Skip to content

Commit ab1e8e2

Browse files
[CF1] warp troubleshooting (#23956)
* [CF1] warp troubleshooting * updates * update * updates * updates * updates * updates * update * edits * final edits to first draft * first draft edits, links, stream * sha256 check * extra additions * spelling edits * final edits * keehun edits * remove details unnecessary space * links * Apply suggestions from code review Co-authored-by: Pedro Sousa <[email protected]> * error fix * error fixes --------- Co-authored-by: Pedro Sousa <[email protected]>
1 parent 185d87b commit ab1e8e2

File tree

24 files changed

+718
-93
lines changed

24 files changed

+718
-93
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles.mdx

Lines changed: 2 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -101,21 +101,7 @@ Send a `POST` request to the [Devices API](/api/resources/zero_trust/subresource
101101

102102
## Edit profile settings
103103

104-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **WARP Client**.
105-
2. In the **Profile settings** card, find the profile you want to update and select **Configure**.
106-
3. Modify [WARP settings](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#device-settings) for this profile.
107-
:::note
108-
109-
Changing any of the settings below will cause the WARP connection to restart. The user may experience a brief period of connectivity loss while the new settings are being applied.
110-
- [Service mode](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#service-mode)
111-
- [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#local-domain-fallback)
112-
- [Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#split-tunnels)
113-
114-
:::
115-
116-
4. Select **Save profile**.
117-
118-
<Render file="warp/client-notification-lag" product="cloudflare-one" />
104+
<Render file="warp/edit-profile-settings" product="cloudflare-one" />
119105

120106
## Verify device profile
121107

@@ -233,6 +219,4 @@ To evaluate multiple conditions in an expression, select a logical operator:
233219

234220
## Order of precedence
235221

236-
Profiles are evaluated from top to bottom as shown in the UI and follows the first match principle — once a device matches a profile, evaluation stops and no subsequent profiles can override the decision.
237-
238-
The **Default** profile is always at the bottom of the list, meaning that it will only apply if the device does not match any of the previous profiles. If you make another custom profile the default, all settings will be copied over into the **Default** profile.
222+
<Render file="warp/device-profile-order-of-precedence" product="cloudflare-one"/>

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/managed-networks.mdx

Lines changed: 3 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 3
66
---
77

8-
import { Details, TabItem, Tabs } from "~/components";
8+
import { Details, Render, TabItem, Tabs } from "~/components";
99

1010
<Details header="Feature availability">
1111

@@ -202,17 +202,7 @@ SHA256 Fingerprint=DD4F4806C57A5BBAF1AA5B080F0541DA75DB468D0A1FE731310149500CCD8
202202

203203
</TabItem> <TabItem label="Remote server">
204204

205-
To obtain the SHA-256 fingerprint of a remote server:
206-
207-
```sh
208-
openssl s_client -connect <private-server-IP>:443 < /dev/null 2> /dev/null | openssl x509 -noout -fingerprint -sha256 | tr -d :
209-
```
210-
211-
The output will look something like:
212-
213-
```txt
214-
SHA256 Fingerprint=DD4F4806C57A5BBAF1AA5B080F0541DA75DB468D0A1FE731310149500CCD8662
215-
```
205+
<Render file="warp/managed-networks-sha-256" product="cloudflare-one"/>
216206

217207
</TabItem> </Tabs>
218208

@@ -312,3 +302,4 @@ To check if the WARP client detects the network location:
312302

313303
- [Device profiles](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/) - How to create and manage the device profiles you apply via managed networks.
314304
- [WARP settings](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/) - Defines how WARP behaves and what users can do.
305+
- [WARP troubleshooting guide](/cloudflare-one/connections/connect-devices/warp/troubleshooting/troubleshooting-guide/) - Troubleshoot common WARP issues.

