Skip to content

Commit 6eb34fc

Browse files
[CF1] add connectivity status info (cloudflare#23434)
* [CF1] add connectivity status info * update * final updates
1 parent 266d6ce commit 6eb34fc

File tree

17 files changed

+347
-274
lines changed

17 files changed

+347
-274
lines changed

src/content/docs/cloudflare-one/applications/configure-apps/self-hosted-public-app.mdx

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ sidebar:
66
label: Self-hosted public application
77
---
88

9-
import { Render } from "~/components"
9+
import { Render } from "~/components";
1010

1111
You can securely publish internal tools and applications by adding Cloudflare Access as an authentication layer between the end user and your origin server.
1212

@@ -37,4 +37,7 @@ Users can now connect to your self-hosted application after authenticating with
3737

3838
## Product compatibility
3939

40-
<Render file="access/self-hosted-app/product-compatibility" product="cloudflare-one" />
40+
<Render
41+
file="access/self-hosted-app/product-compatibility"
42+
product="cloudflare-one"
43+
/>

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains.mdx

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,3 +48,8 @@ Local Domain Fallback configuration only impacts where DNS requests get resolved
4848
4. Find the domain in the list and select **Delete**.
4949

5050
The domain will no longer be excluded from Gateway DNS policies, effective immediately.
51+
52+
## Related resources
53+
54+
- [Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) - Control which traffic goes through WARP by including or excluding specific IPs or domains.
55+
- [WARP with firewall](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/) - Learn which IPs, domains, and ports to allow so users can deploy and connect WARP successfully behind a firewall.

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels.mdx

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -100,3 +100,8 @@ Removing default Split Tunnel entries may cause users to lose Internet connectiv
100100
<Render file="warp/client-notification-lag" product="cloudflare-one" />
101101

102102
If you need to revert to the default Split Tunnel entries recommended by Cloudflare, select **Restore default entries**.
103+
104+
## Related resources
105+
106+
- [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) - Resolve selected domains via local DNS instead of Cloudflare Gateway.
107+
- [WARP with firewall](/cloudflare-one/connections/connect-devices/warp/deployment/firewall/) - Learn which IPs, domains, and ports to allow so users can deploy and connect WARP successfully behind a firewall.

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/index.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,3 +61,7 @@ This mode is best suited for organizations that only want to enforce [WARP clien
6161
| DNS filtering | Network filtering | HTTP filtering | Features enabled |
6262
| ------------- | ----------------- | -------------- | --------------------------------------------------------------------------- |
6363
| No | No | No | Device posture rules in [Access policies](/cloudflare-one/policies/access/) |
64+
65+
## Related resources
66+
67+
- [Connectivity status](/cloudflare-one/connections/connect-devices/warp/troubleshooting/connectivity-status/) - Learn about the status messages displayed by the WARP client during its connection process, and understand each stage as WARP establishes a secure tunnel to Cloudflare.

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,3 +58,7 @@ If the user has an active browser session with the IdP, WARP will use the existi
5858
- **Only one user per device** — If a device is already registered with User A, User B will not be able to log in on that device through the re-authentication flow. To switch the device registration to a different user, User A must first log out from Zero Trust (if [Allow device to leave organization](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#allow-device-to-leave-organization) is enabled), or an admin can revoke the registration from **My Team** > **Devices**. User B can then properly [enroll](/cloudflare-one/connections/connect-devices/warp/deployment/manual-deployment/).
5959
- **Active connections are not terminated** — Active sessions such as SSH and RDP will remain connected beyond the timeout limit.
6060
- **Binding Cookie is not supported** - WARP authentication will not work for Access applications that have the [Binding Cookie](/cloudflare-one/identity/authorization-cookie/#binding-cookie) enabled.
61+
62+
## Related resources
63+
64+
- [Connectivity status](/cloudflare-one/connections/connect-devices/warp/troubleshooting/connectivity-status/) - Learn about the status messages displayed by the WARP client during its connection process, and understand each stage as WARP establishes a secure tunnel to Cloudflare.

