Let’s work on the Cloudflare warp firewall as a part of establishing the WARP connection. Bobcares, as a part of our Server Management Services offers solutions to all your Cloudflare queries.
Cloudflare WARP with firewall
If any organization uses a firewall or other policies to restrict and intercept Internet traffic, may need to exempt the following IP addresses and domains to allow WARP clients to connect.
Client orchestration API
Now the WARP client talks with an edge through a standard HTTPS connection outside the tunnel for operations like registration or settings changes. Further, to perform these operations. You must allow
zero-trust-client.cloudflareclient.com
Copy Code
as this will lookup the below IP addresses:
DoH IP
All DNS requests through WARP are sent outside the tunnel through DoH (DNS over HTTPS). The below IP addresses must be reachable for DNS to work correctly.
- IPv4 DoH Address:
162.159.36.1
Copy Code
- IPv6 DoH Address:
2606:4700:4700::1111
Copy Code
WARP ingress IP
The given IP addresses WARP client will connect to all traffic from the device to Cloudflare edge through these IP addresses.
- IPv4 Range:
162.159.193.0/24
Copy Code
- IPv6 Range:
2606:4700:100::/48
Copy Code
WARP UDP ports
WARP utilizes UDP for all communications. The UDP port required for WARP is
UDP 2408
Copy Code
by default. The WARP can fallback to UDP 500
Copy Code
, UDP 1701
Copy Code
, or UDP 4500
Copy Code
.
Creating firewall rules
If the organization does not allow inbound/outbound communication over the IP addresses and ports from given above. Then you must manually add an exception. The rule at a minimum needs to be scoped to the below process based on the platform:
- Windows:
C:\Program Files\Cloudflare\Cloudflare WARP\warp-svc.exe
Copy Code
- macOS:
/Applications/Cloudflare WARP.app/Contents/Resources/CloudflareWARP
Copy Code
Captive portal
The following domains used as part of the captive portal check:
cloudflareportal.com
Copy Code
cloudflareok.com
Copy Code
cloudflarecp.com
Copy Code
Connectivity check
As part of establishing the WARP connection. The client will check the URLs to validate a successful connection:
This applies to routes excluded from WARP in Split Tunnel configuration.engage.cloudflareclient.com.
Copy Code
This applies to routes included in WARP in Split Tunnel configuration.connectivity.cloudflareclient.com.
Copy Code
[Looking for a solution to another query? We are just a click away.]
Conclusion
The WARP’s network is highly secured. So this isn’t much of a dealbreaker. Cloudflare’s website network is secure as a security company with roots in DDOS protection services and improving online privacy.
PREVENT YOUR SERVER FROM CRASHING!
Never again lose customers to poor server speed! Let us help you.
Our server experts will monitor & maintain your server 24/7 so that it remains lightning fast and secure.
0 Comments