diff --git a/src/content/docs/reference-architecture/design-guides/securing-guest-wireless-networks.mdx b/src/content/docs/reference-architecture/design-guides/securing-guest-wireless-networks.mdx index 69236a5bd016a43..b164a60729f9a1e 100644 --- a/src/content/docs/reference-architecture/design-guides/securing-guest-wireless-networks.mdx +++ b/src/content/docs/reference-architecture/design-guides/securing-guest-wireless-networks.mdx @@ -142,10 +142,6 @@ For devices making requests from known DNS locations, it's also possible to add Policies can be made up of multiple rules, so a single policy can prevent access to high risk websites as well as inappropriate content. -### Customizing Block Pages - -Inform your guests why their access was blocked by configuring [custom block messages](/cloudflare-one/policies/gateway/block-page/). Each policy can have a unique message. For example: _"For your protection and the security of Acme Corporation, this website has been blocked."_ - ### Recommended policies Cloudflare has several additional recommended DNS policies that can be found in the [Secure your Internet traffic implementation guide](/learning-paths/secure-internet-traffic/build-dns-policies/recommended-dns-policies/). These policies are designed to enhance your organization's overall security and should also be factored in when setting up policies for your internal production web traffic.