|
8 | 8 | - magicWANecmp? |
9 | 9 | - createPath |
10 | 10 | - tunnelEndpoints |
11 | | - - ipRanges? |
12 | 11 | --- |
13 | 12 |
|
14 | | -import { GlossaryTooltip, Markdown, AnchorHeading, Render, TabItem, Tabs } from "~/components"; |
| 13 | +import { Aside, GlossaryTooltip, Markdown, AnchorHeading, Render, TabItem, Tabs } from "~/components"; |
15 | 14 |
|
16 | 15 | :::note |
17 | 16 | If you are connecting to Cloudflare via a [Direct CNI connection](/network-interconnect/express-cni/), refer to <a href={props.BGPpath}>BGP peering</a> to learn how to take advantage of this [routing](https://www.cloudflare.com/learning/network-layer/what-is-routing/) protocol. If not, continue reading. |
@@ -68,6 +67,29 @@ In the example below, `TUNNEL_2_IAD` is likely to receive twice as much traffic |
68 | 67 | ) |
69 | 68 | } |
70 | 69 |
|
| 70 | +{ props.magicProduct === "Magic Transit" && ( |
| 71 | + <> |
| 72 | + <AnchorHeading title="Map routes prefixes bigger than onboarded prefixes" depth={2} /> |
| 73 | + <Markdown |
| 74 | + text={` |
| 75 | + If you have multiple onboarded \`/24\` subnets that belong to a larger contiguous block, you can configure a summary static route for the corresponding supernet (like a \`/23\` or a \`/22\`) instead of adding each \`/24\` individually. This eliminates the need to configure each \`/24\` route individually, as all traffic will be routed through the same GRE tunnels. |
| 76 | +
|
| 77 | + For example, if you have two tunnels: |
| 78 | +
|
| 79 | + - \`192.0.2.0/24\` |
| 80 | + - \`192.0.3.0/24\` |
| 81 | +
|
| 82 | + You can summarize these into a single \`192.0.2.0/23\`. |
| 83 | +
|
| 84 | + Refer to [Add tunnels](/magic-transit/how-to/configure-tunnels/#add-tunnels) to learn more about configuring GRE tunnels. |
| 85 | + `} |
| 86 | + inline={false} |
| 87 | + /> |
| 88 | + <Aside type="note">These address blocks are a part of <a href="https://datatracker.ietf.org/doc/rfc5737/" target="_blank" rel="noopener noreferrer">RFC 5737</a> and are reserved for use as examples in documentation.</Aside> |
| 89 | + </> |
| 90 | + ) |
| 91 | +} |
| 92 | + |
71 | 93 | ## Scoped routes for anycast GRE or IPsec tunnels |
72 | 94 |
|
73 | 95 | To reduce latency for your <GlossaryTooltip term="anycast">anycast</GlossaryTooltip> <GlossaryTooltip term="GRE tunnel">GRE</GlossaryTooltip> or <GlossaryTooltip term="IPsec tunnel">IPsec</GlossaryTooltip> tunnel configurations, especially if you operate your own anycast network, Cloudflare can steer your traffic by scoping it to specific Cloudflare data center regions. Equal cost routes maintain an equal cost on a global scale so long as the routes are not scoped to specific regions. For example, if you use region-scoped routes, traffic from end users in New York will always land at their Ashburn network unless that tunnel is unhealthy. |
@@ -107,17 +129,42 @@ Cloudflare has nine geographic regions across the world which are listed below. |
107 | 129 |
|
108 | 130 | Configure scoping for your traffic in the **Region code** section when adding or editing a static route. Refer to [Create a static route](#create-a-static-route) and [Edit a static route](#edit-a-static-route) more information. |
109 | 131 |
|
110 | | -## Allowed IP ranges |
| 132 | +{ props.magicProduct === "Magic Transit" && ( |
| 133 | + <> |
| 134 | + <AnchorHeading title="Allowed IP ranges" depth={2} /> |
| 135 | + <Markdown |
| 136 | + text={` |
| 137 | +Allowed IP ranges for static routes are: |
| 138 | +
|
| 139 | +- Cloudflare leased IPs assigned to your account |
| 140 | +- BYOIP prefixes. For BYOIP, you have the option to use them as-is, or to create a summary route to cover all your onboarded prefixes. |
| 141 | + `} |
| 142 | + inline={false} |
| 143 | + /> |
| 144 | + </> |
| 145 | + ) |
| 146 | +} |
111 | 147 |
|
112 | | -By default, you can only add static routes with [RFC 1918](https://datatracker.ietf.org/doc/html/rfc1918) IP prefixes like: |
| 148 | +{ props.magicProduct === "Magic WAN" && ( |
| 149 | + <> |
| 150 | + <AnchorHeading title="Allowed IP ranges" depth={2} /> |
| 151 | + <Markdown |
| 152 | + text={` |
| 153 | +By default, you can only add static routes with RFC 1918 IP prefixes like: |
| 154 | +- \`10.0.0.0/8\` |
| 155 | +- \`172.16.0.0/12\` |
| 156 | +- \`192.168.0.0/16\` |
113 | 157 |
|
114 | | -- `10.0.0.0/8` |
115 | | -- `172.16.0.0/12` |
116 | | -- `192.168.0.0/16` |
| 158 | +When using Magic WAN and Cloudflare Tunnel together, remember to consider the IP ranges utilized in the static routes of Cloudflare Tunnel when selecting static routes for Magic WAN. For more information, refer to [Cloudflare Tunnel](/magic-wan/zero-trust/cloudflare-tunnel/). |
| 159 | +
|
| 160 | +For prefixes outside RFC 1918 contact your Cloudflare customer service manager. |
| 161 | + `} |
| 162 | + inline={false} |
| 163 | + /> |
| 164 | + </> |
| 165 | + ) |
| 166 | +} |
117 | 167 |
|
118 | | -<Markdown text={props.ipRanges} /> |
119 | | -If your use case requires IP prefixes outside RFC 1918, contact your Cloudflare |
120 | | -customer service manager. |
121 | 168 |
|
122 | 169 | ## Create a static route |
123 | 170 |
|
|
0 commit comments