Skip to content

Commit 5ee0f2b

Browse files
Fix issue: WorkspaceTaskSubType.META_DESCRIPTION
1 parent e469a23 commit 5ee0f2b

File tree

1 file changed

+1
-16
lines changed

1 file changed

+1
-16
lines changed
Lines changed: 1 addition & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1 @@
1-
---
2-
pcx_content_type: concept
3-
title: Magic Transit egress
4-
sidebar:
5-
order: 4
6-
7-
---
8-
9-
The suggestions in the [Minimal ruleset](/magic-firewall/best-practices/minimal-ruleset/) and [Extended ruleset](/magic-firewall/best-practices/extended-ruleset/) are recommendations for ingress traffic.
10-
11-
For Magic Transit egress traffic, consider the following information:
12-
13-
* The Magic Firewall rules will apply to both Magic Transit ingress and egress traffic passing via Cloudflare.
14-
* Magic Firewall is not stateful for your Magic Transit egress traffic.
15-
* Magic Firewall is not stateful in both directions after DDoS mitigations.
16-
* If you have a Magic Firewall "default drop" catchall rule for ingress traffic, you will need to add an earlier rule to permit traffic sourced from your Magic Transit prefix with the destination as **any** to allow outbound egress traffic.
1+
---\npcx_content_type: concept\ntitle: Magic Transit egress\ndescription: Learn best practices for configuring Magic Transit egress traffic with Cloudflare Magic Firewall. Understand ruleset logic and traffic management.\nsidebar:\n order: 4\n\n---\n\nThe suggestions in the [Minimal ruleset](/magic-firewall/best-practices/minimal-ruleset/) and [Extended ruleset](/magic-firewall/best-practices/extended-ruleset/) are recommendations for ingress traffic.\n\nFor Magic Transit egress traffic, consider the following information:\n\n* The Magic Firewall rules will apply to both Magic Transit ingress and egress traffic passing via Cloudflare.\n* Magic Firewall is not stateful for your Magic Transit egress traffic.\n* Magic Firewall is not stateful in both directions after DDoS mitigations.\n* If you have a Magic Firewall "default drop" catchall rule for ingress traffic, you will need to add an earlier rule to permit traffic sourced from your Magic Transit prefix with the destination as **any** to allow outbound egress traffic.

0 commit comments

Comments
 (0)