Network Security Release Notes
Last updated: Feb 18, 2026
- Feb 17, 2026
- Date parsed from source:Feb 17, 2026
- First seen by Releasebot:Feb 18, 2026
Network Security by Cloudflare
Cloudflare One, Cloudflare WAN, Cloudflare Network Firewall, Network Flow - Cloudflare One Product Name Updates
Cloudflare renames networking products to align with SASE and Zero Trust, clarifying each tool’s role. Old names become Cloudflare branded equivalents, with no action needed and no changes to functionality or billing.
We are updating naming related to some of our Networking products to better clarify their place in the Zero Trust and Secure Access Service Edge (SASE) journey.
We are retiring some older brand names in favor of names that describe exactly what the products do within your network. We are doing this to help customers build better, clearer mental models for comprehensive SASE architecture delivered on Cloudflare.What's changing
- Magic WAN → Cloudflare WAN
- Magic WAN IPsec → Cloudflare IPsec
- Magic WAN GRE → Cloudflare GRE
- Magic WAN Connector → Cloudflare One Appliance
- Magic Firewall → Cloudflare Network Firewall
- Magic Network Monitoring → Network Flow
No action is required by you — all functionality, existing configurations, and billing will remain exactly the same.
For more information, visit the Cloudflare One documentation.
Original source Report a problem - Jan 30, 2026
- Date parsed from source:Jan 30, 2026
- First seen by Releasebot:Jan 31, 2026
Network Security by Cloudflare
BGP over GRE and IPsec tunnels
Cloudflare adds BGP peering for Magic WAN and Magic Transit in the dashboard, enabling dynamic routing over IPsec and GRE on-ramps in beta. Automate network and subnet changes, enjoy fast failure detection, and secure sessions with MD5 authentication.
BGP peering
Magic WAN and Magic Transit customers can use the Cloudflare dashboard to configure and manage BGP peering between their networks and their Magic routing table when using IPsec and GRE tunnel on-ramps (beta).
Using BGP peering allows customers to:
- Automate the process of adding or removing networks and subnets.
- Take advantage of failure detection and session recovery features.
With this functionality, customers can:
- Establish an eBGP session between their devices and the Magic WAN / Magic Transit service when connected via IPsec and GRE tunnel on-ramps.
- Secure the session by MD5 authentication to prevent misconfigurations.
- Exchange routes dynamically between their devices and their Magic routing table.
For configuration details, refer to:
- Configure BGP routes for Magic WAN
- Configure BGP routes for Magic Transit
All of your release notes in one feed
Join Releasebot and get updates from Cloudflare and hundreds of other software products.
- Jan 27, 2026
- Date parsed from source:Jan 27, 2026
- First seen by Releasebot:Jan 30, 2026
Network Security by Cloudflare
Configure Cloudflare source IPs (beta)
Magic WAN now lets you set the source IP range Cloudflare uses for traffic to private networks, replacing public IPs with a dedicated private CIDR. This enables symmetric routing, better firewall state, and keeps private traffic on secure paths; IPv4 defaults to 100.64.0.0/12 (configurable to any /12), IPv6 is 2606:4700:cf1:5000::/64 (not configurable).
Magic WAN now allows you to configure the source IP address range used by Cloudflare services (such as Load Balancing, Gateway, and Browser Isolation) when sending traffic to your private networks. Previously, traffic to private networks was sourced from public Cloudflare IPs, which may have caused IP conflicts. With this feature, you can now configure a dedicated, non-Internet-routable private IP range to ensure:
- Symmetric routing over private network connections
- Proper firewall state preservation
- Private traffic stays on secure paths
Key details
- IPv4: Sourced from
100.64.0.0/12by default, configurable to any /12 CIDR - IPv6: Sourced from
2606:4700:cf1:5000::/64(not configurable) - Affected connectors: GRE, IPsec, CNI, WARP Connector, and WARP Client (Cloudflare Tunnel is not affected)
Configuring Cloudflare source IPs requires Cloudflare One Unified Routing (beta) and the "Cloudflare One Networks Write" permission.
Original source Report a problem
For configuration details, refer to Configure Cloudflare source IPs. - Jan 27, 2026
- Date parsed from source:Jan 27, 2026
- First seen by Releasebot:Jan 28, 2026
- Modified by Releasebot:Jan 30, 2026
Network Security by Cloudflare
Control request and response body buffering in Configuration Rules
Cloudflare introduces configurable HTTP body buffering in Configuration Rules. Choose request buffering modes Standard, Full, or None and response buffering Standard or None, enabling or disabling inspection. Disabling buffering may affect security features like WAF and Bot Management for zones with the latest proxy.
