Network Security Release Notes

Last updated: Nov 1, 2025

  • Oct 30, 2025
    • Parsed from source:
      Oct 30, 2025
    • Detected by Releasebot:
      Nov 1, 2025
    • Modified by Releasebot:
      Nov 7, 2025

    Network Security by Cloudflare

    New TCP-based fields available in Rulesets

    Cloudflare adds two new Ruleset fields to detect TCP usage and measure client TCP RTT, enabling policy decisions based on protocol and network performance. Distinguish TCP vs QUIC traffic and route high latency requests accordingly.

    New request fields in the Ruleset engine

    Cloudflare now provides two new request fields in the Ruleset engine that let you make decisions based on whether a request used TCP and the measured TCP round-trip time between the client and Cloudflare. These fields help you understand protocol usage across your traffic and build policies that respond to network performance. For example, you can distinguish TCP from QUIC traffic or route high latency requests to alternative origins when needed.

    Example filter expression:

    cf.edge.client_tcp && cf.timings.client_tcp_rtt_msec < 100
    

    More information can be found in the Rules language fields reference.

    Original source Report a problem
  • Sep 11, 2025
    • Parsed from source:
      Sep 11, 2025
    • Detected by Releasebot:
      Oct 28, 2025

    Network Security by Cloudflare

    DNS filtering for private network onramps

    Cloudflare enables Magic WAN and WARP Connector to route DNS traffic to the Gateway resolver, keeping queries private with internal IP visibility. This fuels full Cloudflare One integration, including Internal DNS and hostname-based policies, via simple DNS setting updates.

    DNS routing for Magic WAN and WARP Connector

    Magic WAN and WARP Connector users can now securely route their DNS traffic to the Gateway resolver without exposing traffic to the public Internet.

    Routing DNS traffic to the Gateway resolver allows DNS resolution and filtering for traffic coming from private networks while preserving source internal IP visibility. This ensures Magic WAN users have full integration with our Cloudflare One features, including Internal DNS and hostname-based policies.

    To configure DNS filtering, change your Magic WAN or WARP Connector DNS settings to use Cloudflare's shared resolver IPs, 172.64.36.1 and 172.64.36.2. Once you configure DNS resolution and filtering, you can use Source Internal IP as a traffic selector in your resolver policies for routing private DNS traffic to your Internal DNS.

    Original source Report a problem
  • Sep 8, 2025
    • Parsed from source:
      Sep 8, 2025
    • Detected by Releasebot:
      Oct 28, 2025

    Network Security by Cloudflare

    Custom IKE ID for IPsec Tunnels

    Custom IKE ID for IPsec tunnels

    Now, Magic WAN customers can configure a custom IKE ID for their IPsec tunnels. Customers that are using Magic WAN and a VeloCloud SD-WAN device together can utilize this new feature to create a high availability configuration.

    Availability

    This feature is available via API only. Customers can read the Magic WAN documentation to learn more about the Custom IKE ID feature and the API call to configure it.

    Original source Report a problem
  • Sep 5, 2025
    • Parsed from source:
      Sep 5, 2025
    • Detected by Releasebot:
      Oct 28, 2025

    Network Security by Cloudflare

    Bidirectional tunnel health checks are compatible with all Magic on-ramps

    Magic tunnels now let bidirectional health checks pass when return packets traverse any tunnel in an HA setup, not just the same tunnel. This boosts compatibility with SD-WAN devices like VeloCloud that don’t route all traffic over a single tunnel.

    Bidirectional health check behavior

    All bidirectional tunnel health check return packets are accepted by any Magic on-ramp.

    Previously, when a Magic tunnel had a bidirectional health check configured, the bidirectional health check would pass when the return packets came back to Cloudflare over the same tunnel that was traversed by the forward packets.

    There are SD-WAN devices, like VeloCloud, that do not offer controls to steer traffic over one tunnel versus another in a high availability tunnel configuration.

    Now, when a Magic tunnel has a bidirectional health check configured, the bidirectional health check will pass when the return packet traverses over any tunnel in a high availability configuration.

    Original source Report a problem
  • Jul 30, 2025
    • Parsed from source:
      Jul 30, 2025
    • Detected by Releasebot:
      Nov 1, 2025

    Network Security by Cloudflare

    Magic Transit and Magic WAN health check data is fully compatible with the CMB EU setting.

    New in this release

    Today, we are excited to announce that all Magic Transit and Magic WAN customers with CMB EU (Customer Metadata Boundary - Europe) enabled in their account will be able to access GRE, IPsec, and CNI health check and traffic volume data in the Cloudflare dashboard and via API.

    This ensures that all Magic Transit and Magic WAN customers with CMB EU enabled will be able to access all Magic Transit and Magic WAN features.

    GraphQL endpoints compatible with CMB EU

    Specifically, these two GraphQL endpoints are now compatible with CMB EU:

    • magicTransitTunnelHealthChecksAdaptiveGroups
    • magicTransitTunnelTrafficAdaptiveGroups
    Original source Report a problem
  • Jun 9, 2025
    • Parsed from source:
      Jun 9, 2025
    • Detected by Releasebot:
      Oct 28, 2025

    Network Security by Cloudflare

    More flexible fallback handling — Custom Errors now support fetching assets returned with 4xx or 5xx status codes

    Custom Errors now fetch and store error pages and assets from your origin even when served with 4xx or 5xx, not just 200. Assets are stored and minified at the edge for reuse across rules, enabling downtime banners when you can’t override origin status.

