You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/index.mdx
+13-25Lines changed: 13 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,34 +3,22 @@ pcx_content_type: concept
3
3
title: Route traffic
4
4
sidebar:
5
5
order: 6
6
-
7
6
---
8
7
9
-
When the WARP client is deployed on a device, Cloudflare processes all DNS requests and network traffic by default. However, under certain circumstances, you may need to exclude specific DNS requests or network traffic from WARP.
10
-
11
-
There are three settings you can configure:
12
-
13
-
***Use [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/)** to instruct the WARP client to proxy DNS requests for a specified domain to a resolver that is not Cloudflare Gateway. This is useful when you have private hostnames that would not otherwise resolve on the public Internet.
14
-
15
-
:::caution
16
-
17
-
18
-
DNS requests to domain names entered here will not be encrypted, monitored or subject to DNS policies by Cloudflare Gateway.
19
-
20
-
21
-
:::
22
-
23
-
***Use the [Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) Exclude mode** to instruct the WARP client to ignore traffic to a specified set of IP addresses or domains. Any traffic that is destined to an IP address or domain defined in the Split Tunnels Exclude configuration will be ignored by the WARP client and handled by the local machine. Use this mode when you want the majority of your traffic encrypted and processed by Gateway, but need to exclude certain routes due to app compatibility, or if you need WARP to run alongside a VPN.
24
-
25
-
***Use the [Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) Include mode** mode to instruct the WARP client to only handle traffic to a specified set of IP addresses or domains. Any traffic that is not included by IP address or domains defined in the Split Tunnel Include configuration will be ignored by the WARP client and handled by the local machine. Use this mode when you only want specific traffic processed by Gateway, such as when using Tunnels for a specific resource.
26
-
27
-
:::caution
28
-
29
-
30
-
Traffic excluded from WARP by Split Tunnel configuration will not be encrypted, managed or monitored by Cloudflare Gateway.
8
+
When the WARP client is deployed on a device, Cloudflare will process all DNS queries and network traffic by default. However, under certain circumstances, you may need to exclude specific DNS queries or network traffic from WARP. For example, you may need to resolve an internal hostname with a private DNS resolver.
31
9
10
+
There are four options you can configure to exclude traffic from WARP:
32
11
33
-
:::
12
+
- Resolver policies
13
+
-**Use [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/)** to instruct the WARP client to proxy DNS requests for a specified domain to a resolver that is not Cloudflare Gateway. This is useful when you have private hostnames that would not otherwise resolve on the public Internet.
14
+
:::caution
15
+
Gateway will not encrypt, monitor, or apply DNS policies to DNS queries to domain names entered in Local Domain Fallback.
16
+
:::
17
+
-**Use the [Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) Exclude mode** to instruct the WARP client to ignore traffic to a specified set of IP addresses or domains. Any traffic that is destined to an IP address or domain defined in the Split Tunnels Exclude configuration will be ignored by the WARP client and handled by the local machine. Use this mode when you want the majority of your traffic encrypted and processed by Gateway, but need to exclude certain routes due to app compatibility, or if you need WARP to run alongside a VPN.
18
+
-**Use the [Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) Include mode** mode to instruct the WARP client to only handle traffic to a specified set of IP addresses or domains. Any traffic that is not included by IP address or domains defined in the Split Tunnel Include configuration will be ignored by the WARP client and handled by the local machine. Use this mode when you only want specific traffic processed by Gateway, such as when using Tunnels for a specific resource.
19
+
:::caution
20
+
Gateway will not encrypt, manage, or monitor traffic excluded from WARP by a Split Tunnel configuration.
