Skip to content
Cloudflare Docs

Connectivity options

Cloudflare One provides multiple connectivity options for your users, devices, and network infrastructure. Each option serves different use cases, from protecting individual devices to connecting entire data centers.

This page helps you understand which connectivity options to use based on your requirements, and how to combine multiple options in a single deployment.

On-ramps and off-ramps

Before exploring individual connectivity options, understand the concept of on-ramps and off-ramps:

  • On-ramps send traffic into Cloudflare's network. For example, a user's device with the WARP client installed on-ramps their traffic to Cloudflare for inspection and policy enforcement.
  • Off-ramps send traffic from Cloudflare's network to your infrastructure. For example, Cloudflare Tunnel off-ramps traffic to your private applications without exposing them to the public Internet.

Some connectivity options support both directions (bidirectional), while others only support one direction.

Connectivity options comparison

The following table provides a high-level comparison of all connectivity options available to Cloudflare One customers.

Connectivity optionProtocolDirectionTypical deployment modelUse when
Cloudflare TunnelHTTP/2, QUICOff-ramp onlySoftware daemon (cloudflared) on serverExposing private applications without a public IP
WARP clientMASQUE (default), WireGuardOn-ramp onlyClient software on end-user devicesSecuring remote workforce devices
WARP ConnectorMASQUE, WireGuardBidirectionalSoftware client on Linux hostConnecting sites with IoT or VoIP devices
DNS locationsDNS (DoH, DoT, IPv4/IPv6)On-ramp onlyDNS resolver configurationFiltering DNS traffic without device agents
Proxy endpointsHTTP/HTTPSOn-ramp onlyBrowser PAC file configurationFiltering web traffic without device agents
Clientless Web IsolationHTTP/HTTPSOn-ramp onlyPrefixed URL with Access authenticationSecure web access for unmanaged devices
GRE tunnelsGREBidirectionalNetwork tunnel from router or firewallConnecting sites with existing network hardware
IPsec tunnelsIPsecBidirectionalNetwork tunnel from router or firewallEncrypted site connectivity over the Internet
Magic WAN ConnectorIPsecBidirectionalHardware or virtual applianceZero-touch branch office deployments
Cloudflare Network InterconnectDirect, Partner, CloudBidirectionalPhysical or virtual cross-connectBypassing the public Internet entirely
Magic Cloud NetworkingIPsec (automated)BidirectionalCloud provider VPN integrationConnecting cloud VPCs with automated tunnel setup

Cloudflare Tunnel

Cloudflare Tunnel provides a secure way to connect your resources to Cloudflare without a publicly routable IP address. The cloudflared daemon creates outbound-only connections to Cloudflare's global network over port 7844 (TCP/UDP) using HTTP/2 or QUIC. This allows you to expose web servers, SSH servers, remote desktops, and other services without opening inbound ports on your firewall.

Use Cloudflare Tunnel when you need to expose private web applications, protect origin servers by hiding their IP addresses, or deploy cloud-native ingress for Kubernetes services.

For detailed configuration, refer to the Cloudflare Tunnel documentation.


WARP client

The Cloudflare WARP client is a device agent that securely connects end-user devices to Cloudflare's global network. WARP encrypts traffic from the device using MASQUE (with post-quantum cryptography) or WireGuard and routes it through Cloudflare, where Gateway policies filter and inspect the traffic.

Use WARP client to secure remote workforce devices, replace traditional VPN solutions, enforce DNS filtering and web security policies, implement device posture checks, and enable WARP-to-WARP connectivity between enrolled devices.

For detailed configuration, refer to the WARP client documentation.


WARP Connector (beta)

WARP Connector is a software client that enables mesh networking for services, containers, and virtual machines (VMs). It acts as a Layer 3 router for a subnet, on-ramping and off-ramping traffic through Cloudflare while preserving source IP addresses end-to-end.

