diff --git a/website/content/docs/api-gateway/consul-api-gateway-install.mdx b/website/content/docs/api-gateway/consul-api-gateway-install.mdx
index 74fd062b03..fb6cbdd71c 100644
--- a/website/content/docs/api-gateway/consul-api-gateway-install.mdx
+++ b/website/content/docs/api-gateway/consul-api-gateway-install.mdx
@@ -244,7 +244,56 @@ spec:
-Refer to the [Kubernetes Gateway API documentation](https://gateway-api.sigs.k8s.io/v1alpha2/references/spec/#gateway.networking.k8s.io/v1alpha2.Gateway) for details about configuring gateways:
+For a listener's `certificateRef` to reference a secret in a different namespace, you must also create a [ReferencePolicy](https://gateway-api.sigs.k8s.io/v1alpha2/references/spec/#gateway.networking.k8s.io/v1alpha2.ReferencePolicy).
+
+The following example creates a `Gateway` named `example-gateway` in namespace `gateway-namespace`. This `Gateway` has a `certificateRef` in namespace `secret-namespace`.
+The reference is allowed because the `ReferencePolicy`, named `reference-policy` in namespace `secret-namespace`, allows `Gateways` in `gateway-namespace` to reference `Secrets` in `secret-namespace`.
+
+
+
+```yaml
+apiVersion: gateway.networking.k8s.io/v1alpha2
+kind: Gateway
+metadata:
+ name: example-gateway
+ namespace: gateway-namespace
+ annotations:
+ 'external-dns.alpha.kubernetes.io/hostname': DNS_HOSTNAME
+spec:
+ gatewayClassName: test-gateway-class
+ listeners:
+ - protocol: HTTPS
+ hostname: DNS_HOSTNAME
+ port: 443
+ name: https
+ allowedRoutes:
+ namespaces:
+ from: Same
+ tls:
+ certificateRefs:
+ - name: gateway-production-certificate
+ namespace: secret-namespace
+---
+
+apiVersion: gateway.networking.k8s.io/v1alpha2
+kind: ReferencePolicy
+metadata:
+ name: reference-policy
+ namespace: secret-namespace
+spec:
+ from:
+ - group: gateway.networking.k8s.io
+ kind: Gateway
+ namespace: gateway-namespace
+ to:
+ - group: ""
+ kind: Secret
+ name: gateway-production-certificate
+```
+
+
+
+Refer to the [Kubernetes Gateway API documentation](https://gateway-api.sigs.k8s.io/v1alpha2/references/spec/#gateway.networking.k8s.io/v1alpha2.Gateway) for further details about configuring gateways.
#### Listeners
diff --git a/website/content/docs/api-gateway/index.mdx b/website/content/docs/api-gateway/index.mdx
index 5234eac604..d279bc5e69 100644
--- a/website/content/docs/api-gateway/index.mdx
+++ b/website/content/docs/api-gateway/index.mdx
@@ -38,7 +38,7 @@ are used, see the [documentation in our GitHub repo](https://github.com/hashicor
| [`Gateway`](https://gateway-api.sigs.k8s.io/v1alpha2/references/spec/#gateway.networking.k8s.io/v1alpha2.Gateway) |
- Supported protocols: `HTTP`, `HTTPS`, `TCP`
- Header-based hostname matching (no SNI support)
- Supported filters: header addition, removal, and setting
- TLS modes supported: `terminate`
- Certificate types supported: `core/v1/Secret`
- Extended options: TLS version and cipher constraints
|
| [`HTTPRoute`](https://gateway-api.sigs.k8s.io/v1alpha2/references/spec/#gateway.networking.k8s.io/v1alpha2.HTTPRoute) | - Weight-based load balancing
- Supported rules: path, header, query, and method-based matching
- Supported filters: header addition, removal, and setting
- Supported backend types:
- `core/v1/Service` (must map to a registered Consul service)
- `api-gateway.consul.hashicorp.com/v1alpha1/MeshService`
|
| [`TCPRoute`](https://gateway-api.sigs.k8s.io/v1alpha2/references/spec/#gateway.networking.k8s.io/v1alpha2.TCPRoute) | - Supported backend types:
- `core/v1/Service` (must map to a registered Consul service)
- `api-gateway.consul.hashicorp.com/v1alpha1/MeshService`
|
-| [`ReferencePolicy`](https://gateway-api.sigs.k8s.io/v1alpha2/references/spec/#gateway.networking.k8s.io/v1alpha2.ReferencePolicy) | - Required to allow any reference from an `HTTPRoute` or `TCPRoute` to a Kubernetes `core/v1/Service` in a different namespace.
- A route with an unpermitted BackendRef caused by the lack of a ReferencePolicy sets a `ResolvedRefs` status to `False` with the reason `RefNotPermitted`. The gateway listener rejects routes with an unpermitted BackendRef.
- WARNING: If a route BackendRef becomes unpermitted, the entire route is removed from the gateway listener.
- A BackendRef can become unpermitted when you delete a Reference Policy or add a new unpermitted BackendRef to an existing route.
|
+| [`ReferencePolicy`](https://gateway-api.sigs.k8s.io/v1alpha2/references/spec/#gateway.networking.k8s.io/v1alpha2.ReferencePolicy) | - Required to allow any reference from a `Gateway` to a Kubernetes `core/v1/Secret` in a different namespace.
- Required to allow any reference from an `HTTPRoute` or `TCPRoute` to a Kubernetes `core/v1/Service` in a different namespace.
- A route with an unpermitted BackendRef caused by the lack of a ReferencePolicy sets a `ResolvedRefs` status to `False` with the reason `RefNotPermitted`. The gateway listener rejects routes with an unpermitted BackendRef.
- WARNING: If a route BackendRef becomes unpermitted, the entire route is removed from the gateway listener.
- A BackendRef can become unpermitted when you delete a Reference Policy or add a new unpermitted BackendRef to an existing route.
|
## Additional Resources