Skip to content

Commit 7776fb4

Browse files
[CF1] firewall IPs clarification
1 parent 153ed6c commit 7776fb4

File tree

1 file changed

+9
-1
lines changed
  • src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment

1 file changed

+9
-1
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/firewall.mdx

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ The WARP client connects to Cloudflare via a standard HTTPS connection outside t
1515

1616
<Render file="warp/client-orchestration-ips" />
1717

18+
Although `zero-trust-client.cloudflareclient.com` may resolve to different IP addresses, this domain is hardcoded to the IPs listed above.
19+
1820
## DoH IP
1921

2022
:::note
@@ -26,6 +28,8 @@ In [Gateway with DoH](/cloudflare-one/connections/connect-devices/warp/configure
2628
- IPv4 DoH Addresses: `162.159.36.1` and `162.159.46.1`
2729
- IPv6 DoH Addresses: `2606:4700:4700::1111` and `2606:4700:4700::1001`
2830

31+
Although `<ACCOUNT_ID>.cloudflare-gateway.com` may resolve to different IP addresses, this domain is hardcoded to the IPs listed above.
32+
2933
### Android devices
3034

3135
If you are deploying the Cloudflare One Agent on Android/ChromeOS, you must also add `cloudflare-dns.com` to your firewall exception list. On Android/ChromeOS devices, WARP uses `cloudflare-dns.com` to resolve domains on your [Split Tunnel list](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#domain-based-split-tunnels).
@@ -89,6 +93,8 @@ The client connects to the following destinations to verify general Internet con
8993
- `162.159.197.3`
9094
- `2606:4700:102::3`
9195

96+
Although `engage.cloudflareclient.com` may resolve to different IP addresses, this domain is hardcoded to the IPs listed above.
97+
9298
### Inside tunnel
9399

94100
The WARP client connects to the following IPs to verify connectivity inside of the WARP tunnel:
@@ -98,7 +104,9 @@ The WARP client connects to the following IPs to verify connectivity inside of t
98104

99105
Because this check happens inside of the tunnel, you do not need to add these IPs to your firewall allowlist. However, since the requests go through Gateway, ensure that they are not blocked by a Gateway HTTP or Network policy.
100106

101-
Thought it may be visible in `warp-diag` and other logs, `connectivity.cloudflareclient.com` is used internally by WARP and should not be used in firewall policies.
107+
Although `connectivity.cloudflareclient.com` may appear in `warp-diag` and other logs, it is used internally by WARP and should not be used in firewall policies.
108+
109+
If your firewall allows traffic only by domain, you may need to explicitly allow `connectivity.cloudflareclient.com`. Be aware that this domain can resolve to different IP addresses. However, this domain is hardcoded to the IPs listed above. To avoid connectivity issues, ensure that `162.159.197.4` and `2606:4700:102::4` are permitted through your firewall.
102110

103111
## NEL reporting (optional)
104112

0 commit comments

Comments
 (0)