Originally, we built Tunnel to solve a straightforward problem. This means that only traffic that routes through Cloudflare can reach your origin. Instead, this private connection is established by running a lightweight daemon, cloudflared, on your origin, which creates a secure, outbound-only connection. With Tunnel, users can create a private link from their origin server directly to Cloudflare without a publicly routable IP address. We built Tunnel to help alleviate that burden. Traditionally, from the moment an Internet property is deployed, developers spend an exhaustive amount of time and energy locking it down through access control lists, rotating ip addresses, or clunky solutions like GRE tunnels. In 2018, Cloudflare introduced Argo Tunnel, a private, secure connection between your origin and Cloudflare. If you’re interested in how and why we’re doing this, keep scrolling. You can still add the paid Argo Smart Routing feature to accelerate traffic.Īs part of that change (and to reduce confusion), we’re also renaming the product to Cloudflare Tunnel. Starting today, we’re excited to announce that any organization can use the secure, outbound-only connection feature of the product at no cost. In the past, Argo Tunnel has been priced based on bandwidth consumption as part of Argo Smart Routing, Cloudflare’s traffic acceleration feature. With this model, your team does not need to go through the hassle of poking holes in your firewall or validating that traffic originated from Cloudflare IPs. Argo Tunnel, our secure method of connecting resources directly to Cloudflare, is the next piece of the puzzle.Īrgo Tunnel creates a secure, outbound-only connection between your services and Cloudflare by deploying a lightweight connector in your environment. A few months ago, we announced that we wanted to make Zero Trust security accessible to everyone, regardless of size, scale, or resources.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |