare inspects a request

1. User attempts to upload a file to a SaaS application (via a secure tunnel to Cloudflare created by our [device agent](/cloudflare-one/connections/connect-devices/warp/download-warp/)). [Clientless](/cloudflare-one/connections/connect-devices/agentless/) options are supported as well.
-2. Cloudflare’s [Secure Web Gateway](/cloudflare-one/policies/gateway/) (SWG) will first verify that the user is permitted to use the requested SaaS application, and then scrutinize the file’s payload for [malicious code](/cloudflare-one/policies/gateway/http-policies/antivirus-scanning/) and [sensitive data](/cloudflare-one/policies/data-loss-prevention/).
+2. Cloudflare's [Secure Web Gateway](/cloudflare-one/policies/gateway/) (SWG) will first verify that the user is permitted to use the requested SaaS application, and then scrutinize the file's payload for [malicious code](/cloudflare-one/policies/gateway/http-policies/antivirus-scanning/) and [sensitive data](/cloudflare-one/policies/data-loss-prevention/).
3. The DLP profile determines the file contains national identifiers like US Social Security Numbers (SSN).
-4. The SWG policy is configured with a [‘block’ action](/cloudflare-one/policies/gateway/http-policies/#block), so the attempt is [logged](/cloudflare-one/policies/data-loss-prevention/dlp-policies/payload-logging/) and a [block page](/cloudflare-one/policies/gateway/configuring-block-page/) returned to the end user’s web browser.
+4. The SWG policy is configured with a ['block' action](/cloudflare-one/policies/gateway/http-policies/#block), so the attempt is [logged](/cloudflare-one/policies/data-loss-prevention/dlp-policies/payload-logging/) and a [block page](/cloudflare-one/policies/gateway/block-page/) returned to the end user's web browser.
## Related resources
diff --git a/src/content/partials/cloudflare-one/access/block-page.mdx b/src/content/partials/cloudflare-one/access/block-page.mdx
index bb0b00d4e83eac0..3b54fb16a0df6d5 100644
--- a/src/content/partials/cloudflare-one/access/block-page.mdx
+++ b/src/content/partials/cloudflare-one/access/block-page.mdx
@@ -1,18 +1,17 @@
---
{}
-
---
:::note
-Only available on Pay-as-you-go and Enterprise plans.
+Only available on Pay-as-you-go and Enterprise plans.
:::
You can display a custom block page when users fail to authenticate to an Access application. Each application can have a different block page.
:::note
-To customize the page that users see when they are blocked by a Gateway firewall policy, refer to [Gateway block page](/cloudflare-one/policies/gateway/configuring-block-page/).
+To customize the page that users see when they are blocked by a Gateway firewall policy, refer to [Gateway block page](/cloudflare-one/policies/gateway/block-page/).
:::
## Create a custom block page
@@ -34,15 +33,13 @@ To create a custom block page for Access:
7. In **Custom HTML**, enter the HTML code for your custom page. For example,
```html
-
+
-
-
- Access denied.
-
- To obtain access, contact your IT administrator.
+
+ Access denied.
-
+ To obtain access, contact your IT administrator.
+
```
diff --git a/src/content/partials/cloudflare-one/gateway/customize-block-page.mdx b/src/content/partials/cloudflare-one/gateway/customize-block-page.mdx
index c0de73c31de4401..a9e74eec96a0bb4 100644
--- a/src/content/partials/cloudflare-one/gateway/customize-block-page.mdx
+++ b/src/content/partials/cloudflare-one/gateway/customize-block-page.mdx
@@ -1,6 +1,5 @@
---
{}
-
---
You can customize the block page by making global changes that will show up every time a user visits a block page, independently of the type of rule (DNS or HTTP) that is blocking the website.