    Custom Errors

    Custom Errors can now fetch and store assets and error pages from your origin even if they are served with a 4xx or 5xx HTTP status code; previously, only 200 OK responses were allowed.

    What’s new:

    • You can now upload error pages and error assets that return error status codes (for example, 403, 500, 502, 503, 504) when fetched.
    • These assets are stored and minified at the edge, so they can be reused across multiple Custom Error rules without triggering requests to the origin.

    This is especially useful for retrieving error content or downtime banners from your backend when you can’t override the origin status code.

    Learn more in the Custom Errors documentation.

    Original source Report a problem
  • Jun 9, 2025
    • Parsed from source:
      Jun 9, 2025
    • Detected by Releasebot:
      Oct 28, 2025
    • Modified by Releasebot:
      Nov 6, 2025

    Network Security by Cloudflare

    Match Workers subrequests by upstream zone 1cf.worker.upstream_zone now supported in Transform Rules

    New: cf.worker.upstream_zone is now supported in Transform Rules, enabling conditional logic for Workers and their subrequests. You can set headers and control rule execution based on origin zone, with practical examples.

    What's new

    • cf.worker.upstream_zone is now supported in Transform Rules expressions.
    • Skip or apply logic conditionally when handling Workers subrequests.

    For example, to add a header when the subrequest comes from another zone:
    Text in Expression Editor (replace myappexample.com with your domain):

    (cf.worker.upstream_zone != "" and cf.worker.upstream_zone != "myappexample.com")
    

    Selected operation under Modify request header : Set static
    Header name : X-External-Workers-Subrequest
    Value : 1

    This gives you more granular control in how you handle incoming requests for your zone.

    Learn more in the Transform Rules documentation and Rules language fields reference.

    Original source Report a problem
  • May 30, 2025
    • Parsed from source:
      May 30, 2025
    • Detected by Releasebot:
      Oct 28, 2025
    • Modified by Releasebot:
      Nov 6, 2025

    Network Security by Cloudflare

    Fine-tune image optimization 1WebP now supported in Configuration Rules

    What’s new

    WebP is now a supported value in the Polish setting for Configuration Rules.

    This gives you more precise control over how images are compressed and delivered, whether you're targeting modern browsers, running experiments, or tailoring performance by geography or device type.

    Learn more in the Polish and Configuration Rules documentation.

    Original source Report a problem
  • May 9, 2025
    • Parsed from source:
      May 9, 2025
    • Detected by Releasebot:
      Oct 28, 2025

    Network Security by Cloudflare

    More ways to match — Snippets now support Custom Lists, Bot Score, and WAF Attack Score

    Cloudflare unveils smarter edge routing with custom IP, AS, and Hostname lists for Snippets and Cloud Connector, plus Bot Score and WAF Attack Score to tailor actions for bots and threats with minimal code.

    You can now use IP, Autonomous System (AS), and Hostname custom lists to route traffic to Snippets and Cloud Connector, giving you greater precision and control over how you match and process requests at the edge.

    In Snippets, you can now also match on Bot Score and WAF Attack Score, unlocking smarter edge logic for everything from request filtering and mitigation to tarpitting and logging.

    What’s new

    • Custom lists matching – Snippets and Cloud Connector now support user-created IP, AS, and Hostname lists via dashboard or Lists API. Great for shared logic across zones.
    • Bot Score and WAF Attack Score – Use Cloudflare’s intelligent traffic signals to detect bots or attacks and take advanced, tailored actions with just a few lines of code.

    These enhancements unlock new possibilities for building smarter traffic workflows with minimal code and maximum efficiency.

    Learn more in the Snippets and Cloud Connector documentation.

    Original source Report a problem
  • Apr 24, 2025
    • Parsed from source:
      Apr 24, 2025
    • Detected by Releasebot:
      Oct 28, 2025

    Network Security by Cloudflare

    Custom Errors are now Generally Available

    Custom Errors are GA and available on all paid plans, delivering unified error responses across zones and accounts. Manage Custom Error Rules, Assets, and the revamped Error Pages from the Cloudflare dashboard with conditional logic and header transforms.

    Custom Errors are now generally available for all paid plans — bringing a unified and powerful experience for customizing error responses at both the zone and account levels.

    You can now manage Custom Error Rules, Custom Error Assets, and redesigned Error Pages directly from the Cloudflare dashboard. These features let you deliver tailored messaging when errors occur, helping you maintain brand consistency and improve user experience — whether it’s a 404 from your origin or a security challenge from Cloudflare.

    What's new:

    • Custom Errors are now GA – Available on all paid plans and ready for production traffic.
    • UI for Custom Error Rules and Assets – Manage your zone-level rules from the Rules > Overview and your zone-level assets from the Rules > Settings tabs.
    • Define inline content or upload assets – Create custom responses directly in the rule builder, upload new or reuse previously stored assets.
    • Refreshed UI and new name for Error Pages – Formerly known as “Custom Pages,” Error Pages now offer a cleaner, more intuitive experience for both zone and account-level configurations.
    • Powered by Ruleset Engine – Custom Error Rules support conditional logic and override Error Pages for 500 and 1000 class errors, as well as errors originating from your origin or other Cloudflare products. You can also configure Response Header Transform Rules to add, change, or remove HTTP headers from responses returned by Custom Error Rules.

    Learn more in the Custom Errors documentation.

    Original source Report a problem

Related products