Skip to content

Commit a7c21d9

Browse files
vars
1 parent d4860b7 commit a7c21d9

File tree

3 files changed

+13
-2
lines changed

3 files changed

+13
-2
lines changed

src/content/docs/magic-transit/reference/traffic-steering.mdx

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,9 @@ import { Render } from "~/components";
2121
mFirewallName: "Magic Firewall",
2222
mFirewallURL: "/magic-firewall/",
2323
warpClientURL: "/cloudflare-one/connections/connect-devices/warp/",
24+
remoteBrowserURL: "/cloudflare-one/policies/browser-isolation/",
25+
accessURL: "/cloudflare-one/policies/access/",
26+
gatewayURL: "/cloudflare-one/policies/gateway/",
2427
greIpsecReferenceURL: "/magic-transit/reference/gre-ipsec-tunnels/",
2528
createStaticRoute: "/magic-transit/how-to/configure-routes/#create-a-static-route",
2629
editStaticRoute: "/magic-transit/how-to/configure-routes/#edit-a-static-route",

src/content/docs/magic-wan/reference/traffic-steering.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,10 @@ import { Render } from "~/components";
2121
mFirewallName: "Magic Firewall",
2222
mFirewallURL: "/magic-firewall/",
2323
warpClientURL: "/cloudflare-one/connections/connect-devices/warp/",
24+
remoteBrowserURL: "/cloudflare-one/policies/browser-isolation/",
25+
accessURL: "/cloudflare-one/policies/access/",
26+
gatewayURL: "/cloudflare-one/policies/gateway/",
27+
cfTunnelURL: "/magic-wan/zero-trust/cloudflare-tunnel/",
2428
greIpsecReferenceURL: "/magic-wan/reference/gre-ipsec-tunnels/",
2529
createStaticRoute: "/magic-wan/configuration/manually/how-to/configure-routes/#create-a-static-route",
2630
editStaticRoute: "/magic-wan/configuration/manually/how-to/configure-routes/#edit-a-static-route",

src/content/partials/networking-services/reference/traffic-steering.mdx

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ params:
55
- mFirewallName
66
- mFirewallURL
77
- warpClientURL
8+
- remoteBrowserURL
9+
- accessURL
10+
- gatewayURL
11+
- cfTunnelURL
812
- greIpsecReferenceURL
913
- createStaticRoute
1014
- editStaticRoute
@@ -20,7 +24,7 @@ import { AnchorHeading, Aside, Markdown, Render } from "~/components";
2024
The Magic networking routing table is a virtual network overlay, private to your account, that spans all Cloudflare data centers globally. This overlay network provides:
2125

2226
- Magic Transit delivery for [DoS](/ddos-protection/) and <a href={props.mFirewallURL}>{props.mFirewallName}</a> filtered Internet traffic, from the entry data center where the traffic ingressed, to your publicly addressed edge/border network.
23-
- {props.productName} packet transport between Magic tunnels, interconnects, [Cloudflare Load Balancer](/load-balancing/), and [Zero Trust](/cloudflare-one/) connections such as <a href={props.warpClientURL}>WARP Client</a>, [Remote Browser Isolation](/cloudflare-one/policies/browser-isolation/), [Access](/cloudflare-one/policies/access/), and [Gateway](/cloudflare-one/policies/gateway/).
27+
- {props.productName} packet transport between Magic tunnels, interconnects, [Cloudflare Load Balancer](/load-balancing/), and [Zero Trust](/cloudflare-one/) connections such as <a href={props.warpClientURL}>WARP Client</a>, <a href={props.remoteBrowserURL}>Remote Browser Isolation</a>, <a href={props.accessURL}>Access</a>, and <a href={props.gatewayURL}>Gateway</a>.
2428

2529
The Magic routing table supports routing the {props.productName} traffic via anycast tunnels using <a href={props.greIpsecReferenceURL}>GRE and Internet Protocol Security (IPsec)</a> or [Direct Cloudflare Network Interconnect (CNI)](/network-interconnect/). Entries can be added to the Magic routing table via static route configuration or via routes learned through BGP peering (only available over Direct CNI).
2630

@@ -47,7 +51,7 @@ The following IPv4 address ranges are allowed in the Magic Routing table:
4751
text={`
4852
- [RFC 1918](https://datatracker.ietf.org/doc/html/rfc1918) address space, specifically \`10.0.0.0/8\`, \`172.16.0.0/12\`, and \`192.168.0.0/16\`.
4953
50-
When using Magic WAN and Cloudflare Tunnel together, remember to consider the IP ranges utilized in the static routes of Cloudflare Tunnel when selecting static routes for Magic WAN. For more information, refer to [Cloudflare Tunnel](/magic-wan/zero-trust/cloudflare-tunnel/).
54+
When using ${props.productName} and Cloudflare Tunnel together, remember to consider the IP ranges utilized in the static routes of Cloudflare Tunnel when selecting static routes for ${props.productName}. For more information, refer to <a href="${props.cfTunnelURL}">Cloudflare Tunnel</a>.
5155
5256
For prefixes outside RFC 1918 contact your Cloudflare customer service manager.
5357
`}

0 commit comments

Comments
 (0)