Skip to content

[Gateway] Remove protocol detection ENT #22639

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: production
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -3,13 +3,8 @@ title: Protocol detection
pcx_content_type: how-to
sidebar:
order: 2

---

:::note
Only available on Enterprise plans.
:::

Gateway supports the detection, logging, and filtering of network protocols using packet attributes.

Protocol detection only applies to devices connected to Zero Trust via the WARP client in [Gateway with WARP](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#gateway-with-warp-default) mode.
Expand All @@ -19,7 +14,7 @@ Protocol detection only applies to devices connected to Zero Trust via the WARP
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Network** > **Firewall**.
2. Turn on **Protocol Detection**.

You can now use *Detected Protocol* as a selector in a [Network policy](/cloudflare-one/policies/gateway/network-policies/#detected-protocol).
You can now use _Detected Protocol_ as a selector in a [Network policy](/cloudflare-one/policies/gateway/network-policies/#detected-protocol).

## Supported protocols

Expand All @@ -29,7 +24,7 @@ Gateway supports detection and filtering of the following protocols:
| -------- | ------------------------------------------------------------------------------------------- |
| HTTP | The policy builder includes separate values for HTTP/1.1 and HTTP/2. |
| SSH | |
| TLS | Gateway detects TLS versions 1.1 through 1.3 with the *TLS* value. |
| TLS | Gateway detects TLS versions 1.1 through 1.3 with the _TLS_ value. |
| DCE/RPC | |
| MQTT | |
| TPKT | TPKT commonly initiates RDP sessions, so you can use it to identify and filter RDP traffic. |
Expand All @@ -41,4 +36,4 @@ You can create network policies that filter traffic based on protocol detections

| Selector | Operator | Value | Action |
| ----------------- | -------- | ----- | ------ |
| Detected Protocol | in | *SSH* | Block |
| Detected Protocol | in | _SSH_ | Block |
Original file line number Diff line number Diff line change
@@ -1,14 +1,9 @@
---
{}

---

The inferred network protocol based on our [protocol detection](/cloudflare-one/policies/gateway/network-policies/protocol-detection/).
The inferred network protocol based on Cloudflare's [protocol detection](/cloudflare-one/policies/gateway/network-policies/protocol-detection/).

| UI name | API example |
| ----------------- | --------------------------------- |
| Detected Protocol | `net.protocol.detection == "ssh"` |

:::note
This selector is available in early access for Enterprise users. For more information, contact your account team.
:::