Skip to content

Commit bd451c8

Browse files
authored
[CF1] Updating UI instructions for /cloudflare-one/connections/connect-devices/ (#26059)
* Adding files after ZT -> CF1 UI instruction updates * Adding more changes * Minor fix * More iterations
1 parent 4ebd819 commit bd451c8

File tree

19 files changed

+116
-100
lines changed

19 files changed

+116
-100
lines changed

src/content/docs/cloudflare-one/team-and-resources/devices/agentless/dns/dns-over-tls.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ Cloudflare supports DoT on standard port `853` over TLS 1.2 and TLS 1.3 in compl
1515

1616
Each Gateway DNS location has a unique DoT hostname. DNS locations and corresponding DoT hostnames have policies associated with them.
1717

18-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **DNS locations**.
19-
2. [Add a new location](/cloudflare-one/team-and-resources/devices/agentless/dns/locations/) or select an existing location from the list.
18+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Networks** > **Resolvers & Proxies**.
19+
2. Under **DNS locations**, [add a new location](/cloudflare-one/team-and-resources/devices/agentless/dns/locations/) or select an existing location from the list.
2020
3. Under **DoT endpoint**, copy the value in **DoT addresses**.
2121

2222
The DoT hostname contains your unique location name. For example, if the DoT hostname is `9y65g5srsm.cloudflare-gateway.com`, the location name is `9y65g5srsm`.

src/content/docs/cloudflare-one/team-and-resources/devices/agentless/dns/locations/dns-resolver-ips.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ When you create a DNS location, Gateway assigns IPv4/IPv6 addresses and DoT/DoH
99

1010
To view the resolver endpoint IP addresses and hostnames for a DNS location:
1111

12-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **DNS locations**.
13-
2. Locate the DNS location, then select **Configure**.
12+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Networks** > **Resolvers & Proxies**.
13+
2. Select the DNS location, then select **Edit**.
1414
3. Go to **Setup instructions**. The addresses and hostnames will appear in **Your configuration**.
1515

1616
## DNS query location matching

src/content/docs/cloudflare-one/team-and-resources/devices/agentless/pac-files.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Install a [Cloudflare certificate](/cloudflare-one/team-and-resources/devices/us
2929

3030
## 1. Generate a proxy endpoint
3131

32-
You can generate a proxy endpoint on the Zero Trust dashboard or through the Cloudflare API.
32+
You can generate a proxy endpoint in Cloudflare One or through the Cloudflare API.
3333

3434
:::caution
3535
All devices you add to the proxy endpoint will be able to access your Cloudflare Tunnel applications and services. If you only want to proxy web traffic, you can build a network policy that blocks those source IPs from connecting to your internal resources.
@@ -39,9 +39,9 @@ All devices you add to the proxy endpoint will be able to access your Cloudflare
3939

4040
<TabItem label="Dashboard">
4141

42-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **Proxy endpoints**.
42+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Networks** > **Resolves & Proxies** > **Proxy endpoints**.
4343

44-
2. Select **Create endpoint**.
44+
2. Select **Create proxy endpoint**.
4545

4646
3. Give your endpoint any name.
4747

@@ -116,7 +116,7 @@ https://<SUBDOMAIN>.proxy.cloudflare-gateway.com
116116

117117
## 2. Test your proxy server
118118

119-
1. In [Zero Trust](https://one.dash.cloudflare.com/), create an [HTTP policy](/cloudflare-one/traffic-policies/http-policies/) for testing purposes. For example:
119+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), create an [HTTP policy](/cloudflare-one/traffic-policies/http-policies/) for testing purposes. For example:
120120

121121
| Selector | Operator | Value | Action |
122122
| -------- | -------- | ------------- | ------ |
@@ -206,7 +206,7 @@ To get the domain of a proxy endpoint:
206206

207207
<TabItem label="Dashboard">
208208

209-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **Proxy endpoints**.
209+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Networks** > **Resolves & Proxies** > **Proxy endpoints**.
210210
2. Choose the proxy endpoint. Select **Edit**.
211211
3. In **Proxy Endpoint**, copy the domain.
212212

src/content/docs/cloudflare-one/team-and-resources/devices/user-side-certificates/automated-deployment.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,8 @@ WARP versions prior to 2024.12.554.0 will only install the certificate set to **
4040
To configure WARP to install a root certificate on your organization's devices:
4141

4242
1. (Optional) [Upload](/cloudflare-one/team-and-resources/devices/user-side-certificates/custom-certificate/) a custom root certificate to Cloudflare.
43-
2. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **WARP Client**.
44-
3. Turn on [**Install CA to system certificate store**](/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-settings/#install-ca-to-system-certificate-store).
43+
2. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Team & Resources** > **Devices** > **Management**.
44+
3. Under **Global WARP settings**, turn on [**Install CA to system certificate store**](/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-settings/#install-ca-to-system-certificate-store).
4545
4. [Install](/cloudflare-one/team-and-resources/devices/warp/download-warp/) the WARP client on the device.
4646
5. [Enroll the device](/cloudflare-one/team-and-resources/devices/warp/deployment/manual-deployment/) in your Zero Trust organization.
4747
6. (Optional) If the device is running macOS Big Sur or newer, [manually trust the certificate](#manually-trust-the-certificate).

