Skip to content
Merged
Changes from 4 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,8 @@ The WARP client connects to Cloudflare via a standard HTTPS connection outside t

<Render file="warp/client-orchestration-ips" />

Although `zero-trust-client.cloudflareclient.com` may resolve to different IP addresses, WARP overrides the resolved IPs with the IPs listed above.

## DoH IP

:::note
Expand All @@ -26,6 +28,8 @@ In [Gateway with DoH](/cloudflare-one/connections/connect-devices/warp/configure
- IPv4 DoH Addresses: `162.159.36.1` and `162.159.46.1`
- IPv6 DoH Addresses: `2606:4700:4700::1111` and `2606:4700:4700::1001`

Although `<ACCOUNT_ID>.cloudflare-gateway.com` may resolve to different IP addresses, WARP overrides the resolved IPs with the IPs listed above.

### Android devices

If you are deploying the Cloudflare One Agent on Android/ChromeOS, you must also add `cloudflare-dns.com` to your firewall exception list. On Android/ChromeOS devices, WARP uses `cloudflare-dns.com` to resolve domains on your [Split Tunnel list](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#domain-based-split-tunnels).
Expand Down Expand Up @@ -89,6 +93,8 @@ The client connects to the following destinations to verify general Internet con
- `162.159.197.3`
- `2606:4700:102::3`

Although `engage.cloudflareclient.com` may resolve to different IP addresses, WARP overrides the resolved IPs with the IPs listed above.

### Inside tunnel

The WARP client connects to the following IPs to verify connectivity inside of the WARP tunnel:
Expand All @@ -98,7 +104,9 @@ The WARP client connects to the following IPs to verify connectivity inside of t

Because this check happens inside of the tunnel, you do not need to add these IPs to your firewall allowlist. However, since the requests go through Gateway, ensure that they are not blocked by a Gateway HTTP or Network policy.

Thought it may be visible in `warp-diag` and other logs, `connectivity.cloudflareclient.com` is used internally by WARP and should not be used in firewall policies.
Although `connectivity.cloudflareclient.com` may appear in `warp-diag` and other logs, it is used internally by WARP and should not be used in firewall policies.

If your firewall allows traffic only by domain, you may need to explicitly allow `connectivity.cloudflareclient.com`. Even though `connectivity.cloudflareclient.com` may resolve to different IP addresses, WARP overrides the resolved IPs with the IPs listed above. To avoid connectivity issues, ensure that the above IPs are permitted through your firewall.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Would it be better to create a flexible partial for these sections of text?


## NEL reporting (optional)

Expand Down
Loading