Skip to content

Commit 66562f5

Browse files
committed
update private DNS
1 parent f9903c2 commit 66562f5

File tree

3 files changed

+28
-15
lines changed

3 files changed

+28
-15
lines changed

src/content/docs/cloudflare-one/connections/connect-networks/private-net/cloudflared/private-dns.mdx

Lines changed: 20 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,38 @@
11
---
22
pcx_content_type: how-to
3-
title: Private DNS
3+
title: Resolve private DNS
44
sidebar:
5-
order: 1
5+
order: 4
66
---
77

8-
By default, the WARP client sends DNS requests to [1.1.1.1](/1.1.1.1/), Cloudflare's public DNS resolver, for resolution. With Cloudflare Tunnel, you can connect an internal DNS resolver to Cloudflare and use it to resolve non-publicly routed domains.
8+
import { Render } from "~/components"
9+
10+
By default, all DNS requests on the user device are resolved by Cloudflare's [public DNS resolver](/1.1.1.1/) except for common top level domains used for local resolution (such as `localhost`). You can connect an internal DNS resolver to Cloudflare and use it to resolve non-publicly routed domains.
911

1012
## Configure private DNS
1113

14+
To resolve private DNS queries:
15+
1216
1. [Connect your private network](/cloudflare-one/connections/connect-networks/get-started/) with Cloudflare Tunnel.
1317

1418
2. Under **Networks** > **Routes**, verify that the IP address of your internal DNS resolver is included in the tunnel.
1519

16-
3. [Enable the Gateway proxy](/cloudflare-one/policies/gateway/proxy/#turn-on-the-gateway-proxy) for TCP and UDP.
20+
:::note
21+
22+
Ensure that **Split Tunnels** are configured to [include traffic to private IPs and hostnames](/cloudflare-one/connections/connect-networks/private-net/cloudflared/#3-route-private-network-ips-through-warp).
1723

18-
4. Next, [create a Local Domain Fallback entry](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) that points to the internal DNS resolver. For example, you can instruct the WARP client to resolve all requests for `myorg.privatecorp` through an internal resolver at `10.0.0.25` rather than attempting to resolve this publicly.
24+
:::
1925

20-
:::note
26+
3. Route specific DNS queries to your internal DNS resolver using one of the following options:
2127

22-
Ensure that **Split Tunnels** are configured to [include traffic to private IPs and hostnames](/cloudflare-one/connections/connect-networks/private-net/cloudflared/#3-route-private-network-ips-through-warp).
28+
- [Create a Local Domain Fallback entry](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) that points to the internal DNS resolver. For example, you can instruct the WARP client to resolve all requests for `myorg.privatecorp` through an internal resolver at `10.0.0.25` rather than attempting to resolve this publicly.
29+
- Alternatively, [create a resolver policy](/cloudflare-one/policies/gateway/resolver-policies/#create-a-resolver-policy) that points to the internal DNS resolver. <Render file="gateway/resolver-policies-intro" />
2330

24-
:::
31+
4. [Enable the Gateway proxy](/cloudflare-one/policies/gateway/proxy/#turn-on-the-gateway-proxy) for TCP and UDP.
2532

2633
5. Finally, ensure that your tunnel uses QUIC as the default [transport protocol](/cloudflare-one/connections/connect-networks/configure-tunnels/cloudflared-parameters/run-parameters/#protocol). This will enable `cloudflared` to proxy UDP-based traffic which is required in most cases to resolve DNS queries.
2734

28-
The WARP client will now resolve requests through the internal DNS server you set up in your private network.
35+
The WARP client will now send DNS requests to your internal DNS resolver for resolution. To learn more, refer to [How the WARP client handles DNS requests](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/#how-the-warp-client-handles-dns-requests).
2936

3037
## Test the setup
3138

@@ -45,7 +52,7 @@ Both `dig` commands will fail if the WARP client is disabled on your end user's
4552

4653
## Troubleshooting
4754

48-
Use the following troubleshooting strategies if you are running into issues while configuring your private network with Cloudflare Tunnel.
55+
Use the following troubleshooting strategies if you are running into issues while configuring private DNS with Cloudflare Tunnel.
4956

