Skip to content

Commit 6565e1b

Browse files
non-ascii chars (#18568)
1 parent c7718b3 commit 6565e1b

File tree

2 files changed

+19
-19
lines changed

2 files changed

+19
-19
lines changed

src/content/docs/magic-wan/configuration/manually/third-party/aruba-edgeconnect.mdx

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -313,11 +313,11 @@ To validate east-west traffic flow, perform a traceroute as shown in the example
313313

314314
The example shows a client in GCP East (`10.3.0.3`), which can ping the private IP of a client in GCP West (`10.30.0.4`).
315315

316-
The traceroute shows the path going from the client (`10.3.0.3`) <br/>
317-
→ to the GCP East lan0 IP on the EdgeConnect (`10.3.0.2`) <br/>
318-
→ to the Cloudflare private GRE endpoint IP (`10.4.8.11`) <br/>
319-
→ to the GCP West lan0 IP on the West EdgeConnect (`10.30.0.3`) <br/>
320-
→ to the GCP West client (`10.30.0.4`).
316+
The traceroute shows the path going from the client (`10.3.0.3`) to:
317+
- the GCP East lan0 IP on the EdgeConnect (`10.3.0.2`)
318+
- the Cloudflare private GRE endpoint IP (`10.4.8.11`)
319+
- the GCP West lan0 IP on the West EdgeConnect (`10.30.0.3`)
320+
- the GCP West client (`10.30.0.4`)
321321

322322
This validates the east-west traffic flow through Cloudflare Magic WAN.
323323

@@ -343,11 +343,11 @@ To validate east-west traffic flow, perform a traceroute as shown in the example
343343

344344
The example shows a client in GCP Central (`10.22.0.9`), which can ping the private IP of a client in GCP West (`10.77.0.10`).
345345

346-
The traceroute shows the path going from the client (`10.22.0.9`) <br/>
347-
→ to the GCP Central lan0 IP on the EdgeConnect (`10.22.0.2`) <br/>
348-
→ to the Cloudflare private IPsec endpoint IP (`192.168.10.11`) <br/>
349-
→ to the GCP West EdgeConnect private IPsec endpoint IP (`192.168.15.10`) <br/>
350-
→ to the GCP West client (`10.77.0.10`).
346+
The traceroute shows the path going from the client (`10.22.0.9`) to:
347+
- the GCP Central lan0 IP on the EdgeConnect (`10.22.0.2`)
348+
- the Cloudflare private IPsec endpoint IP (`192.168.10.11`)
349+
- the GCP West EdgeConnect private IPsec endpoint IP (`192.168.15.10`)
350+
- the GCP West client (`10.77.0.10`)
351351

352352
This validates the east-west traffic flow through Cloudflare Magic WAN.
353353

src/content/docs/magic-wan/reference/device-compatibility.mdx

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -18,25 +18,25 @@ The matrix below includes example devices and links to the integration guides.
1818
| Cisco Meraki | Compatibility on roadmap | Compatibility on roadmap |
1919
| [Cisco SD-WAN](/magic-wan/configuration/manually/third-party/viptela/) |||
2020
| [Fortinet](/magic-wan/configuration/manually/third-party/fortinet/)| Specifications compatible[^1] ||
21-
| [Furukawa Electric FITELnet](/magic-wan/configuration/manually/third-party/fitelnet/) | ||
22-
| [Juniper Networks SRX Series Firewalls](/magic-wan/configuration/manually/third-party/juniper/) | ||
21+
| [Furukawa Electric FITELnet](/magic-wan/configuration/manually/third-party/fitelnet/) | - ||
22+
| [Juniper Networks SRX Series Firewalls](/magic-wan/configuration/manually/third-party/juniper/) | - ||
2323
| [Palo Alto Networks Next-Generation Firewall](/magic-wan/configuration/manually/third-party/palo-alto/) |||
2424
| [pfSense](/magic-wan/configuration/manually/third-party/pfsense/)|||
2525
| Prisma SD-WAN (Palo Alto) | Specifications compatible[^1] | Specifications compatible[^1] |
2626
| Riverbed | Specifications compatible[^1] | Specifications compatible[^1] |
27-
| [SonicWall](/magic-wan/configuration/manually/third-party/sonicwall/)| ||
27+
| [SonicWall](/magic-wan/configuration/manually/third-party/sonicwall/)| - ||
2828
| [Sophos Firewall](/magic-wan/configuration/manually/third-party/sophos-firewall/) |||
29-
| [strongSwan](/magic-wan/configuration/manually/third-party/strongswan/) | ||
29+
| [strongSwan](/magic-wan/configuration/manually/third-party/strongswan/) | - ||
3030
| Velocloud | Compatibility on roadmap | Compatibility on roadmap |
3131
| Versa | Specifications compatible[^1] | Compatibility on roadmap |
3232
| [VyOS](/magic-wan/configuration/manually/third-party/vyos/)|||
3333

3434
| VPN | GRE tunnel | IPsec tunnel |
3535
| --- | --- | --- |
36-
| [Alibaba Cloud VPN Gateway](/magic-wan/configuration/manually/third-party/alibaba-cloud/) | ||
37-
| [Amazon AWS Transit Gateway](/magic-wan/configuration/manually/third-party/aws/) | ||
38-
| [Azure VPN Gateway](/magic-wan/configuration/manually/third-party/azure/) | ||
39-
| [GCP Cloud VPN](/magic-wan/configuration/manually/third-party/google/) | ||
40-
| [Oracle Cloud](/magic-wan/configuration/manually/third-party/oracle/) | ||
36+
| [Alibaba Cloud VPN Gateway](/magic-wan/configuration/manually/third-party/alibaba-cloud/) | - ||
37+
| [Amazon AWS Transit Gateway](/magic-wan/configuration/manually/third-party/aws/) | - ||
38+
| [Azure VPN Gateway](/magic-wan/configuration/manually/third-party/azure/) | - ||
39+
| [GCP Cloud VPN](/magic-wan/configuration/manually/third-party/google/) | - ||
40+
| [Oracle Cloud](/magic-wan/configuration/manually/third-party/oracle/) | - ||
4141

4242
[^1]: Specifications compatible per vendor documentation

0 commit comments

Comments
 (0)