You can now control how Cloudflare buffers HTTP request and response bodies using two new settings in Configuration Rules.
Request body buffering
Controls how Cloudflare buffers HTTP request bodies before forwarding them to your origin server:
Mode Behavior Standard (default) Cloudflare can inspect a prefix of the request body for enabled functionality such as WAF and Bot Management. Full Buffers the entire request body before sending to origin. None No buffering. The request body streams directly to origin without inspection.Response body buffering
Controls how Cloudflare buffers HTTP response bodies before forwarding them to the client:
Mode Behavior Standard (default) Cloudflare can inspect a prefix of the response body for enabled functionality. None No buffering. The response body streams directly to the client without inspection.Warning
Setting body buffering to None may break security functionality that requires body inspection, including the Web Application Firewall (WAF) and Bot Management. Ensure that any paths where you disable buffering do not require security inspection.
Availability
These settings only take effect on zones running Cloudflare's latest CDN proxy. Enterprise customers can contact their account team to enable the latest proxy on their zones.
API example
{ "action": "set_config", "action_parameters": { "request_body_buffering": "standard", "response_body_buffering": "none" } }For more information, refer to Configuration Rules.
Original source Report a problem - Jan 22, 2026
- Date parsed from source:Jan 22, 2026
- First seen by Releasebot:Jan 22, 2026
Network Security by Cloudflare
New cryptographic functions — encode_base64() and sha256()
Cloudflare Rulesets adds encode_base64 and sha256 functions to build signed request headers in rule expressions. Encode supports standard and URL-safe Base64 with optional padding; sha256 hashes the input (Enterprise add-on). A clear, actionable feature update for developers.
New functions
Cloudflare Rulesets now includes encode_base64() and sha256() functions, enabling you to generate signed request headers directly in rule expressions. These functions support common patterns like constructing a canonical string from request attributes, computing a SHA256 digest, and Base64-encoding the result.
Function Description Availability
Function Description Availability encode_base64(input, flags) Encodes a string to Base64 format. Optional flags parameter: u for URL-safe encoding, p for padding (adds = characters to make the output length a multiple of 4, as required by some systems). By default, output is standard Base64 without padding. All plans (in header transform rules) sha256(input) Computes a SHA256 hash of the input string. Requires enablementNote
The sha256() function is available as an Enterprise add-on and requires a specific entitlement. Contact your account team to enable it.
Examples
Encode a string to Base64 format:
encode_base64("hello world")Returns:
aGVsbG8gd29ybGQEncode a string to Base64 format with padding:
encode_base64("hello world", "p")Returns:
aGVsbG8gd29ybGQ=Perform a URL-safe Base64 encoding of a string:
encode_base64("hello world", "u")Returns:
aGVsbG8gd29ybGQCompute the SHA256 hash of a secret token:
sha256("my-token")Returns a hash that your origin can validate to authenticate requests.
Compute the SHA256 hash of a string and encode the result to Base64 format:
encode_base64(sha256("my-token"))Combines hashing and encoding for systems that expect Base64-encoded signatures.
For more information, refer to the Functions reference.
Original source Report a problem - Jan 20, 2026
- Date parsed from source:Jan 20, 2026
- First seen by Releasebot:Jan 21, 2026
Network Security by Cloudflare
New functions for array and map operations
Cloudflare Rulesets gain powerful new functions for advanced expression logic on arrays and maps. Split, join, has_key and has_value enable header list checks and country‑based routing. This is a real feature release with practical capabilities.
Cloudflare Rulesets
Cloudflare Rulesets now include new functions that enable advanced expression logic for evaluating arrays and maps. These functions allow you to build rules that match against lists of values in request or response headers, enabling use cases like country-based blocking using custom headers.
New functions
Function Description split(source, delimiter) Splits a string into an array of strings using the specified delimiter. join(array, delimiter) Joins an array of strings into a single string using the specified delimiter. has_key(map, key) Returns true if the specified key exists in the map. has_value(map, value) Returns true if the specified value exists in the map.Example use cases
Check if a country code exists in a header list:
has_value(split(http.response.headers["x-allow-country"][0], ","), ip.src.country)Check if a specific header key exists:
has_key(http.request.headers, "x-custom-header")Join array values for logging or comparison:
join(http.request.headers.names, ", ")For more information, refer to the Functions reference.
