Skip to content
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion src/content/docs/warp-client/warp-modes.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ Because this feature restricts WARP to just applications configured to use the l

This will enable the **WARP via Local Proxy** option in the **WARP Settings** menu.

If you enable [FIPS compliance](/cloudflare-one/policies/gateway/http-policies/tls-decryption/#fips-compliance) for TLS decryption, you must [disable QUIC](/cloudflare-one/policies/gateway/http-policies/http3/#prevent-inspection-bypass) in your users' browsers. Otherwise, HTTP/3 traffic will bypass inspection by the WARP client.
If you enable [FIPS compliance](/cloudflare-one/policies/gateway/http-policies/tls-decryption/#fips-compliance) for TLS decryption, you must [disable QUIC](/cloudflare-one/policies/gateway/http-policies/http3/#enable-http3-inspection) in your users' browsers. Otherwise, HTTP/3 traffic will bypass inspection by the WARP client.
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This page: https://developers.cloudflare.com/warp-client/warp-modes/
has a broken internal link to: https://developers.cloudflare.com/cloudflare-one/policies/gateway/http-policies/http3/.
The fragment prevent-inspection-bypass does not exist.

By looking at the page: https://developers.cloudflare.com/cloudflare-one/policies/gateway/http-policies/http3/
The best fragment to use seems to be: #enable-http3-inspection


## WARP+ Unlimited

Expand Down