Skip to content

Commit 8f8991b

Browse files
[Magic] IPsec route vs policy-based vpns (#24004)
* added route vs policy based vpns * removed extra space
1 parent acba209 commit 8f8991b

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

src/content/partials/networking-services/reference/tunnels-encapsulation.mdx

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -217,6 +217,16 @@ Additionally, the IKE ID type of `ID_IPV4_ADDR` is supported if the following tw
217217
Make sure each IPsec tunnel has a unique combination of a <a href={props.tunnelEndpoints}>Cloudflare endpoint and customer endpoint</a>. If this combination is not unique among your IPsec tunnels, you should use one of the custom IKE formats (`ID_RFC822_ADDR`, `ID_FQDN`, or `ID_KEY_ID`) to specify the tunnel ID and account ID. This helps Cloudflare link the IKE packet to the right IPsec tunnel for tasks like authentication.
218218
:::
219219

220+
### Route-based vs. policy-based VPNs
221+
222+
Although Cloudflare supports both route-based and policy-based VPNs, route-based VPNs are preferred.
223+
224+
If route-based VPNs are not an option and you must use policy-based VPNs, be aware of the following limitations:
225+
226+
- Cloudflare only supports a single set of traffic selectors per Child SA.
227+
- Reply-style health checks must be covered by a policy — that is, they must match traffic selectors — otherwise, they will be dropped, just like any other traffic from an IPsec tunnel that does not match a policy.
228+
- A single IPsec tunnel can only contain around 100 Child SAs. Therefore, there is effectively a limit on the number of different policies per tunnel.
229+
220230
{ props.magicWord === "Magic Transit" && (
221231
<>
222232
<AnchorHeading title="Network Analytics" depth={2} />

0 commit comments

Comments
 (0)