Cloudflare Whitepaper Reference Architecture For Internet-Native Transformation
Cloudflare Whitepaper Reference Architecture For Internet-Native Transformation
Self-hosted private DC, Self-hosted public cloud SaaS and email Internet
✖ Unsupported use case and security
colo or cloud (non-Web) (AWS, GCP, Azure) (M365, GSuite) (FB, Reddit)
Before Internal users ✓ “Trusted” location, device, or employee role ✓ Corporate IdP n/a
Cloudflare (office and remote) ✖ “Untrusted” location, BYO device, contractor role ✖ Social IdP
External users ✖ “Untrusted” IoT device or B2B customer role ✖ Social IdP n/a
On-network connectivity “Trusted” direct LAN “Trusted” private link One “Untrusted” egress point
Access security stack ✓ FW, IDS (w/ LB, DNS) ✓ FW (with LB) ✓ SWG, SEG, DLP (sometimes)
✖ WAF, DDoS, ZTNA, SWG, SEG, RBI, DLP ✖ CES, CASB, RBI
With Internal users ✓ Any verified identity (role-based optional), any device (posture-based optional),
Cloudflare (office and remote) any location (context-based optional)
External users ✓ Any verified identity via any IdP (context-based optional, e.g. mTLS, OTP) n/a
Access security stack ✓ FW, IDS, WAF, DDoS, ZTNA, SWG, SEG, RBI, DLP ✓ SWG, SEG/CES, CASB, RBI, DLP
(with LB, DNS) (with ZT rules)
According to Gartner®
“By 2025, at least 70% of new remote
access deployments will be served
predominantly by ZTNA as opposed to
VPN services, up from less than 10% at
the end of 2021.” 1
According to Gartner®
“By 2025, 30% of organizations will
rely solely on SaaS applications for
their mission-critical workflows.” 2
Remote and external users Public cloud, SaaS apps & email Modern threats
New Internet connectivity expands New Internet connectivity breaks Excessive trust within offices and
beyond our offices. New Zero out of our offices. New Zero Trust data centers is exploited. New
Trust security is bolted on with security expands to combine Zero Trust security is bolted on
reverse proxy and isolation modes API-driven with inline proxy modes with forward proxy and isolation
to secure access for untrusted to secure access to apps and email modes to secure access against
users, devices, and locations. beyond our private network. lateral movement.
DNSF
SD-WAN
AWS
ZTNA Transit
Gateway
DMVPN
CASB
4G/5G
“By 2025, 80% of enterprises will have adopted a strategy to unify web, cloud services and
private application access using a SASE/SSE architecture, up from 20% in 2021.” 3
L2 Direct Cloudflare
See options on left Network resources
Data Connection
that cannot be
centers Magic WAN w/CNI Magic WAN proxied
Network
Locations w/ services Internal Many L4 subnets
L3 Anycast IPsec L4 QUIC
unencrypted proxy host w/ w/non-web apps
Magic WAN Transport East-West Tunnel
WAN traffic our daemon RDP, SMB, DNS
L3-7 Traffic with
Smart Routing for
Locations w/ Acceleration Internal Many L7 app
L3 Anycast GRE L4 QUIC
encrypted proxy host w/ servers
WAN traffic Magic WAN Tunnel our daemon HTTP, SSH, VNC
Multi-Direction
Locations Traffic Flows
L4 QUIC L7 app server with
L7 DNS (1.1.1.1)
without closed inbound port
WAN traffic Gateway DNS Tunnel w/ our daemon
Zero Trust
services
Users on L7 app server with
L4 Wireguard L7 HTTPS
managed device Proxy North-South open inbound port
w/ our client* WARP L4-7 Requests with DNS (reverse proxy) to Internet
Identity & Endpoint
Users on Integrations Internet, SaaS apps & email
L7 HTTPS L3 IP
unmanaged w/ optional out-of-band API and inline
device DNS (reverse proxy)
MX, SAML, or URL-rewrite on-ramps
● Access control: Access and Gateway w/CASB Customers also benefit from our application services
● Traffic filtering: Gateway & Area 1 Email Security that run inline with our Zero Trust services. Many are
already enabled by default within your license.
● Content inspection: Gateway and Area 1
● Protect apps with open ports: L7 DDoS Protection
● Threat and data protection: Area 1 and
Gateway w/Browser Isolation, CASB and DLP ● Prevent contractors from exploiting apps: WAF
● Simplify on-ramping traffic to apps: DNS
Network services
● Increase app reliability with zero downtime: LB
● Access control: Magic Firewall
● Reduce bandwidth costs and improve UX: CDN
● Traffic routing optimization: Magic WAN
● Intrusion detection: Magic Firewall
● DDoS protection: Magic Transit
Public
Domains All Domains (some Orange-Clouded) Orange-Clouded Domains Your SaaS apps and email
Recursive DNS (w/filter & bypass rules) Authoritative DNS … MX Cloud Email Security
(w/link isolation coming)
Public or Private IPs Cloudflare or Customer IPs
CASB
Private IP NAT* coming soon DDoS Protection
Non-
TCP or TCP/UDP Traffic
UDP
Traffic TLS Termination (w/bypass rules)
HTTP/S Traffic
Non-
Remote Browser Isolation HTTP/S
Traffic
Data Loss Prevention
Every server
Serverless Web Apps (e.g. SSH/VNC in-browser terminal) can run every
edge service
Bot Mgmt
in a single pass
Web Application Firewall
Content Distribution
Load Balancer
ZTNA (w/CASB and force SWG rules) * N/A for PAC or URL-rewrite
Network Optimization
Supports identity using
Public IPs Private, Cloudflare, or Customer IPs either an identity proxy or
embedded identifiers
Public IP NAT Private IP NAT coming soon
Applies to customer-
owned apps with
orange-clouded domains
Internet Tunnel, IPsec, GRE, CNI, WARP
Acronyms: Sources:
● BEC = Business Email Compromise ● MPLS = Multiprotocol Label Switching 1. Gartner, Emerging Technologies: Adoption Growth
● CASB = Cloud Access Security Broker ● RBI = Remote Browser Isolation Insights for Zero Trust Network Access,
● CDN = Content Delivery Network ● RDP = Remote Desktop Protocol 8 April 2022 (link)
● CES = Cloud Email Security ● SD-WAN = Software-Defined WAN
● DDoS = Distributed Denial of Service ● SEG = Secure Email Gateway 2. Gartner, How to Establish Effective SaaS Governance, 27
● DLP = Data Loss Prevention ● SMB = Server Message Block December 2021 (link)
● DNS = Domain Name System ● SWG = Secure Web Gateway 3. Gartner, 2022 Strategic Roadmap for SASE
● DNSF = DNS Filter ● WAF = Web Application Firewall Convergence, 24 June 2022 (link)
● FW = Firewall ● WAN = Wide Area Network
● IDS = Intrusion Detection System ● VPN = Virtual Private Network GARTNER is a registered trademark of Gartner, Inc. and/or its affiliates in the
● LB = Load Balancer ● ZTNA = Zero Trust Network Access U.S. and internationally and are used herein with permission. All rights reserved.