Skip to content

Commit badef87

Browse files
[MWAN] Lan to Lan feature improved (#19940)
* added lan to lan info * updated names and added port range * refined steps * refined text * added changelog entry * Apply suggestions from code review Co-authored-by: Jun Lee <[email protected]> * Update src/content/docs/magic-wan/configuration/connector/network-options/network-segmentation.mdx Co-authored-by: Jun Lee <[email protected]> * Update src/content/docs/magic-wan/configuration/connector/network-options/network-segmentation.mdx Co-authored-by: Jun Lee <[email protected]> * lan-to-lan --------- Co-authored-by: Jun Lee <[email protected]>
1 parent 72e44ee commit badef87

File tree

2 files changed

+26
-13
lines changed

2 files changed

+26
-13
lines changed

src/content/changelogs/magic-wan.yaml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ productLink: "/magic-wan/"
55
productArea: Cloudflare One
66
productAreaLink: /cloudflare-one/changelog/
77
entries:
8+
- publish_date: "2024-12-12"
9+
title: LAN Policy improvements for the Magic WAN Connector
10+
description: |-
11+
Magic WAN Connector LAN Policy now supports unidirectional traffic flows and port-ranges.
812
- publish_date: "2024-12-17"
913
title: Magic WAN Connector configurable health checks
1014
description: |-

src/content/docs/magic-wan/configuration/connector/network-options/network-segmentation.mdx

Lines changed: 22 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ title: Network segmentation
55

66
import { Render, TabItem, Tabs } from "~/components";
77

8-
You can define policies in your Connector to either allow traffic to flow between your LANs without it leaving your local premises or to forward it via the Cloudflare network where you can add additional security features. The default behavior is to drop all LAN to LAN traffic. These policies can be created for specific subnets, and link two LANs.
8+
You can define policies in your Connector to either allow traffic to flow between your LANs without it leaving your local premises or to forward it via the Cloudflare network where you can add additional security features. The default behavior is to drop all LAN-to-LAN traffic. These policies can be created for specific subnets, and link two LANs.
99

