Skip to content

Commit cecf76a

Browse files
marciocloudflareMaddy-Cloudflare
authored andcommitted
[Learning paths] Magic Transit learning path for (#22330)
* added mt lp and concepts * added what is mt * refined content type * added benefits of mt * refined text * added mt lp json * added mt lp icon * refined text * moved get started to partial * get started scope config * moved cf ips to partial * refined text * refined text * added JSX to cf ips partial * added render to gstarted cf ips * corrected cf ips params * added lp param get started * added router get started partial * corrected loa text * moved byoip loa to partial * added loa partial * refined headers * refined mss partial text * corrected ipsec mss value * corrected get started headers * added mt jsx for get started * added Lpath jsx to get started * corrected content type * added get started to lPath * added config tunnels folder and overview * removed unnecessary import * corrected title * added config tunnels to lPath * config routes lPath * added ddos page * moved ddos override partial file * added import * removed details from import * added ddos partial * move mt-advanced-ddos to advanced folder * corrected links mt-advanced-ddos * added tcp * created tcp intro and setup partials * corrected links * adv dns protection intro partial * replaced intro with partial * created adv dns setup partial * replaced setup with partial * added adv dns partials * added mfirewall * added notifications * added more details notifications * added preflight checks * refined preflight * created adv prefixes partial * added render * added troubleshooting content * replaced check with potential solutions * corrected titles * fine tuning page * removed fine tuning from troubleshooting * updated links for lPath * added publicstats component * refined language * moved intro to jsx * changed content type * refined text * added bgp link * Apply suggestions from code review Co-authored-by: Maddy <[email protected]> --------- Co-authored-by: Maddy <[email protected]>
1 parent 6c18595 commit cecf76a

35 files changed

+683
-202
lines changed

src/content/docs/byoip/concepts/loa.mdx

Lines changed: 3 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,8 @@ head:
99

1010
---
1111

12+
import { Render } from "~/components"
13+
1214
A Letter of Agency (LOA) - sometimes referred to as a Letter of Authorization - is a document that authorizes Cloudflare to announce a prefix(es) on behalf of another entity. The LOA is required by Cloudflare's transit providers so they can accept the routes Cloudflare advertises on behalf of another entity.
1315

1416
The letter must contain both the prefixes you are authorizing Cloudflare to announce and which ASN they will be announced under. Cloudflare can announce a prefix under your ASN or you can use Cloudflare's ASN, which is AS13335.
@@ -25,37 +27,4 @@ An LOA is a formal document which should be on company letterhead and contain a
2527

2628
You can use the below template when creating an LOA document.
2729

28-
```txt title="Letter of Agency template"
29-
[COMPANY LETTERHEAD]
30-
31-
LETTER OF AGENCY ("LOA")
32-
33-
[DATE]
34-
35-
36-
To whom it may concern:
37-
38-
[COMPANY NAME] (the "Company") authorizes Cloudflare, Inc. with AS13335 to advertise the following IP address blocks / originating ASNs:
39-
40-
- - - - - - - - - - - - - - - - - - -
41-
[Subnet & Originating ASN]
42-
[Subnet & Originating ASN]
43-
[Subnet & Originating ASN]
44-
- - - - - - - - - - - - - - - - - - -
45-
46-
As a representative of the Company that is the owner of the aforementioned IP address blocks / originating ASNs, I hereby declare that I am authorized to sign this LOA on the Company’s behalf.
47-
48-
Should you have any questions please email me at [E-MAIL ADDRESS], or call: [TELEPHONE NUMBER]
49-
50-
Regards,
51-
52-
53-
[SIGNATURE]
54-
55-
56-
[NAME TYPED]
57-
[TITLE]
58-
[COMPANY NAME]
59-
[COMPANY ADDRESS]
60-
[COMPANY STAMP]
61-
```
30+
<Render file="loa" />

src/content/docs/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ head:
1111

