Skip to content

Commit 69215df

Browse files
[BGP] Bgp loop prevention info (#22092)
* added new warnings * refined text * added note * refined text * github is stuck
1 parent 172dd88 commit 69215df

File tree

1 file changed

+14
-2
lines changed

1 file changed

+14
-2
lines changed

src/content/partials/networking-services/routing/configure-routes.mdx

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ params:
99
- productGatewayOrEgress
1010
---
1111

12-
import { APIRequest, Markdown, Render, TabItem, Tabs } from "~/components";
12+
import { Aside, APIRequest, Markdown, Render, TabItem, Tabs } from "~/components";
1313

1414
Magic Networking uses a routing table to steer your traffic via next-hop from Cloudflare's global network to your connected networks. Entries can be added to the Magic routing table via static route configuration or via routes learned through BGP peering (only available over Direct CNI).
1515

@@ -277,8 +277,12 @@ By default, each BGP peering session will use the same Cloudflare-side ASN to re
277277
<Markdown
278278
text={`
279279
Magic WAN customers should also be aware of the following:
280+
- The customer chooses their device ASN, which must be different to the Cloudflare-side ASN.
280281
- The Cloudflare side ASN will be included in the \`AS_PATH\` of announced routes to any BGP enabled interconnect.
281-
- The customer chooses their device ASN, which should be different to the Cloudflare-side ASN.
282+
- The customer-announced \`AS_PATH\` is transitive between interconnects — meaning the origin (customer) ASN is visible in the \`AS_PATH\` of routes received from Cloudflare via BGP. Due to default BGP loop prevention mechanisms, a router will reject any route that contains its own ASN in the \`AS_PATH\`. For example, if two Magic WAN-connected sites both use \`ASN 65000\`, site A will not accept routes from site B, and vice versa, because each site sees its own ASN in the advertised \`AS_PATH\`. <br />
283+
To enable routing between private networks over Magic WAN, you should either:
284+
- Assign a unique ASN to each site/network, or
285+
- Configure your edge CPE to accept BGP routes that include its own ASN in the \`AS_PATH\`.
282286
`}
283287
inline={false}
284288
/>
@@ -304,6 +308,14 @@ If you already have set up your Cloudflare account ASN, you can skip steps two a
304308
4. Go to **Interconnects**.
305309
5. Find the Direct CNI interconnect you want to configure with BGP > select the **three dots** next to it > **Configure BGP**.
306310
6. In **Customer device ASN**, enter the ASN for your network.
311+
312+
{ props.magicWord === "Magic WAN" && (
313+
<>
314+
<Aside type="note">Multiple interconnects with the same ASN will not exchange routes if standard BGP loop prevention is enabled. Consider using a different ASN per session, or enabling duplicate ASNs (like Cisco's <code>allowas-in</code> feature) to exchange routes between networks. </Aside>
315+
</>
316+
)
317+
}
318+
307319
7. In **MD5 key**, you can optionally enter the key for your network. Note that this is meant to prevent accidental misconfigurations, and is not a security mechanism.
308320
8. (Optional) In **Advertised prefix list**, input the additional prefixes automatically assigned by Cloudflare during the creation of the CNI interconnect, to advertise alongside your existing routes. Leave blank if you do not want to advertise extra routes. <br /> Typical prefixes to configure here include:
309321
- A route to `0.0.0.0/0`, the default route — to attract all Internet-bound traffic if using {props.productGatewayOrEgress}.

0 commit comments

Comments
 (0)