Network Security Updates & Release Notes

30 updates curated from 1 source by the Releasebot Team. Last updated: May 16, 2026

Get this feed:
  • May 11, 2026
    • Date parsed from source:
      May 11, 2026
    • First seen by Releasebot:
      May 16, 2026
    Cloudflare logo

    Network Security by Cloudflare

    Cloudflare WAN, Magic Transit - NAT-T support for IKE on UDP port 500

    Network Security adds standard NAT-T support for Cloudflare IPsec, letting devices behind NAT start IKE on UDP 500 or 4500 and complete handshakes successfully after NAT detection, with no Cloudflare config changes and no impact to existing tunnels.

    Cloudflare IPsec now supports the standard NAT traversal (NAT-T) flow, where IKE begins on UDP port 500 and switches to UDP port 4500 after NAT is detected.

    Previously, devices behind NAT had to be configured to initiate IKE on UDP port 4500 directly. Devices that started on UDP port 500 could not complete the IKE handshake when NAT was in the path. This required custom configuration on devices such as VeloCloud SD-WAN edges, Cisco IOS-XE routers, and Juniper SRX firewalls, and was not possible on every platform.

    What changed

    Devices behind NAT can now initiate IKE on either UDP port 500 or UDP port 4500.

    Devices that start IKE on UDP port 500 and switch to UDP port 4500 after NAT detection now complete the handshake successfully.

    No configuration change is required on Cloudflare. The change is available for all IPsec tunnels on Cloudflare WAN and Magic Transit.

    This change does not affect existing tunnels:

    Tunnels using UDP port 500 with no NAT detected continue to operate as before.

    Tunnels configured to start IKE on UDP port 4500 continue to operate as before.

    NAT detection logic is unchanged.

    For configuration details, refer to GRE and IPsec tunnels.

    Original source
  • Apr 21, 2026
    • Date parsed from source:
      Apr 21, 2026
    • First seen by Releasebot:
      May 7, 2026
    Cloudflare logo

    Network Security by Cloudflare

    Cloudflare Network Firewall, Magic Transit, Cloudflare WAN - Country rules supported in Unified Routing

    Network Security adds Cloudflare Advanced Network Firewall Country rules for Unified Routing accounts, enabling geography-based firewall policies by source or destination country. It marks the first Advanced Network Firewall feature available in Unified Routing, with more capabilities planned.

    Cloudflare Advanced Network Firewall Country rules are now supported for accounts using Unified Routing mode. This feature requires a Cloudflare Advanced Network Firewall subscription.

    You can create firewall rules that match traffic based on source or destination country to enforce geographic access policies across your network.

    This is the first of the Cloudflare Advanced Network Firewall features to become available in Unified Routing. Support for additional features - IP Lists, ASN Lists, Threat Intel Lists, IDS, Rate Limiting, SIP, and Managed Rulesets - is planned.

    For the full list of current beta limitations, refer to Traffic steering beta limitations.

    Original source
  • All of your release notes in one feed

    Join Releasebot and get updates from Cloudflare and hundreds of other software products.

    Create account
  • Mar 24, 2026
    • Date parsed from source:
      Mar 24, 2026
    • First seen by Releasebot:
      Mar 26, 2026
    Cloudflare logo

    Network Security by Cloudflare

    Network Interconnect - Interconnects moved to Connectors

    Network Security removes the top-level Interconnects page and moves it to Connectors > Interconnects, with configs unchanged.

    The top-level Interconnects page in the Cloudflare dashboard has been removed. Interconnects are now located under Connectors > Interconnects.

    Your existing configurations and functionality remain the same.

    Original source
  • Feb 17, 2026
    • Date parsed from source:
      Feb 17, 2026
    • First seen by Releasebot:
      Feb 18, 2026
    Cloudflare logo

    Network Security by Cloudflare

    Cloudflare One, Cloudflare WAN, Cloudflare Network Firewall, Network Flow - Cloudflare One Product Name Updates

    Cloudflare renames networking products to align with SASE and Zero Trust, clarifying each tool’s role. Old names become Cloudflare branded equivalents, with no action needed and no changes to functionality or billing.

