Skip to content

Commit 04675fd

Browse files
Apply suggestions from code review
1 parent 58c5c1d commit 04675fd

File tree

1 file changed

+11
-14
lines changed
  • src/content/docs/magic-wan/configuration/manually/third-party

1 file changed

+11
-14
lines changed

src/content/docs/magic-wan/configuration/manually/third-party/oracle.mdx

Lines changed: 11 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ pcx_content_type: integration-guide
33
title: Oracle Cloud
44
---
55

6-
This tutorial provides information and examples of how to configure IPsec VPN between Cloudflare Magic WAN with an Oracle Cloud Site-to-site VPN.
6+
This tutorial provides information and examples of how to configure IPsec between Cloudflare Magic WAN and an Oracle Cloud Site-to-site VPN.
77

8-
:::note
9-
You need to have pre-shared key to establish the IPsec tunnel. Refer to this [example](https://workers.cloudflare.com/playground#LYVwNgLglgDghgJwgegGYHsHALQBM4RwDcABAEbogB2+CAngLzbPYDqApmQNJQQBimYACFKNRHSoBzAB4ArAEoBBANYR5AEVYAJAOJCAagA0AXCxYduvAVhHVaEmQpVrNug4YCwAKADC6KhDsAdjqUADOMOhhvFD+xiQYWHgExCRUcMDsDABEUDTs0gB0smHZpKhQYEEZWbn5RSXZ3n4BQRDYACp0MOzxcDAwYFAAxgSxVMiycABucGHDCLAQANTA6Ljg7N7eBZFIJLjsqHDgECQA3l4AkHMSwwnsEMMAFgAUAJQXXtdXw-5hZzgJAYaXYAHcSABVPIQAAcigQCDgdFeABZYe8iD8Ft0IOhCpJHvI4DR0MB9HAwCB2GFXnBMT8qmcyHN2AA2VEAZQgiykwPIeLgr25vMkhVQCDJPmeiD8h0K-UGKKo4DAABoSPSGT8WWF2VyeXlJPzdfqRUbCgh2IM4MN2K9kAAdZbISQagDk7vePyuvr9JADlutYFt9qdyFdHq9Pr9voDJCDNrtDoYkZInu1vr+VABCTylPNfJBpo5hbFYRAZABoteAAYNQBmABMmauVogIAQVFBEPkNMiOftFXSYDLGsufue7DghwQYXiE792WzgWCEG67Gy8WygWkKGeEGAYGyap9AF9T76zwyrhevGesd4zMwLDx+IJbGJ6FI5EpVBptD0Ixmn8Vd2lCCIohiOIEkEZJCFIdJMhyTJCHwQgyjzKokNqMgwHQMgml8UC2k6Dc+gGIZRmgfxJjCfxti8c5lzJeBoDISpeDoAB9dDN2MbIm1rJtUWwWsGzEgB2E8WOANioA4oZ1241AQ0kUpjAAbWyKh1nYEpuL+OSCGyABdNVsmAOA8m4tYNiqLc6kOBpSjPJ9n1fKwP1Eewfycf9XCAwxmG8IA) to generate one.
10-
:::
8+
## Prerequisites
9+
10+
You need a pre-shared key to establish the IPsec tunnel. You can use Workers to create a random key. Refer to [this example](https://workers.cloudflare.com/playground#LYVwNgLglgDghgJwgegGYHsHALQBM4RwDcABAEbogB2+CAngLzbPYDqApmQNJQQBimYACFKNRHSoBzAB4ArAEoBBANYR5AEVYAJAOJCAagA0AXCxYduvAVhHVaEmQpVrNug4YCwAKADC6KhDsAdjqUADOMOhhvFD+xiQYWHgExCRUcMDsDABEUDTs0gB0smHZpKhQYEEZWbn5RSXZ3n4BQRDYACp0MOzxcDAwYFAAxgSxVMiycABucGHDCLAQANTA6Ljg7N7eBZFIJLjsqHDgECQA3l4AkHMSwwnsEMMAFgAUAJQXXtdXw-5hZzgJAYaXYAHcSABVPIQAAcigQCDgdFeABZYe8iD8Ft0IOhCpJHvI4DR0MB9HAwCB2GFXnBMT8qmcyHN2AA2VEAZQgiykwPIeLgr25vMkhVQCDJPmeiD8h0K-UGKKo4DAABoSPSGT8WWF2VyeXlJPzdfqRUbCgh2IM4MN2K9kAAdZbISQagDk7vePyuvr9JADlutYFt9qdyFdHq9Pr9voDJCDNrtDoYkZInu1vr+VABCTylPNfJBpo5hbFYRAZABoteAAYNQBmABMmauVogIAQVFBEPkNMiOftFXSYDLGsufue7DghwQYXiE792WzgWCEG67Gy8WygWkKGeEGAYGyap9AF9T76zwyrhevGesd4zMwLDx+IJbGJ6FI5EpVBptD0Ixmn8Vd2lCCIohiOIEkEZJCFIdJMhyTJCHwQgyjzKokNqMgwHQMgml8UC2k6Dc+gGIZRmgfxJjCfxti8c5lzJeBoDISpeDoAB9dDN2MbIm1rJtUWwWsGzEgB2E8WOANioA4oZ1241AQ0kUpjAAbWyKh1nYEpuL+OSCGyABdNVsmAOA8m4tYNiqLc6kOBpSjPJ9n1fKwP1Eewfycf9XCAwxmG8IA) to generate one.
1111

