Skip to content

Commit b2980dd

Browse files
committed
add ipv6 range
1 parent 3d33a60 commit b2980dd

File tree

5 files changed

+21
-13
lines changed

5 files changed

+21
-13
lines changed

src/content/docs/cloudflare-one/connections/connect-networks/private-net/cloudflared/connect-private-hostname.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar:
77
text: Beta
88
---
99

10-
import { Render, Details } from "~/components";
10+
import { Render, Details, GlossaryTooltip } from "~/components";
1111

1212
`cloudflared` can route to HTTP and non-HTTP applications on your private network using their private hostname (for example, `wiki.internal.local`). Private hostname routes are especially useful when the application has an unknown or ephemeral IP, which often occurs when infrastructure is provisioned by a third-party cloud provider.
1313

@@ -31,8 +31,7 @@ Figures 1 and 2 illustrate the flow of DNS and network traffic when a user conne
3131
2. Based on the configured resolver policies, Gateway determines that `wiki.internal.local` should be resolved by a custom DNS resolver.
3232
3. Gateway does a DNS lookup for `wiki.internal.local` through Cloudflare Tunnel, and the custom DNS resolver returns the origin IP (`10.0.0.5`).
3333
4. Rather than responding to the DNS query with the actual origin IP, Gateway responds with a random IP address from the following CGNAT range:
34-
- **IPv4**: `100.80.0.0/16`
35-
- **IPv6**: `2606:4700:0cf1:4000::/64`
34+
<Render file="gateway/egress-selector-cgnat-ips" />
3635

3736
The selected CGNAT IP is called the initial resolved IP.
3837
5. Gateway's network engine stores the mapping between the private hostname (`wiki.internal.local`), initial resolved IP (`100.80.0.1`), and the actual IP (`10.0.0.5`).
@@ -103,7 +102,8 @@ Configure Gateway to resolve the private hostname using your internal DNS resolv
103102

104103
In your [device profiles](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/), [configure Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) so that the following IPs route through the WARP tunnel:
105104

106-
- Initial resolved IP CGNAT range: `100.80.0.0/16`
105+
- <GlossaryTooltip term="initial resolved IP">Initial resolved IP</GlossaryTooltip> CGNAT range:
106+
<Render file="gateway/egress-selector-cgnat-ips" />
107107
- Private network CIDR where the application is located (for example, `10.0.0.0/8`)
108108
- Internal DNS resolver IP
109109

src/content/docs/cloudflare-one/policies/gateway/egress-policies/egress-cloudflared.mdx

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar:
77
text: Beta
88
---
99

10-
import { Render, Details } from "~/components";
10+
import { Render, Details, GlossaryTooltip } from "~/components";
1111

1212
<Render file="gateway/egress-selector-warp-version" />
1313

@@ -63,14 +63,15 @@ To route a public hostname through Cloudflare Tunnel:
6363

6464
If your traffic is onboarded using WARP, ensure that traffic to the following IP addresses route through the WARP tunnel to Gateway:
6565

66-
- Initial resolved IP CGNAT range: `100.80.0.0/16`
66+
- <GlossaryTooltip term="initial resolved IP">Initial resolved IP</GlossaryTooltip> CGNAT range:
67+
<Render file="gateway/egress-selector-cgnat-ips" />
6768
- Private network CIDR block
6869

6970
### Route initial resolved IPs
7071

71-
When users connect to a public hostname route, Gateway will assign an initial resolved IP from the `100.80.0.0/16` range to the DNS query. The initial resolved IP is required because Gateway's network engine operates at L3/L4 and can only see IPs (not hostnames) when processing the connection. If a packet's destination IP falls within the `100.80.0.0/16`, Gateway knows that the IP maps to a public hostname route and sends the traffic down the corresponding Cloudflare Tunnel.
72+
When users connect to a public hostname route, Gateway will assign an <GlossaryTooltip term="initial resolved IP">initial resolved IP</GlossaryTooltip> to the DNS query. The initial resolved IP is required because Gateway's network engine operates at L3/L4 and can only see IPs (not hostnames) when processing the connection. If a packet's destination IP falls within the initial resolved IP CGNAT range, Gateway knows that the IP maps to a public hostname route and sends the traffic down the corresponding Cloudflare Tunnel.
7273

73-
To route `100.80.0.0/16` through WARP:
74+
To route initial resolved IPs through WARP:
7475

7576
<Render file="gateway/egress-selector-split-tunnels" />
7677

src/content/docs/cloudflare-one/policies/gateway/egress-policies/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 5
66
---
77

8-
import { Render, Badge, Tabs, TabItem, Details } from "~/components";
8+
import { Render, Badge, Tabs, TabItem, Details, GlossaryTooltip } from "~/components";
99

1010
:::note
1111
Only available on Enterprise plans.
@@ -186,7 +186,7 @@ The [Application](#application), [Content Categories](#content-categories), [Dom
186186

187187
<Render file="gateway/egress-selector-onramps" />
188188

189-
When you use these selectors in an egress policy for traffic from a supported on-ramp, Gateway will assign initial resolved IPs in the `100.80.0.0/16` range to the DNS queries, then apply the correct egress IP according to the egress policy. Unsupported traffic will be resolved with your default Gateway settings. Gateway will only overwrite the DNS response when the query matches a condition in the egress policy. If you use [DNS locations](/cloudflare-one/connections/connect-devices/agentless/dns/locations/) to send a DNS query to Gateway with IPv4, IPv6, DoT, or DoH, Gateway will not return the initial resolved IP for supported traffic nor resolve unsupported traffic.
189+
When you use these selectors in an egress policy for traffic from a supported on-ramp, Gateway will assign <GlossaryTooltip term="initial resolved IP">initial resolved IPs</GlossaryTooltip> to the DNS queries, then apply the correct egress IP according to the egress policy. Unsupported traffic will be resolved with your default Gateway settings. Gateway will only overwrite the DNS response when the query matches a condition in the egress policy. If you use [DNS locations](/cloudflare-one/connections/connect-devices/agentless/dns/locations/) to send a DNS query to Gateway with IPv4, IPv6, DoT, or DoH, Gateway will not return the initial resolved IP for supported traffic nor resolve unsupported traffic.
190190

191191
To turn on the selectors for your account, use the [Patch Zero Trust account configuration](/api/resources/zero_trust/subresources/gateway/subresources/configurations/methods/edit/) endpoint. For example:
192192

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
---
2+
{}
3+
4+
---
5+
6+
- **IPv4**: `100.80.0.0/16`
7+
- **IPv6**: `2606:4700:0cf1:4000::/64`

src/content/partials/cloudflare-one/gateway/egress-selector-split-tunnels.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
{}
33

44
---
5-
import { Tabs, TabItem } from "~/components"
5+
import { Tabs, TabItem, Render } from "~/components"
66

77
In your WARP [device profile](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/), configure your [Split Tunnel](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) depending on the mode:
88

@@ -20,6 +20,6 @@ In your WARP [device profile](/cloudflare-one/connections/connect-devices/warp/c
2020
</TabItem> <TabItem label="Include IPs and domains">
2121

2222
1. Add the required [Zero Trust domains](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-domains) or [IP addresses](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-ip-addresses) to your Split Tunnel include list.
23-
2. [Add a route](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to include the IP address `100.80.0.0/16`.
24-
23+
2. [Add routes](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to include the following IP addresses:
24+
<Render file="gateway/egress-selector-cgnat-ips" />
2525
</TabItem> </Tabs>

0 commit comments

Comments
 (0)