Skip to content

Commit c1b2c28

Browse files
ranbelsdnts
authored andcommitted
[ZT] WARP SCCM (cloudflare#22518)
* sccm * feature description * Update src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx
1 parent ea14154 commit c1b2c28

File tree

1 file changed

+94
-0
lines changed
  • src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings

1 file changed

+94
-0
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx

Lines changed: 94 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -376,3 +376,97 @@ To turn on local network access in the WARP client:
376376
When `Enabled`, the operating system will register WARP's [local interface IP](#override-local-interface-ip) (CGNAT IP or `172.16.0.2`) with your on-premise DNS server when the DNS server is reachable.
377377

378378
If you use on-premise DNS infrastructure (such as Active Directory), we recommend turning this setting on for remote [device profiles](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/) and turning it off for [managed network](/cloudflare-one/connections/connect-devices/warp/configure-warp/managed-networks/) device profiles. In this configuration, remote devices will register their WARP interface IP, while on-premise devices will only register their local DHCP address. This allows the on-premise DNS server to resolve device hostnames no matter where the device is located.
379+
380+
### SCCM VPN boundary support <Badge text="Beta" variant="caution"/>
381+
382+
<Details header="Feature availability">
383+
384+
| [WARP modes](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/) | [Zero Trust plans](https://www.cloudflare.com/teams-pricing/) |
385+
| ----------------------------------------------------------------------------------------- | ------------------------------------------------------------- |
386+
| <ul><li> Gateway with WARP</li><li> Secure Web Gateway without DNS filtering </li></ul> | All plans |
387+
388+
| System | Availability | Minimum WARP version |
389+
| -------- | ------------ | -------------------- |
390+
| Windows || 2025.5.735.1 |
391+
| macOS || |
392+
| Linux || |
393+
| iOS || |
394+
| Android || |
395+
| ChromeOS || |
396+
397+
</Details>
398+
399+
Microsoft's [System Center Configuration Manager](https://learn.microsoft.com/en-us/intune/configmgr/) (SCCM) is used to manage software on Windows devices based on the [boundary group](https://learn.microsoft.com/en-us/intune/configmgr/core/servers/deploy/configure/define-site-boundaries-and-boundary-groups), or network location, to which they belong. You can assign WARP clients to a SCCM boundary group based on their [managed network](/cloudflare-one/connections/connect-devices/warp/configure-warp/managed-networks/) and other device profile attributes. When **SCCM VPN Boundary Support** is turned on, the WARP client will modify the description field on its [virtual network interface](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture/#ip-traffic). This allows you to define a VPN boundary group that matches on the network interface description.
400+
401+
**Value:**
402+
403+
- `Disabled`: (default) WARP network interface description is `Cloudflare WARP Interface Tunnel`.
404+
405+
- `Enabled`: WARP network interface description is `(SCCM) Cloudflare WARP Interface Tunnel` for devices which have the [SCCM client](https://learn.microsoft.com/en-us/intune/configmgr/core/clients/deploy/deploy-clients-to-windows-computers) installed. Devices without the SCCM client will still use the default `Cloudflare WARP Interface Tunnel` description. WARP checks if the SCCM client is installed by looking for the SMS Agent Host (`ccmexec.exe`) Windows service.
406+
407+
After setting the network interface description, WARP will restart the SMS Agent Host (`ccmexec.exe`) so that changes can propagate to the SCCM server in a timely manner.
408+
409+
#### Example SCCM configuration
410+
411+
Assume you want to push software updates from a cloud based [distribution point](https://learn.microsoft.com/en-us/intune/configmgr/core/servers/deploy/configure/boundary-groups-distribution-points) if the device is remote, but use on-prem servers if the device is on the office network. To set up these boundary groups:
412+
413+
1. In Zero Trust:
414+
415+
a. Turn on **SCCM VPN Boundary Support** for remote [device profiles](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/).
416+
417+
b. Turn off **SCCM VPN Boundary Support** for [on-prem device profiles](/cloudflare-one/connections/connect-devices/warp/configure-warp/managed-networks/#4-configure-device-profile).
418+
419+
c. (Optional) Verify device settings:
420+
421+
<Details header="Verify SCCM VPN Boundary Support">
422+
423+
To check if **SCCM VPN Boundary Support** is active on a device, run the following command:
424+
425+
```cmd
426+
warp-cli settings | findstr "SCCM VPN Boundary"
427+
```
428+
429+
```cmd output
430+
(network policy) SCCM VPN Boundary Support: true
431+
```
432+
433+
You can also verify network interface details for the `CloudflareWARP` adapter:
434+
435+
```cmd
436+
ipconfig /all
437+
```
438+
439+
```cmd output {8}
440+
Windows IP Configuration
441+
442+
...
443+
444+
Unknown adapter CloudflareWARP:
445+
446+
Connection-specific DNS Suffix . :
447+
Description . . . . . . . . . . . : (SCCM) Cloudflare WARP Interface Tunnel
448+
Physical Address. . . . . . . . . :
449+
DHCP Enabled. . . . . . . . . . . : No
450+
Autoconfiguration Enabled . . . . : Yes
451+
IPv6 Address. . . . . . . . . . . : 2606:4700:110:8f79:145:f180:fc4:8106(Preferred)
452+
Link-local IPv6 Address . . . . . : fe80::83b:d647:4bed:d388%49(Preferred)
453+
IPv4 Address. . . . . . . . . . . : 172.16.0.2(Preferred)
454+
Subnet Mask . . . . . . . . . . . : 255.255.255.255
455+
Default Gateway . . . . . . . . . :
456+
DNS Servers . . . . . . . . . . . : 127.0.2.2
457+
127.0.2.3
458+
NetBIOS over Tcpip. . . . . . . . : Enabled
459+
```
460+
461+
</Details>
462+
463+
2. In Microsoft SCCM:
464+
465+
a. [Create a boundary](https://learn.microsoft.com/en-us/intune/configmgr/core/servers/deploy/configure/boundaries#create-a-boundary) with the following settings:
466+
- **Description**: `Remote WARP clients`
467+
- **Type**: _VPN_
468+
- **Connection description**: `(SCCM) Cloudflare WARP Interface Tunnel`
469+
470+
b. Assign this boundary to one or more boundary groups.
471+
472+
When the device is remote, the WARP interface description changes to `(SCCM) Cloudflare WARP Interface Tunnel` and the SCCM server will determine that the device belongs to the VPN boundary group. The device can now download updates from the distribution point assigned to this boundary group. When a network change occurs and WARP detects a managed network, it will revert the interface description to `Cloudflare WARP Interface Tunnel` and the boundary condition will no longer be satisfied. The device will match your local IP range and be considered as on-prem.

0 commit comments

Comments
 (0)