    We are updating naming related to some of our Networking products to better clarify their place in the Zero Trust and Secure Access Service Edge (SASE) journey.
    We are retiring some older brand names in favor of names that describe exactly what the products do within your network. We are doing this to help customers build better, clearer mental models for comprehensive SASE architecture delivered on Cloudflare.

    What's changing

    • Magic WAN → Cloudflare WAN
    • Magic WAN IPsec → Cloudflare IPsec
    • Magic WAN GRE → Cloudflare GRE
    • Magic WAN Connector → Cloudflare One Appliance
    • Magic Firewall → Cloudflare Network Firewall
    • Magic Network Monitoring → Network Flow

    No action is required by you — all functionality, existing configurations, and billing will remain exactly the same.

    For more information, visit the Cloudflare One documentation.

    Original source
  • Jan 30, 2026
    • Date parsed from source:
      Jan 30, 2026
    • First seen by Releasebot:
      Jan 31, 2026
    • Modified by Releasebot:
      May 16, 2026
    Cloudflare logo

    Network Security by Cloudflare

    Cloudflare WAN, Magic Transit, Cloudflare One - BGP over GRE and IPsec tunnels

    Network Security adds beta BGP peering management for Magic WAN and Magic Transit in the Cloudflare dashboard, helping customers automate route changes, detect failures faster, and securely exchange routes over IPsec and GRE tunnel on-ramps.

    Magic WAN and Magic Transit customers can use the Cloudflare dashboard to configure and manage BGP peering between their networks and their Magic routing table when using IPsec and GRE tunnel on-ramps (beta).

    Using BGP peering allows customers to:

    • Automate the process of adding or removing networks and subnets.
    • Take advantage of failure detection and session recovery features.

    With this functionality, customers can:

    • Establish an eBGP session between their devices and the Magic WAN / Magic Transit service when connected via IPsec and GRE tunnel on-ramps.
    • Secure the session by MD5 authentication to prevent misconfigurations.
    • Exchange routes dynamically between their devices and their Magic routing table.

    For configuration details, refer to:

    • Configure BGP routes for Magic WAN
    • Configure BGP routes for Magic Transit
    Original source
  • Jan 27, 2026
    • Date parsed from source:
      Jan 27, 2026
    • First seen by Releasebot:
      Jan 30, 2026
    Cloudflare logo

    Network Security by Cloudflare

    Configure Cloudflare source IPs (beta)

    Magic WAN now lets you set the source IP range Cloudflare uses for traffic to private networks, replacing public IPs with a dedicated private CIDR. This enables symmetric routing, better firewall state, and keeps private traffic on secure paths; IPv4 defaults to 100.64.0.0/12 (configurable to any /12), IPv6 is 2606:4700:cf1:5000::/64 (not configurable).

    Magic WAN now allows you to configure the source IP address range used by Cloudflare services (such as Load Balancing, Gateway, and Browser Isolation) when sending traffic to your private networks. Previously, traffic to private networks was sourced from public Cloudflare IPs, which may have caused IP conflicts. With this feature, you can now configure a dedicated, non-Internet-routable private IP range to ensure:

    • Symmetric routing over private network connections
    • Proper firewall state preservation
    • Private traffic stays on secure paths

    Key details

    • IPv4: Sourced from 100.64.0.0/12 by default, configurable to any /12 CIDR
    • IPv6: Sourced from 2606:4700:cf1:5000::/64 (not configurable)
    • Affected connectors: GRE, IPsec, CNI, WARP Connector, and WARP Client (Cloudflare Tunnel is not affected)

    Configuring Cloudflare source IPs requires Cloudflare One Unified Routing (beta) and the "Cloudflare One Networks Write" permission.
    For configuration details, refer to Configure Cloudflare source IPs.

    Original source
  • Jan 27, 2026
    • Date parsed from source:
      Jan 27, 2026
    • First seen by Releasebot:
      Jan 28, 2026
    • Modified by Releasebot:
      Jan 30, 2026
    Cloudflare logo

    Network Security by Cloudflare

    Control request and response body buffering in Configuration Rules

    Cloudflare introduces configurable HTTP body buffering in Configuration Rules. Choose request buffering modes Standard, Full, or None and response buffering Standard or None, enabling or disabling inspection. Disabling buffering may affect security features like WAF and Bot Management for zones with the latest proxy.

