Skip to content

Commit bbc6a4e

Browse files
deadlypants1973ranbelmaxvp
authored
[CF1] firewall IPs clarification (#23643)
* [CF1] firewall IPs clarification * Apply suggestions from code review Co-authored-by: ranbel <[email protected]> * Update src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/firewall.mdx * Update src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/firewall.mdx * Apply suggestions from code review * Update src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/firewall.mdx Co-authored-by: Max Phillips <[email protected]> * partial --------- Co-authored-by: ranbel <[email protected]> Co-authored-by: Max Phillips <[email protected]>
1 parent cfc15e2 commit bbc6a4e

File tree

2 files changed

+33
-2
lines changed
  • src/content

2 files changed

+33
-2
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/firewall.mdx

Lines changed: 27 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,13 @@ The WARP client connects to Cloudflare via a standard HTTPS connection outside t
1515

1616
<Render file="warp/client-orchestration-ips" />
1717

18+
<Render
19+
file="warp/firewall"
20+
params={{
21+
domain: "zero-trust-client.cloudflareclient.com",
22+
}}
23+
/>
24+
1825
## DoH IP
1926

2027
:::note
@@ -26,6 +33,13 @@ In [Gateway with DoH](/cloudflare-one/connections/connect-devices/warp/configure
2633
- IPv4 DoH Addresses: `162.159.36.1` and `162.159.46.1`
2734
- IPv6 DoH Addresses: `2606:4700:4700::1111` and `2606:4700:4700::1001`
2835

36+
<Render
37+
file="warp/firewall"
38+
params={{
39+
domain: "<ACCOUNT_ID>.cloudflare-gateway.com",
40+
}}
41+
/>
42+
2943
### Android devices
3044

3145
If you are deploying the Cloudflare One Agent on Android/ChromeOS, you must also add `cloudflare-dns.com` to your firewall exception list. On Android/ChromeOS devices, WARP uses `cloudflare-dns.com` to resolve domains on your [Split Tunnel list](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#domain-based-split-tunnels).
@@ -89,6 +103,13 @@ The client connects to the following destinations to verify general Internet con
89103
- `162.159.197.3`
90104
- `2606:4700:102::3`
91105

106+
<Render
107+
file="warp/firewall"
108+
params={{
109+
domain: "engage.cloudflareclient.com",
110+
}}
111+
/>
112+
92113
### Inside tunnel
93114

94115
The WARP client connects to the following IPs to verify connectivity inside of the WARP tunnel:
@@ -98,7 +119,12 @@ The WARP client connects to the following IPs to verify connectivity inside of t
98119

99120
Because this check happens inside of the tunnel, you do not need to add these IPs to your firewall allowlist. However, since the requests go through Gateway, ensure that they are not blocked by a Gateway HTTP or Network policy.
100121

101-
Thought it may be visible in `warp-diag` and other logs, `connectivity.cloudflareclient.com` is used internally by WARP and should not be used in firewall policies.
122+
<Render
123+
file="warp/firewall"
124+
params={{
125+
domain: "connectivity.cloudflareclient.com",
126+
}}
127+
/>
102128

103129
## NEL reporting (optional)
104130

@@ -120,7 +146,6 @@ If your organization does not currently allow inbound/outbound communication ove
120146

121147
- Windows: `C:\Program Files\Cloudflare\Cloudflare WARP\warp-svc.exe`
122148
- macOS: You must explicitly allow both the core networking daemon and GUI component as shown in the following instructions.
123-
124149
1. Core networking daemon: `/Applications/Cloudflare WARP.app/Contents/Resources/CloudflareWARP`
125150

126151
This binary does not have a Bundle ID and must be allowed via full path.
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
---
2+
params:
3+
- domain
4+
---
5+
6+
If your firewall allows traffic only by domain, you may need to explicitly allow <code>{props.domain}</code>. Even though <code>{props.domain}</code> may resolve to different IP addresses, WARP overrides the resolved IPs with the IPs listed above. To avoid connectivity issues, ensure that the above IPs are permitted through your firewall.

0 commit comments

Comments
 (0)