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/captive-portals.mdx

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 3
66
---
77

8-
import { Details, Badge } from "~/components";
8+
import { Details, Badge, Render } from "~/components";
99

1010
Captive portals are used by public Wi-Fi networks (such as airports, coffee shops, and hotels) to make a user agree to their Terms of Service or provide payment before allowing access to the Internet. When a user connects to the Wi-Fi, the captive portal blocks all HTTPS traffic until the user completes a captive portal login flow in their browser. This prevents the WARP client from connecting to Cloudflare. At the same time, WARP creates [firewall rules](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture/#ip-traffic) on the device to send all traffic to Cloudflare. The user is therefore unable to access the captive portal login screen unless they temporarily disable WARP.
1111

@@ -38,7 +38,7 @@ If WARP cannot establish a connection to Cloudflare, it will:
3838
## Limitations
3939

4040
- Due to [how captive portal detection works](#how-captive-portal-detection-works), it may be possible for an employee to spoof a captive portal in order to turn off WARP.
41-
- Some captive portals, particularly those on airlines, may be slow to respond and exceed the captive portal detection timeout. Users will likely see a [CF_CAPTIVE_PORTAL_TIMED_OUT](/cloudflare-one/connections/connect-devices/warp/troubleshooting/client-errors/#cf_captive_portal_timed_out) error when they try to connect.
41+
- Some captive portals, particularly those on airlines, may be slow to respond and exceed the captive portal detection timeout. Users will likely see a [CF_CAPTIVE_PORTAL_TIMED_OUT](/cloudflare-one/connections/connect-devices/warp/troubleshooting/client-errors/#cf_captive_portal_timed_out) error when they try to connect. For context on the steps leading up to these errors, refer to [Connectivity status](/cloudflare-one/connections/connect-devices/warp/troubleshooting/connectivity-status/).
4242
- WARP may not be able to detect multi-stage captive portals, which redirect the user to different networks during the login process. Users will need to manually turn off WARP to get through the captive portal.
4343
- Some public Wi-Fi networks are incompatible with running WARP:
4444

@@ -51,12 +51,12 @@ If WARP cannot establish a connection to Cloudflare, it will:
5151

5252
| [WARP modes](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/) | [Zero Trust plans](https://www.cloudflare.com/teams-pricing/) |
5353
| ----------------------------------------------------------------------------------------- | ------------------------------------------------------------- |
54-
| All modes | All plans |
54+
| All modes | All plans |
5555

5656
| System | Availability | Minimum WARP version |
5757
| -------- | ------------ | -------------------- |
58-
| Windows || 2025.4.589.1 |
59-
| macOS || 2025.4.589.1 |
58+
| Windows || 2025.4.589.1 |
59+
| macOS || 2025.4.589.1 |
6060
| Linux || |
6161
| iOS || |
6262
| Android || |
@@ -73,4 +73,8 @@ To get captive portal logs:
7373
3. Select **Collect Captive Portal Diag**.
7474
4. The WARP client will ask if the device is connected (or attempting to connect) to the Wi-Fi network that is causing issues. Select **Yes** to confirm.
7575

76-
Once the diagnostic finishes running, WARP will place a `warp-captive-portal-diag-<date>-<time>.zip` file on the user's desktop. The end user can now share this file with their IT administrator.
76+
Once the diagnostic finishes running, WARP will place a `warp-captive-portal-diag-<date>-<time>.zip` file on the user's desktop. The end user can now share this file with their IT administrator.
77+
78+
## Related resources
79+
80+
- [Connectivity status](/cloudflare-one/connections/connect-devices/warp/troubleshooting/connectivity-status/) - Learn about the status messages displayed by the WARP client during its connection process, and understand each stage as WARP establishes a secure tunnel to Cloudflare.