    You can now control how Cloudflare buffers HTTP request and response bodies using two new settings in Configuration Rules.

    Request body buffering

    Controls how Cloudflare buffers HTTP request bodies before forwarding them to your origin server:

    Mode Behavior Standard (default) Cloudflare can inspect a prefix of the request body for enabled functionality such as WAF and Bot Management. Full Buffers the entire request body before sending to origin. None No buffering. The request body streams directly to origin without inspection.

    Response body buffering

    Controls how Cloudflare buffers HTTP response bodies before forwarding them to the client:

    Mode Behavior Standard (default) Cloudflare can inspect a prefix of the response body for enabled functionality. None No buffering. The response body streams directly to the client without inspection.

    Warning

    Setting body buffering to None may break security functionality that requires body inspection, including the Web Application Firewall (WAF) and Bot Management. Ensure that any paths where you disable buffering do not require security inspection.

    Availability

    These settings only take effect on zones running Cloudflare's latest CDN proxy. Enterprise customers can contact their account team to enable the latest proxy on their zones.

    API example

    {
      "action": "set_config",
      "action_parameters": {
        "request_body_buffering": "standard",
        "response_body_buffering": "none"
      }
    }
    

    For more information, refer to Configuration Rules.

    Original source
  • Jan 22, 2026
    • Date parsed from source:
      Jan 22, 2026
    • First seen by Releasebot:
      Jan 22, 2026
    Cloudflare logo

    Network Security by Cloudflare

    New cryptographic functions — encode_base64() and sha256()

    Cloudflare Rulesets adds encode_base64 and sha256 functions to build signed request headers in rule expressions. Encode supports standard and URL-safe Base64 with optional padding; sha256 hashes the input (Enterprise add-on). A clear, actionable feature update for developers.

    New functions

    Cloudflare Rulesets now includes encode_base64() and sha256() functions, enabling you to generate signed request headers directly in rule expressions. These functions support common patterns like constructing a canonical string from request attributes, computing a SHA256 digest, and Base64-encoding the result.

    Function Description Availability

    Function Description Availability encode_base64(input, flags) Encodes a string to Base64 format. Optional flags parameter: u for URL-safe encoding, p for padding (adds = characters to make the output length a multiple of 4, as required by some systems). By default, output is standard Base64 without padding. All plans (in header transform rules) sha256(input) Computes a SHA256 hash of the input string. Requires enablement

    Note

    The sha256() function is available as an Enterprise add-on and requires a specific entitlement. Contact your account team to enable it.

    Examples

    Encode a string to Base64 format:

    encode_base64("hello world")
    

    Returns:

    aGVsbG8gd29ybGQ
    

    Encode a string to Base64 format with padding:

    encode_base64("hello world", "p")
    

    Returns:

    aGVsbG8gd29ybGQ=
    

    Perform a URL-safe Base64 encoding of a string:

    encode_base64("hello world", "u")
    

    Returns:

    aGVsbG8gd29ybGQ
    

    Compute the SHA256 hash of a secret token:

    sha256("my-token")
    

    Returns a hash that your origin can validate to authenticate requests.

    Compute the SHA256 hash of a string and encode the result to Base64 format:

    encode_base64(sha256("my-token"))
    

    Combines hashing and encoding for systems that expect Base64-encoded signatures.

    For more information, refer to the Functions reference.

    Original source
  • Jan 20, 2026
    • Date parsed from source:
      Jan 20, 2026
    • First seen by Releasebot:
      Jan 21, 2026
    Cloudflare logo

    Network Security by Cloudflare

    New functions for array and map operations

    Cloudflare Rulesets gain powerful new functions for advanced expression logic on arrays and maps. Split, join, has_key and has_value enable header list checks and country‑based routing. This is a real feature release with practical capabilities.