Use WARP Connector to connect sites with IoT devices or IP phones that cannot run WARP, enable VoIP and SIP protocols requiring server-initiated connections, or deploy site-to-site connectivity without dedicated network hardware.

For VPN replacement and Zero Trust Network Access (ZTNA) use cases, Cloudflare Tunnel via cloudflared is the primary recommended on-ramp. Cloudflare Tunnel requires minimal network infrastructure changes and integrates directly with Cloudflare Access for identity-aware application protection.

Deploy WARP Connector supplementally when you need bidirectional connectivity for specific use cases like Active Directory Group Policy updates, SCCM, SIP traffic, VoIP traffic, or DevOps pipelines.

For detailed configuration, refer to the WARP Connector documentation.


DNS locations

DNS locations allow you to filter DNS traffic from networks without deploying the WARP client. By configuring your network's DNS resolver to point to Cloudflare Gateway, Gateway applies DNS policies to all queries from that location.

DNS locations support multiple endpoint types:

  • IPv4/IPv6: Standard DNS resolution using Cloudflare's resolver IPs
  • DNS over HTTPS (DoH): Encrypted DNS queries over HTTPS
  • DNS over TLS (DoT): Encrypted DNS queries over TLS

Use DNS locations when you need to filter DNS traffic for an entire office or network, per device without installing agents on devices, or integrate with existing network infrastructure.

For detailed configuration, refer to the DNS locations documentation.


Proxy endpoints

Proxy endpoints allow you to apply Gateway HTTP policies without installing a client on devices. By configuring a Proxy Auto-Configuration (PAC) file at the browser level, you route web traffic through Gateway for filtering and policy enforcement.

Cloudflare supports two types of proxy endpoints:

  • Authorization endpoints: Use Cloudflare Access for identity-based authentication
  • Source IP endpoints: Authorize traffic based on originating IP address (Enterprise only)

Use proxy endpoints when you need to filter web traffic without device agents, integrate with existing proxy infrastructure, or deploy Gateway alongside other security tools.

For detailed configuration, refer to the Proxy endpoints documentation.


Clientless Web Isolation

Clientless Web Isolation allows users to securely access web applications through a remote browser without installing the WARP client. Users navigate to a prefixed URL (https://<team-name>.cloudflareaccess.com/browser/<URL>), authenticate through Cloudflare Access, and Cloudflare renders the web content in an isolated browser, streaming only safe draw commands to the user's device while enforcing isolation policies.

Use Clientless Web Isolation when you need to provide secure web access for unmanaged devices (contractors, BYOD), enable access to sensitive applications without requiring endpoint software, or on-ramp users who cannot install the WARP client.

For detailed configuration, refer to the Clientless Web Isolation documentation.


GRE tunnels

Generic Routing Encapsulation (GRE) tunnels provide lightweight, stateless network connectivity between your infrastructure and Cloudflare. GRE tunnels are used with Magic WAN and Magic Transit to connect sites, data centers, and cloud environments using existing routers and firewalls.

Use GRE tunnels when you need to connect branch offices or data centers with minimal configuration overhead, integrate with Magic Transit for DDoS protection, or deploy redundant tunnels alongside IPsec.

For detailed configuration, refer to the GRE and IPsec tunnels documentation.


IPsec tunnels

IPsec tunnels provide encrypted, stateful network connectivity between your infrastructure and Cloudflare. IPsec tunnels are used with Magic WAN and Magic Transit for secure site-to-site connectivity, using IKEv2 for tunnel negotiation and AES-GCM or AES-CBC for encryption.

Use IPsec tunnels when you need to encrypt traffic over the public Internet, meet compliance requirements for encrypted connections, or replace expensive MPLS links.

For cloud environments (AWS, Azure, GCP), use Magic Cloud Networking to automate IPsec tunnel creation instead of configuring tunnels manually.

For detailed configuration, refer to the GRE and IPsec tunnels documentation.


