Connect client devices
Client devices — laptops, phones, and desktops — join your Mesh network by installing the Cloudflare One Client and enrolling. Each device receives a Mesh IP and can immediately communicate with every other enrolled device and Mesh node.
- Device enrollment permissions are configured for your account. The Mesh setup wizard handles this automatically.
Connect a laptop or phone to your Mesh network:
To enroll your device using the client GUI:
-
Download and install the Cloudflare One Client.
-
Launch the Cloudflare One Client.
-
On the What would you like to use the Cloudflare One Client for? screen, select Zero Trust security.
-
Enter your team name.
-
Complete the authentication steps required by your organization.
Once authenticated, you will see a Success page and a dialog prompting you to open the Cloudflare One Client.
-
Select Open the Cloudflare One Client to complete the registration.
-
Download and install the Cloudflare One Client.
-
Launch the Cloudflare One Client.
-
Select the Cloudflare logo in the menu bar.
-
Select the gear icon.
-
Go to Preferences > Account.
-
Select Login with Cloudflare Zero Trust.
-
Enter your team name.
-
Complete the authentication steps required by your organization.
Once authenticated, you will see a Success page and a dialog prompting you to open the Cloudflare One Client.
-
Select Open Cloudflare WARP.app to complete the registration.
- Download and install the Cloudflare One Agent app.
- Launch the Cloudflare One Agent app.
- Select Next.
- Review the privacy policy and select Accept.
- Enter your team name.
- Complete the authentication steps required by your organization.
- After authenticating, select Install VPN Profile.
- In the Connection request popup window, select OK.
- If you did not enable auto-connect ↗, manually turn on the switch to Connected.
After enrollment, the device receives a Mesh IP and connects to your Mesh network.
Test that the device can reach a Mesh node or another client device:
ping <MESH-IP>Replace <MESH-IP> with the Mesh IP of a node (visible on the Mesh overview page ↗) or another enrolled device. Any TCP, UDP, or ICMP traffic works — you can SSH, connect to databases, call APIs, or run any protocol over Mesh IPs.
Once connected, a client device can:
- Other client devices — Reach any enrolled device by its Mesh IP. No Mesh nodes involved.
- Mesh nodes — Reach any online node by its Mesh IP. SSH, database connections, API calls all work.
- Subnets behind nodes — Access hosts on private networks that a node advertises via CIDR routes (for example, printers, databases, or servers that cannot run the client).
All traffic is subject to your Gateway network policies, so you can control which users and devices can reach specific resources.
For client devices to reach Mesh IPs, the Mesh IP range must route through Cloudflare. How you configure this depends on your Split Tunnel mode.
In Exclude mode, the CGNAT range (100.64.0.0/10) is excluded from Cloudflare by default. Remove the CGNAT range from your exclude list so that Mesh IP traffic routes through Cloudflare.
If you used the Mesh setup wizard, the wizard creates a device profile in Include mode for Mesh nodes. However, your client devices may still use the default profile with Exclude mode. Verify that 100.96.0.0/12 (or your custom device IP range) is not in the exclude list.
Depending on your Cloudflare networking configuration, you may need to remove additional IPs from your exclude list. For a list of IPs to check, refer to Reserved IP addresses.
In Include mode, add the following to your include list:
100.96.0.0/12— Mesh IPs (device IPs)100.80.0.0/16and2606:4700:0cf1:4000::/64— Hostname routing (if used)- Any CIDR routes you have configured for your Mesh nodes
Some operating systems block inbound traffic from the Mesh IP range by default:
- Windows — Windows Firewall blocks inbound traffic from
100.96.0.0/12. Add a firewall rule that allows incoming requests from100.96.0.0/12for your desired protocols and ports. - macOS / Linux — Most configurations allow this traffic by default. If you have custom firewall rules, ensure
100.96.0.0/12is permitted.