You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/firewall.mdx
+25-5Lines changed: 25 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,12 @@ The WARP client connects to Cloudflare via a standard HTTPS connection outside t
15
15
16
16
<Renderfile="warp/client-orchestration-ips" />
17
17
18
-
If your firewall allows traffic only by domain, you may need to explicitly allow `zero-trust-client.cloudflareclient.com`. Even though `zero-trust-client.cloudflareclient.com` may resolve to different IP addresses, WARP overrides the resolved IPs with the IPs listed above. To avoid connectivity issues, ensure that the above IPs are permitted through your firewall.
18
+
<Render
19
+
file="warp/firewall"
20
+
params={{
21
+
domain: "zero-trust-client.cloudflareclient.com",
22
+
}}
23
+
/>
19
24
20
25
## DoH IP
21
26
@@ -28,7 +33,13 @@ In [Gateway with DoH](/cloudflare-one/connections/connect-devices/warp/configure
28
33
- IPv4 DoH Addresses: `162.159.36.1` and `162.159.46.1`
29
34
- IPv6 DoH Addresses: `2606:4700:4700::1111` and `2606:4700:4700::1001`
30
35
31
-
If your firewall allows traffic only by domain, you may need to explicitly allow `<ACCOUNT_ID>.cloudflare-gateway.com`. Even though `<ACCOUNT_ID>.cloudflare-gateway.com` may resolve to different IP addresses, WARP overrides the resolved IPs with the IPs listed above. To avoid connectivity issues, ensure that the above IPs are permitted through your firewall.
36
+
<Render
37
+
file="warp/firewall"
38
+
params={{
39
+
domain: "<ACCOUNT_ID>.cloudflare-gateway.com",
40
+
}}
41
+
/>
42
+
32
43
### Android devices
33
44
34
45
If you are deploying the Cloudflare One Agent on Android/ChromeOS, you must also add `cloudflare-dns.com` to your firewall exception list. On Android/ChromeOS devices, WARP uses `cloudflare-dns.com` to resolve domains on your [Split Tunnel list](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#domain-based-split-tunnels).
@@ -92,7 +103,12 @@ The client connects to the following destinations to verify general Internet con
92
103
-`162.159.197.3`
93
104
-`2606:4700:102::3`
94
105
95
-
If your firewall allows traffic only by domain, you may need to explicitly allow `engage.cloudflareclient.com`. Even though `engage.cloudflareclient.com` may resolve to different IP addresses, WARP overrides the resolved IPs with the IPs listed above. To avoid connectivity issues, ensure that the above IPs are permitted through your firewall.
106
+
<Render
107
+
file="warp/firewall"
108
+
params={{
109
+
domain: "engage.cloudflareclient.com",
110
+
}}
111
+
/>
96
112
97
113
### Inside tunnel
98
114
@@ -103,7 +119,12 @@ The WARP client connects to the following IPs to verify connectivity inside of t
103
119
104
120
Because this check happens inside of the tunnel, you do not need to add these IPs to your firewall allowlist. However, since the requests go through Gateway, ensure that they are not blocked by a Gateway HTTP or Network policy.
105
121
106
-
If your firewall allows traffic only by domain, you may need to explicitly allow `connectivity.cloudflareclient.com`. Even though `connectivity.cloudflareclient.com` may resolve to different IP addresses, WARP overrides the resolved IPs with the IPs listed above. To avoid connectivity issues, ensure that the above IPs are permitted through your firewall.
122
+
<Render
123
+
file="warp/firewall"
124
+
params={{
125
+
domain: "connectivity.cloudflareclient.com",
126
+
}}
127
+
/>
107
128
108
129
## NEL reporting (optional)
109
130
@@ -125,7 +146,6 @@ If your organization does not currently allow inbound/outbound communication ove
If your firewall allows traffic only by domain, you may need to explicitly allow <code>{props.domain}</code>. Even though <code>{props.domain}</code> may resolve to different IP addresses, WARP overrides the resolved IPs with the IPs listed above. To avoid connectivity issues, ensure that the above IPs are permitted through your firewall.
0 commit comments