Skip to content

Commit 8991757

Browse files
[Magic] Corrected curved quotation marks to straight ones (#18561)
* single quotation marks * quotation marks
1 parent a37eeae commit 8991757

39 files changed

+60
-60
lines changed

src/content/docs/magic-cloud-networking/reference.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ When using Magic Cloud Networking to automatically create on-ramps to your Googl
4141
- Cloudflare will reserve a public Internet routable IP address from GCP.
4242
- Cloudflare will create a VPN Gateway and two VPN Tunnels in the region you specify.
4343
- Cloudflare will create routes for each prefix in your [Magic WAN Address Space](/magic-cloud-networking/cloud-on-ramps/#magic-wan-address-space) within your VPC pointing to the VPN Tunnels.
44-
- Cloudflare will add routes in Magic WAN for all subnet CIDR prefixes in your VPC. This includes all regions within the VPC. Traffic bound for a region other than the VPN Gateways region will be subject to GCPs [Inter-region Pricing](https://cloud.google.com/vpc/network-pricing#inter-region-data-transfer).
44+
- Cloudflare will add routes in Magic WAN for all subnet CIDR prefixes in your VPC. This includes all regions within the VPC. Traffic bound for a region other than the VPN Gateway's region will be subject to GCP's [Inter-region Pricing](https://cloud.google.com/vpc/network-pricing#inter-region-data-transfer).
4545
- Traffic sent to and from your VM instances through the VPN Tunnels is still subject to VPC firewall rules, and may [require further configuration](https://cloud.google.com/network-connectivity/docs/vpn/how-to/configuring-firewall-rules#firewall_rules).
4646

4747
## Supported resources

src/content/docs/magic-network-monitoring/get-started.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ If you are an Enterprise customer, Cloudflare can significantly accelerate the o
1313

1414
## 1. Verify NetFlow or sFlow capabilities
1515

16-
Verify your routers are capable of exporting <GlossaryTooltip term="NetFlow">NetFlow</GlossaryTooltip> or <GlossaryTooltip term="sFlow">sFlow</GlossaryTooltip> to an IP address on Cloudflares network. Magic Network Monitoring supports NetFlow v5, NetFlow v9, IPFIX, and sFlow.
16+
Verify your routers are capable of exporting <GlossaryTooltip term="NetFlow">NetFlow</GlossaryTooltip> or <GlossaryTooltip term="sFlow">sFlow</GlossaryTooltip> to an IP address on Cloudflare's network. Magic Network Monitoring supports NetFlow v5, NetFlow v9, IPFIX, and sFlow.
1717

1818
Refer to [Supported routers](/magic-network-monitoring/routers/supported-routers) to view a list of supported routers. The list is not exhaustive.
1919

src/content/docs/magic-network-monitoring/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Improve your network visibility and detect DDoS attacks based on traffic flows.
2626

2727
<Plan type="all" />
2828

29-
Magic Network Monitoring provides visibility into your network traffic by analyzing network <GlossaryTooltip term="flow data">flow data</GlossaryTooltip> sent from a customers routers. Magic Network Monitoring supports NetFlow v5, NetFlow v9, IPFIX, and sFlow.
29+
Magic Network Monitoring provides visibility into your network traffic by analyzing network <GlossaryTooltip term="flow data">flow data</GlossaryTooltip> sent from a customer's routers. Magic Network Monitoring supports NetFlow v5, NetFlow v9, IPFIX, and sFlow.
3030

3131
Magic Network Monitoring is generally available to everyone with a Cloudflare account by default. You can log in to your Cloudflare dashboard, select your account, then go to **Analytics & Logs** > **Magic Monitoring** to get started.
3232

src/content/docs/magic-network-monitoring/routers/netflow-ipfix-config.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 3
66
head: []
77
description: A step-by-step configuration guide for exporting NetFlow or IPFIX
8-
data to Cloudflares network.
8+
data to Cloudflare's network.
99

1010
---
1111

src/content/docs/magic-network-monitoring/routers/recommended-sampling-rate.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ pcx_content_type: reference
44
sidebar:
55
order: 2
66
head: []
7-
description: The best sampling rate recommendations for your networks traffic volume.
7+
description: The best sampling rate recommendations for your network's traffic volume.
88

99
---
1010

src/content/docs/magic-network-monitoring/routers/sflow-config.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 4
66
head: []
77
description: A step-by-step configuration guide for exporting sFlow data to
8-
Cloudflares network.
8+
Cloudflare's network.
99

1010
---
1111

src/content/docs/magic-network-monitoring/routers/supported-routers.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ The majority of enterprise-grade routers are capable of exporting <GlossaryToolt
1515
Relatively few consumer grade routers are capable of exporting NetFlow or sFlow. If you are a network hobbyist, business, or other organization, and your router options are limited, you can view the list of open source and affordable options below.
1616

1717
:::note[Note:]
18-
These lists are not exhaustive, and we encourage you to check your routers specification sheet to confirm your router is capable of exporting NetFlow or sFlow.
18+
These lists are not exhaustive, and we encourage you to check your router's specification sheet to confirm your router is capable of exporting NetFlow or sFlow.
1919
:::
2020

