|
1 | 1 | --- |
2 | | -params: |
3 | | - - magic |
4 | | - - productName |
5 | | - - legacyHCLink |
| 2 | +{} |
6 | 3 | --- |
7 | 4 |
|
8 | 5 | import { Aside, GlossaryTooltip } from "~/components"; |
9 | 6 |
|
10 | 7 | Cloudflare Network Interconnect (CNI) allows you to connect your network infrastructure directly with Cloudflare — rather than using the public Internet — for a more reliable and secure experience. With CNI, you can bring Cloudflare's full suite of network functions to your physical network edge. |
11 | 8 |
|
12 | | -{ props.magic === "Magic Transit" && ( |
13 | | - <> |
14 | | - <p>Use Cloudflare Network Interconnect with Magic Transit to improve throughput and harden infrastructure to attack.</p> |
15 | | - </> |
16 | | - ) |
17 | | -} |
18 | | - |
19 | | -## Guidelines |
20 | | - |
21 | | -When working with { props.productName } and Cloudflare Network Interconnect (CNI), there are a few guidelines you should follow. |
22 | | - |
23 | | -### Direct CNI |
24 | | - |
25 | | -With [Direct CNI](/network-interconnect/express-cni/) you can use the Cloudflare dashboard to provision a connection to Cloudflare in three minutes or less. This type of connection supports IP packets with 1,500 bytes, both for ingress and egress traffic. |
26 | | - |
27 | | -With Direct CNI you can also setup BGP peering between your network and Cloudflare. |
28 | | - |
29 | | -#### Bidirectional health checks |
30 | | - |
31 | | -Bidirectional health checks do not work when you use Direct CNI to onboard your traffic to Cloudflare. You will need to resort to the <a href={ props.legacyHCLink }>legacy health check system</a>. |
32 | | - |
33 | | -{ props.magic === "Magic WAN" && ( |
34 | | - <> |
35 | | - <Aside> |
36 | | - Do not use Magic WAN Connector with Direct CNI. You can use the Connector with a Public Peering or a Private Network Interconnection <a href="/network-interconnect/pni-and-peering/">PNI</a> if needed. |
37 | | - </Aside> |
38 | | - </> |
39 | | - ) |
40 | | -} |
41 | | - |
42 | | -### Classic CNI |
43 | | - |
44 | | -With Classic CNI you need to [set up an onboarding process](/network-interconnect/classic-cni/) with Cloudflare. There is no self-serving option through the dashboard. |
45 | | - |
46 | | -{ props.magic === "Magic Transit" && ( |
47 | | - <> |
48 | | - <p>With Classic CNI, you can create:</p> |
49 | | - <ul> |
50 | | - <li><strong>GRE tunnels over CNI</strong>: For ingress and egress traffic. To accommodate overhead from additional headers, you will need to set the MTU size of your GRE tunnel interface to 1,476 bytes and your MSS clamp to be 1,436 bytes. These are used to backhaul data from the data center where traffic is ingested — close to the end user — to the facility with the CNI link.</li> |
51 | | - <li><strong>CNI connections without GRE tunnels</strong>: For ingress traffic from Cloudflare to customer device. There is no need to set <GlossaryTooltip term="maximum segment size (MSS)">MSS clamping</GlossaryTooltip>, as this supports IP packets with 1,500 bytes.</li> |
52 | | - </ul> |
53 | | - </> |
54 | | - ) |
55 | | -} |
56 | | - |
57 | | -{ props.magic === "Magic WAN" && ( |
58 | | - <> |
59 | | - <p>Magic WAN only supports GRE tunnels over CNI. To accommodate overhead from additional headers, you will need to set the MTU size of your GRE tunnel interface to 1,476 bytes and your MSS clamp to be 1,436 bytes. These are used to backhaul data from the data center where traffic is ingested — close to the end user — to the facility with the CNI link.</p> |
60 | | - <p>Magic WAN with Classic CNI does not support BGP for the private encapsulated traffic. You need to create policy-based routes to ensure traffic is routed correctly. Classic CNI does support BGP for the outer GRE packet, and this can be used for re-routing the tunnel over a backup CNI in the event of an issue with the primary.</p> |
61 | | - </> |
62 | | - ) |
63 | | -} |
64 | | - |
65 | 9 | For more information about Network Interconnect, refer to the [Cloudflare Network Interconnect documentation](/network-interconnect/). |
0 commit comments