Skip to content

Commit 196d6aa

Browse files
update
1 parent c1f1015 commit 196d6aa

File tree

7 files changed

+18
-8
lines changed

7 files changed

+18
-8
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,5 +52,5 @@ The domain will no longer be excluded from Gateway DNS policies, effective immed
5252
## Related resources
5353

5454
- [Connectivity status](/cloudflare-one/connections/connect-devices/warp/troubleshooting/connectivity-status/) - Learn about the status messages displayed by the WARP client during its connection process, and understand each stage as WARP establishes a secure tunnel to Cloudflare.
55-
- [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) - Resolve selected domains via local DNS instead of Cloudflare Gateway.
55+
- [Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) - Control which traffic goes through WARP by including or excluding specific IPs or domains.
5656
- [WARP with firewall](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/) - Learn which IPs, domains, and ports to allow so users can deploy and connect WARP successfully behind a firewall.

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,5 +104,5 @@ If you need to revert to the default Split Tunnel entries recommended by Cloudfl
104104
## Related resources
105105

106106
- [Connectivity status](/cloudflare-one/connections/connect-devices/warp/troubleshooting/connectivity-status/) - Learn about the status messages displayed by the WARP client during its connection process, and understand each stage as WARP establishes a secure tunnel to Cloudflare.
107-
- [Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) - Control which traffic goes through WARP by including or excluding specific IPs or domains.
107+
- [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) - Resolve selected domains via local DNS instead of Cloudflare Gateway.
108108
- [WARP with firewall](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/) - Learn which IPs, domains, and ports to allow so users can deploy and connect WARP successfully behind a firewall.

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/captive-portals.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 3
66
---
77

8-
import { Details, Badge } from "~/components";
8+
import { Details, Badge, Render } from "~/components";
99

1010
Captive portals are used by public Wi-Fi networks (such as airports, coffee shops, and hotels) to make a user agree to their Terms of Service or provide payment before allowing access to the Internet. When a user connects to the Wi-Fi, the captive portal blocks all HTTPS traffic until the user completes a captive portal login flow in their browser. This prevents the WARP client from connecting to Cloudflare. At the same time, WARP creates [firewall rules](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture/#ip-traffic) on the device to send all traffic to Cloudflare. The user is therefore unable to access the captive portal login screen unless they temporarily disable WARP.
1111

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/fleet.mdx

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar:
77

88
import { Render } from "~/components";
99

10-
This guide covers how to deploy the Cloudflare WARP client using [Fleet](https://fleetdm.com/) device management software. {}
10+
This guide covers how to deploy the Cloudflare WARP client using [Fleet](https://fleetdm.com/) device management software.
1111

1212
## macOS
1313

@@ -22,7 +22,9 @@ This guide covers how to deploy the Cloudflare WARP client using [Fleet](https:/
2222
2. From the **Teams** dropdown, select the team (group of hosts) that requires Cloudflare WARP.
2323
3. Select **OS settings** > **Custom settings**.
2424
4. Select **Add profile** and upload the custom `.mobileconfig`.
25-
5. Select the hosts which require Cloudflare WARP: - **All hosts**: Deploys WARP to all hosts in the team. - **Custom**: Deploys WARP to a subset of the hosts in the team. Use [labels](https://fleetdm.com/guides/managing-labels-in-fleet#basic-article) to define the hosts that should be included or excluded.
25+
5. Select the hosts which require Cloudflare WARP:
26+
- **All hosts**: Deploys WARP to all hosts in the team.
27+
- **Custom**: Deploys WARP to a subset of the hosts in the team. Use [labels](https://fleetdm.com/guides/managing-labels-in-fleet#basic-article) to define the hosts that should be included or excluded.
2628
6. Select **Add profile**.
2729

2830
The defined hosts will immediately receive the deployment profile, but WARP is not yet installed.

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/hexnode.mdx

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,6 @@ description: Deploy Cloudflare WARP with Hexnode MDM - Step-by-step guide for Wi
88

99
import { Render } from "~/components";
1010

11-
<Render file="warp/connectivity-status-check" />
12-
1311
## Windows
1412

1513
1. Create a script file with `.bat`, `.cmd`, and `.ps1` file formats to download, install and configure the Cloudflare WARP client Windows application on the device. Listed below is a sample script with all of the configurable parameters:
@@ -50,6 +48,8 @@ import { Render } from "~/components";
5048

5149
7. Select **Execute**.
5250

51+
<Render file="warp/connectivity-status-check" />
52+
5353
## macOS
5454

5555
1. [Download](/cloudflare-one/connections/connect-devices/warp/download-warp/#macos) the Cloudflare WARP client for macOS.
@@ -100,6 +100,8 @@ import { Render } from "~/components";
100100

101101
This will push the app along with the configurations to the selected devices.
102102

103+
<Render file="warp/connectivity-status-check" />
104+
103105
## iOS
104106

105107
1. On your Hexnode console, go to **Apps** > **Add Apps** > **Store App**.
@@ -142,6 +144,8 @@ This will push the app along with the configurations to the selected devices.
142144

143145
This will push the app along with the configurations to the selected devices.
144146

147+
<Render file="warp/connectivity-status-check" />
148+
145149
## Android
146150

147151
1. On your Hexnode console, go to **Apps** > **Add Apps** > **Managed Google Apps**.
@@ -154,3 +158,5 @@ This will push the app along with the configurations to the selected devices.
154158
8. Save the policy.
155159

156160
This will push the app along with the configurations to the selected devices.
161+
162+
<Render file="warp/connectivity-status-check" />

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ head:
88
content: Deploy WARP with Technology Partners
99
---
1010

11-
import { DirectoryListing, Render } from "~/components";
11+
import { DirectoryListing } from "~/components";
1212

1313
Cloudflare Zero Trust integrates with [Cloudflare Technology Partner](https://www.cloudflare.com/partners/technology-partners/) tools to help you deploy the WARP client to bigger fleets of devices. Thanks to these collaborations, you can distribute the WARP client application to end-user devices and remotely set up advanced configurations in real time.
1414

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/kandji.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,8 @@ For the simplest deployment, Kandji has created a downloadable configuration pro
5858

5959
To verify that Cloudflare WARP was installed, select the app in the **Custom App** library and view its **Status** tab.
6060

61+
<Render file="warp/connectivity-status-check" />
62+
6163
## Audit and Enforce Script
6264

6365
The following audit script checks if the WARP client is installed and optionally enforces a minimum version number.

0 commit comments

Comments
 (0)