Cloudflare Docs
Cloudflare Zero Trust
Visit Cloudflare Zero Trust on GitHub
Set theme to dark (⇧+D)

Connect private networks

Creating a private network has two components: the server and the client. The server’s infrastructure (whether that is a single application, multiple applications, or a network segment) is connected to Cloudflare’s global network by Cloudflare Tunnel. This is done by running the cloudflared daemon on the server. Simply put, Cloudflare Tunnel is what connects your private network to Cloudflare. On the client side, end users connect to Cloudflare’s global network using the Cloudflare WARP client. The WARP client can be rolled out to your entire organization in just a few minutes using your in-house MDM tooling.

To enable remote access to your private network, follow the guide below.

​​ 1. Connect the server to Cloudflare

To connect your infrastructure with Cloudflare Tunnel:

  1. Create a Cloudflare Tunnel for your server by following our dashboard setup guide. You can skip the connect an application step and go straight to connecting a network.

  2. In the Private Networks tab for the tunnel, enter the IP/CIDR range of your private network (for example This makes the WARP client aware that any requests to this IP range need to be routed to your new tunnel.

​​ 2. Set up the client

To connect your devices to Cloudflare:

  1. Deploy the WARP client on your devices in Gateway with WARP mode. The Cloudflare certificate is only required if you want to display a custom block page or filter HTTPS traffic.
  2. Create device enrollment rules to determine which devices can enroll to your Zero Trust organization.

​​ 3. Route private network IPs through WARP

By default, the WARP client excludes traffic bound for RFC 1918 space as part of its Split Tunnel feature. For example, WARP automatically excludes, which are IP addresses typically used in private networks and not reachable from the Internet. In order for WARP to send traffic to your private network, the IP/CIDR that you specified for your Cloudflare Tunnel must be included in your Split Tunnel configuration.

To configure Split Tunnels for private network access:

  1. First, check whether your Split Tunnels mode is set to Exclude or Include mode.
  2. If you are using Include mode, add your network’s IP/CIDR range to the list.
  3. If you are using Exclude mode:
    1. Delete your network’s IP/CIDR range from the list. For example, if your network uses the default AWS range of, delete
    2. Re-add IP/CDIR ranges that are not explicitly used by your private network. For the AWS example above, you would add new entries for,,, and This ensures that that only traffic to routes through WARP.

By tightening the private IP range included in WARP, you reduce the risk of breaking a user’s access to local resources.

By default, all WARP devices enrolled in your Zero Trust organization can connect to your private network through Cloudflare Tunnel. You can configure Gateway to inspect your network traffic and either block or allow access based on user identity and device posture.

​​ Enable the Gateway proxy

  1. Enable the Gateway proxy for TCP.

  2. (Recommended) To proxy traffic to internal DNS resolvers, select UDP.

  3. (Recommended) To proxy traffic for diagnostic tools such as ping and traceroute:

    1. Select ICMP.
    2. On Linux servers:
    • Ensure that the Group ID for the cloudflared process is included in /proc/sys/net/ipv4/ping_group_range.
    • If you are running multiple network interfaces (for example, eth0 and eth1), configure cloudflared to use the external Internet-facing interface:

    $ cloudflared tunnel run --icmpv4-src <IP of primary interface>

Cloudflare will now proxy traffic from enrolled devices, except for the traffic excluded in your split tunnel settings. For more information on how Gateway forwards traffic, refer to Gateway proxy.

​​ Create Zero Trust policies

You can create Zero Trust policies to manage access to specific applications on your network.

  1. Go to Access > Applications > Add an application.

  2. Select Private Network.

  3. Name your application.

  4. For Application type, select Destination IP.

  5. For Value, enter the IP address for your application (for example,

  6. Configure your App Launcher visibility and logo.

  7. Select Next. You will see two auto-generated Gateway Network policies: one that allows access to the destination IP and another that blocks access.

  8. Modify the policies to include additional identity-based conditions. For example:

    • Policy 1

      Selector Operator Value Logic Action
      Destination IP in And Allow
      User email Matches regex .*
    • Policy 2

      Selector Operator Value Action
      Destination IP in Block

    Policies are evaluated in numerical order, so a user with an email ending in will be able to access while all others will be blocked. For more information on building network policies, refer to our dedicated documentation.

  9. Select Add application.

Your application will appear on the Applications page.

​​ 5. Connect as a user

End users can now reach HTTP or TCP-based services on your network by visiting any IP address in the range you have specified.

​​ Troubleshooting

​​ Device configuration

To check that their device is properly configured, the user can visit to ensure that:

  • The page returns Your network is fully protected.
  • In HTTP filtering, both WARP and Gateway Proxy are enabled.
  • The Team name matches the Zero Trust organization from which you created the tunnel.

​​ Router configuration

Check the local IP address of the device and ensure that it does not fall within the IP/CIDR range of your private network. For example, some home routers will make DHCP assignments in the range, which overlaps with the range used by most corporate private networks. When a user’s home network shares the same IP addresses as the routes in your tunnel, their device will be unable to connect to your application.

To resolve the IP conflict, you can either:

  • Reconfigure the user’s router to use a non-overlapping IP range. Compatible routers typically use, or

  • Tighten the IP range in your Split Tunnel configuration to exclude the range. This will only work if your private network does not have any hosts within

  • Change the IP/CIDR of your private network so that it does not overlap with a range commonly used by home networks.