diff --git a/cmd/cloudflared/tunnel/cmd.go b/cmd/cloudflared/tunnel/cmd.go index 92f20bd7752..04b75cbe907 100644 --- a/cmd/cloudflared/tunnel/cmd.go +++ b/cmd/cloudflared/tunnel/cmd.go @@ -170,7 +170,7 @@ then protect with Cloudflare Access). B) Locally reachable TCP/UDP-based private services to Cloudflare connected private users in the same account, e.g., those enrolled to a Zero Trust WARP Client. -You can manage your Tunnels via dash.teams.cloudflare.com. This approach will only require you to run a single command +You can manage your Tunnels via one.dash.cloudflare.com. This approach will only require you to run a single command later in each machine where you wish to run a Tunnel. Alternatively, you can manage your Tunnels via the command line. Begin by obtaining a certificate to be able to do so: diff --git a/cmd/cloudflared/tunnel/teamnet_subcommands.go b/cmd/cloudflared/tunnel/teamnet_subcommands.go index b46f52e197f..9eb5dcfbaca 100644 --- a/cmd/cloudflared/tunnel/teamnet_subcommands.go +++ b/cmd/cloudflared/tunnel/teamnet_subcommands.go @@ -32,7 +32,7 @@ func buildRouteIPSubcommand() *cli.Command { UsageText: "cloudflared tunnel [--config FILEPATH] route COMMAND [arguments...]", Description: `cloudflared can provision routes for any IP space in your corporate network. Users enrolled in your Cloudflare for Teams organization can reach those IPs through the Cloudflare WARP -client. You can then configure L7/L4 filtering on https://dash.teams.cloudflare.com to +client. You can then configure L7/L4 filtering on https://one.dash.cloudflare.com to determine who can reach certain routes. By default IP routes all exist within a single virtual network. If you use the same IP space(s) in different physical private networks, all meant to be reachable via IP routes,