Common issues
This section covers the most common issues you might encounter as you deploy the WARP client in your organization, or turn on new features that interact with the client. If you do not see your issue listed below, refer to the troubleshooting FAQ or contact Cloudflare Support.
Unable to connect WARP
Section titled “Unable to connect WARP”If WARP is stuck in the Disconnected
state or frequently changes between Connected
and Disconnected
, this indicates that the client cannot establish a connection to Cloudflare's global network.
In your WARP debug logs, daemon.log
will typically show one or more of the following errors:
-
Happy Eyeball checks failing:
ERROR main_loop: warp::warp::happy_eyeballs: Happy eyeballs error Custom { kind: NotConnected, error: "All Happy Eyeballs checks failed" } -
Many other checks timing out:
ERROR warp::warp::connectivity_check: DNS check failed error=ResolveError { kind: Timeout }WARN warp::warp::connectivity_check: Tunnel trace failed request::Error { kind: Request, url: Url { scheme: "https", cannot_be_a_base: false, username: "", password: None, host: Some(Domain("connectivity.cloudflareclient.com")), port: None, path: "/cdn-cgi/trace", query: None, fragment: None }, source: TimedOut }
Here are the most common reasons why this issue occurs:
A third-party service is blocking WARP
Section titled “A third-party service is blocking WARP”A third-party service (such as a hardware or software firewall, router, MDM/group policy configuration, or other networking interface) may have a security policy in place which blocks WARP from connecting.
Solution
Section titled “Solution”Configure the third-party service to exempt the IP addresses required by WARP.
A third-party VPN is interfering with WARP
Section titled “A third-party VPN is interfering with WARP”The most common places we see interference with WARP from VPNs are:
-
Control of traffic routing: In
daemon.log
, you will see a large number of routing table changes. For example,DEBUG warp::warp_service: Routes changed:Added; Interface: 8; Destination: 10.133.27.201/32; Next hop: 100.64.0.2;Added; Interface: 8; Destination: 10.133.27.202/32; Next hop: 100.64.0.2;DEBUG warp::warp_service: Routes changed:Added; Interface: 8; Destination: 10.133.27.203/32; Next hop: 100.64.0.2;Added; Interface: 8; Destination: 10.133.27.204/32; Next hop: 100.64.0.2;DEBUG warp::warp_service: Routes changed:Added; Interface: 8; Destination: 10.133.27.205/32; Next hop: 100.64.0.2;This indicates that a third-party VPN is fighting WARP for control over the routing table.
-
Control of DNS: In
daemon.log
, you will see a large number of DNS changes followed by this warning:WARN main_loop: warp::warp_service: Reinforcing DNS settings. Is something else fighting us?The daemon may also note that some other process has already bound to the UDP and TCP sockets:
WARN warp::warp: Unable to bind local UDP socket error=Os { code: 48, kind: AddrInUse, message: "Address already in use" } sockaddr=127.0.2.2:53WARN warp::warp: Unable to bind local TCP socket error=Os { code: 48, kind: AddrInUse, message: "Address already in use" } sockaddr=127.0.2.2:53
To confirm that the VPN is the source of the issue, temporarily uninstall (not disable or disconnect) the VPN.
Solution
Section titled “Solution”- Disable all DNS enforcement on the VPN. WARP must be the last client to touch the primary and secondary DNS server on the default interface.
- In Zero Trust ↗, create a Split Tunnel rule to exclude the VPN server you are connecting to (for example,
vpnserver.3rdpartyvpn.example.com
). - Configure your VPN to only include routes to your internal resources. Make sure that the VPN routes do not overlap with the routes included in the WARP tunnel.
For more information, refer to our guide for running VPNs alongside the WARP client.
Your ISP or country is blocking WARP
Section titled “Your ISP or country is blocking WARP”Some countries explicitly block the use of VPN or VPN-like software that intentionally encrypts traffic. These blocks are often inconsistently enforced and you may sometimes see successful connections.
If you suspect your country may be blocking WARP traffic, contact your ISP to verify.
(Mac/Linux) The device's /etc/resolv.conf
file has an invalid character
Section titled “(Mac/Linux) The device's /etc/resolv.conf file has an invalid character”WARP cannot parse resolv.conf
files which contain an invalid hostname. In daemon.log
, you will see an unrecognized char
warning:
WARN main_loop: warp::warp_service: Tunnel connection experienced error error=Custom { kind: Other, error: ProtoError { kind: Msg("unrecognized char: ") } }
Solution
Section titled “Solution”- Open the
/etc/resolv.conf
file on your device. - In the
search
directives, check for invalid URL characters such as!@#$%^&*()<>?
. - Remove the invalid lines and rely on WARP and Gateway for DNS services.
Turned on WARP and can no longer browse the Internet
Section titled “Turned on WARP and can no longer browse the Internet”If WARP shows as Connected
but you cannot reach any websites or internal resources, this is likely due to one of the following configuration issues.
A Gateway firewall policy is blocking traffic
Section titled “A Gateway firewall policy is blocking traffic”A misconfigured Gateway firewall policy can result in traffic to some or all sites being restricted.
