Skip to content

Commit 2764195

Browse files
extra additions
1 parent b99a130 commit 2764195

File tree

6 files changed

+56
-30
lines changed

6 files changed

+56
-30
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/managed-networks.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 3
66
---
77

8-
import { Details, TabItem, Tabs } from "~/components";
8+
import { Details, Render, TabItem, Tabs } from "~/components";
99

1010
<Details header="Feature availability">
1111

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ This mode is best suited for organizations that want to use advanced firewall/pr
1717

1818
## Gateway with DoH
1919

20-
This mode is best suited for organizations that only want to apply DNS filtering to outbound traffic from their company devices. Network and HTTP traffic is handled by the default mechanisms on your devices.
20+
Gateway with DNS-over-HTTPS (DoH) is best suited for organizations that only want to apply DNS filtering to outbound traffic from their company devices. Network and HTTP traffic is handled by the default mechanisms on your devices.
2121

2222
| DNS filtering | Network filtering | HTTP filtering | Features enabled |
2323
| ------------- | ----------------- | -------------- | ---------------- |

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,10 @@ If the user has an active browser session with the IdP, WARP will use the existi
5353

5454
- [Microsoft Entra ID](/cloudflare-one/identity/idp-integration/entra-id/#force-user-interaction-during-warp-reauthentication)
5555

56+
## Manually reauthenticate
57+
58+
<Render file="warp/manually-reauth" />
59+
5660
## Limitations
5761

5862
- **Only one user per device** — If a device is already registered with User A, User B will not be able to log in on that device through the re-authentication flow. To switch the device registration to a different user, User A must first log out from Zero Trust (if [Allow device to leave organization](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#allow-device-to-leave-organization) is enabled), or an admin can revoke the registration from **My Team** > **Devices**. User B can then properly [enroll](/cloudflare-one/connections/connect-devices/warp/deployment/manual-deployment/).

src/content/docs/cloudflare-one/connections/connect-devices/warp/troubleshooting/troubleshooting-guide.mdx

Lines changed: 40 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -9,17 +9,17 @@ import { MetaInfo, Render, Steps, Stream, Tabs, TabItem, Type } from "~/componen
99

1010
This guide helps you diagnose and resolve common issues with the Cloudflare WARP client. It covers how to troubleshoot the WARP client on desktop operating systems, including Windows, macOS, and Linux.
1111

12-
1. **Before you start**: [Prerequisites](#prequisites), permissions, [version control](#check-your-warp-version) and WARP basics.
12+
1. **Before you start**: [Prerequisites](#prerequisites), permissions, [version control](#check-your-warp-version) and WARP basics.
1313
2. **Collect logs**: Through the [dashboard]() (with DEX remote capture) or the [command-line interface](#option-b-collect-logs-via-the-cli) (CLI) (`warp-diag`).
1414
3. **Review logs**: [Status](#check-warp-status), [settings](#check-warp-settings), [profile ID](#profile-id), [split tunnel](#exclude-mode-with-hostsips) configuration, and other settings.
15-
4. **Fix common misconfigurations**: [Profile mismatch](#wrong-profile-id), [split tunnel issues](#wrong-split-tunnel-configuration), [managed network issues](#review-your-managed-network-settings).
15+
4. **Fix common misconfigurations**: [Profile mismatch](#wrong-profile-id), [split tunnel issues](#wrong-split-tunnel-configuration), [managed network issues](#review-your-managed-network-settings), [user group mismatch](#check-a-users-group-membership).
1616
5. **File a support ticket**: [How to file a ticket](#file-a-support-ticket) after you have exhausted your troubleshooting options.
1717

1818
## 1. Before you start
1919

20-
### Prequisites
20+
### Prerequisites
2121

22-
- You must have completed the [Zero Trust onboarding flow](/cloudflare-one/setup/) with a Zero Trust organizaton created.
22+
- You must have completed the [Zero Trust onboarding flow](/cloudflare-one/setup/) with a Zero Trust organization created.
2323
- You must have the WARP client installed on an end user device.
2424
- You must have a [role](/cloudflare-one/roles-permissions/) that gives admin permission to download logs on the Cloudflare dashboard.
2525

