You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/index.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ This mode is best suited for organizations that want to use advanced firewall/pr
17
17
18
18
## Gateway with DoH
19
19
20
-
This mode is best suited for organizations that only want to apply DNS filtering to outbound traffic from their company devices. Network and HTTP traffic is handled by the default mechanisms on your devices.
20
+
Gateway with DNS-over-HTTPS (DoH) is best suited for organizations that only want to apply DNS filtering to outbound traffic from their company devices. Network and HTTP traffic is handled by the default mechanisms on your devices.
21
21
22
22
| DNS filtering | Network filtering | HTTP filtering | Features enabled |
-**Only one user per device** — If a device is already registered with User A, User B will not be able to log in on that device through the re-authentication flow. To switch the device registration to a different user, User A must first log out from Zero Trust (if [Allow device to leave organization](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#allow-device-to-leave-organization) is enabled), or an admin can revoke the registration from **My Team** > **Devices**. User B can then properly [enroll](/cloudflare-one/connections/connect-devices/warp/deployment/manual-deployment/).
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/troubleshooting/troubleshooting-guide.mdx
+40-27Lines changed: 40 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,17 +9,17 @@ import { MetaInfo, Render, Steps, Stream, Tabs, TabItem, Type } from "~/componen
9
9
10
10
This guide helps you diagnose and resolve common issues with the Cloudflare WARP client. It covers how to troubleshoot the WARP client on desktop operating systems, including Windows, macOS, and Linux.
11
11
12
-
1.**Before you start**: [Prerequisites](#prequisites), permissions, [version control](#check-your-warp-version) and WARP basics.
12
+
1.**Before you start**: [Prerequisites](#prerequisites), permissions, [version control](#check-your-warp-version) and WARP basics.
13
13
2.**Collect logs**: Through the [dashboard]() (with DEX remote capture) or the [command-line interface](#option-b-collect-logs-via-the-cli) (CLI) (`warp-diag`).
14
14
3.**Review logs**: [Status](#check-warp-status), [settings](#check-warp-settings), [profile ID](#profile-id), [split tunnel](#exclude-mode-with-hostsips) configuration, and other settings.
4.**Fix common misconfigurations**: [Profile mismatch](#wrong-profile-id), [split tunnel issues](#wrong-split-tunnel-configuration), [managed network issues](#review-your-managed-network-settings), [user group mismatch](#check-a-users-group-membership).
16
16
5.**File a support ticket**: [How to file a ticket](#file-a-support-ticket) after you have exhausted your troubleshooting options.
17
17
18
18
## 1. Before you start
19
19
20
-
### Prequisites
20
+
### Prerequisites
21
21
22
-
- You must have completed the [Zero Trust onboarding flow](/cloudflare-one/setup/) with a Zero Trust organizaton created.
22
+
- You must have completed the [Zero Trust onboarding flow](/cloudflare-one/setup/) with a Zero Trust organization created.
23
23
- You must have the WARP client installed on an end user device.
24
24
- You must have a [role](/cloudflare-one/roles-permissions/) that gives admin permission to download logs on the Cloudflare dashboard.
25
25
@@ -169,14 +169,14 @@ After you have downloaded the WARP diagnostic logs, open the `warp-settings.txt`
169
169
```txt
170
170
Merged configuration:
171
171
(derived) Always On: true
172
-
(network policy) Switch Locked: false # If false, does not allows the user to turn off the WARP toggle and disconnect the WARP client
172
+
(network policy) Switch Locked: false # If false, does not allow the user to turn off the WARP toggle and disconnect the WARP client
173
173
(network policy) Mode: WarpWithDnsOverHttps # The device's WARP mode, this mode is WARP with Gateway mode
174
174
(network policy) WARP tunnel protocol: WireGuard
175
175
(default) Disabled for Wifi: false
176
176
(default) Disabled for Ethernet: false
177
-
(reg defaults) Resolve via: 1xx0x1011xx000000000f0x00000x11.cloudflare-gateway.com @ [1xx.1xx.1x.1, 1x01:1x00:1x00::1xx1] # The SNI Cloudflare will use and the IP address for DNS-over-HTTP (DoH) requests
177
+
(reg defaults) Resolve via: 1xx0x1011xx000000000f0x00000x11.cloudflare-gateway.com @ [1xx.1xx.1x.1, 1x01:1x00:1x00::1xx1] # The SNI Cloudflare will use and the IP address for DNS-over-HTTPSs (DoH) requests
178
178
(user set) qlog logging: Enabled
179
-
(default) Onboarding: true # If true, the user sees a onboarding prompt when they first install the WARP client
179
+
(default) Onboarding: true # If true, the user sees an onboarding prompt when they first install the WARP client
180
180
(network policy) Exclude mode, with hosts/ips: # Split tunnel configuration
181
181
1xx.1xx.1xx.1xx/25 (zoom)
182
182
...
