You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/team-and-resources/devices/warp/deployment/firewall.mdx
+57-40Lines changed: 57 additions & 40 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,54 +5,69 @@ sidebar:
5
5
order: 9
6
6
---
7
7
8
-
import { Render } from"~/components";
8
+
import { Render, Details } from"~/components";
9
9
10
10
If your organization uses a firewall or other policies to restrict or intercept Internet traffic, you may need to exempt the following IP addresses and domains to allow the WARP client to connect.
11
11
12
12
## Client orchestration API
13
13
14
-
The WARP client connects to Cloudflare via a standard HTTPS connection outside the tunnel for operations like registration or settings changes. To perform these operations, you must allow `zero-trust-client.cloudflareclient.com` which will lookup the following IP addresses:
14
+
The WARP client connects to Cloudflare via a standard HTTPS connection outside the tunnel for operations like registration or settings changes. To perform these operations, you must allow the following IPs and domains:
Even though `zero-trust-client.cloudflareclient.com` and `notifications.cloudflareclient.com` may resolve to different IP addresses, WARP overrides the resolved IPs with the IPs listed above. To avoid connectivity issues, ensure that the above IPs are permitted through your firewall.
19
+
20
+
<Detailsheader="FedRAMP High requirements">
21
+
22
+
To deploy WARP in FedRAMP High environments, you will need to allow a different set of IPs and domains through your firewall:
23
+
24
+
- IPv4 API endpoints: `162.159.213.1` and `172.64.98.1`
25
+
- IPv6 API endpoints: `2606:54c1:11::` and `2a06:98c1:4b::`
26
+
- SNIs: `api.devices.fed.cloudflare.com` and `notifications.devices.fed.cloudflare.com`
27
+
28
+
</Details>
25
29
26
30
## DoH IP
27
31
28
32
:::note
29
33
Only required for [Gateway with DoH](/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-modes/#gateway-with-doh) mode.
30
34
:::
31
35
32
-
In [Gateway with DoH](/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-modes/#gateway-with-doh) mode, the WARP client sends DNS requests to Gateway over an HTTPS connection. For DNS to work correctly, you must allow `<ACCOUNT_ID>.cloudflare-gateway.com` which will lookup the following IPs:
36
+
In [Gateway with DoH](/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-modes/#gateway-with-doh) mode, the WARP client sends DNS requests to Gateway over an HTTPS connection. For DNS to work correctly, you must allow the following IPs and domains:
37
+
38
+
- IPv4 DoH addresses: `162.159.36.1` and `162.159.46.1`
39
+
- IPv6 DoH addresses: `2606:4700:4700::1111` and `2606:4700:4700::1001`
40
+
- SNIs: `<ACCOUNT_ID>.cloudflare-gateway.com`
41
+
42
+
Even though `<ACCOUNT_ID>.cloudflare-gateway.com` may resolve to different IP addresses, WARP overrides the resolved IPs with the IPs listed above. To avoid connectivity issues, ensure that the above IPs are permitted through your firewall.
33
43
34
-
- IPv4 DoH Addresses: `162.159.36.1` and `162.159.46.1`
To deploy WARP in FedRAMP High environments, you will need to allow a different set of IPs and domains through your firewall:
36
46
37
-
<Render
38
-
file="warp/firewall"
39
-
product="cloudflare-one"
40
-
params={{
41
-
domain: "<ACCOUNT_ID>.cloudflare-gateway.com",
42
-
}}
43
-
/>
47
+
- IPv4 DoH addresses: `172.64.100.3` and `172.64.101.3`
48
+
- IPv6 DoH addresses: `2606:54c1:13::2`
49
+
- SNIs: `<ACCOUNT_ID>.fed.cloudflare-gateway.com`
50
+
</Details>
44
51
45
52
### Android devices
46
53
47
54
If you are deploying the Cloudflare One Agent on Android/ChromeOS, you must also add `cloudflare-dns.com` to your firewall exception list. On Android/ChromeOS devices, WARP uses `cloudflare-dns.com` to resolve domains on your [Split Tunnel list](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#domain-based-split-tunnels).
48
55
49
56
## Client authentication endpoint
50
57
51
-
When you [log in to your Zero Trust organization](/cloudflare-one/team-and-resources/devices/warp/deployment/manual-deployment/), you will have to complete the authentication steps required by your organization in the browser window that opens. To perform these operations, you must allow the following domains:
58
+
When you [log in to your Cloudflare One organization](/cloudflare-one/team-and-resources/devices/warp/deployment/manual-deployment/), you will have to complete the authentication steps required by your organization in the browser window that opens. To perform these operations, you must allow the following domains:
52
59
53
-
- The IdP used to authenticate to Cloudflare Zero Trust
60
+
- The IdP used to authenticate to Cloudflare One
54
61
-`<your-team-name>.cloudflareaccess.com`
55
62
63
+
<Detailsheader="FedRAMP High requirements">
64
+
To deploy WARP in FedRAMP High environments, you will need to allow different domains through your firewall:
65
+
66
+
- FedRAMP High IdP used to authenticate to Cloudflare One
67
+
-`<your-team-name>.fed.cloudflareaccess.com`.
