Skip to content

Commit b99a130

Browse files
sha256 check
1 parent 13319cf commit b99a130

File tree

3 files changed

+31
-18
lines changed

3 files changed

+31
-18
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/managed-networks.mdx

Lines changed: 1 addition & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -202,17 +202,7 @@ SHA256 Fingerprint=DD4F4806C57A5BBAF1AA5B080F0541DA75DB468D0A1FE731310149500CCD8
202202

203203
</TabItem> <TabItem label="Remote server">
204204

205-
To obtain the SHA-256 fingerprint of a remote server:
206-
207-
```sh
208-
openssl s_client -connect <private-server-IP>:443 < /dev/null 2> /dev/null | openssl x509 -noout -fingerprint -sha256 | tr -d :
209-
```
210-
211-
The output will look something like:
212-
213-
```txt
214-
SHA256 Fingerprint=DD4F4806C57A5BBAF1AA5B080F0541DA75DB468D0A1FE731310149500CCD8662
215-
```
205+
<Render file="warp/managed-networks-sha-256" />
216206

217207
</TabItem> </Tabs>
218208

src/content/docs/cloudflare-one/connections/connect-devices/warp/troubleshooting/troubleshooting-guide.mdx

Lines changed: 15 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -344,12 +344,6 @@ Identity-based selectors are only available if the user [enrolled the device](/c
344344

345345
:::
346346

347-
#### Edit your device profile match rules
348-
349-
To modify the match rules of a device profile, you will need to edit the device profile. To edit the device profile:
350-
351-
<Render file="warp/edit-profile-settings" />
352-
353347
#### Review your managed network settings
354348

355349
A [managed network](/cloudflare-one/connections/connect-devices/warp/configure-warp/managed-networks/) is a network location that you define with a TLS endpoint, like a physical office. The WARP client checks for this TLS endpoint to determine its location and apply the corresponding device profile.
@@ -362,12 +356,26 @@ When troubleshooting WARP for managed network isses:
362356

363357
The WARP client connects to the TLS endpoint to identify the network. If the endpoint is down or unreachable, the WARP client will fail to detect the network and apply the wrong profile.
364358

365-
// need instructions on how to do this //
359+
<Render file="warp/managed-networks-sha-256" />
360+
361+
If the endpoint is down, you will receive a `Could not find certificate from <stdin>` response.
362+
363+
If you received a returned SHA-256 fingerprint:
364+
365+
1. Log into [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **WARP Client**.
366+
2. Go to **Manage Networks** > **Edit**.
367+
3. Compare the TLS Cert SHA-256 in the dashboard with the returned fingerprint in your terminal to ensure they match.
366368

367369
2. Use a single profile for a single location.
368370

369371
To simplify management and prevent errors, avoid creating multiple managed network profiles for the same location. For example, if you have multiple TLS endpoints in one office, link them all to a single device profile. This reduces the risk of a device matching an unintended profile due to a configuration error.
370372

373+
#### Edit your device profile match rules
374+
375+
To modify the match rules of a device profile, you will need to edit the device profile. To edit the device profile:
376+
377+
<Render file="warp/edit-profile-settings" />
378+
371379
### Wrong split tunnel configuration
372380

373381
<Render file="warp/split-tunnel-intro" />
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
{}
3+
---
4+
5+
To test connectivity and obtain the SHA-256 fingerprint of a remote server:
6+
7+
```sh
8+
openssl s_client -connect <private-server-IP>:443 < /dev/null 2> /dev/null | openssl x509 -noout -fingerprint -sha256 | tr -d :
9+
```
10+
11+
The output will look something like:
12+
13+
```txt
14+
SHA256 Fingerprint=DD4F4806C57A5BBAF1AA5B080F0541DA75DB468D0A1FE731310149500CCD8662
15+
```

0 commit comments

Comments
 (0)