@@ -169,14 +169,14 @@ After you have downloaded the WARP diagnostic logs, open the `warp-settings.txt`
169169
```txt
170170
Merged configuration:
171171
(derived) Always On: true
172-
(network policy) Switch Locked: false # If false, does not allows the user to turn off the WARP toggle and disconnect the WARP client
172+
(network policy) Switch Locked: false # If false, does not allow the user to turn off the WARP toggle and disconnect the WARP client
173173
(network policy) Mode: WarpWithDnsOverHttps # The device's WARP mode, this mode is WARP with Gateway mode
174174
(network policy) WARP tunnel protocol: WireGuard
175175
(default) Disabled for Wifi: false
176176
(default) Disabled for Ethernet: false
177-
(reg defaults) Resolve via: 1xx0x1011xx000000000f0x00000x11.cloudflare-gateway.com @ [1xx.1xx.1x.1, 1x01:1x00:1x00::1xx1] # The SNI Cloudflare will use and the IP address for DNS-over-HTTP (DoH) requests
177+
(reg defaults) Resolve via: 1xx0x1011xx000000000f0x00000x11.cloudflare-gateway.com @ [1xx.1xx.1x.1, 1x01:1x00:1x00::1xx1] # The SNI Cloudflare will use and the IP address for DNS-over-HTTPSs (DoH) requests
178178
(user set) qlog logging: Enabled
179-
(default) Onboarding: true # If true, the user sees a onboarding prompt when they first install the WARP client
179+
(default) Onboarding: true # If true, the user sees an onboarding prompt when they first install the WARP client
180180
(network policy) Exclude mode, with hosts/ips: # Split tunnel configuration
181181
1xx.1xx.1xx.1xx/25 (zoom)
182182
...
@@ -254,7 +254,7 @@ Exclude mode, with hosts/ips:
254254

255255
##### Fallback domains
256256

257-
Refers to your [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) settings. In the example file, WARP lists `intranet` as a domain that will not be sent to Gateway for proccessing and will instead be sent directly to the configured fallback servers.
257+
Refers to your [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) settings. In the example file, WARP lists `intranet` as a domain that will not be sent to Gateway for processing and will instead be sent directly to the configured fallback servers.
258258

259259
```txt
260260
(network policy) Fallback domains:
@@ -313,14 +313,20 @@ To verify that WARP is configured and working properly, review the following:
313313

314314
A profile ID is a unique identifier assigned to each [device profile]((/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/)) in the Zero Trust dashboard, used to determine which configuration settings apply to a device.
315315

316-
If your organization has multiple device profiles defined in the Zero Trust dashboard, a device may be matched to an unexpected profile due to lack of precise matcing rules or how profile precedence is configured.
316+
If your organization has multiple device profiles defined in the Zero Trust dashboard, a device may be matched to an unexpected profile because:
317317

318-
:::note[WARP evaluates profile IDs according to chronological order in the dashboard]
318+
1. How profile precedence is configured.
319+
320+
:::note[WARP evaluates profile IDs in the order they appear in the dashboard]
319321

320322
<Render file="warp/device-profile-order-of-precedence" />
321323

322324
:::
323325

326+
2. [Managed network](#review-your-managed-network-settings) issues.
327+
3. User group [mismatch](#check-a-users-group-membership).
328+
4. Lack of [precise match rules](#edit-your-device-profile-match-rules)
329+
324330
#### Check the applied device profile
325331

326332
To check that the applied device profile is the intended device profile:
@@ -350,7 +356,7 @@ A [managed network](/cloudflare-one/connections/connect-devices/warp/configure-w
350356

351357
If the managed network is misconfigured or the TLS endpoint is unreachable, the device may fall back to an unintended profile.
352358

353-
When troubleshooting WARP for managed network isses:
359+
When troubleshooting WARP for managed network issues:
354360

355361
1. Verify the endpoint is reachable.
356362

@@ -370,6 +376,21 @@ When troubleshooting WARP for managed network isses:
370376

371377
To simplify management and prevent errors, avoid creating multiple managed network profiles for the same location. For example, if you have multiple TLS endpoints in one office, link them all to a single device profile. This reduces the risk of a device matching an unintended profile due to a configuration error.
372378

379+
#### Check a user's group membership
380+
381+
If a user is having issues with a device profile, it may be because they are not part of the correct user group. This can happen when an organization is not using SCIM for automatic identity provider (IdP) updates.
382+
383+
To check that the user belongs to the intended group:
384+
385+
1. Log into [Zero Trust]() > go to **My Team** > **Users**.
386+
2. Select the user.
387+
3. Under **User Registry Identity**, select the user's name.
388+
4. The Get-identity endpoint lists all the groups the user belongs to.
389+
390+
If the user was recently added to a group, they will need to update their group membership with Cloudflare Zero Trust. This can be accomplished by logging into the reauthenticate endpoint.
391+
392+
<Render file="warp/manually-reauth" />
393+
373394
#### Edit your device profile match rules
374395

