Skip to content

Commit f00ffc9

Browse files
committed
Adding suggestions missed in previous PR
1 parent 222c2d5 commit f00ffc9

3 files changed

Lines changed: 6 additions & 6 deletions

File tree

src/content/docs/cloudflare-one/traffic-policies/egress-policies/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,9 +59,9 @@ The following egress policy configures all traffic destined for a third-party ne
5959
Many SaaS providers (for example, Microsoft 365, Salesforce, or Workday) allow you to restrict access to connections from specific IP addresses. You can use dedicated egress IPs with Gateway to enforce this restriction:
6060

6161
1. **Obtain dedicated egress IPs** from your account team and note the assigned IPv4 and IPv6 addresses.
62-
2. **Create an egress policy** that routes traffic destined for the SaaS provider through your dedicated egress IP. Use the Destination IP selector with the provider's published IP ranges, or the Application selector (Beta) to match the provider by name.
62+
2. **Create an egress policy** that routes traffic destined for the SaaS provider through your dedicated egress IP. Use the Destination IP selector with the published IP ranges of the provider. Alternatively, use the Application selector (Beta) to match the provider by name.
6363
3. **Add the egress IPs to the SaaS provider's allowlist** so the provider only accepts connections from your organization's IPs.
64-
4. **Pair with HTTP policies** to add deeper controls — for example, block file uploads to personal accounts, enforce DLP profiles to prevent sensitive data from leaving the organization, or require [device posture checks](/cloudflare-one/reusable-components/posture-checks/) before allowing access.
64+
4. **Pair with HTTP policies** to add deeper controls. For example, block file uploads to personal accounts, enforce DLP profiles to prevent sensitive data from leaving the organization, or require [device posture checks](/cloudflare-one/reusable-components/posture-checks/) before allowing access.
6565

6666
This pattern ensures that access to the SaaS application is limited to traffic that passes through Gateway, where your security policies are enforced, and that the SaaS provider can verify traffic originates from your organization.
6767

src/content/docs/cloudflare-one/traffic-policies/get-started/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
pcx_content_type: get-started
3-
description: Set up Get started for Gateway.
3+
description: Best practices for deploying Cloudflare Gateway traffic policies in phases.
44
products:
55
- cloudflare-one
66
title: Get started

src/content/docs/cloudflare-one/traffic-policies/index.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
pcx_content_type: concept
3-
description: How Traffic policies works in Gateway.
3+
description: Filter DNS, network, and HTTP traffic with Cloudflare Gateway traffic policies.
44
products:
55
- cloudflare-one
66
title: Traffic policies
@@ -18,7 +18,7 @@ A Secure Web Gateway (SWG) is a security service that sits between an organizati
1818
- **URL and domain filtering** – Controls which websites users can access.
1919
- **Anti-malware scanning** – Inspects files in transit for malicious code.
2020
- **Application control** – Manages which applications users can reach and what actions they can perform.
21-
- **Data Loss Prevention (DLP)** – Detects and blocks sensitive data before it leaves the network.
21+
- **Data Loss Prevention (DLP)** – Detects and blocks sensitive data before it leaves the network.fprotecting
2222
- **Traffic inspection** – Decrypts and examines encrypted (HTTPS) traffic for hidden threats.
2323

2424
## The need for an SWG
@@ -47,7 +47,7 @@ If you are familiar with traditional network security, Gateway's policy layers m
4747
- **Network policies** correspond to a Layer 4 stateful firewall, sometimes called Firewall-as-a-Service (FWaaS), filtering by IP address, port, and protocol.
4848
- **HTTP policies** correspond to a Layer 7 application firewall (forward proxy with TLS decryption and deep packet inspection).
4949

50-
Unlike hardware firewalls that sit at a single network perimeter, Gateway enforces these policies across Cloudflare's global network, protecting
50+
Unlike hardware firewalls that sit at a single network perimeter, Gateway enforces these policies across Cloudflare's global network, protecting traffic regardless of where users connect.
5151

5252
Gateway supports several policy types because network traffic can be inspected at different layers — from raw packets up to full HTTP requests. Each policy type gives you control at a specific layer:
5353

0 commit comments

Comments
 (0)