@@ -13,12 +12,12 @@ To apply customizations to your block page:
3. Select **Customize**. Available global customizations include:
- * Adding your organization's name
- * Adding a [logo](/cloudflare-one/policies/gateway/configuring-block-page/#add-a-logo-image)
- * Adding a header text
- * Adding a global block message, which will be displayed above the policy-specific block message
- * Adding a [Mailto link](/cloudflare-one/policies/gateway/configuring-block-page/#allow-users-to-email-an-administrator)
- * Choosing a background color
+ - Adding your organization's name
+ - Adding a [logo](/cloudflare-one/policies/gateway/block-page/#add-a-logo-image)
+ - Adding a header text
+ - Adding a global block message, which will be displayed above the policy-specific block message
+ - Adding a [Mailto link](/cloudflare-one/policies/gateway/block-page/#allow-users-to-email-an-administrator)
+ - Choosing a background color
4. Select **Save**.
diff --git a/src/content/partials/cloudflare-one/upload-mtls-cert.mdx b/src/content/partials/cloudflare-one/upload-mtls-cert.mdx
index 28edd4f475bad16..0517c47bbda6d82 100644
--- a/src/content/partials/cloudflare-one/upload-mtls-cert.mdx
+++ b/src/content/partials/cloudflare-one/upload-mtls-cert.mdx
@@ -20,7 +20,7 @@ curl "https://api.cloudflare.com/client/v4/accounts/{account_id}/mtls_certificat
}'
```
-The response will return a UUID for the certificate:
+The response will return a UUID for the certificate. For example:
```json null {6}
{
diff --git a/src/content/partials/fundamentals/account-permissions-table.mdx b/src/content/partials/fundamentals/account-permissions-table.mdx
index 55a9c37f71df417..ca5ca5450f76adf 100644
--- a/src/content/partials/fundamentals/account-permissions-table.mdx
+++ b/src/content/partials/fundamentals/account-permissions-table.mdx
@@ -10,8 +10,8 @@ import { Markdown } from "~/components";
| Access: Apps and Policies Revoke | Grants ability to revoke all tokens to [Cloudflare Access](/cloudflare-one/policies/access/) account resources. |
| Access: Apps and Policies {props.one} | Grants write access to [Cloudflare Access](/cloudflare-one/policies/access/) account resources. |
| Access: Audit Logs Read | Grants read access to [Cloudflare Access audit logs](/cloudflare-one/insights/logs/audit-logs/). |
-| Access: Custom Pages Read | Grants read access to [Cloudflare Access Custom Pages](/cloudflare-one/policies/gateway/configuring-block-page/). |
-| Access: Custom Pages {props.one} | Grants write access to [Cloudflare Access Custom Pages](/cloudflare-one/policies/gateway/configuring-block-page/). |
+| Access: Custom Pages Read | Grants read access to [Cloudflare Access Custom Pages](/cloudflare-one/policies/gateway/block-page/). |
+| Access: Custom Pages {props.one} | Grants write access to [Cloudflare Access Custom Pages](/cloudflare-one/policies/gateway/block-page/). |
| Access: Device Posture Read | Grants read access to [Cloudflare Access Device Posture](/cloudflare-one/identity/devices/). |
| Access: Device Posture {props.one} | Grants write access to [Cloudflare Access Device Posture](/cloudflare-one/identity/devices/). |
| Access: Mutual TLS Certificates Read | Grants read access to [Cloudflare Access mTLS certificates](/cloudflare-one/identity/devices/access-integrations/mutual-tls-authentication/). |
diff --git a/src/content/partials/learning-paths/zero-trust/device-profiles.mdx b/src/content/partials/learning-paths/zero-trust/device-profiles.mdx
index 2aed4fe21334a30..411b106ccc846e2 100644
--- a/src/content/partials/learning-paths/zero-trust/device-profiles.mdx
+++ b/src/content/partials/learning-paths/zero-trust/device-profiles.mdx
@@ -38,7 +38,7 @@ To customize the default settings:
5. Under **Global settings**,
1. (Recommended) Enable **Admin override code** if you turned on **Lock WARP switch**.
- 2. Enable **Install CA to system certificate store** if you want users to see a [custom block page](/cloudflare-one/policies/gateway/configuring-block-page/).
+ 2. Enable **Install CA to system certificate store** if you want users to see a [custom block page](/cloudflare-one/policies/gateway/block-page/).