diff --git a/src/content/docs/cloudflare-one/policies/gateway/network-policies/protocol-detection.mdx b/src/content/docs/cloudflare-one/policies/gateway/network-policies/protocol-detection.mdx index 4177d9bba512d72..36b14ae64d91da9 100644 --- a/src/content/docs/cloudflare-one/policies/gateway/network-policies/protocol-detection.mdx +++ b/src/content/docs/cloudflare-one/policies/gateway/network-policies/protocol-detection.mdx @@ -3,13 +3,8 @@ title: Protocol detection pcx_content_type: how-to sidebar: order: 2 - --- -:::note -Only available on Enterprise plans. -::: - Gateway supports the detection, logging, and filtering of network protocols using packet attributes. Protocol detection only applies to devices connected to Zero Trust via the WARP client in [Gateway with WARP](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#gateway-with-warp-default) mode. @@ -19,7 +14,7 @@ Protocol detection only applies to devices connected to Zero Trust via the WARP 1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Network** > **Firewall**. 2. Turn on **Protocol Detection**. -You can now use *Detected Protocol* as a selector in a [Network policy](/cloudflare-one/policies/gateway/network-policies/#detected-protocol). +You can now use _Detected Protocol_ as a selector in a [Network policy](/cloudflare-one/policies/gateway/network-policies/#detected-protocol). ## Supported protocols @@ -29,7 +24,7 @@ Gateway supports detection and filtering of the following protocols: | -------- | ------------------------------------------------------------------------------------------- | | HTTP | The policy builder includes separate values for HTTP/1.1 and HTTP/2. | | SSH | | -| TLS | Gateway detects TLS versions 1.1 through 1.3 with the *TLS* value. | +| TLS | Gateway detects TLS versions 1.1 through 1.3 with the _TLS_ value. | | DCE/RPC | | | MQTT | | | TPKT | TPKT commonly initiates RDP sessions, so you can use it to identify and filter RDP traffic. | @@ -41,4 +36,4 @@ You can create network policies that filter traffic based on protocol detections | Selector | Operator | Value | Action | | ----------------- | -------- | ----- | ------ | -| Detected Protocol | in | *SSH* | Block | +| Detected Protocol | in | _SSH_ | Block | diff --git a/src/content/partials/cloudflare-one/gateway/selectors/protocol-detection.mdx b/src/content/partials/cloudflare-one/gateway/selectors/protocol-detection.mdx index 8e683239311c0dd..00ead569dc9ea4f 100644 --- a/src/content/partials/cloudflare-one/gateway/selectors/protocol-detection.mdx +++ b/src/content/partials/cloudflare-one/gateway/selectors/protocol-detection.mdx @@ -1,14 +1,9 @@ --- {} - --- -The inferred network protocol based on our [protocol detection](/cloudflare-one/policies/gateway/network-policies/protocol-detection/). +The inferred network protocol based on Cloudflare's [protocol detection](/cloudflare-one/policies/gateway/network-policies/protocol-detection/). | UI name | API example | | ----------------- | --------------------------------- | | Detected Protocol | `net.protocol.detection == "ssh"` | - -:::note -This selector is available in early access for Enterprise users. For more information, contact your account team. -:::