You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* added lan to lan info
* updated names and added port range
* refined steps
* refined text
* added changelog entry
* Apply suggestions from code review
Co-authored-by: Jun Lee <[email protected]>
* Update src/content/docs/magic-wan/configuration/connector/network-options/network-segmentation.mdx
Co-authored-by: Jun Lee <[email protected]>
* Update src/content/docs/magic-wan/configuration/connector/network-options/network-segmentation.mdx
Co-authored-by: Jun Lee <[email protected]>
* lan-to-lan
---------
Co-authored-by: Jun Lee <[email protected]>
You can define policies in your Connector to either allow traffic to flow between your LANs without it leaving your local premises or to forward it via the Cloudflare network where you can add additional security features. The default behavior is to drop all LAN to LAN traffic. These policies can be created for specific subnets, and link two LANs.
8
+
You can define policies in your Connector to either allow traffic to flow between your LANs without it leaving your local premises or to forward it via the Cloudflare network where you can add additional security features. The default behavior is to drop all LAN-to-LAN traffic. These policies can be created for specific subnets, and link two LANs.
9
9
10
10
```mermaid
11
11
flowchart LR
@@ -29,9 +29,11 @@ _In the above example, the red path shows traffic that stays in the customer's p
29
29
30
30
<br />
31
31
32
-
Creating these policies to segment your network means LAN to LAN traffic can be allowed either locally or via Cloudflare's network. As a best practice for security, we recommend sending all traffic through Cloudflare's network for Zero Trust security filtering. Use these policies with care and only for scenarios where you have a hard requirement for LAN to LAN traffic flows.
32
+
As a best practice for security, we recommend sending all traffic through Cloudflare’s network for Zero Trust security filtering. Use these policies with care and only for scenarios where you have a hard requirement for LAN-to-LAN traffic flows.
33
33
34
-
Refer to [Magic WAN Connector deployment options](/reference-architecture/diagrams/sase/magic-wan-connector-deployment/) for a high-level explanation of the deployment options for Magic WAN Connector, as well as examples of network segmentation.
34
+
If you enable LAN to LAN traffic flows, communications can only be initiated from origin to destination — for example, LAN 1 to LAN 2 — and not the other way around. This is by design and prevents potential exfiltration of information. This does not mean bidirectional communication on TCP is not possible. It only means that the origin is the only one authorized to initiate communications.
35
+
36
+
Unidirectional communication can be enabled for UDP and ICMP, but it is not available for TCP, as it would break that protocol.
35
37
36
38
The following guide assumes you have already created a site and configured your Connector. To learn how to create a site and configure your Connector, refer to [Configure hardware Connector](/magic-wan/configuration/connector/configure-hardware-connector/) or [Configure virtual connector](/magic-wan/configuration/connector/configure-virtual-connector/), depending on the type of Magic WAN Connector you have on your premises.
37
39
@@ -47,19 +49,26 @@ Follow the steps below to create a new LAN policy to segment your network. Only
47
49
4. Go to **Network Configuration**, and scroll down to **LAN configuration**.
48
50
5. Select **LAN policies** > **Create Policy**.
49
51
6. In **Policy name**, enter a descriptive name for the policy you are creating.
50
-
7. From the drop-down menu **LAN 1**, select your origin LAN.
51
-
8. (Optional) Specify a subnet for your first LAN in **Subnets**.
52
-
9. (Optional) In **Ports** specify the TCP/UDP ports you want to use. Add a comma to separate each of the ports.
53
-
10. In **LAN 2**, select the destination LAN and repeat the above process to configure it.
54
-
11. (Optional) Select the type of traffic. You can choose **TCP**, **UDP**, and **ICMP**. You can also select **Any** to choose all types of traffic.
55
-
12. In **Traffic path**, select **Forwarded via Cloudflare** if you want traffic to be forwarded to Cloudflare to be processed. If you do not select this option, traffic will flow locally, in your premises without passing through Cloudflare.
56
-
13. Select **Create policy**.
52
+
7. From the drop-down menu **Origin (required)**, select your origin LAN.
53
+
8. Specify a subnet for your first LAN in **Subnets**.
54
+
9. In **Ports** specify the TCP/UDP ports you want to use. Valid ports range from `1` to `65535`. Zero (`0`) is not a valid port number. Add a comma to separate each of the ports or add a port range. For example, `2,5,6,9-14`.
55
+
10. In **Destination (required)**, select the destination LAN and repeat the above process to configure it.
56
+
11. In **Protocols**, select the type of traffic you want to allow. You can choose **TCP**, **UDP**, and **ICMP**. You can also select **Any** to choose all types of traffic.
57
+
12. In **Traffic direction** you can choose between bidirectional traffic (the default) and unidirectional traffic. What you can choose depends on the protocol that you chose for the policy:
58
+
1.**Any**: If **Any** is selected and you choose **Unidirectional**, the system will alert you that this will break TCP traffic.
59
+
2.**TCP**: You can only select **Bidirectional**.
60
+
3.**UDP**: The system defaults to **Bidirectional** but you can choose **Unidirectional**.
61
+
4.**ICMP**: The system defaults to **Bidirectional** but you can choose **Unidirectional**.
62
+
13. In **Traffic path**, select **Forwarded via Cloudflare** if you want traffic to be forwarded to Cloudflare to be processed. If you do not select this option, traffic will flow locally, in your premises without passing through Cloudflare.
63
+
14. Select **Create policy**.
64
+
65
+
The new policy will ensure that traffic between the specified LANs flows locally, bypassing Cloudflare.
57
66
58
67
</TabItem> <TabItemlabel="API">
59
68
60
69
<Renderfile="connector/account-id-api-key" />
61
70
62
-
Create a `POST` request [using the API](/api/resources/magic_transit/subresources/sites/subresources/acls/methods/create/) to create a network policy.
71
+
Create a `POST` request [using the API](/api/operations/magic-site-acls-create-acl) to create a network policy.
63
72
64
73
Example:
65
74
@@ -153,7 +162,7 @@ The new policy will ensure that traffic between the specified LANs flows locally
153
162
154
163
<Renderfile="connector/account-id-api-key" />
155
164
156
-
Create a `PUT` request [using the API](/api/resources/magic_transit/subresources/sites/subresources/acls/methods/update/) to edit a network policy.
165
+
Create a `PUT` request [using the API](/api/operations/magic-site-acls-update-acl) to edit a network policy.
Create a `DELETE` request [using the API](/api/resources/magic_transit/subresources/sites/subresources/acls/methods/delete/) to delete a network policy.
226
+
Create a `DELETE` request [using the API](/api/operations/magic-site-acls-delete-acl) to delete a network policy.
0 commit comments