21
+
:::
34
22
35
23
## How the WARP client handles DNS requests
36
24
@@ -42,7 +30,7 @@ accTitle: WARP traffic is evaluated and routed through various parts of the Clou
42
30
A[WARP User requests resource] -- Domain does not match Local Domain Fallback --> C{WARP client resolves query according to Gateway DNS policies}
43
31
A -- Domain matches Local Domain Fallback --> D[WARP client proxies DNS traffic to specified fallback server]
44
32
D -- Resolver IP included in Tunnel per Split Tunnel configuration --> E[Query sent via WARP Tunnel to be resolved]
45
-
D -- Resolver IP not included in Tunnel per Split Tunnel configuration --> F{Query sent to resolver IP outside WARP Tunnel}
33
+
D -- Resolver IP not included in Tunnel per Split Tunnel configuration --> F{Query sent to resolver IP outside WARP Tunnel}
46
34
E -- Matches CF Gateway block policy --> G{Traffic blocked by CF}
47
35
E -- "Passes CF Gateway network policies (allowed or unblocked)" --> H[Evaluated by Cloudflare Tunnel routes]
48
36
H -- Tunnel routes do not include resolver IP --> I{CF Gateway proxies query to resolver IP via normal WARP egress route}
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels.mdx
+17-30Lines changed: 17 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,19 +3,14 @@ pcx_content_type: how-to
3
3
title: Split Tunnels
4
4
sidebar:
5
5
order: 3
6
-
7
6
---
8
7
9
-
import { Render } from"~/components"
8
+
import { Render } from"~/components";
10
9
11
10
Split Tunnels can be configured to exclude or include IP addresses or domains from going through WARP. This feature is commonly used to run WARP alongside a VPN (in Exclude mode) or to provide access to a specific private network (in Include mode).
12
11
13
12
:::caution
14
-
15
-
16
13
Split Tunnels only impacts the flow of IP traffic. DNS requests are still resolved by Gateway and subject to DNS policies unless you add the domains to your [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) configuration.
17
-
18
-
19
14
:::
20
15
21
16
Because Split Tunnels controls what Gateway has visibility on at the network level, we recommend testing all changes before rolling out updates to end users. It may take up to 24 hours for changes to propagate to clients, depending on how many devices are connected to your organization.
@@ -32,45 +27,42 @@ Because Split Tunnels controls what Gateway has visibility on at the network lev
32
27
33
28
Use Split Tunnels when you need to bypass Gateway entirely for a site or allow traffic through the [firewall that WARP creates](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture/#system-firewall). Common scenarios include:
34
29
35
-
* Connect to a third-party application which requires the actual IP address of the end-user device (for example, [Microsoft 365](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#directly-route-microsoft-365-traffic)).
36
-
* Optimize voice and video.
37
-
* Connect to a [third-party VPN](/cloudflare-one/connections/connect-devices/warp/deployment/vpn/) endpoint.
30
+
- Connect to a third-party application which requires the actual IP address of the end-user device (for example, [Microsoft 365](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#directly-route-microsoft-365-traffic)).
31
+
- Optimize voice and video.
32
+
- Connect to a [third-party VPN](/cloudflare-one/connections/connect-devices/warp/deployment/vpn/) endpoint.
38
33
39
34
### When not to use Split Tunnels
40
35
41
36
Do not exclude a site from Split Tunnels if you want to see the traffic in your Gateway logs. In particular, we do not recommend using Split Tunnels to:
42
37
43
-
* Solve connectivity issues with a specific website. For configuration guidance, refer to our [troubleshooting guide](/cloudflare-one/connections/connect-devices/warp/troubleshooting/common-issues/#cannot-connect-to-a-specific-app-or-website).
44
-
* Solve performance issues with a specific website. Since Cloudflare operates within 50 milliseconds of 95% of the Internet-connected population, it is usually faster to send traffic through us. If you are encountering a performance-related issue, it is best to first explore your Gateway policies or reach out to Support.
38
+
- Solve connectivity issues with a specific website. For configuration guidance, refer to our [troubleshooting guide](/cloudflare-one/connections/connect-devices/warp/troubleshooting/common-issues/#cannot-connect-to-a-specific-app-or-website).
39
+
- Solve performance issues with a specific website. Since Cloudflare operates within 50 milliseconds of 95% of the Internet-connected population, it is usually faster to send traffic through us. If you are encountering a performance-related issue, it is best to first explore your Gateway policies or reach out to Support.
