Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Cloudflare launches Mesh to replace VPN: enabling AI agents to securely access your intranet, offering 50 free nodes
Cloudflare officially launches Cloudflare Mesh at Agents Week 2026, replacing traditional VPNs and SSH tunnels with a bidirectional, many-to-many network topology. This enables AI agents to directly access private infrastructure within a Zero Trust policy framework, and it also offers a free starter plan with 50 nodes.
(Background: After integrating Kimi K2.5, Cloudflare runs 7 billion tokens every day, saving 77% on security audit costs)
(Additional context: Did Cloudflare choose Coinbase or Stripe? This vote determines the payment standard for AI agents)
Table of Contents
Toggle
At 3:00 a.m., your AI Agent is trying to make its 10,000th API request, while your VPN is still jumping between windows, waiting for a manual login.
This is the real situation for engineering teams in 2026. When AI agents begin autonomously querying databases and connecting to private services, we realize: the existing network tools (VPN, SSH, Bastion Host) are all designed for “humans.” They require clicking, they require interaction, and they require human involvement.
In the face of an AI era with no need for manual work end to end, these tools instead become the most fragile single points of failure in the system.
To address this, Cloudflare officially released Cloudflare Mesh yesterday (14) during its annual “Agents Week 2026.” It directly declared that it intends to fill this architectural gap with a private network infrastructure natively designed for AI agents—replacing those old tools created for manual human operation.
The dead end of VPNs: it assumes you’re always there
The trust model of traditional VPNs is built on an implicit premise: a “person” is verifying identity, initiating the connection, and taking responsibility for access behavior. This premise becomes difficult to apply in the era of AI agents.
Agents won’t wait for interactive MFA prompts. They can’t manually set up SSH tunnels. More importantly, once a VPN connection is established, you have almost no mechanism to know what the agent is actually doing on the other end: within a few milliseconds, it can scan data you never expected it to touch.
Another extreme option is exposing services to the public internet—but that’s equivalent to leaving the key in the door. In its announcement, Cloudflare explicitly calls out the shared dead end of these three paths: “None of these options let you see what the agent actually does after the connection is made.”
Cloudflare Mesh’s design starting point is to solve visibility first, and then connectivity.
Mesh’s underlying technology: bidirectional, global, automatic NAT traversal
Compared with Cloudflare’s existing product Cloudflare Tunnel, the most critical architectural difference of Mesh lies in directionality.
Tunnel is one-way: traffic enters your infrastructure from the outside. Mesh is bidirectional, many-to-many: any node can proactively initiate connections to any other node, and traffic routing is completed by Cloudflare’s global network backbone that spans 330 cities worldwide.
This design directly tackles the problem that most troubles engineers in enterprise environments: NAT traversal. Home networks, office firewalls, cloud VPCs—these various complex NAT configurations usually require manual setup of forwarding rules, but Mesh claims to handle everything automatically.
For developers, the most direct incentive is integration with the Cloudflare Developer Platform. As long as you bind Mesh in wrangler.jsonc, Workers and Durable Objects can call private services via env.MESH.fetch() directly, just like calling any external API—yet traffic never leaves Cloudflare’s Zero Trust policy framework end to end.
There’s also another brand integration at the naming level: the original WARP Connector has been renamed “Cloudflare Mesh node,” and the WARP Client has been renamed “Cloudflare One Client,” consolidating everything under the Mesh product line.
Zero Trust policies are automatically applied to agent traffic
Cloudflare emphasizes that Mesh is not an independent new product, but a native extension of the Cloudflare One SASE suite.
This means that enterprise existing Gateway policies, device health status checks, data loss prevention (DLP), and more can be automatically applied to traffic initiated by agents without needing to be reconfigured.
This point is highly significant for enterprise security teams. The problem with AI agents is not only “whether they can get in,” but also “whether anyone is managing them after they get in.” Mesh brings agent traffic under the existing governance framework, instead of opening up a separate side door that is difficult to audit.
In terms of pricing, Cloudflare sets a relatively generous free threshold: any Cloudflare account can use 50 nodes plus 50 users for free. For small teams or individual developers’ scenarios like “agent access home labs,” it’s nearly no-barrier.
Roadmap and unfulfilled commitments
It’s worth noting that many of the multiple core features described at length in Cloudflare’s announcement are still listed on the roadmap rather than being live.
Support for containers (deploying Mesh node in Docker, Kubernetes, CI/CD environments) also needs to wait until the end of 2026.
In other words, the Mesh you can use today mainly involves Workers/Durable Objects VPC binding, plus basic node-to-node connectivity. More granular agent identity governance still needs to wait.
What developers can do now
For teams that are already in the Cloudflare One ecosystem, Mesh requires no additional application—you can enable it directly in your existing account. Workers VPC integration needs to add a Mesh binding in wrangler.jsonc; after that, you can call private endpoints via env.MESH.fetch().
For teams that are still evaluating, the most suitable verification scenarios at this stage are: letting a coding agent access a staging database, or allowing a cloud-deployed agent to call an office intranet API. You can test the basic connectivity capabilities for both scenarios today.
Before Hostname Routing goes live, direct connection using ip:port is still the main option—it isn’t ideal, but it works. The domain name resolution experience that makes agents “feel like they’re on the internal network” will have to wait until after summer.