Skip to content

Commit e19b698

Browse files
committed
Update procedure
1 parent b4d77e9 commit e19b698

File tree

2 files changed

+15
-17
lines changed

2 files changed

+15
-17
lines changed

src/content/docs/cloudflare-one/connections/connect-networks/private-net/cloudflared/index.mdx

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,6 @@ You can create Zero Trust policies to manage access to specific applications on
6363

6464
5. For **Value**, enter the IP address for your application (for example, `10.128.0.7`).
6565
:::note
66-
6766
If you would like to create a policy for an IP/CIDR range instead of a specific IP address, you can build a [Gateway Network policy](/cloudflare-one/policies/gateway/network-policies/) using the **Destination IP** selector.
6867
:::
6968

@@ -74,15 +73,17 @@ You can create Zero Trust policies to manage access to specific applications on
7473
8. Modify the policies to include additional identity-based conditions. For example:
7574

7675
- **Policy 1**
77-
| Selector | Operator | Value | Logic | Action |
76+
77+
| Selector | Operator | Value | Logic | Action |
7878
| -------------- | ------------- | ---------------- | ----- | ------ |
79-
| Destination IP | in | `10.128.0.7` | And | Allow |
80-
| User Email | matches regex | `.*@example.com` | | |
79+
| Destination IP | in | `10.128.0.7` | And | Allow |
80+
| User Email | matches regex | `.*@example.com` | | |
8181

8282
- **Policy 2**
83-
| Selector | Operator | Value | Action |
83+
84+
| Selector | Operator | Value | Action |
8485
| -------------- | -------- | ------------ | ------ |
85-
| Destination IP | in | `10.128.0.7` | Block |
86+
| Destination IP | in | `10.128.0.7` | Block |
8687

8788
Policies are evaluated in [numerical order](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence), so a user with an email ending in @example.com will be able to access `10.128.0.7` while all others will be blocked. For more information on building network policies, refer to our [dedicated documentation](/cloudflare-one/policies/gateway/network-policies/).
8889

@@ -111,7 +112,5 @@ Check the local IP address of the device and ensure that it does not fall within
111112
To resolve the IP conflict, you can either:
112113

113114
- Reconfigure the user's router to use a non-overlapping IP range. Compatible routers typically use `192.168.1.0/24`, `192.168.0.0/24` or `172.16.0.0/24`.
114-
115115
- Tighten the IP range in your Split Tunnel configuration to exclude the `10.0.0.0/24` range. This will only work if your private network does not have any hosts within `10.0.0.0/24`.
116-
117116
- Change the IP/CIDR of your private network so that it does not overlap with a range commonly used by home networks.

src/content/partials/cloudflare-one/tunnel/enable-gateway-proxy.mdx

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,15 @@
22
{}
33
---
44

5-
import { Details } from "~/components";
5+
import { Tabs, TabItem } from "~/components";
66

77
1. Go to **Settings** > **Network**.
8-
2. Enable **Proxy** for TCP.
9-
3. (Recommended) To proxy traffic to internal DNS resolvers, select **UDP**.
10-
4. (Recommended) To proxy traffic for diagnostic tools such as `ping` and `traceroute`, select **ICMP**. You may also need to update your system to allow ICMP traffic through `cloudflared`:
8+
2. Turn on **Proxy**.
9+
3. Select **TCP**.
10+
4. (Recommended) To proxy traffic to internal DNS resolvers, select **UDP**.
11+
5. (Recommended) To proxy traffic for diagnostic tools such as `ping` and `traceroute`, select **ICMP**. You may also need to update your system to allow ICMP traffic through `cloudflared`:
1112

12-
<Details header="Linux">
13+
<Tabs> <TabItem label="Linux" icon="linux">
1314

1415
1. Ensure that `ping_group_range` includes the Group ID (GID) of the user running `cloudflared`.
1516

@@ -36,14 +37,12 @@ import { Details } from "~/components";
3637
cloudflared tunnel run --icmpv4-src <IP of primary interface>
3738
```
3839

39-
</Details>
40-
41-
<Details header="Docker">
40+
</TabItem> <TabItem label="Docker" icon="seti:docker">
4241

4342
In your environment, modify the `ping_group_range` parameter to include the Group ID (GID) of the user running `cloudflared`.
4443

4544
By default the [`cloudflared` Docker container](https://github.com/cloudflare/cloudflared/blob/master/Dockerfile#L29C6-L29C13) executes as a user called `nonroot` inside of the container. `nonroot` is a specific user that exists in the [base image](https://github.com/GoogleContainerTools/distroless/blob/859eeea1f9b3b7d59bdcd7e24a977f721e4a406c/base/base.bzl#L8) we use, and its Group ID is hardcoded to 65532.
4645

47-
</Details>
46+
</TabItem> </Tabs>
4847

4948
Cloudflare will now proxy traffic from enrolled devices, except for the traffic excluded in your [split tunnel settings](/cloudflare-one/connections/connect-networks/private-net/cloudflared/#3-route-private-network-ips-through-warp). For more information on how Gateway forwards traffic, refer to [Gateway proxy](/cloudflare-one/policies/gateway/proxy/).

0 commit comments

Comments
 (0)