Skip to content

Traffic policies

A Secure Web Gateway (SWG) is a security service that sits between an organization's users and the Internet. It inspects outbound traffic to enforce security policies, block threats, and prevent data loss. Core SWG capabilities include:

  • URL and domain filtering – Controls which websites users can access.
  • Anti-malware scanning – Inspects files in transit for malicious code.
  • Application control – Manages which applications users can reach and what actions they can perform.
  • Data Loss Prevention (DLP) – Detects and blocks sensitive data before it leaves the network.fprotecting
  • Traffic inspection – Decrypts and examines encrypted (HTTPS) traffic for hidden threats.

The need for an SWG

Traditional network security relied on hardware firewalls at the perimeter of a corporate network. That model assumed users, applications, and data all lived inside the same network boundary. Modern organizations face a different reality:

  • Distributed workforce – Employees connect from home networks, public Wi-Fi, and mobile devices, outside any corporate perimeter.
  • Cloud and SaaS adoption – Business-critical applications and data have moved to cloud platforms like Microsoft 365, Google Workspace, and Salesforce.
  • Expanding threat surface – Phishing, ransomware, command-and-control botnets, and data exfiltration attempts target users regardless of their location.

Without an SWG, organizations lose visibility into what websites and applications users access, what threats reach user devices, and what data leaves the organization. An SWG restores that visibility and control by inspecting traffic in the cloud, close to users, rather than forcing all traffic through a central data center.

Cloudflare Gateway is Cloudflare's SWG, built into the Cloudflare One SASE platform. It inspects and filters traffic at the DNS, network (Layer 4), and HTTP (Layer 7) layers.

For more information on how SWGs work, refer to the Cloudflare Learning Center.

Traffic policy types

Every organization needs a way to control what users can reach on the Internet — blocking malware sites, restricting risky applications, and deciding how traffic exits the corporate network. Think of traffic policies as a set of security checkpoints, each inspecting a different layer of your traffic before it is allowed through.

How Gateway relates to traditional firewalls

If you are familiar with traditional network security, Gateway's policy layers map to familiar firewall functions:

  • DNS policies correspond to DNS-layer filtering (blocking domains before connections are established).
  • Network policies correspond to a Layer 4 stateful firewall, sometimes called Firewall-as-a-Service (FWaaS), filtering by IP address, port, and protocol.
  • HTTP policies correspond to a Layer 7 application firewall (forward proxy with TLS decryption and deep packet inspection).

Unlike hardware firewalls that sit at a single network perimeter, Gateway enforces these policies across Cloudflare's global network, protecting traffic regardless of where users connect.

Gateway supports several policy types because network traffic can be inspected at different layers — from raw packets up to full HTTP requests. Each policy type gives you control at a specific layer:

Packet filtering

Packet filtering inspects raw network packets and blocks traffic based on properties like source IP address or protocol. It does not need to know who the user is or what session they belong to.

Use packet filtering to drop unwanted traffic before it reaches any other policy.

DNS policies

DNS policies check every DNS query your users make. When a query matches a policy rule, Gateway can block the domain from resolving — the site never loads because the domain name is never translated to an IP address.

DNS policies act at the earliest stage of a connection, before any content is fetched. This makes them the fastest policy type to deploy and the broadest in scope. For more information on DNS filtering, refer to the Cloudflare Learning Center.

Use DNS policies to block malicious domains, restrict content categories, or prevent entire sites from loading. For full threat protection, pair DNS policies with HTTP policies — DNS blocks known bad domains, while HTTP catches threats hidden in allowed traffic.

Network policies

Network policies inspect individual TCP, UDP, and Generic Routing Encapsulation (GRE) packets. They can match on IP addresses, ports, protocols, and the server name sent at the start of an encrypted connection (Server Name Indication, or SNI).

Use network policies to block access to specific ports or non-HTTP services such as SSH and RDP.

HTTP policies

HTTP policies inspect the full content of web requests — including URLs, headers, and uploaded or downloaded files. Gateway decrypts HTTPS traffic so it can examine what DNS and network policies cannot see. This requires installing a Cloudflare root certificate on user devices.

Use HTTP policies to block specific URLs, scan file uploads for sensitive data, block malware in downloads, quarantine suspicious files for sandbox analysis, and control which accounts users can sign in to. For example, allow your company Google Workspace account but block personal Gmail.

Egress policies

Egress policies control how traffic leaves your network by assigning fixed IP addresses that belong to your organization. Third-party services can recognize these IPs as yours.

Use egress policies to connect to partners or services that only allow traffic from a known list of IP addresses.

Resolver policies

Resolver policies send DNS queries to specific DNS servers instead of the default Cloudflare resolver.

Use resolver policies to resolve private hostnames on your internal network, route queries to your own DNS servers for compliance, or reach internal resources while connected through Cloudflare One.

