Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -20,18 +20,15 @@ To enable remote access to your private network, follow the guide below.
To connect your infrastructure with Cloudflare Tunnel:

1. Create a Cloudflare Tunnel for your server by following our [dashboard setup guide](/cloudflare-one/connections/connect-networks/get-started/create-remote-tunnel/). You can skip the connect an application step and go straight to connecting a network.

2. In the **Private Networks** tab for the tunnel, enter the IP/CIDR range of your private network (for example `10.0.0.0/8`). This makes the WARP client aware that any requests to this IP range need to be routed to your new tunnel.

:::note

Cloudflare Tunnel only supports routes in the [private IP address space](https://www.rfc-editor.org/rfc/rfc1918.html#section-3):

- `10.0.0.0` - `10.255.255.255`
- `172.16.0.0` - `172.31.255.255`
- `192.168.0.0` - `192.168.255.255`

:::
:::

## 2. Set up the client

Expand Down Expand Up @@ -63,7 +60,6 @@ You can create Zero Trust policies to manage access to specific applications on

5. For **Value**, enter the IP address for your application (for example, `10.128.0.7`).
:::note

If you would like to create a policy for an IP/CIDR range instead of a specific IP address, you can build a [Gateway Network policy](/cloudflare-one/policies/gateway/network-policies/) using the **Destination IP** selector.
:::

Expand All @@ -74,15 +70,17 @@ You can create Zero Trust policies to manage access to specific applications on
8. Modify the policies to include additional identity-based conditions. For example:

- **Policy 1**
| Selector | Operator | Value | Logic | Action |

| Selector | Operator | Value | Logic | Action |
| -------------- | ------------- | ---------------- | ----- | ------ |
| Destination IP | in | `10.128.0.7` | And | Allow |
| User Email | matches regex | `.*@example.com` | | |
| Destination IP | in | `10.128.0.7` | And | Allow |
| User Email | matches regex | `.*@example.com` | | |

- **Policy 2**
| Selector | Operator | Value | Action |

| Selector | Operator | Value | Action |
| -------------- | -------- | ------------ | ------ |
| Destination IP | in | `10.128.0.7` | Block |
| Destination IP | in | `10.128.0.7` | Block |

Policies are evaluated in [numerical order](/cloudflare-one/policies/gateway/order-of-enforcement/#order-of-precedence), so a user with an email ending in @example.com will be able to access `10.128.0.7` while all others will be blocked. For more information on building network policies, refer to our [dedicated documentation](/cloudflare-one/policies/gateway/network-policies/).

Expand Down Expand Up @@ -111,7 +109,5 @@ Check the local IP address of the device and ensure that it does not fall within
To resolve the IP conflict, you can either:

- Reconfigure the user's router to use a non-overlapping IP range. Compatible routers typically use `192.168.1.0/24`, `192.168.0.0/24` or `172.16.0.0/24`.

- Tighten the IP range in your Split Tunnel configuration to exclude the `10.0.0.0/24` range. This will only work if your private network does not have any hosts within `10.0.0.0/24`.

- Change the IP/CIDR of your private network so that it does not overlap with a range commonly used by home networks.
Original file line number Diff line number Diff line change
Expand Up @@ -2,14 +2,15 @@
{}
---

import { Details } from "~/components";
import { Tabs, TabItem } from "~/components";

1. Go to **Settings** > **Network**.
2. Enable **Proxy** for TCP.
3. (Recommended) To proxy traffic to internal DNS resolvers, select **UDP**.
4. (Recommended) To proxy traffic for diagnostic tools such as `ping` and `traceroute`, select **ICMP**. You may also need to update your system to allow ICMP traffic through `cloudflared`:
2. Turn on **Proxy**.
3. Select **TCP**.
4. (Recommended) To proxy traffic to internal DNS resolvers, select **UDP**.
5. (Recommended) To proxy traffic for diagnostic tools such as `ping` and `traceroute`, select **ICMP**. You may also need to update your system to allow ICMP traffic through `cloudflared`:

<Details header="Linux">
<Tabs> <TabItem label="Linux" icon="linux">

1. Ensure that `ping_group_range` includes the Group ID (GID) of the user running `cloudflared`.

Expand All @@ -36,14 +37,12 @@ import { Details } from "~/components";
cloudflared tunnel run --icmpv4-src <IP of primary interface>
```

</Details>

<Details header="Docker">
</TabItem> <TabItem label="Docker" icon="seti:docker">

In your environment, modify the `ping_group_range` parameter to include the Group ID (GID) of the user running `cloudflared`.

By default the [`cloudflared` Docker container](https://github.com/cloudflare/cloudflared/blob/master/Dockerfile#L29C6-L29C13) executes as a user called `nonroot` inside of the container. `nonroot` is a specific user that exists in the [base image](https://github.com/GoogleContainerTools/distroless/blob/859eeea1f9b3b7d59bdcd7e24a977f721e4a406c/base/base.bzl#L8) we use, and its Group ID is hardcoded to 65532.

</Details>
</TabItem> </Tabs>

Cloudflare will now proxy traffic from enrolled devices, except for the traffic excluded in your [split tunnel settings](/cloudflare-one/connections/connect-networks/private-net/cloudflared/#3-route-private-network-ips-through-warp). For more information on how Gateway forwards traffic, refer to [Gateway proxy](/cloudflare-one/policies/gateway/proxy/).
Original file line number Diff line number Diff line change
@@ -1,14 +1,11 @@
---
{}

---

By default, WARP excludes traffic bound for [RFC 1918 space](https://datatracker.ietf.org/doc/html/rfc1918), which are IP addresses typically used in private networks and not reachable from the Internet. In order for WARP to send traffic to your private network, you must configure [Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) so that the IP/CIDR of your private network routes through WARP.

1. First, check whether your [Split Tunnels mode](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#change-split-tunnels-mode) is set to **Exclude** or **Include** mode.

2. If you are using **Include** mode, add your network's IP/CIDR range to the list. Your list should also include the [domains necessary for Cloudflare Zero Trust functionality](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-domains).

3. If you are using **Exclude** mode:
1. Delete your network's IP/CIDR range from the list. For example, if your network uses the default AWS range of `172.31.0.0/16`, delete `172.16.0.0/12`.
2. Re-add IP/CDIR ranges that are not explicitly used by your private network. For the AWS example above, you would add new entries for `172.16.0.0/13`, `172.24.0.0/14`, `172.28.0.0/15`, and `172.30.0.0/16`. This ensures that only traffic to `172.31.0.0/16` routes through WARP.
Expand Down
Loading