1

I'm trying to use Remote Desktop with a Cloudflare tunnel and the WARP client, following the instructions on this page:

Connect to Remote Desktop through Cloudflare Tunnel

(Specifically, the section Connect to RDP server with WARP to Tunnel)

Here's what I've done:

  • Created a Cloudflare tunnel. In the Zero Trust "Settings" page under "General", the "Team Domain" is set to (something like) "myteam.cloudflareaccess.com". I also set the Private Network to 192.168.1.0/24, which is my home network.
  • Installed cloudflared on my home Windows 11 PC that will be the RDP server. The tunnel in Zero Trust shows that the Connector on the PC is connected and the tunnel has a status of "Healthy".
  • Installed the WARP client on a Windows 11 laptop that will be the RDP client. In the account settings of the WARP client, I logged into Cloudflare Zero Trust using the same Team Name I used when setting up the tunnel (i.e. "myteam"). Authentication was done via a one-time PIN sent through email. The WARP client shows that everything is connected ok on the Connectivity tab of the Preferences window. I also see the laptop listed under Devices in the Zero Trust team.

When the laptop is connected to a separate cellular connection and is NOT on the private network, any attempts to connect Remote Desktop to the PC's internal IP (192.168.1.2) time out. However, it works fine if the laptop is on the same private network as the PC (so RDP normally works ok).

My understanding from the document above is that after running cloudflared on the RDP server PC, I should be able to use only the WARP client on the laptop, without installing cloudflared on the laptop, and without creating any Public Hostnames for the tunnel.

Out of desperation, I also tried installing cloudflared on the laptop, as well as installing the WARP client on the RDP server PC, and creating a Public Hostname for an RDP service. None of those helped though, and shouldn't be necessary, I don't think.

Thanks for any clues,
Russell

Russell G
  • 519

2 Answers2

1

I'm the OP and here's the solution that someone in the Cloudflare community gave me:

  • In the Zero Trust Dashboard, go to Settings > WARP Client > Device settings > Profile settings > configure the Default profile > Split Tunnels > ensure your private network is either in the included IPs and domains, or not in the excluded IPs and domains.
  • In the Zero Trust Dashboard, go to Settings > Network > Firewall > enable Proxy for TCP*.

I found that changes made to the IP/domain ranges are immediate, without having to reconnect the WARP client.

* As of 2023-02-23, Microsoft says the current version of Remote Desktop only uses TCP, so UDP probably doesn't need to be enabled in the Proxy.

Russell G
  • 519
1

Much has changed since the question was asked. Now by default warp excludes local network ip ranges such as 192...

This article explains how to fix local rdp access. Since my split tunnel settings were excluding the local network, I only had to delete those exclusions that started with 192.

https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/use-cases/rdp/

N-ate
  • 111