WARP
Use WARP as an on-ramp to Cloudflare WAN (formerly Magic WAN) and route traffic from user devices with the Cloudflare One Client installed to any network connected with Cloudflare Tunnel or IP-layer tunnels (anycast GRE, IPsec, or CNI). Take advantage of the integration between Cloudflare WAN and Cloudflare Network Firewall and enforce policies at Cloudflare's global network.
Before you can begin using the Cloudflare One Client as an on-ramp to Cloudflare WAN, you must set up your Zero Trust account.
When connecting a device to Cloudflare WAN, you will have virtual IP addresses from the Cloudflare One Client, in the 100.96.0.0/12 range.
Route packets back to Cloudflare One Client devices from services behind an anycast GRE or other type tunnel. Complete this configuration before installing WARP. Otherwise, your infrastructure will not route packets correctly to Cloudflare global network and connectivity will fail.
Cloudflare will assign IP addresses from the virtual IP (VIP) space to your devices. To view your virtual IP address, go to Cloudflare One ↗, and select My Team > Devices.
All packets with a destination IP in the VIP space need to be routed back through the tunnel. For example, with a single GRE tunnel named gre1, in Linux, the following command would add a routing rule that would route such packets:
ip route add 100.96.0.0/12 dev gre1Configure Split Tunnels from your Zero Trust account to only include traffic from the private IP addresses you want to access.
Optionally, you can configure Split Tunnels to include IP ranges or domains you want to use for connecting to public IP addresses.
Refer to Deploy the Cloudflare One Client to your organization for more information on whether to choose a manual or managed deployment.
You can now access private IP addresses specified in the Split Tunnel configuration.
You must log out and log back in with at least one device to ensure the configuration updates on your device.
When a Cloudflare One Client user connects from a location (such as an office) with an IPsec/GRE tunnel already set up, Cloudflare One Client traffic is doubly encapsulated - first by the Cloudflare One Client and then by Cloudflare WAN. This is unnecessary, since each on-ramp method provides full Zero Trust protection.
Since Cloudflare One Client traffic is already protected on its own, set up Cloudflare WAN to exclude Cloudflare One Client traffic, sending it to the Internet through regular connections.
To learn which IP addresses and UDP ports you should exclude to accomplish this, refer to WARP ingress IP.
the Cloudflare One Client and Cloudflare One Appliance
If you have Cloudflare One Appliance (formerly Magic WAN Connector) and Cloudflare One Clients deployed in your premises, Cloudflare One Appliance automatically routes Cloudflare One Client traffic to the Internet rather than Cloudflare WAN IPsec tunnels. This prevents traffic from being encapsulated twice.
You may need to configure your firewall to allow this new traffic. Make sure to allow the following IPs and ports:
- Destination IPs:
162.159.193.0/24,162.159.197.0/24 - Destination ports:
443,500,1701,2408,4443,4500,8095,8443
Refer to Cloudflare One Client with firewall for more information on this topic.
Before testing, configure domain fallback for the server or service in the Cloudflare One Client settings. This is needed because by default Cloudflare Zero Trust excludes common top level domains used for local resolution from being sent to Gateway for processing.
If WARP integration has been enabled for the account within the last day, log off and on again in the Cloudflare One Client before testing.
To check if the Cloudflare One Client is working correctly as an on-ramp, you can do a resolution test on a fully qualified domain name (FQDN) ↗ for a server or service in the Cloudflare WAN. Test this from a user with a device.
For example:
nslookup <SERVER_BEHIND_CLOUDFLARE_WAN>This DNS lookup should return a valid IP address associated with the server or service you are testing for.
Next, test with a browser that you can connect to a service on the WAN by opening a webpage that is only accessible on the WAN. Use the same server from the DNS lookup or another server in the WAN. Connecting using an IP address instead of a domain name should work.