Skip to content

Commit

Permalink
Add network partial
Browse files Browse the repository at this point in the history
  • Loading branch information
maxvp committed Dec 11, 2024
1 parent e756577 commit 41c1e53
Show file tree
Hide file tree
Showing 4 changed files with 35 additions and 17 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,8 @@ To filter HTTP requests from a device:

## 2. Verify device connectivity

To verify your device is connected to Zero Trust:

<Render
file="gateway/verify-connectivity"
params={{ one: "HTTP", two: "requests" }}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ head:
content: Set up network filtering
---

import { GlossaryTooltip } from "~/components";
import { GlossaryTooltip, Render } from "~/components";

Secure Web Gateway allows you to apply policies at the network level (Layers 3 and 4) to control which websites and non-HTTP applications users can access.

Expand All @@ -34,6 +34,8 @@ To filter traffic from private networks, refer to the [Cloudflare Tunnel guide](

## 2. Verify device connectivity

To verify your device is connected to Zero Trust:

1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Network**.
2. Under **Gateway logging**, enable activity logging for all Network logs.
3. On your WARP-enabled device, open a browser and visit any website.
Expand All @@ -43,6 +45,10 @@ To filter traffic from private networks, refer to the [Cloudflare Tunnel guide](
3. Note the **Public IP**.
5. In Zero Trust, go to **Logs** > **Gateway** > **Network**. Before building Network policies, make sure you see Network logs from the Source IP assigned to your device.

## 3. Add policies
## 3. Create your first network policy

<Render file="gateway/get-started/create-network-policy" />

## 4. Add optional policies

To create a new network policy, go to **Gateway** > **Firewall policies** > **Network** in Zero Trust. Refer to our list of [common network policies](/cloudflare-one/policies/gateway/network-policies/common-policies) for policies you may want to create.
Refer to our list of [common network policies](/cloudflare-one/policies/gateway/network-policies/common-policies) for policies you may want to create.
Original file line number Diff line number Diff line change
Expand Up @@ -9,17 +9,7 @@ import { Render } from "~/components";

You can control network-level traffic by filtering requests by selectors such as IP addresses and ports. You can also integrate network policies with an [identity provider](/cloudflare-one/identity/idp-integration/) to apply identity-based filtering.

To create a new network policy:

1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **Firewall policies**.
2. In the **Network** tab, select **Add a policy**.
3. Name the policy.
4. Under **Traffic**, build a logical expression that defines the traffic you want to allow or block.
5. Choose an **Action** to take when traffic matches the logical expression.
<Render
file="gateway/policies/enforce-device-posture"
product="cloudflare-one"
/>
6. Select **Create policy**.

For more information, refer to [network policies](/cloudflare-one/policies/gateway/network-policies/).
<Render
file="gateway/get-started/create-network-policy"
product="cloudflare-one"
/>
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
---
{}
---

import { Render } from "~/components";

To create a new network policy:

1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **Firewall policies**.
2. In the **Network** tab, select **Add a policy**.
3. Name the policy.
4. Under **Traffic**, build a logical expression that defines the traffic you want to allow or block.
5. Choose an **Action** to take when traffic matches the logical expression.
<Render
file="gateway/policies/enforce-device-posture"
product="cloudflare-one"
/>
6. Select **Create policy**.

For more information, refer to [network policies](/cloudflare-one/policies/gateway/network-policies/).

0 comments on commit 41c1e53

Please sign in to comment.