1212
import { Render } from "~/components"
1313

14-
Cloudflare's Advanced DNS Protection, powered by [`flowtrackd`](https://blog.cloudflare.com/announcing-flowtrackd/), provides stateful protection against DNS-based DDoS attacks, specifically sophisticated and fully randomized DNS attacks such as [random prefix attacks](/dns/dns-firewall/random-prefix-attacks/about/).
14+
<Render file="advanced-ddos/dns-protection-intro" />
1515

16-
<Render file="mt-advanced-ddos-systems-onboarding" />
16+
<Render file="advanced-ddos/mt-advanced-ddos-systems-onboarding" />
1717

1818
## How it works
1919

@@ -27,7 +27,7 @@ The [Network Analytics dashboard](/analytics/network-analytics/) will display sy
2727

2828
## Setup
2929

30-
[Create a rule](/ddos-protection/advanced-ddos-systems/how-to/create-rule/#create-an-advanced-dns-protection-rule) to enable Advanced DNS Protection.
30+
<Render file="advanced-ddos/dns-setup" />
3131

3232

3333
---

src/content/docs/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ head:
1111

1212
import { Render } from "~/components"
1313

14-
Cloudflare's Advanced TCP Protection, powered by [`flowtrackd`](https://blog.cloudflare.com/announcing-flowtrackd/), is a stateful TCP inspection engine used to detect and mitigate sophisticated out-of-state TCP attacks such as randomized and spoofed ACK floods or SYN and SYN-ACK floods.
14+
<Render file="advanced-ddos/tcp-protection-intro" />
1515

16-
<Render file="mt-advanced-ddos-systems-onboarding" />
16+
<Render file="advanced-ddos/mt-advanced-ddos-systems-onboarding" />
1717

1818
## How it works
1919

@@ -51,4 +51,4 @@ For more information on the configuration settings of out-of-state TCP rules, re
5151

5252
## Setup
5353

54-
[Create a global configuration](/ddos-protection/advanced-ddos-systems/overview/#rules) to set up SYN Flood and Out-of-state TCP rules and filters for Advanced TCP Protection.
54+
<Render file="advanced-ddos/tcp-setup" />

src/content/docs/ddos-protection/managed-rulesets/network/configure-dashboard.mdx

Lines changed: 2 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ head:
99

1010
---
1111

12-
import { Details, Render } from "~/components"
12+
import { Render } from "~/components"
1313

1414
Configure the Network-layer DDoS Attack Protection managed ruleset by defining [overrides](/ruleset-engine/managed-rulesets/override-managed-ruleset/) in the Cloudflare dashboard. DDoS overrides allow you to customize the **action** and **sensitivity** of one or more rules in the managed ruleset.
1515

@@ -19,35 +19,6 @@ For more information on the available parameters and allowed values, refer to [R
1919

2020
## Create a DDoS override
2121

22-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
23-
2. Go to Account Home > **L3/4 DDoS** > **Network-layer DDoS Protection**.
24-
3. Select **Deploy a DDoS override**.
25-
4. In **Set scope**, specify if you wish to apply the override to all incoming packets or to a subset of the packets.
26-
5. If you are creating an override for a subset of the incoming packets, define the [custom expression](/ddos-protection/managed-rulesets/network/override-expressions/) that matches the incoming packets you wish to target in the override, using either the Rule Builder or the Expression Editor.
27-
6. Select **Next**.
28-
7. Depending on what you wish to override, refer to the following sections (you can perform both configurations on the same override):
29-
<Details header="Configure all the rules in the ruleset (ruleset override)">
30-
8. Select **Next**.
31-
9. Enter a name for your override in **Execution name**.
32-
10. To always apply a given action for all the rules in the ruleset, select an action in **Ruleset action**.
33-
11. To set the sensitivity level for all the rules in the ruleset, select a value in **Ruleset sensitivity**.
34-
</Details>
35-
36-
<Details header="Configure one or more rules">
37-
12. Search for the rules you wish to override using the available filters. You can search for tags.
38-
13. To override a single rule, select the desired value for a field in the displayed dropdowns next to the rule.
39-
40-
To configure more than one rule, select the rules using the row checkboxes and update the fields for the selected rules using the dropdowns displayed before the table. You can also configure all the rules with a given tag. For more information, refer to [Configure rules in bulk in a managed ruleset](/waf/managed-rules/deploy-zone-dashboard/#configure-rules-in-bulk-in-a-managed-ruleset).
41-
14. Select **Next**.
42-
15. Enter a name for your override in **Execution name**.
43-
</Details>
44-
45-
:::note[Notes]
46-
47-
- Tag and rule overrides have priority over ruleset overrides.
48-
- <Render file="managed-rulesets/read-only-rules-note" />
49-
:::
50-
51-
8. To save and deploy the override, select **Deploy**. If you are not ready to deploy your override, select **Save as Draft**.
22+
<Render file="managed-rulesets/create-override" />
5223

