You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* moved product specific info
* corrected step
* changed product names to props
* corrected text and steps
* corrected sentences
* refined text
* added bgp info to cni
* Update src/content/partials/network-interconnect/bgp-peering.mdx
Co-authored-by: Jun Lee <[email protected]>
---------
Co-authored-by: Jun Lee <[email protected]>
asnProduct: "<br /> Magic Transit customers should also be aware of the following: <br /> <ul><li>The Cloudflare side ASN will never be exposed in <code>AS_PATH</code> of anycast announcements from the Cloudflare edge. In those announcements, Cloudflare will always use the Cloudflare ASN of <code>13335</code> optionally prepended with a bring-your-own ASN as described in [Cloudflare ASN vs. your own ASN](/magic-transit/how-to/advertise-prefixes/#cloudflare-asn-vs-your-own-asn)</li><li>The customer device ASN can be a private ASN or the ASN they are using for Magic Transit anycast announcements at the edge: this has no impact on the ASN for the anycast announced prefix at the edge of the Cloudflare global network.</li></ul>"
asnProduct: "<br /> Magic WAN customers should also be aware of the following: <br /> <ul><li>The Cloudflare side ASN will be included in the <code>AS_PATH</code> of announced routes to any BGP enabled interconnect.</li><li>The customer chooses their device ASN, which should be different to the Cloudflare-side ASN.</li></ul>"
Magic WAN and Magic Transit customers can use the Cloudflare dashboard to configure and manage BGP peering between their networks and their Magic routing table when using a Direct CNI on-ramp.
9
+
10
+
Using BGP peering with a CNI allows customers to:
11
+
- Automate the process of adding or removing networks and subnets.
12
+
- Take advantage of failure detection and session recovery features.
13
+
14
+
With this functionality, customers can:
15
+
- Establish an eBGP session between their devices and the Magic WAN / Magic Transit service when connected via CNI.
16
+
- Secure the session by MD5 authentication to prevent misconfigurations.
17
+
- Exchange routes dynamically between their devices and their Magic routing table.
18
+
19
+
Refer to [Magic WAN BGP peering](/magic-wan/configuration/manually/how-to/bgp-peering/) or [Magic Transit BGP peering](/magic-transit/how-to/bgp-peering/) to learn more about this feature and how to set it up.
Copy file name to clipboardExpand all lines: src/content/docs/network-interconnect/express-cni/create-interconnects.mdx
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,8 @@
1
1
---
2
2
title: Create interconnects
3
3
pcx_content_type: how-to
4
+
sidebar:
5
+
order: 2
4
6
---
5
7
6
8
To create a new interconnect, make sure you are logged in with Admin or higher-level account permissions. This is required for the wizard to successfully request and provision a new Direct CNI connection.
Copy file name to clipboardExpand all lines: src/content/partials/network-interconnect/bgp-peering.mdx
+13-21Lines changed: 13 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,7 @@ params:
3
3
- productName
4
4
- productPath
5
5
- legacyHCs
6
+
- asnProduct
6
7
---
7
8
8
9
import { Markdown } from"~/components";
@@ -14,15 +15,15 @@ Using BGP peering with a CNI allows customers to:
14
15
- Take advantage of failure detection and session recovery features.
15
16
16
17
With this functionality, customers can:
17
-
- Establish an eBGP session between their devices and the {props.productName} service when connected via CNI
18
+
- Establish an eBGP session between their devices and the {props.productName} service when connected via CNI.
18
19
- Secure the session by MD5 authentication to prevent misconfigurations.
19
20
- Exchange routes dynamically between their devices and their Magic routing table.
20
21
21
22
## Route distribution and convergence
22
23
23
24
Routes received from the customer device will be redistributed into the Magic routing table, which is used by both Magic WAN and Magic Transit.
24
25
25
-
All routes in the Magic routing table are advertised to BGP peers. Each BGP peer will receive each prefix route along with the full `AS_PATH`, with the selected Cloudflare side ASN prepended. This is so that the peer can accurately perform [loop prevention](https://datatracker.ietf.org/doc/html/rfc4271#section-9.1.2).
26
+
All routes in the Magic routing table are advertised to BGP peers. Each BGP peer will receive each prefix route along with the full `AS_PATH`, with the selected Cloudflare side [ASN](https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/) prepended. This is so that the peer can accurately perform [loop prevention](https://datatracker.ietf.org/doc/html/rfc4271#section-9.1.2).