45
40
46
41
## Cloudflare Zero Trust domains
47
42
48
43
Many Cloudflare Zero Trust services rely on traffic going through WARP, such as [device posture checks](/cloudflare-one/identity/devices/) and [WARP session durations](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions/). If you are using Split Tunnels in Include mode, you will need to manually add the following domains in order for these features to function:
49
44
50
-
* The IdP used to authenticate to Cloudflare Zero Trust
51
-
*`<your-team-name>.cloudflareaccess.com`
52
-
* The application protected by the Access or Gateway policy
53
-
*`edge.browser.run` if using [Browser Isolation](/cloudflare-one/policies/browser-isolation/)
45
+
- The IdP used to authenticate to Cloudflare Zero Trust
46
+
-`<your-team-name>.cloudflareaccess.com`
47
+
- The application protected by the Access or Gateway policy
48
+
-`edge.browser.run` if using [Browser Isolation](/cloudflare-one/policies/browser-isolation/)
54
49
55
50
## Domain-based Split Tunnels
56
51
57
52
Domain-based split tunneling has a few ramifications you should be aware of before deploying in your organization:.
58
53
59
-
* Routes excluded or included from WARP and Gateway visibility may change day to day, and may be different for each user depending on where they are.
60
-
* You may inadvertently exclude or include additional hostnames that happen to share an IP address. This commonly occurs if you add a domain hosted by a CDN or large Internet provider such as Cloudflare, AWS, or Azure. For example, if you wanted to exclude a VPN hosted on AWS, do not add `*.amazonaws.com` as that will open up your devices to all traffic on AWS. Instead, add the specific VPN endpoint (`*.cvpn-endpoint-<UUID>.prod.clientvpn.us-west-2.amazonaws.com`).
61
-
* Most services are a collection of hostnames. Until Split Tunnels mode supports [App Types](/cloudflare-one/policies/gateway/application-app-types/), you will need to manually add all domains used by a particular app or service.
62
-
* WARP must handle the DNS lookup request for the domain. If a DNS result has been previously cached by the operating system or otherwise intercepted (for example, via your browser's secure DNS settings), the IP address will not be dynamically added to your Split Tunnel.
54
+
- Routes excluded or included from WARP and Gateway visibility may change day to day, and may be different for each user depending on where they are.
55
+
- You may inadvertently exclude or include additional hostnames that happen to share an IP address. This commonly occurs if you add a domain hosted by a CDN or large Internet provider such as Cloudflare, AWS, or Azure. For example, if you wanted to exclude a VPN hosted on AWS, do not add `*.amazonaws.com` as that will open up your devices to all traffic on AWS. Instead, add the specific VPN endpoint (`*.cvpn-endpoint-<UUID>.prod.clientvpn.us-west-2.amazonaws.com`).
56
+
- Most services are a collection of hostnames. Until Split Tunnels mode supports [App Types](/cloudflare-one/policies/gateway/application-app-types/), you will need to manually add all domains used by a particular app or service.
57
+
- WARP must handle the DNS lookup request for the domain. If a DNS result has been previously cached by the operating system or otherwise intercepted (for example, via your browser's secure DNS settings), the IP address will not be dynamically added to your Split Tunnel.
63
58
64
59
### Valid domains
65
60
66
-
67
-
68
61
| Split tunnel domain | Matches | Does not match |
|`example.com`| exact match of `example.com`| subdomains such as `www.example.com`|
71
64
|`example.example.com`| exact match of `example.example.com`|`example.com` or subdomains such as `www.example.example.com`|
72
65
|`*.example.com`| subdomains such as `www.example.com` and `sub2.sub1.example.com`|`example.com`|
73
-
||||
74
66
75
67
### Platform differences
76
68
@@ -84,23 +76,18 @@ Clients on these platforms work by dynamically inserting the IP address of the d
84
76
85
77
Due to platform differences, mobile clients can only apply Split Tunnels rules when the tunnel is initially started. This means:
86
78
87
-
* Domain-based Split Tunnels rules are created when the tunnel is established based on the IP address for that domain at that time. The route is refreshed each time the tunnel is established.
