Skip to content

Commit f8123b2

Browse files
Apply suggestions from code review
Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com>
1 parent b76cef7 commit f8123b2

File tree

1 file changed

+9
-9
lines changed
  • src/content/docs/magic-wan/configuration/manually/third-party

1 file changed

+9
-9
lines changed

src/content/docs/magic-wan/configuration/manually/third-party/juniper.mdx

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ This section of the document will cover the configuration of:
3434
- The IP addresses used for the Interface address must be a unique RFC1918 address (`/31` or `/30`).
3535
- The **Customer endpoint** is the same IP specified for the first tunnel.
3636
- The **Cloudflare Endpoint** for the second tunnel will be the second Cloudflare anycast IP provisioned for your account.
37-
3. Select **Add tunnels**. We also recommend selecting **Test Tunnels** to ensure that the settings do not conflict with any other tunnels defined in your account and that the correct Anycast IP addresses are specified.
37+
3. Select **Add tunnels**. We also recommend selecting **Test Tunnels** to ensure that the settings do not conflict with any other tunnels defined in your account and that the correct anycast IP addresses are specified.
3838
4. Because we chose to add a pre-shared key at a later stage, you will see a warning indicator next to the tunnel names after creating them. This is expected behavior and indicates there is no pre-shared key associated with the tunnel.
3939
5. Select **Edit** next to one of the tunnels to generate a pre-shared key.
4040
6. Select **Generate a new pre-shared key** > **Update and generate a pre-shared key**. Make note of the pre-shared key and store it somewhere safe.
@@ -79,7 +79,7 @@ The following elements will be configured on the Juniper SRX firewall(s):
7979
- Assign tunnel interfaces to a security zone
8080
- Allow required protocols to both the tunnel and untrust security zones
8181
- IKE configuration
82-
- IPSec configuration
82+
- IPsec configuration
8383
- Static routes
8484
- Security policies
8585

@@ -110,7 +110,7 @@ unit 1 {
110110
}
111111
```
112112

113-
### Security Zone (cloudflare) - tunnel interfaces
113+
### Security Zone (Cloudflare) - tunnel interfaces
114114

115115
Define a security zone and add both tunnel interfaces to it. At a minimum, the interfaces should allow ping, but this zone only contains point-to-point connections between the firewall and the customer network namespace. Setting it to `all` for system-services and protocols should be fine.
116116

@@ -188,7 +188,7 @@ set security ike proposal cf_ike_magic_wan_prop lifetime-seconds 28800
188188

189189
#### IKE policies
190190

191-
Define two IKE policies — one for each of the two Magic IPSec tunnels:
191+
Define two IKE policies — one for each of the two Magic IPsec tunnels:
192192

193193
**Tunnel 1 (SRX220_IPSEC_01)**
194194

@@ -230,11 +230,11 @@ set security ike gateway cf_magic_wan_gw_02 external-interface ge-0/0/2.0
230230
set security ike gateway cf_magic_wan_gw_02 version v2-only
231231
```
232232

233-
### Phase 2 - IPSec
233+
### Phase 2 - IPsec
234234

235235
#### IPsec proposal
236236

237-
Add an IPSec proposal that specifies the [Phase 2 Configuration Parameters](/magic-wan/reference/tunnels/#supported-configuration-parameters):
237+
Add an IPsec proposal that specifies the [Phase 2 Configuration Parameters](/magic-wan/reference/tunnels/#supported-configuration-parameters):
238238

239239
```txt
240240
set security ipsec proposal cf_ipsec_magic_wan_prop authentication-algorithm hmac-sha-256-128
@@ -244,7 +244,7 @@ set security ipsec proposal cf_ipsec_magic_wan_prop lifetime-seconds 28800
244244

245245
#### IPsec policies
246246

247-
Define two IPsec policies — one for each of the two Magic IPSec tunnels. It is crucial to ensure that:
247+
Define two IPsec policies — one for each of the two Magic IPsec tunnels. It is crucial to ensure that:
248248

249249
- [Anti-replay](/magic-wan/reference/anti-replay-protection/) protection is disabled.
250250
- Use [`no-anti-replay`](https://www.juniper.net/documentation/us/en/software/junos/interfaces-adaptive-services/topics/ref/statement/no-anti-replay-edit-services.html) as the setting
@@ -317,7 +317,7 @@ Define security policies to permit traffic flows destined for Magic WAN protecte
317317

318318
There are two very simple rules to allow traffic bidirectionally — it is generally recommended to start with a similar policy, then to add more stringent rules once general connectivity is established successfully.
319319

320-
**From *cloudflare* to *trust*:**
320+
**From Cloudflare to *trust*:**
321321

322322
```txt
323323
set security policies from-zone cloudflare to-zone trust policy cloudflare_to_trust match source-address any
@@ -346,7 +346,7 @@ policy trust_to_cloudflare_permit {
346346
}
347347
```
348348

349-
**From *trust* to *cloudflare*:**
349+
**From *trust* to *Cloudflare*:**
350350

351351
```txt
352352
set security policies from-zone trust to-zone cloudflare policy trust_to_cloudflare_permit match source-address any

0 commit comments

Comments
 (0)