You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-networks/private-net/cloudflared/index.mdx
+7-8Lines changed: 7 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,7 +63,6 @@ You can create Zero Trust policies to manage access to specific applications on
63
63
64
64
5. For **Value**, enter the IP address for your application (for example, `10.128.0.7`).
65
65
:::note
66
-
67
66
If you would like to create a policy for an IP/CIDR range instead of a specific IP address, you can build a [Gateway Network policy](/cloudflare-one/policies/gateway/network-policies/) using the **Destination IP** selector.
68
67
:::
69
68
@@ -74,15 +73,17 @@ You can create Zero Trust policies to manage access to specific applications on
74
73
8. Modify the policies to include additional identity-based conditions. For example:
Policies are evaluated in [numerical order](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence), so a user with an email ending in @example.com will be able to access `10.128.0.7` while all others will be blocked. For more information on building network policies, refer to our [dedicated documentation](/cloudflare-one/policies/gateway/network-policies/).
88
89
@@ -111,7 +112,5 @@ Check the local IP address of the device and ensure that it does not fall within
111
112
To resolve the IP conflict, you can either:
112
113
113
114
- Reconfigure the user's router to use a non-overlapping IP range. Compatible routers typically use `192.168.1.0/24`, `192.168.0.0/24` or `172.16.0.0/24`.
114
-
115
115
- Tighten the IP range in your Split Tunnel configuration to exclude the `10.0.0.0/24` range. This will only work if your private network does not have any hosts within `10.0.0.0/24`.
116
-
117
116
- Change the IP/CIDR of your private network so that it does not overlap with a range commonly used by home networks.
Copy file name to clipboardExpand all lines: src/content/partials/cloudflare-one/tunnel/enable-gateway-proxy.mdx
+8-9Lines changed: 8 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,14 +2,15 @@
2
2
{}
3
3
---
4
4
5
-
import { Details } from"~/components";
5
+
import { Tabs, TabItem } from"~/components";
6
6
7
7
1. Go to **Settings** > **Network**.
8
-
2. Enable **Proxy** for TCP.
9
-
3. (Recommended) To proxy traffic to internal DNS resolvers, select **UDP**.
10
-
4. (Recommended) To proxy traffic for diagnostic tools such as `ping` and `traceroute`, select **ICMP**. You may also need to update your system to allow ICMP traffic through `cloudflared`:
8
+
2. Turn on **Proxy**.
9
+
3. Select **TCP**.
10
+
4. (Recommended) To proxy traffic to internal DNS resolvers, select **UDP**.
11
+
5. (Recommended) To proxy traffic for diagnostic tools such as `ping` and `traceroute`, select **ICMP**. You may also need to update your system to allow ICMP traffic through `cloudflared`:
11
12
12
-
<Detailsheader="Linux">
13
+
<Tabs> <TabItemlabel="Linux"icon="linux">
13
14
14
15
1. Ensure that `ping_group_range` includes the Group ID (GID) of the user running `cloudflared`.
15
16
@@ -36,14 +37,12 @@ import { Details } from "~/components";
36
37
cloudflared tunnel run --icmpv4-src <IP of primary interface>
In your environment, modify the `ping_group_range` parameter to include the Group ID (GID) of the user running `cloudflared`.
44
43
45
44
By default the [`cloudflared` Docker container](https://github.com/cloudflare/cloudflared/blob/master/Dockerfile#L29C6-L29C13) executes as a user called `nonroot` inside of the container. `nonroot` is a specific user that exists in the [base image](https://github.com/GoogleContainerTools/distroless/blob/859eeea1f9b3b7d59bdcd7e24a977f721e4a406c/base/base.bzl#L8) we use, and its Group ID is hardcoded to 65532.
46
45
47
-
</Details>
46
+
</TabItem> </Tabs>
48
47
49
48
Cloudflare will now proxy traffic from enrolled devices, except for the traffic excluded in your [split tunnel settings](/cloudflare-one/connections/connect-networks/private-net/cloudflared/#3-route-private-network-ips-through-warp). For more information on how Gateway forwards traffic, refer to [Gateway proxy](/cloudflare-one/policies/gateway/proxy/).
0 commit comments