Skip to content

Commit 6282181

Browse files
[CF1] SWG w/o DNS filtering mode IPv6 limitation
1 parent 169f792 commit 6282181

File tree

2 files changed

+14
-3
lines changed

2 files changed

+14
-3
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/index.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ This mode is best suited for organizations that only want to apply DNS filtering
2525

2626
## Secure Web Gateway without DNS filtering
2727

28-
This mode is best suited for organizations that want to proxy network and HTTP traffic but keep their existing DNS filtering software. DNS traffic is handled by the default mechanism on your device.
28+
This mode (sometimes referred to as tunnel only mode) is best suited for organizations that want to proxy network and HTTP traffic but keep their existing DNS filtering software. DNS traffic is handled by the default mechanism on your device.
2929

3030
| DNS filtering | Network filtering | HTTP filtering | Features enabled |
3131
| ------------- | ----------------- | -------------- | ----------------------------------------------------------------------------------------------------------------------------------------- |
@@ -35,6 +35,7 @@ This mode is best suited for organizations that want to proxy network and HTTP t
3535

3636
- This mode disables all features that rely on WARP for DNS resolution, including [domain-based split tunneling](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#domain-based-split-tunnels) and [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/).
3737
- Only available on Windows, Linux, and macOS.
38+
- This mode has a known limitation concerning [DNS servers with IPv6 addresses](/cloudflare-one/connections/connect-devices/warp/troubleshooting/known-limitations/#ipv6-dns-resolution-in-secure-web-gateway-without-dns-filtering-mode).
3839

3940
:::
4041

src/content/docs/cloudflare-one/connections/connect-devices/warp/troubleshooting/known-limitations.mdx

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ or create a Docker network with a working MTU value:
100100
docker network create -o "com.docker.network.driver.mtu=1420" my-docker-network
101101
```
102102

103-
The MTU value should be set to the MTU of your host's default interface minus 80 bytes for the WARP protocol overhead. Most MTUs are 1500, so 1420 should work for most users.
103+
The MTU value should be set to the MTU of your host's default interface minus 80 bytes for the WARP protocol overhead. Most MTUs are 1500, so 1420 should work for most users.
104104

105105
## Access WARP DNS from Docker
106106

@@ -121,7 +121,7 @@ Address: 8.8.8.8:53
121121
122122
** server can't find connectivity-check.warp-svc.: NXDOMAIN
123123
** server can't find connectivity-check.warp-svc.: NXDOMAIN
124-
124+
125125
# Create a bridge network called demo
126126
❯ docker network create demo
127127
e1e1943a6995a7e8c115a1c60357fe64f87a3ae90074ce6e4c3f0d2bba3fa892
@@ -157,6 +157,16 @@ Address: 127.0.2.3
157157

158158
Use of the WARP client in a Microsoft 365 Windows 10 Cloud PC is not supported. To work around this limitation, use Windows 11.
159159

160+
## IPv6 DNS Resolution in Secure Web Gateway without DNS filtering mode
161+
162+
In [Secure Web Gateway without DNS filtering](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/#secure-web-gateway-without-dns-filtering) mode, after the WARP tunnel is established, WARP checks connectivity by resolving `connectivity.cloudflareclient.com` using the DNS server configured on the device.
163+
164+
Sometimes this check fails because the DNS server—often assigned by DHCP and accessible only on the local network—becomes unreachable when traffic is routed through the WARP tunnel.
165+
166+
For IPv4, failure is uncommon because DHCP-assigned DNS servers typically use private (RFC 1918) addresses, which WARP excludes from the tunnel by default.
167+
168+
However, in an IPv6 environment, there is no automatic exclusion. If your DNS server uses an IPv6 address, you must manually exclude it from WARP’s tunnel using [split tunnel](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) settings for Secure Web Gateway without DNS filtering mode to work properly.
169+
160170
## Troubleshooting
161171

162172
- [Troubleshooting](/cloudflare-one/faq/troubleshooting/) - Review Troubleshooting for other WARP-related troubleshooting errors and solutions.

0 commit comments

Comments
 (0)