Applications and app types
Gateway allows you to create DNS, Network, and HTTP policies based on applications and app types. You can select individual applications or groups of app types to filter specific traffic on your network.
When you choose the Application selector in a Gateway policy builder, the Value field will include all supported applications and their respective app types. Alternatively, you can use the Gateway API to fetch a list of applications, app types, and ID numbers.
Value | Definition |
---|---|
Artificial Intelligence | AI assistance applications |
Audio Streaming | Music streaming, podcasts, and other audio applications |
Collaboration & Online Meetings | Business communication and collaboration applications |
Dating | Online dating applications |
Development | Software development and development operations applications |
Email applications | |
Encrypted DNS | DNS encryption applications |
File Sharing | File sharing applications |
Finance & Accounting | Financial and accounting applications |
Gaming | Games and gaming applications |
Human Resources | Employee management applications and workforce tools |
Instant Messaging | Instant messaging applications |
IT Management | IT deployment management applications |
Legal | Legal tools and applications |
News | News applications |
Productivity | Business and productivity applications |
Public Cloud | Public cloud infrastructure management applications |
Sales & Marketing | Sales and marketing applications |
Search Engines | Web search engines and applications |
Security | Information security applications, including shadow IT |
Shopping | Online shopping applications |
Social Networking | Social networking applications |
Sports | Sports streaming and news applications |
Video Streaming | Video streaming applications |
Do Not Inspect | Applications incompatible with the TLS certificate required by the Gateway proxy |
Applications can be incompatible with TLS decryption for various reasons:
Certificate pinning is a security mechanism used to prevent on-path attacks on the Internet by hardcoding information about the certificate that the application expects to receive. If the wrong certificate is received, even if it is trusted by the system, the application will refuse to connect.
- Non-web traffic: Some applications send non-web traffic, such as Session Initiation Protocol (SIP) and Extensible Messaging and Presence Protocol (XMPP), over TLS. Gateway cannot inspect these protocols.
Gateway automatically groups applications incompatible with TLS decryption into the Do Not Inspect app type. As Cloudflare identifies incompatible applications, Gateway will periodically update this app type to add new applications. To ensure Gateway does not intercept any current or future incompatible traffic, you can create a Do Not Inspect HTTP policy with the entire Do Not Inspect app type selected.
To optimize performance for Microsoft 365 applications and services, you can bypass TLS decryption by turning on the Microsoft 365 traffic integration. This will create a Do Not Inspect policy for all Microsoft 365 domains and IP addresses ↗ specified by Microsoft. This policy also uses Cloudflare intelligence to identify other Microsoft 365 traffic not explicitly defined.
To turn on the Microsoft 365 integration:
- In Zero Trust ↗, go to Settings > Network > Integrated experiences.
- In Bypass decryption of Microsoft 365 traffic, select Create policy.
- To verify the policy was created, select View policy. Alternatively, go to Gateway > Firewall Policies > HTTP. A policy named Microsoft 365 Auto Generated will be enabled in your list.
All future Microsoft 365 traffic will bypass Gateway logging and filtering. To disable this behavior, turn off or delete the policy.