Skip to content

Commit e0f3249

Browse files
Apply suggestions from code review
Co-authored-by: Pedro Sousa <[email protected]>
1 parent 6fa0953 commit e0f3249

File tree

2 files changed

+10
-10
lines changed

2 files changed

+10
-10
lines changed

src/content/docs/magic-wan/configuration/manually/third-party/azure-virtual-wan.mdx

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,13 @@ This tutorial provides information on how to connect Magic WAN to a Microsoft Az
99

1010
You will need to have an existing Resource group, Virtual Network, and Virtual Machine created in your Azure account. Refer to [Microsoft's documentation](https://learn.microsoft.com/en-us/azure/virtual-network/) to learn more on how to create these.
1111

12-
## Start Azure Configuration
12+
## Start Azure configuration
1313

1414
### 1. Create a Virtual WAN
1515

16-
In order to connect one or more VNets to Magic WAN via a Virtual WAN hub, you first need to create a Virtual WAN (vWAN) resource representing your Azure network. If you already have a vWAN that you wish to connect to Magic WAN, continue to the next step. Refer to [Microsoft's documentation](https://learn.microsoft.com/en-us/azure/virtual-wan/virtual-wan-site-to-site-portal#openvwan) to learn more.
16+
To connect one or more VNets to Magic WAN via a Virtual WAN hub, you first need to create a Virtual WAN (vWAN) resource representing your Azure network. If you already have a vWAN that you wish to connect to Magic WAN, continue to the next step. Refer to [Microsoft's documentation](https://learn.microsoft.com/en-us/azure/virtual-wan/virtual-wan-site-to-site-portal#openvwan) to learn more.
1717

18-
1. Go to your **Virtual WANs** page.
18+
1. In the Azure portal, go to your **Virtual WANs** page.
1919
2. Select the option to create a **Virtual WAN**.
2020
3. Create a Virtual WAN with the **Type** set to **Standard**.
2121

@@ -30,25 +30,25 @@ Using traditional hub and spoke terminology, a Virtual WAN Hub deployed within a
3030
3. In **Site to Site**:
3131
1. In **Do you want to create a Site to site (VPN gateway)?** select **Yes**.
3232
2. Select your desired **Gateway scale units** and **Routing Preference**. Refer to [Microsoft's documentation](https://learn.microsoft.com/en-us/azure/virtual-network/ip-services/routing-preference-overview#routing-via-microsoft-global-network) to learn more about Azure routing preferences.
33-
4. Select **Create**. Note that the deployment time for the vWAN Hub and VPN Gateway may take upwards of 30 minutes.
33+
4. Select **Create**. Note that the deployment time for the vWAN Hub and VPN Gateway may take 30 minutes or more.
3434
5. After the VPN Gateway has finished provisioning, go to **Virtual WAN** > **Hubs** > **Your vHub** > **Connectivity** > **VPN (Site to site)**.
3535
6. In the **Essentials** dropdown select the VPN Gateway listed.
3636
7. Select the JSON View for the VPN Gateway and take note of the JSON attributes at the paths `properties.ipConfigurations[0].publicIpAddress` and `properties.ipConfigurations[1].publicIpAddress`. These will be the customer endpoints needed when configuring IPsec tunnels for Magic WAN.
3737

3838
### 3. Create a VPN site
3939

40-
A VPN site represents the remote site your Azure vWAN can reach through a VPN connection. This is typically an on-premises location. In this case, the VPN site represents Magic WAN.
40+
A VPN site represents the remote site your Azure vWAN can reach through a VPN connection. This is typically an on-premises location. In this case, the VPN site represents Magic WAN.
4141