1010
```mermaid
1111
flowchart LR
@@ -29,9 +29,11 @@ _In the above example, the red path shows traffic that stays in the customer's p
2929

3030
<br />
3131

32-
Creating these policies to segment your network means LAN to LAN traffic can be allowed either locally or via Cloudflare's network. As a best practice for security, we recommend sending all traffic through Cloudflare's network for Zero Trust security filtering. Use these policies with care and only for scenarios where you have a hard requirement for LAN to LAN traffic flows.
32+
As a best practice for security, we recommend sending all traffic through Cloudflares network for Zero Trust security filtering. Use these policies with care and only for scenarios where you have a hard requirement for LAN-to-LAN traffic flows.
3333

34-
Refer to [Magic WAN Connector deployment options](/reference-architecture/diagrams/sase/magic-wan-connector-deployment/) for a high-level explanation of the deployment options for Magic WAN Connector, as well as examples of network segmentation.
34+
If you enable LAN to LAN traffic flows, communications can only be initiated from origin to destination — for example, LAN 1 to LAN 2 — and not the other way around. This is by design and prevents potential exfiltration of information. This does not mean bidirectional communication on TCP is not possible. It only means that the origin is the only one authorized to initiate communications.
35+
36+
Unidirectional communication can be enabled for UDP and ICMP, but it is not available for TCP, as it would break that protocol.
3537

3638
The following guide assumes you have already created a site and configured your Connector. To learn how to create a site and configure your Connector, refer to [Configure hardware Connector](/magic-wan/configuration/connector/configure-hardware-connector/) or [Configure virtual connector](/magic-wan/configuration/connector/configure-virtual-connector/), depending on the type of Magic WAN Connector you have on your premises.
3739

@@ -47,19 +49,26 @@ Follow the steps below to create a new LAN policy to segment your network. Only
4749
4. Go to **Network Configuration**, and scroll down to **LAN configuration**.
4850
5. Select **LAN policies** > **Create Policy**.
4951
6. In **Policy name**, enter a descriptive name for the policy you are creating.
50-
7. From the drop-down menu **LAN 1**, select your origin LAN.
51-
8. (Optional) Specify a subnet for your first LAN in **Subnets**.
52-
9. (Optional) In **Ports** specify the TCP/UDP ports you want to use. Add a comma to separate each of the ports.
53-
10. In **LAN 2**, select the destination LAN and repeat the above process to configure it.
54-
11. (Optional) Select the type of traffic. You can choose **TCP**, **UDP**, and **ICMP**. You can also select **Any** to choose all types of traffic.
55-
12. In **Traffic path**, select **Forwarded via Cloudflare** if you want traffic to be forwarded to Cloudflare to be processed. If you do not select this option, traffic will flow locally, in your premises without passing through Cloudflare.
56-
13. Select **Create policy**.
52+
7. From the drop-down menu **Origin (required)**, select your origin LAN.
53+
8. Specify a subnet for your first LAN in **Subnets**.
54+
9. In **Ports** specify the TCP/UDP ports you want to use. Valid ports range from `1` to `65535`. Zero (`0`) is not a valid port number. Add a comma to separate each of the ports or add a port range. For example, `2,5,6,9-14`.
55+
10. In **Destination (required)**, select the destination LAN and repeat the above process to configure it.
56+
11. In **Protocols**, select the type of traffic you want to allow. You can choose **TCP**, **UDP**, and **ICMP**. You can also select **Any** to choose all types of traffic.
57+
12. In **Traffic direction** you can choose between bidirectional traffic (the default) and unidirectional traffic. What you can choose depends on the protocol that you chose for the policy:
58+
1. **Any**: If **Any** is selected and you choose **Unidirectional**, the system will alert you that this will break TCP traffic.
59+
2. **TCP**: You can only select **Bidirectional**.
60+
3. **UDP**: The system defaults to **Bidirectional** but you can choose **Unidirectional**.
61+
4. **ICMP**: The system defaults to **Bidirectional** but you can choose **Unidirectional**.
62+
13. In **Traffic path**, select **Forwarded via Cloudflare** if you want traffic to be forwarded to Cloudflare to be processed. If you do not select this option, traffic will flow locally, in your premises without passing through Cloudflare.
63+
14. Select **Create policy**.
64+
65+
The new policy will ensure that traffic between the specified LANs flows locally, bypassing Cloudflare.
5766

5867
</TabItem> <TabItem label="API">
5968

6069
<Render file="connector/account-id-api-key" />
6170

62-
Create a `POST` request [using the API](/api/resources/magic_transit/subresources/sites/subresources/acls/methods/create/) to create a network policy.
71+
Create a `POST` request [using the API](/api/operations/magic-site-acls-create-acl) to create a network policy.
6372

6473
Example:
6574

@@ -153,7 +162,7 @@ The new policy will ensure that traffic between the specified LANs flows locally
153162

154163
<Render file="connector/account-id-api-key" />
155164

156-
Create a `PUT` request [using the API](/api/resources/magic_transit/subresources/sites/subresources/acls/methods/update/) to edit a network policy.
165+
Create a `PUT` request [using the API](/api/operations/magic-site-acls-update-acl) to edit a network policy.
157166

158167
Example:
159168

@@ -214,7 +223,7 @@ https://api.cloudflare.com/client/v4/accounts/{account_id}/magic/sites/{site_id}
214223

215224
<Render file="connector/account-id-api-key" />
216225

217-
Create a `DELETE` request [using the API](/api/resources/magic_transit/subresources/sites/subresources/acls/methods/delete/) to delete a network policy.
226+
Create a `DELETE` request [using the API](/api/operations/magic-site-acls-delete-acl) to delete a network policy.
218227

219228
Example:
220229

0 commit comments

Comments
 (0)