|
| 1 | +--- |
| 2 | +title: Gateway will now evaluate Network policies before HTTP policies from July 14th, 2025 |
| 3 | +description: Gateway Network policies (Layer 4) will be evaluated before HTTP (Layer 7) policies from July 14th, 2025 |
| 4 | +products: |
| 5 | + - gateway |
| 6 | +hidden: false |
| 7 | +date: 2025-06-18T11:00:00Z |
| 8 | +--- |
| 9 | +[Gateway](/cloudflare-one/policies/gateway/) will now evaluate [Network (Layer 4) policies](/cloudflare-one/policies/gateway/network-policies/) **before** [HTTP (Layer 7) policies](/cloudflare-one/policies/gateway/http-policies/). This change preserves your existing security posture and does not affect which traffic is filtered — but it may impact how notifications are displayed to end users. |
| 10 | + |
| 11 | +This change will roll out progressively between **July 14–18, 2025**. If you use HTTP policies, we recommend reviewing your configuration ahead of rollout to ensure the user experience remains consistent. |
| 12 | + |
| 13 | +### Updated order of enforcement |
| 14 | + |
| 15 | +**Previous order:** |
| 16 | +1. DNS policies |
| 17 | +2. HTTP policies |
| 18 | +3. Network policies |
| 19 | + |
| 20 | +**New order:** |
| 21 | +1. DNS policies |
| 22 | +2. **Network policies** |
| 23 | +3. **HTTP policies** |
| 24 | + |
| 25 | +### Action required: Review your Gateway HTTP policies |
| 26 | + |
| 27 | +This change may affect block notifications. For example: |
| 28 | + |
| 29 | +- You have an **HTTP policy** to block `example.com` and display a block page. |
| 30 | +- You also have a **Network policy** to block `example.com` silently (no client notification). |
| 31 | + |
| 32 | +With the new order, the Network policy will trigger first — and the user will no longer see the HTTP block page. |
| 33 | + |
| 34 | +To ensure users still receive a block notification, you can: |
| 35 | +- Add a client notification to your Network policy, or |
| 36 | +- Use only the HTTP policy for that domain. |
| 37 | + |
| 38 | +--- |
| 39 | + |
| 40 | +### Why we’re making this change |
| 41 | + |
| 42 | +This update is based on user feedback and aims to: |
| 43 | + |
| 44 | +- Create a more intuitive model by evaluating network-level policies before application-level policies. |
| 45 | +- Minimize [526 connection errors](/support/troubleshooting/http-status-codes/cloudflare-5xx-errors/error-526/#error-526-in-the-zero-trust-context) by verifying the network path to an origin before attempting to establish a decrypted TLS connection. |
| 46 | + |
| 47 | +--- |
| 48 | + |
| 49 | +To learn more, visit the [Gateway order of enforcement documentation](/cloudflare-one/policies/gateway/order-of-enforcement/). |
0 commit comments