You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
MASQUE as a device tunnel protocol option is now generally available (GA). Refer to [Device tunnel protocol](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#device-tunnel-protocol) for configuration details and minimum WARP client requirements.
8
12
- publish_date: "2024-10-23"
9
13
title: WARP client for macOS (version 2024.10.279.1)
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,7 +63,7 @@ The client will automatically reconnect after the [Auto connect period](#auto-co
63
63
64
64
When `Enabled`, the WARP client will [automatically install](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/automated-deployment/) your organization's root certificate on the device.
65
65
66
-
### Override local interface IP <InlineBadgepreset="beta" />
66
+
### Override local interface IP
67
67
68
68
<Detailsheader="Feature availability">
69
69
@@ -120,9 +120,9 @@ When `Enabled`, users have the option to switch between [Gateway with WARP](/clo
120
120
| Windows | ✅ | 2024.6.415.0 |
121
121
| macOS | ✅ | 2024.6.416.0 |
122
122
| Linux | ✅ | 2024.6.497.0 |
123
-
| iOS |Coming soon ||
124
-
| Android |Coming soon ||
125
-
| ChromeOS |Coming soon ||
123
+
| iOS |✅ | 1.7|
124
+
| Android |✅ | 2.0|
125
+
| ChromeOS |✅ | 2.0|
126
126
127
127
</Details>
128
128
@@ -131,7 +131,7 @@ Configures the protocol used to route IP traffic from the device to Cloudflare G
131
131
**Value**:
132
132
133
133
-**WireGuard**: (default) Establishes a [WireGuard](https://www.wireguard.com/) connection to Cloudflare. The WARP client will encrypt traffic using a non-FIPs compliant cipher suite, `TLS_CHACHA20_POLY1305_SHA256`. When switching from MASQUE to WireGuard, users may lose Internet connectivity if their Wi-Fi network blocks the [ports and IPs](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#warp-ingress-ip) required for WireGuard to function.
134
-
-**MASQUE** <InlineBadgepreset="beta" />: Establishes an HTTP/3 connection to Cloudflare. To use MASQUE, [Override local interface IP](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#override-local-interface-ip-) must be `Enabled`. The WARP client will encrypt traffic using TLS 1.3 and a [FIPS 140-2](https://csrc.nist.gov/pubs/fips/140-2/upd2/final) compliant cipher suite, `TLS_AES_256_GCM_SHA384`.
134
+
-**MASQUE**: Establishes an HTTP/3 connection to Cloudflare. To use MASQUE, [Override local interface IP](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#override-local-interface-ip-) must be `Enabled`. The WARP client will encrypt traffic using TLS 1.3 and a [FIPS 140-2](https://csrc.nist.gov/pubs/fips/140-2/upd2/final) compliant cipher suite, `TLS_AES_256_GCM_SHA384`.
135
135
136
136
For more details on WireGuard versus MASQUE, refer to our [blog post](https://blog.cloudflare.com/zero-trust-warp-with-a-masque).
0 commit comments