Skip to content

Network filtering

Secure Web Gateway allows you to apply policies at the network level (Layers 3 and 4) to control which websites and non-HTTP applications users can access.

1. Connect to Gateway

Connect devices

To filter network traffic from a device such as a laptop or phone:

  1. Install the WARP client on your device.
  2. In the WARP client Settings, log in to your organization's Zero Trust instance.
  3. (Optional) If you want to display a custom block page, install the Cloudflare root certificate on your device .
  4. Enable the Gateway proxy for TCP. Optionally, you can enable the UDP proxy to inspect all port 443 UDP traffic.

Connect private networks

To filter traffic from private networks, refer to the Cloudflare Tunnel guide.

2. Verify device connectivity

To verify your device is connected to Zero Trust:

  1. In Zero Trust, go to Settings > Network.
  2. Under Gateway logging, enable activity logging for all Network logs.
  3. On your WARP-enabled device, open a browser and visit any website.
  4. Determine the Source IP for your device:
    1. Open the WARP client settings.
    2. Go to Preferences > General.
    3. Note the Public IP.
  5. In Zero Trust, go to Logs > Gateway > Network. Before building Network policies, make sure you see Network logs from the Source IP assigned to your device.

3. Create your first network policy

To create a new network policy:

  1. In Zero Trust, go to Gateway > Firewall policies.
  2. In the Network tab, select Add a policy.
  3. Name the policy.
  4. Under Traffic, build a logical expression that defines the traffic you want to allow or block.
  5. Choose an Action to take when traffic matches the logical expression.

    For example, you can use a list of device serial numbers to ensure users can only access an application if they connect with the WARP client from a company device:

    SelectorOperatorValueLogicAction
    SNI Domainisinternalapp.comAndBlock
    Passed Device Posture Checksnot inDevice serial numbers
  6. Select Create policy.

For more information, refer to network policies.

4. Add optional policies

Refer to our list of common network policies for policies you may want to create.