5324
<Render file="managed-rulesets/delete-override" params={{ one: "select your account", two: "Account Home > L3/4 DDoS > Network-layer DDoS Protection" }} />
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
---
2+
title: Advertise prefixes
3+
pcx_content_type: learning-unit
4+
sidebar:
5+
order: 8
6+
---
7+
8+
import { Render } from "~/components";
9+
10+
<Render file="magic-transit/advertise-prefixes" product="networking-services" />
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
---
2+
title: Benefits of using Magic Transit
3+
pcx_content_type: learning-unit
4+
sidebar:
5+
order: 3
6+
---
7+
8+
import { PublicStats } from "~/components";
9+
10+
Magic Transit leverages Cloudflare's global anycast network. As of writing this guide, Cloudflare's global network spans <PublicStats id="data_center_cities" />, and has <PublicStats id="total_bandwidth" />. This bandwidth allows it to absorb all manners of attack that otherwise would overwhelm a typical data center or on-premise hardware Distributed Denial-of-Service (DDoS) appliances.
11+
12+
The number of DDoS attacks has been steadily increasing in recent years. In the first quarter of 2025, Cloudflared [mitigated 16.8 million network-layer DDoS attacks](https://blog.cloudflare.com/ddos-threat-report-for-2025-q1/#ddos-attacks-in-numbers). This represents a 397% increase quarter over quarter and a 509% increase year over year.
13+
14+
Other advantages of choosing Magic Transit:
15+
16+
- **Scalability**: As Cloudflare's global network expands, so does Magic Transit ability to absorb ever bigger DDoS attacks.
17+
- **Ease of management**: Magic Transit offers centralized, cloud-based management tools that simplify configuration and monitoring of your network security.
18+
- **Improvement of network performance**: Magic Transit steers traffic along tunnel routes based on priorities you define and uses equal-cost multi-path routing to provide load-balancing across tunnels with the same prefix and priority.
19+
- **Integration with zero-trust services**: Magic Transit integrates with other Cloudflare products, including Cloudflare One's SASE offerings, Magic Firewall, and more.
20+
- **Integration with CNI**: Directly connect your infrastructure to Cloudflare with CNI and bypass the Internet. Beyond a more reliable and secure experience, using CNI is an alternative to anycast GRE tunnels for getting traffic delivered to your infrastructure with a 1500-byte maximum transmission unit (MTU) handoff.
21+
- **Real-time traffic visibility and alerting**: Monitor and analyze traffic patterns, threat activity, and mitigation actions in real time through Cloudflare's analytics and logging tools. Set up customized alerts to notify you of potential threats, enabling faster incident response and better-informed network decisions.
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: Concepts
3+
pcx_content_type: overview
4+
sidebar:
5+
order: 1
6+
---
7+
8+
Learn core concepts about Magic Transit and its functionality, in order to protect your data centers from distributed denial-of-service (DDoS) attacks.
9+
10+
## Objectives
11+
12+
By the end of this module you will be able to:
13+
- Understand what Magic Transit is
14+
- Why you should use it to protect your IP network
15+
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
title: What is Magic Transit?
3+
pcx_content_type: learning-unit
4+
sidebar:
5+
order: 2
6+
---
7+
8+
Magic Transit is a network security and performance solution that offers Distributed Denial-of-Service (DDoS) protection, traffic acceleration, and more for on-premise, cloud-hosted, and hybrid networks.
9+
10+