Solution
Section titled “Solution”- In Zero Trust ↗, go to Gateway > Firewall Policies.
- Disable all DNS, Network, and HTTP policies and see if the issue persists. It may take up to two minutes for the change to take effect. Note that all policy enforcement happens on the Cloudflare global network, not on your local device.
- Slowly re-enable your policies. Once you have narrowed down the issue, modify the policies or their order of enforcement.
The device does not have a root certificate installed
Section titled “The device does not have a root certificate installed”Installing and trusting a root CA is a necessary step to enable advanced security features such as Browser Isolation, TLS decryption, AV scanning, and device posture.
If the root CA is not installed on the device, you will see untrusted certificate warnings on every website. Example warnings include Certificate not trusted
, Not trusted identity
or SSL Error
.
Solution
Section titled “Solution”Install a Cloudflare certificate on all of your devices, or upload your own certificate to Cloudflare.
A third-party security product is interfering with Gateway
Section titled “A third-party security product is interfering with Gateway”WARP does not allow third-party DLP or proxy services to perform TLS decryption on traffic sent to Gateway.
To diagnose the issue, go to https://zero-trust-client.cloudflareclient.com/v0/client_config
and verify the certificate the HTTPS traffic is signed with. If the certificate is issued by your organization or a third-party service, the third-party service is performing TLS decryption on WARP traffic and re-signing with a certificate that we do not trust.
Solution
Section titled “Solution”In the third-party security product, disable HTTPS inspection and TLS decryption for the WARP IP addresses.
Docker container is failing DNS resolution
Section titled “Docker container is failing DNS resolution”If you are using WARP and running a CI/CD pipeline inside a Docker container on Microsoft hardware to provide GitHub Actions with an egress IP, your container's /etc/resolv.conf
file might be injecting a custom nameserver with the IP address 168.63.129.16
↗ (specific to Azure infrastructure.)
The 168.63.129.16
IP address is only accessible to Azure VMs and causes the container's traffic to fail when routed through the Cloudflare WARP tunnel.
Solution
Section titled “Solution”To fix this issue, you must exclude the Azure-specific nameserver IP (168.63.129.16
) from being routed through WARP tunnel. Refer to Split Tunnels and follow the instructions to exclude the Azure-specific IP.
Cannot connect to a specific app or website
Section titled “Cannot connect to a specific app or website”Below are the most common reasons why turning on WARP blocks a specific application from loading.
TLS Decryption is enabled and the app or site does certificate pinning
Section titled “TLS Decryption is enabled and the app or site does certificate pinning”Some applications do not support SSL inspection or are otherwise incompatible with TLS decryption. Gateway provides a list of applications known to perform certificate pinning.
Solution (if the app has a private certificate store)
Section titled “Solution (if the app has a private certificate store)”Applications such as Firefox, Docker, Python, and npm rely on their own certificate store and the Cloudflare root certificate must be trusted in each.
Refer to our instructions for adding a root certificate to common applications. For applications not on our list, try searching the Internet for <app-name> proxy support
or <app-name> proxy certificate
.
Solution (last resort)
Section titled “Solution (last resort)”If you cannot install the certificate on the application, create a Do Not Inspect policy to exclude the application from Gateway inspection.
A Gateway firewall policy is blocking the app or site
Section titled “A Gateway firewall policy is blocking the app or site”You may have a Gateway DNS, Network, or HTTP in place that accidentally blocks a port, IP, or domain that the app or site relies on.
Solution
Section titled “Solution”- In Zero Trust ↗, go to Gateway > Firewall Policies.
- Disable all DNS, Network, and HTTP policies and see if the issue persists. It may take up to two minutes for the change to take effect. Note that all policy enforcement happens on the Cloudflare global network, not on your local device.
- Slowly re-enable your policies. Once you have narrowed down the issue, modify the policies or their order of enforcement.
Split Tunnel settings are misconfigured for the app or site
Section titled “Split Tunnel settings are misconfigured for the app or site”Some applications require traffic to flow either all inside or all outside of the WARP tunnel. For instance, in order to use AirDrop or communicate with a local printer, traffic must be outside the tunnel. For applications like Microsoft Teams to function properly, all Microsoft Teams traffic must be either fully inside the tunnel or fully outside the tunnel.
Solution
Section titled “Solution”- Determine the IP addresses and/or domains required for your application to function. Common Internet search terms include
<app-name> split tunnel list
,<app-name> allow list
, or<app-name> firewall ips
. - In Zero Trust ↗, go to your Split Tunnel settings.
- Depending on the application, either include or exclude all of the necessary IPs and/or domains. For Microsoft applications, we provide a one-click action to exclude all Microsoft 365 IPs.
Was this helpful?
- Resources
- API
- New to Cloudflare?
- Products
- Sponsorships
- Open Source
- Support
- Help Center
- System Status
- Compliance
- GDPR
- Company
- cloudflare.com
- Our team
- Careers
- 2025 Cloudflare, Inc.
- Privacy Policy
- Terms of Use
- Report Security Issues
- Trademark