-
Notifications
You must be signed in to change notification settings - Fork 10.4k
[ZT] Combine Secure Internet Traffic on-ramps #17831
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from 8 commits
Commits
Show all changes
9 commits
Select commit
Hold shift + click to select a range
aba4cd0
Reorder sections
maxvp d5c3c9c
Add combined on-ramp page
maxvp 128482e
Remove connect network
maxvp eb56599
Rename Connect devices
maxvp fd760f6
Apply suggestions from code review
maxvp 2df01e0
Move note
maxvp 72afa40
Fix broken links
maxvp 0e0714b
Merge branch 'production' into max/zt/combine-on-ramps
maxvp 5339bd8
Apply suggestions from code review
maxvp File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
73 changes: 73 additions & 0 deletions
73
...rning-paths/secure-internet-traffic/connect-devices-networks/choose-on-ramp.mdx
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,73 @@ | ||
| --- | ||
| title: Choose an on-ramp | ||
| pcx_content_type: learning-unit | ||
| sidebar: | ||
| order: 1 | ||
| --- | ||
|
|
||
| import { GlossaryDefinition, GlossaryTooltip, Badge } from "~/components"; | ||
|
|
||
| Similar to the network onboarding practices in the [Replace your VPN](/learning-paths/replace-vpn/connect-private-network/) implementation guide, there are a number of ways to on-ramp your network traffic to the Cloudflare global network. This guide will quickly explore all of the options to on-ramp traffic to Cloudflare Gateway to inspect, apply policies, and filter. | ||
|
|
||
| :::note | ||
| The following steps are identical to [Connect user devices](/learning-paths/replace-vpn/connect-devices/) in the Replace your VPN implementation guide. If you have already completed Replace your VPN, you can skip ahead to [Network on-ramps](#network-on-ramps). | ||
| ::: | ||
|
|
||
| ## Device on-ramps | ||
|
|
||
| The most common way to protect and filter your end-user traffic is by using a device client. The standard Cloudflare device client supports a number of operating systems and deployment methodologies, but there can still be scenarios in which an alternative path makes sense. | ||
|
|
||
| ### Zero Trust Client | ||
|
|
||
| Cloudflare WARP is the most common onramp to send user traffic to Gateway. It is a lightweight device client, which builds proxy tunnels using either Wireguard or MASQUE, and builds a DNS proxy using DNS-over-HTTPS. It supports all major operating systems, supports all common forms of endpoint management tooling, and has a robust series of management parameters and profiles to accurately scope the needs of a diverse user base. It has flexible operating modes and can control device traffic as a proxy, control device DNS traffic as a DNS proxy, or both. It is the most common method to send traffic from user devices to be filtered and decrypted by Cloudflare Gateway. | ||
|
|
||
| ### PAC files (Enterprise only) | ||
|
|
||
| Cloudflare supports filtering HTTP/S traffic sent via a PAC file on a user device. PAC files configured to send traffic to Cloudflare target a domain specific to your account tenant, and receive and process all URL traffic for that device that fits the proxy profile. PAC files are most commonly used in scenarios in which the device client is not appropriate or cannot be installed -- specifically Windows pre-2008 and Windows Server 2012, and devices which cannot install client software at all. | ||
|
|
||
| ### Clientless Browser Isolation | ||
|
|
||
| Cloudflare Browser Isolation runs a headless, Chromium-based browser for your users to accomplish their secure browsing needs. It can be activated via an Access application, a Gateway policy, or by using link-based isolation (reverse proxy). In this model, your users can connect from any device to a proxy website to browse the Internet while applying your all your Gateway HTTP policies and inspection requirements. | ||
maxvp marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| | | WARP | PAC Files | Clientless Browser Isolation | | ||
| | --------------------------------- | ------------------------------------ | -------------- | ------------------------------------- | | ||
| | Supported OS | macOS, Windows, Linux, iOS, Android | All desktop OS | All OS (with HTML5 compliant browser) | | ||
| | Configurable via MDM | Yes | Yes | N/A | | ||
| | Gateway policy types supported | DNS, Network, HTTP, Resolver, Egress | HTTP | HTTP, Resolver, Egress | | ||
| | Identity-based policies supported | Yes | No | Yes | | ||
|
|
||
| ## Network on-ramps | ||
|
|
||
| The primary ways to source multi-device or network traffic to Cloudflare Gateway are via Magic WAN using GRE or IPsec tunnels, the [WARP Connector](#warp-connector-) as a software-defined all-ports traffic proxy, or via upstream DNS for a whole network using [DNS filtering locations](#dns-filtering-locations). | ||
|
|
||
| ### Magic WAN | ||
|
|
||
| :::note | ||
| Only available on Enterprise plans. | ||
