Skip to content

Commit ef8c8ed

Browse files
[CF1] WARP managed networks requirements update
1 parent a8942f0 commit ef8c8ed

File tree

1 file changed

+39
-27
lines changed

1 file changed

+39
-27
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/managed-networks.mdx

Lines changed: 39 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,22 @@ import { Details, TabItem, Tabs } from "~/components";
99

1010
Cloudflare WARP allows you to selectively apply WARP client settings if the device is connected to a secure network location such as an office.
1111

12+
On this page, you will learn how to create a TLS endpoint on your trusted network and configure it in Zero Trust to set up a managed network. After the TLS endpoint and managed network are configured, the WARP client on a device will detect when the device is on your managed network and apply the appropriate device profile.
13+
14+
## Requirements
15+
16+
- The WARP client scans all managed networks every time it detects a network change event from the operating system. To minimize performance impact, reuse the same TLS endpoint across multiple locations unless you require distinct settings profiles for each location.
17+
- Ensure that the device can only reach one managed network at any given time. If multiple managed networks are configured and reachable, there is no way to determine which settings profile the device will receive.
18+
19+
:::note
20+
21+
Starting with WARP version `2025.4.929`, the WARP client may take up to 40 seconds to apply the correct device profile after connecting to a managed network. During this period, the WARP client may display a Connected status, but users might not have access to certain resources until the appropriate device profile is fully applied.
22+
23+
:::
24+
1225
## 1. Choose a TLS endpoint
1326

14-
A TLS endpoint is a host on your network that serves a TLS certificate. The TLS endpoint acts like a network location beacon — when a device connects to a network, WARP detects the TLS endpoint and validates its certificate against an uploaded SHA-256 fingerprint.
27+
A TLS endpoint is a host on your network that serves a TLS certificate. The TLS endpoint acts like a network location beacon — when a device connects to a network, the WARP client on the device detects the TLS endpoint and validates the TLS certificate against an uploaded SHA-256 fingerprint (for self-signed certificates) or against the local certificate store to check that it is signed by a public certificate authority.
1528

1629
The TLS certificate can be hosted by any device on your network. However, the endpoint must be inaccessible to users outside of the network location. WARP will automatically exclude the managed network endpoint from all device profiles to ensure that users cannot connect to this endpoint over Cloudflare Tunnel. We recommend choosing a host that is physically in the office which remote users do not need to access, such as a printer.
1730

@@ -173,32 +186,36 @@ SHA256 Fingerprint=DD4F4806C57A5BBAF1AA5B080F0541DA75DB468D0A1FE731310149500CCD8
173186
3. Name your network location.
174187
4. In **Host and Port**, enter the private IP address and port number of your [TLS endpoint](#create-a-new-tls-endpoint) (for example, `192.168.185.198:3333`).
175188

176-
:::note
177-
We recommend using the private IP of your managed network endpoint and not a hostname to prevent issues related to DNS lookups resolving the incorrect IP.
178-
:::
189+
:::note
190+
We recommend using the private IP of your managed network endpoint and not a hostname to prevent issues related to DNS lookups resolving the incorrect IP.
191+
:::
192+
179193
5. (Optional) In **TLS Cert SHA-256**, enter the [SHA-256 fingerprint](#2-extract-the-sha-256-fingerprint) of the TLS certificate. This field is only needed for self-signed certificates. If a TLS fingerprint is not supplied, WARP validates the certificate against the local certificate store and checks that it is signed by a public certificate authority.
180194

181195
</TabItem>
182196
<TabItem label="Terraform (v5)">
183197

184-
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token):
185-
- `Zero Trust Write`
186-
187-
2. Add a managed network using the [`cloudflare_zero_trust_device_managed_network`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_device_managed_network) resource:
188-
189-
```tf
190-
resource "cloudflare_zero_trust_device_managed_networks" "office" {
191-
account_id = var.cloudflare_account_id
192-
name = "Office managed network"
193-
type = "tls"
194-
config = {
195-
tls_sockaddr = "192.168.185.198:3333"
196-
sha256 = "DD4F4806C57A5BBAF1AA5B080F0541DA75DB468D0A1FE731310149500CCD8662"
197-
}
198-
}
199-
```
200-
</TabItem>
201-
</Tabs>
198+
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token):
199+
200+
- `Zero Trust Write`
201+
202+
2. Add a managed network using the [`cloudflare_zero_trust_device_managed_network`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_device_managed_network) resource:
203+
204+
```tf
205+
resource "cloudflare_zero_trust_device_managed_networks" "office" {
206+
account_id = var.cloudflare_account_id
207+
name = "Office managed network"
208+
type = "tls"
209+
config = {
210+
tls_sockaddr = "192.168.185.198:3333"
211+
sha256 = "DD4F4806C57A5BBAF1AA5B080F0541DA75DB468D0A1FE731310149500CCD8662"
212+
}
213+
}
214+
```
215+
216+
</TabItem>
217+
218+
</Tabs>
202219

203220
WARP will automatically exclude the TLS endpoint from all device profiles. This prevents remote users from accessing the endpoint through the WARP tunnel on any port. If a device profile uses [Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) in **Include** mode, make sure that the Split Tunnel entries do not contain the TLS endpoint IP address; otherwise, the entire IP range will be excluded from the WARP tunnel.
204221

@@ -250,8 +267,3 @@ To check if the WARP client detects the network location:
250267
1. Turn on WARP.
251268
2. Disconnect and reconnect to the network.
252269
3. Open a terminal and run `warp-cli debug alternate-network`.
253-
254-
## Best practices
255-
256-
- The WARP client scans all managed networks every time it detects a network change event from the operating system. To minimize performance impact, we recommend reusing the same TLS endpoint across multiple locations unless you require distinct settings profiles for each location.
257-
- Ensure that the device can only reach one managed network at any given time. If multiple managed networks are configured and reachable, there is no way to determine which settings profile the device will receive.

0 commit comments

Comments
 (0)