You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/troubleshooting/troubleshooting-guide.mdx
+20-33Lines changed: 20 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ This guide helps you diagnose and resolve common issues with the Cloudflare WARP
11
11
12
12
## Prerequisites
13
13
14
-
To use this guide, you must have completed the [Zero Trust onboarding flow](/cloudflare-one/setup/) with a Zero Trust organizaton created and the WARP client installed on your device.
14
+
To use this guide, you must have completed the [Zero Trust onboarding flow](/cloudflare-one/setup/) with a Zero Trust organizaton created and the WARP client installed on an end user device.
15
15
16
16
## Troubleshooting steps
17
17
@@ -102,51 +102,31 @@ After you have your diagnostic files, go to [Review diagnostic logs](/cloudflare
102
102
103
103
## 2. Review diagnostics logs
104
104
105
-
WARP diagnostic logs display WARP information relevant to the target device after all MDM and other software operations have been applied, allowing you to determine whether WARP is misconfigured or affected by conflicting software. After downloading the WARP diagnostic logs and/or PCAPs, you will review key files to troubleshoot your issue by checking for potential misconfigurations.
105
+
WARP diagnostic logs display WARP information relevant to the target device after all MDM and other software operations have been applied, allowing you to determine whether WARP is misconfigured or behaving in an unexpected way. After downloading the WARP diagnostic logs, you will review key files to check that WARP is operating as intended. You will check the device's WARP status, its applied profile ID, and its split tunnel configuration.
106
106
107
-
### 2a. Check WARP status
107
+
### Check WARP status
108
108
109
109
Open the `warp-status.txt` file to review the status of the WARP connection when the `warp-diag` was collected. A connected WARP client will appear as:
110
110
111
111
```
112
112
Ok(Connected)
113
113
```
114
114
115
-
### Common connectivity issues
115
+
If the WARP client is experiencing issues, the error will display in the WARP GUI on the device. Use the [Client errors](/cloudflare-one/connections/connect-devices/warp/troubleshooting/client-errors/) documentation to identify your error, its cause, and the solution.
116
116
117
-
#### WARP client failing to connect
117
+
###Check WARP settings
118
118
119
-
If connectivity fails, reset the encryption keys to force re-establishement of the WARP tunnel without deleting registration.
120
-
121
-
###### Windows, Mac, Linux
122
-
123
-
To reset the encryption keys on a Windows, Mac, or Linux device:
124
-
125
-
1. Open the WARP GUI > select the gear icon > **Preferences**.
126
-
2. Select **Connection**.
127
-
3. Select **Reset encryption keys**.
128
-
129
-
##### iOS, Android
130
-
131
-
To reset the encryption keys on an iOS or Android device:
Open the `warp-status.txt` file to review the WARP client settings, split tunnel configuration, and the applied device profile. Use this information to identify any discrepancies from the expected behavior you configure pre-deployment.
119
+
After you have checked WARP status, you will review WARP's settings on the device to check if the expected configuration has been applied. Open the `warp-settings.txt` file to review the WARP client settings. You will check the device's applied device profile and split tunnel configuration.
140
120
141
121
#### Example `warp-settings.txt` file
142
122
143
-
Review the following `warp-settings.txt` file and the descriptions of its content below.
123
+
After you have downloaded the WARP diagnostic logs, open the `warp-settings.txt` file. Review the following example`warp-settings.txt` file and the descriptions of its content below.
144
124
145
125
```txt
146
126
Merged configuration:
147
127
(derived) Always On: true
148
-
(network policy) Switch Locked: false # If false, does not allows the user to [turn off the WARP switch](https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#lock-warp-switch) and disconnect the client.
149
-
(network policy) Mode: WarpWithDnsOverHttps <-- This is WARP with Gateway mode
128
+
(network policy) Switch Locked: false # If false, does not allows the user to turn off the WARP toggle and disconnect the WARP client
129
+
(network policy) Mode: WarpWithDnsOverHttps # The device's WARP mode, this is WARP with Gateway mode
150
130
(network policy) WARP tunnel protocol: WireGuard
151
131
(default) Disabled for Wifi: false
152
132
(default) Disabled for Ethernet: false
@@ -171,13 +151,13 @@ Merged configuration:
171
151
(network policy) Allow Updates: false <------- Will the client perform the update checks, doesn't necessarily mean they'll be able to install them (depends on user permissions)
172
152
(network policy) Allowed to Leave Org: true <-- Is the button in the GUI grayed out or not. Note, it'll always be grayed out if they have an MDM file
173
153
(api defaults) Known apple connectivity check IPs: xx.xxx.0.0/16;
174
-
(network policy) LAN Access Settings: Allowed until reconnect on a /24 subnet <-- The maximum size of network that'll be allowed when Access Lan is clicked.
154
+
(network policy) LAN Access Settings: Allowed until reconnect on a /24 subnet <-- The maximum size of network that will be allowed when Access Lan is clicked.
The command `warp-cli settings` will generate the same information in your device's terminal that is present in the `warp-settings.txt` file.
160
+
The command `warp-cli settings`in a terminal will generate the same information that is present in the `warp-settings.txt` file.
181
161
182
162
:::
183
163
@@ -266,7 +246,7 @@ LAN Access Settings: Allowed until reconnect on a /24 subnet
266
246
267
247
##### Profile ID
268
248
269
-
Refers to the [Device profile](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/) a device is using. In this example, the ID is `000000x1-00x1-1xx0-1xx1-11101x1axx11` which can be cross-referenced in the dashboard by going to **Zero Trust** > **My team** > **Devices** > selecting a device name and reviewing the **Device ID** under **Basic Information**.
249
+
Refers to the [Device profile](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/) a device is using. In this example, the ID is `000000x1-00x1-1xx0-1xx1-11101x1axx11`. To verify if the applied ID is in the dashboard by going to **Zero Trust** > **My team** > **Devices** > selecting a device name and reviewing the **Device ID** under **Basic Information**.
If your organization has multiple device profiles defined in the Zero Trust dashboard, a device may be matched to an unexpected profile due to lack of precide matcing rules or how profile precedence is configured. Device profiles are evaluated top to bottom based on their order in the UI, and the first matching profile is applied.
265
+
If your organization has multiple device profiles defined in the Zero Trust dashboard, a device may be matched to an unexpected profile due to lack of precise matcing rules or how profile precedence is configured.
266
+
267
+
:::tip[Consider]
268
+
269
+
270
+
271
+
:::
285
272
286
273
To debug a possibly misconfigured device profile, you must:
0 commit comments