diff --git a/src/content/docs/learning-paths/data-center-protection/concepts/benefits-magic-transit.mdx b/src/content/docs/learning-paths/data-center-protection/concepts/benefits-magic-transit.mdx index 9f646f3a8cdf2fb..ca2d46a132c9a03 100644 --- a/src/content/docs/learning-paths/data-center-protection/concepts/benefits-magic-transit.mdx +++ b/src/content/docs/learning-paths/data-center-protection/concepts/benefits-magic-transit.mdx @@ -9,7 +9,7 @@ import { PublicStats } from "~/components"; Magic Transit leverages Cloudflare's global anycast network. As of writing this guide, Cloudflare's global network spans , and has . This bandwidth allows it to absorb all manners of attack that otherwise would overwhelm a typical data center or on-premise hardware Distributed Denial-of-Service (DDoS) appliances. -The number of DDoS attacks has been steadily increasing in recent years. In the first quarter of 2025, Cloudflared [mitigated 16.8 million network-layer DDoS attacks](https://blog.cloudflare.com/ddos-threat-report-for-2025-q1/#ddos-attacks-in-numbers). This represents a 397% increase quarter over quarter and a 509% increase year over year. +The number of DDoS attacks has been steadily increasing in recent years. In the first quarter of 2025, Cloudflare [mitigated 16.8 million network-layer DDoS attacks](https://blog.cloudflare.com/ddos-threat-report-for-2025-q1/#ddos-attacks-in-numbers). This represents a 397% increase quarter over quarter and a 509% increase year over year. Other advantages of choosing Magic Transit: diff --git a/src/content/partials/networking-services/magic-transit/get-started.mdx b/src/content/partials/networking-services/magic-transit/get-started.mdx index e3e335e54d1fd37..e989a1a3ecb14bf 100644 --- a/src/content/partials/networking-services/magic-transit/get-started.mdx +++ b/src/content/partials/networking-services/magic-transit/get-started.mdx @@ -127,13 +127,21 @@ Refer to [Maximum transmission unit and maximum segment size](/magic-transit/ref { props.magicWord === "Magic Transit" && ( <> - Configure the tunnelson both the Cloudflare side and your router side to connect to your origin infrastructure. + Configure the tunnels on both the Cloudflare side and your router side to connect to your origin infrastructure. -

Configure static routes or BGP peeringto route traffic from Cloudflare's global network to your locations.

+

Configure static routes or BGP peering to route traffic from Cloudflare's global network to your locations.

-

After setting up your tunnels and routes, Cloudflare validates tunnel connectivity, tunnel and endpoint health checks, Letter of Agency (LOA), Internet Routing Registry (IRR), and maximum segment size (MSS) configurations. Configurations for Cloudflare global network are applied and take around one day to rollout.

+

After setting up your tunnels and routes, Cloudflare validates:

+
    +
  • Tunnel connectivity
  • +
  • Tunnel and endpoint health checks
  • +
  • Letter of Agency (LOA)
  • +
  • Internet Routing Registry (IRR)
  • +
  • Maximum segment size (MSS) configurations
  • +
+

Configurations for Cloudflare global network are applied and take around one day to rollout.