Magic WAN Connector

Magic WAN Connector is a plug-and-play SD-WAN appliance that automates connectivity to Cloudflare's network. It establishes IPsec tunnels automatically and provides traffic steering and shaping. You can deploy it as a hardware appliance (Dell VEP1460) or virtual appliance (VMware ESXi, Proxmox).

Use Magic WAN Connector for zero-touch branch office deployments, to replace edge routers, achieve high throughput (1 Gbps or higher), or manage multiple sites through a centralized dashboard.

For detailed configuration, refer to the Magic WAN Connector documentation.


Cloudflare Network Interconnect (CNI)

Cloudflare Network Interconnect (CNI) allows you to connect your network infrastructure directly to Cloudflare through private, dedicated connections that bypass the public Internet. CNI provides predictable latency, consistent throughput, and reduced exposure to attacks.

Use CNI when you need to meet security requirements that prohibit public Internet traffic, reduce cloud egress costs, or deploy in highly regulated industries (financial services, healthcare).

Connection types

TypeDescriptionIdeal for
Direct InterconnectPhysical fiber cross-connect in a shared data centerCustomers colocated with Cloudflare who require maximum control and performance
Partner InterconnectVirtual connection through connectivity partners (Megaport, Equinix Fabric, PacketFabric)Customers not colocated with Cloudflare or who prefer managed connectivity
Cloud InterconnectPrivate connection from cloud providers (AWS, GCP, Azure)Customers with workloads in public clouds requiring private connectivity

For detailed configuration, refer to the Cloudflare Network Interconnect documentation.


Magic Cloud Networking

Magic Cloud Networking is an automation layer that simplifies connecting cloud environments to Magic WAN. Rather than manually configuring IPsec tunnels, Magic Cloud Networking automatically discovers your cloud resources and creates the necessary VPN tunnels and routes on both sides (cloud provider and Magic WAN).

Magic Cloud Networking is not a separate tunnel type — it orchestrates your cloud provider's native VPN functionality (AWS VPN Gateway, Azure VPN, GCP Cloud VPN) to establish IPsec connectivity to Magic WAN.

Use cases

  • Connect AWS, Azure, or GCP VPCs to Magic WAN with minimal configuration
  • Automate tunnel and route creation instead of manual IPsec setup
  • Connect multiple VPCs through a hub architecture (AWS Transit Gateway)
  • Simplify multi-cloud networking across different providers

On-ramp types

TypeDescriptionUse when
Single VPCConnects one VPC directly to Magic WAN via VPN tunnelYou have a single VPC to connect
HubConnects multiple VPCs through a cloud hub (for example, AWS Transit Gateway)You need to connect multiple VPCs with inter-VPC communication

Supported cloud providers

  • AWS (single VPC and hubs)
  • Azure (single VPC)
  • GCP (single VPC)

Deployment notes

  • Azure VNet sizing: Magic Cloud Networking creates a GatewaySubnet (/27) within your VNet for the Azure VPN Gateway. Ensure your VNet has sufficient address space. A /20 or larger VNet is recommended to avoid address exhaustion.
  • Cloud provider costs: Magic Cloud Networking uses your cloud provider's native VPN services. Standard VPN gateway and data transfer costs from your cloud provider apply in addition to Magic WAN costs.
  • Tunnel creation time: Cloud provider VPN gateways can take 15-45 minutes to provision. Plan for this delay when onboarding new VPCs.

For detailed configuration, refer to the Magic Cloud Networking documentation.


Choose the right connectivity option

Use the following guidance to select the appropriate connectivity option for your use case. These are not exhaustive recommendations.

