Skip to content

Commit d44723d

Browse files
refined cni partial
1 parent 4508ae0 commit d44723d

File tree

1 file changed

+1
-57
lines changed

1 file changed

+1
-57
lines changed
Lines changed: 1 addition & 57 deletions
Original file line numberDiff line numberDiff line change
@@ -1,65 +1,9 @@
11
---
2-
params:
3-
- magic
4-
- productName
5-
- legacyHCLink
2+
{}
63
---
74

85
import { Aside, GlossaryTooltip } from "~/components";
96

107
Cloudflare Network Interconnect (CNI) allows you to connect your network infrastructure directly with Cloudflare — rather than using the public Internet — for a more reliable and secure experience. With CNI, you can bring Cloudflare's full suite of network functions to your physical network edge.
118

12-
{ props.magic === "Magic Transit" && (
13-
<>
14-
<p>Use Cloudflare Network Interconnect with Magic Transit to improve throughput and harden infrastructure to attack.</p>
15-
</>
16-
)
17-
}
18-
19-
## Guidelines
20-
21-
When working with { props.productName } and Cloudflare Network Interconnect (CNI), there are a few guidelines you should follow.
22-
23-
### Direct CNI
24-
25-
With [Direct CNI](/network-interconnect/express-cni/) you can use the Cloudflare dashboard to provision a connection to Cloudflare in three minutes or less. This type of connection supports IP packets with 1,500 bytes, both for ingress and egress traffic.
26-
27-
With Direct CNI you can also setup BGP peering between your network and Cloudflare.
28-
29-
#### Bidirectional health checks
30-
31-
Bidirectional health checks do not work when you use Direct CNI to onboard your traffic to Cloudflare. You will need to resort to the <a href={ props.legacyHCLink }>legacy health check system</a>.
32-
33-
{ props.magic === "Magic WAN" && (
34-
<>
35-
<Aside>
36-
Do not use Magic WAN Connector with Direct CNI. You can use the Connector with a Public Peering or a Private Network Interconnection <a href="/network-interconnect/pni-and-peering/">PNI</a> if needed.
37-
</Aside>
38-
</>
39-
)
40-
}
41-
42-
### Classic CNI
43-
44-
With Classic CNI you need to [set up an onboarding process](/network-interconnect/classic-cni/) with Cloudflare. There is no self-serving option through the dashboard.
45-
46-
{ props.magic === "Magic Transit" && (
47-
<>
48-
<p>With Classic CNI, you can create:</p>
49-
<ul>
50-
<li><strong>GRE tunnels over CNI</strong>: For ingress and egress traffic. To accommodate overhead from additional headers, you will need to set the MTU size of your GRE tunnel interface to 1,476 bytes and your MSS clamp to be 1,436 bytes. These are used to backhaul data from the data center where traffic is ingested — close to the end user — to the facility with the CNI link.</li>
51-
<li><strong>CNI connections without GRE tunnels</strong>: For ingress traffic from Cloudflare to customer device. There is no need to set <GlossaryTooltip term="maximum segment size (MSS)">MSS clamping</GlossaryTooltip>, as this supports IP packets with 1,500 bytes.</li>
52-
</ul>
53-
</>
54-
)
55-
}
56-
57-
{ props.magic === "Magic WAN" && (
58-
<>
59-
<p>Magic WAN only supports GRE tunnels over CNI. To accommodate overhead from additional headers, you will need to set the MTU size of your GRE tunnel interface to 1,476 bytes and your MSS clamp to be 1,436 bytes. These are used to backhaul data from the data center where traffic is ingested — close to the end user — to the facility with the CNI link.</p>
60-
<p>Magic WAN with Classic CNI does not support BGP for the private encapsulated traffic. You need to create policy-based routes to ensure traffic is routed correctly. Classic CNI does support BGP for the outer GRE packet, and this can be used for re-routing the tunnel over a backup CNI in the event of an issue with the primary.</p>
61-
</>
62-
)
63-
}
64-
659
For more information about Network Interconnect, refer to the [Cloudflare Network Interconnect documentation](/network-interconnect/).

0 commit comments

Comments
 (0)