You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
MASQUE as a device tunnel protocol option is now generally available (GA). Refer to [Device tunnel protocol](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#device-tunnel-protocol) for configuration details and minimum WARP client requirements.
8
12
- publish_date: "2024-10-23"
9
13
title: WARP client for macOS (version 2024.10.279.1)
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,7 +70,7 @@ The client will automatically reconnect after the [Auto connect period](#auto-co
70
70
71
71
When `Enabled`, the WARP client will [automatically install](/cloudflare-one/connections/connect-devices/user-side-certificates/automated-deployment/) your organization's root certificate on the device.
72
72
73
-
### Override local interface IP <InlineBadgepreset="beta" />
73
+
### Override local interface IP
74
74
75
75
<Detailsheader="Feature availability">
76
76
@@ -127,9 +127,9 @@ When `Enabled`, users have the option to switch between [Gateway with WARP](/clo
127
127
| Windows | ✅ | 2024.6.415.0 |
128
128
| macOS | ✅ | 2024.6.416.0 |
129
129
| Linux | ✅ | 2024.6.497.0 |
130
-
| iOS |Coming soon ||
131
-
| Android |Coming soon ||
132
-
| ChromeOS |Coming soon ||
130
+
| iOS |✅ | 1.7|
131
+
| Android |✅ | 2.0|
132
+
| ChromeOS |✅ | 2.0|
133
133
134
134
</Details>
135
135
@@ -138,7 +138,7 @@ Configures the protocol used to route IP traffic from the device to Cloudflare G
138
138
**Value**:
139
139
140
140
-**WireGuard**: (default) Establishes a [WireGuard](https://www.wireguard.com/) connection to Cloudflare. The WARP client will encrypt traffic using a non-FIPs compliant cipher suite, `TLS_CHACHA20_POLY1305_SHA256`. When switching from MASQUE to WireGuard, users may lose Internet connectivity if their Wi-Fi network blocks the [ports and IPs](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#warp-ingress-ip) required for WireGuard to function.
141
-
-**MASQUE** <InlineBadgepreset="beta" />: Establishes an HTTP/3 connection to Cloudflare. To use MASQUE, [Override local interface IP](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#override-local-interface-ip-) must be `Enabled`. The WARP client will encrypt traffic using TLS 1.3 and a [FIPS 140-2](https://csrc.nist.gov/pubs/fips/140-2/upd2/final) compliant cipher suite, `TLS_AES_256_GCM_SHA384`.
141
+
-**MASQUE**: Establishes an HTTP/3 connection to Cloudflare. To use MASQUE, [Override local interface IP](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#override-local-interface-ip-) must be `Enabled`. The WARP client will encrypt traffic using TLS 1.3 and a [FIPS 140-2](https://csrc.nist.gov/pubs/fips/140-2/upd2/final) compliant cipher suite, `TLS_AES_256_GCM_SHA384`.
142
142
143
143
For more details on WireGuard versus MASQUE, refer to our [blog post](https://blog.cloudflare.com/zero-trust-warp-with-a-masque).
0 commit comments