Spectrum is a global TCP and UDP proxy running on Cloudflare's edge nodes. It does not terminate the connection. Instead it passes through the packets to the backend server.
Some of these features require an Enterprise plan. If you would like to upgrade, please contact your customer success manager or the Customer Success Team.
When a Spectrum application is created, it is assigned a unique IPv4 and IPv6 address. These addresses are not static, they may change over time. The best way to look up what the current addresses are is using DNS. The DNS name of the Spectrum application will always return the IP's currently dedicated to the application.
These addresses are Anycasted from all Cloudflare data centers, with the exception of data centers in China.
Spectrum can act as a TCP load balancer in front of an SMTP server. Spectrum will not act as an intermediary mail server. Instead, it will simply pass data through to your origin. The client IP shown on mail will be the Cloudflare edge IP. If the mail server requires knowing the true client IP, it should use Proxy Protocol to get the source IP from Cloudflare. Cloudflare recommends enabling Proxy Protocol on applications configured to proxy SMTP.
SMTP servers may perform a series of checks on servers attempting to send messages through it. These checks are intended to filter requests from illegitimate servers. Messages may be rejected if:
Spectrum applications do not have reverse DNS entries.
Additionally, SMTP servers may perform a DNS lookup to find the MX records for a domain. Messages from your server may be rejected if an MX record for your domain is associated with a Spectrum application, as the IP address of server will not match the Spectrum IP address.
Cloudflare supports all TCP ports.
If the IP Access Rules toggle is enabled for a Spectrum application, then Cloudflare will respect the IP Access Rules created under the Tools tab in https://www.cloudflare.com/a/firewall/ for that domain. Cloudflare only respects rules created for specific IP addresses, IP blocks, countries or ASNs for Spectrum applications. Spectrum will also only respect rules created with the actions 'whitelist' or 'block'.
Spectrum offers four modes of TLS termination: 'Passthrough', 'Flexible', 'Full', and 'Full (Strict)'.
'Passthrough' disables TLS termination at the edge. This is the required setting if the underlying traffic is not encrypted with TLS. If the connection is encrypted, 'Passthrough' allows traffic to flow from client to origin using the TLS session negotiated directly with the origin.
'Flexible' enables termination of the client connection at the edge, but does not enable TLS from Cloudflare to your origin. Traffic will be sent over an encrypted connection from the client to Cloudflare, but not from Cloudflare to the origin.
'Full' specifies that traffic from Cloudflare to the origin will also be encrypted but without certificate validation. When set to 'Full (Strict)', traffic from Cloudflare to the origin will also be encrypted with strict validation of the origin certificate.
TLS traffic can still be sent through Spectrum with TLS set to 'Passthrough'. Cloudflare will not terminate it. Instead, it will act as a pure passthrough.
Spectrum supports versions TLS 1.1, TLS 1.2, and TLS 1.3.
Below are the cipher suites that we present to origins during an SSL/TLS handshake. If you're looking for cipher suites that we support at our edge, i.e., that are presented to browsers and other user agents, see here instead.
Note that the cipher suites below are ordered based on how they appear in the ClientHello, communicating our preference to the origin.
|OpenSSL Name||TLS 1.1||TLS 1.2||TLS 1.3|