88
-
89
-
* Wildcard domain prefixes (for example, `*.example.com`) are supported only if they have valid wildcard DNS records. Other wildcard domains are not supported because the client is unable to match wildcard domains to hostnames when starting up the tunnel. Unsupported wildcard domain prefixes can still exist in your configuration, but they will be ignored on mobile platforms.
79
+
- Domain-based Split Tunnels rules are created when the tunnel is established based on the IP address for that domain at that time. The route is refreshed each time the tunnel is established.
80
+
- Wildcard domain prefixes (for example, `*.example.com`) are supported only if they have valid wildcard DNS records. Other wildcard domains are not supported because the client is unable to match wildcard domains to hostnames when starting up the tunnel. Unsupported wildcard domain prefixes can still exist in your configuration, but they will be ignored on mobile platforms.
90
81
91
82
## Remove a route
92
83
93
84
:::caution
94
-
95
-
Removing default Split Tunnel entries may cause users to lose Internet connectivity or block their access to local resources.
85
+
Removing default Split Tunnel entries may cause users to lose Internet connectivity or block their access to local resources.
96
86
:::
97
87
98
88
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **WARP Client**.
99
-
100
89
2. Under **Device settings**, locate the [device profile](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/) you would like to modify and select **Configure**.
101
-
102
90
3. Under **Split Tunnels**. select **Manage**.
103
-
104
91
4. Find the IP address or hostname in the list and select **Delete**.
105
92
106
93
If you need to revert to the default Split Tunnel entries recommended by Cloudflare, select **Restore default entries**.
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **WARP Client**.
9
-
10
8
2. Under **Device settings**, locate the [device profile](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/) you would like to modify and select **Configure**.
11
-
12
9
3. Under **Split Tunnels**, check whether your [Split Tunnels mode](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#change-split-tunnels-mode) is set to **Exclude** or **Include**.
13
-
14
10
4. Select **Manage**.
15
-
16
11
5. You can exclude or include routes based on either their IP address or domain. When possible we recommend adding an IP address instead of a domain. To learn about the consequences of adding a domain, refer to [Domain-based Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#domain-based-split-tunnels).
17
12
18
-
<Tabs> <TabItemlabel="add an ip">
13
+
<Tabs> <TabItemlabel="Add an ip">
19
14
20
15
To add an IP address to Split Tunnels:
21
16
22
-
1. Select *IP Address*.
17
+
1. Select _IP Address_.
23
18
2. Enter the IP address or <GlossaryTooltipterm="CIDR">CIDR</GlossaryTooltip> you want to exclude or include.
24
19
3. Select **Save destination**.
25
20
26
21
Traffic to this IP address is now excluded or included from the WARP tunnel.
27
22
28
-
</TabItem> <TabItemlabel="add a domain">
23
+
</TabItem> <TabItemlabel="Add a domain">
29
24
30
25
To add a domain to Split Tunnels:
31
26
32
-
1. Select *Domain*.
27
+
1. Select _Domain_.
33
28
2. Enter a [valid domain](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#valid-domains) to exclude or include.
34
29
3. Select **Save destination**.
35
30
4. (Optional) If your domain does not have a public DNS record, create a [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) entry to allow a private DNS server to handle domain resolution.
@@ -38,6 +33,6 @@ When a user goes to the domain, the domain gets resolved according to your Local
38
33
39
34
</TabItem> </Tabs>
40
35
41
-
You can add up to 1000 combined Split Tunnel and [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) entries to a given device profile.
36
+
You can add up to 1,000 combined Split Tunnel and [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) entries to a given device profile.
42
37
43
38
We recommend keeping the Split Tunnels list short, as each entry takes time for the client to parse. In particular, domains are slower to action than IP addresses because they require on-the-fly IP lookups and routing table / local firewall changes. A shorter list will also make it easier to understand and debug your configuration.
0 commit comments