|
| 1 | +--- |
| 2 | +pcx_content_type: reference |
| 3 | +title: Remote captures |
| 4 | +sidebar: |
| 5 | + order: 4 |
| 6 | + |
| 7 | +--- |
| 8 | + |
| 9 | +import { Details, Render } from "~/components" |
| 10 | + |
| 11 | + |
| 12 | +<Details header="Feature availability"> |
| 13 | + |
| 14 | +| [WARP modes](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/) | [Zero Trust plans](https://www.cloudflare.com/teams-pricing/) | |
| 15 | +| ----------------------------------------------------------------------------------------- | ------------------------------------------------------------- | |
| 16 | +| All modes | All plans | |
| 17 | + |
| 18 | +| System | Availability | Minimum WARP version | |
| 19 | +| -------- | ------------ | -------------------- | |
| 20 | +| Windows | ✅ | 2024.6.415.0 | |
| 21 | +| macOS | ✅ | | |
| 22 | +| Linux | ✅ | | |
| 23 | +| iOS | ❌ | | |
| 24 | +| Android | ❌ | | |
| 25 | +| ChromeOS | ❌ | | |
| 26 | + |
| 27 | +</Details> |
| 28 | + |
| 29 | +Remote captures allow administrators to collect packet captures (PCAPs) and WARP diagnostic logs directly from end user devices. This data can be used to troubleshoot network problems, investigate security incidents, and identify performance bottlenecks. |
| 30 | + |
| 31 | +## Start a remote capture |
| 32 | + |
| 33 | +To capture data from a remote device: |
| 34 | + |
| 35 | +1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DEX** > **Remote captures**. |
| 36 | +2. Select the device(s) you want to run a capture on. Devices must be [registered](/cloudflare-one/connections/connect-devices/warp/deployment/) in your Zero Trust organization. |
| 37 | +3. Configure the types of captures to run. |
| 38 | + - **PCAP**: Performs packet captures by running `warp-cli debug pcap start` and `warp-cli debug pcap stop` commands on the device. The capture will include two files -- a PCAP for traffic outside of the WARP tunnel (default network interface), and a PCAP for traffic inside of the WARP tunnel ([WARP virtual interface](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture/#ip-traffic)). |
| 39 | + <Details header="PCAP limits"> |
| 40 | + Packet captures are subject to the following limits: |
| 41 | + - **Maximum time limit**: 1,800 seconds |
| 42 | + - **Maximum file size**: 100 MB |
| 43 | + - **Maximum packet size**: 160 bytes |
| 44 | + </Details> |
| 45 | + - **WARP Diagnostics Logs**: Generates [WARP diagnostic logs](/cloudflare-one/connections/connect-devices/warp/troubleshooting/warp-logs/#warp-diag-logs) by running a `warp-diag` command on the device. You can optionally select **Test all routes** to run an `ip route get` command for all IPs and domains in your [Split Tunnel configuration](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/). |
| 46 | +4. Select **Start a capture**. |
| 47 | + |
| 48 | +DEX will now send capture requests to the configured devices. If the WARP client is disconnected, the capture will time out after 10 minutes. |
| 49 | + |
| 50 | +## Check remote capture status |
| 51 | + |
| 52 | +To view a list of captures, go to **DEX** > **Remote captures**. The **Status** column displays one of the following options: |
| 53 | + - **Success**: The capture is complete and ready for download. |
| 54 | + - **Running**: The capture is in progress on the device. |
| 55 | + - **Pending Upload**: The capture is complete but not yet ready for download. |
| 56 | + - **Failed**: The capture has either timed out or encountered an error. To retry the capture, make sure the WARP client is connected and start a [new capture](/cloudflare-one/insights/dex/remote-captures/#start-a-remote-capture). |
| 57 | + |
| 58 | +## Download remote captures |
| 59 | + |
| 60 | +1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DEX** > **Remote captures**. |
| 61 | +2. Find a successful capture. |
| 62 | +3. Select the three-dot menu and select **Download**. |
| 63 | + |
| 64 | +This will download a ZIP file to your local machine. You can analyze `.pcap` files using Wireshark or another third-party packet capture tool. |
| 65 | + |
| 66 | +## Data retention |
| 67 | + |
| 68 | +Cloudflare will store capture data for 7 days. |
0 commit comments