Skip to content

Commit 3484e4b

Browse files
committed
connectivity check IPs
1 parent 78a1cc0 commit 3484e4b

File tree

6 files changed

+22
-10
lines changed

6 files changed

+22
-10
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/firewall.mdx

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -67,13 +67,25 @@ The following domains are used as part of our captive portal check:
6767
- `cloudflareok.com`
6868
- `cloudflarecp.com`
6969

70-
## Connectivity check
70+
## Connectivity checks
7171

72-
As part of establishing the WARP connection, the client will check the following HTTPS URLs to validate a successful connection:
72+
As part of establishing the WARP connection, the client runs connectivity checks inside and outside of the WARP tunnel.
7373

74-
- `engage.cloudflareclient.com` verifies general Internet connectivity outside of the WARP tunnel. These requests are always sent directly to an IP in the [WARP ingress IPv4 or IPv6 range](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#warp-ingress-ip) (or to your [`override_warp_endpoint`](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/parameters/#override_warp_endpoint) if set). Requests will not use a proxy server, even if one is configured for the system.
74+
### Outside tunnel
7575

76-
- `connectivity.cloudflareclient.com` verifies connectivity inside of the WARP tunnel. Because this check happens inside of the tunnel, you do not need to add `connectivity.cloudflareclient.com` to your firewall allowlist.
76+
The client connects to the following destinations to verify general Internet connectivity outside of the WARP tunnel. Make sure that these IPs and domains are on your firewall allowlist.
77+
78+
- `engage.cloudflareclient.com`: The client will always send requests directly to an IP in the [WARP ingress IPv4 or IPv6 range](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#warp-ingress-ip) (or to your [`override_warp_endpoint`](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/parameters/#override_warp_endpoint) if set). Requests will not use a proxy server, even if one is configured for the system.
79+
- `162.159.197.3`
80+
- `2606:4700:102::3`
81+
82+
### Inside tunnel
83+
84+
The client connects to the following destinations to verify connectivity inside of the WARP tunnel. Because this check happens inside of the tunnel, you do not need to add these IPs and domains to your firewall allowlist. However, since the requests go through Gateway, ensure that they are not blocked by a Gateway HTTP or Network policy.
85+
86+
- `connectivity.cloudflareclient.com`
87+
- `162.159.197.4`
88+
- `2606:4700:102::4`
7789

7890
## NEL reporting (optional)
7991

src/content/docs/cloudflare-one/connections/connect-devices/warp/troubleshooting/client-errors.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ This page lists the error codes that can appear in the WARP client GUI. If you d
4545

4646
### Cause
4747

48-
The initial [connectivity check](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-check) failed for an unknown reason. Refer to [Unable to connect WARP](/cloudflare-one/connections/connect-devices/warp/troubleshooting/common-issues/#unable-to-connect-warp) for the most common reasons why this error occurs.
48+
The initial [connectivity check](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-checks) failed for an unknown reason. Refer to [Unable to connect WARP](/cloudflare-one/connections/connect-devices/warp/troubleshooting/common-issues/#unable-to-connect-warp) for the most common reasons why this error occurs.
4949

5050
### Resolution
5151

@@ -164,7 +164,7 @@ A router, firewall, antivirus software, or other third-party security product is
164164

165165
### Cause
166166

167-
The [connectivity check](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-check) inside of the WARP tunnel has failed.
167+
The [connectivity check](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-checks) inside of the WARP tunnel has failed.
168168

169169
### Resolution
170170

src/content/docs/cloudflare-one/connections/connect-devices/warp/troubleshooting/warp-logs.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ The `warp-debugging-info-<date>-<time>.zip` archive contains the following files
6464
| `boringtun.log` | Log for the WARP tunnel that serves traffic from the device to Cloudflare's global network. |
6565
| `bound-dns-ports.txt` | Active processes on port `53`. |
6666
| `captive-portal-hotspot-detect.txt` | HTTP response of `captive.apple.com` |
67-
| `connectivity.txt` | DNS resolution and HTTP trace requests to [validate a successful connection](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-check). Can be used to determine whether traffic is routing through the WARP tunnel. |
67+
| `connectivity.txt` | DNS resolution and HTTP trace requests to [validate a successful connection](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-checks). Can be used to determine whether traffic is routing through the WARP tunnel. |
6868
| `daemon_dns.log` | Contains detailed DNS logs if **Log DNS queries** is enabled in the WARP client. |
6969
| `daemon.log` | Detailed log of all actions performed by the WARP client, including all communication between the device and Cloudflare's global network. **Note:** This is the most useful debug log. |
7070
| `date.txt` | Date and time (UTC) when you ran the `warp-diag` command. |

src/content/warp-releases/linux/beta/2025.4.589.1.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ releaseNotes: |-
44
- Improved DEX test error reporting.
55
- Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile.
66
- Added a TCP fallback for the MASQUE tunnel protocol to improve compatibility with networks on MASQUE.
7-
- Added new IP addresses for [tunnel connectivity checks](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-check). If your organization uses a firewall or other policies you will need to exempt these IPs.
7+
- Added new IP addresses for [tunnel connectivity checks](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-checks). If your organization uses a firewall or other policies you will need to exempt these IPs.
88
- Fixed an issue where frequent network changes could cause WARP to become unresponsive.
99
- DNS over HTTPS traffic is now included in the WARP tunnel by default.
1010
version: 2025.4.589.1

src/content/warp-releases/macos/beta/2025.4.589.1.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ releaseNotes: |-
55
- Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile.
66
- Improved captive portal detection.
77
- Added a TCP fallback for the MASQUE tunnel protocol to improve compatibility with networks on MASQUE.
8-
- Added new IP addresses for [tunnel connectivity checks](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-check). If your organization uses a firewall or other policies you will need to exempt these IPs.
8+
- Added new IP addresses for [tunnel connectivity checks](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-checks). If your organization uses a firewall or other policies you will need to exempt these IPs.
99
- DNS over HTTPS traffic is now included in the WARP tunnel by default.
1010
- Improved the error message displayed in the client GUI when the rate limit for entering an incorrect admin override code is met.
1111
- Added a [Collect Captive Portal Diag](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/captive-portals/#get-captive-portal-logs) button in the client GUI to make it easier for users to collect captive portal debugging diagnostics.

src/content/warp-releases/windows/beta/2025.4.589.1.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ releaseNotes: |-
77
- Improved WARP client UI high contrast mode.
88
- Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile.
99
- Added a TCP fallback for the MASQUE tunnel protocol to improve compatibility with networks on MASQUE.
10-
- Added new IP addresses for [tunnel connectivity checks](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-check). If your organization uses a firewall or other policies you will need to exempt these IPs.
10+
- Added new IP addresses for [tunnel connectivity checks](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-checks). If your organization uses a firewall or other policies you will need to exempt these IPs.
1111
- DNS over HTTPS traffic is now included in the WARP tunnel by default.
1212
- Improved the error message displayed in the client GUI when the rate limit for entering an incorrect admin override code is met.
1313
- Added a [Collect Captive Portal Diag](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/captive-portals/#get-captive-portal-logs) button in the client GUI to make it easier for users to collect captive portal debugging diagnostics.

0 commit comments

Comments
 (0)