Skip to content

Commit 95aada3

Browse files
Apply suggestions from code review
Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com>
1 parent 37e2968 commit 95aada3

File tree

1 file changed

+6
-6
lines changed
  • src/content/docs/magic-wan/configuration/manually/third-party

1 file changed

+6
-6
lines changed

src/content/docs/magic-wan/configuration/manually/third-party/juniper.mdx

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ The configuration settings in this document are based on JUNOS 23.4R2.13.
99

1010
## Prerequisites
1111

12-
Confirm that you have the two Cloudflare anycast IPs allocated to your account. You will establish IPsec tunnels to the two anycast IPs irrespective of the location of your Juniper SRX devices (hereon in "endpoint") - traffic will be naturally attracted to the closest Cloudflare colocation facility via BGP Anycast.
12+
Confirm that you have the two Cloudflare anycast IPs allocated to your account. You will establish IPsec tunnels to the two anycast IPs irrespective of the location of your Juniper SRX devices (hereon in "endpoint") - traffic will be naturally attracted to the closest Cloudflare colocation facility via BGP anycast.
1313

14-
Cloudflare recommends customers configure two IPsec tunnels (one to each of the two Anycast IPs allocated to you Cloudflare account) per Internet Service Provider per endpoint. This provides tunnel redundancy diversity.
14+
Cloudflare recommends customers configure two IPsec tunnels (one to each of the two anycast IPs allocated to you Cloudflare account) per Internet Service Provider per endpoint. This provides tunnel redundancy diversity.
1515

1616
Equal Cost Multipath Routing (ECMP) ensures traffic is load-balanced across the tunnels, and you can control traffic steering across the tunnels through route prioritization.
1717

@@ -33,7 +33,7 @@ This documentation assumes there are two locations connected via Magic WAN:
3333
| Site | Local/Remote | Security Zone | Subnet |
3434
| ---- | ------------ | ------------- | ------------- |
3535
| A | Local | trust | 10.1.20.0/24 |
36-
| B | Remote | cloudflare | 10.1.100.0/24 |
36+
| B | Remote | Cloudflare | 10.1.100.0/24 |
3737

3838
### Magic IPsec tunnels
3939

@@ -564,7 +564,7 @@ Define security policies to permit traffic flows destined for Magic WAN-protecte
564564

565565
There are two very simple rules to allow traffic bidirectionally — it is generally recommended to start with a similar policy and then add more stringent rules once general connectivity is established successfully.
566566

567-
**From Zone:** *cloudflare* **To Zone:** *trust*
567+
**From Zone:** *Cloudflare* **To Zone:** *trust*
568568

569569
```txt
570570
set security policies from-zone cloudflare to-zone trust policy cloudflare_to_trust match source-address any
@@ -593,7 +593,7 @@ policy cloudflare_to_trust_permit {
593593
}
594594
```
595595

596-
**From Zone:** *trust* **To Zone:** *cloudflare*
596+
**From Zone:** *trust* **To Zone:** *Cloudflare*
597597

598598
```txt
599599
set security policies from-zone trust to-zone cloudflare policy trust_to_cloudflare_permit match source-address any
@@ -707,7 +707,7 @@ ID Algorithm SPI Life:sec/kb Mon lsys Port Gateway
707707

708708
It can be very helpful to enable debug logging via traceoptions while setting up the tunnels. The log data can help determine if there are issues and, if so, where they might be occurring.
709709

710-
Please note that some errors in the log are benign. The types of errors to look for are those related to authentication or encryption/integrity (i.e. no proposal chosen).
710+
Please note that some errors in the log are benign. The types of errors to look for are those related to authentication or encryption/integrity (that is, no proposal chosen).
711711

712712
#### Enable IKE `traceoptions`
713713

0 commit comments

Comments
 (0)