Skip to content

Commit 2a0b473

Browse files
committed
connect server
1 parent 5684e59 commit 2a0b473

File tree

7 files changed

+10
-7
lines changed

7 files changed

+10
-7
lines changed

src/content/docs/cloudflare-one/connections/connect-networks/deployment-guides/aws.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ EOF
9898

9999
[Private network routes](/cloudflare-one/connections/connect-networks/private-net/cloudflared/) allow users to connect to your virtual private cloud (VPC) using the WARP client. To add a private network route for your Cloudflare Tunnel:
100100

101-
1. In the **Private Network** tab, enter the **Private IPv4 address** of your AWS instance (for example, `172.31.19.0`). You can expand the IP range later if necessary.
101+
1. In the **Private Networks** tab, enter the **Private IPv4 address** of your AWS instance (for example, `172.31.19.0`). You can expand the IP range later if necessary.
102102
2. In your [Split Tunnel configuration](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route), make sure the private IP is routing through WARP. For example, if you are using Split Tunnels in Exclude mode, delete `172.16.0.0/12`. We recommend re-adding the IPs that are not explicitly used by your AWS instance.
103103

104104
To determine which IP addresses to re-add, subtract your AWS instance IPs from `172.16.0.0/12`:

src/content/docs/cloudflare-one/connections/connect-networks/deployment-guides/google-cloud-platform.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ To complete the following procedure, you will need to:
7777
7878
To configure a private network route for your Cloudflare Tunnel:
7979
80-
1. In the **Private Network** tab, enter the **Internal IP** of your GCP VM instance (for example, `10.0.0.2`). You can expand the IP range later if necessary.
80+
1. In the **Private Networsk** tab, enter the **Internal IP** of your GCP VM instance (for example, `10.0.0.2`). You can expand the IP range later if necessary.
8181
2. In your [Split Tunnel configuration](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route), make sure the internal IP is routing through WARP. For example, if you are using Split Tunnels in Exclude mode, delete `10.0.0.0/8`. We recommend re-adding the IPs that are not explicitly used by your GCP VM.
8282
8383
To determine which IP addresses to re-add, subtract your GCP instance IPs from `10.0.0.0/8`:

src/content/docs/cloudflare-one/connections/connect-networks/private-net/cloudflared/connect-private-hostname.mdx

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,9 @@ This section covers how to enable remote access to a private hostname applicatio
4545

4646
### 1. Connect the server to Cloudflare
4747

48-
Hostname must be unique for an account (1:M mapping from hostname to Tunnel)
48+
<Render file="tunnel/create-tunnel"/>
49+
50+
9. In the **Hostname routes** tab, enter the fully qualified domain name (FDQN) that represents your application (for example, `wiki.internal.local`).
4951

5052
<Details header="Hostname format restrictions">
5153
- Less than 255 characters
@@ -55,6 +57,7 @@ Hostname must be unique for an account (1:M mapping from hostname to Tunnel)
5557
- Hostnames with non-Latin characters must be Punycode encoded and include the [ACE prefix](https://en.wikipedia.org/wiki/Punycode#ACE_prefix_for_internationalized_domain_names). For example, to represent `例.internal.local`, enter `xn--fsq.internal.local`.
5658
</Details>
5759

60+
10. Select **Complete setup**.
5861

5962
### 2. Set up the client
6063

src/content/docs/cloudflare-one/connections/connect-networks/private-net/cloudflared/tunnel-virtual-networks.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ The following example demonstrates how to add two overlapping IP routes to Cloud
6060
2. Select **Create a tunnel**.
6161
3. Name your tunnel `Staging tunnel` and select **Save tunnel**.
6262
4. Install the connector within your staging environment.
63-
5. In the **Private Network** tab, add `10.128.0.1/32`.
63+
5. In the **Private Networks** tab, add `10.128.0.1/32`.
6464
6. Select **Additional settings**. Under **Virtual networks**, select *staging-vnet*.
6565
7. Save the tunnel.
6666
8. Repeat Steps 2a-2g to create another tunnel called `Production tunnel`. Be sure to install the connector within your production environment and assign the route to *production-vnet*.

src/content/docs/cloudflare-one/tutorials/user-selectable-egress-ips.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ After creating your virtual networks, route your private network CIDRs over each
7373

7474
1. Go to **Networks** > **Tunnels**.
7575
2. Select your tunnel routing `10.0.0.0/8`, then select **Configure**.
76-
3. Go to **Private Network**. Select the `10.0.0.0/8` route.
76+
3. Go to **Private Networks**. Select the `10.0.0.0/8` route.
7777
4. In **Additional settings**, choose your first virtual network. For example, `vnet-AMER`.
7878
5. Select **Save private network**.
7979
6. To route `10.0.0.0/8` over another virtual network, select **Add a private network**.

src/content/docs/load-balancing/private-network/tunnels-setup.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ To assign the virtual network to the tunnel:
2828

2929
1. Go to **Networks** > **Tunnels**.
3030
2. Select the tunnel you created in the previous steps and select **Configure**.
31-
3. Under **Private Network**, select **Add a private network**.
31+
3. Under **Private Networks**, select **Add a private network**.
3232
4. Specify an IP range under **CIDR** and select the virtual network under **Additional settings**.
3333
5. Select **Save private network**.
3434

src/content/partials/cloudflare-one/tunnel/cloud-create-tunnel.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ inputParameters: param1;;param2
55

66
import { Markdown } from "~/components"
77

8-
Next, we will create a Cloudflare Tunnel in Zero Trust and run the tunnel on the {props.one}.
8+
Create a Cloudflare Tunnel in Zero Trust and run the tunnel on the {props.one}.
99

1010
1. Log in to [Zero Trust](https://one.dash.cloudflare.com) and go to **Networks** > **Tunnels**.
1111

0 commit comments

Comments
 (0)