Skip to content

Commit 7d928ff

Browse files
PCX-1040 Magic Transit: Restore missing content (cloudflare#198)
Co-authored-by: Nora Bencsics <[email protected]>
1 parent 9b62d15 commit 7d928ff

File tree

9 files changed

+139
-26
lines changed

9 files changed

+139
-26
lines changed

products/magic-transit/src/content/about/health-checks/tunnel.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Cloudflare encapsulates the ICMP reply packet and transmits the probe across the
1919

2020
Every Cloudflare edge server configured to process your traffic sends a tunnel health check probe every 60 seconds. When a probe attempt fails, each server detecting the failure quickly probes up to 2 more times to obtain an accurate result.
2121

22-
<Aside>
22+
<Aside type='note' header='Note'>
2323

2424
To avoid control plane policies enforced by the origin network, tunnel health checks use an encapsulated ICMP reply (rather than an ICMP echo request). To use echo request packets, please contact your Cloudflare account team.
2525

@@ -43,7 +43,7 @@ Magic Transit steers traffic to tunnels based on priorities you set when you [as
4343

4444
Tunnel routes with lower values have priority over those with higher values.
4545

46-
<Aside>
46+
<Aside type='note' header='Note'>
4747

4848
Since Cloudflare does not synchronize the health checks among edge servers and the Internet is not homogenous, Cloudflare edge servers may be able to reach the origin infrastructure from some locations at a given time but not others.
4949

products/magic-transit/src/content/about/traffic-steering.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ Because ECMP is probabilistic, the algorithm routes roughly the same number of f
5454

5555
For example, consider a scenario with many very low-bandwidth TCP connections and one very high-bandwidth TCP connection. Packets for the high-bandwidth connection have the same hash and thus use the same tunnel. As a result, that tunnel utilizes greater bandwidth than the others.
5656

57-
<Aside>
57+
<Aside type='note' header='Note'>
5858

5959
Magic Transit supports a "weight" field that you can apply to a tunnel so that a specified percentage of traffic uses that tunnel rather than other equal-cost tunnels.
6060

products/magic-transit/src/content/about/tunnels-and-encapsulation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ This diagram illustrates the flow of traffic with Magic Transit:
1010

1111
![GRE tunnel flow](../static/mt-gre-tunnel-flow.png)
1212

13-
<Aside>
13+
<Aside type='note' header='Note'>
1414

1515
Egress packets are routed by your ISP interface, not Cloudflare.
1616

@@ -24,7 +24,7 @@ This diagram illustrates how Magic Transit encapsulates packets at the Cloudflar
2424

2525
![Encapsulation diagram](../static/magic-transit-anycast-1.png)
2626

27-
<Aside>
27+
<Aside type='note' header='Note'>
2828

2929
To accommodate the additional header data introduced by encapsulation, the maximum segment size (MSS) must be adjusted so that packets comply with the standard Internet routable maximum transmission unit (MTU), which is 1500 bytes.
3030

products/magic-transit/src/content/configure-magic-transit-firewall.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ _ah, ax.25, dccp, ddp, egp, eigrp, encap, esp, etherip, fc, ggp, gre, hip, hmp,
186186
- Packet length
187187
- Bit field match (Cloudflare is able to match on any part of an IP packet to apply, allow, or drop rules)
188188

189-
<Aside>
189+
<Aside type='warning' header='Important'>
190190

191191
When you or your end users are using other Cloudflare services (eg. CDN, Spectrum) that proxy traffic, be aware of the following:
192192

products/magic-transit/src/content/set-up/onboarding.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ These routing changes return any traffic generated within the Cloudflare edge ne
5151

5252
You control the edge router advertisement, which dictates whether Cloudflare’s edge network advertises your prefixes. Advertisement is activated at the go-live call, routing traffic via Cloudflare and the GRE tunnels to your data center(s).
5353

54-
<Aside>
54+
<Aside type='warning' header='Important'>
5555

5656
It is critical that you put the appropriate MSS clamps in place before routing changes are made. Failure to apply an MSS clamp may result in dropped packets and hard-to-debug connectivity issues.
5757

products/magic-transit/src/content/set-up/provide-configuration-data/specify-gre-tunnel-endpoints.md