68
+
69
+
</Details>
70
+
56
71
## WARP ingress IP
57
72
58
73
WARP connects to the following IP addresses, depending on which [tunnel protocol](/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-settings/#device-tunnel-protocol) is configured for your device (WireGuard or MASQUE). All network traffic from your device to Cloudflare goes through these IPs and ports over UDP.
@@ -79,9 +94,24 @@ WARP connects to the following IP addresses, depending on which [tunnel protocol
79
94
80
95
:::note
81
96
82
-
Before you [log in to your Zero Trust organization](/cloudflare-one/team-and-resources/devices/warp/deployment/manual-deployment/), you may see the IPv4 range `162.159.192.0/24`. This IP is used for consumer WARP services ([1.1.1.1 w/ WARP](/warp-client/)) and is not required for Zero Trust deployments.
97
+
Before you [log in to your Cloudflare One organization](/cloudflare-one/team-and-resources/devices/warp/deployment/manual-deployment/), you may see the IPv4 range `162.159.192.0/24`. This IP is used for consumer WARP ([1.1.1.1 w/ WARP](/warp-client/)) and is not required for Zero Trust services.
83
98
:::
84
99
100
+
<Detailsheader="FedRAMP High requirements">
101
+
102
+
Devices will use the MASQUE protocol in FedRAMP High environments. To deploy WARP for FedRAMP High, you will need to allow the following IPs and ports:
The following domains are used as part of our captive portal check:
@@ -101,34 +131,21 @@ As part of establishing the WARP connection, the client runs connectivity checks
101
131
102
132
The client connects to the following destinations to verify general Internet connectivity outside of the WARP tunnel. Make sure that these IPs and domains are on your firewall allowlist.
103
133
104
-
-`engage.cloudflareclient.com`: The client will always send requests directly to an IP in the [WARP ingress IPv4 or IPv6 range](/cloudflare-one/team-and-resources/devices/warp/deployment/firewall/#warp-ingress-ip) (or to your [`override_warp_endpoint`](/cloudflare-one/team-and-resources/devices/warp/deployment/mdm-deployment/parameters/#override_warp_endpoint) if set). Requests will not use a proxy server, even if one is configured for the system.
105
134
-`162.159.197.3`
106
135
-`2606:4700:102::3`
136
+
-`engage.cloudflareclient.com`: The client will always send requests directly to an IP in the [WARP ingress IPv4 or IPv6 range](/cloudflare-one/team-and-resources/devices/warp/deployment/firewall/#warp-ingress-ip) (or to your [`override_warp_endpoint`](/cloudflare-one/team-and-resources/devices/warp/deployment/mdm-deployment/parameters/#override_warp_endpoint) if set). Requests will not use a proxy server, even if one is configured for the system.
107
137
108
-
<Render
109
-
file="warp/firewall"
110
-
product="cloudflare-one"
111
-
params={{
112
-
domain: "engage.cloudflareclient.com",
113
-
}}
114
-
/>
138
+
Even though `engage.cloudflareclient.com` may resolve to different IP addresses, WARP overrides the resolved IPs with the IPs listed above. To avoid connectivity issues, ensure that the above IPs are permitted through your firewall.
115
139
116
140
### Inside tunnel
117
141
118
-
The WARP client connects to the following IPs to verify connectivity inside of the WARP tunnel:
142
+
The WARP client connects to the following destinations to verify connectivity inside of the WARP tunnel:
119
143
120
144
-`162.159.197.4`
121
145
-`2606:4700:102::4`
146
+
-`connectivity.cloudflareclient.com`
122
147
123
-
Because this check happens inside of the tunnel, you do not need to add these IPs to your firewall allowlist. However, since the requests go through Gateway, ensure that they are not blocked by a Gateway HTTP or Network policy.
124
-
125
-
<Render
126
-
file="warp/firewall"
127
-
product="cloudflare-one"
128
-
params={{
129
-
domain: "connectivity.cloudflareclient.com",
130
-
}}
131
-
/>
148
+
Because this check happens inside of the tunnel, you do not need to add these IPs and domains to your firewall allowlist. However, since the requests go through Gateway, ensure that they are not blocked by a Gateway HTTP or Network policy.
Copy file name to clipboardExpand all lines: src/content/partials/learning-paths/zero-trust/install-agent.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ Most admins test by manually downloading the WARP client and enrolling in your o
10
10
## Install WARP
11
11
12
12
1. First, uninstall any existing third-party VPN software if possible. Sometimes products placed in a disconnected or disabled state will still interfere with the WARP client.
13
-
2. If you are running third-party firewall or TLS decryption software, verify that it does not inspect or block traffic to the WARP client orchestration IPs:
13
+
2. If you are running third-party firewall or TLS decryption software, verify that it does not inspect or block traffic to the following destinations:
0 commit comments