5057
- Ensure that `cloudflared` is connected to Cloudflare by visiting **Networks** > **Tunnels** in Zero Trust.
5158

@@ -55,10 +62,10 @@ Use the following troubleshooting strategies if you are running into issues whil
5562

5663
- Ensure that end-user devices are enrolled into WARP by visiting [https://help.teams.cloudflare.com](https://help.teams.cloudflare.com).
5764

58-
- Double-check the precedence of your application policies in the Gateway Network policies tab. Ensure that a more global Block or Allow policy will not supersede the application policies.
65+
- Double-check the [order of precedence](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence) for your [Gateway network policies](/cloudflare-one/policies/gateway/network-policies/). Ensure that a more global Block or Allow policy will not supersede application-specific policies.
5966

60-
- Check the Gateway Audit Logs Network tab to see whether your UDP DNS resolutions are being allowed or blocked.
67+
- Check your [Gateway network logs](/cloudflare-one/insights/logs/gateway-logs/#network-logs) to see whether your UDP DNS resolutions are being allowed or blocked.
6168

62-
- Ensure that your Private DNS resolver is available over a routable private IP address. You can check that by trying the `dig` commands on your machine running `cloudflared`.
69+
- Ensure that your internal DNS resolver is available over a routable private IP address. You can check that by trying the `dig` commands on your machine running `cloudflared`.
6370

6471
- Check your set up by using `dig ... +tcp` to force the DNS resolution to use TCP instead of UDP.
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
---
2+
{}
3+
4+
---
5+
6+
[Resolver policies](/cloudflare-one/policies/gateway/resolver-policies/) provide similar functionality to Local Domain Fallback but occur in Cloudflare Gateway rather than on the local device. This option is recommended if you want more granular control over private DNS resolution. For example, you can ensure that all users in a specific geography use the private DNS server closest to them, ensure that specific conditions are met before resolving private DNS traffic, and apply [Gateway DNS policies](/cloudflare-one/policies/gateway/dns-policies/) to private DNS traffic.

src/content/partials/learning-paths/zero-trust/private-dns.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ By default, all DNS requests on the user device are resolved by Cloudflare's [pu
1212

1313
## Local Domain Fallback
1414

15-
Local Domain Fallback tells the WARP client to send specific DNS requests to your private DNS resolver instead of to Cloudflares public DNS resolver. This method was the primary delivery mechanism for private DNS for a long time, and is the simplest option, but it has two shortcomings: you cannot deterministically route private DNS queries to different resolvers based on specific attributes, and you cannot apply Gateway DNS policies to this traffic because Cloudflare is not resolving it.
15+
Local Domain Fallback tells the WARP client to send specific DNS requests to your private DNS resolver instead of to Cloudflare's public DNS resolver. This method was the primary delivery mechanism for private DNS for a long time, and is the simplest option, but it has two shortcomings: you cannot deterministically route private DNS queries to different resolvers based on specific attributes, and you cannot apply Gateway DNS policies to this traffic because Cloudflare is not resolving it.
1616

1717
To learn more about how Local Domain Fallback works, refer to [How the WARP client handles DNS requests](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/#how-the-warp-client-handles-dns-requests).
1818

@@ -27,7 +27,7 @@ To learn more about how Local Domain Fallback works, refer to [How the WARP clie
2727
Only available on Enterprise plans.
2828
:::
2929

30-
[Custom resolver policies](/cloudflare-one/policies/gateway/resolver-policies/) provide similar functionality to Local Domain Fallback but occur in Cloudflare Gateway rather than on the local device. This option is recommended if you want more granular control over private DNS resolution. For example, you can ensure that all users in a specific geography use the private DNS server closest to them, ensure that specific conditions are met before resolving private DNS traffic, and apply [Gateway DNS policies](/cloudflare-one/policies/gateway/dns-policies/) to private DNS traffic.
30+
<Render file="gateway/resolver-policies-intro" product="cloudflare-one" />
3131

3232
### Create a resolver policy
3333

0 commit comments

Comments
 (0)