Cloudflare SSL/TLS Guide

Establish secure, fast, and search-optimized proxy tunnels.

  • Home
  • Cloudflare SSL/TLS Guide
Edge Security

Cloudflare SSL/TLS Setup Guide

Configuring SSL/TLS on Cloudflare is essential for securing client connections, boosting mobile PageSpeed via HTTP/3, and maintaining HTTPS ranking equity. Learn how to configure modes without creating infinite redirect loops.

1. Choosing the Correct SSL/TLS Mode

Cloudflare sits as an edge proxy between your visitors and your origin server. It offers four encryption modes:

  • Off: No encryption. Connections are plain HTTP. Not recommended.
  • Flexible: Encrypts traffic between visitors and Cloudflare, but uses plain HTTP between Cloudflare and your origin server. Caution: This can cause infinite redirect loops if your server forces HTTPS.
  • Full: Encrypts connection fully end-to-end, but accepts self-signed certificates on the origin server.
  • Full (Strict): Encrypts end-to-end and requires a valid, trusted certificate (like Let's Encrypt) on the origin. Highly Recommended for modern SEO and security compliance.

2. Enabling HSTS & HTTP/3

Under the Edge Certificates tab, enable Always Use HTTPS and configure HSTS (HTTP Strict Transport Security). HSTS instructs browsers to exclusively request HTTPS, eliminating slow redirect hops and securing your page speed score.

Cloudflare SSL Setup Checklist

1

Install origin certificate

Generate a free origin CA certificate inside Cloudflare or install Let's Encrypt directly on your VPS/Apache server.

2

Set SSL/TLS to Full (Strict)

Navigate to Cloudflare > SSL/TLS > Overview and update mode to Full (Strict).

3

Enable HSTS and minTLS

Go to Edge Certificates. Enforce HSTS with a max-age of 1 year, preload, and set Minimum TLS Version to 1.2.

Related Security Tools

Related Guides

Continue with these guides to strengthen your technical SEO workflow.