Skip to content

Commit 958a3f4

Browse files
Clarifying anycast on egress (#18702)
* Clarifying anycast on egress Adds explicit messaging to clarify that the egress traffic reaches Cloudflare at an anycast location where it will exit to the connectivity available in said location to the internet * Update src/content/docs/magic-transit/reference/egress.mdx --------- Co-authored-by: marciocloudflare <[email protected]>
1 parent e6631e0 commit 958a3f4

File tree

1 file changed

+1
-0
lines changed
  • src/content/docs/magic-transit/reference

1 file changed

+1
-0
lines changed

src/content/docs/magic-transit/reference/egress.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,3 +13,4 @@ If you have implemented Magic Transit with egress traffic, below is a list of te
1313
- You may need to configure multiple GRE/IPsec tunnels as a way to load-share traffic sent to the Internet via Cloudflare. You can achieve this by applying two different PBR. Thus, traffic sourced from one IP/subnet is routed via one tunnel, and traffic from another IP/subnet is sent out via a different tunnel.
1414
- Your Magic Firewall rules will apply in both directions. Ensure that your Magic Firewall rules are set up for your intended traffic flows, both in and out.
1515
- If using Magic Transit egress then we recommend you set your GRE or IPSEC tunnel health check configuration to [bidirectional](/magic-transit/how-to/configure-tunnels/#add-tunnels), so that Cloudflare health checks are in-sync with the [data plane](https://en.wikipedia.org/wiki/Forwarding_plane) traffic flow.
16+
- Once your traffic is configured to egress through the GRE/IPsec tunnel, it is encapsulated and sent to a Cloudflare anycast endpoint. Your ISP then routes the encapsulated traffic to the nearest available Cloudflare point of presence (PoP), where it exits to the Internet via Cloudflare's connectivity options at that location.

0 commit comments

Comments
 (0)