-
Notifications
You must be signed in to change notification settings - Fork 10.3k
[MWAN] Lan to Lan feature improved #19940
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
Preview URL: https://46d5ba65.preview.developers.cloudflare.com Files with changes (up to 15) |
| <br /> | ||
|
|
||
| Creating these policies to segment your network means LAN to LAN traffic can be allowed either locally or via Cloudflare's network. As a best practice for security, we recommend sending all traffic through Cloudflare's network for Zero Trust security filtering. Use these policies with care and only for scenarios where you have a hard requirement for LAN to LAN traffic flows. | ||
| As a best practice for security, we recommend sending all traffic through Cloudflare’s network for Zero Trust security filtering. Use these policies with care and only for scenarios where you have a hard requirement for LAN to LAN traffic flows. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| As a best practice for security, we recommend sending all traffic through Cloudflare’s network for Zero Trust security filtering. Use these policies with care and only for scenarios where you have a hard requirement for LAN to LAN traffic flows. | |
| As a best practice for security, we recommend sending all traffic through Cloudflare’s network for Zero Trust security filtering. Use these policies with care and only for scenarios where you have a hard requirement for LAN-to-LAN traffic flows. |
Not sure if this is sensible, just a suggestion.
| Refer to [Magic WAN Connector deployment options](/reference-architecture/diagrams/sase/magic-wan-connector-deployment/) for a high-level explanation of the deployment options for Magic WAN Connector, as well as examples of network segmentation. | ||
| If you enable LAN to LAN traffic flows, communications can only be initiated from origin to destination — for example, LAN 1 to LAN 2 — and not the other way around. This is by design and to prevent potential exfiltration of information. This does not mean bidirectional communication on TCP is not possible. It only means that the origin is the only one authorized to initiate communications. | ||
|
|
||
| Unidirectional communication can be enabled for UDP and ICMP, but it is not available for TCP as it would break that protocol. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| Unidirectional communication can be enabled for UDP and ICMP, but it is not available for TCP as it would break that protocol. | |
| Unidirectional communication can be enabled for UDP and ICMP, but it is not available for TCP, as it would break that protocol. |
| As a best practice for security, we recommend sending all traffic through Cloudflare’s network for Zero Trust security filtering. Use these policies with care and only for scenarios where you have a hard requirement for LAN to LAN traffic flows. | ||
|
|
||
| Refer to [Magic WAN Connector deployment options](/reference-architecture/diagrams/sase/magic-wan-connector-deployment/) for a high-level explanation of the deployment options for Magic WAN Connector, as well as examples of network segmentation. | ||
| If you enable LAN to LAN traffic flows, communications can only be initiated from origin to destination — for example, LAN 1 to LAN 2 — and not the other way around. This is by design and to prevent potential exfiltration of information. This does not mean bidirectional communication on TCP is not possible. It only means that the origin is the only one authorized to initiate communications. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| If you enable LAN to LAN traffic flows, communications can only be initiated from origin to destination — for example, LAN 1 to LAN 2 — and not the other way around. This is by design and to prevent potential exfiltration of information. This does not mean bidirectional communication on TCP is not possible. It only means that the origin is the only one authorized to initiate communications. | |
| If you enable LAN to LAN traffic flows, communications can only be initiated from origin to destination — for example, LAN 1 to LAN 2 — and not the other way around. This is by design and prevents potential exfiltration of information. This does not mean bidirectional communication on TCP is not possible. It only means that the origin is the only one authorized to initiate communications. |
| 7. From the drop-down menu **Origin (required)**, select your origin LAN. | ||
| 8. Specify a subnet for your first LAN in **Subnets**. | ||
| 9. In **Ports** specify the TCP/UDP ports you want to use. Valid ports range from `1` to `65535`. Zero (`0`) is not a valid port number. Add a comma to separate each of the ports or add a port range. For example, `2,5,6,9-14`. | ||
| 10. In **Destination (required) **, select the destination LAN and repeat the above process to configure it. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| 10. In **Destination (required) **, select the destination LAN and repeat the above process to configure it. | |
| 10. In **Destination (required)**, select the destination LAN and repeat the above process to configure it. |
| 1. **Any**: If **Any** is selected and you choose **Unidirectional**, the system will alert you that this will break TCP traffic. | ||
| 2. **TCP**: You can only select **Bidirectional**. | ||
| 3. **UDP**: The system defaults to **Bidirectional** but you can choose **Unidirectional**. | ||
| 4. **ICMP**: The system defaults to **Bidirectional** but you can choose **Unidirectional**. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could this be captured in a table? Something like:
| Selected protocol | Default | Changeable? |
|---|---|---|
| TCP | Bidirectional | ❌ |
| UDP | Bidirectional | ✅ |
| ICMP | Bidirectional | ✅ |
Co-authored-by: Jun Lee <[email protected]>
…ions/network-segmentation.mdx Co-authored-by: Jun Lee <[email protected]>
…ions/network-segmentation.mdx Co-authored-by: Jun Lee <[email protected]>
* added lan to lan info * updated names and added port range * refined steps * refined text * added changelog entry * Apply suggestions from code review Co-authored-by: Jun Lee <[email protected]> * Update src/content/docs/magic-wan/configuration/connector/network-options/network-segmentation.mdx Co-authored-by: Jun Lee <[email protected]> * Update src/content/docs/magic-wan/configuration/connector/network-options/network-segmentation.mdx Co-authored-by: Jun Lee <[email protected]> * lan-to-lan --------- Co-authored-by: Jun Lee <[email protected]>
Summary
Closes PCX-14092
Documentation checklist