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/firewall.mdx

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -153,3 +153,8 @@ To use the network connectivity tests built into the WARP GUI, you will need to
153153

154154
- Windows: `C:\Program Files\Cloudflare\Cloudflare WARP\Cloudflare WARP.exe`
155155
- macOS: `/Applications/Cloudflare WARP.app`
156+
157+
## Related resources
158+
159+
- [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) - Resolve selected domains via local DNS instead of Cloudflare Gateway.
160+
- [Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) - Control which traffic goes through WARP by including or excluding specific IPs or domains.

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/manual-deployment.mdx

Lines changed: 22 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ If you plan to direct your users to manually download and configure the WARP cli
1212
## Prerequisites
1313

1414
- [Set device enrollment permissions](/cloudflare-one/connections/connect-devices/warp/deployment/device-enrollment/) to specify which users can connect.
15+
- <Render file="warp/connectivity-status-check" />
1516

1617
## Windows, macOS, and Linux
1718

@@ -89,9 +90,9 @@ The device is now protected by your organization's Zero Trust policies.
8990
| Windows || |
9091
| macOS || |
9192
| Linux || |
92-
| iOS || 1.10 |
93-
| Android || 2.4 |
94-
| ChromeOS || 2.4 |
93+
| iOS || 1.10 |
94+
| Android || 2.4 |
95+
| ChromeOS || 2.4 |
9596

9697
</Details>
9798

@@ -104,45 +105,45 @@ The WARP client supports URLs accessed through a direct link or with a URL handl
104105
To generate a URL for device enrollment:
105106

106107
1. Copy the following link, replacing `<your-team-name>` with your Zero Trust <GlossaryTooltip term="team name">team name</GlossaryTooltip>:
107-
```txt
108-
cf1app://oneapp.cloudflare.com/team?name=<your-team-name>
109-
```
108+
`txt
109+
cf1app://oneapp.cloudflare.com/team?name=<your-team-name>
110+
`
110111
2. (Optional) Use any QR code generator to embed the link in a QR code.
111112
3. Distribute the link or QR code to users.
112113

113114
#### Use the login URL
114115

115116
To enroll a device using a login URL:
116117

117-
1. [Download](/cloudflare-one/connections/connect-devices/warp/download-warp/) and install the Cloudflare One Agent app.
118-
2. Go to the [login URL](#generate-a-login-url) provided by your account administrator. To use a QR code, open the QR scanner app on your device and scan the QR code.
118+
1. [Download](/cloudflare-one/connections/connect-devices/warp/download-warp/) and install the Cloudflare One Agent app.
119+
2. Go to the [login URL](#generate-a-login-url) provided by your account administrator. To use a QR code, open the QR scanner app on your device and scan the QR code.
119120

120-
The Cloudflare One Agent app will open and start the onboarding flow.
121+
The Cloudflare One Agent app will open and start the onboarding flow.
121122

122-
:::note
123-
If the device is already enrolled in the account associated with this URL, Cloudflare One agent will bypass onboarding and show the **Connected** switch.
124-
:::
123+
:::note
124+
If the device is already enrolled in the account associated with this URL, Cloudflare One agent will bypass onboarding and show the **Connected** switch.
125+
:::
125126

126-
3. To complete the onboarding flow:
127+
3. To complete the onboarding flow:
127128

128-
a. Review the privacy policy and select **Accept**.
129+
a. Review the privacy policy and select **Accept**.
129130

130131
b. On the **Enter team name** screen, confirm that the pre-populated <GlossaryTooltip term="team name">team name</GlossaryTooltip> matches your organization.
131132

132-
:::note[`Already Authenticated` error]
133-
If Cloudflare One Agent is logged in using another team name, you must first log out of that account. Go to **Settings** > **Account** to log out, and then retry the QR code or login link.
134-
:::
133+
:::note[`Already Authenticated` error]
134+
If Cloudflare One Agent is logged in using another team name, you must first log out of that account. Go to **Settings** > **Account** to log out, and then retry the QR code or login link.
135+
:::
135136

136137
c. Complete the authentication steps required by your organization.
137138

138-
d. After authenticating, select **Install VPN Profile**.
139+
d. After authenticating, select **Install VPN Profile**.
139140