Lines changed: 129 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -9,38 +9,34 @@ type: table
99

1010
## Anycast edge IP addresses
1111

12-
Cloudflare will assign 2 Anycast IP addresses shortly after the [onboarding kickoff call](/set-up/onboarding). Use these Anycast edge IPs as the GRE tunnel destinations on your data center routers/endpoints.
12+
Cloudflare will assign 2 Anycast IP addresses shortly after your [onboarding](/set-up/onboarding) kickoff call. Use these Anycast edge addresses as the GRE tunnel destinations on your data center routers/endpoints.
1313

1414
## Generic Routing Encapsulation (GRE)
1515

1616
Cloudflare recommends 2 GRE tunnels for each ISP and data center router combination, one per Anycast IP.
1717

1818
To configure the GRE tunnel(s) between Cloudflare and your data center(s), you must provide the following data for each tunnel:
1919

20-
* **Customer edge IP address**—A public Internet routable IP address that is outside of the prefixes Cloudflare will advertise on your behalf. These are generally IP addresses provided by your ISP. If you are using a physical or virtual connection ([Cloudflare Network Interconnect](https://developers.cloudflare.com/network-interconnect/about)), leave this section blank - Cloudflare will provide this IP.
20+
* **Customer edge IP address**—A public Internet routable IP address that is outside of the prefixes Cloudflare will advertise on your behalf. These are generally IP addresses provided by your ISP. If you intend to use a physical or virtual connection ([Cloudflare Network Interconnect](https://developers.cloudflare.com/network-interconnect/about)), you do not need to provide edge addresses—Cloudflare will provide them.
2121
* **Private subnet**—A 31-bit subnet (/31 in CIDR notation) supporting 2 hosts, one for each side of the tunnel. Select the subnet from the following private IP space:
22-
* 10.0.0.010.255.255.255
23-
* 172.16.0.0172.31.255.255
24-
* 192.168.0.0192.168.255.255
22+
* 10.0.0.010.255.255.255
23+
* 172.16.0.0172.31.255.255
24+
* 192.168.0.0192.168.255.255
2525
* **Private IP addresses**—The private IP address assigned to the **Cloudflare** and **customer** sides of the tunnel
2626

2727
For an example GRE tunnel configuration, refer to this table:
2828

29-
### Example GRE tunnel IPs
30-
3129
</ContentColumn>
3230

33-
<TableWrap>
34-
3531
<table>
3632
<thead>
3733
<tr>
38-
<th><span style="white-space: nowrap">GRE tunnel</span></th>
39-
<th><span style="white-space: nowrap">Customer edge IP</span></th>
40-
<th><span style="white-space: nowrap">Cloudflare Anycast IP</span></th>
41-
<th><span style="white-space: nowrap">Private subnet</span></th>
42-
<th><span style="white-space: nowrap">Customer private IP</span></th>
43-
<th><span style="white-space: nowrap">Cloudflare private IP</span></th>
34+
<th style='min-width:70px'>GRE tunnel</th>
35+
<th style='min-width:125px'>Customer edge IP</th>
36+
<th style='min-width:100px'>Anycast IP</th>
37+
<th style='min-width:130px'>Private subnet</th>
38+
<th style='min-width:115px'>Customer private IP</th>
39+
<th style='min-width:100px'>Cloudflare private IP</th>
4440
</tr>
4541
</thead>
4642
<tbody>
@@ -79,4 +75,121 @@ For an example GRE tunnel configuration, refer to this table:
7975
</tbody>
8076
</table>
8177

