Skip to content

Commit d906e3f

Browse files
committed
update WARP architecture
1 parent 16d8c1e commit d906e3f

File tree

1 file changed

+13
-8
lines changed
  • src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic

1 file changed

+13
-8
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture.mdx

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@ The WARP client allows organizations to have granular control over the applicati
1818

1919
| Connection | Protocol | Purpose |
2020
| ---------------------------------------------------------------------------------------------------------------------------------------------- | -------- | --------------------------------------------------------------------------------------------------------------- |
21-
| Device orchestration | HTTPS | Perform user registration, check device posture, apply WARP profile settings. |
22-
| [DoH](https://www.cloudflare.com/learning/dns/dns-over-tls/) | HTTPS | Send DNS requests to Gateway for DNS policy enforcement. |
2321
| WARP tunnel ([via WireGuard or MASQUE](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#device-tunnel-protocol)) | UDP | Send IP packets to Gateway for network policy enforcement, HTTP policy enforcement, and private network access. |
22+
| [DoH](https://www.cloudflare.com/learning/dns/dns-over-tls/) | HTTPS | Send DNS requests to Gateway for DNS policy enforcement. The DoH connection is maintained inside of the WARP tunnel. |
23+
| Device orchestration | HTTPS | Perform user registration, check device posture, apply WARP profile settings. |
2424

2525
```mermaid
2626
flowchart LR
@@ -32,17 +32,22 @@ end
3232
subgraph Cloudflare
3333
A[Zero Trust account]
3434
subgraph Gateway
35-
G[DNS resolver]
3635
N[L3/L4 firewall]
36+
G[DNS resolver]
37+
end
3738
end
39+
W<--"Device
40+
orchestration"-->A
41+
subgraph tunnel["WARP tunnel"]
42+
ip@{ shape: text, label: "Network traffic" }
43+
dns@{ shape: text, label: "DNS traffic" }
3844
end
39-
W<--Device orchestration-->A
40-
D<--DoH-->G
41-
V<--WARP tunnel-->N
45+
V --- ip-->N
46+
D --- dns-->G
4247
N --> O[(Application)]
4348
```
4449

45-
Your [Split Tunnel](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) configuration determines what traffic is sent down the WARP tunnel. Your [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) configuration determines which DNS requests are sent to Gateway via DoH. Traffic to the [DoH endpoint](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#doh-ip) and [device orchestration API](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#client-orchestration-api) endpoint do not obey Split Tunnel rules, since those connections always operate outside of the WARP tunnel.
50+
Your [Split Tunnel](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) configuration determines what IP traffic is sent down the WARP tunnel. Your [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) configuration determines which DNS requests are sent to Gateway via DoH. Traffic to the [device orchestration API](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#client-orchestration-api) endpoint does not obey Split Tunnel rules since the connection always operates outside of the WARP tunnel.
4651

4752
Next, you will learn how WARP configures your operating system to apply your Local Domain Fallback and Split Tunnel routing rules. Implementation details differ between desktop and mobile clients.
4853

@@ -68,7 +73,7 @@ Browsers with DoH configured will bypass the local DNS proxy. You may need to di
6873

6974
Based on your Local Domain Fallback configuration, WARP will either forward the request to Gateway for DNS policy enforcement or forward the request to your private DNS resolver.
7075

71-
- Requests to Gateway are sent over our [DoH connection](#overview) (outside of the WARP tunnel).
76+
- Requests to Gateway are sent over our [DoH connection](#overview) inside the WARP tunnel.
7277
- Requests to your private DNS resolver are sent either inside or outside of the tunnel depending on your Split Tunnel configuration. For more information, refer to [How the WARP client handles DNS requests](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/#how-the-warp-client-handles-dns-requests).
7378

7479
```mermaid

0 commit comments

Comments
 (0)