You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/magic-network-monitoring/faq.mdx
+13-12Lines changed: 13 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,9 +4,21 @@ title: FAQ
4
4
structured_data: true
5
5
sidebar:
6
6
order: 11
7
-
8
7
---
9
8
9
+
## Can I send NetFlow/sFlow data to Cloudflare in a secure, encrypted way?
10
+
11
+
Yes. Both enterprise and free customers can send encrypted network flow data to Cloudflare.
12
+
13
+
Enterprise customers with Magic Transit or Magic WAN are able to send encrypted network flow data via an IPsec tunnel to Cloudflare's network. You can achieve this by:
14
+
15
+
1. Configuring your [NetFlow](/magic-network-monitoring/routers/netflow-ipfix-config/) or [sFlow](/magic-network-monitoring/routers/sflow-config/) data to be sent to Cloudflare's network for parsing.
16
+
2. Directing that network flow data to be sent over [Magic Transit IPsec tunnels](/magic-transit/how-to/configure-tunnels/) or [Magic WAN IPsec tunnels](/magic-wan/configuration/manually/how-to/configure-tunnels/) to Cloudflare's network.
17
+
18
+
Cloudflare's network will then identify this traffic via the destination IP address/port, and direct the network flow traffic to Magic Network Monitoring for parsing.
19
+
20
+
Free customers can route their network flow traffic through a device that is running the WARP client. Then, network flow traffic can be forwarded from the WARP enabled device to Cloudflare's network flow endpoints. You can learn more about this in the [Encrypt network flow data tutorial](/magic-network-monitoring/tutorials/encrypt-network-flow-data).
21
+
10
22
## I have Auto-Advertisement enabled and it was triggered by an attack. Do I have to turn Magic Transit off manually?
11
23
12
24
Once Auto-Advertisement is activated for an IP prefix that is under attack, the IP prefix will continue to be advertised by Cloudflare even if the attack ends. You will then need to manually disable advertisement for that IP prefix. Refer to [Configure dynamic advertisement](/byoip/concepts/dynamic-advertisement/best-practices/#configure-dynamic-advertisement) to learn how to withdraw your prefixes, and stop using Magic Transit.
@@ -41,14 +53,3 @@ It is recommended that you set your router's public IP address and network flow
41
53
Currently, all data received from a customer's router goes to our servers in the US. If you enable data sovereignty in Europe, you cannot currently use Magic Network Monitoring.
42
54
43
55
GraphQL analytics is retained for 90 days for enterprise customers. For non-enterprise customers, data retention is seven days. Cloudflare also retains data for six hours in the US, for threshold crossing detection.
44
-
45
-
## Can I send NetFlow/sFlow data to Cloudflare in a secure, encrypted way?
46
-
47
-
Yes. Enterprise customers with Magic Transit or Magic WAN are able to send encrypted network flow data via an IPsec tunnel to Cloudflare's network. You can achieve this by:
48
-
49
-
1. Configuring your [NetFlow](/magic-network-monitoring/routers/netflow-ipfix-config/) or [sFlow](/magic-network-monitoring/routers/sflow-config/) data to be sent to Cloudflare’s network for parsing.
50
-
2. Directing that network flow data to be sent over a [Magic Transit IPsec tunnels](/magic-transit/how-to/configure-tunnels/) or [Magic WAN IPsec tunnels](/magic-wan/configuration/manually/how-to/configure-tunnels/) to Cloudflare's network.
51
-
52
-
Cloudflare's network will then identify this traffic via the destination IP address/port, and direct the network flow traffic to Magic Network Monitoring for parsing.
53
-
54
-
This feature is not available to Magic Network Monitoring free customers.
Copy file name to clipboardExpand all lines: src/content/docs/magic-network-monitoring/get-started.mdx
+3-6Lines changed: 3 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,16 +3,13 @@ title: Get started
3
3
pcx_content_type: get-started
4
4
sidebar:
5
5
order: 2
6
-
7
6
---
8
7
9
-
import { GlossaryTooltip } from"~/components"
10
-
11
-
To begin using Magic Network Monitoring, complete the list of tasks below. If you are an Enterprise customer, Cloudflare can significantly accelerate the timeline during active-attack scenarios.
8
+
import { GlossaryTooltip } from"~/components";
12
9
13
-
If you are an Enterprise customer and would like to use Magic Network Monitoring and Magic Transit On Demand together, begin by [configuring Magic Transit](/magic-transit/get-started/).
10
+
To begin using Magic Network Monitoring, complete the list of tasks below.
14
11
15
-
There is also a [free version](/magic-network-monitoring/magic-network-monitoring-free/) of Magic Network Monitoring in a closed beta right now. Refer to it to learn about the functionalities and limits of this version.