| ::: | ||
|
|
||
| [Magic WAN](/magic-wan/) is Cloudflare's offering most analogous to a traditional SD-WAN. Magic WAN is typically deployed via an IPsec or GRE tunnel terminating on customer devices (such as firewalls or routers), or via our Magic WAN Connector hardware device. You can also be deploy Magic WAN using [Cloudflare Network Interconnect](/network-interconnect/) (CNI) at private peering locations or some public cloud instances (where compatible). | ||
|
|
||
| Magic WAN on-ramps traffic via your connections and can send all network and HTTP traffic through Cloudflare Gateway for inspection. | ||
|
|
||
| For more information on how Magic WAN integrates with Zero Trust, refer to [Zero Trust integration](/magic-wan/zero-trust/). | ||
|
|
||
| ### WARP Connector <Badge text="Beta" variant="caution" size="small" /> | ||
|
|
||
| [WARP Connector](/cloudflare-one/connections/connect-networks/private-net/warp-connector/), a software agent similar to our device client, functions as a virtual device to establish a connection between your network and the Cloudflare global network. You can install WARP Connector on a dedicated Linux server or virtual machine. | ||
|
|
||
| WARP Connector supports egressing traffic from your private network to the Internet as a gateway. This means it can allow traffic initiated from a network to be on-ramped to Cloudflare for either public or private destinations. You can use WARP Connector to establish a secure egress path for servers or users on a network which may not each be able to run the WARP client and still apply Gateway network and HTTP inspection policies. This connection is most analogous to proxy server connectivity or site-to-site VPN. | ||
|
|
||
| For more information on setting up Cloudflare Tunnel via WARP Connector, refer to [Set up WARP Connector](/cloudflare-one/connections/connect-networks/private-net/warp-connector/). | ||
|
|
||
| ### DNS filtering locations | ||
|
|
||
| <GlossaryDefinition term="DNS location" /> | ||
|
|
||
| The fastest way to start filtering DNS queries from a location is by changing the DNS resolvers at the router or updating the upstream resolution to Cloudflare DNS resolution endpoints. This can also be accomplished from individual devices, or an network or subnet which sets resolver IPs for clients via DHCP. | ||
|
|
||
| For more information on setting up DNS locations, refer to [Add locations](/cloudflare-one/connections/connect-devices/agentless/dns/locations/). | ||
|
|
||
| | | Magic WAN | WARP Connector | DNS Locations | | ||
| | ------------------------------ | --------------------- | --------------------- | ------------- | | ||
| | Gateway policy types supported | Network, HTTP, Egress | Network, HTTP, Egress | DNS, Resolver | | ||
18 changes: 18 additions & 0 deletions
18
.../docs/learning-paths/secure-internet-traffic/connect-devices-networks/index.mdx
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,18 @@ | ||
| --- | ||
| title: Connect devices and networks to Cloudflare | ||
| pcx_content_type: overview | ||
| sidebar: | ||
| order: 2 | ||
| --- | ||
|
|
||
| import { Render } from "~/components"; | ||
|
|
||
| After setting up your Cloudflare account and Zero Trust organization, you can begin connecting your users' devices and networks to Cloudflare. | ||
|
|
||
| ## Objectives | ||
|
|
||
| By the end of this module, you will be able to: | ||
|
|
||
| <Render file="zero-trust/connect-devices-objectives" /> | ||
|
|
||
| - Determine when and how to use PAC files. |
15 changes: 15 additions & 0 deletions
15
...arning-paths/secure-internet-traffic/connect-devices-networks/install-agent.mdx
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,15 @@ | ||
| --- | ||
| title: Download and install WARP | ||
| pcx_content_type: learning-unit | ||
| sidebar: | ||
| order: 2 | ||
| --- | ||
|
|
||
| import { Render } from "~/components"; | ||
|
|
||
| <Render | ||
| file="zero-trust/install-agent" | ||
| params={{ | ||
| one: "The device is now connected to your organization and secured with Cloudflare Zero Trust.", | ||
| }} | ||
| /> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
27 changes: 0 additions & 27 deletions
27
src/content/docs/learning-paths/secure-internet-traffic/connect-devices/index.mdx
This file was deleted.
Oops, something went wrong.
11 changes: 0 additions & 11 deletions
11
...t/docs/learning-paths/secure-internet-traffic/connect-devices/install-agent.mdx
This file was deleted.
Oops, something went wrong.
42 changes: 0 additions & 42 deletions
42
...docs/learning-paths/secure-internet-traffic/connect-networks/choose-on-ramp.mdx
This file was deleted.
Oops, something went wrong.
16 changes: 0 additions & 16 deletions
16
src/content/docs/learning-paths/secure-internet-traffic/connect-networks/index.mdx
This file was deleted.
Oops, something went wrong.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.