Original source Report a problem - Jan 15, 2026
- Date parsed from source:Jan 15, 2026
- First seen by Releasebot:Jan 16, 2026
- Modified by Releasebot:Jan 27, 2026
Network Security by Cloudflare
Network Services navigation update
Cloudflare updates Network Services dashboard to reflect solutions over product names, improving navigation across Magic Transit, Magic WAN, and Magic Firewall. New Overview page, renamed and reorganized sections, and insights under a unified Analytics hub. Existing configurations stay intact.
The Network Services menu structure in Cloudflare's dashboard has been updated to reflect solutions and capabilities instead of product names. This will make it easier for you to find what you need and better reflects how our services work together.
Your existing configurations will remain the same, and you will have access to all of the same features and functionality.
The changes visible in your dashboard may vary based on the products you use. Overall, changes relate to Magic Transit, Magic WAN, and Magic Firewall.
Summary of changes
- A new Overview page provides access to the most common tasks across Magic Transit and Magic WAN.
- Product names have been removed from top-level navigation.
- Magic Transit and Magic WAN configuration is now organized under Routes and Connectors. For example, you will find IP Prefixes under Routes, and your GRE/IPsec Tunnels under Connectors.
- Magic Firewall policies are now called Firewall Policies.
- Magic WAN Connectors and Connector On-Ramps are now referenced in the dashboard as Appliances and Appliance profiles. They can be found under Connectors > Appliances.
- Network analytics, network health, and real-time analytics are now available under Insights.
- Packet Captures are found under Insights > Diagnostics.
- You can manage your Sites from Insights > Network health.
- You can find Magic Network Monitoring under Insights > Network flow.
If you would like to provide feedback, complete this form. You can also find these details in the January 7, 2026 email titled [FYI] Upcoming Network Services Dashboard Navigation Update.
Original source Report a problem - Jan 12, 2026
- Date parsed from source:Jan 12, 2026
- First seen by Releasebot:Jan 13, 2026
Network Security by Cloudflare
Metro code field now available in Rules
The ip.src.metro_code field in the Ruleset Engine is now populated with DMA (Designated Market Area) data. You can use this field to build rules that target traffic based on geographic market areas, enabling more granular location-based policies for your applications.
Field details
- Field: ip.src.metro_code
- Type: String | null
- Description: The metro code (DMA) of the incoming request's IP address. Returns the designated market area code for the client's location.
Example filter expression:
ip.src.metro_code eq "501"For more information, refer to the Fields reference.
Original source Report a problem - Dec 31, 2025
- Date parsed from source:Dec 31, 2025
- First seen by Releasebot:Jan 28, 2026
Network Security by Cloudflare
Breakout traffic visibility via NetFlow
NetFlow export for Magic WAN Connector
Magic WAN Connector now exports NetFlow data for breakout traffic to Magic Network Monitoring (MNM), providing visibility into traffic that bypasses Cloudflare's security filtering.
- Monitor breakout traffic statistics in the Cloudflare dashboard.
- View traffic patterns for applications configured to bypass Cloudflare.
- Maintain visibility across all traffic passing through your Magic WAN Connector.
For more information, refer to NetFlow statistics.
Original source Report a problem - Nov 6, 2025
- Date parsed from source:Nov 6, 2025
- First seen by Releasebot:Jan 28, 2026
Network Security by Cloudflare
Designate WAN link for breakout traffic
Magic WAN Connector now lets you pin breakout traffic to a specific WAN port for deterministic egress. This ensures critical apps like Zoom or Teams use the fastest path, with automatic failover if the preferred port goes down. Aimed at multi‑ISP setups needing predictable performance.
Magic WAN Connector
Magic WAN Connector now allows you to designate a specific WAN port for breakout traffic, giving you deterministic control over the egress path for latency-sensitive applications.
- Pin breakout traffic for specific applications to a preferred WAN port.
- Ensure critical traffic (such as Zoom or Teams) always uses your fastest or most reliable connection.
- Benefit from automatic failover to standard WAN port priority if the preferred port goes down.
This is useful for organizations with multiple ISP uplinks who need predictable egress behavior for performance-sensitive traffic.
For configuration details, refer to Designate WAN ports for breakout apps.
Original source Report a problem