Skip to content

Commit 472a2a9

Browse files
vars
1 parent a3c04e8 commit 472a2a9

File tree

2 files changed

+10
-4
lines changed

2 files changed

+10
-4
lines changed

src/content/docs/magic-wan/configuration/manually/third-party/aruba-edgeconnect.mdx

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,5 +9,8 @@ import { Render } from "~/components";
99
<Render file="magic-wan/third-party/aruba-edgeconnect"
1010
product="networking-services"
1111
params={{
12-
productName: "Magic WAN"
12+
productName: "Magic WAN",
13+
tunnelHealthCheckUrl: "/magic-wan/reference/tunnel-health-checks/",
14+
magicFirewallUrl: "/magic-firewall/",
15+
gatewayUrl: "/cloudflare-one/policies/gateway/"
1316
}} />

src/content/partials/networking-services/magic-wan/third-party/aruba-edgeconnect.mdx

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,9 @@
11
---
22
params:
33
- productName
4+
- tunnelHealthCheckUrl
5+
- magicFirewallUrl
6+
- gatewayUrl
47
---
58

69
import { Details } from "~/components"
@@ -83,7 +86,7 @@ We use Aruba Orchestrator's Business Intent Overlays to create intuitive policie
8386

8487
<Details header="GRE tunnel configuration">
8588

86-
Cloudflare's [tunnel health checks](/magic-transit/reference/tunnel-health-checks/) are ping reply packets encapsulated in GRE packets. The source IP is the Edgeconnect WAN interface used to establish a tunnel, and the destination IP is Cloudflare servers. These packets need to be sent directly from the WAN interface and not through the established tunnels.
89+
Cloudflare's <a href={props.tunnelHealthCheckUrl}>tunnel health checks</a>] are ping reply packets encapsulated in GRE packets. The source IP is the Edgeconnect WAN interface used to establish a tunnel, and the destination IP is Cloudflare servers. These packets need to be sent directly from the WAN interface and not through the established tunnels.
8790

8891
To create the overlay policy:
8992

@@ -102,7 +105,7 @@ The service name used to send traffic through the tunnel created in the next ste
102105

103106
<Details header="IPsec tunnel configuration">
104107

105-
Cloudflare's [tunnel health checks](/magic-transit/reference/tunnel-health-checks/) are ping reply packets encapsulated in IPsec packets. The source IP is the Edgeconnect WAN interface used to establish a tunnel, and the destination IP is Cloudflare servers. These packets need to be sent directly from the WAN interface and not through the established tunnels.
108+
Cloudflare's <a href={props.tunnelHealthCheckUrl}>tunnel health checks</a>] are ping reply packets encapsulated in IPsec packets. The source IP is the Edgeconnect WAN interface used to establish a tunnel, and the destination IP is Cloudflare servers. These packets need to be sent directly from the WAN interface and not through the established tunnels.
106109

107110
To create the overlay policy:
108111

@@ -356,4 +359,4 @@ This validates the east-west traffic flow through Cloudflare {props.productName}
356359

357360
At this point, the GRE or IPsec tunnels should be connected from the EdgeConnect appliances to Cloudflare's global network, and traffic is scoped to route over the tunnels using the EdgeConnect Business Intent Overlays.
358361

359-
To begin filtering traffic and gathering analytics, refer to the [Magic Firewall documentation](/magic-firewall/) to learn how to create filters for east-west inter-branch traffic and the [Secure Web Gateway documentation](/cloudflare-one/policies/gateway/) to learn how to configure Gateway policies if you decide to send traffic from your local private subnets to the Internet through Cloudflare Gateway.
362+
To begin filtering traffic and gathering analytics, refer to the <a href={prps.magicFirewallUrl}>Magic Firewall documentation</a> to learn how to create filters for east-west inter-branch traffic and the <a href={prps.gatewayUrl}>Secure Web Gateway documentation</a> to learn how to configure Gateway policies if you decide to send traffic from your local private subnets to the Internet through Cloudflare Gateway.

0 commit comments

Comments
 (0)