12
+
If you are an Enterprise customer, Cloudflare can significantly accelerate the onboarding timeline during active-attack scenarios. Enterprise customers that would like to use Magic Network Monitoring and Magic Transit On Demand together can begin by [configuring Magic Transit](/magic-transit/get-started/).
Detect and receive notifications about attacks based on traffic flows.
23
+
Improve your network visibility and detect DDoS attacks based on traffic flows.
17
24
18
25
</Description>
19
26
20
27
<Plantype="all" />
21
28
22
29
Magic Network Monitoring provides visibility into your network traffic by analyzing network <GlossaryTooltipterm="flow data">flow data</GlossaryTooltip> sent from a customer’s routers. Magic Network Monitoring supports NetFlow v5, NetFlow v9, IPFIX, and sFlow.
23
30
24
-
Enterprise customers can use Magic Network Monitoring with [Magic Transit on-demand](/magic-transit/on-demand/) to monitor their network, identify volumetric DDoS attacks, and activate Magic Transit on-demand to mitigate those attacks.
31
+
Magic Network Monitoring is generally available to everyone with a Cloudflare account by default. You can log in to your Cloudflare dashboard, select your account, then go to **Analytics & Logs** > **Magic Monitoring** to get started.
25
32
26
-
Magic Network Monitoring is automatically enabled for all Magic Transit and Magic WAN enterprise customers. Any enterprise customers without Magic Transit or Magic WAN that are interested in testing Magic Network Monitoring can receive access to the Magic Network Monitoring [free version](/magic-network-monitoring/magic-network-monitoring-free/) by submitting a request to their Cloudflare account team.
33
+
Everyone can use the [free version](/magic-network-monitoring/magic-network-monitoring-free/) of Magic Network Monitoring in a home network, network lab, or business to get end to end visibility across their network traffic. Potential enterprise customers are encouraged to use the free version to run a proof of concept.
34
+
35
+
Enterprise customers can use Magic Network Monitoring with [Magic Transit on-demand](/magic-transit/on-demand/) to monitor their network, identify volumetric DDoS attacks, and activate Magic Transit on-demand to mitigate those attacks.
27
36
28
37
Learn how to [get started](/magic-network-monitoring/get-started/).
29
38
@@ -56,24 +65,32 @@ Set up notifications to learn about an attack.
Copy file name to clipboardExpand all lines: src/content/docs/magic-network-monitoring/magic-network-monitoring-free.mdx
+3-5Lines changed: 3 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,18 +3,16 @@ title: Free version
3
3
pcx_content_type: reference
4
4
sidebar:
5
5
order: 8
6
-
badge:
7
-
text: Beta
8
6
head:
9
7
- tag: title
10
8
content: Magic Network Monitoring free version
11
9
---
12
10
13
-
The free version of Magic Network Monitoring (MNM) is currently in a closed beta. All customers with a Cloudflare account can request early access to the free version of MNM by [filling out this form](https://docs.google.com/forms/d/1umsmwHmXgMesP2t4wH94uVExHaT60tb5RTeawqR_9Cg/edit).
11
+
The free version of Magic Network Monitoring (MNM) is generally available to everyone with a Cloudflare account by default.
14
12
15
-
If you would like your request for early access to MNM to be prioritized, please join [Cloudflare’s Discord server](https://discord.com/invite/cloudflaredev)and ask about early access in the MNM Discord channel. We prioritize Discord community members because Discord creates a great environment for engaging with users, helping with configuration, answering questions, and collecting valuable product feedback.
13
+
All free customers are encouraged to join [Cloudflare's Discord server](https://discord.com/invite/cloudflaredev)to discuss the use cases, configuration, and troubleshooting of Magic Network Monitoring. Free customers are always welcome to provide product feedback and discuss feature requests. The product and engineering team that works on Magic Network Monitoring regularly engages with the Discord community.
16
14
17
-
You can find the channel by joining the Cloudflare Developers Discord server. Then scroll down in the side bar navigation to the **Products** category and select **magic-network-monitoring**.
15
+
You can find the channel by joining the Cloudflare Developers Discord server. Then scroll down in the side bar navigation to the **Cloudflare One** category and select **magic-network-monitoring**.
content: Magic Network Monitoring encrypt network flow data
10
+
---
11
+
12
+
Customers can encrypt the network flow data sent from their router to Cloudflare by routing their network flow traffic through a device running the WARP client. Then, encrypted network flow traffic can be forwarded from the WARP enabled device to Cloudflare's network flow endpoints.
13
+
14
+
To learn more about the WARP client, and to install the WARP client on Linux, macOS, or Windows, you can visit the [WARP client documentation](/cloudflare-one/connections/connect-devices/warp/).
0 commit comments