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels.mdx

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,7 @@ sidebar:
77

88
import { Render } from "~/components";
99

10-
Split Tunnels can be configured to exclude or include IP addresses or domains from going through WARP. This feature is commonly used to run WARP alongside a VPN (in Exclude mode) or to provide access to a specific private network (in Include mode).
11-
12-
:::caution
13-
Split Tunnels only impacts the flow of IP traffic. DNS requests are still resolved by Gateway and subject to DNS policies unless you add the domains to your [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) configuration.
14-
:::
15-
16-
Because Split Tunnels controls what Gateway has visibility on at the network level, we recommend testing all changes before rolling out updates to end users.
10+
<Render file="warp/split-tunnel-intro" product="cloudflare-one"/>
1711

1812
## Change Split Tunnels mode
1913

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/index.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,25 +17,25 @@ This mode is best suited for organizations that want to use advanced firewall/pr
1717

1818
## Gateway with DoH
1919

20-
This mode is best suited for organizations that only want to apply DNS filtering to outbound traffic from their company devices. Network and HTTP traffic is handled by the default mechanisms on your devices.
20+
Gateway with DNS-over-HTTPS (DoH) is best suited for organizations that only want to apply DNS filtering to outbound traffic from their company devices. Network and HTTP traffic is handled by the default mechanisms on your devices.
2121

2222
| DNS filtering | Network filtering | HTTP filtering | Features enabled |
2323
| ------------- | ----------------- | -------------- | ---------------- |
2424
| Yes | No | No | DNS policies |
2525

2626
## Secure Web Gateway without DNS filtering
2727

28-
This mode (sometimes referred to as tunnel-only mode) is best suited for organizations that want to proxy network and HTTP traffic but keep their existing DNS filtering software. DNS traffic is handled by the default mechanism on your device.
28+
Secure Web Gateway without DNS filtering mode (sometimes referred to as tunnel-only mode) is best suited for organizations that want to proxy network and HTTP traffic but keep their existing DNS filtering software. DNS traffic is handled by the default mechanism on your device.
2929

3030
| DNS filtering | Network filtering | HTTP filtering | Features enabled |
3131
| ------------- | ----------------- | -------------- | ----------------------------------------------------------------------------------------------------------------------------------------- |
3232
| No | Yes | Yes | Network policies, HTTP policies, Browser Isolation, identity-based policies, device posture checks, AV scanning, and Data Loss Prevention |
3333

3434
:::note
3535

36-
- This mode disables all features that rely on WARP for DNS resolution, including [domain-based split tunneling](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#domain-based-split-tunnels) and [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/).
36+
- Secure Web Gateway without DNS filtering mode disables all features that rely on WARP for DNS resolution, including [domain-based split tunneling](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#domain-based-split-tunnels) and [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/).
3737
- Only available on Windows, Linux, and macOS.
38-
- This mode has a known limitation concerning [DNS servers with IPv6 addresses](/cloudflare-one/connections/connect-devices/warp/troubleshooting/known-limitations/#ipv6-dns-resolution-in-secure-web-gateway-without-dns-filtering-mode).
38+
- Secure Web Gateway without DNS filtering mode has a known limitation concerning [DNS servers with IPv6 addresses](/cloudflare-one/connections/connect-devices/warp/troubleshooting/known-limitations/#ipv6-dns-resolution-in-secure-web-gateway-without-dns-filtering-mode).
3939

4040
:::
4141

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,10 @@ If the user has an active browser session with the IdP, WARP will use the existi
5353

5454
- [Microsoft Entra ID](/cloudflare-one/identity/idp-integration/entra-id/#force-user-interaction-during-warp-reauthentication)
5555

56+
## Manually reauthenticate
57+
58+
<Render file="warp/manually-reauth" product="cloudflare-one" />
59+
5660
## Limitations
5761

5862
- **Only one user per device** — If a device is already registered with User A, User B will not be able to log in on that device through the re-authentication flow. To switch the device registration to a different user, User A must first log out from Zero Trust (if [Allow device to leave organization](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#allow-device-to-leave-organization) is enabled), or an admin can revoke the registration from **My Team** > **Devices**. User B can then properly [enroll](/cloudflare-one/connections/connect-devices/warp/deployment/manual-deployment/).

src/content/docs/cloudflare-one/connections/connect-devices/warp/index.mdx

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ head:
88
content: About Cloudflare WARP
99
---
1010

11-
import { Stream } from "~/components"
11+
import { Render, Stream } from "~/components"
1212

1313
## About Cloudflare WARP
1414

@@ -40,6 +40,10 @@ For more information on how the WARP client routes traffic, refer to the [WARP a
4040
}}
4141
/>
4242

43+
## WARP installation details
44+
45+
<Render file="warp/warp-installation-details" product="cloudflare-one"/>
46+
4347
## Key benefits of using WARP
4448

4549
Deploying the WARP client significantly enhances your organization's security and visibility within Cloudflare Zero Trust:

0 commit comments

Comments
 (0)