I see a website is blocked, and it shouldn't be.
I see an error saying
No Access-Control-Allow-Origin header is present on the requested resource.
Cloudflare Access requires that the credentials:
I see untrusted certificate warnings for every page and I am unable to browse the Internet.
Advanced security features including HTTPS traffic inspection require users to install and trust the Cloudflare root certificate on their machine or device. If you are installing certificates manually on all of your devices, these steps will need to be performed on each new device that is to be subject to HTTP Filtering. To install the Cloudflare root certificate, follow the steps found .
I see a Cloudflare Gateway error page when browsing to a website.
We present an HTTP error page in the following cases:
- An untrusted certificate is presented from the origin to Gateway. Gateway will consider a certificate is untrusted if any of these three conditions are true:
- The server certificate issuer is unknown or is not trusted by the service.
- The server certificate is revoked and fails a CRL check (OSCP checking coming soon)
- There is at least one expired certificate in the certificate chain for the server certificate
- Common certificate errors occur. For example, in the event of a certificate common name mismatch.
- Insecure cipher suite. When the connection from Cloudflare Gateway to an upstream server is insecure (e.g, uses an insecure cipher such as rc4, rc4-md5, 3des, etc). We do support upstream connections that require a connection over TLS that is prior to TLS 1.3. We will support the ability for an administrator to configure whether to trust insecure connections in the very near future.
If you see this page, providing as much information as possible to the local IT administrator will be helpful as we troubleshoot with them, such as:
- Operating System (Windows 10, macOS 10.x, iOS 14.x)
- Web browser (Chrome, Firefox, Safari, Edge)
- URL of the request
- Screenshot or copy/paste of the content from the error page
I see an error in the Gateway Overview page, and no analytics are displayed.
You may not see analytics on the Overview page for the following reasons:
- You are not sending DNS queries to Gateway. Verify that the destination IP addresses you are sending DNS queries to are correct. You can check the destination IP addresses for your location by going to your locations page and then expanding the location.
- You are using other DNS resolvers. If you have other DNS resolvers in your DNS settings, your device could be using IP addresses for resolvers that are not part of Gateway. Please make sure to remove all other IP addresses from your DNS settings and only include Gateway's DNS resolver IP addresses.
- The source IPv4 address for your location is incorrect. If you are using IPv4, check the source IPv4 address that you entered for the location matches with the network's source IPv4 address.
- Analytics is not available yet. It takes some time to generate the analytics for Cloudflare Gateway. If you are not seeing anything even after 5 minutes, please file a support ticket.
I see a "No Browsers Available" alert.
I see a "Maximum Sessions Reached" alert.
This can occur if your device is attempting to establish a connection to more than two remote browser instances. A browser isolation session is a connection from your local browser to a remote browser. Tabs and windows within the same browser share a single remote browser session. In practice, this generally means that you can open both Chrome and Firefox to use browser isolation concurrently, but attempting to open a third browser such as Opera will cause this alert to appear. To release a browser session, please close all tabs/windows in your local browser. The remote browser session will be automatically terminated within 15 minutes.
Error 400 admin_policy_enforced when using GSuite as an identity provider.
This is due to a Google policy change requiring you to set your Google Admin console to trust your applications:
- In the Google Admin console, navigate to Security > API controls.
- Check the Trust internal, domain-owned apps option.
I see an error: x509: certificate signed by unknown authority.
This means the origin is using a certificate that
cloudflared does not trust. For example, you may get this error if you are using SSL inspection in a proxy between your server and Cloudflare. To solve this:
- Add the certificate to the system certificate pool.
- Use the
--origin-ca-poolflag and specify the path to the certificate.
- Use the
--no-tls-verifyflag to stop
cloudflaredchecking the certificate for a trust chain.
I see an error 1033 when attempting to run a tunnel.
An error 1033 indicates your tunnel is not connected to Cloudflare's edge. First, run
cloudflared tunnel list to see whether your tunnel is listed as active. If it isn't, check the following:
- Make sure you correctly routed traffic to your tunnel (step 5 in the ) by assigning a CNAME record to point traffic to your tunnel. Alternatively, check to route traffic to your tunnel using load balancers.
- Make sure you run your tunnel (step 6 in the .
Mobile applications warn of an invalid certificate, even though I installed the Cloudflare certificate on my system.
These mobile applications may use . Cloudflare Gateway dynamically generates a certificate for all encrypted connections in order to inspect the content of HTTP traffic. This certificate will not match the expected certificate by applications that use certificate pinning. To allow these applications to function normally, administrators can configure bypass rules to exempt traffic to hosts associated with the application from being intercepted and inspected.
My tunnel fails to authenticate.
To start using Cloudflare Tunnel, a super administrator in the Cloudflare account must first log in through
cloudflared login. The client will launch a browser window and prompt the user to select a hostname in their Cloudflare account. Once selected, Cloudflare generates a certificate that consists of three components:
- The public key of the origin certificate for that hostname
- The private key of the origin certificate for that domain
- A token that is unique to Cloudflare Tunnel
Those three components are bundled into a single PEM file that is downloaded one time during that login flow. The host certificate is valid for the root domain and any subdomain one-level deep. Cloudflare uses that certificate file to authenticate
cloudflared to create DNS records for your domain in Cloudflare.
The third component, the token, consists of the zone ID (for the selected domain) and an API token scoped to the user who first authenticated with the login command. When user permissions change (if that user is removed from the account or becomes an admin of another account, for example), Cloudflare rolls the user's API key. However, the certificate file downloaded through
cloudflared retains the older API key and can cause authentication failures. The user will need to login once more through
cloudflared to regenerate the certificate. Alternatively, the administrator can create a dedicated service user to authenticate.
Firefox shows network protocol violation when using the WARP client
You may have to disable the DNS over HTTPs setting in Firefox. To do so, navigate to Firefox Preferences, scroll down to Network Settings, and uncheck Enable DNS over HTTPS > OK.
cloudflared access shows an error
websocket: bad handshake
This means that your
cloudflared access client is unable to reach your
cloudflared tunnel origin.
To diagnose this, you should look at the
cloudflared tunnel logs. A very often root cause is that the
cloudflared tunnel is unable to proxy to your origin (e.g. because the ingress is mis-configured, or the origin is down, or because the origin HTTPS certificate cannot be validated by
cloudflared tunnel has no logs, it means Cloudflare Edge is not even able to route the websocket traffic to it.
There are a few different possible root causes behind the
websocket: bad handshake error:
cloudflared tunnelis either not running or not connected to Cloudflare Edge.
- WebSockets are not enabled. To enable them, navigate to
- Your Cloudflare account has Universal SSL enabled and the SSL/TLS encryption mode is set to Off. To resolve, set the SSL/TLS encryption mode to any setting other than Off.
- Your requests are blocked by . To resolve, make sure you set Definitely automated to Allow in the bot fight mode settings.