This tutorial is deprecated in favour of Flexible - SSL/TLS encryption modes · Cloudflare SSL/TLS docs
The connection between your visitor and Cloudflare is secured, but the connection between Cloudflare and your server is not. You will not need a certificate on your server for this mode. This option is NOT RECOMMENDED.
Flexible makes your site only partially secure - it encrypts the connection between the visitor and Cloudflare - this means they see the in their browser and the site leaves the impression that it’s secure! However, the connection between Cloudflare and your origin server is unencrypted and traffic can be intercepted there.
Even if you wish to pursue an insecure connection, Flexible SSL causes other problems for sites configured for HTTP at the host such as Mixed Content errors, Redirect Loops, or even completely breaking your website.
You should install an SSL certificate on your server and set the SSL mode to “Full (strict)”. This fully encrypts the traffic between both the user and Cloudflare and between Cloudflare and your server.
You can use a free Let’s Encrypt certificate, generate a free Cloudflare origin certificate (SSL/TLS app), or use a paid certificate.
This is needed to make your site fully secure and is essential if you process any user submitted (e.g. logins) or personalized data through your site.
Tutorial Reference: CT-32
Other great resources on this community include the Community Tips. These address best practices when configuring Cloudflare, how to fix issues you may see, and tools to troubleshoot. You can also view Expert Tips, great posts on the community from people in the know that may help you with your issue.
We encourage users to check out these great resources and the Cloudflare Support Centre before posting.