diff --git a/src/content/docs/learning-paths/replace-vpn/configure-device-agent/enable-proxy.mdx b/src/content/docs/learning-paths/replace-vpn/configure-device-agent/enable-proxy.mdx index 5b6d7428b3c4e7..e05ea6b67429a4 100644 --- a/src/content/docs/learning-paths/replace-vpn/configure-device-agent/enable-proxy.mdx +++ b/src/content/docs/learning-paths/replace-vpn/configure-device-agent/enable-proxy.mdx @@ -12,6 +12,4 @@ import { Render } from "~/components" ## Enable the proxy - - -Cloudflare will now proxy traffic from enrolled devices, except for the traffic excluded in your [split tunnel settings](/cloudflare-one/connections/connect-networks/private-net/cloudflared/#3-route-private-network-ips-through-warp). For more information on how Gateway forwards traffic, refer to [Gateway proxy](/cloudflare-one/policies/gateway/proxy/). + \ No newline at end of file diff --git a/src/content/partials/cloudflare-one/tunnel/enable-gateway-proxy.mdx b/src/content/partials/cloudflare-one/tunnel/enable-gateway-proxy.mdx index 39904f2f677d63..efe434500f7926 100644 --- a/src/content/partials/cloudflare-one/tunnel/enable-gateway-proxy.mdx +++ b/src/content/partials/cloudflare-one/tunnel/enable-gateway-proxy.mdx @@ -15,7 +15,18 @@ import { Tabs, TabItem } from "~/components"; -Proxy settings are not currently supported by the Terraform v5 provider (as of version 5.3.0). To turn on the Gateway proxy, use the dashboard or API. +1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token): + - `Zero Trust Write` + +2. Turn on the TCP and/or UDP proxy using the [`cloudflare_zero_trust_device_settings`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_device_settings) resource: + + ```tf + resource "cloudflare_zero_trust_device_settings "global_warp_settings" { + account_id = var.cloudflare_account_id + gateway_proxy_enabled = true + gateway_udp_proxy_enabled = true + } + ``` diff --git a/src/content/partials/learning-paths/zero-trust/device-profiles.mdx b/src/content/partials/learning-paths/zero-trust/device-profiles.mdx index 4260e1c5a4aaca..0501eebf1f226b 100644 --- a/src/content/partials/learning-paths/zero-trust/device-profiles.mdx +++ b/src/content/partials/learning-paths/zero-trust/device-profiles.mdx @@ -36,7 +36,7 @@ To customize the default settings: 4. Save the profile. -5. Under [**Global settings**](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#global-settings), +5. Configure [global settings](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#global-settings) for all device profiles: 1. (Recommended) Enable **Admin override code** if you turned on **Lock WARP switch**. 2. Enable **Install CA to system certificate store** if you want users to see a [custom block page](/cloudflare-one/policies/gateway/block-page/). @@ -105,7 +105,16 @@ https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/devices/settings \ } ``` -3. [Global settings](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#global-settings) are not currently supported by the Terraform v5 provider (as of version 5.3.0). To turn on **Admin override code** and **Install CA to system certificate store**, use the dashboard or API. +3. Configure [global settings](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#global-settings) using the [`cloudflare_zero_trust_device_settings`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_device_settings) resource: + + ```tf + resource "cloudflare_zero_trust_device_settings" "global_warp_settings" { + account_id = var.cloudflare_account_id + disable_for_time = 3600 + root_certificate_installation_enabled = true + use_zt_virtual_ip = false + } + ```