@@ -254,7 +254,7 @@ Exclude mode, with hosts/ips:
254
254
255
255
##### Fallback domains
256
256
257
-
Refers to your [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) settings. In the example file, WARP lists `intranet` as a domain that will not be sent to Gateway for proccessing and will instead be sent directly to the configured fallback servers.
257
+
Refers to your [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) settings. In the example file, WARP lists `intranet` as a domain that will not be sent to Gateway for processing and will instead be sent directly to the configured fallback servers.
258
258
259
259
```txt
260
260
(network policy) Fallback domains:
@@ -313,14 +313,20 @@ To verify that WARP is configured and working properly, review the following:
313
313
314
314
A profile ID is a unique identifier assigned to each [device profile]((/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/)) in the Zero Trust dashboard, used to determine which configuration settings apply to a device.
315
315
316
-
If your organization has multiple device profiles defined in the Zero Trust dashboard, a device may be matched to an unexpected profile due to lack of precise matcing rules or how profile precedence is configured.
316
+
If your organization has multiple device profiles defined in the Zero Trust dashboard, a device may be matched to an unexpected profile because:
317
317
318
-
:::note[WARP evaluates profile IDs according to chronological order in the dashboard]
318
+
1. How profile precedence is configured.
319
+
320
+
:::note[WARP evaluates profile IDs in the order they appear in the dashboard]
3. User group [mismatch](#check-a-users-group-membership).
328
+
4. Lack of [precise match rules](#edit-your-device-profile-match-rules)
329
+
324
330
#### Check the applied device profile
325
331
326
332
To check that the applied device profile is the intended device profile:
@@ -350,7 +356,7 @@ A [managed network](/cloudflare-one/connections/connect-devices/warp/configure-w
350
356
351
357
If the managed network is misconfigured or the TLS endpoint is unreachable, the device may fall back to an unintended profile.
352
358
353
-
When troubleshooting WARP for managed network isses:
359
+
When troubleshooting WARP for managed network issues:
354
360
355
361
1. Verify the endpoint is reachable.
356
362
@@ -370,6 +376,21 @@ When troubleshooting WARP for managed network isses:
370
376
371
377
To simplify management and prevent errors, avoid creating multiple managed network profiles for the same location. For example, if you have multiple TLS endpoints in one office, link them all to a single device profile. This reduces the risk of a device matching an unintended profile due to a configuration error.
372
378
379
+
#### Check a user's group membership
380
+
381
+
If a user is having issues with a device profile, it may be because they are not part of the correct user group. This can happen when an organization is not using SCIM for automatic identity provider (IdP) updates.
382
+
383
+
To check that the user belongs to the intended group:
384
+
385
+
1. Log into [Zero Trust]() > go to **My Team** > **Users**.
386
+
2. Select the user.
387
+
3. Under **User Registry Identity**, select the user's name.
388
+
4. The Get-identity endpoint lists all the groups the user belongs to.
389
+
390
+
If the user was recently added to a group, they will need to update their group membership with Cloudflare Zero Trust. This can be accomplished by logging into the reauthenticate endpoint.
391
+
392
+
<Renderfile="warp/manually-reauth" />
393
+
373
394
#### Edit your device profile match rules
374
395
375
396
To modify the match rules of a device profile, you will need to edit the device profile. To edit the device profile:
@@ -386,7 +407,7 @@ For example, if you set your mode to Exclude IPs and domains and accidentally ex
386
407
387
408
#### 1. Check the applied split tunnel configuration
388
409
389
-
After downloading the WARP diagnostic logs, review your configuration is working as intended:
410
+
After downloading the WARP diagnostic logs, review that your configuration is working as intended:
390
411
391
412
1. Open the `warp-settings.txt` file and find `Exclude mode, with hosts/ips:` or `Include mode, with hosts/ips:`.
392
413
@@ -408,40 +429,32 @@ If your dashboard split tunnel configuration does not match your `warp-settings.