RequirementRecommended option
Expose a private web application without a public IPCloudflare Tunnel
Secure end-user devicesWARP client
Replace traditional VPN for remote accessCloudflare Tunnel (primary) + WARP Connector (for bidirectional needs)
Connect a site with IoT devices or VoIP systemsWARP Connector
Connect a branch office using existing routersGRE or IPsec tunnels
Encrypt traffic over the public InternetIPsec tunnels
Zero-touch branch office deploymentMagic WAN Connector
Connect cloud VPCs (AWS, Azure, GCP) with minimal configurationMagic Cloud Networking
Bypass the public Internet entirelyCloudflare Network Interconnect
High-throughput enterprise connectivityMagic WAN Connector or CNI

Recommendations by team

The team driving your connectivity project influences which option provides the smoothest adoption path. In this table you can find a few examples of what that might look like:

Primary teamRecommended starting pointRationale
Security / InfoSecCloudflare Tunnel + WARP clientMinimal network infrastructure changes required. Security controls are managed within the Cloudflare One dashboard.
Network OperationsMagic WAN (IPsec/GRE) or Magic WAN ConnectorFamiliar routing and tunnel configuration. Integrates with existing network equipment and workflows.
DevOps / Platform EngineeringWARP Connector or Cloudflare TunnelSoftware-defined deployment. Scriptable via API. No hardware dependencies.
Facilities / Branch ITMagic WAN ConnectorZero-touch deployment with centralized management. No on-site networking expertise required.

WARP Connector and Magic WAN Connector comparison

WARP Connector and Magic WAN Connector both provide site-level connectivity, but serve different deployment scenarios.

AspectWARP ConnectorMagic WAN Connector
ProtocolMASQUE / WireGuardIPsec
Deployment modelSoftware on Linux host (can run alongside other workloads)Dedicated hardware appliance or virtual machine
Best forCloud VPCs, development environments, sites without dedicated network hardware, smaller deploymentsEnterprise branch offices, data centers, sites requiring high throughput (1 Gbps+)
Platform supportLinux only (x86_64). Currently in beta.Hardware appliance (Dell VEP1460) or virtual (VMware ESXi, Proxmox)
High availabilityNot currently supportedSupported through multiple connectors per site
ManagementConfigured as a device in the WARP client settingsCentralized through the Magic WAN dashboard with zero-touch provisioning

Use WARP Connector when you need lightweight, software-only connectivity for cloud workloads or sites without dedicated network hardware. Use Magic WAN Connector when you need enterprise-grade throughput, high availability, or integration with existing network infrastructure.


Combine multiple connectivity options

Most enterprise deployments use multiple connectivity options together. This section covers compatibility considerations and common deployment patterns.

Compatibility matrix

Not all connectivity options work together in the same account. Review the following compatibility information before designing your deployment.

CombinationCompatibleNotes
WARP Connector + Magic WANConditionalRequires Cloudflare One Unified Routing. Accounts on Legacy routing mode cannot use both.
WARP client + Magic WANYesWARP users can access Magic WAN-connected sites.
Cloudflare Tunnel + Magic WANYesAvoid overlapping IP routes. Cloudflare Tunnel takes priority if the same CIDR is configured for both.
GRE + IPsecYesUse for redundancy or migration scenarios.
CNI + GRE or IPsecYesUse Internet tunnels as backup for CNI.
WARP client + Cloudflare Tunnel + WARP ConnectorYesCommon pattern for remote access to private applications. All three work together.
CNI + Cloudflare TunnelConditionalcloudflared connects to multiple Cloudflare regions for redundancy. If CNI only advertises one region, the tunnel operates with reduced redundancy. Evaluate whether Cloudflare Tunnel is necessary if CNI already provides private connectivity.

Routing considerations

When using multiple connectivity options, follow these guidelines to avoid routing conflicts:

  • Avoid overlapping CIDR ranges: Do not configure the same IP range for multiple tunnel types. If an overlap exists, Cloudflare Tunnel takes priority over Magic WAN routes.
  • No automatic failover: Cloudflare does not automatically fail over traffic between different connectivity options. Plan your routing to handle failures within each tunnel type.
  • Virtual Networks: Use Virtual Networks to handle overlapping private IP ranges from different environments (for example, multiple cloud VPCs using 10.0.0.0/8).