    Cloudflare Rulesets

    Cloudflare Rulesets now include new functions that enable advanced expression logic for evaluating arrays and maps. These functions allow you to build rules that match against lists of values in request or response headers, enabling use cases like country-based blocking using custom headers.

    New functions

    Function Description split(source, delimiter) Splits a string into an array of strings using the specified delimiter. join(array, delimiter) Joins an array of strings into a single string using the specified delimiter. has_key(map, key) Returns true if the specified key exists in the map. has_value(map, value) Returns true if the specified value exists in the map.

    Example use cases

    Check if a country code exists in a header list:

    has_value(split(http.response.headers["x-allow-country"][0], ","), ip.src.country)
    

    Check if a specific header key exists:

    has_key(http.request.headers, "x-custom-header")
    

    Join array values for logging or comparison:

    join(http.request.headers.names, ", ")
    

    For more information, refer to the Functions reference.

    Original source
  • Jan 15, 2026
    • Date parsed from source:
      Jan 15, 2026
    • First seen by Releasebot:
      Jan 16, 2026
    • Modified by Releasebot:
      May 7, 2026
    Cloudflare logo

    Network Security by Cloudflare

    Magic Transit, Cloudflare Network Firewall, Cloudflare WAN, Network Flow - Network Services navigation update

    Network Security releases a refreshed Cloudflare Network Services dashboard that reorganizes navigation around solutions and capabilities, adds a new Overview page, renames Magic Firewall policies, and moves analytics and diagnostics into clearer Insights sections.

    The Network Services menu structure in Cloudflare's dashboard has been updated to reflect solutions and capabilities instead of product names. This will make it easier for you to find what you need and better reflects how our services work together.

    Your existing configurations will remain the same, and you will have access to all of the same features and functionality.

    The changes visible in your dashboard may vary based on the products you use. Overall, changes relate to Magic Transit, Magic WAN, and Magic Firewall.

    Summary of changes

    • A new Overview page provides access to the most common tasks across Magic Transit and Magic WAN.
    • Product names have been removed from top-level navigation.
    • Magic Transit and Magic WAN configuration is now organized under Routes and Connectors. For example, you will find IP Prefixes under Routes, and your GRE/IPsec Tunnels under Connectors.
    • Magic Firewall policies are now called Firewall Policies.
    • Magic WAN Connectors and Connector On-Ramps are now referenced in the dashboard as Appliances and Appliance profiles. They can be found under Connectors > Appliances.
    • Network analytics, network health, and real-time analytics are now available under Insights.
    • Packet Captures are found under Insights > Diagnostics.
    • You can manage your Sites from Insights > Network health.
    • You can find Magic Network Monitoring under Insights > Network flow.

    If you would like to provide feedback, complete this form. You can also find these details in the January 7, 2026 email titled [FYI] Upcoming Network Services Dashboard Navigation Update.

    Original source
  • Jan 12, 2026
    • Date parsed from source:
      Jan 12, 2026
    • First seen by Releasebot:
      Jan 13, 2026
    Cloudflare logo

    Network Security by Cloudflare

    Metro code field now available in Rules

    The ip.src.metro_code field in the Ruleset Engine is now populated with DMA (Designated Market Area) data. You can use this field to build rules that target traffic based on geographic market areas, enabling more granular location-based policies for your applications.

    Field details

    • Field: ip.src.metro_code
    • Type: String | null
    • Description: The metro code (DMA) of the incoming request's IP address. Returns the designated market area code for the client's location.

    Example filter expression:

    ip.src.metro_code eq "501"
    

    For more information, refer to the Fields reference.

    Original source
  • Dec 31, 2025
    • Date parsed from source:
      Dec 31, 2025
    • First seen by Releasebot:
      Jan 28, 2026
    Cloudflare logo

    Network Security by Cloudflare

    Breakout traffic visibility via NetFlow

    NetFlow export for Magic WAN Connector

    Magic WAN Connector now exports NetFlow data for breakout traffic to Magic Network Monitoring (MNM), providing visibility into traffic that bypasses Cloudflare's security filtering.

