Gateway Enforcement
DNS-based enforcement at the Cloudflare edge with zero-code setup
What is Gateway Enforcement?
The Checkpoint Gateway is a DNS-based enforcement layer that runs at the Cloudflare edge. By adding a DNS record that points your domain to the Gateway, all traffic passes through Checkpoint's WASM detection engine before reaching your origin server. No code changes are required.
User → DNS → Checkpoint Gateway → WASM Detection → Policy Enforcement → Your Origin
↓
Dashboard AnalyticsPrerequisites
- A Checkpoint project (create one in the dashboard)
- Access to your domain's DNS settings
- A domain or subdomain to protect
Setup
1. Add a Gateway in the Dashboard
- Navigate to Project Settings → Enforce
- Click Add Gateway
- Enter the domain or subdomain you want to protect
- Checkpoint generates the DNS records you need to add
2. Configure DNS
Add the DNS record shown in the dashboard. The record type depends on your domain:
Subdomains (CNAME)
For subdomains like shop.example.com or api.example.com:
Type: CNAME
Name: shop
Value: detect.checkpoint-gateway.ai
TTL: AutoApex Domains
For root domains like example.com, use one of these approaches depending on your DNS provider:
CNAME flattening (Cloudflare, Route 53, Netlify DNS):
Type: CNAME
Name: @
Value: detect.checkpoint-gateway.ai
TTL: AutoA record (providers that don't support CNAME flattening):
Type: A
Name: @
Value: <IP address from dashboard>
TTL: AutoMost modern DNS providers support CNAME flattening at the apex. Check with your provider if you're unsure.
3. Wait for Verification
After adding the DNS record:
- Checkpoint detects the DNS change (usually within 1–5 minutes)
- SSL/TLS certificate is provisioned automatically
- The Gateway status in the dashboard changes to Active
DNS propagation can take up to 48 hours in some cases, though most providers propagate within minutes. If verification hasn't completed after 30 minutes, check your DNS configuration.
4. Configure Policies
Once the Gateway is active, configure policies to determine how detected agents are handled.
How It Works
Request Flow
- A visitor's browser sends a request to your domain
- DNS resolves to the Checkpoint Gateway
- The Gateway extracts request metadata (headers, IP, TLS fingerprint, user agent)
- The WASM detection engine classifies the request
- If signature headers are present, Ed25519 verification runs
- The configured policy is applied
- If allowed, the request is proxied to your origin
- The detection is logged to the dashboard
Edge Detection
The Gateway uses a WebAssembly detection module that runs at Cloudflare's edge network, providing:
- Sub-5ms detection latency (p95)
- 300+ edge locations worldwide
- No impact on origin server performance
- TLS fingerprint analysis (JA3/JA4)
SSL/TLS
Checkpoint provisions and manages TLS certificates automatically for your Gateway domains. Certificates are issued by Cloudflare and renewed before expiration.
Custom Domains
You can add multiple domains or subdomains to a single project. Each domain gets its own DNS record and independent Gateway instance.
Common setups:
| Domain | Purpose |
|---|---|
www.example.com | Main website |
shop.example.com | E-commerce storefront |
api.example.com | API endpoints |
Dashboard Monitoring
The Enforce settings page shows real-time Gateway status:
| Status | Meaning |
|---|---|
| Pending | DNS record not yet detected |
| Provisioning | SSL certificate being issued |
| Active | Gateway operational, traffic flowing |
| Error | Configuration issue (see details) |
See Monitoring for health endpoints and troubleshooting.
Troubleshooting
DNS Record Not Detected
- Verify the CNAME target is exactly
detect.checkpoint-gateway.ai(as shown in the dashboard) - Check for typos in the record name or value
- Ensure no conflicting A records exist for the same name
- Wait for DNS propagation (use
digornslookupto check)
dig shop.example.com CNAME +short
# Should return: detect.checkpoint-gateway.aiSSL Certificate Not Provisioning
- Ensure the DNS record is correctly pointing to the Gateway
- Check that no CAA records block certificate issuance
- If using Cloudflare DNS, ensure the proxy is disabled (DNS-only / grey cloud)
Origin Not Reachable
- Verify your origin server is accessible from the public internet
- Check that your origin accepts traffic from Cloudflare IP ranges
- Ensure no firewall rules are blocking the Gateway
Next Steps
- Policies — Configure what happens when agents are detected
- Detection in Enforce Mode — How the Gateway detects agents
- Monitoring — Health endpoints and status checks