You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Data is aggregated over time intervals that vary based on your selected zoom level. For example, a daily view shows 24-hour averages, which can flatten out short-term traffic spikes. As a result, longer time intervals will display lower peak bandwidth values compared to more granular views like five-minute intervals.
27
27
28
28
Refer to [Network Analytics](/analytics/network-analytics/) documentation to learn more.
29
29
30
30
## Network traffic data filters
31
31
32
-
<Render
33
-
file="analytics/network-traffic-filters"
34
-
product="networking-services"
35
-
params={{ magicWord: props.magicWord }}
36
-
/>
32
+
{props.magicWord==="Magic Transit"&& (
33
+
<>
34
+
<Markdown
35
+
text={`
36
+
Magic Transit customers can account for all traffic flows that ingresses Cloudflare's network, is blocked by DDoS rules or Magic Firewall, and egresses Cloudflare's network. This allows customers to track the total packets and bytes that traverse Cloudflare's network and are ultimately destined for their own network. This will also give Magic Transit customers increased visibility into any traffic flows that are unaccounted for.
Magic WAN customers have increased visibility into the various traffic flows across Cloudflare One products including:
49
+
50
+
- Traffic ingressing to Cloudflare's network via WARP
51
+
- Traffic egressing Cloudflare's network via WARP
52
+
- Traffic egressing Cloudflare's network via Cloudflare Tunnel (cloudflared)
53
+
54
+
`}
55
+
inline={false}
56
+
/>
57
+
</>
58
+
)
59
+
}
60
+
61
+
The complete list of filters includes:
62
+
63
+
- A list of your top tunnels by traffic volume.
64
+
- Traffic source and destination for type of traffic, on-ramps and off-ramps, <GlossaryTooltipterm="IP address">IP addresses</GlossaryTooltip>, and ports.
65
+
- Destination IP ranges and ASNs.
66
+
- Protocols and packet sizes.
67
+
- Samples of all GRE or IPsec tunnel traffic entering or leaving Cloudflare's network.
68
+
- Mitigations applied (such as DDoS and Magic Firewall) to traffic entering Cloudflare.
69
+
70
+
Refer below to [Access Magic Tunnel traffic analytics](#access-magic-tunnel-traffic-analytics) to learn how to access these filters.
3. In the **All Traffic** tab, scroll to **Top Insights** to access network traffic filters. By default, the dashboard shows five items, but you can display up to 25 items at once. Select the drop-down menu to make your change.
77
+
4. (Optional) Hover your mouse over one of the types of traffic. You can then choose to filter for that type of traffic, or exclude it from the results.
78
+
5. You can also apply filters to adjust the scope of information displayed. Scroll to **All traffic** > **Add filter**.
79
+
6. In the **New filter** popover, choose what type of data you want to display from the left dropdown menu, an operator from the middle dropdown menu, and an action from the right dropdown menu. For example:
This lets you examine traffic from specific Source tunnels and/or Destination tunnels.
86
+
87
+
## Feature notes
88
+
89
+
- For Magic Transit customers, `Non-tunnel traffic` will often represent traffic from the public Internet or traffic via [CNIs](/network-interconnect/).
90
+
- For Magic WAN / WAN tunnels customers, `Non-tunnel traffic` refers to traffic outside of GRE or IPsec tunnels. This can include traffic from:
0 commit comments