4242
1. Go to **Virtual WAN** > **VPN sites** > **Create site**.
4343
2. In **Basics**:
4444
1. Configure your desired region and name.
4545
2. Configure the **Device vendor** as Cloudflare.
46-
3. In **Private address space**, specify the address range(s) you wish to access from your vWAN through Magic WAN. This could include other private networks connected to your Magic WAN, or a default route (`0.0.0.0/0`) if you want Internet egress traffic to traverse Magic WAN (that is, to be scanned by Cloudflare Gateway). The address space can be modified after VPN Site creation.
46+
3. In **Private address space**, specify the address range(s) you wish to access from your vWAN through Magic WAN. This could include other private networks connected to your Magic WAN, or a default route (`0.0.0.0/0`) if you want Internet egress traffic to traverse Magic WAN (that is, to be scanned by Cloudflare Gateway). The address space can be modified after VPN site creation.
4747
3. In **Links**:
4848
1. Configure a single link. Provide a name, speed (in Mbps), and provider name (here, enter `Cloudflare`) for your link. For the **Link IP address**, enter your Cloudflare anycast address. The **BGP address** and **ASN** fields should be left empty. BGP is not supported at the time of writing this tutorial.
4949
4. Select **Create**.
5050

51-
### 4. Configure VPN Site for Magic IPsec tunnel health checks
51+
### 4. Configure VPN site for Magic IPsec tunnel health checks
5252

5353
Magic WAN uses [Tunnel Health Checks](/magic-wan/reference/tunnel-health-checks/) to monitor whether a tunnel is available.
5454

@@ -57,7 +57,7 @@ Tunnel health checks make use of ICMP probes sent from the Cloudflare side of th
5757
- **Cloudflare Dashboard:** In your Magic IPsec tunnel configuration as the address of the virtual tunnel interface (VTI) (so that Cloudflare knows what address to send probes from). Cloudflare requires this address in CIDR notation with a `/31` netmask.
5858
- **Azure Portal:** In your VPN site's address space (so that Azure routes probe responses back over the tunnel). Azure requires this address in CIDR notation with a `/32` netmask.
5959

60-
Cloudflare recommends customers select a unique `/31` subnet ([RFC 1918 — Address Allocation for Private Internets](https://datatracker.ietf.org/doc/html/rfc1918)) for each IPsec tunnel which is treated as a Point-to-Point Link and provides the ideal addressing scheme to satisfy both requirements.
60+
Cloudflare recommends that you select a unique `/31` subnet ([RFC 1918 — Address Allocation for Private Internets](https://datatracker.ietf.org/doc/html/rfc1918)) for each IPsec tunnel which is treated as a Point-to-Point Link and provides the ideal addressing scheme to satisfy both requirements.
6161

6262
Example:
6363

@@ -75,7 +75,7 @@ Refer to RFC 3021 for more information on using 31-bit prefixes on [IPv4 Point-t
7575

7676
To configure the Address Space for the Local Network Gateway to support Tunnel Health Checks:
7777

78-
1. Go to **Virtual WAN** > **VPN sites** > **Your VPN Site** > **Edit site** to edit the VPN Site configured in the previous section.
78+
1. Go to **Virtual WAN** > **VPN sites** > **Your VPN Site** > **Edit site** to edit the VPN site configured in the previous section.
7979
2. Update the **Private address space** to include two `/32` subnets in CIDR notation as described above. When using Azure VPN Gateways with vWAN Hubs, a single VPN Gateway Connection maps to two Magic WAN IPsec Tunnels. For this reason, we need to select two unique `/31` subnets, one for each Cloudflare IPsec Tunnel. The upper address of each `/31` is then added to the VPN Site's Private address space as a `/32`subnet.
8080
3. Select **Confirm**.
8181

src/content/docs/magic-wan/configuration/manually/third-party/azure.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ pcx_content_type: integration-guide
33
title: Microsoft Azure
44
---
55

6-
Microsoft Azure integration guide currently available:
6+
Microsoft Azure integration guides currently available:
77

88
- [Microsoft Azure VPN Gateway](/magic-wan/configuration/manually/third-party/azure-vpn-gateway/)
99
- [Microsoft Azure Virtual WAN](/magic-wan/configuration/manually/third-party/azure-virtual-wan/)

0 commit comments

Comments
 (0)