140-
e. In the **Connection request** popup window, select **OK**.
141+
e. In the **Connection request** popup window, select **OK**.
141142

142-
4. If you did not enable [auto-connect](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#auto-connect), manually turn on the switch to **Connected**.
143+
4. If you did not enable [auto-connect](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#auto-connect), manually turn on the switch to **Connected**.
143144

144145
The device is now protected by your organization's Zero Trust policies.
145146

146147
## Virtual machines
147148

148-
By default, virtual machines (VMs) are subject to the WARP client settings of the host. If you want to deploy a separate instance of WARP in a VM, you must configure the VM to operate in bridged networking mode.
149+
By default, virtual machines (VMs) are subject to the WARP client settings of the host. If you want to deploy a separate instance of WARP in a VM, you must configure the VM to operate in bridged networking mode.

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/index.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,8 @@ This page provides generic instructions for an automated deployment. If you want
1919

2020
## Prerequisites
2121

22-
Visit the [Download page](/cloudflare-one/connections/connect-devices/warp/download-warp/#windows) to review system requirements and download the installer for your operating system.
22+
- Refer to the [Download page](/cloudflare-one/connections/connect-devices/warp/download-warp/#windows) to review system requirements and download the installer for your operating system.
23+
- <Render file="warp/connectivity-status-check" />
2324

2425
## Windows
2526

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/fleet.mdx

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,8 @@ sidebar:
55
order: 1
66
---
77

8+
import { Render } from "~/components";
9+
810
This guide covers how to deploy the Cloudflare WARP client using [Fleet](https://fleetdm.com/) device management software.
911

1012
## macOS
@@ -21,8 +23,8 @@ This guide covers how to deploy the Cloudflare WARP client using [Fleet](https:/
2123
3. Select **OS settings** > **Custom settings**.
2224
4. Select **Add profile** and upload the custom `.mobileconfig`.
2325
5. Select the hosts which require Cloudflare WARP:
24-
- **All hosts**: Deploys WARP to all hosts in the team.
25-
- **Custom**: Deploys WARP to a subset of the hosts in the team. Use [labels](https://fleetdm.com/guides/managing-labels-in-fleet#basic-article) to define the hosts that should be included or excluded.
26+
- **All hosts**: Deploys WARP to all hosts in the team.
27+
- **Custom**: Deploys WARP to a subset of the hosts in the team. Use [labels](https://fleetdm.com/guides/managing-labels-in-fleet#basic-article) to define the hosts that should be included or excluded.
2628
6. Select **Add profile**.
2729

2830
The defined hosts will immediately receive the deployment profile, but WARP is not yet installed.
@@ -48,7 +50,7 @@ To deploy the uploaded `.pkg` file to your hosts:
4850
3. Go to **Software** and search for `Cloudflare`.
4951
4. Select **Actions** > **Install**.
5052

51-
Installation will happen automatically when the host comes online. To deploy with REST API or GitOps, refer to the [Fleet documentation](https://fleetdm.com/guides/deploy-software-packages).
53+
Installation will happen automatically when the host comes online. To deploy with REST API or GitOps, refer to the [Fleet documentation](https://fleetdm.com/guides/deploy-software-packages). <Render file="warp/connectivity-status-check" />
5254

5355
### 6. Uninstall WARP with Fleet
5456

@@ -106,7 +108,7 @@ To deploy the uploaded `.pkg` file to your hosts:
106108
3. Go to **Software** and search for `Cloudflare`.
107109
4. Select **Actions** > **Install**.
108110
109-
Installation will happen automatically when the host comes online. To deploy with REST API or GitOps, refer to the [Fleet documentation](https://fleetdm.com/guides/deploy-software-packages).
111+
Installation will happen automatically when the host comes online. To deploy with REST API or GitOps, refer to the [Fleet documentation](https://fleetdm.com/guides/deploy-software-packages). <Render file="warp/connectivity-status-check" />
110112
111113
### 4. Uninstall WARP with Fleet
112114

0 commit comments

Comments
 (0)