diff --git a/src/content/docs/magic-wan/configuration/manually/third-party/aruba-edgeconnect.mdx b/src/content/docs/magic-wan/configuration/manually/third-party/aruba-edgeconnect.mdx
index 88cf5fffe82bc7c..803bb418f1311d1 100644
--- a/src/content/docs/magic-wan/configuration/manually/third-party/aruba-edgeconnect.mdx
+++ b/src/content/docs/magic-wan/configuration/manually/third-party/aruba-edgeconnect.mdx
@@ -313,11 +313,11 @@ To validate east-west traffic flow, perform a traceroute as shown in the example
The example shows a client in GCP East (`10.3.0.3`), which can ping the private IP of a client in GCP West (`10.30.0.4`).
-The traceroute shows the path going from the client (`10.3.0.3`)
-→ to the GCP East lan0 IP on the EdgeConnect (`10.3.0.2`)
-→ to the Cloudflare private GRE endpoint IP (`10.4.8.11`)
-→ to the GCP West lan0 IP on the West EdgeConnect (`10.30.0.3`)
-→ to the GCP West client (`10.30.0.4`).
+The traceroute shows the path going from the client (`10.3.0.3`) to:
+- the GCP East lan0 IP on the EdgeConnect (`10.3.0.2`)
+- the Cloudflare private GRE endpoint IP (`10.4.8.11`)
+- the GCP West lan0 IP on the West EdgeConnect (`10.30.0.3`)
+- the GCP West client (`10.30.0.4`)
This validates the east-west traffic flow through Cloudflare Magic WAN.
@@ -343,11 +343,11 @@ To validate east-west traffic flow, perform a traceroute as shown in the example
The example shows a client in GCP Central (`10.22.0.9`), which can ping the private IP of a client in GCP West (`10.77.0.10`).
-The traceroute shows the path going from the client (`10.22.0.9`)
-→ to the GCP Central lan0 IP on the EdgeConnect (`10.22.0.2`)
-→ to the Cloudflare private IPsec endpoint IP (`192.168.10.11`)
-→ to the GCP West EdgeConnect private IPsec endpoint IP (`192.168.15.10`)
-→ to the GCP West client (`10.77.0.10`).
+The traceroute shows the path going from the client (`10.22.0.9`) to:
+- the GCP Central lan0 IP on the EdgeConnect (`10.22.0.2`)
+- the Cloudflare private IPsec endpoint IP (`192.168.10.11`)
+- the GCP West EdgeConnect private IPsec endpoint IP (`192.168.15.10`)
+- the GCP West client (`10.77.0.10`)
This validates the east-west traffic flow through Cloudflare Magic WAN.
diff --git a/src/content/docs/magic-wan/reference/device-compatibility.mdx b/src/content/docs/magic-wan/reference/device-compatibility.mdx
index 6f471a1db48c27a..2748e020bec214e 100644
--- a/src/content/docs/magic-wan/reference/device-compatibility.mdx
+++ b/src/content/docs/magic-wan/reference/device-compatibility.mdx
@@ -18,25 +18,25 @@ The matrix below includes example devices and links to the integration guides.
| Cisco Meraki | Compatibility on roadmap | Compatibility on roadmap |
| [Cisco SD-WAN](/magic-wan/configuration/manually/third-party/viptela/) | ✅ | ✅ |
| [Fortinet](/magic-wan/configuration/manually/third-party/fortinet/)| Specifications compatible[^1] | ✅ |
-| [Furukawa Electric FITELnet](/magic-wan/configuration/manually/third-party/fitelnet/) | — | ✅ |
-| [Juniper Networks SRX Series Firewalls](/magic-wan/configuration/manually/third-party/juniper/) | — | ✅ |
+| [Furukawa Electric FITELnet](/magic-wan/configuration/manually/third-party/fitelnet/) | - | ✅ |
+| [Juniper Networks SRX Series Firewalls](/magic-wan/configuration/manually/third-party/juniper/) | - | ✅ |
| [Palo Alto Networks Next-Generation Firewall](/magic-wan/configuration/manually/third-party/palo-alto/) | ✅ | ✅ |
| [pfSense](/magic-wan/configuration/manually/third-party/pfsense/)| ✅ | ✅ |
| Prisma SD-WAN (Palo Alto) | Specifications compatible[^1] | Specifications compatible[^1] |
| Riverbed | Specifications compatible[^1] | Specifications compatible[^1] |
-| [SonicWall](/magic-wan/configuration/manually/third-party/sonicwall/)| — | ✅ |
+| [SonicWall](/magic-wan/configuration/manually/third-party/sonicwall/)| - | ✅ |
| [Sophos Firewall](/magic-wan/configuration/manually/third-party/sophos-firewall/) | ✅ | ✅ |
-| [strongSwan](/magic-wan/configuration/manually/third-party/strongswan/) | — | ✅ |
+| [strongSwan](/magic-wan/configuration/manually/third-party/strongswan/) | - | ✅ |
| Velocloud | Compatibility on roadmap | Compatibility on roadmap |
| Versa | Specifications compatible[^1] | Compatibility on roadmap |
| [VyOS](/magic-wan/configuration/manually/third-party/vyos/)| ✅ | ✅ |
| VPN | GRE tunnel | IPsec tunnel |
| --- | --- | --- |
-| [Alibaba Cloud VPN Gateway](/magic-wan/configuration/manually/third-party/alibaba-cloud/) | — | ✅ |
-| [Amazon AWS Transit Gateway](/magic-wan/configuration/manually/third-party/aws/) | — | ✅ |
-| [Azure VPN Gateway](/magic-wan/configuration/manually/third-party/azure/) | — | ✅ |
-| [GCP Cloud VPN](/magic-wan/configuration/manually/third-party/google/) | — | ✅ |
-| [Oracle Cloud](/magic-wan/configuration/manually/third-party/oracle/) | — | ✅ |
+| [Alibaba Cloud VPN Gateway](/magic-wan/configuration/manually/third-party/alibaba-cloud/) | - | ✅ |
+| [Amazon AWS Transit Gateway](/magic-wan/configuration/manually/third-party/aws/) | - | ✅ |
+| [Azure VPN Gateway](/magic-wan/configuration/manually/third-party/azure/) | - | ✅ |
+| [GCP Cloud VPN](/magic-wan/configuration/manually/third-party/google/) | - | ✅ |
+| [Oracle Cloud](/magic-wan/configuration/manually/third-party/oracle/) | - | ✅ |
[^1]: Specifications compatible per vendor documentation