Cloudflare Knows Who Gets In. Does It Know What’s Already There?

Cloudflare Zero Trust secures users, applications, and internet traffic, enforcing identity and device posture at the access layer. But device posture only works for devices that can run an agent and authenticate. The devices that connect without logging in, from factory equipment to unmanaged endpoints, sit outside its design scope. In manufacturing, OT, IoT, branch, hospital, and logistics environments, that boundary is where the real exposure begins. This piece maps where Cloudflare’s coverage ends, walks through four real deployment scenarios where the gap surfaces, and shows how Genian NAC extends device posture to every connected device, including the ones that never authenticate, without disrupting what Cloudflare already protects.

Team Genians

May 11, 2026

Cloudflare has transformed the Zero Trust journey for many organizations. Cloudflare Access enforces identity- and device posture-based access control when users reach self-hosted, SaaS, and non-web applications. Cloudflare Tunnel and private network capabilities extend that protection to private and non-HTTP resources. Cloudflare One operates at Layer 3 and above — securing users, applications, and internet traffic.

But in manufacturing, OT, IoT, branch, hospital, and logistics environments, a prior question surfaces before any of that applies: App access is controlled. But who controls what connects to the network itself?

That is a Layer 2 question. Cloudflare does not address it by design. Genian NAC does.

Cloudflare protects the access path. Genian NAC protects the first connection.

What Cloudflare Does Well

Cloudflare One’s device posture checks feed directly into Access and Gateway policies — via the Cloudflare One Client, third-party endpoint providers, or custom posture integrations where an external API returns a 0–100 score used in policy decisions.

QuestionCloudflare Fit
Who is this user?High
What application is this user trying to reach?High
Does this device meet posture requirements?High
Should access to this private resource be allowed?High
Is this traffic protected through the Cloudflare network?High

On the operational network, the questions change.

The Questions the Operational Network Asks

Manufacturing and OT environments have more devices than users. PLCs, HMIs, industrial PCs, cameras, sensors, printers, badge readers, barcode scanners, IIoT gateways, vendor laptops, and legacy Windows machines all coexist on the same network.

  • Many devices do not perform SAML login.
  • Many devices cannot run an endpoint agent.
  • Some devices do not support 802.1X at all.
Operational Network QuestionControl Required
What is this device?Device visibility
Where did it connect?Layer 2 / switch port visibility
Is it IT, OT, IoT, guest, or contractor?Device classification
Is it in an approved segment?Network access policy
Is it an unknown device?Restriction or quarantine
If it’s an exception, does it have an owner, approval, and expiry?Exception governance

This is not a ZTNA problem. It is a NAC problem.

The Layer Zero Trust Doesn’t Reach

Cloudflare’s writing on IoT security states this directly. Cloudflare distinguishes between controlled environments — like a corporate office — and old production networks, multi-vendor environments, and settings dense with machine-to-machine connections. In the latter, Cloudflare acknowledges that providing the same Zero Trust guarantees becomes difficult.

A concrete example appears in the Cloudflare Community. One user attempted to use Cloudflare Tunnel to reach a PLC via an HMI application, referencing port 44818 used by EtherNet/IP. The thread concluded that Cloudflare Tunnel has no solution for this case.

Reaching a PLC through a tunnel and identifying what that PLC is, determining which segment it belongs in, and isolating a device that was never approved — these are different problems.

The tunnel creates the path. NAC judges the connection.

Device Posture and Device Platform Intelligence Are Not Competing

Cloudflare device posture provides health signals for access policies: whether a device runs the Cloudflare One Client, meets OS or certificate conditions, or passes signals from an endpoint security provider.

Genian NAC and Device Platform Intelligence answer a different question:

“What exactly is this device?”

Genian NAC uses a non-intrusive, Layer 2-based Network Sensor to monitor IP-enabled devices in real time and classify them into logical groups aligned with policy objectives. Device Platform Intelligence adds platform classification, EOL/EOS status, CVE exposure, vendor business status, and known vulnerability context to each discovered device.

Cloudflare Device PostureGenian NAC / Device Platform Intelligence
Primary purposeInform access policy decisionsIdentify devices and understand network context
Core questionDoes this device meet access conditions?What is this device, and where is it connected?
StrengthAccess / Gateway policy signalLayer 2 visibility, device classification
Enforcement pointResource access pathFirst network connection
Complementary potentialGenian signals usable as posture contextDevice context that makes Cloudflare policy more precise

Cloudflare asks: Should this device access the resource?

Genians asks: What is this device, where is it, and should it be on this network at all?

Why Genian NAC: The Sensor-Based Approach

NAC is not a new category. Cisco ISE, Aruba ClearPass, Forescout, and FortiNAC all exist. The difference with Genian NAC is where deployment starts.

Most NAC projects begin with 802.1X. That works for managed IT endpoints. In manufacturing, OT, IoT, and branch environments, it stalls quickly:

  • OT devices may not have a supplicant.
  • IoT devices are often incompatible with agent installation.
  • Printers, cameras, badge readers, and scanners have no user identity.
  • Vendor laptops arrive temporarily and get forgotten.

See first. Classify next. Apply policy after.

802.1X-First ApproachGenian NAC Sensor-Based Approach
802.1X readiness is the starting pointLayer 2 visibility is the starting point
Strong assumption of agent / supplicant availabilitySuited to agentless visibility
Begins with devices that can authenticateDiscovers unknown and unmanaged devices first
High initial deployment burdenVisibility-first entry is possible
OT/IoT exceptions multiplySuited to OT/IoT classification and phased enforcement
Hard to assess policy impact before rolloutSequence: observe → classify → restrict → isolate

For manufacturing, branch, and OT environments where a heavy NAC transition creates operational risk, Genian NAC starts the conversation differently: see what is connected first, enforce where it matters.

Four Ways to Extend Zero Trust to Every Device

Scenario 1: Manufacturing / OT — Remote Vendor Access

Cloudflare secures the remote session. Genian NAC secures the on-site connection.

Cloudflare controls the session when an external vendor accesses a jump server, engineering workstation, or private application — enforcing identity, MFA, posture, and least-privilege access.

Genian NAC controls the moment that same vendor arrives on-site and plugs their laptop into the network.

  1. The vendor device connects to the factory network.
  2. Genian NAC identifies the device.
  3. Unapproved devices move to a guest or quarantine segment.
  4. Approved devices are placed in a restricted segment.
  5. Cloudflare Access applies additional control over private resource access.
  6. Vendor exceptions are managed by owner, approval, and expiry.

Security value — The same vendor is fully covered whether connecting remotely or on-site. No gap between the session and the physical connection.

Deployment reality — No network redesign required. Genian NAC deploys alongside existing Cloudflare infrastructure without touching production systems.

Scenario 2: Device Posture + Network Access Posture

Cloudflare sees endpoint health. Genian NAC adds network access context.

Cloudflare device posture looks at the endpoint state. Genian NAC adds the network context that endpoint posture cannot see:

  • Known / unknown device status
  • IT / OT / IoT / guest / contractor classification
  • Connection location and switch port
  • IP / MAC address
  • VLAN or segment assignment
  • Policy compliance status
  • Temporary exception expiry
  • Network access history
  • Device platform, EOL/EOS status, known vulnerability context

Genians provides an Open API across its platform. Cloudflare’s custom posture integration already supports external API-based posture scoring — where an external system returns a signal that Cloudflare uses in policy decisions. These two facts together mean that Genian NAC’s network posture context — device classification, segment assignment, connection history, exception status — can be surfaced as a structured signal for Cloudflare access policy. No proprietary connector required on either side.

Security value — Cloudflare access decisions gain network context: not just whether a device is healthy, but whether it belongs on the network at all.

Deployment reality — Open API on both sides. No additional connector licensing — integration is an architectural decision, not a procurement one.

Scenario 3: Branch — Unknown Device Cleanup

Cloudflare protects the traffic path. Genian NAC answers what is generating it.

Branch locations consistently accumulate unexpected devices: personal routers, temporary APs, printers, CCTV units, POS terminals, visitor laptops, contractor devices, test equipment, and aging Windows machines.

Genian NAC provides:

  • Branch device discovery and inventory
  • Unknown device isolation
  • Contractor device governance
  • Guest / BYOD segmentation
  • Exception governance with owner and expiry tracking
  • Compliance evidence reporting

Security value — Closes the inventory blind spot present in every branch: the devices Cloudflare cannot classify because they never authenticate.

Deployment reality — Typically operational within days. No switch replacement, no VLAN redesign, no impact to existing Cloudflare configuration.

Scenario 4: OT / IoT — Segmentation Readiness

Start with visibility. Enforce at the pace the environment allows.

Manufacturing customers rarely want enforcement from day one. Production disruption risk makes immediate blocking unrealistic. Genian NAC supports a phased approach:

  • Sensor-based discovery
  • Device classification
  • IT / OT / IoT / guest segmentation mapping
  • Policy impact review
  • Exception approval workflow
  • Phased enforcement
  • Audit reporting

Cloudflare connects Access, Tunnel, Gateway, WARP, and posture policy to secure the access path as enforcement is applied.

Security value — Gives OT teams a defensible foundation for IEC 62443 and NIS2 compliance: asset inventory and classification first, enforcement second.

Deployment reality — Phased rollout protects production continuity. Compliance progress is demonstrable before full enforcement is committed.

Complete the Zero Trust Picture and Where to Start

Cloudflare Zero Trust answers who gets in and what they can reach. Genian NAC answers what is on the network before that question is ever asked. The two operate at different layers and address different problems — which is precisely what makes them complementary.

For Cloudflare customers

See what's below your ZTNA. Free.

Try Genian NAC free for 30 days. No infrastructure changes required. Deploy in monitoring mode and get full Layer 2 visibility of every device on your network — including the ones Cloudflare can't see.

Start Free Trial

For Cloudflare partners

Turn your customers' OT gap into a deal.

Genians' partner program is built for resellers who already lead with Cloudflare. No conflicts — we cover the layer below your existing portfolio. Joint GTM, deal registration, and technical enablement included.

Explore Partnership

    Not sure where to start?

    Run a 6-question Security Architecture Assessment and see where security enforcement should begin

    Blog

    Related Post

    When you finish a NAC project and complete the Palo Alto firewall integration, everything looks…
    Government networks have spent decades perfecting access control, knowing who is allowed to connect, from…
    Microsoft will end Windows 10 support in October 2025, requiring proactive steps to ensure security…

    Get a personalized demo

    Ready to see Genians in action?

    See Genian in action with a customized demo. Discover how it enhances security and streamlines operations—tailored to your needs.

    We use cookies to help improve this website and enhance your browsing experience You can change your cookie settings at any time. • Privacy • Terms