    • Monitor breakout traffic statistics in the Cloudflare dashboard.
    • View traffic patterns for applications configured to bypass Cloudflare.
    • Maintain visibility across all traffic passing through your Magic WAN Connector.

    For more information, refer to NetFlow statistics.

    Original source
  • Nov 6, 2025
    • Date parsed from source:
      Nov 6, 2025
    • First seen by Releasebot:
      Jan 28, 2026
    Cloudflare logo

    Network Security by Cloudflare

    Designate WAN link for breakout traffic

    Magic WAN Connector now lets you pin breakout traffic to a specific WAN port for deterministic egress. This ensures critical apps like Zoom or Teams use the fastest path, with automatic failover if the preferred port goes down. Aimed at multi‑ISP setups needing predictable performance.

    Magic WAN Connector

    Magic WAN Connector now allows you to designate a specific WAN port for breakout traffic, giving you deterministic control over the egress path for latency-sensitive applications.

    • Pin breakout traffic for specific applications to a preferred WAN port.
    • Ensure critical traffic (such as Zoom or Teams) always uses your fastest or most reliable connection.
    • Benefit from automatic failover to standard WAN port priority if the preferred port goes down.

    This is useful for organizations with multiple ISP uplinks who need predictable egress behavior for performance-sensitive traffic.

    For configuration details, refer to Designate WAN ports for breakout apps.

    Original source
  • Nov 6, 2025
    • Date parsed from source:
      Nov 6, 2025
    • First seen by Releasebot:
      Jan 28, 2026
    Cloudflare logo

    Network Security by Cloudflare

    Automatic Return Routing (Beta)

    Magic WAN introduces Automatic Return Routing in Beta, enabling on-ramps to learn the return path without static routes. Benefits include route-less operation, overlap IP space support, and symmetric routing, with Unified Routing required.

    Magic WAN now supports Automatic Return Routing (ARR)

    Magic WAN now supports Automatic Return Routing (ARR), allowing customers to configure Magic on-ramps (IPsec/GRE/CNI) to learn the return path for traffic flows without requiring static routes.

    Key benefits

    • Route-less mode: Static or dynamic routes are optional when using ARR.
    • Overlapping IP space support: Traffic originating from customer sites can use overlapping private IP ranges.
    • Symmetric routing: Return traffic is guaranteed to use the same connection as the original on-ramp.

    This feature is currently in Beta and requires the new Unified Routing mode.

    For configuration details, refer to Configure Automatic Return Routing.

    Original source
  • Oct 30, 2025
    • Date parsed from source:
      Oct 30, 2025
    • First seen by Releasebot:
      Nov 1, 2025
    • Modified by Releasebot:
      Dec 18, 2025
    Cloudflare logo

    Network Security by Cloudflare

    New TCP-based fields available in Rulesets

    Cloudflare adds new Ruleset fields to inspect TCP usage and RTT, enabling policy decisions based on protocol and network performance. Users can distinguish TCP vs QUIC and route high latency requests to origins with a concise example.

    Cloudflare now provides two new request fields in the Ruleset engine that let you make decisions based on whether a request used TCP and the measured TCP round-trip time between the client and Cloudflare. These fields help you understand protocol usage across your traffic and build policies that respond to network performance. For example, you can distinguish TCP from QUIC traffic or route high latency requests to alternative origins when needed.

    New fields

    | Field | Type | Description |
    | cf.edge.client_tcp | Boolean | Indicates whether the request used TCP. A value of true means the client connected using TCP instead of QUIC. |
    | cf.timings.client_tcp_rtt_msec | Number | Reports the smoothed TCP round-trip time between the client and Cloudflare in milliseconds. For example, a value of 20 indicates roughly twenty milliseconds of RTT. |

    Example filter expression:

    cf.edge.client_tcp && cf.timings.client_tcp_rtt_msec < 100
    

    More information can be found in the Rules language fields reference.

    Original source
Releasebot

Curated by the Releasebot team

Releasebot is an aggregator of official product update announcements from hundreds of software vendors and thousands of sources.

Our editorial process involves the manual review and audit of release notes procured with the help of automated systems.

Similar to Network Security with recent updates: