You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/partials/networking-services/routing/configure-tunnels.mdx
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ Cloudflare recommends two tunnels for each ISP and network location router combi
24
24
To configure the tunnels between Cloudflare and your locations, you must provide the following data for each tunnel:
25
25
26
26
-**Tunnel name**: For GRE tunnels, the name must have 15 or fewer characters. IPsec tunnels have no character limit. For both GRE and IPsec tunnels, the name cannot contain spaces or special characters, and cannot be shared with other tunnels.
27
-
-**Cloudflare endpoint address**: The public IP address of the Cloudflare side of the tunnel.
27
+
-**Cloudflare endpoint address**: The public IP address of the Cloudflare side of the tunnel.{props.magicWord==="Magic Transit"&& (<>Refer to <ahref="/magic-transit/cloudflare-ips/#check-your-cloudflare-ips">Check your Cloudflare IPs</a> for more information on where to find your Cloudflare IP addresses.</>)}
28
28
-**Customer endpoint**: A public Internet routable IP address which is outside of the prefixes that Cloudflare will advertise on your behalf. These are generally IP addresses provided by your ISP. If you intend to use a physical or virtual connection like [Cloudflare Network Interconnect](/network-interconnect/), you do not need to provide endpoints because Cloudflare will provide them. <br/>
29
29
This value is not required for <GlossaryTooltipterm="IPsec tunnel">IPsec</GlossaryTooltip> tunnels, unless your router is using an <GlossaryTooltipterm="Internet key exchange (IKE)">Internet Key Exchange (IKE)</GlossaryTooltip> ID of type `ID_IPV4_ADDR`.
30
30
-**Interface address**: A 31-bit (recommended) or 30-bit subnet (`/31` or `/30` in CIDR notation) supporting two hosts, one for each side of the tunnel. Select the subnet from the following private IP space:
@@ -124,7 +124,7 @@ Beyond GRE and IPsec tunnels, you can also use Network Interconnect (CNI) to onb
124
124
5. Give your tunnel a description in **Description**. You do not have character restrictions here.
125
125
6. In **IPv4 Interface address**, enter the internal IP address for your tunnel along with the interface's prefix length (either `/31` or `/30`). This is used to route traffic through the tunnel on the Cloudflare side. We recommend using an RFC1918 address scheme with a `/31` netmask, as it provides the most efficient use of IP address space.
126
126
7. In **Customer GRE endpoint**, enter your router's public IP address. This value is not needed if you intend to use a physical or virtual connection like Cloudflare Network Interconnect because Cloudflare will provide it.
127
-
8. In **Cloudflare GRE endpoint**, enter the anycast address you received from your account team.
127
+
8. In **Cloudflare GRE endpoint**, enter the anycast address you received from your account team.{props.magicWord==="Magic Transit"&& (<>Refer to <ahref="/magic-transit/cloudflare-ips/#check-your-cloudflare-ips">Check your Cloudflare IPs</a> for more information on where to find your Cloudflare IP addresses.</>)}
128
128
9. Leave the default values for **TTL** and **MTU**.
129
129
10._(Optional)_**Tunnel health checks** are enabled by default. If you disable Tunnel health checks, your tunnels will appear 100% down in your <ahref={props.tunnelHealthDash}>tunnel health dashboard</a> even when working. Cloudflare will keep sending traffic through the tunnel, without the means to detect if the tunnel goes down. You will have to set up your own system to detect down tunnels, as Cloudflare will not be able to warn you about down tunnels. Refer to <ahref={props.tunnelHealthChecksPage}>Tunnel health checks</a> for more information.
130
130
11._(Optional)_ If you keep **Tunnel health checks** enabled, choose a <ahref={props.updateHCFrequencyPage}>health check rate</a> for your tunnel. Available options are _Low_, _Medium_, and _High_.
@@ -143,7 +143,7 @@ Beyond GRE and IPsec tunnels, you can also use Network Interconnect (CNI) to onb
143
143
5. Give your tunnel a description in **Description**. You do not have character restrictions here.
144
144
6. In **IPv4 Interface address**, enter the internal IP address for your tunnel along with the interface's prefix length (either `/31` or `/30`). This is used to route traffic through the tunnel on the Cloudflare side. We recommend using an RFC1918 address scheme with a `/31` netmask, as it provides the most efficient use of IP address space.
145
145
7. In **Customer endpoint**, enter your router's public IP address. This value is only required if your router is using an IKE ID of type `ID_IPV4_ADDR`.
146
-
8. In **Cloudflare endpoint**, enter the anycast address you received from your account team.
146
+
8. In **Cloudflare endpoint**, enter the anycast address you received from your account team.{props.magicWord==="Magic Transit"&& (<>Refer to <ahref="/magic-transit/cloudflare-ips/#check-your-cloudflare-ips">Check your Cloudflare IPs</a> for more information on where to find your Cloudflare IP addresses.</>)}
147
147
9._(Optional)_**Tunnel health checks** are enabled by default. If you disable Tunnel health checks, your tunnels will appear 100% down in your <ahref={props.tunnelHealthDash}>tunnel health dashboard</a> even when working. Cloudflare will keep sending traffic through the tunnel, without the means to detect if the tunnel goes down. You will have to set up your own system to detect down tunnels, as Cloudflare will not be able to warn you about down tunnels. Refer to <ahref={props.tunnelHealthChecksPage}>Tunnel health checks</a> for more information.
148
148
10._(Optional)_ If you keep **Tunnel health checks** enabled, choose a <ahref={props.updateHCFrequencyPage}>health check rate</a> for your tunnel. Available options are _Low_, _Medium_ and _High_.
149
149
11._(Optional)_ The **Health check type** defaults to _Reply_ and to creating an ICMP reply. If your firewall drops this type of packet for assuming it is a type of attack, change this option to _Request_ which will create an ICMP request. Refer to <ahref={props.tunnelHealthChecksPage}>Tunnel health checks</a> for more information.
0 commit comments