-
Notifications
You must be signed in to change notification settings - Fork 10.1k
[CF1] add WARP technical details #23590
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from 6 commits
Commits
Show all changes
8 commits
Select commit
Hold shift + click to select a range
89a11c4
[CF1] add WARP technical details
deadlypants1973 868b341
update
deadlypants1973 f5ecf82
update
deadlypants1973 83c7933
final
deadlypants1973 79fd957
final
deadlypants1973 0234a73
swg link
deadlypants1973 3ec2fc6
final updates
deadlypants1973 99255b0
final updates
deadlypants1973 File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -8,17 +8,44 @@ head: | |
| content: About Cloudflare WARP | ||
| --- | ||
|
|
||
| ## About Cloudflare WARP | ||
|
|
||
| The Cloudflare WARP client allows you to protect corporate devices by securely and privately sending traffic from those devices to Cloudflare's global network, where [Cloudflare Gateway](/cloudflare-one/policies/gateway/) can apply advanced web filtering. The WARP client also makes it possible to apply advanced [Zero Trust policies](/cloudflare-one/identity/devices/) that check for a device's health before it connects to corporate applications. | ||
|
|
||
| WARP is a lightweight device client, which builds proxy tunnels using either Wireguard or MASQUE, and builds a DNS proxy using DNS-over-HTTPS. WARP supports all major operating systems, all common forms of endpoint management tooling, and has a robust series of management parameters and profiles to accurately scope the needs of a diverse user base. | ||
| ## How WARP works | ||
|
|
||
| WARP is a device client, which builds proxy tunnels using either Wireguard or MASQUE, and builds a DNS proxy using DNS-over-HTTPS. WARP supports all major operating systems, all common forms of endpoint management tooling, and has a robust series of management parameters and profiles to accurately scope the needs of a diverse user base. | ||
|
|
||
| The WARP client comprises of: | ||
|
|
||
| - Graphical User Interface (GUI): User-friendly control panel to view WARP's [status](/cloudflare-one/connections/connect-devices/warp/troubleshooting/connectivity-status/). | ||
| - WARP daemon (or service): Core background component responsible for establishing secure tunnels (using WireGuard or MASQUE) and handling all WARP functionality on your device. | ||
|
|
||
| Refer to [WARP architecture](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture/) for more information on how WARP client interacts with a device's operating system to route traffic. | ||
|
|
||
| ## Key benefits of using WARP | ||
|
|
||
| Deploying the WARP client significantly enhances your organization's security and visibility within Cloudflare Zero Trust: | ||
deadlypants1973 marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
|
||
| - **Unified security policies everywhere**: With the WARP client deployed in the Gateway with WARP mode, [Gateway policies](/cloudflare-one/policies/gateway/) are not location-dependent — they can be enforced anywhere. | ||
|
|
||
| - **Advanced web filtering and threat protection**: Activate Gateway features for your device traffic, including: | ||
|
|
||
| - [Anti-Virus scanning](/cloudflare-one/policies/gateway/http-policies/antivirus-scanning/) | ||
| - [HTTP filtering](/cloudflare-one/policies/gateway/http-policies/) | ||
| - [Browser Isolation](/cloudflare-one/policies/gateway/http-policies/#isolate) | ||
| - [Identity-based policies](/cloudflare-one/policies/gateway/network-policies/) | ||
|
|
||
| - **Application-specific insights**: With WARP installed on your corporate devices, you can populate the [Zero Trust Shadow IT Discovery](/cloudflare-one/insights/analytics/shadow-it-discovery/) page with visibility down to the application and user level. This makes it easy to discover, analyze, and take action on any shadow IT your users may be using every day. | ||
|
|
||
| - **Device posture checks**: The WARP client provides advanced Zero Trust protection by making it possible to check for [device posture](/cloudflare-one/identity/devices/). By setting up device posture checks, you can build Zero Trust policies that check for a device's location, disk encryption status, OS version, and more. | ||
|
|
||
| WARP has flexible [operating modes](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/) and can control device traffic as a proxy, control device DNS traffic as a DNS proxy, or both. It is the most common method to send traffic from user devices to be filtered and decrypted by Cloudflare Gateway. | ||
| ## WARP modes | ||
|
|
||
| Downloading and deploying the WARP client to your devices enhances the protection Cloudflare Zero Trust can provide to your users and data, wherever they are. | ||
| WARP offers flexible [operating modes](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/) to suit your specific needs. WARP can control device traffic as a full proxy, manage only DNS traffic as a DNS proxy, or both. WARP is the most common method for sending user device traffic through Cloudflare Gateway for filtering and decryption. | ||
|
|
||
| The WARP client provides in-depth protection for your organization in a few ways: | ||
| ## Next steps | ||
|
|
||
| - **WARP lets you enforce security policies anywhere**. With the WARP client deployed in the Gateway with WARP mode, Gateway policies are not location-dependent — they can be enforced anywhere. | ||
| - **WARP lets you enforce HTTP filtering and user-based policies**. Download and install the WARP client to enable Gateway features such as [Anti-Virus scanning](/cloudflare-one/policies/gateway/http-policies/antivirus-scanning/), [HTTP filtering](/cloudflare-one/policies/gateway/http-policies/), [Browser Isolation](/cloudflare-one/policies/gateway/http-policies/#isolate), and [identity-based policies](/cloudflare-one/policies/gateway/network-policies/). | ||
| - **WARP lets you have in-depth, application-specific insights**. With WARP installed on your corporate devices, you can populate the [Zero Trust Shadow IT Discovery](/cloudflare-one/insights/analytics/shadow-it-discovery/) page with visibility down to the application and user level. This makes it easy to discover, analyze, and take action on any shadow IT your users may be using every day. | ||
| - **WARP allows you to build rich device posture rules.** The WARP client provides advanced Zero Trust protection by making it possible to check for [device posture](/cloudflare-one/identity/devices/). By setting up device posture checks, you can build Zero Trust policies that check for a device's location, disk encryption status, OS version, and more. | ||
| - Review the [first-time setup](/cloudflare-one/connections/connect-devices/warp/set-up-warp/) guide to [install](/cloudflare-one/connections/connect-devices/warp/download-warp/) and [deploy](/cloudflare-one/connections/connect-devices/warp/deployment/) the WARP client on your corporate devices. | ||
| - Review possible [WARP modes](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/) and [settings](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/) to best suit your organization's needs. | ||
| - Explore [Cloudflare Gateway policies](/cloudflare-one/policies/gateway/) to leverage advanced web filtering, anti-virus scanning, and HTTP policies with WARP. | ||
|
||
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.