Skip to content

Commit 11d6aca

Browse files
deleted non-ascii chars (#18562)
1 parent 8991757 commit 11d6aca

34 files changed

+67
-67
lines changed

src/content/docs/magic-cloud-networking/get-started.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ sidebar:
66

77
---
88

9-
To get started with Magic Cloud Networking you need to give Cloudflare permission to interact with cloud providers on your behalf. You might have multiple provider accounts for the same cloud provider for example, you might want Cloudflare to manage virtual private clouds (VPCs) belonging to two different AWS accounts.
9+
To get started with Magic Cloud Networking you need to give Cloudflare permission to interact with cloud providers on your behalf. You might have multiple provider accounts for the same cloud provider - for example, you might want Cloudflare to manage virtual private clouds (VPCs) belonging to two different AWS accounts.
1010

11-
Once Cloudflare has the credentials required to access your cloud environments, Magic Cloud Networking will automatically begin discovering your cloud resources like routing tables and virtual private networks. Discovered resources appear in your [Cloud resource catalog](/magic-cloud-networking/manage-resources/#cloud-resource-catalog).
11+
Once Cloudflare has the credentials required to access your cloud environments, Magic Cloud Networking will automatically begin discovering your cloud resources - like routing tables and virtual private networks. Discovered resources appear in your [Cloud resource catalog](/magic-cloud-networking/manage-resources/#cloud-resource-catalog).
1212

1313
## 1. Set up cloud credentials
1414

@@ -42,7 +42,7 @@ Before you can connect Magic Cloud Networking to your cloud provider, you first
4242
}
4343
```
4444

45-
2. Follow the [instructions on AWS](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_create.html) to create an IAM user up until step 4 do not check the **Provide users access to the AWS Management Console** option.
45+
2. Follow the [instructions on AWS](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_create.html) to create an IAM user up until step 4 - do not check the **Provide users access to the AWS Management Console** option.
4646

4747
3. **In Give users permissions to manage their own security credentials** (step 7 of the AWS instructions) select **Attach policies directly**, and add the following policies:
4848
- `AmazonEC2ReadOnlyAccess`

src/content/docs/magic-cloud-networking/manage-resources.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ sidebar:
1010

1111
Your cloud environment is built from individual cloud resources, like virtual private clouds (VPCs), subnets, virtual machines (VMs), route tables, and routes. Magic Cloud Networking discovers all of your cloud resources and stores their configuration and status in the Cloud resource catalog, a read-only snapshot of your cloud environment. Discovery runs regularly in the background, keeping your catalog up to date as your environment changes.
1212

13-
When Magic Cloud Networking creates or modifies configurations in the cloud provider for example, to deploy a managed IPsec on-ramp for Magic WAN the created resources will be labeled as **Managed** in the resource catalog.
13+
When Magic Cloud Networking creates or modifies configurations in the cloud provider - for example, to deploy a managed IPsec on-ramp for Magic WAN - the created resources will be labeled as **Managed** in the resource catalog.
1414

1515
To browse the resources in your catalog:
1616

src/content/docs/magic-network-monitoring/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Provides HTTP DDoS attack protection for zones onboarded to Cloudflare in additi
7676

7777
<RelatedProduct header="Cloudflare Network Interconnect" href="/network-interconnect/" product="network-interconnect">
7878

79-
Connects your network infrastructure directly with Cloudflare rather than using the public Internet for a more reliable and secure experience.
79+
Connects your network infrastructure directly with Cloudflare - rather than using the public Internet - for a more reliable and secure experience.
8080

8181
</RelatedProduct>
8282

src/content/docs/magic-transit/get-started.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ import { GlossaryTooltip, Render } from "~/components";
99

1010
Before you can begin using Magic Transit, be sure to complete the onboarding steps below. Cloudflare can significantly accelerate this timeline during active-attack scenarios.
1111

12-
## ​​1. Scope your configuration
12+
## 1. Scope your configuration
1313

1414
The onboarding process begins with an initial kickoff call where Cloudflare engages with your organization to confirm the scope and timeline for setting up Magic Transit.
1515

src/content/docs/magic-transit/how-to/advertise-prefixes.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Withdrawing a prefix should propagate across Cloudflare's global network almost
6868

6969
## Border Gateway Protocol (BGP) control for advertisements
7070

71-
Use BGP to control the advertisement status of your prefix advertised or withdrawn from Cloudflare's global network for on-demand deployment scenarios. BGP Control works by establishing BGP sessions to Cloudflare's globally distributed Route Reflectors, which will initiate propagation of your prefix advertisement across Cloudflare's global network.
71+
Use BGP to control the advertisement status of your prefix - advertised or withdrawn - from Cloudflare's global network for on-demand deployment scenarios. BGP Control works by establishing BGP sessions to Cloudflare's globally distributed Route Reflectors, which will initiate propagation of your prefix advertisement across Cloudflare's global network.
7272

7373
Prefixes can be advertised from Cloudflare's network in a supported on-demand method such as BGP Control, or dynamically via the UI, API, or [Magic Network Monitoring](/magic-transit/magic-network-monitoring/). During the onboarding of your on-demand prefixes, please specify whether you want BGP-controlled advertisement or dynamic advertisement (via dashboard/API/Magic Network Monitoring).
7474

src/content/docs/magic-transit/how-to/run-endpoint-health-checks.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ sidebar:
66

77
---
88

9-
Magic Transit uses endpoint health checks to determine the overall health of your [inter-network connections](/magic-transit/reference/tunnels/). Probes originate from Cloudflare infrastructure, outside customer network namespaces, and target IP addresses deep within your network, beyond the tunnel-terminating border router. These long distance probes are purely diagnostic.
9+
Magic Transit uses endpoint health checks to determine the overall health of your [inter-network connections](/magic-transit/reference/tunnels/). Probes originate from Cloudflare infrastructure, outside customer network namespaces, and target IP addresses deep within your network, beyond the tunnel-terminating border router. These "long distance" probes are purely diagnostic.
1010

1111
When choosing which endpoint IP addresses to monitor with health checks, use these guidelines:
1212

src/content/docs/magic-transit/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Magic Firewall is a firewall-as-a-service (FWaaS) delivered from the Cloudflare
4646
</RelatedProduct>
4747

4848
<RelatedProduct header="Cloudflare Network Interconnect" href="/network-interconnect/" product="network-interconnect">
49-
Cloudflare Network Interconnect (CNI) allows you to connect your network infrastructure directly with Cloudflare rather than using the public Internet for a more reliable and secure experience.
49+
Cloudflare Network Interconnect (CNI) allows you to connect your network infrastructure directly with Cloudflare - rather than using the public Internet - for a more reliable and secure experience.
5050
</RelatedProduct>
5151

5252
<RelatedProduct header="DDoS Protection" href="/ddos-protection/" product="ddos-protection">

src/content/docs/magic-transit/network-interconnect.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ head:
1010

1111
import { GlossaryTooltip } from "~/components";
1212

13-
Cloudflare Network Interconnect (CNI) allows you to connect your network infrastructure directly with Cloudflare rather than using the public Internet for a more reliable and secure experience. With CNI, you can bring Cloudflare's full suite of network functions to your physical network edge.
13+
Cloudflare Network Interconnect (CNI) allows you to connect your network infrastructure directly with Cloudflare - rather than using the public Internet - for a more reliable and secure experience. With CNI, you can bring Cloudflare's full suite of network functions to your physical network edge.
1414

1515
Use Cloudflare Network Interconnect with Magic Transit to improve throughput and harden infrastructure to attack.
1616

@@ -30,7 +30,7 @@ With Classic CNI you need to [set up an onboarding process](/network-interconnec
3030

3131
With Classic CNI, you can create:
3232

33-
- **GRE tunnels over CNI**: For ingress and egress traffic. To accommodate overhead from additional headers, you will need to set the MTU size of your GRE tunnel interface to 1,476 bytes and your MSS clamp to be 1,436 bytes. These are used to backhaul data from the data center where traffic is ingested close to the end user to the facility with the CNI link.
33+
- **GRE tunnels over CNI**: For ingress and egress traffic. To accommodate overhead from additional headers, you will need to set the MTU size of your GRE tunnel interface to 1,476 bytes and your MSS clamp to be 1,436 bytes. These are used to backhaul data from the data center where traffic is ingested - close to the end user - to the facility with the CNI link.
3434
- **CNI connections without GRE tunnels**: For ingress traffic from Cloudflare to customer device. There is no need to set <GlossaryTooltip term="maximum segment size (MSS)">MSS clamping</GlossaryTooltip>, as this supports IP packets with 1,500 bytes.
3535

3636
For more information about Network Interconnect, refer to the [Cloudflare Network Interconnect documentation](/network-interconnect/).

src/content/docs/magic-wan/configuration/connector/configure-hardware-connector/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ If there is a firewall deployed upstream of the Magic WAN Connector, configure t
115115

116116
### WAN with a static IP address
117117

118-
After activating your Connector, you can use it in a network configuration with the WAN interface set to a static IP address that is, an Internet configuration that is not automatically set by DHCP.
118+
After activating your Connector, you can use it in a network configuration with the WAN interface set to a static IP address - that is, an Internet configuration that is not automatically set by DHCP.
119119

120120
To use your Connector on a network configuration with a static IP:
121121

src/content/docs/magic-wan/configuration/connector/configure-hardware-connector/sfp-port-information.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Cloudflare successfully deployed commonly available 10G modules that are also co
3636
- StarTech Dell EMC Twinax SFP+ DAC
3737
- Ubiquiti multi-mode, duplex, 10 Gbps fiber transceiver modules
3838

39-
Keep in mind that SFP+ modules/cables have to be compatible at both ends, that is, both sides of the connection should be 10 Gbps, and it should really be the same module/cable that is compatible with both hardware stacks. The choice of module/optic/cable ultimately depends on your specific interoperability needs, and it is much less of a plug and play situation as one expects from RJ45.
39+
Keep in mind that SFP+ modules/cables have to be compatible at both ends, that is, both sides of the connection should be 10 Gbps, and it should really be the same module/cable that is compatible with both hardware stacks. The choice of module/optic/cable ultimately depends on your specific interoperability needs, and it is much less of a "plug and play" situation as one expects from RJ45.
4040

4141
## Recover from unsupported SFP+ inputs
4242

0 commit comments

Comments
 (0)