Skip to content

Commit d4860b7

Browse files
vars
1 parent 284c5f1 commit d4860b7

File tree

3 files changed

+5
-2
lines changed

3 files changed

+5
-2
lines changed

src/content/docs/magic-transit/reference/traffic-steering.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ import { Render } from "~/components";
2020
productName: "Magic Transit",
2121
mFirewallName: "Magic Firewall",
2222
mFirewallURL: "/magic-firewall/",
23+
warpClientURL: "/cloudflare-one/connections/connect-devices/warp/",
2324
greIpsecReferenceURL: "/magic-transit/reference/gre-ipsec-tunnels/",
2425
createStaticRoute: "/magic-transit/how-to/configure-routes/#create-a-static-route",
2526
editStaticRoute: "/magic-transit/how-to/configure-routes/#edit-a-static-route",

src/content/docs/magic-wan/reference/traffic-steering.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ import { Render } from "~/components";
2020
productName: "Magic WAN",
2121
mFirewallName: "Magic Firewall",
2222
mFirewallURL: "/magic-firewall/",
23+
warpClientURL: "/cloudflare-one/connections/connect-devices/warp/",
2324
greIpsecReferenceURL: "/magic-wan/reference/gre-ipsec-tunnels/",
2425
createStaticRoute: "/magic-wan/configuration/manually/how-to/configure-routes/#create-a-static-route",
2526
editStaticRoute: "/magic-wan/configuration/manually/how-to/configure-routes/#edit-a-static-route",

src/content/partials/networking-services/reference/traffic-steering.mdx

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ params:
44
- productName
55
- mFirewallName
66
- mFirewallURL
7+
- warpClientURL
78
- greIpsecReferenceURL
89
- createStaticRoute
910
- editStaticRoute
@@ -18,8 +19,8 @@ import { AnchorHeading, Aside, Markdown, Render } from "~/components";
1819

1920
The Magic networking routing table is a virtual network overlay, private to your account, that spans all Cloudflare data centers globally. This overlay network provides:
2021

21-
- Magic Transit delivery for [DoS](/ddos-protection/) and <a href={props.mFirewallURL}>{props.mFirewallName}</a> [Magic Firewall](/magic-firewall/) filtered Internet traffic, from the entry data center where the traffic ingressed, to your publicly addressed edge/border network.
22-
- {props.productName} packet transport between Magic tunnels, interconnects, [Cloudflare Load Balancer](/load-balancing/), and [Zero Trust](/cloudflare-one/) connections such as [WARP Client](/cloudflare-one/connections/connect-devices/warp/), [Remote Browser Isolation](/cloudflare-one/policies/browser-isolation/), [Access](/cloudflare-one/policies/access/), and [Gateway](/cloudflare-one/policies/gateway/).
22+
- Magic Transit delivery for [DoS](/ddos-protection/) and <a href={props.mFirewallURL}>{props.mFirewallName}</a> filtered Internet traffic, from the entry data center where the traffic ingressed, to your publicly addressed edge/border network.
23+
- {props.productName} packet transport between Magic tunnels, interconnects, [Cloudflare Load Balancer](/load-balancing/), and [Zero Trust](/cloudflare-one/) connections such as <a href={props.warpClientURL}>WARP Client</a>, [Remote Browser Isolation](/cloudflare-one/policies/browser-isolation/), [Access](/cloudflare-one/policies/access/), and [Gateway](/cloudflare-one/policies/gateway/).
2324

2425
The Magic routing table supports routing the {props.productName} traffic via anycast tunnels using <a href={props.greIpsecReferenceURL}>GRE and Internet Protocol Security (IPsec)</a> or [Direct Cloudflare Network Interconnect (CNI)](/network-interconnect/). Entries can be added to the Magic routing table via static route configuration or via routes learned through BGP peering (only available over Direct CNI).
2526

0 commit comments

Comments
 (0)