Connect from WARP to a private network on Cloudflare using Cloudflare Tunnel
You can create and configure Cloudflare Tunnel connections to or . You can also use Cloudflare Tunnel to connect any service that relies on a TCP-based protocol to Cloudflare’s network. Users in your organization can then reach the service by enrolling into your organization’s Zero Trust account and using the WARP agent.
Once enrolled, user endpoints will be able to connect to private IP space and other ranges that you control. Applications running on those endpoints will be able to reach those private IPs as well in a private network model. Coming soon, administrators will be able to build Zero Trust rules to determine who within your organization can reach those IPs.
This tutorial covers how to:
- Start a secure, outbound-only, connection from a machine to Cloudflare
- Assign the machine an IP that can consist of an RFC 1918 IP address or range
- Connect to that private IP space from an enrolled WARP agent without client-side configuration changes
- Connect using any TCP-based protocol
Time to complete: 45 minutes
Run the following command in your Terminal to authenticate this instance of
cloudflaredinto your Cloudflare account.$ cloudflared login
The command will launch a browser window and prompt you to login with your Cloudflare account. Choose a website that you have added into your account. This will authenticate your instance of
cloudflaredto your Cloudflare account — you will be able to create a Tunnel for any site, not just the site selected.
Once you select one of the sites in your account, Cloudflare will download a certificate file called
cert.pemto authenticate this instance of
cert.pemfile uses a certificate to authenticate your instance of
cloudflaredand includes an API key for your account to perform actions like DNS record changes.
You can now use
cloudflared to control Cloudflare Tunnel connections in your Cloudflare account.
Create a Tunnel
Begin by creating a Tunnel with an associated name. This example uses the name
grafana.$ cloudflared tunnel create grafana
You can confirm the ID of the Tunnel by running the following command.$ cloudflared tunnel list
Create a route. Routes map a Tunnel ID to a CIDR range that you specify. You can use private IP space specified by or other routes. The private IP space specified should match the private IP space of your subnet or environment where Cloudflare Tunnel will send connections.
This example tells Cloudflare Tunnel that, for users in this organization, connections to
100.64.0.0/10should be served by this Tunnel. For the purposes of this tutorial, Grafana is running in a DigitalOcean environment where a virtual interface has been applied that will send traffic bound for localhost to
100.64.0.1.$ cloudflared tunnel route ip add 100.64.0.0/10 8e343b13-a087-48ea-825f-9783931ff2a5
Similar to the
listcommand, you can confirm the routes enrolled with the following command.$ cloudflared tunnel route ip show
Configure and run the Tunnel
Create a configuration file for the tunnel in the
.cloudflareddefault directory. The following template contains the required fields but can be further modified as needed.tunnel: 8e343b13-a087-48ea-825f-9783931ff2a5credentials-file: /root/.cloudflared/8e343b13-a087-48ea-825f-9783931ff2a5.jsonwarp-routing:enabled: true
You can now run the Tunnel. The command below will connect this instance of
cloudflaredto Cloudflare’s network. Traffic inside of your organization, from enrolled WARP agents, will be sent to this instance when the destination is this private IP range.$ cloudflared tunnel run grafana
Route private IP ranges through WARP
Users can reach this private service by logging in to their Zero Trust account and the WARP agent.
By default, Cloudflare WARP excludes traffic bound for RFC 1918 space and certain other routes as part of its . To use this feature the IPs that you specified for your Tunnel must be included which will send traffic for those destinations through the WARP agent and to the Tunnel.
In the list of Split Tunnels entries, choose the range being used for this private connection and delete it.
Integrate your identity provider
On the Zero Trust dashboard, select your account and go to Settings > Authentication. Cloudflare Zero Trust will automatically create a “One-time PIN” option which will rely on your user’s emails. You can begin using the one-time PIN option immediately or integrate your corporate .
Determine which devices can enroll
Go to Settings > WARP Client.
Within Device enrollment permissions, select Manage.
Select Add a rule.
Determine who is allowed to enroll by using criteria including Access groups, groups from your identity provider, email domain, or named users. This example allows any user with a
@cloudflare.comaccount to enroll.
Your rule will now be visible under the Device enrollment rules list.
Enable the Cloudflare proxy
Go to Settings > Network.
(Optional) Enable HTTPS inspection
Installing the certificate is not a requirement for private network routing. However, the certificate allows Cloudflare Gateway to inspect and secure HTTPS traffic to your private network. You can distribute this certificate through an MDM provider or install it manually.
Go to Settings > Network and enable TLS decryption.
This will tell Cloudflare to begin decrypting traffic for inspection from enrolled devices, except the traffic excluded from inspection.
Enroll a device
Once the client is installed, select the gear icon.
Under the Account tab, select Login with Cloudflare Zero Trust.
The user will be prompted to login with the identity provider configured in Cloudflare Access. Once authenticated, the client will update to Teams mode. You can select the gear to toggle between DNS filtering or full proxy. In this use case, you must select Gateway with WARP. These settings can be configured globally for an organization through a device management platform.
Connect via WARP
Once enrolled, your users will be able to connect to the private IPs configured for HTTP traffic in this example or arbitrary TCP traffic.