82-
</TableWrap>
78+
<ContentColumn>
79+
80+
## Scoped routes for GRE tunnels
81+
82+
To reduce latency for your GRE tunnel configurations, especially if you operate your own Anycast network, Cloudflare can steer your traffic by scoping it to specific Cloudflare data center regions.
83+
84+
Valid Cloudflare regions include AFR, APAC, EEUR, ENAM, ME, OC, SAM, WEUR, and WNAM.
85+
86+
To configure scoping for your traffic, you must provide Cloudflare with GRE tunnel data for each Cloudflare region.
87+
88+
For an example of scoping configuration data, see the table below. It lists GRE tunnels and their associated Cloudflare region codes:
89+
90+
<table>
91+
<thead>
92+
<tr>
93+
<th>GRE tunnel</th>
94+
<th>Region code</th>
95+
</tr>
96+
</thead>
97+
<tbody>
98+
<tr>
99+
<td>GRE_1_IAD</td>
100+
<td>AFR</td>
101+
</tr>
102+
<tr>
103+
<td>GRE_2_IAD</td>
104+
<td>EEUR</td>
105+
</tr>
106+
<tr>
107+
<td>GRE_3_ATL</td>
108+
<td>ENAM</td>
109+
</tr>
110+
<tr>
111+
<td>GRE_4_ATL</td>
112+
<td>ME</td>
113+
</tr>
114+
</tbody>
115+
</table>
116+
117+
Cloudflare has 13 geographic regions across the world. This table lists region codes and their associated regions:
118+
119+
<table>
120+
<thead>
121+
<tr>
122+
<th>Region code</th>
123+
<th>Region</th>
124+
</tr>
125+
</thead>
126+
<tbody>
127+
<tr>
128+
<td>WNAM</td>
129+
<td>Western North America
130+
</td>
131+
</tr>
132+
<tr>
133+
<td>ENAM</td>
134+
<td>Eastern North America
135+
</td>
136+
</tr>
137+
<tr>
138+
<td>WEU</td>
139+
<td>Western Europe
140+
</td>
141+
</tr>
142+
<tr>
143+
<td>EEU</td>
144+
<td>Eastern Europe
145+
</td>
146+
</tr>
147+
<tr>
148+
<td>NSAM</td>
149+
<td>Northern South America
150+
</td>
151+
</tr>
152+
<tr>
153+
<td>SSAM</td>
154+
<td>Southern South America
155+
</td>
156+
</tr>
157+
<tr>
158+
<td>OC</td>
159+
<td>Oceania
160+
</td>
161+
</tr>
162+
<tr>
163+
<td>ME</td>
164+
<td>Middle East
165+
</td>
166+
</tr>
167+
<tr>
168+
<td>NAF</td>
169+
<td>Northern Africa
170+
</td>
171+
</tr>
172+
<tr>
173+
<td>SAF</td>
174+
<td>Southern Africa
175+
</td>
176+
</tr>
177+
<tr>
178+
<td>IN</td>
179+
<td>India
180+
</td>
181+
</tr>
182+
<tr>
183+
<td>SEAS</td>
184+
<td>Southeast Asia
185+
</td>
186+
</tr>
187+
<tr>
188+
<td>NEAS</td>
189+
<td>Northeast Asia
190+
</td>
191+
</tr>
192+
</tbody>
193+
</table>
194+
195+
</ContentColumn>

products/magic-transit/src/content/set-up/provide-configuration-data/specify-prefixes-to-advertise.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ For an example prefix configuration, refer to this table:
2222
| 131.0.72.0/22 | AS395747 |
2323
| 103.21.245.0/24 | AS395747 |
2424

25-
<Aside>
25+
<Aside type='note' header='Note'>
2626

2727
When customers supply their own ASN, Cloudflare prepends the main Cloudflare ASN (AS13335) to the BGP AS_PATH. For example, if the customer ASN is AS64496, anyone directly peering with Cloudflare sees the path as `13335 64496`.
2828

products/magic-transit/src/content/set-up/requirements.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Local MSS: 1436
103103
Remote MSS: 1436
104104
```
105105

106-
<Aside>
106+
<Aside type='warning' header='Important'>
107107

108108
When you do not have a publicly available TCP endpoint for which Cloudflare can verify your MSS settings, you must provide a screenshot of the cURL command results, similar to the one above.
109109

products/magic-transit/src/content/use-magic-transit-on-demand.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ A common workflow is to enable prefix advertisement during an attack so that you
1111

1212
To ensure smooth operation in general and simplify the advertisement process during an attack scenario, see [_Dynamic advertisement: Best practices_](https://developers.cloudflare.com/byoip/dynamic-advertisement/best-practices).
1313

14-
<Aside>
14+
<Aside type='note' header='Note'>
1515

1616
Once you have set up Magic Transit, all Cloudflare traffic to your prefixes uses GRE tunnels to reach your origin. This is true even when you disable dynamic advertising.
1717

0 commit comments

Comments
 (0)