Skip to content

Commit 64feebf

Browse files
deadlypants1973samin-cf
authored andcommitted
[CF1] WARP managed networks requirements update (cloudflare#22680)
* [CF1] WARP managed networks requirements update * final updates * note from eng * Update src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/managed-networks.mdx Co-authored-by: Shrey Amin <[email protected]> * Update src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/managed-networks.mdx * shrey notes on exclusion * final * final final --------- Co-authored-by: Shrey Amin <[email protected]>
1 parent 28ae8c0 commit 64feebf

File tree

1 file changed

+50
-26
lines changed

1 file changed

+50
-26
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/managed-networks.mdx

Lines changed: 50 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ import { Details, TabItem, Tabs } from "~/components";
1111

1212
| [WARP modes](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/) | [Zero Trust plans](https://www.cloudflare.com/teams-pricing/) |
1313
| ----------------------------------------------------------------------------------------- | ------------------------------------------------------------- |
14-
| All modes | All plans |
14+
| All modes | All plans |
1515

1616
| System | Availability | Minimum WARP version |
1717
| -------- | ------------ | -------------------- |
@@ -24,11 +24,30 @@ import { Details, TabItem, Tabs } from "~/components";
2424

2525
</Details>
2626

27-
Cloudflare WARP allows you to selectively apply WARP client settings if the device is connected to a secure network location such as an office.
27+
Cloudflare WARP allows you to selectively apply specific [device profiles](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/) and WARP client settings when a device connects to a secure network location, such as an office. WARP identifies these managed networks by detecting a TLS endpoint you set up on the network.
28+
29+
On this page, you will learn how to:
30+
31+
- Create a TLS endpoint on your trusted network.
32+
- Configure the TLS endpoint in Zero Trust to set up a managed network.
33+
- Apply the appropriate device profile to a device when the WARP client detects it is on your managed network.
34+
35+
## Requirements
36+
37+
- The WARP client scans all managed networks every time it detects a network change event from the operating system. To minimize performance impact, reuse the same TLS endpoint across multiple locations unless you require distinct settings profiles for each location.
38+
- Ensure that the device can only reach one managed network at any given time. If multiple managed networks are configured and reachable, there is no way to determine which settings profile the device will receive.
39+
40+
## WARP client managed network detection
41+
42+
When you configure a managed network, the WARP client uses the TLS endpoint to determine whether the device is on that network.
43+
44+
The time it takes to apply the correct device profile depends on how quickly the TLS endpoint responds.
45+
46+
If the TLS endpoint times out after 5 seconds, the WARP client will determine that the device is not on a managed network and will apply the default device profile. The WARP client only retries detection if a non-timeout error occurs. A timeout triggers fallback to the default device profile without further retries.
2847

2948
## 1. Choose a TLS endpoint
3049

31-
A TLS endpoint is a host on your network that serves a TLS certificate. The TLS endpoint acts like a network location beacon — when a device connects to a network, WARP detects the TLS endpoint and validates its certificate against an uploaded SHA-256 fingerprint.
50+
A TLS endpoint is a host on your network that serves a TLS certificate. The TLS endpoint acts like a network location beacon — when a device connects to a network, the WARP client on the device detects the TLS endpoint and validates the TLS certificate against the SHA-256 fingerprint (if specified) or against the local certificate store to check that it is signed by a public certificate authority.
3251

3352
The TLS certificate can be hosted by any device on your network. However, the endpoint must be inaccessible to users outside of the network location. WARP will automatically exclude the managed network endpoint from all device profiles to ensure that users cannot connect to this endpoint over Cloudflare Tunnel. We recommend choosing a host that is physically in the office which remote users do not need to access, such as a printer.
3453

@@ -190,34 +209,39 @@ SHA256 Fingerprint=DD4F4806C57A5BBAF1AA5B080F0541DA75DB468D0A1FE731310149500CCD8
190209
3. Name your network location.
191210
4. In **Host and Port**, enter the private IP address and port number of your [TLS endpoint](#create-a-new-tls-endpoint) (for example, `192.168.185.198:3333`).
192211

