diff --git a/src/content/changelogs/warp.yaml b/src/content/changelogs/warp.yaml index 8167534faefb37..b193d7cad235e5 100644 --- a/src/content/changelogs/warp.yaml +++ b/src/content/changelogs/warp.yaml @@ -5,6 +5,10 @@ productLink: "/cloudflare-one/connections/connect-devices/warp/" productArea: Cloudflare One productAreaLink: /cloudflare-one/changelog/ entries: + - publish_date: "2024-11-19" + title: MASQUE GA + description: |- + MASQUE as a device tunnel protocol option is now generally available (GA). Refer to [Device tunnel protocol](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#device-tunnel-protocol) for configuration details and minimum WARP client requirements. - publish_date: "2024-10-23" title: WARP client for macOS (version 2024.10.279.1) description: |- diff --git a/src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx b/src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx index 3db332c87228e5..a7ce5929c19047 100644 --- a/src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx +++ b/src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx @@ -63,7 +63,7 @@ The client will automatically reconnect after the [Auto connect period](#auto-co When `Enabled`, the WARP client will [automatically install](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/automated-deployment/) your organization's root certificate on the device. -### Override local interface IP +### Override local interface IP
@@ -120,9 +120,9 @@ When `Enabled`, users have the option to switch between [Gateway with WARP](/clo | Windows | ✅ | 2024.6.415.0 | | macOS | ✅ | 2024.6.416.0 | | Linux | ✅ | 2024.6.497.0 | -| iOS | Coming soon | | -| Android | Coming soon | | -| ChromeOS | Coming soon | | +| iOS | ✅ | 1.7 | +| Android | ✅ | 2.0 | +| ChromeOS | ✅ | 2.0 |
@@ -131,7 +131,7 @@ Configures the protocol used to route IP traffic from the device to Cloudflare G **Value**: - **WireGuard**: (default) Establishes a [WireGuard](https://www.wireguard.com/) connection to Cloudflare. The WARP client will encrypt traffic using a non-FIPs compliant cipher suite, `TLS_CHACHA20_POLY1305_SHA256`. When switching from MASQUE to WireGuard, users may lose Internet connectivity if their Wi-Fi network blocks the [ports and IPs](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#warp-ingress-ip) required for WireGuard to function. -- **MASQUE** : Establishes an HTTP/3 connection to Cloudflare. To use MASQUE, [Override local interface IP](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#override-local-interface-ip-) must be `Enabled`. The WARP client will encrypt traffic using TLS 1.3 and a [FIPS 140-2](https://csrc.nist.gov/pubs/fips/140-2/upd2/final) compliant cipher suite, `TLS_AES_256_GCM_SHA384`. +- **MASQUE**: Establishes an HTTP/3 connection to Cloudflare. To use MASQUE, [Override local interface IP](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#override-local-interface-ip-) must be `Enabled`. The WARP client will encrypt traffic using TLS 1.3 and a [FIPS 140-2](https://csrc.nist.gov/pubs/fips/140-2/upd2/final) compliant cipher suite, `TLS_AES_256_GCM_SHA384`. For more details on WireGuard versus MASQUE, refer to our [blog post](https://blog.cloudflare.com/zero-trust-warp-with-a-masque).