src/content/docs/cloudflare-one/team-and-resources/devices/user-side-certificates/custom-certificate.mdx

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -66,11 +66,12 @@ openssl x509 -in <CUSTOM-ROOT-CERT>.pem -text
6666
<Tabs syncKey="dashPlusAPI">
6767

6868
<TabItem label="Dashboard">
69-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Resources**.
70-
2. In **Certificates**, select **Manage**.
71-
3. Select **Upload certificate**.
72-
4. Enter the private key and SSL certificate you generated or select **Paste certificate from file** to upload them from a file.
73-
5. Select **Generate certificate**.
69+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Settings** > **Certificates and downloads**.
70+
2. Select **View**.
71+
3. In **Cloudflare certificates**, select **Manage**.
72+
4. Select **Upload certificate**.
73+
5. Enter the private key and SSL certificate you generated or select **Paste certificate from file** to upload them from a file.
74+
6. Select **Upload custom certificate**.
7475

7576
You can now [use the generated custom root certificate](#use-a-custom-root-certificate) for inspection.
7677

src/content/docs/cloudflare-one/team-and-resources/devices/user-side-certificates/index.mdx

Lines changed: 16 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -34,11 +34,12 @@ To generate a new Cloudflare root certificate for your Zero Trust organization:
3434

3535
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
3636

37-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Resources**.
38-
2. In **Certificates**, select **Manage**.
39-
3. Select **Generate certificate**.
40-
4. Choose a duration of time before the certificate expires. Cloudflare recommends expiration after five years. Alternatively, choose _Custom_ and enter a custom amount in days.
41-
5. Select **Generate certificate**.
37+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Settings** > **Certificates and downloads**.
38+
2. Select **View**.
39+
3. In Cloudflare certificates, select **Manage**.
40+
4. Select **Generate certificate**.
41+
5. Choose a duration of time before the certificate expires. Cloudflare recommends expiration after five years. Alternatively, choose _Custom_ and enter a custom amount in days.
42+
6. Select **Generate certificate**.
4243

4344
</TabItem>
4445

@@ -68,10 +69,11 @@ To activate your root certificate:
6869

6970
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
7071

71-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Resources**.
72-
2. In **Certificates**, select **Manage**.
73-
3. Select the certificate you want to activate.
74-
4. Select **Activate**.
72+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Settings** > **Certificates and downloads**.
73+
2. Select **View**.
74+
3. In Cloudflare certificates, select **Manage**.
75+
4. Select the certificate you want to activate.
76+
5. Select **Activate**.
7577

7678
</TabItem>
7779

@@ -92,10 +94,11 @@ Once you deploy and install your certificate, you can turn it on for use in insp
9294

9395
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
9496

95-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Resources**.
96-
2. In **Certificates**, select **Manage**.
97-
3. Select the certificate you want to turn on.
98-
4. In **Basic information**, select **Confirm and turn on certificate**.
97+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Settings** > **Certificates and downloads**.
98+
2. Select **View**.
99+
3. In Cloudflare certificates, select **Manage**.
100+
4. Select the certificate you want to turn on.
101+
5. In **Basic information**, select **Confirm and turn on certificate**.
99102

100103
</TabItem>
101104

src/content/docs/cloudflare-one/team-and-resources/devices/user-side-certificates/manual-deployment.mdx

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,10 +26,12 @@ You can only download Cloudflare-generated certificates from the Zero Trust dash
2626

2727
First, [generate](/cloudflare-one/team-and-resources/devices/user-side-certificates/#generate-a-cloudflare-root-certificate) and download a Cloudflare certificate. The certificate is available in both `.pem` and `.crt` file format. Certain applications require the certificate to be in a specific file type, so ensure you download the most appropriate file for your use case.
2828

29-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Resources**.
30-
2. In **Certificates**, select **Manage**.
31-
3. Select the certificate you want to download.
32-
4. Depending on which format you want, choose **Download .pem** and/or **Download .crt**.
29+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Settings** > **Certificates and downloads**.
30+
2. Select **View**.
31+
3. In **Cloudflare certificates**, select **Manage**.
32+
4. Select the certificate you want to download.
33+
5. Select **More actions**.
34+
- Depending on which format you want, choose **Download .pem** and/or **Download .crt**.
3335

