Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -5,14 +5,20 @@ sidebar:
order: 1
---

import { Render } from "~/components";
import { Render, Stream } from "~/components";

Cloudflare offers both client-based and clientless ways to grant secure access to non-HTTP applications.

:::note
Non-HTTP applications require [connecting your private network](/cloudflare-one/connections/connect-networks/private-net/) to Cloudflare. For more details, refer to our [Replace your VPN](/learning-paths/replace-vpn/connect-private-network/) implementation guide.
:::

<Stream
id="f13b085ed4d28a9dbb8faf19ae986125"
title="SASE - Secure remote access to your critical infrastructure"
thumbnail="https://pub-d9bf66e086fb4b639107aa52105b49dd.r2.dev/Video-3-Secure-remote-access-to-your-critical-infrastructure.jpg"
/>

## WARP client

Users can connect by installing the Cloudflare WARP client on their device and enrolling in your Zero Trust organization. Remote devices connect to your applications as if they were on your private network. By default, all devices enrolled in your organization can access any private route unless they are protected by an Access policy or Gateway firewall rule. To secure the application, you can [create a self-hosted application](/cloudflare-one/applications/non-http/self-hosted-private-app/) for a private IP range, port range, and/or hostname and build [Access policies](/cloudflare-one/policies/access/) that allow or block specific users.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,12 +5,18 @@ sidebar:
order: 1
---

import { Render } from "~/components";
import { Render, Stream } from "~/components";

Cloudflare Tunnel provides you with a secure way to connect your resources to Cloudflare without a publicly routable IP address. With Tunnel, you do not send traffic to an external IP — instead, a lightweight daemon in your infrastructure (`cloudflared`) creates [outbound-only connections](/cloudflare-one/connections/connect-networks/#outbound-only-connection) to Cloudflare's global network. Cloudflare Tunnel can connect HTTP web servers, [SSH servers](/cloudflare-one/connections/connect-networks/use-cases/ssh/), [remote desktops](/cloudflare-one/connections/connect-networks/use-cases/rdp/), and other protocols safely to Cloudflare. This way, your origins can serve traffic through Cloudflare without being vulnerable to attacks that bypass Cloudflare.

Refer to our [reference architecture](/reference-architecture/architectures/sase/) for details on how to implement Cloudflare Tunnel into your existing infrastructure.

<Stream
id="0410c73fe3fdd36142ec08bac77e8f97"
title="SASE - Stop hosting your VPN service"
thumbnail="https://pub-d9bf66e086fb4b639107aa52105b49dd.r2.dev/Video-2-Stop-hosting-your-own-VPN-service.jpg"
/>

## How it works

Cloudflared establishes [outbound connections](/cloudflare-one/connections/connect-networks/#outbound-only-connection) (tunnels) between your resources and Cloudflare's global network. Tunnels are persistent objects that route traffic to DNS records. Within the same tunnel, you can run as many 'cloudflared' processes (connectors) as needed. These processes will establish connections to Cloudflare and send traffic to the nearest Cloudflare data center.
Expand Down
7 changes: 7 additions & 0 deletions src/content/docs/cloudflare-one/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ import {
Plan,
RelatedProduct,
Render,
Stream
} from "~/components";

<Description>
Expand All @@ -36,6 +37,12 @@ By progressively adopting Cloudflare One, organizations can move away from a pat

Refer to our [SASE reference architecture](/reference-architecture/architectures/sase/) to learn how to plan, deploy, and manage SASE architecture with Cloudflare.

<Stream
id="a4ede34e937c81781575af6494828b5b"
title="SASE - The evolution of corporate networks"
thumbnail="https://pub-d9bf66e086fb4b639107aa52105b49dd.r2.dev/Video-1-The-evolution-of-corporate-networks.jpg"
/>

<LinkButton variant="primary" href="/cloudflare-one/setup/">
Get started
</LinkButton>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ head:
content: Gateway policies
---

import { Render } from "~/components";
import { Render, Stream } from "~/components";

Cloudflare Gateway, our comprehensive [Secure Web Gateway](https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/), allows you to set up policies to inspect DNS, Network, HTTP, and Egress traffic.

Expand All @@ -22,6 +22,12 @@ Cloudflare Gateway, our comprehensive [Secure Web Gateway](https://www.cloudflar
When creating or editing policies, it may take up to 60 seconds for that policy to be updated across all of Cloudflare's data centers.
:::

<Stream
id="48a3b49b7cdfaef0b3044d1530c82c19"
title="SASE - Protect your users from Internet risks"
thumbnail="https://pub-d9bf66e086fb4b639107aa52105b49dd.r2.dev/Video-5-Protect-your-users-from-Internet-risks.jpg"
/>

## Best practices

For each type of policy, we recommend the following workflow:
Expand Down
7 changes: 7 additions & 0 deletions src/content/docs/magic-wan/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,7 @@ import {
LinkTitleCard,
Plan,
RelatedProduct,
Stream
} from "~/components";

<Description>
Expand All @@ -35,6 +36,12 @@ Refer to [On-ramps](/magic-wan/on-ramps/) for a full list of supported on-ramps.

Learn how to [get started](/magic-wan/get-started/).

<Stream
id="86f22d1f760b77cdc349f89b25b63c3e"
title="SASE - Connect and secure from any network to anywhere"
thumbnail="https://pub-d9bf66e086fb4b639107aa52105b49dd.r2.dev/Video-4-Connect-and-secure-from-any-network-to-anywhere.jpg"
/>

---

## Features
Expand Down