Skip to content

Commit 5e302d0

Browse files
authored
[Gateway] Include and enablement for egress policy selectors (#22186)
1 parent dad3a28 commit 5e302d0

File tree

3 files changed

+42
-14
lines changed

3 files changed

+42
-14
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels.mdx

+2-2
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Split Tunnels can be configured to exclude or include IP addresses or domains fr
1313
Split Tunnels only impacts the flow of IP traffic. DNS requests are still resolved by Gateway and subject to DNS policies unless you add the domains to your [Local Domain Fallback](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/) configuration.
1414
:::
1515

16-
Because Split Tunnels controls what Gateway has visibility on at the network level, we recommend testing all changes before rolling out updates to end users. It may take up to 24 hours for changes to propagate to clients, depending on how many devices are connected to your organization.
16+
Because Split Tunnels controls what Gateway has visibility on at the network level, we recommend testing all changes before rolling out updates to end users. It may take up to 10 minutes for changes to propagate to clients, depending on how many devices are connected to your organization.
1717

1818
## Change Split Tunnels mode
1919

@@ -94,7 +94,7 @@ Removing default Split Tunnel entries may cause users to lose Internet connectiv
9494

9595
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **WARP Client**.
9696
2. Under **Device settings**, locate the [device profile](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/) you would like to modify and select **Configure**.
97-
3. Under **Split Tunnels**. select **Manage**.
97+
3. Under **Split Tunnels**, select **Manage**.
9898
4. Find the IP address or hostname in the list and select **Delete**.
9999

100100
If you need to revert to the default Split Tunnel entries recommended by Cloudflare, select **Restore default entries**.

src/content/docs/cloudflare-one/policies/gateway/egress-policies/index.mdx

+39-11
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 5
66
---
77

8-
import { Render, Badge } from "~/components";
8+
import { Render, Badge, Tabs, TabItem } from "~/components";
99

1010
:::note
1111
Only available on Enterprise plans.
@@ -178,15 +178,43 @@ Gateway uses Rust to evaluate regular expressions. The Rust implementation is sl
178178

179179
## Limitations
180180

181-
The [Application](#application), [Content Categories](#content-categories), [Domain](#domain), and [Host](#host) selectors are only available for traffic onboarded to Gateway with [WARP](/cloudflare-one/connections/connect-devices/warp/), [PAC files](/cloudflare-one/connections/connect-devices/agentless/pac-files/), or [Browser Isolation](/cloudflare-one/policies/browser-isolation/). To use these selectors to filter traffic onboarded with WARP, you need to:
181+
### Selector prerequisites
182+
183+
The [Application](#application), [Content Categories](#content-categories), [Domain](#domain), and [Host](#host) selectors are only available for traffic onboarded to Gateway with [WARP](/cloudflare-one/connections/connect-devices/warp/), [PAC files](/cloudflare-one/connections/connect-devices/agentless/pac-files/), or [Browser Isolation](/cloudflare-one/policies/browser-isolation/). To turn on the selectors for your account, use the [Patch Zero Trust account configuration endpoint](/api/resources/zero_trust/subresources/gateway/subresources/configurations/methods/edit/). For example:
184+
185+
```sh title="Turn on selectors for egress policies"
186+
curl --request PATCH \
187+
"https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/gateway/configuration" \
188+
--header "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \
189+
--header "Content-Type: application/json" \
190+
--data '{
191+
"settings": {
192+
"host_selector": {
193+
"enabled": true
194+
}
195+
}
196+
}'
197+
```
198+
199+
Additionally, to use these selectors to filter traffic onboarded with WARP, you need to:
182200

183201
1. Ensure you have deployed [WARP beta version 2025.4.589.1](/cloudflare-one/connections/connect-devices/warp/download-warp/beta-releases/) or later on your users' devices.
184-
2. In your WARP [device profile](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/), ensure Split Tunnel is set to [**Exclude IPs and domains**](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#change-split-tunnels-mode).
185-
3. [Remove the route](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#remove-a-route) to the IP address `100.64.0.0/10` from your Split Tunnel list.
186-
4. [Add routes](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to exclude the following IP addresses:
187-
- `100.64.0.0/12`
188-
- `100.81.0.0/16`
189-
- `100.82.0.0/15`
190-
- `100.84.0.0/14`
191-
- `100.88.0.0/13`
192-
- `100.96.0.0/11`
202+
2. In your WARP [device profile](/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/), configure your [Split Tunnel](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/) depending on the mode:
203+
204+
<Tabs> <TabItem label="Exclude IPs and domains">
205+
206+
1. [Remove the route](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#remove-a-route) to the IP address `100.64.0.0/10` from your Split Tunnel exclude list.
207+
2. [Add routes](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to exclude the following IP addresses:
208+
- `100.64.0.0/12`
209+
- `100.81.0.0/16`
210+
- `100.82.0.0/15`
211+
- `100.84.0.0/14`
212+
- `100.88.0.0/13`
213+
- `100.96.0.0/11`
214+
215+
</TabItem> <TabItem label="Include IPs and domains">
216+
217+
1. Add the required [Zero Trust domains](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-domains) or [IP addresses](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#cloudflare-zero-trust-ip-addresses) to your Split Tunnel include list.
218+
2. [Add a route](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/#add-a-route) to include the IP address `100.80.0.0/16`.
219+
220+
</TabItem> </Tabs>

src/content/partials/cloudflare-one/gateway/selectors/egress-selector-limitation.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -2,4 +2,4 @@
22
{}
33
---
44

5-
This selector is only available for traffic onboarded to Gateway with WARP, PAC files, or Browser Isolation. For more information, refer to [Limitations](#limitations).
5+
This selector is only available for traffic onboarded to Gateway with WARP, PAC files, or Browser Isolation. For more information, refer to [Selector prerequisites](/cloudflare-one/policies/gateway/egress-policies/#selector-prerequisites).

0 commit comments

Comments
 (0)