26
27
27
28
BGP peering sessions can advertise reachable prefixes to a peer and withdraw previously advertised prefixes. This should not take more than a few minutes to propagate.
28
29
@@ -32,35 +33,26 @@ BGP multipath is supported. If the same prefix is learned on two different inter
32
33
33
34
BGP support currently has the following limitations:
34
35
- The Cloudflare account ASN and the customer device ASN must be different. Only eBGP is supported.
35
-
- Routes are always injected with a priority of 100.
36
+
- Routes are always injected with a priority of `100`.
36
37
- Bidirectional Forwarding Detection (BFD) is not supported.
37
38
- 4-byte ASNs are not supported.
38
39
39
40
## Tunnel health checks
40
41
41
-
You need to enable <ahref={props.productPath}>tunnel health checks</a> alongside BGP. This is essential to determine if a specific Cloudflare datacenter is reachable from a customer router or not. Tunnel health checks will modify the route's priorities for dynamically learned BGP routes.
42
-
43
-
{props.productName} customers should configure legacy <ahref={props.legacyHCs}>bidirectional health checks</a>.
42
+
{props.productName} customers need to enable legacy <ahref={props.legacyHCs}>bidirectional health checks</a> alongside BGP. This is essential to determine if a specific Cloudflare datacenter is reachable from a customer device or not. <ahref={props.productPath}>Tunnel health checks</a> will modify the route's priorities for dynamically learned BGP routes.
44
43
45
44
## How to choose an ASN for BGP peering
46
45
47
-
The Magic routing table is under the control of the customer, and the customer is able to choose both the Cloudflareside ASN and their customer device side ASN.
46
+
The Magic routing table is managed by the customer, who can select both the Cloudflare-side ASN and the ASN for their customer device.
48
47
49
-
By default each BGP peering session will use the same Cloudflareside ASN to represent peering with the Magic WAN/Transit routing table. This default ASN is called the **CF Account ASN** and should be configured to a private 2-byte ASN (64512 and 65534). To set this ASN:
48
+
By default, each BGP peering session will use the same Cloudflare-side ASN to represent peering with the {props.productName}routing table. This default ASN is called the **CF Account ASN** and should be configured to a private 2-byte ASN (`64512` and `65534`). To set this ASN:
50
49
51
50
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account.
52
-
2. Go to **Magic WAN / Transit** > **Configuration** > **BGP**.
53
-
3. In CF Account ASN, enter Cloudflare's ASN.
54
-
55
-
### For Magic WAN customers
56
-
57
-
- The Cloudflare side ASN will be included in the `AS PATH` of announced routes to any BGP enabled interconnect.
58
-
- The customer device ASN can be chosen by the customer, and should be different to the Cloudflare side ASN.
59
-
60
-
### For Magic Transit customers
51
+
2. Go to **{props.productName}** > **Configuration** > **BGP**.
52
+
3. In **CF Account ASN**, enter Cloudflare's ASN.
53
+
4. Select **Update**.
61
54
62
-
- The Cloudflare side ASN will never be exposed in `AS PATH` of anycast announcements from the Cloudflare edge. In those announcements, Cloudflare will always use the Cloudflare ASN of `13335` optionally prepended with a bring-your-own ASN as described in [Cloudflare ASN vs. your own ASN](/magic-transit/how-to/advertise-prefixes/#cloudflare-asn-vs-your-own-asn)
63
-
- The customer device ASN can be a private ASN, or the ASN they are using for Magic Transit anycast announcements at the edge: this has no impact on the ASN for the anycast announced prefix at the edge of the Cloudflare global network.
55
+
<Markdowntext={props.asnProduct} />
64
56
65
57
## How to set up BGP peering
66
58
@@ -69,8 +61,8 @@ BGP peering is only available to {props.productName} customers with Direct CNI a
69
61
:::
70
62
71
63
You need to configure two ASNs:
72
-
- The Cloudflare [account-scoped ASN](#how-to-choose-an-asn-for-bgp-peering).
73
-
- One ASN for each Interconnect you want to configure with BGP.
64
+
- The Cloudflare [account-scoped ASN](#how-to-choose-an-asn-for-bgp-peering) named **CF Account ASN**.
65
+
- One ASN for each interconnect you want to configure with BGP.
74
66
75
67
If you already have set up your Cloudflare account ASN, you can skip steps two and three below.
0 commit comments