You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -67,13 +69,25 @@ The following domains are used as part of our captive portal check:
67
69
-`cloudflareok.com`
68
70
-`cloudflarecp.com`
69
71
70
-
## Connectivity check
72
+
## Connectivity checks
73
+
74
+
As part of establishing the WARP connection, the client runs connectivity checks inside and outside of the WARP tunnel.
75
+
76
+
### Outside tunnel
77
+
78
+
The client connects to the following destinations to verify general Internet connectivity outside of the WARP tunnel. Make sure that these IPs and domains are on your firewall allowlist.
79
+
80
+
-`engage.cloudflareclient.com`: The client will always send requests directly to an IP in the [WARP ingress IPv4 or IPv6 range](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#warp-ingress-ip) (or to your [`override_warp_endpoint`](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/parameters/#override_warp_endpoint) if set). Requests will not use a proxy server, even if one is configured for the system.
81
+
-`162.159.197.3`
82
+
-`2606:4700:102::3`
71
83
72
-
As part of establishing the WARP connection, the client will check the following HTTPS URLs to validate a successful connection:
84
+
### Inside tunnel
73
85
74
-
-`engage.cloudflareclient.com` verifies general Internet connectivity outside of the WARP tunnel. These requests are always sent directly to an IP in the [WARP ingress IPv4 or IPv6 range](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#warp-ingress-ip) (or to your [`override_warp_endpoint`](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/parameters/#override_warp_endpoint) if set). Requests will not use a proxy server, even if one is configured for the system.
86
+
The client connects to the following destinations to verify connectivity inside of the WARP tunnel. Because this check happens inside of the tunnel, you do not need to add these IPs and domains to your firewall allowlist. However, since the requests go through Gateway, ensure that they are not blocked by a Gateway HTTP or Network policy.
75
87
76
-
-`connectivity.cloudflareclient.com` verifies connectivity inside of the WARP tunnel. Because this check happens inside of the tunnel, you do not need to add `connectivity.cloudflareclient.com` to your firewall allowlist.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/troubleshooting/client-errors.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ This page lists the error codes that can appear in the WARP client GUI. If you d
45
45
46
46
### Cause
47
47
48
-
The initial [connectivity check](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-check) failed for an unknown reason. Refer to [Unable to connect WARP](/cloudflare-one/connections/connect-devices/warp/troubleshooting/common-issues/#unable-to-connect-warp) for the most common reasons why this error occurs.
48
+
The initial [connectivity check](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-checks) failed for an unknown reason. Refer to [Unable to connect WARP](/cloudflare-one/connections/connect-devices/warp/troubleshooting/common-issues/#unable-to-connect-warp) for the most common reasons why this error occurs.
49
49
50
50
### Resolution
51
51
@@ -164,7 +164,7 @@ A router, firewall, antivirus software, or other third-party security product is
164
164
165
165
### Cause
166
166
167
-
The [connectivity check](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-check) inside of the WARP tunnel has failed.
167
+
The [connectivity check](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-checks) inside of the WARP tunnel has failed.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/connections/connect-devices/warp/troubleshooting/warp-logs.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,7 +64,7 @@ The `warp-debugging-info-<date>-<time>.zip` archive contains the following files
64
64
|`boringtun.log`| Log for the WARP tunnel that serves traffic from the device to Cloudflare's global network. |
65
65
|`bound-dns-ports.txt`| Active processes on port `53`. |
66
66
|`captive-portal-hotspot-detect.txt`| HTTP response of `captive.apple.com`|
67
-
|`connectivity.txt`| DNS resolution and HTTP trace requests to [validate a successful connection](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-check). Can be used to determine whether traffic is routing through the WARP tunnel. |
67
+
|`connectivity.txt`| DNS resolution and HTTP trace requests to [validate a successful connection](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-checks). Can be used to determine whether traffic is routing through the WARP tunnel. |
68
68
|`daemon_dns.log`| Contains detailed DNS logs if **Log DNS queries** is enabled in the WARP client. |
69
69
|`daemon.log`| Detailed log of all actions performed by the WARP client, including all communication between the device and Cloudflare's global network. **Note:** This is the most useful debug log. |
70
70
|`date.txt`| Date and time (UTC) when you ran the `warp-diag` command. |
Copy file name to clipboardExpand all lines: src/content/warp-releases/linux/beta/2025.4.589.1.yaml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ releaseNotes: |-
4
4
- Improved DEX test error reporting.
5
5
- Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile.
6
6
- Added a TCP fallback for the MASQUE tunnel protocol to improve compatibility with networks on MASQUE.
7
-
- Added new IP addresses for [tunnel connectivity checks](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-check). If your organization uses a firewall or other policies you will need to exempt these IPs.
7
+
- Added new IP addresses for [tunnel connectivity checks](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-checks). If your organization uses a firewall or other policies you will need to exempt these IPs.
8
8
- Fixed an issue where frequent network changes could cause WARP to become unresponsive.
9
9
- DNS over HTTPS traffic is now included in the WARP tunnel by default.
Copy file name to clipboardExpand all lines: src/content/warp-releases/macos/beta/2025.4.589.1.yaml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ releaseNotes: |-
5
5
- Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile.
6
6
- Improved captive portal detection.
7
7
- Added a TCP fallback for the MASQUE tunnel protocol to improve compatibility with networks on MASQUE.
8
-
- Added new IP addresses for [tunnel connectivity checks](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-check). If your organization uses a firewall or other policies you will need to exempt these IPs.
8
+
- Added new IP addresses for [tunnel connectivity checks](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-checks). If your organization uses a firewall or other policies you will need to exempt these IPs.
9
9
- DNS over HTTPS traffic is now included in the WARP tunnel by default.
10
10
- Improved the error message displayed in the client GUI when the rate limit for entering an incorrect admin override code is met.
11
11
- Added a [Collect Captive Portal Diag](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/captive-portals/#get-captive-portal-logs) button in the client GUI to make it easier for users to collect captive portal debugging diagnostics.
Copy file name to clipboardExpand all lines: src/content/warp-releases/windows/beta/2025.4.589.1.yaml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ releaseNotes: |-
7
7
- Improved WARP client UI high contrast mode.
8
8
- Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile.
9
9
- Added a TCP fallback for the MASQUE tunnel protocol to improve compatibility with networks on MASQUE.
10
-
- Added new IP addresses for [tunnel connectivity checks](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-check). If your organization uses a firewall or other policies you will need to exempt these IPs.
10
+
- Added new IP addresses for [tunnel connectivity checks](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-checks). If your organization uses a firewall or other policies you will need to exempt these IPs.
11
11
- DNS over HTTPS traffic is now included in the WARP tunnel by default.
12
12
- Improved the error message displayed in the client GUI when the rate limit for entering an incorrect admin override code is met.
13
13
- Added a [Collect Captive Portal Diag](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/captive-portals/#get-captive-portal-logs) button in the client GUI to make it easier for users to collect captive portal debugging diagnostics.
0 commit comments