193-
:::note
194-
We recommend using the private IP of your managed network endpoint and not a hostname to prevent issues related to DNS lookups resolving the incorrect IP.
195-
:::
212+
:::note
213+
We recommend using the private IP of your managed network endpoint and not a hostname to prevent issues related to DNS lookups resolving the incorrect IP.
214+
:::
215+
196216
5. (Optional) In **TLS Cert SHA-256**, enter the [SHA-256 fingerprint](#2-extract-the-sha-256-fingerprint) of the TLS certificate. This field is only needed for self-signed certificates. If a TLS fingerprint is not supplied, WARP validates the certificate against the local certificate store and checks that it is signed by a public certificate authority.
197217

198218
</TabItem>
199219
<TabItem label="Terraform (v5)">
200220

201-
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token):
202-
- `Zero Trust Write`
203-
204-
2. Add a managed network using the [`cloudflare_zero_trust_device_managed_network`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_device_managed_network) resource:
205-
206-
```tf
207-
resource "cloudflare_zero_trust_device_managed_networks" "office" {
208-
account_id = var.cloudflare_account_id
209-
name = "Office managed network"
210-
type = "tls"
211-
config = {
212-
tls_sockaddr = "192.168.185.198:3333"
213-
sha256 = "DD4F4806C57A5BBAF1AA5B080F0541DA75DB468D0A1FE731310149500CCD8662"
214-
}
215-
}
216-
```
221+
1. Add the following permission to your [`cloudflare_api_token`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/api_token):
222+
223+
- `Zero Trust Write`
224+
225+
2. Add a managed network using the [`cloudflare_zero_trust_device_managed_network`](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/zero_trust_device_managed_network) resource:
226+
227+
```tf
228+
resource "cloudflare_zero_trust_device_managed_networks" "office" {
229+
account_id = var.cloudflare_account_id
230+
name = "Office managed network"
231+
type = "tls"
232+
config = {
233+
tls_sockaddr = "192.168.185.198:3333"
234+
sha256 = "DD4F4806C57A5BBAF1AA5B080F0541DA75DB468D0A1FE731310149500CCD8662"
235+
}
236+
}
237+
```
238+
217239
</TabItem>
218240
</Tabs>
219241

220-
WARP will automatically exclude the TLS endpoint from all device profiles. This prevents remote users from accessing the endpoint through the WARP tunnel on any port. If a device profile uses [Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) in **Include** mode, make sure that the Split Tunnel entries do not contain the TLS endpoint IP address; otherwise, the entire IP range will be excluded from the WARP tunnel.
242+
WARP will automatically exclude the TLS endpoint from all device profiles if it is specified as a private IP address. This exclusion prevents remote users from accessing the endpoint through the WARP tunnel on any port. If the TLS endpoint is specified as a hostname instead of a private IP, WARP will not automatically exclude it.
243+
244+
If a device profile uses [Split Tunnels](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) in **Include** mode, ensure that the Split Tunnel entries do not contain the TLS endpoint IP address; otherwise, the entire IP range will be excluded from the WARP tunnel.
221245

222246
## 4. Configure device profile
223247

@@ -268,7 +292,7 @@ To check if the WARP client detects the network location:
268292
2. Disconnect and reconnect to the network.
269293
3. Open a terminal and run `warp-cli debug alternate-network`.
270294

271-
## Best practices
295+
## Related resources
272296

273-
- The WARP client scans all managed networks every time it detects a network change event from the operating system. To minimize performance impact, we recommend reusing the same TLS endpoint across multiple locations unless you require distinct settings profiles for each location.
274-
- Ensure that the device can only reach one managed network at any given time. If multiple managed networks are configured and reachable, there is no way to determine which settings profile the device will receive.
297+
- [Device profiles](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/) - How to create and manage the device profiles you apply via managed networks.
298+
- [WARP settings](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/) - Defines how WARP behaves and what users can do.

0 commit comments

Comments
 (0)