Skip to content

Restrict external connections

To fully secure your origin, you should limit or restrict external connections to your origin server. These suggestions vary in their level of completeness and complexity and depend on your application and origin setup.

Application layer

Cloudflare Tunnel (HTTP / WebSockets)

Cloudflare Tunnel connects your resources to Cloudflare without a publicly routable IP address, by creating an outbound-only connections to Cloudflare’s global network.

  • Security: Very secure.
  • Availability: All customers.
  • Challenges: Requires installing the cloudflared daemon on origin server or virtual machine.

HTTP Header Validation

Only allow traffic with specific (and secret) HTTP headers.

  • Security: Moderately secure.
  • Availability: All customers.
  • Challenges:
    • Requires more configuration efforts on application- and server-side to accept those headers.
    • Basic authentication is vulnerable to replay attacks. Because basic authentication does not encrypt user credentials, it is important that traffic always be sent over an encrypted SSL session.
    • There might be valid use cases for a mismatch in SNI / Host headers such as through Page Rules, Load Balancing, or Workers, which all offer HTTP Host Header overrides.
  • Process:
    1. Use Transform rules or Workers to add an HTTP Auth Header.
    2. Configure your origin server to restrict access based on the HTTP Auth Header (or perform HTTP Basic Authentication).
    3. Configure your origin server to restrict access based on the HTTP Host Header. Specifically, only allow requests which contain expected HTTP Host Header values, and reject all other requests.

JSON Web Tokens (JWT) Validation

Only allow traffic with the appropriate JWT.

Transport Layer

Authenticated Origin Pulls

Authenticated Origin Pulls helps ensure requests to your origin server come from the Cloudflare network.

  • Security: Very secure.
  • Availability: All customers.
  • Challenges:
    • Requires Full or Full (strict) encryption modes.
    • Requires more configuration efforts for application and server, such as uploading a certificate and configuring the server to use it.
    • For more strict security, you should upload your own certificate. Although Cloudflare provides you a certificate for easy configuration, this certificate only guarantees that a request is coming from the Cloudflare network.
    • Not scalable for large numbers of origin servers.

Cloudflare Tunnel (SSH / RDP)

Cloudflare Tunnel connects your resources to Cloudflare without a publicly routable IP address, by creating an outbound-only connections to Cloudflare’s global network.

  • Security: Very secure.
  • Availability: All customers.
  • Challenges: Requires installing the cloudflared daemon on origin server or virtual machine.

Network Layer

Allowlist Cloudflare IP addresses

Explicitly block all traffic that does not come from Cloudflare IP addresses (or the IP addresses of your trusted partners, vendors, or applications).

  • Security: Moderately secure.
  • Availability: All customers.
  • Challenges:
    • Requires allowlisting Cloudflare IP ranges at your origin server.
    • Vulnerable to IP spoofing.

Cloudflare Magic Transit

Cloudflare Magic Transit is a network security and performance solution that offers DDoS protection, traffic acceleration, and more for on-premise, cloud-hosted, and hybrid networks.

  • Security: Very secure.
  • Availability: Enterprise-only.
  • Challenges
    • Client's routers must:
      • Support anycast tunneling.
      • Allow configuration of at least one tunnel per Internet service provider (ISP).
      • Support maximum segment size (MSS) clamping.

Cloudflare Network Interconnect

Cloudflare Network Interconnect allows you to connect your network infrastructure directly with Cloudflare – rather than using the public Internet – for a more reliable and secure experience.

  • Security: Very secure.
  • Availability: Enterprise-only.
  • Challenges
    • Requires some networking knowledge.
    • Only applies to some customer use cases.

Cloudflare Aegis

Cloudflare Aegis provides dedicated egress IPs (from Cloudflare to your origin) for your layer 7 WAF, CDN, and Spectrum services. The egress IPs are reserved exclusively for your account so that you can increase your origin security by only allowing a small list of IP addresses through your layer 3 firewall.

Refer to the introductory blog post for details, or to the Multi-vendor reference architecture for an example use case.

  • Security: Very secure.
  • Availability: Enterprise-only.
  • Challenges: Requires network-level firewall policies.