You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/changelogs/warp.yaml
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ entries:
11
11
A new GA release for the Linux WARP client is now available in the [package repository](https://pkg.cloudflareclient.com/). This release contains minor fixes and minor improvements.
12
12
13
13
Notable updates:
14
-
- Added `list targets` to the `warp-cli` to enhance the user experience with the [Access for Infrastructure SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) solution.
14
+
- Added `target list` to the `warp-cli` to enhance the user experience with the [Access for Infrastructure SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) solution.
15
15
- Added the ability to customize PCAP options in the `warp-cli`.
16
16
- Added a list of installed applications in `warp-diag`.
17
17
- Added a `tunnel reset mtu` subcommand to the `warp-cli`.
@@ -36,7 +36,7 @@ entries:
36
36
A new GA release for the Windows WARP client is now available in the [App Center](https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-windows-1/distribution_groups/release). This release contains minor fixes and improvements.
37
37
38
38
Notable updates:
39
-
- Added `list targets` to the `warp-cli` to enhance the user experience with the [Access for Infrastructure SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) solution.
39
+
- Added `target list` to the `warp-cli` to enhance the user experience with the [Access for Infrastructure SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) solution.
40
40
- Added [pre-login](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/windows-prelogin/) configuration details to the `warp-diag` output.
41
41
- Added a `tunnel reset mtu` subcommand to the `warp-cli`.
42
42
- Added a JSON output option to the `warp-cli`.
@@ -57,7 +57,7 @@ entries:
57
57
All customers running macOS Ventura 13.0 and above (including Sequoia) are advised to upgrade to this release. This release fixes an incompatibility with the firewall found on macOS Sonoma 14.4 and above that could result in the firewall being disabled.
58
58
59
59
Notable updates:
60
-
- Added `list targets` to the `warp-cli` to enhance the user experience with the [Access for Infrastructure SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) solution.
60
+
- Added `target list` to the `warp-cli` to enhance the user experience with the [Access for Infrastructure SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) solution.
61
61
- Added a `tunnel reset mtu` subcommand to the `warp-cli`.
62
62
- Added the ability for `warp-cli` to use the team name provided in the MDM file for initial registration.
| <ul><li> Gateway with WARP</li><li> Secure Web Gateway without DNS filtering </li></ul> | All plans |
18
+
19
+
| System | Availability |
20
+
| -------- | ------------ |
21
+
| Windows | ✅ |
22
+
| macOS | ✅ |
23
+
| Linux | ✅ |
24
+
| iOS | ✅ |
25
+
| Android | ✅ |
26
+
| ChromeOS | ✅ |
27
+
28
+
</Details>
29
+
13
30
Access for Infrastructure allows you to have granular control over how users access individual servers, clusters, or databases in your private network. By adding an infrastructure application to Cloudflare Access, you can configure how users authenticate to the resource as well as control and authorize the ports, protocols, and usernames that they can connect with. Access and command logs ensure regulatory compliance and allow for auditing of user activity in case of a security breach.
14
31
15
32
:::note
@@ -64,6 +81,38 @@ To connect to targets that are in different VNETS, users will need to [switch th
64
81
If a user is connected to a target in VNET-A and needs to connect to a target in VNET-B, switching their VNET will not break any existing connections to targets within VNET-A. At present, connections are maintained between VNETs.
To revoke a user's access to all infrastructure targets, you can either [revoke the user from Zero Trust](/cloudflare-one/identity/users/session-management/#per-user) or revoke their device. Cloudflare does not currently support revoking a user's session for a specific target.
0 commit comments