Skip to content

Commit ecbf11a

Browse files
Apply suggestions from code review
Co-authored-by: Maddy <[email protected]>
1 parent 6b2b4dc commit ecbf11a

File tree

4 files changed

+8
-8
lines changed

4 files changed

+8
-8
lines changed

src/content/docs/learning-paths/data-center-protection/concepts/what-is-magic-transit.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,11 +7,11 @@ sidebar:
77

88
Magic Transit is a network security and performance solution that offers Distributed Denial-of-Service (DDoS) protection, traffic acceleration, and more for on-premise, cloud-hosted, and hybrid networks.
99

10-
Magic Transit works at Layer 3 of the OSI model, protecting entire IP networks from DDoS attacks. Instead of relying on local infrastructure that can be overwhelmed by large DDoS attacks, Magic Transit uses the [global Cloudflare Network](https://www.cloudflare.com/network/) to ingest and mitigate attacks close to their source.
10+
Magic Transit works at Layer 3 of the [OSI model](https://www.cloudflare.com/en-gb/learning/ddos/glossary/open-systems-interconnection-model-osi/), protecting entire IP networks from DDoS attacks. Instead of relying on local infrastructure that can be overwhelmed by large DDoS attacks, Magic Transit uses the [global Cloudflare Network](https://www.cloudflare.com/network/) to ingest and mitigate attacks close to their source.
1111

1212
Magic Transit delivers its connectivity, security, and performance benefits by serving as the front door to your IP network. This means it accepts IP packets destined for your network, processes them, and then forwards them to your origin infrastructure.
1313

14-
The Cloudflare network uses Border Gateway Protocol (BGP) to announce your company's IP address space, extending your network presence globally, and [anycast](/magic-transit/reference/tunnels/#anycast) to to absorb and distribute attack traffic.
14+
The Cloudflare network uses Border Gateway Protocol (BGP) to announce your company's IP address space, extending your network presence globally, and [anycast](/magic-transit/reference/tunnels/#anycast) to absorb and distribute attack traffic.
1515

1616
Once packets hit Cloudflare's network, traffic is inspected for attacks, filtered, steered, accelerated, and sent onward to your origin. Magic Transit users have two options for their implementation: ingress traffic or ingress and egress traffic. Users with an egress implementation will need to set up policy-based routing (PBR) or ensure default routing on their end forwards traffic to Cloudflare via tunnels.
1717

src/content/docs/learning-paths/data-center-protection/post-prefix-fine-tuning.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ For both [Advanced TCP Protection](/ddos-protection/advanced-ddos-systems/overvi
2121

2222
Once all your prefixes are advertised and/or once all your expected traffic is cut over to the Magic Transit prefixes, reach out to your Cloudflare account team to have the thresholds configured.
2323

24-
You can then change the mode on your Advanced TCP and DNS protections from `monitoring` to `mitigation`. You can also create a filter for `monitoring` mode for any traffic flows for which you see false positives. Try to keep this specific so that the protection is enabled for other inbound traffic flows.
24+
You can then change the mode on your Advanced TCP and DNS protections from `monitoring` to `mitigation`. You can also create a filter for `monitoring` mode for any traffic flows for which you see false positives. Try to keep this specific so that the protection is enabled for other inbound traffic flows.
2525

2626
## Magic Firewall rules
2727

@@ -33,7 +33,7 @@ Refer to Magic Firewall's [best practices](/magic-firewall/best-practices/) for
3333

