A command-line client for Cloudflare Tunnel, enabling secure proxying of traffic from Cloudflare's network to your origins without opening firewall ports.
Cloudflared is the command-line client for Cloudflare Tunnel, a tunneling daemon that securely proxies traffic from Cloudflare's global network to your origin servers. It enables you to expose web services, SSH, RDP, and other TCP applications without opening firewall ports, enhancing security by keeping origins closed. The tool integrates with Cloudflare's ecosystem for routing and access control.
Developers, sysadmins, and organizations using Cloudflare who need to securely expose internal services, applications, or protocols like SSH/RDP without compromising firewall security.
Cloudflared provides a secure, zero-trust alternative to traditional VPNs or port forwarding by leveraging Cloudflare's network for proxying traffic. It simplifies connectivity with easy deployment options and integrates seamlessly with Cloudflare's WARP client and load balancing features.
Cloudflare Tunnel client
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Eliminates the need to open firewall ports by proxying traffic through Cloudflare's network, keeping origins closed as emphasized in the README.
Handles Layer 4 TCP traffic for protocols like SSH and RDP via `cloudflared access` commands, allowing secure access to non-HTTP services.
Available as standalone binaries, Docker images, and packages for macOS, Linux, and Windows, simplifying installation across diverse environments.
Enables private origin access for Layer 4 traffic through the WARP client without client-side `cloudflared` commands, enhancing usability for end-users.
Requires a Cloudflare account and adding a website, even for private routing, as noted in the README's 'Before you get started' section, creating vendor lock-in.
The README states that versions over a year old may have breaking changes, forcing regular updates and potentially disrupting stable deployments.
Initial setup involves multiple steps in the Cloudflare dashboard and command-line configuration, which can be more involved than simpler tunneling tools like ngrok.