Skip to content

Commit d74df08

Browse files
maxvpharshil1712
authored andcommitted
[Tunnel] Clarify proxy procedure (#18459)
1 parent 07c8d3b commit d74df08

File tree

3 files changed

+16
-24
lines changed

3 files changed

+16
-24
lines changed

src/content/docs/cloudflare-one/connections/connect-networks/private-net/cloudflared/index.mdx

Lines changed: 8 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -20,18 +20,15 @@ To enable remote access to your private network, follow the guide below.
2020
To connect your infrastructure with Cloudflare Tunnel:
2121

2222
1. Create a Cloudflare Tunnel for your server by following our [dashboard setup guide](/cloudflare-one/connections/connect-networks/get-started/create-remote-tunnel/). You can skip the connect an application step and go straight to connecting a network.
23-
2423
2. In the **Private Networks** tab for the tunnel, enter the IP/CIDR range of your private network (for example `10.0.0.0/8`). This makes the WARP client aware that any requests to this IP range need to be routed to your new tunnel.
2524

2625
:::note
27-
2826
Cloudflare Tunnel only supports routes in the [private IP address space](https://www.rfc-editor.org/rfc/rfc1918.html#section-3):
2927

3028
- `10.0.0.0` - `10.255.255.255`
3129
- `172.16.0.0` - `172.31.255.255`
3230
- `192.168.0.0` - `192.168.255.255`
33-
34-
:::
31+
:::
3532

3633
## 2. Set up the client
3734

@@ -63,7 +60,6 @@ You can create Zero Trust policies to manage access to specific applications on
6360

6461
5. For **Value**, enter the IP address for your application (for example, `10.128.0.7`).
6562
:::note
66-
6763
If you would like to create a policy for an IP/CIDR range instead of a specific IP address, you can build a [Gateway Network policy](/cloudflare-one/policies/gateway/network-policies/) using the **Destination IP** selector.
6864
:::
6965

@@ -74,15 +70,17 @@ You can create Zero Trust policies to manage access to specific applications on
7470
8. Modify the policies to include additional identity-based conditions. For example:
7571

7672
- **Policy 1**
77-
| Selector | Operator | Value | Logic | Action |
73+
74+
| Selector | Operator | Value | Logic | Action |
7875
| -------------- | ------------- | ---------------- | ----- | ------ |
79-
| Destination IP | in | `10.128.0.7` | And | Allow |
80-
| User Email | matches regex | `.*@example.com` | | |
76+
| Destination IP | in | `10.128.0.7` | And | Allow |
77+
| User Email | matches regex | `.*@example.com` | | |
8178

8279
- **Policy 2**
83-
| Selector | Operator | Value | Action |
80+
81+
| Selector | Operator | Value | Action |
8482
| -------------- | -------- | ------------ | ------ |
85-
| Destination IP | in | `10.128.0.7` | Block |
83+
| Destination IP | in | `10.128.0.7` | Block |
8684

8785
Policies are evaluated in [numerical order](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence), so a user with an email ending in @example.com will be able to access `10.128.0.7` while all others will be blocked. For more information on building network policies, refer to our [dedicated documentation](/cloudflare-one/policies/gateway/network-policies/).
8886

@@ -111,7 +109,5 @@ Check the local IP address of the device and ensure that it does not fall within
111109
To resolve the IP conflict, you can either:
112110

113111
- Reconfigure the user's router to use a non-overlapping IP range. Compatible routers typically use `192.168.1.0/24`, `192.168.0.0/24` or `172.16.0.0/24`.
114-
115112
- Tighten the IP range in your Split Tunnel configuration to exclude the `10.0.0.0/24` range. This will only work if your private network does not have any hosts within `10.0.0.0/24`.
116-
117113
- Change the IP/CIDR of your private network so that it does not overlap with a range commonly used by home networks.

src/content/partials/cloudflare-one/tunnel/enable-gateway-proxy.mdx

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,15 @@
22
{}
33
---
44

5-
import { Details } from "~/components";
5+
import { Tabs, TabItem } from "~/components";
66

77
1. Go to **Settings** > **Network**.
8-
2. Enable **Proxy** for TCP.
9-
3. (Recommended) To proxy traffic to internal DNS resolvers, select **UDP**.
10-
4. (Recommended) To proxy traffic for diagnostic tools such as `ping` and `traceroute`, select **ICMP**. You may also need to update your system to allow ICMP traffic through `cloudflared`:
8+
2. Turn on **Proxy**.
9+
3. Select **TCP**.
10+
4. (Recommended) To proxy traffic to internal DNS resolvers, select **UDP**.
11+
5. (Recommended) To proxy traffic for diagnostic tools such as `ping` and `traceroute`, select **ICMP**. You may also need to update your system to allow ICMP traffic through `cloudflared`:
1112

12-
<Details header="Linux">
13+
<Tabs> <TabItem label="Linux" icon="linux">
1314

1415
1. Ensure that `ping_group_range` includes the Group ID (GID) of the user running `cloudflared`.
1516

@@ -36,14 +37,12 @@ import { Details } from "~/components";
3637
cloudflared tunnel run --icmpv4-src <IP of primary interface>
3738
```
3839

39-
</Details>
40-
41-
<Details header="Docker">
40+
</TabItem> <TabItem label="Docker" icon="seti:docker">
4241

4342
In your environment, modify the `ping_group_range` parameter to include the Group ID (GID) of the user running `cloudflared`.
4443

4544
By default the [`cloudflared` Docker container](https://github.com/cloudflare/cloudflared/blob/master/Dockerfile#L29C6-L29C13) executes as a user called `nonroot` inside of the container. `nonroot` is a specific user that exists in the [base image](https://github.com/GoogleContainerTools/distroless/blob/859eeea1f9b3b7d59bdcd7e24a977f721e4a406c/base/base.bzl#L8) we use, and its Group ID is hardcoded to 65532.
4645

47-
</Details>
46+
</TabItem> </Tabs>
4847

4948
Cloudflare will now proxy traffic from enrolled devices, except for the traffic excluded in your [split tunnel settings](/cloudflare-one/connections/connect-networks/private-net/cloudflared/#3-route-private-network-ips-through-warp). For more information on how Gateway forwards traffic, refer to [Gateway proxy](/cloudflare-one/policies/gateway/proxy/).

src/content/partials/cloudflare-one/tunnel/warp-to-tunnel-route-ips.mdx

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,11 @@
11
---
22
{}
3-
43
---
54

65
By default, WARP excludes traffic bound for [RFC 1918 space](https://datatracker.ietf.org/doc/html/rfc1918), which are IP addresses typically used in private networks and not reachable from the Internet. In order for WARP to send traffic to your private network, you must configure [Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) so that the IP/CIDR of your private network routes through WARP.
76

87
1. First, check whether your [Split Tunnels mode](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#change-split-tunnels-mode) is set to **Exclude** or **Include** mode.
9-
108
2. If you are using **Include** mode, add your network's IP/CIDR range to the list. Your list should also include the [domains necessary for Cloudflare Zero Trust functionality](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-domains).
11-
129
3. If you are using **Exclude** mode:
1310
1. Delete your network's IP/CIDR range from the list. For example, if your network uses the default AWS range of `172.31.0.0/16`, delete `172.16.0.0/12`.
1411
2. Re-add IP/CDIR ranges that are not explicitly used by your private network. For the AWS example above, you would add new entries for `172.16.0.0/13`, `172.24.0.0/14`, `172.28.0.0/15`, and `172.30.0.0/16`. This ensures that only traffic to `172.31.0.0/16` routes through WARP.

0 commit comments

Comments
 (0)