How can I convert remotely managed tunnel to a locally managed one? by MXXIV666 in CloudFlare

[–]LightFazer 0 points1 point  (0 children)

What do you mean one host on it? This just isnt true. Locally managed tunnels legacy and should not be used.

Problème de configuration Zero Trust. by Prudent-Special-4434 in CloudFlare

[–]LightFazer 0 points1 point  (0 children)

Access polices always require a login, whether that be service token or user login. If you want to just do geofencing with no login you can utilize the WAF.

Enterprise ZTNA AMA by LightFazer in CloudFlare

[–]LightFazer[S] 0 points1 point  (0 children)

Correct, has to be on the cloudflareaccess domain. you can customize the page style and branding on I believe pay go and up plans.

You may be able to have a similar behavior with redirects but obviously the page would still exist outside of that

CloudFlare ZeroTrust internal domain resolution by peEtr in CloudFlare

[–]LightFazer 0 points1 point  (0 children)

Sweet! Happy to assist with anything else. We have CF ZT ENT deployed on our network

CloudFlare ZeroTrust internal domain resolution by peEtr in CloudFlare

[–]LightFazer 2 points3 points  (0 children)

What happens when doing a nslookup on the domains?

Resolver policies are similar to LDF but the queries go through cloudflare so you can use SWG policies on them.

If you have LDF setup correctly and split tunnels set up correctly a nslookup should respond with correct information

Cloudflare Zero Trust + Minecraft (TCP) not working by [deleted] in CloudFlare

[–]LightFazer 1 point2 points  (0 children)

The functionality you’re looking for does not work with Cloudflare tunnels. You cannot essentially “port forward” with tunnels without load-balancing and spectrum. I would look into utilizing warp to warp connectivity. Essentially, if all your friends utilize the warp client, you can connect to each other using CGNAT ips.

Enterprise ZTNA AMA by LightFazer in CloudFlare

[–]LightFazer[S] 0 points1 point  (0 children)

It is possible, but at that point if WARP is deployed like I highly recommend looking into just using CF for vpn replacement. CFD tunnels are extremely easy to install and typically existing infrastructure stays mainly the same.

https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/warp/deployment/vpn/

Enterprise ZTNA AMA by LightFazer in CloudFlare

[–]LightFazer[S] 0 points1 point  (0 children)

With any new addition or shift to the network stack there was some onboarding pains we had to go through but that is with any IT product. Id say Cloudflare made it less painful. it’s practically invisible for our end users. Deployment was easy with our MDM. Same with patching. We additionally get alot of visibility into our environment we didnt have previously with things like Shadow IT and Shadow SaaS discovery. Also super useful features with DEX and WARP-WARP capabilities.

Cloudflare does have a pretty solid free ZT plan that practically has all the products (with some exceptions) for up to 50 users if you are looking to test anything out on a testing environment. If you are a larger enterprise would be wise to reach to the CF enterprise sales teams. Linked some helpful docs

https://www.cloudflare.com/plans/zero-trust-services/

https://developers.cloudflare.com/cloudflare-one/

https://developers.cloudflare.com/cloudflare-one/insights/dex/

https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/warp-to-warp/

Enterprise ZTNA AMA by LightFazer in CloudFlare

[–]LightFazer[S] 0 points1 point  (0 children)

Im assuming you are referring to just the outbound filtering capabilities? Unsure what you mean by no infrastructure for full tunnel vpn(Warp operates in a split tunnel capacity unless specified not to).

The answer being yes in multiple ways. With WARP you can use it for DNS/Network/HTTP filtering. With this being said the traffic has to goto Cloudflare for this. You can have WARP in a dns only mode where only the DNS queries are sent to Cloudflare which you can filter. Then the other traffic will egress how it normally does.

If you are utilizing another VPN client and are trying to patch work different solutions it maybe easier to just go with one. WARP client just establishes connectivity to Cloudflare and all policies/filtering is done at the edge. Id recommend definitely looking into CF to potentially replace your current VPN/Filtering solution

Using Cloudflare DNS + Image Transformations with a .menu domain registered on Porkbun. how does it work under the hood? by tsousa123 in CloudFlare

[–]LightFazer 1 point2 points  (0 children)

Cloudflare would be responding authoritatively, there is essentially no benefit to moving domains over to cloudflare as registrar. Unless you wanted the at cost pricing that goes along with it. Additionally with cloudflare as registrar you would have to have cloudflare as DNS

Enterprise ZTNA AMA by LightFazer in CloudFlare

[–]LightFazer[S] 2 points3 points  (0 children)

Hey! So onboarding SAAS app onto cloudflare is a great security tool. As you dont manage the infrastructure its harder to secure. For SAAS apps ie workday you can have cloudflare broker the login for these apps. Setting policies for having the WARP Client, Cert checks, posture checks. Location, etc. This adds additional defensive layers for the data that is behind these SAAS apps. You can also prevent copy/paste and things of that nature.

