-
Notifications
You must be signed in to change notification settings - Fork 6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
connectivity.cloudflareclient.com IP Addresses #16062
Comments
Resolves to Hopefully these are static. 🙏 |
The client doesn't use DNS resolution for its inside tunnel connectivity checks, and it doesn't use |
@jamie-sandbox and @deadlypants1973 I apologize but my last comment was incorrect. We do utilize DNS resolution for this, and we will attempt to connect to that IP address. (I was thinking about the outside tunnel checks, which are handled differently). This traffic to this endpoint though should always be inside of the tunnel, when we connect to it. If it is not, the client will not be able to connect (unless you disable connectivity checks). The reason we do not list this on our WARP with Firewall page is because it should be in the WARP tunnel, and not visible to any firewall that might sit between the Client and the Internet. If you see connections to connectivity.cloudflareclient.com outside of the tunnel, we'd suggest opening a support case, as this is unexpected. |
@deansundquist Thanks for your response. From my original description:
Unfortunately the question still is not fully answered. Even when the traffic is within the tunnel, we still need to configure the local Windows Firewall to allow The documentation should state what these addresses are. |
@jamie-sandbox thank you for your reply. I have alerted the engineering team about this and they are looking into it. Will update! |
Existing documentation URL(s)
https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#connectivity-check
What changes are you suggesting?
The documentation states the following:
This is not necessarily correct, since on a Windows system with a firewall policy where outbound traffic is blocked by default, a rule must be added to allow
warp-svc.exe
to generate outbound network traffic toconnectivity.cloudflareclient.com
.The hostname
connectivity.cloudflareclient.com
currently resolves to162.159.138.65
and162.159.137.65
. However, these IPs are not referenced or contained elsewhere within the documentation.Please can clarification be provided? Are
162.159.138.65
and162.159.137.65
static addresses which we can create a firewall rule for? Or are they part of a range which we need to include the entirety of? If so, what is the range?Additional information
No response
The text was updated successfully, but these errors were encountered: