You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/partials/networking-services/magic-wan/third-party/aruba-edgeconnect.mdx
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,9 @@
1
1
---
2
2
params:
3
3
- productName
4
+
- tunnelHealthCheckUrl
5
+
- magicFirewallUrl
6
+
- gatewayUrl
4
7
---
5
8
6
9
import { Details } from"~/components"
@@ -83,7 +86,7 @@ We use Aruba Orchestrator's Business Intent Overlays to create intuitive policie
83
86
84
87
<Detailsheader="GRE tunnel configuration">
85
88
86
-
Cloudflare's [tunnel health checks](/magic-transit/reference/tunnel-health-checks/) are ping reply packets encapsulated in GRE packets. The source IP is the Edgeconnect WAN interface used to establish a tunnel, and the destination IP is Cloudflare servers. These packets need to be sent directly from the WAN interface and not through the established tunnels.
89
+
Cloudflare's <ahref={props.tunnelHealthCheckUrl}>tunnel health checks</a>] are ping reply packets encapsulated in GRE packets. The source IP is the Edgeconnect WAN interface used to establish a tunnel, and the destination IP is Cloudflare servers. These packets need to be sent directly from the WAN interface and not through the established tunnels.
87
90
88
91
To create the overlay policy:
89
92
@@ -102,7 +105,7 @@ The service name used to send traffic through the tunnel created in the next ste
102
105
103
106
<Detailsheader="IPsec tunnel configuration">
104
107
105
-
Cloudflare's [tunnel health checks](/magic-transit/reference/tunnel-health-checks/) are ping reply packets encapsulated in IPsec packets. The source IP is the Edgeconnect WAN interface used to establish a tunnel, and the destination IP is Cloudflare servers. These packets need to be sent directly from the WAN interface and not through the established tunnels.
108
+
Cloudflare's <ahref={props.tunnelHealthCheckUrl}>tunnel health checks</a>] are ping reply packets encapsulated in IPsec packets. The source IP is the Edgeconnect WAN interface used to establish a tunnel, and the destination IP is Cloudflare servers. These packets need to be sent directly from the WAN interface and not through the established tunnels.
106
109
107
110
To create the overlay policy:
108
111
@@ -356,4 +359,4 @@ This validates the east-west traffic flow through Cloudflare {props.productName}
356
359
357
360
At this point, the GRE or IPsec tunnels should be connected from the EdgeConnect appliances to Cloudflare's global network, and traffic is scoped to route over the tunnels using the EdgeConnect Business Intent Overlays.
358
361
359
-
To begin filtering traffic and gathering analytics, refer to the [Magic Firewall documentation](/magic-firewall/) to learn how to create filters for east-west inter-branch traffic and the [Secure Web Gateway documentation](/cloudflare-one/policies/gateway/) to learn how to configure Gateway policies if you decide to send traffic from your local private subnets to the Internet through Cloudflare Gateway.
362
+
To begin filtering traffic and gathering analytics, refer to the <ahref={prps.magicFirewallUrl}>Magic Firewall documentation</a> to learn how to create filters for east-west inter-branch traffic and the <ahref={prps.gatewayUrl}>Secure Web Gateway documentation</a> to learn how to configure Gateway policies if you decide to send traffic from your local private subnets to the Internet through Cloudflare Gateway.
0 commit comments