Skip to content

Commit faf018c

Browse files
authored
[ZT] clarify split tunnel requirements for WARP-to-WARP and Host selectors (#26257)
* clarify split tunnel requirements * remove IP * revert LB changes
1 parent 65cbbc3 commit faf018c

File tree

3 files changed

+27
-18
lines changed

3 files changed

+27
-18
lines changed

src/content/docs/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/warp-to-warp.mdx

Lines changed: 20 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ head:
88
content: Create private networks with WARP-to-WARP
99
---
1010

11-
import { Render, GlossaryTooltip } from "~/components";
11+
import { Render, GlossaryTooltip, Tabs, TabItem } from "~/components";
1212

1313
With Cloudflare Zero Trust, you can create a private network between any two or more devices running Cloudflare WARP. This means that you can have a private network between your phone and laptop without ever needing to be connected to the same physical network. If you already have an existing Zero Trust deployment, you can also enable this feature to add device-to-device connectivity to your private network with the press of a button. This will allow you to connect to any service that relies on TCP, UDP, or ICMP-based protocols through Cloudflare's network.
1414

@@ -34,16 +34,26 @@ This guide covers how to:
3434
3. Enable **Allow WARP to WARP connection**. This allows Cloudflare to route traffic to the <GlossaryTooltip term="CGNAT IP">CGNAT IP</GlossaryTooltip> space.
3535
4. In your [Split Tunnel configuration](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/), ensure that traffic to `100.96.0.0/12` is going through WARP:
3636

37-
- If using **Exclude** mode, delete `100.64.0.0/10` from the list and add the following IP addresses:
38-
39-
- `100.64.0.0/12`
40-
- `100.81.0.0/16`
41-
- `100.82.0.0/15`
42-
- `100.84.0.0/14`
43-
- `100.88.0.0/13`
44-
- `100.112.0.0/12`
37+
<Tabs> <TabItem label="Exclude IPs and domains">
38+
If using Split Tunnels in **Exclude** mode:
39+
1. Delete `100.64.0.0/10` from the list.
40+
2. We recommend [adding back the IPs](/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/cloudflared/connect-cidr/#3-route-private-network-ips-through-warp) that are not being used for Zero Trust services. For example, if you are using WARP-to-WARP alongside [Gateway host selectors](/cloudflare-one/traffic-policies/egress-policies/host-selectors/) or [private hostname routing](/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/cloudflared/connect-private-hostname/), add routes to exclude the following IP addresses:
41+
42+
- `100.64.0.0/12`
43+
- `100.81.0.0/16`
44+
- `100.82.0.0/15`
45+
- `100.84.0.0/14`
46+
- `100.88.0.0/13`
47+
- `100.112.0.0/12`
48+
49+
</TabItem> <TabItem label="Include IPs and domains">
50+
If using Split Tunnels in **Include** mode:
51+
52+
1. Add the required [Zero Trust domains](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-domains) or [IP addresses](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-ip-addresses) to your Split Tunnel include list.
53+
2. [Add a route](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to include `100.96.0.0/12`.
54+
55+
</TabItem> </Tabs>
4556

46-
- If using **Include** mode, add `100.96.0.0/12` and `100.80.0.0/16` to your list.
4757

4858
This will instruct WARP to begin proxying any traffic destined for a `100.96.0.0/12` IP address to Cloudflare for routing and policy enforcement.
4959

src/content/docs/cloudflare-one/traffic-policies/egress-policies/host-selectors.mdx

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 2
66
---
77

8-
import { Tabs, TabItem, Details, APIRequest } from "~/components";
8+
import { Tabs, TabItem, Details, APIRequest} from "~/components";
99

1010
<Details header="Feature availability">
1111

@@ -92,23 +92,21 @@ To configure your Zero Trust organization to use Host selectors with Egress poli
9292

9393
{/* prettier-ignore-start */}
9494

95-
2. In your WARP [device profile](/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-profiles/), configure your [Split Tunnel](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/) depending on the mode:
95+
2. In your WARP [device profile](/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-profiles/), configure [Split Tunnels](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/) depending on the mode:
9696

9797
<Tabs> <TabItem label="Exclude IPs and domains">
98-
1. [Remove the route](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#remove-a-route) to the IP address `100.64.0.0/10` from your Split Tunnel exclude list.
99-
2. [Add routes](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to exclude the following IP addresses:
98+
1. [Remove the route](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#remove-a-route) to the IP address `100.64.0.0/10` from your Split Tunnel exclude list.
99+
2. We recommend [adding back the IPs](/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/cloudflared/connect-cidr/#3-route-private-network-ips-through-warp) that are not being used for Zero Trust services. For example, if you are using Gateway host selectors alongside [WARP-to-WARP connectivity](/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/warp-to-warp/) add routes to exclude the following IP addresses:
100100
- `100.64.0.0/12`
101101
- `100.81.0.0/16`
102102
- `100.82.0.0/15`
103103
- `100.84.0.0/14`
104104
- `100.88.0.0/13`
105105
- `100.112.0.0/12`
106-
107-
And remove `100.64.0.0/10` IP address.
108106

109107
</TabItem> <TabItem label="Include IPs and domains">
110-
1. Add the required [Zero Trust domains](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-domains) or [IP addresses](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-ip-addresses) to your Split Tunnel include list.
111-
2. [Add a route](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to include `100.80.0.0/16` and `100.96.0.0/12` IP addresses.
108+
1. Add the required [Zero Trust domains](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-domains) or [IP addresses](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-ip-addresses) to your Split Tunnel include list.
109+
2. [Add a route](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to include `100.80.0.0/16`.
112110

113111
</TabItem> </Tabs>
114112

src/content/docs/load-balancing/private-network/warp-to-tunnel.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -133,6 +133,7 @@ In order for WARP clients to connect to your load balancer, the load balancer's
133133
- **Exclude mode**: Delete the IP range that contains your load balancer IP. For example, if your load balancer has a Cloudflare-assigned CGNAT IP, delete `100.64.0.0/10`. We recommend [adding back the IPs](/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/cloudflared/connect-cidr/#3-route-private-network-ips-through-warp) that are not being used by your load balancer.
134134
:::note
135135
Some IPs in the `100.64.0.0/10` range may be reserved for other Zero Trust services such as Gateway <GlossaryTooltip term = "initial resolved IP">initial resolved IPs</GlossaryTooltip> or <GlossaryTooltip term = "CGNAT IP">WARP CGNAT IPs</GlossaryTooltip>. These IPs should remain deleted from the Exclude list.
136+
:::
136137
- **Include mode**: Add your load balancer IP.
137138

138139
WARP traffic can now reach your private load balancer. For example, if your load balancer points to a web application, you can test by running `curl <load-balancer-IP>` from the WARP device. This traffic will be distributed over Cloudflare Tunnel to your private endpoints according to your configured steering method.

0 commit comments

Comments
 (0)