3434
## Alerts for Magic Tunnel health checks and DDoS
3535

36-
- Ensure all teams/members needing to receive these are getting the alerts
36+
- Ensure all teams/members needing to receive these are getting the alerts.
3737
- Check the Magic Tunnel Health Check Alert configuration for Sensitivity and Alert interval and tunnels in-scope.
3838
- Refer to [Set up Magic Tunnel health alerts](/learning-paths/data-center-protection/enable-notifications/#set-up-magic-tunnel-health-alerts) and [DDoS alerts](/ddos-protection/reference/alerts/) for more details.
3939

src/content/docs/learning-paths/data-center-protection/troubleshooting.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ sidebar:
1212
**Potential solutions**:
1313
- Run a traceroute from the Magic Transit prefix out to the destination IP on the Internet.
1414
- Verify on your CPE there is no uRPF strict mode or anti-spoofing which would drop this traffic.
15-
- Verify that your CPE is not enforcing uRPF strict mode or other anti-spoofing mechanisms that could drop this traffic.. If they do, ask them to change this to loose mode.
15+
- Verify that your CPE is not enforcing uRPF strict mode or other anti-spoofing mechanisms that could drop this traffic. If they do, ask them to change this to loose mode.
1616
- Other workarounds:
1717
- If you have a less-specific prefix then you can continue to advertise this to your ISP while Cloudflare advertises a more-specific prefix. For example, Cloudflare advertises a `/24` to the Internet; you advertise its parent `/23` to your ISP.
1818
- You can continue advertising a `/24` to your ISP, but this is not recommended, as inbound traffic from your ISP would bypass Cloudflare and therefore not benefit from Magic Transit DDoS protection.
@@ -45,7 +45,7 @@ For example, devices cannot browse to a server which is hosted on the Magic Tran
4545

4646
If you suspect that Cloudflare mitigations might be dropping legitimate traffic to your Magic Transit prefix:
4747

48-
1. Go to the the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
48+
1. Go to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
4949
2. Go to **Analytics & Logs** > **Network Analytics**.
5050
3. In the **All traffic** tab select **Add filter** to configure the filters for the traffic-flow in question — like source IP, destination IP and protocol/ports.
5151
4. Check the analytics results to determine which Cloudflare mitigation system has dropped the traffic — for example, DDoS Managed Rules, Advanced TCP/DNS Protection or Magic Firewall.

src/content/partials/networking-services/magic-transit/get-started.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ If you are using a [Cloudflare IP](#ips), you do not need to verify your IRR ent
8383

8484
You can also use the Resource Public Key Infrastructure (RPKI) as an additional option to validate your prefixes. RPKI is a [security framework method](https://blog.cloudflare.com/rpki/) that associates a route with an autonomous system. It uses cryptography to validate the information before being passed onto the routers.
8585

86-
If you operate a network (ISP, cloud provider, enterprise, etc.), using RPKI ensures that your IP prefixes are correctly recognized. This prevents service disruptions and protects your brand's reputation. Without RPKI, attackers could announce your IP space, misdirect your traffic, and potentially harm your business.
86+
If you operate a network (ISP, cloud provider, enterprise, and others.), using RPKI ensures that your IP prefixes are correctly recognized. This prevents service disruptions and protects your brand's reputation. Without RPKI, attackers could announce your IP space, misdirect your traffic, and potentially harm your business.
8787

8888
To check your prefixes, you can use [Cloudflare's RPKI Portal](https://rpki.cloudflare.com/?view=validator).
8989

@@ -145,7 +145,7 @@ Refer to [Maximum transmission unit and maximum segment size](/magic-transit/ref
145145
{ props.magicWord === "Learning Path" && (
146146
<>
147147
<AnchorHeading title="BGP for Magic Transit prefix advertisement control (optional)" depth={2} />
148-
<p>If you want to use <a href="/magic-transit/how-to/advertise-prefixes/#border-gateway-protocol-bgp-control-for-advertisements-optional">BGP for prefix advertisement control</a> then you need to let the account team know the IPs and ASN for your customer premises equipment (CPE) to use for the BGP peerings. You should allow around five working days for Cloudflare to add this to our Route Reflectors.</p>
148+
<p>If you want to use <a href="/magic-transit/how-to/advertise-prefixes/#border-gateway-protocol-bgp-control-for-advertisements-optional">BGP for prefix advertisement control</a> then you need to let the account team know the IPs and ASN for your customer premises equipment (CPE) to use for the BGP peerings. You should allow around five working days for Cloudflare to add this to our Route Reflectors.</p>
149149
</>
150150
)
151151
}

0 commit comments

Comments
 (0)