408
429
409
430
If the split tunnel configuration in `warp-settings.txt` does not match the dashboard, you can force the WARP client to fetch the latest settings.
410
431
411
-
This can be done by instructing the end user to [toggle WARP off and on](#option-a-toggle-warp-off-and-back-on), [reset their encryption keys](#option-b-reset-the-encryption-keys), or, if you have admin access, [revoking the user session](#option-c-revoke-the-user-session).
432
+
This can be done by instructing the end user to [toggle WARP off and on](#option-a-toggle-warp-off-and-back-on), or [reset their encryption keys](#option-b-reset-the-encryption-keys).
412
433
413
-
All three methods update the client with the latest configuration.
434
+
Both methods update the client with the latest configuration.
414
435
415
436
##### Option A: Toggle WARP off and back on
416
437
417
438
On the end user device, open the WARP GUI and toggle WARP on and off.
418
439
440
+
:::tip[What if the end user cannot turn off WARP?]
419
441
If the end user's [WARP switch](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#lock-warp-switch) is locked, they will need an [admin override code](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#admin-override) to be able to toggle the WARP switch.
420
442
443
+
[Resetting the encryption keys](#option-b-reset-the-encryption-keys) may be a faster solution.
444
+
:::
445
+
421
446
After you toggle WARP back on, the WARP client will fetch new settings when it reconnects.
422
447
423
448
##### Option B: Reset the encryption keys
424
449
425
-
To reset the encyrption keys on an end user's desktop:
450
+
To reset the encryption keys on an end user's desktop:
Resetting the encryption keys forces the WARP client to reestablish its tunnel and retrieve the latest configuration.
432
457
433
-
##### Option C: Revoke the user session
434
-
435
-
An administrator can [revoke the user session](/cloudflare-one/identity/users/session-management/#per-user) from the Cloudflare dashboard to force a complete reenrollment.
436
-
437
-
1. In the Zero Trust dashboard, go to **My Team** > **Users**.
438
-
2. Select the checkbox next to the user's name.
439
-
3. Select **Action** > **Revoke access**.
440
-
441
-
Revoking access will prompt the user to log back in. The WARP client will then perform a new registration and fetch the latest settings from the dashboard.
442
-
443
-
To check that the split tunnel settings have been updated, run `warp-cli settings` on the device and review the configuration.
444
-
445
458
## 5. File a support ticket
446
459
447
460
Effective troubleshooting depends on clear, detailed support tickets. The more context you provide, the faster support can identify and resolve the issue.
Copy file name to clipboardExpand all lines: src/content/partials/cloudflare-one/warp/device-profile-order-of-precedence.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
{}
3
3
---
4
4
5
-
Cloudflare WARP evaluates device profiles dynamically based on a hierarchy. When a device connects, WARP checks the profiles from top to bottom as they appear in the dashboard. WARP follows the first match principle — once a device matches a profile, WARP stop evaluating and no subsequent profiles can override the decision.
5
+
Cloudflare WARP evaluates device profiles dynamically based on a hierarchy. When a device connects, WARP checks the profiles from top to bottom as they appear in the dashboard. WARP follows the first match principle — once a device matches a profile, WARP stops evaluating and no subsequent profiles can override the decision.
6
6
7
7
The **Default** profile is always at the bottom of the list. It will only be applied if the device does not meet the criteria of any profile listed above it. If you make another custom profile the default, all settings will be copied over into the **Default** profile.
To manually refresh your Cloudflare Access session and update your group information from your identity provider (IdP), go to the following URL in your browser and fill in your [team name](/cloudflare-one/faq/getting-started-faq/#what-is-a-team-domainteam-name):
Reauthenticating resets your [session duration](/cloudflare-one/identity/users/session-management/) and fetches the latest group information from the organization's IdP.
0 commit comments