3436
Alternatively, you can download and install a certificate [using WARP](/cloudflare-one/team-and-resources/devices/user-side-certificates/automated-deployment/#install-a-certificate-using-warp). WARP will add the certificates to the device's system certificate store in `installed_certs/<certificate_id>.pem`.
3537

src/content/docs/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-profiles.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,8 @@ import { Render, TabItem, Tabs, APIRequest } from "~/components";
1313

1414
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
1515

16-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **WARP Client**.
17-
2. In the **Profile settings** card, select **Create profile**. This will make a copy of the **Default** profile.
16+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Team & Resources** > **Devices** > **Device profiles**.
17+
2. In the **Profile** card, select **Create new profile**. This will make a copy of the **Default** profile.
1818
3. Enter any name for the profile.
1919
4. Create rules to define the devices that will use this profile. Learn more about the available [Selectors](#selectors), [Operators](/cloudflare-one/traffic-policies/network-policies/#comparison-operators), and [Values](/cloudflare-one/traffic-policies/network-policies/#value).
2020
5. Configure [WARP settings](/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-settings/#device-settings) for these devices.
@@ -109,13 +109,13 @@ Send a `POST` request to the [Devices API](/api/resources/zero_trust/subresource
109109

110110
To verify the last active device profile for a specific device:
111111

112-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **My Team** > **Devices**.
112+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Team & Resources** > **Devices**.
113113
2. Under devices, find your device.
114114
3. Review the device profile under **Last active device profile**.
115115

116-
To verify the last active device profile for a users devices:
116+
To verify the last active device profile for a user's devices:
117117

118-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **My Team** > **Users**.
118+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Team & Resources** > **Users**.
119119
2. Under **User name**, find the user you would like to investigate.
120120
3. Select **Devices** to see all devices used by the user.
121121
4. Find the device you want to investigate and verify the last active device profile for that device under the **Device profile** column.

src/content/docs/cloudflare-one/team-and-resources/devices/warp/configure-warp/managed-networks.mdx

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -206,12 +206,12 @@ SHA256 Fingerprint=DD4F4806C57A5BBAF1AA5B080F0541DA75DB468D0A1FE731310149500CCD8
206206

207207
</TabItem> </Tabs>
208208

209-
## 3. Add managed network to Zero Trust
209+
## 3. Add managed network to Cloudflare One
210210

211211
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
212212

213-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **WARP Client**.
214-
2. Scroll down to **Network locations** and select **Add new**.
213+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Team & Resources** > **Devices** > **Device profiles**.
214+
2. Select **Managed networks** and select **Add new managed network**.
215215
3. Name your network location.
216216
4. In **Host and Port**, enter the private IP address and port number of your [TLS endpoint](#create-a-new-tls-endpoint) (for example, `192.168.185.198:3333`).
217217

@@ -220,6 +220,7 @@ SHA256 Fingerprint=DD4F4806C57A5BBAF1AA5B080F0541DA75DB468D0A1FE731310149500CCD8
220220
:::
221221

222222
5. (Optional) In **TLS Cert SHA-256**, enter the [SHA-256 fingerprint](#2-extract-the-sha-256-fingerprint) of the TLS certificate. This field is only needed for self-signed certificates. If a TLS fingerprint is not supplied, WARP validates the certificate against the local certificate store and checks that it is signed by a public certificate authority.
223+
6. Select **Save**.
223224

224225
</TabItem>
225226
<TabItem label="Terraform (v5)">
@@ -253,9 +254,9 @@ If a device profile uses [Split Tunnels](/cloudflare-one/team-and-resources/devi
253254

254255
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
255256

256-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **WARP Client**.
257+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Team & Resources** > **Devices** > **Device profiles**.
257258

258-
2. Under **Profile settings**, create a new [settings profile](/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-profiles/) or edit an existing profile.
259+
2. Under **Profiles**, create a new [profile](/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-profiles/) or edit an existing profile.
259260

260261
3. To apply this profile whenever a device connects to your network, add the following rule:
261262

src/content/docs/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -99,10 +99,10 @@ Due to platform differences, mobile clients can only apply Split Tunnels rules w
9999
Removing default Split Tunnel entries may cause users to lose Internet connectivity or block their access to local resources.
100100
:::
101101

102-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **WARP Client**.
103-
2. Under **Device settings**, locate the [device profile](/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-profiles/) you would like to modify and select **Configure**.
102+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Team & Resources** > **Devices** > **Device profiles**.
103+
2. Under **Profiles**, locate the [device profile](/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-profiles/) you would like to modify and select **Edit**.
104104
3. Under **Split Tunnels**, select **Manage**.
105-
4. Find the IP address or hostname in the list and select **Delete**.
105+
4. Find the IP address or hostname in the list and select the **Action** button. From the dropdown, select _Delete_.
106106

107107
<Render file="warp/client-notification-lag" product="cloudflare-one" />
108108

0 commit comments

Comments
 (0)