Skip to content

Commit e872b06

Browse files
moved the aside to breaktout only
1 parent 6682c05 commit e872b06

File tree

1 file changed

+5
-7
lines changed

1 file changed

+5
-7
lines changed

src/content/partials/magic-wan/connector/app-aware-policies/breakout-prioritized.mdx

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ import { APIRequest, Aside, Markdown, Render, TabItem, Tabs } from "~/components
1111
{ props.magicWord === "breakout" && (
1212
<>
1313
<p>Breakout traffic allows you to define which applications should bypass Cloudflare's security filtering, and go directly to the Internet. It works via DNS requests inspection. This means that if your network is caching DNS requests, Breakout traffic will only take effect after you cache entries expire and your client issues a new DNS request that the Magic WAN Connector can detect. This can take several minutes.</p>
14-
<Aside type="note">Breakout traffic will not work for applications that use DNS-over-HTTPs.</Aside>
14+
<Aside type="caution">Breakout traffic will not work for applications that use DNS-over-HTTPs.</Aside>
1515
</>
1616
)
1717
}
@@ -40,16 +40,14 @@ import { APIRequest, Aside, Markdown, Render, TabItem, Tabs } from "~/components
4040
`}
4141
</pre>
4242
<p><em>In the graph above, Applications 1 and 2 are configured to bypass Cloudflare's security filtering, and go straight to the Internet</em></p>
43+
<Aside type="note" header="A note on security">
44+
<p>We recommend <a href="https://www.cloudflare.com/learning/network-layer/what-is-routing/" target="_blank" rel="noopener noreferrer">routing</a> all traffic through our global network for comprehensive security filtering and access controls. However, there may be specific cases where you want a subset of traffic to bypass Cloudflare's security filtering and route it directly to the Internet. You can scope this breakout traffic to specific applications from the Cloudflare dashboard.</p>
45+
<p>Refer to <a href="/magic-wan/reference/traffic-steering/">Traffic steering</a> to learn how Cloudflare routes traffic.</p>
46+
</Aside>
4347
</>
4448
)
4549
}
4650

47-
## Security best practices
48-
49-
We recommend [routing](https://www.cloudflare.com/learning/network-layer/what-is-routing/) all traffic through our global network for comprehensive security filtering and access controls. However, there may be specific cases where you want a subset of traffic to bypass Cloudflare's security filtering and route it directly to the Internet. You can scope this breakout traffic to specific applications from the Cloudflare dashboard.
50-
51-
Refer to [Traffic steering](/magic-wan/reference/traffic-steering/) to learn how Cloudflare routes traffic.
52-
5351
## Add an application
5452

5553
You need to configure {props.featureName} for each of your existing sites, as it is a per-site configuration.

0 commit comments

Comments
 (0)