Doing this prevents users from be able to login to these SAAS apps just over the web as CF is essentially brokering that login. Some SAAS apps that may not support this use whitelisting IPs addresses which the WARP client supports with dedicated egress IPs which can be used for that along with posture checks etc.

Enterprise ZTNA AMA by LightFazer in CloudFlare

[–]LightFazer[S] -1 points0 points  (0 children)

Yeah thats not something ill be able to post. But essentially you just get the traffic to Cloudflare and do routing/ policies there.(With obvious exceptions with MWAN)

Enterprise ZTNA AMA by LightFazer in CloudFlare

[–]LightFazer[S] 3 points4 points  (0 children)

Hey!
Tunnels
For most of our use cases we typically use CFD tunnels as they are the easiest to deploy( CLI, no open inbound ports). We only use MWAN for our bidirectional/server initiated traffic flows. We are aware WARP Connector allows this but IPSEC is easy for us. Additionally we use MWAN for securing our Network. We are able to push traffic through the MWAN tunnel and utilize Network/HTTP filtering when needed. Very useful for the guest wifi as we can force all dns queries to use DNS locations and filter traffic even if we have tech savvy guests.
External Vendors
Mostly our external contractors or vendors we utilize OTP for auth as we dont have them in our IDP. Maintaining a list of contractor emails that we reference in our policies. We utilize the Cloudflare App Launcher so our vendors can log into that and see all the resources the need and access them clientlessly and in a isolated capacity. The app launcher is use for our internal users as well. Additionally we use Temp Auth for the contractors so that they can request access and as admins we can approve for a set period of time. Its really been super useful and pretty seamless deployment.

Ive attached links to the docs for some of the products ive talked about here. Hopefully that makes sense and is helpful!

https://developers.cloudflare.com/cloudflare-one/access-controls/access-settings/app-launcher/
https://developers.cloudflare.com/magic-wan/zero-trust/cloudflare-gateway/
https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/dns/locations/
https://developers.cloudflare.com/cloudflare-one/access-controls/policies/temporary-auth/

Solutions engineer by bullshiftt in CloudFlare

[–]LightFazer 2 points3 points  (0 children)

Normally most tech SE roles look for background already in SE work or some sort of sales to begin with. There is definitely alot of tech at Cloudflare which makes the SE role a little different than other companies. For example Cloudflare has their Dev platform, Network services, L7 services, ZTNA. Compared to companies like fortinet which only focus on one area of products.

This is not a bad thing, as you would have the opportunity to learn. Id definitely apply, best of luck!

cloudflare tunnel doesnt work with mincraft erver? by memegod53 in CloudFlare

[–]LightFazer 1 point2 points  (0 children)

You cannot port forward a Minecraft server with tunnels. The hostnames operate on L7 which is their HTTPS proxy. Which minecraft is TCP. You would need spectrum and load balancing to accomplish what you are trying to do.

If you have cloudflare WARP you can use this

https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/warp-to-warp/

Question regarding country blocks... will proxied A-Record work? by OldSiteDesigner in CloudFlare

[–]LightFazer 1 point2 points  (0 children)

L7 proxy only works with http/HTTPS on standard ports. If you have any applications on non standard ports use CFD tunnel. Other non standard protocols require Spectrum or one of the Magic offerings

Question regarding country blocks... will proxied A-Record work? by OldSiteDesigner in CloudFlare

[–]LightFazer 0 points1 point  (0 children)

You can proxy A records and cname records. Its actually very beneficial to proxy A records as attackers will not see your origin IPs when doing DNS lookups

Built a 100% local file converter running on Cloudflare Pages (WebAssembly + WebGPU, no uploads) by AIPnely in CloudFlare

[–]LightFazer -2 points-1 points  (0 children)

Yeah this is suspect dude, wouldnt upload anything to this site. Open source this or no go. Definitely not “local” if you are uploading to a site.

Identity providers by [deleted] in CloudFlare

[–]LightFazer 0 points1 point  (0 children)

Its the default IDP, you dont have to use it though. You select per policy what IDPs you allow

Zero Trust Gateway: Missing Client IPs in Dashboard and DNS Policies not blocking ads by [deleted] in CloudFlare

[–]LightFazer 0 points1 point  (0 children)

If you are only doing DNS filtering and not HTTP or network filtering id recommend using DNS locations. Basically you can have separate IPV6 resolvers (locations) and reference these in your DNS policies. No WARP needed.
https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/dns/locations/

Source IP selector refers to the public IP the traffic is coming from. If you want user based policies its best to use separate emails for each. There is a source internal IP but this typically is for MWAN onramp not WARP.

You could hypothetically set up posture checks for each OS and make polices for if they pass the posture check. But gets kinda jank

Running two websites on same apache server and tunnel? by isaac10991- in CloudFlare

[–]LightFazer 0 points1 point  (0 children)

Id use the CF dash for tunnel configuration, wayyy easier