2121
## NetFlow routers

src/content/docs/magic-network-monitoring/tutorials/ddos-testing-guide.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ head:
1212

1313

1414

15-
Customers who want to effectively test Cloudflares Magic Network Monitoring (MNM) in a repeatable manner can devise a simulated DDoS attack. At a high level, you would need to:
15+
Customers who want to effectively test Cloudflare's Magic Network Monitoring (MNM) in a repeatable manner can devise a simulated DDoS attack. At a high level, you would need to:
1616

1717
1. Select and install a trusted and open source DDoS simulation tool.
1818
2. Conduct a small DDoS test attack in a safe test environment.

src/content/docs/magic-transit/about.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,9 @@ Magic Transit is a network security and performance solution that offers DDoS pr
1515

1616
Magic Transit delivers its connectivity, security, and performance benefits by serving as the front door to your IP network. This means it accepts IP <GlossaryTooltip term="data packet">packets</GlossaryTooltip> destined for your network, processes them, and then outputs them to your origin infrastructure.
1717

18-
The Cloudflare network uses [Border Gateway Protocol (BGP)](https://www.cloudflare.com/learning/security/glossary/what-is-bgp/) to announce your companys IP address space, extending your network presence globally, and <GlossaryTooltip term="anycast" link="https://www.cloudflare.com/learning/cdn/glossary/anycast-network/">anycast</GlossaryTooltip> to ingest your traffic. Today, Cloudflares anycast global network spans [hundreds of cities worldwide](https://www.cloudflare.com/network/).
18+
The Cloudflare network uses [Border Gateway Protocol (BGP)](https://www.cloudflare.com/learning/security/glossary/what-is-bgp/) to announce your company's IP address space, extending your network presence globally, and <GlossaryTooltip term="anycast" link="https://www.cloudflare.com/learning/cdn/glossary/anycast-network/">anycast</GlossaryTooltip> to ingest your traffic. Today, Cloudflare's anycast global network spans [hundreds of cities worldwide](https://www.cloudflare.com/network/).
1919

20-
Once packets hit Cloudflares network, traffic is inspected for attacks, filtered, <GlossaryTooltip term="traffic steering">steered</GlossaryTooltip>, accelerated, and sent onward to your origin. Magic Transit connects to your origin infrastructure using anycast <GlossaryTooltip term="GRE tunnel">Generic Routing Encapsulation (GRE)</GlossaryTooltip> tunnels over the Internet or, with [Cloudflare Network Interconnect (CNI)](/network-interconnect/), via physical or virtual interconnect.
20+
Once packets hit Cloudflare's network, traffic is inspected for attacks, filtered, <GlossaryTooltip term="traffic steering">steered</GlossaryTooltip>, accelerated, and sent onward to your origin. Magic Transit connects to your origin infrastructure using anycast <GlossaryTooltip term="GRE tunnel">Generic Routing Encapsulation (GRE)</GlossaryTooltip> tunnels over the Internet or, with [Cloudflare Network Interconnect (CNI)](/network-interconnect/), via physical or virtual interconnect.
2121

2222
Magic Transit users have two options for their implementation: ingress traffic or ingress and [egress traffic](/magic-transit/reference/egress/). Users with an egress implementation will need to set up <GlossaryTooltip term="policy-based routing">policy-based routing (PBR)</GlossaryTooltip> or ensure default routing on their end forwards traffic to Cloudflare via tunnels.
2323

src/content/docs/magic-transit/analytics/network-analytics.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,13 @@ head:
1111

1212
import { GlossaryTooltip, Render } from "~/components"
1313

14-
[Network Analytics](/analytics/network-analytics/) gives you real-time visibility into Magic Transit traffic entering and leaving Cloudflares network through <GlossaryTooltip term="GRE tunnel">GRE</GlossaryTooltip> or <GlossaryTooltip term="IPsec tunnel">IPsec</GlossaryTooltip> tunnels. Start by inspecting information from the source and destination tunnel panels in Network Analytics to learn more about your data.
14+
[Network Analytics](/analytics/network-analytics/) gives you real-time visibility into Magic Transit traffic entering and leaving Cloudflare's network through <GlossaryTooltip term="GRE tunnel">GRE</GlossaryTooltip> or <GlossaryTooltip term="IPsec tunnel">IPsec</GlossaryTooltip> tunnels. Start by inspecting information from the source and destination tunnel panels in Network Analytics to learn more about your data.
1515

1616
Source/destination tunnel data in Network Analytics includes:
1717

1818
- A list of your top tunnels by traffic volume.
1919
- Source and destination <GlossaryTooltip term="IP address">IP addresses</GlossaryTooltip>, ports, and protocols of tunnel traffic.
20-
- Samples of all GRE or IPsec tunnel traffic entering or leaving Cloudflares network.
20+
- Samples of all GRE or IPsec tunnel traffic entering or leaving Cloudflare's network.
2121
- Mitigations applied (such as DDoS and Magic Firewall) to traffic entering Cloudflare.
2222

2323
## Access Magic Tunnel analytics

0 commit comments

Comments
 (0)