diff --git a/src/content/partials/networking-services/reference/tunnels-encapsulation.mdx b/src/content/partials/networking-services/reference/tunnels-encapsulation.mdx
index 8a4bc4d2d479cc..90ccba316b045d 100644
--- a/src/content/partials/networking-services/reference/tunnels-encapsulation.mdx
+++ b/src/content/partials/networking-services/reference/tunnels-encapsulation.mdx
@@ -217,6 +217,16 @@ Additionally, the IKE ID type of `ID_IPV4_ADDR` is supported if the following tw
Make sure each IPsec tunnel has a unique combination of a Cloudflare endpoint and customer endpoint. If this combination is not unique among your IPsec tunnels, you should use one of the custom IKE formats (`ID_RFC822_ADDR`, `ID_FQDN`, or `ID_KEY_ID`) to specify the tunnel ID and account ID. This helps Cloudflare link the IKE packet to the right IPsec tunnel for tasks like authentication.
:::
+### Route-based vs. policy-based VPNs
+
+Although Cloudflare supports both route-based and policy-based VPNs, route-based VPNs are preferred.
+
+If route-based VPNs are not an option and you must use policy-based VPNs, be aware of the following limitations:
+
+- Cloudflare only supports a single set of traffic selectors per Child SA.
+- Reply-style health checks must be covered by a policy — that is, they must match traffic selectors — otherwise, they will be dropped, just like any other traffic from an IPsec tunnel that does not match a policy.
+- A single IPsec tunnel can only contain around 100 Child SAs. Therefore, there is effectively a limit on the number of different policies per tunnel.
+
{ props.magicWord === "Magic Transit" && (
<>