Block sites for specific users
You can use Cloudflare Gateway and the Cloudflare WARP client application to block attempts to reach hostnames or to block URL paths without blocking the rest of the hostname. You can build these rules or for specific users.
This tutorial covers how to:
- Create a Gateway policy to block URLs that contain a hostname for a specific set of users
- Enroll devices into Gateway
- Review the block events in the Gateway logs
Time to complete:
Before you start
Build a hostname policy
To begin, navigate to the
Gateway section of the Zero Trust dashboard and click on
Policies. Select the
HTTP tab. By default, Cloudflare Gateway create a rule that for applications that break when traffic is decrypted. You can remove this rule, but it will likely cause certain applications to break for end users.
Click Create a policy to add a new HTTP policy. Give the policy a name and description.
Next, create a rule to block any subdomain that uses a particular host. This example uses
espn.com as the host. The rule below uses the
matches regex operator to block any subdomain that uses
espn.com as the host.
Next, click + Add condition to apply this rule to a specific user or group of users. This example uses the user email address. You can also build rules using your identity provider’s directory groups.
You can now select Block as the action. You can add optional text to present to the user in the block page.
Next, click Create a policy to save the rule.
Integrate your identity provider
Navigate to the
Configuration section of the Zero Trust dashboard and select
Authentication. Cloudflare Zero Trust will automatically create a “One-time PIN” option which will rely on your user’s emails. You can begin using the one-time PIN option immediately or you can integrate your corporate as well.
Determine which devices can enroll
Next, build a rule to decide which devices can enroll in your account.
Navigate to Settings > Devices > Device enrollment.
Click Add a rule.
Determine who is allowed to enroll using criteria including Access groups, groups from your identity provider, email domain, or named users. This example allows any user with a
@cloudflare.comaccount to enroll.
Your rule will now be visible under the Device enrollment rules list.
Configure the Cloudflare certificate
To download the Cloudflare certificate:
- Follow the link provided in , or
- Find the certificate in the Zero Trust Dashboard, by navigating to Settings > Devices > Certificates.
Enable the Cloudflare proxy
Once the certificate has been installed, you can configure Gateway to inspect HTTP traffic. To do so, navigate to Settings > Network. Toggle Proxy to Enabled. This will tell Cloudflare to begin proxying any traffic from enrolled devices, except the traffic excluded using the settings.
Next, toggle TLS decryption to Enabled. This will tell Cloudflare to begin decrypting traffic for inspection from enrolled devices, except the traffic excluded from inspection.
Enroll a device
Once the client is installed, click the gear icon.
Under the Account tab, click Login with Cloudflare Zero Trust.
The user will be prompted to log in with the identity provider configured in Cloudflare Access. Once authenticated, the client will update to
Teams mode. You can click the gear to toggle between DNS filtering or full proxy. In this use case, you must toggle to
Gateway with WARP. These settings can be configured globally for an organization through a device management platform.
When users visit that section of Reddit (and any page within it), they will see a block page. Any attempt to reach ESPN will also be blocked.
You can review the blog event in the HTTP logs. Navigate to the
Gateway page in the
Logs section of the Zero Trust dashboard. Filter for
Block as the decision type.