Skip to content

Commit 68bc044

Browse files
authored
Clarifying anycast on egress
Adds explicit messaging to clarify that the egress traffic reaches Cloudflare at an anycast location where it will exit to the connectivity available in said location to the internet
1 parent 6502697 commit 68bc044

File tree

1 file changed

+1
-0
lines changed
  • src/content/docs/magic-transit/reference

1 file changed

+1
-0
lines changed

src/content/docs/magic-transit/reference/egress.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,3 +13,4 @@ If you have implemented Magic Transit with egress traffic, below is a list of te
1313
- You may need to configure multiple GRE/IPsec tunnels as a way to load-share traffic sent to the Internet via Cloudflare. You can achieve this by applying two different PBR. Thus, traffic sourced from one IP/subnet is routed via one tunnel, and traffic from another IP/subnet is sent out via a different tunnel.
1414
- Your Magic Firewall rules will apply in both directions. Ensure that your Magic Firewall rules are set up for your intended traffic flows, both in and out.
1515
- If using Magic Transit egress then we recommend you set your GRE or IPSEC tunnel health check configuration to [bidirectional](/magic-transit/how-to/configure-tunnels/#add-tunnels), so that Cloudflare health checks are in-sync with the [data plane](https://en.wikipedia.org/wiki/Forwarding_plane) traffic flow.
16+
- After setting up your traffic to egress to your GRE/IPsec tunnel, it is sent encapsulated toward the Cloudflare anycast endpoint. Your ISP will route the encapsulated traffic to a nearby available Cloudflare point of presence where your traffic will exit to the Internet from our connectivity options at that location.

0 commit comments

Comments
 (0)