Magic Transit works at Layer 3 of the [OSI model](https://www.cloudflare.com/en-gb/learning/ddos/glossary/open-systems-interconnection-model-osi/), protecting entire IP networks from DDoS attacks. Instead of relying on local infrastructure that can be overwhelmed by large DDoS attacks, Magic Transit uses the [global Cloudflare Network](https://www.cloudflare.com/network/) to ingest and mitigate attacks close to their source.
11+
12+
Magic Transit delivers its connectivity, security, and performance benefits by serving as the front door to your IP network. This means it accepts IP packets destined for your network, processes them, and then forwards them to your origin infrastructure.
13+
14+
The Cloudflare network uses Border Gateway Protocol (BGP) to announce your company's IP address space, extending your network presence globally, and [anycast](/magic-transit/reference/tunnels/#anycast) to absorb and distribute attack traffic.
15+
16+
Once packets hit Cloudflare's network, traffic is inspected for attacks, filtered, steered, accelerated, and sent onward to your origin. Magic Transit users have two options for their implementation: ingress traffic or ingress and egress traffic. Users with an egress implementation will need to set up policy-based routing (PBR) or ensure default routing on their end forwards traffic to Cloudflare via tunnels.
17+
18+
For an in-depth explanation of Magic Transit, refer to [Magic Transit Reference Architecture](/reference-architecture/architectures/magic-transit/).
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
---
2+
title: Configure DDoS protection
3+
pcx_content_type: learning-unit
4+
sidebar:
5+
order: 4
6+
---
7+
8+
import { Render } from "~/components"
9+
10+
Cloudflare DDoS protection automatically detects and mitigates Distributed Denial of Service (DDoS) attacks using its Autonomous Edge. Magic Transit customers have access to additional features, such as:
11+
12+
- [Advanced TCP protection](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/) (disabled by default)
13+
- [Advanced DNS protection (beta)](/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/)
14+
15+
## Create a DDoS override
16+
17+
<Render file="managed-rulesets/create-override" product="ddos-protection" />
18+
19+
## DDoS advanced protection
20+
21+
### Advanced TCP Protection
22+
23+
<Render file="advanced-ddos/tcp-protection-intro" product="ddos-protection" />
24+
25+
<Render file="advanced-ddos/mt-advanced-ddos-systems-onboarding" product="ddos-protection" />
26+
27+
#### Setup
28+
29+
<Render file="advanced-ddos/tcp-setup" product="ddos-protection" />
30+
31+
### Advanced DNS Protection
32+
33+
<Render file="advanced-ddos/dns-protection-intro" product="ddos-protection" />
34+
35+
<Render file="advanced-ddos/mt-advanced-ddos-systems-onboarding" product="ddos-protection" />
36+
37+
#### Setup
38+
39+
<Render file="advanced-ddos/dns-setup" product="ddos-protection" />
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
title: Configure routes
3+
pcx_content_type: learning-unit
4+
sidebar:
5+
order: 2
6+
---
7+
8+
import { Render } from "~/components"
9+
10+
<Render
11+
file="routing/configure-routes"
12+
product="networking-services"
13+
params={{
14+
magicWord: "Magic Transit",
15+
trafficSteeringPage: "/magic-transit/reference/traffic-steering/",
16+
productName: "Magic Transit",
17+
tunnelEndpoints: "/magic-transit/how-to/configure-tunnels/",
18+
chooseWeights: "/magic-transit/reference/traffic-steering/#set-priority-and-weights-for-static-routes",
19+
publicAsnMT: "[Public ASNs used for Magic Transit](/magic-transit/how-to/advertise-prefixes/#cloudflare-asn-vs-your-own-asn) are verified during the onboarding process.",
20+
productGatewayOrEgress: "Magic Transit with Egress"
21+
}}
22+
/>

0 commit comments

Comments
 (0)