Skip to content

Commit e27477f

Browse files
ranbelsdnts
authored andcommitted
updates for GA features (cloudflare#23362)
1 parent 90f032a commit e27477f

File tree

3 files changed

+5
-7
lines changed

3 files changed

+5
-7
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture.mdx

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,11 +19,9 @@ The WARP client allows organizations to have granular control over the applicati
1919
| Connection | Protocol | Purpose |
2020
| ---------------------------------------------------------------------------------------------------------------------------------------------- | -------- | --------------------------------------------------------------------------------------------------------------- |
2121
| WARP tunnel ([via WireGuard or MASQUE](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#device-tunnel-protocol)) | UDP | Send IP packets to Gateway for network policy enforcement, HTTP policy enforcement, and private network access. |
22-
| [DoH](https://www.cloudflare.com/learning/dns/dns-over-tls/) | HTTPS | Send DNS requests to Gateway for DNS policy enforcement. The DoH connection is maintained inside of the WARP tunnel.[^1] |
22+
| [DoH](https://www.cloudflare.com/learning/dns/dns-over-tls/) | HTTPS | Send DNS requests to Gateway for DNS policy enforcement. The DoH connection is maintained inside of the WARP tunnel. |
2323
| Device orchestration | HTTPS | Perform user registration, check device posture, apply WARP profile settings. |
2424

25-
[^1]: DoH is currently outside of the tunnel on iOS and Android/ChromeOS.
26-
2725
```mermaid
2826
flowchart LR
2927
subgraph Device

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -377,7 +377,7 @@ When `Enabled`, the operating system will register WARP's [local interface IP](#
377377

378378
If you use on-premise DNS infrastructure (such as Active Directory), we recommend turning this setting on for remote [device profiles](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/) and turning it off for [managed network](/cloudflare-one/connections/connect-devices/warp/configure-warp/managed-networks/) device profiles. In this configuration, remote devices will register their WARP interface IP, while on-premise devices will only register their local DHCP address. This allows the on-premise DNS server to resolve device hostnames no matter where the device is located.
379379

380-
### SCCM VPN boundary support <Badge text="Beta" variant="caution"/>
380+
### SCCM VPN boundary support
381381

382382
<Details header="Feature availability">
383383

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/parameters.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ Identifies a Zero Trust organization in the WARP GUI when WARP is deployed with
9797

9898
**Value:** Organization nickname shown to users in the WARP GUI (for example, `Test environment`).
9999

100-
### `enable_post_quantum` <InlineBadge preset="beta" />
100+
### `enable_post_quantum`
101101

102102
<Details header="Feature availability">
103103

@@ -108,8 +108,8 @@ Identifies a Zero Trust organization in the WARP GUI when WARP is deployed with
108108
| System | Availability | Minimum WARP version |
109109
| -------- | ------------ | -------------------- |
110110
| Windows || 2025.5.735.1 |
111-
| macOS || 2025.5.735.1 |
112-
| Linux || 2025.5.735.1 |
111+
| macOS || 2025.5.735.1 |
112+
| Linux || 2025.5.735.1 |
113113
| iOS || 1.10 |
114114
| Android || 2.4 |
115115
| ChromeOS || 2.4 |

0 commit comments

Comments
 (0)