|
5 | 5 | order: 5
|
6 | 6 | ---
|
7 | 7 |
|
8 |
| -import { Render, Badge } from "~/components"; |
| 8 | +import { Render, Badge, Tabs, TabItem } from "~/components"; |
9 | 9 |
|
10 | 10 | :::note
|
11 | 11 | Only available on Enterprise plans.
|
@@ -178,15 +178,43 @@ Gateway uses Rust to evaluate regular expressions. The Rust implementation is sl
|
178 | 178 |
|
179 | 179 | ## Limitations
|
180 | 180 |
|
181 |
| -The [Application](#application), [Content Categories](#content-categories), [Domain](#domain), and [Host](#host) selectors are only available for traffic onboarded to Gateway with [WARP](/cloudflare-one/connections/connect-devices/warp/), [PAC files](/cloudflare-one/connections/connect-devices/agentless/pac-files/), or [Browser Isolation](/cloudflare-one/policies/browser-isolation/). To use these selectors to filter traffic onboarded with WARP, you need to: |
| 181 | +### Selector prerequisites |
| 182 | + |
| 183 | +The [Application](#application), [Content Categories](#content-categories), [Domain](#domain), and [Host](#host) selectors are only available for traffic onboarded to Gateway with [WARP](/cloudflare-one/connections/connect-devices/warp/), [PAC files](/cloudflare-one/connections/connect-devices/agentless/pac-files/), or [Browser Isolation](/cloudflare-one/policies/browser-isolation/). To turn on the selectors for your account, use the [Patch Zero Trust account configuration endpoint](/api/resources/zero_trust/subresources/gateway/subresources/configurations/methods/edit/). For example: |
| 184 | + |
| 185 | +```sh title="Turn on selectors for egress policies" |
| 186 | +curl --request PATCH \ |
| 187 | +"https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/configuration" \ |
| 188 | +--header "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \ |
| 189 | +--header "Content-Type: application/json" \ |
| 190 | +--data '{ |
| 191 | + "settings": { |
| 192 | + "host_selector": { |
| 193 | + "enabled": true |
| 194 | + } |
| 195 | + } |
| 196 | +}' |
| 197 | +``` |
| 198 | + |
| 199 | +Additionally, to use these selectors to filter traffic onboarded with WARP, you need to: |
182 | 200 |
|
183 | 201 | 1. Ensure you have deployed [WARP beta version 2025.4.589.1](/cloudflare-one/connections/connect-devices/warp/download-warp/beta-releases/) or later on your users' devices.
|
184 |
| -2. In your WARP [device profile](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/), ensure Split Tunnel is set to [**Exclude IPs and domains**](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#change-split-tunnels-mode). |
185 |
| -3. [Remove the route](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#remove-a-route) to the IP address `100.64.0.0/10` from your Split Tunnel list. |
186 |
| -4. [Add routes](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to exclude the following IP addresses: |
187 |
| - - `100.64.0.0/12` |
188 |
| - - `100.81.0.0/16` |
189 |
| - - `100.82.0.0/15` |
190 |
| - - `100.84.0.0/14` |
191 |
| - - `100.88.0.0/13` |
192 |
| - - `100.96.0.0/11` |
| 202 | +2. In your WARP [device profile](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/), configure your [Split Tunnel](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) depending on the mode: |
| 203 | + |
| 204 | + <Tabs> <TabItem label="Exclude IPs and domains"> |
| 205 | + |
| 206 | + 1. [Remove the route](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#remove-a-route) to the IP address `100.64.0.0/10` from your Split Tunnel exclude list. |
| 207 | + 2. [Add routes](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to exclude the following IP addresses: |
| 208 | + - `100.64.0.0/12` |
| 209 | + - `100.81.0.0/16` |
| 210 | + - `100.82.0.0/15` |
| 211 | + - `100.84.0.0/14` |
| 212 | + - `100.88.0.0/13` |
| 213 | + - `100.96.0.0/11` |
| 214 | + |
| 215 | + </TabItem> <TabItem label="Include IPs and domains"> |
| 216 | + |
| 217 | + 1. Add the required [Zero Trust domains](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-domains) or [IP addresses](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-ip-addresses) to your Split Tunnel include list. |
| 218 | + 2. [Add a route](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to include the IP address `100.80.0.0/16`. |
| 219 | + |
| 220 | + </TabItem> </Tabs> |
0 commit comments