Skip to content

Commit 1d7fdf2

Browse files
[MWAN] Broken links (#19661)
* corrected legacy hcs links * refined legacy hc partial * changed title
1 parent d83cbd7 commit 1d7fdf2

File tree

6 files changed

+8
-8
lines changed

6 files changed

+8
-8
lines changed

src/content/docs/magic-transit/how-to/bgp-peering.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ import { Render } from "~/components"
1313
params={{
1414
productName: "Magic Transit",
1515
productPath: "/magic-transit/reference/tunnel-health-checks/",
16-
legacyHCs: "/magic-transit/reference/tunnel-health-checks/#legacy-health-checks-system",
16+
legacyHCs: "/magic-transit/reference/tunnel-health-checks/#legacy-bidirectional-health-checks",
1717
asnProduct: "<br /> Magic Transit customers should also be aware of the following: <br /> <ul><li>The Cloudflare side ASN will never be exposed in <code>AS_PATH</code> of anycast announcements from the Cloudflare edge. In those announcements, Cloudflare will always use the Cloudflare ASN of <code>13335</code> optionally prepended with a bring-your-own ASN as described in [Cloudflare ASN vs. your own ASN](/magic-transit/how-to/advertise-prefixes/#cloudflare-asn-vs-your-own-asn)</li><li>The customer device ASN can be a private ASN or the ASN they are using for Magic Transit anycast announcements at the edge: this has no impact on the ASN for the anycast announced prefix at the edge of the Cloudflare global network.</li></ul>",
1818
mtLimitations: "<br /> For Magic Transit customers, BGP with the Magic routing table is separated from the announcement of anycast prefixes at the Cloudflare edge. Anycast withdrawal must be controlled with existing methods documented in [Advertise prefixes](/magic-transit/how-to/advertise-prefixes/).",
1919
productGatewayOrEgress: "Magic Transit with Egress"

src/content/docs/magic-transit/how-to/configure-tunnels.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ import { GlossaryTooltip, Render } from "~/components";
7474

7575
<Render file="tunnel-endpoints/mt-egress" />
7676

77-
### Legacy health checks system
77+
### Legacy bidirectional health checks
7878

7979
<Render file="legacy-hc-system" />
8080

src/content/docs/magic-wan/configuration/manually/how-to/bgp-peering.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ import { Render } from "~/components"
1313
params={{
1414
productName: "Magic WAN",
1515
productPath: "/magic-wan/reference/tunnel-health-checks/",
16-
legacyHCs: "/magic-wan/reference/tunnel-health-checks/#legacy-health-checks-system",
16+
legacyHCs: "/magic-wan/reference/tunnel-health-checks/#legacy-bidirectional-health-checks",
1717
asnProduct: "<br /> Magic WAN customers should also be aware of the following: <br /> <ul><li>The Cloudflare side ASN will be included in the <code>AS_PATH</code> of announced routes to any BGP enabled interconnect.</li><li>The customer chooses their device ASN, which should be different to the Cloudflare-side ASN.</li></ul>",
1818
mtLimitations: " ",
1919
productGatewayOrEgress: "Magic WAN with Gateway"

src/content/docs/magic-wan/configuration/manually/how-to/configure-tunnels.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ import { GlossaryTooltip, Render } from "~/components";
8181
params={{ productPathProbe: "/magic-wan/reference/tunnel-health-checks/" }}
8282
/>
8383

84-
### Legacy health checks system
84+
### Legacy bidirectional health checks
8585

8686
<Render file="legacy-hc-system" product="magic-transit" />
8787

src/content/docs/magic-wan/network-interconnect.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ With Direct CNI you can also setup BGP peering between your network and Cloudfla
2222

2323
### Bidirectional health checks
2424

25-
Bidirectional health checks do not work when you use Direct CNI to onboard your traffic to Cloudflare. You will need to resort to the [legacy health check system](/magic-wan/configuration/manually/how-to/configure-tunnels/#legacy-health-checks-system).
25+
Bidirectional health checks do not work when you use Direct CNI to onboard your traffic to Cloudflare. You will need to resort to the [legacy health check system](/magic-wan/configuration/manually/how-to/configure-tunnels/#legacy-bidirectional-health-checks).
2626

2727
:::note
2828
Do not use Magic WAN Connector with Direct CNI. You can use the Connector with a [Public Peering or a Private Network Interconnection (PNI)](/network-interconnect/pni-and-peering/) if needed.

src/content/partials/magic-transit/legacy-hc-system.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33

44
---
55

6-
For customers using the legacy health check system with a public IP range, Cloudflare recommends that:
6+
For customers using the legacy health check system with a public IP range, Cloudflare recommends:
77

8-
1. You configure the IP address for your tunnel health check target to be one from within the prefix range `172.64.240.252/30`.
9-
2. Apply a policy-based route that matches packets with source IP address equal to the configured tunnel health check target (for example `172.64.240.253/32`), and route them over the tunnel back to Cloudflare.
8+
- Configuring the tunnel health check target IP address to one within the `172.64.240.252/30` prefix range.
9+
- Applying a policy-based route that matches packets with a source IP address equal to the configured tunnel health check target (for example `172.64.240.253/32`), and route them over the tunnel back to Cloudflare.

0 commit comments

Comments
 (0)