MTU planning

When layering tunnels or using multiple encapsulation methods, account for overhead to prevent fragmentation:

ScenarioEffective MTUMSS clamping
GRE tunnel1,476 bytes1,436 bytes or lower
IPsec tunnel1,400-1,436 bytes (varies by encryption)1,360-1,396 bytes
WARP behind Magic WAN (double encapsulation)~1,300 bytesConfigure based on testing
WARP Connector to WARP client~1,280 bytesConfigure based on testing. Traffic is encapsulated twice: by WARP Connector and again by Cloudflare before delivery to the WARP client.

Configure MSS clamping on your edge devices to ensure TCP traffic does not require fragmentation.

Source IP preservation

Different connectivity options handle source IP addresses differently:

Connectivity optionSource IP behavior
Cloudflare TunnelOrigin sees the cloudflared process IP. Use CF-Connecting-IP header for HTTP traffic.
WARP ConnectorPreserves original source IP end-to-end.
GRE and IPsec tunnelsPreserves original source IP within the tunnel.
Magic WAN ConnectorPreserves original source IP within the tunnel.

Source IP preservation is required for:

  • VoIP and SIP protocols that embed IP addresses in signaling
  • Audit logging that requires client IP visibility
  • Applications that make authorization decisions based on source IP

Traffic direction capabilities

Connectivity optionClient-initiated trafficServer-initiated traffic
Cloudflare TunnelYesNo
WARP clientYesNo (device cannot receive unsolicited inbound)
WARP ConnectorYesYes
GRE and IPsec tunnelsYesYes
Magic WAN ConnectorYesYes
CNIYesYes

If your application requires server-initiated connections (for example, VoIP callbacks, database replication), use WARP Connector, Magic WAN, or CNI instead of Cloudflare Tunnel.


Common deployment patterns

The following patterns illustrate how organizations combine connectivity options for different scenarios.

Enterprise with remote workers and branch offices

This pattern serves organizations with a distributed workforce and multiple physical locations.

Components:

  • WARP client for remote employees, providing secure access from any location
  • IPsec tunnels (via Magic WAN) for branch offices with existing network infrastructure
  • Cloudflare Tunnel for specific internal applications that need clientless browser access

Traffic flow:

  1. Remote employees connect through WARP, which on-ramps their traffic to Cloudflare.
  2. Gateway policies inspect and filter traffic based on user identity and device posture.
  3. Traffic destined for branch office resources routes through IPsec tunnels to Magic WAN-connected sites.
  4. Traffic destined for specific applications routes through Cloudflare Tunnel to origin servers.

Cloud-first organization

This pattern serves organizations with primarily cloud-based infrastructure and minimal on-premises equipment.

Components:

  • Magic Cloud Networking for cloud VPCs (AWS, GCP, Azure), automating IPsec tunnel creation to Magic WAN
  • Cloudflare Tunnel for Kubernetes services and containerized applications
  • WARP client for employee devices

Traffic flow:

  1. Magic Cloud Networking automatically creates IPsec tunnels between cloud VPCs and Magic WAN.
  2. Cloudflare Tunnel provides ingress for external-facing applications.
  3. Employees access cloud resources through the WARP client.

Alternative: For organizations not using Magic WAN, WARP Connector can provide bidirectional connectivity for cloud VPCs. Note that accounts on Legacy routing mode cannot use WARP Connector and Magic WAN together.

Highly regulated enterprise

This pattern serves organizations with strict compliance requirements that prohibit traffic from traversing the public Internet.

Components:

  • Cloudflare Network Interconnect (CNI) for primary connectivity from data centers
  • IPsec tunnels as backup connectivity in case of CNI issues
  • WARP client for remote employees

Traffic flow:

  1. Data center traffic routes through CNI, never touching the public Internet.
  2. IPsec tunnels provide backup connectivity if CNI experiences issues.
  3. Remote employees connect through WARP over the public Internet (encrypted).
  4. Gateway policies enforce compliance rules on all traffic regardless of connectivity method.