1212
## Oracle Cloud
1313

14-
### 1. Create Oracle Cloud Customer-premises equipment
14+
### 1. Create Oracle Cloud customer-premises equipment
1515

1616
1. Go to **Networking** > **Customer connectivity**, and select **Customer-premises equipment**.
1717
2. Select **Create CPE**.
@@ -21,25 +21,23 @@ You need to have pre-shared key to establish the IPsec tunnel. Refer to this [ex
2121
- **CPE vendor information**: Select **Other**.
2222
4. Select **Create CPE**.
2323

24-
### 2. Create Oracle Cloud Dynamic routing gateways
24+
### 2. Create Oracle Cloud dynamic routing gateways
2525

2626
1. Go to **Networking** > **Customer connectivity**, and select **Dynamic routing gateways**.
2727
2. Select **Create Dynamic routing gateways**.
2828
3. Select the following settings (you can leave settings not mentioned here with their default values):
2929
- **Name**: Enter a name.
3030
4. Select **Create Dynamic routing gateways**.
3131

32-
### 3. Configure the Create IPsec connection
32+
### 3. Create an IPsec connection
3333

3434
1. Go to **Networking** > **Customer connectivity**, and select **Site-to-Site VPN**.
35-
36-
2. Select the **Create IPsec connection**.
37-
35+
2. Select **Create IPsec connection**.
3836
3. Select the following settings (you can leave settings not mentioned here with their default values):
3937
- **Name**: Enter a name.
4038
- **Customer-premises equipment**: Select the CPE you have created in step 1.
4139
- **Dynamic routing gateways**: Select the DRG you have created in step 2.
42-
- **Routes to your on-premises network**: Enter a CIDR range you want to route to Magic WAN
40+
- **Routes to your on-premises network**: Enter a CIDR range you want to route to Magic WAN.
4341
- **Tunnel 1**
4442
- **Name**: Enter a name.
4543
- Select **Provide custom shared secret**.
@@ -63,7 +61,6 @@ You need to have pre-shared key to establish the IPsec tunnel. Refer to this [ex
6361
- **Perfect forward secrecy Diffie-Hellman group**: **GROUP14**
6462
- **Tunnel 2**
6563
- Repeat the above steps for Tunnel 2. Select the right IP for **IPv4 inside tunnel interface - CPE**: `10.200.2.0/31` and **IPv4 inside tunnel interface - Oracle**: `10.200.2.1/31`
66-
6764
4. Select **Create IPsec connection**
6865

6966
## Magic WAN
@@ -75,12 +72,12 @@ After configuring the Oracle Site-to-site VPN connection and the tunnels as ment
7572
1. Refer to [Add tunnels](/magic-wan/configuration/manually/how-to/configure-tunnels/#add-tunnels) to learn how to add an IPsec tunnel. When creating your IPsec tunnel, make sure you define the following settings:
7673
- **Tunnel name**: Enter a name.
7774
- **Interface address**: Enter the internal tunnel IP on the Cloudflare side of the IPsec tunnel. In this example, it is `10.200.1.0/31`.
78-
- **Customer endpoint**: The Oracle VPN public IP address
75+
- **Customer endpoint**: The Oracle VPN public IP address.
7976
- **Cloudflare endpoint**: Enter your Cloudflare anycast IP address.
8077
- **Health check type**: **Request**
8178
- **Health check direction**: **Unidirectional**
8279
- **Health check target**: **Default**
83-
- **Pre-shared key**: Choose **Use my own pre-shared key**, and enter the pre-shared key you created in the Prerequisites section
80+
- **Pre-shared key**: Choose **Use my own pre-shared key**, and enter the pre-shared key you created in the Prerequisites section.
8481
- **Replay protection**: **Enabled**.
8582
2. Select **Add tunnels**.
8683
3. Repeat the above steps for Tunnel 2. Chose the same Cloudflare anycast IP address and select the right IP for **Interface address**: `10.200.2.0/31`

0 commit comments

Comments
 (0)