By installing Cloudflare WARP on our Linux server, we can route all traffic through the secure WARP tunnel. However, when you enable WARP while connected via SSH, the connection may drop. Preventing this is simple: exclude your own IP from the tunnel.
- Ubuntu
- Debian-based distributions
curl -fsSL https://pkg.cloudflareclient.com/pubkey.gpg | sudo gpg --yes --dearmor --output /usr/share/keyrings/cloudflare-warp-archive-keyring.gpg &&
echo "deb [signed-by=/usr/share/keyrings/cloudflare-warp-archive-keyring.gpg] https://pkg.cloudflareclient.com/ $(lsb_release -cs) main" | sudo tee /etc/apt/sources.list.d/cloudflare-client.list &&
sudo apt-get update && sudo apt-get install cloudflare-warp -y &&
warp-cli registration new &&
warp-cli mode warp+doh
Before enabling WARP, exclude your current access IP:
warp-cli tunnel ip add YOUR_HOME_IP_ADDRESSReplace:
YOUR_HOME_IP_ADDRESS β your actual public IP address
warp-cli connectwarp-cli statushttps://developers.cloudflare.com/warp-client/get-started/linux/
- Secure outbound traffic on VPS
- Hide origin IP
- Add lightweight privacy layer
- Combine with reverse proxies
Email: glitchbey@proton.me
TKU (The Keyboard Users)
Β© 2026