375396
To modify the match rules of a device profile, you will need to edit the device profile. To edit the device profile:
@@ -386,7 +407,7 @@ For example, if you set your mode to Exclude IPs and domains and accidentally ex
386407

387408
#### 1. Check the applied split tunnel configuration
388409

389-
After downloading the WARP diagnostic logs, review your configuration is working as intended:
410+
After downloading the WARP diagnostic logs, review that your configuration is working as intended:
390411

391412
1. Open the `warp-settings.txt` file and find `Exclude mode, with hosts/ips:` or `Include mode, with hosts/ips:`.
392413

@@ -408,40 +429,32 @@ If your dashboard split tunnel configuration does not match your `warp-settings.
408429

409430
If the split tunnel configuration in `warp-settings.txt` does not match the dashboard, you can force the WARP client to fetch the latest settings.
410431

411-
This can be done by instructing the end user to [toggle WARP off and on](#option-a-toggle-warp-off-and-back-on), [reset their encryption keys](#option-b-reset-the-encryption-keys), or, if you have admin access, [revoking the user session](#option-c-revoke-the-user-session).
432+
This can be done by instructing the end user to [toggle WARP off and on](#option-a-toggle-warp-off-and-back-on), or [reset their encryption keys](#option-b-reset-the-encryption-keys).
412433

413-
All three methods update the client with the latest configuration.
434+
Both methods update the client with the latest configuration.
414435

415436
##### Option A: Toggle WARP off and back on
416437

417438
On the end user device, open the WARP GUI and toggle WARP on and off.
418439

440+
:::tip[What if the end user cannot turn off WARP?]
419441
If the end user's [WARP switch](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#lock-warp-switch) is locked, they will need an [admin override code](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#admin-override) to be able to toggle the WARP switch.
420442

443+
[Resetting the encryption keys](#option-b-reset-the-encryption-keys) may be a faster solution.
444+
:::
445+
421446
After you toggle WARP back on, the WARP client will fetch new settings when it reconnects.
422447

423448
##### Option B: Reset the encryption keys
424449

425-
To reset the encyrption keys on an end user's desktop:
450+
To reset the encryption keys on an end user's desktop:
426451

427452
1. Open the WARP GUI.
428453
2. Select the gear icon.
429454
3. Select **Preferences** > **Connection** > **Reset encryption keys**.
430455

431456
Resetting the encryption keys forces the WARP client to reestablish its tunnel and retrieve the latest configuration.
432457

433-
##### Option C: Revoke the user session
434-
435-
An administrator can [revoke the user session](/cloudflare-one/identity/users/session-management/#per-user) from the Cloudflare dashboard to force a complete reenrollment.
436-
437-
1. In the Zero Trust dashboard, go to **My Team** > **Users**.
438-
2. Select the checkbox next to the user's name.
439-
3. Select **Action** > **Revoke access**.
440-
441-
Revoking access will prompt the user to log back in. The WARP client will then perform a new registration and fetch the latest settings from the dashboard.
442-
443-
To check that the split tunnel settings have been updated, run `warp-cli settings` on the device and review the configuration.
444-
445458
## 5. File a support ticket
446459

447460
Effective troubleshooting depends on clear, detailed support tickets. The more context you provide, the faster support can identify and resolve the issue.

src/content/partials/cloudflare-one/warp/device-profile-order-of-precedence.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
{}
33
---
44

5-
Cloudflare WARP evaluates device profiles dynamically based on a hierarchy. When a device connects, WARP checks the profiles from top to bottom as they appear in the dashboard. WARP follows the first match principle — once a device matches a profile, WARP stop evaluating and no subsequent profiles can override the decision.
5+
Cloudflare WARP evaluates device profiles dynamically based on a hierarchy. When a device connects, WARP checks the profiles from top to bottom as they appear in the dashboard. WARP follows the first match principle — once a device matches a profile, WARP stops evaluating and no subsequent profiles can override the decision.
66

77
The **Default** profile is always at the bottom of the list. It will only be applied if the device does not meet the criteria of any profile listed above it. If you make another custom profile the default, all settings will be copied over into the **Default** profile.
88

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
---
2+
{}
3+
---
4+
5+
To manually refresh your Cloudflare Access session and update your group information from your identity provider (IdP), go to the following URL in your browser and fill in your [team name](/cloudflare-one/faq/getting-started-faq/#what-is-a-team-domainteam-name):
6+
7+
`https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/refresh-identity`
8+
9+
Reauthenticating resets your [session duration](/cloudflare-one/identity/users/session-management/) and fetches the latest group information from the organization's IdP.

0 commit comments

Comments
 (0)