Identity and device context

Gateway policies can go beyond network attributes (domains, IPs, ports) and incorporate user identity and device health into every decision.

When users connect through the Cloudflare One Client, Gateway can evaluate:

  • User identity – Email address, group membership, and authentication method from your identity provider (for example, Okta, Microsoft Entra ID, or Google Workspace).
  • Device posture – Signals such as operating system version, disk encryption status, firewall state, and whether the device serial number matches a managed device list. For the full list of available checks, refer to Device posture.

These signals can be combined with traffic selectors to create context-aware policies. For example, you can create an HTTP policy that allows access to a sensitive SaaS application only when the user belongs to a specific group and the device has disk encryption turned on.

For details on building policies with identity selectors, refer to Identity-based policies.

Set up Cloudflare Gateway traffic policies

Before you create Cloudflare Gateway traffic policies, you need connect the devices or networks you want to protect and confirm that Cloudflare Gateway can inspect their traffic. For each traffic policy type, follow this workflow:

  1. Connect the devices or networks you want to protect.
  2. Verify that Gateway is receiving traffic from your devices.
  3. Set up recommended security policies — for example, block all security threat categories with a DNS policy.
  4. Add policies specific to your organization's needs.

For example, if your goal is to prevent employees from accessing known malware domains, you would start by enrolling devices with the Cloudflare One Client (step 1), confirm DNS queries appear in your Gateway logs (step 2), then create a DNS policy that blocks all security-risk categories (step 3).

For step-by-step setup guides, refer to DNS, Network, and HTTP policies.

How to choose a Cloudflare Gateway policy type

The following table maps common traffic-filtering goals to the best Cloudflare Gateway policy type:

Filtering goalPolicy typeWhy
Block websites by URLHTTPInspects the full URL path, not just the domain
Block domains (all pages)DNSPrevents the domain from resolving
Block non-HTTP traffic (SSH, RDP)NetworkInspects TCP/UDP packets on any port
Block malware and threatsDNS and HTTPDNS blocks known-bad domains. HTTP catches threats in allowed traffic.
Assign static egress IPsEgressLets third-party services identify your organization
Drop traffic before other policies runPacket filteringBlocks by packet attributes without user context
Route DNS to custom nameserversResolverOverrides the default Cloudflare resolver

After you choose a Cloudflare Gateway policy type, continue with the matching setup guide to create the policy that fits your traffic-filtering goal.

Choose a connection method

The connection method (on-ramp) you use determines which policy types Gateway can enforce. The following table summarizes each method:

Connection methodDNS policiesNetwork policiesHTTP policiesBest for
Cloudflare One Client (WARP)YesYesYesRoaming users on managed devices (laptops, phones)
DNS resolver configurationYesNoNoUnmanaged devices, entire networks, or initial rollout
Proxy endpoint (PAC file)NoNoYes (browser only)Browser-level HTTP filtering without a device agent
Network tunnel (IPsec/GRE via Magic WAN)YesYesYesBranch offices, data centers, and site-level connectivity
  • The Cloudflare One Client provides the broadest coverage and is the recommended method for per-device deployments.
  • DNS resolver configuration is the easiest to deploy (change a DNS setting on your router or device) and provides immediate protection, but it only enforces DNS policies.
  • Proxy endpoints enable HTTP inspection through browser proxy configuration without installing an agent, but they are limited to browser traffic.
  • Network tunnels route all site traffic through Gateway and are best for protecting entire office locations or data centers.

You can combine multiple on-ramps. For example, use the Cloudflare One Client for remote employees and network tunnels for branch offices.

How Gateway processes traffic

When a user makes a request, Gateway inspects it at multiple layers before allowing the connection through. The following diagram shows the end-to-end flow:

flowchart LR
    accTitle: Gateway traffic flow
    accDescr: Diagram showing how traffic flows from user device through an on-ramp to Cloudflare Gateway for policy evaluation, then to the destination.

    A["User device"] --> B["On-ramp"]
    B --> C["Cloudflare edge<br/>(nearest location)"]
    C --> D["Policy evaluation"]
    D --> E["Destination<br/>server"]
    E --> D
    D --> C
    C --> B
    B --> A
  1. The user's device sends a request (DNS query, TCP connection, or HTTP request).
  2. The request reaches Cloudflare through an on-ramp — the Cloudflare One Client, a DNS resolver configuration, a proxy endpoint, or a network tunnel.
  3. Cloudflare processes the request at the nearest edge location, not a centralized data center. This keeps latency low regardless of where the user connects from.
  4. Gateway evaluates the request against your configured policies in order of enforcement: DNS policies first, then network policies, then HTTP policies.
  5. If policies allow the request, Gateway proxies it to the destination server and inspects the response on the return path.

For details on how Gateway proxies traffic and establishes connections, refer to Proxy.

Troubleshoot Cloudflare Gateway policies

For help resolving common issues with Cloudflare Gateway policies, refer to Troubleshooting.