Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -313,11 +313,11 @@ To validate east-west traffic flow, perform a traceroute as shown in the example

The example shows a client in GCP East (`10.3.0.3`), which can ping the private IP of a client in GCP West (`10.30.0.4`).

The traceroute shows the path going from the client (`10.3.0.3`) <br/>
→ to the GCP East lan0 IP on the EdgeConnect (`10.3.0.2`) <br/>
→ to the Cloudflare private GRE endpoint IP (`10.4.8.11`) <br/>
→ to the GCP West lan0 IP on the West EdgeConnect (`10.30.0.3`) <br/>
→ to the GCP West client (`10.30.0.4`).
The traceroute shows the path going from the client (`10.3.0.3`) to:
- the GCP East lan0 IP on the EdgeConnect (`10.3.0.2`)
- the Cloudflare private GRE endpoint IP (`10.4.8.11`)
- the GCP West lan0 IP on the West EdgeConnect (`10.30.0.3`)
- the GCP West client (`10.30.0.4`)

This validates the east-west traffic flow through Cloudflare Magic WAN.

Expand All @@ -343,11 +343,11 @@ To validate east-west traffic flow, perform a traceroute as shown in the example

The example shows a client in GCP Central (`10.22.0.9`), which can ping the private IP of a client in GCP West (`10.77.0.10`).

The traceroute shows the path going from the client (`10.22.0.9`) <br/>
→ to the GCP Central lan0 IP on the EdgeConnect (`10.22.0.2`) <br/>
→ to the Cloudflare private IPsec endpoint IP (`192.168.10.11`) <br/>
→ to the GCP West EdgeConnect private IPsec endpoint IP (`192.168.15.10`) <br/>
→ to the GCP West client (`10.77.0.10`).
The traceroute shows the path going from the client (`10.22.0.9`) to:
- the GCP Central lan0 IP on the EdgeConnect (`10.22.0.2`)
- the Cloudflare private IPsec endpoint IP (`192.168.10.11`)
- the GCP West EdgeConnect private IPsec endpoint IP (`192.168.15.10`)
- the GCP West client (`10.77.0.10`)

This validates the east-west traffic flow through Cloudflare Magic WAN.

Expand Down
18 changes: 9 additions & 9 deletions src/content/docs/magic-wan/reference/device-compatibility.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -18,25 +18,25 @@ The matrix below includes example devices and links to the integration guides.
| Cisco Meraki | Compatibility on roadmap | Compatibility on roadmap |
| [Cisco SD-WAN](/magic-wan/configuration/manually/third-party/viptela/) | ✅ | ✅ |
| [Fortinet](/magic-wan/configuration/manually/third-party/fortinet/)| Specifications compatible[^1] | ✅ |
| [Furukawa Electric FITELnet](/magic-wan/configuration/manually/third-party/fitelnet/) | | ✅ |
| [Juniper Networks SRX Series Firewalls](/magic-wan/configuration/manually/third-party/juniper/) | | ✅ |
| [Furukawa Electric FITELnet](/magic-wan/configuration/manually/third-party/fitelnet/) | - | ✅ |
| [Juniper Networks SRX Series Firewalls](/magic-wan/configuration/manually/third-party/juniper/) | - | ✅ |
| [Palo Alto Networks Next-Generation Firewall](/magic-wan/configuration/manually/third-party/palo-alto/) | ✅ | ✅ |
| [pfSense](/magic-wan/configuration/manually/third-party/pfsense/)| ✅ | ✅ |
| Prisma SD-WAN (Palo Alto) | Specifications compatible[^1] | Specifications compatible[^1] |
| Riverbed | Specifications compatible[^1] | Specifications compatible[^1] |
| [SonicWall](/magic-wan/configuration/manually/third-party/sonicwall/)| | ✅ |
| [SonicWall](/magic-wan/configuration/manually/third-party/sonicwall/)| - | ✅ |
| [Sophos Firewall](/magic-wan/configuration/manually/third-party/sophos-firewall/) | ✅ | ✅ |
| [strongSwan](/magic-wan/configuration/manually/third-party/strongswan/) | | ✅ |
| [strongSwan](/magic-wan/configuration/manually/third-party/strongswan/) | - | ✅ |
| Velocloud | Compatibility on roadmap | Compatibility on roadmap |
| Versa | Specifications compatible[^1] | Compatibility on roadmap |
| [VyOS](/magic-wan/configuration/manually/third-party/vyos/)| ✅ | ✅ |

| VPN | GRE tunnel | IPsec tunnel |
| --- | --- | --- |
| [Alibaba Cloud VPN Gateway](/magic-wan/configuration/manually/third-party/alibaba-cloud/) | | ✅ |
| [Amazon AWS Transit Gateway](/magic-wan/configuration/manually/third-party/aws/) | | ✅ |
| [Azure VPN Gateway](/magic-wan/configuration/manually/third-party/azure/) | | ✅ |
| [GCP Cloud VPN](/magic-wan/configuration/manually/third-party/google/) | | ✅ |
| [Oracle Cloud](/magic-wan/configuration/manually/third-party/oracle/) | | ✅ |
| [Alibaba Cloud VPN Gateway](/magic-wan/configuration/manually/third-party/alibaba-cloud/) | - | ✅ |
| [Amazon AWS Transit Gateway](/magic-wan/configuration/manually/third-party/aws/) | - | ✅ |
| [Azure VPN Gateway](/magic-wan/configuration/manually/third-party/azure/) | - | ✅ |
| [GCP Cloud VPN](/magic-wan/configuration/manually/third-party/google/) | - | ✅ |
| [Oracle Cloud](/magic-wan/configuration/manually/third-party/oracle/) | - | ✅ |

[^1]: Specifications compatible per vendor documentation
Loading