Skip to content

Commit 5024e19

Browse files
committed
link to new reserved IPs page
1 parent 325779a commit 5024e19

File tree

4 files changed

+10
-45
lines changed

4 files changed

+10
-45
lines changed

src/content/docs/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/warp-connector/user-to-site.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ WARP clients and WARP Connectors are accessed using their [device IP](/cloudflar
4242

4343
1. In your WARP Connector device profile, go to [Split Tunnels](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/).
4444
2.
45-
<Render file="tunnel/cgnat-split-tunnels" product="cloudflare-one" params={{ feature: "WARP Connector"}} />
45+
<Render file="tunnel/cgnat-split-tunnels" product="cloudflare-one" />
4646

4747
3. Repeat the previous steps for all WARP client device profiles.
4848

src/content/docs/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/warp-to-warp.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ This guide covers how to:
3434
3. Turn on [**Allow all Cloudflare One traffic to reach enrolled devices**](/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-settings/#allow-all-cloudflare-one-traffic-to-reach-enrolled-devices).
3535
4. Go to **Team & Resources** > **Devices** > **Device profiles** > **General profiles** and select the device group that needs WARP-to-WARP connectivity.
3636
5.
37-
<Render file="tunnel/cgnat-split-tunnels" product="cloudflare-one" params={{ feature: "WARP-to-WARP"}} />
37+
<Render file="tunnel/cgnat-split-tunnels" product="cloudflare-one" />
3838

3939
This will instruct WARP to begin proxying any traffic destined for a `100.96.0.0/12` IP address to Cloudflare for routing and policy enforcement.
4040

src/content/partials/cloudflare-one/gateway/egress-selector-split-tunnels.mdx

Lines changed: 4 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -2,25 +2,10 @@
22
{}
33
---
44

5-
import { Tabs, TabItem, Render, GlossaryTooltip } from "~/components"
5+
import { Render, GlossaryTooltip } from "~/components"
66

7-
In your WARP [device profile](/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-profiles/), configure [Split Tunnels](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/) such that the <GlossaryTooltip term="initial resolved IP">initial resolved IPs</GlossaryTooltip> route through the WARP tunnel. Refer to the steps below for your Split Tunnels mode:
7+
In your WARP [device profile](/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-profiles/), configure [Split Tunnels](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/) such that the <GlossaryTooltip term="initial resolved IP">initial resolved IPs</GlossaryTooltip> route through the WARP tunnel. Configuration depends on your [Split Tunnels mode](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#change-split-tunnels-mode):
88

9-
<Tabs> <TabItem label="Exclude IPs and domains">
10-
11-
1. [Remove the route](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#remove-a-route) to the IP address `100.64.0.0/10` from your Split Tunnel exclude list.
12-
13-
2. We recommend [adding back the IPs](/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/cloudflared/connect-cidr/#3-route-private-network-ips-through-warp) that are not being used for Zero Trust services. For example, if you are using <GlossaryTooltip term="initial resolved IP">initial resolved IPs</GlossaryTooltip> alongside [WARP-to-WARP connectivity](/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/warp-to-warp/), add routes to exclude the following IP addresses:
14-
- `100.64.0.0/12`
15-
- `100.81.0.0/16`
16-
- `100.82.0.0/15`
17-
- `100.84.0.0/14`
18-
- `100.88.0.0/13`
19-
- `100.112.0.0/12`
20-
21-
</TabItem> <TabItem label="Include IPs and domains">
22-
23-
1. Add the required [Zero Trust domains](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-domains) or [IP addresses](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-ip-addresses) to your Split Tunnel include list.
24-
2. [Add routes](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to include the following IP addresses:
9+
- **Exclude mode**: Delete `100.64.0.0/10` from your Split Tunnels list. We recommend [adding back the IP ranges](/cloudflare-one/networks/routes/reserved-ips/#warp-split-tunnel-configuration) that are not explicitly used for Cloudflare One services. This reduces the risk of conflicts with existing private network configurations that may use the CGNAT address space.
10+
- **Include mode**: Add Split Tunnel entries for the following IP addresses:
2511
<Render file="gateway/egress-selector-cgnat-ips" product="cloudflare-one" />
26-
</TabItem> </Tabs>
Lines changed: 4 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,8 @@
11
---
2-
params:
3-
- feature
4-
---
5-
6-
import { TabItem, Tabs } from "~/components";
7-
8-
Ensure that traffic to your [device IPs](/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-ips/) goes through the WARP tunnel. For example, if your devices use the default `100.96.0.0/12` range:
92

10-
<Tabs> <TabItem label="Exclude IPs and domains">
11-
If using Split Tunnels in **Exclude** mode:
12-
1. Delete `100.64.0.0/10` from the list.
13-
2. We recommend [adding back the IPs](/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/cloudflared/connect-cidr/#3-route-private-network-ips-through-warp) that are not being used for Cloudflare One services. For example, if you plan to use {props.feature} alongside [Gateway host selectors](/cloudflare-one/traffic-policies/egress-policies/host-selectors/), add routes to exclude the following IP addresses:
14-
15-
- `100.64.0.0/12`
16-
- `100.81.0.0/16`
17-
- `100.82.0.0/15`
18-
- `100.84.0.0/14`
19-
- `100.88.0.0/13`
20-
- `100.112.0.0/12`
21-
22-
</TabItem> <TabItem label="Include IPs and domains">
23-
If using Split Tunnels in **Include** mode:
3+
---
244

25-
1. Add the required [Zero Trust domains](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-domains) or [IP addresses](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-ip-addresses) to your Split Tunnel include list.
26-
2. [Add a route](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to include `100.96.0.0/12`.
5+
In your device profile, configure [Split Tunnels](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/) so that traffic to your [device IPs](/cloudflare-one/team-and-resources/devices/warp/configure-warp/device-ips/) goes through the WARP tunnel. Configuration depends on your [Split Tunnels mode](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/#change-split-tunnels-mode). For example, if your devices use the default `100.96.0.0/12` range:
276

28-
</TabItem> </Tabs>
7+
- **Exclude mode**: Delete `100.64.0.0/10` from your Split Tunnels list. We recommend [adding back the IP ranges](/cloudflare-one/networks/routes/reserved-ips/#warp-split-tunnel-configuration) that are not explicitly used for Cloudflare One services. This reduces the risk of conflicts with existing private network configurations that may use the CGNAT address space.
8+
- **Include mode**: Add `100.96.0.0/12` to your Split Tunnels list.

0 commit comments

Comments
 (0)