diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/analytics/index.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/analytics/index.mdx index a60e85309bfe99..6fae1d595ea457 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/analytics/index.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/analytics/index.mdx @@ -16,7 +16,7 @@ import { Render } from "~/components"; params={{ magicWord: "WAN Tunnels", productName: "Magic WAN", - analyticsAnchorHeading: "#wan-tunnels-network-analytics", + analyticsAnchorHeading: "#magic-wan-network-analytics", networkAnalyticsURL: "/cloudflare-one/networks/connectors/wan-tunnels/analytics/network-analytics/", traceRoutes: "/cloudflare-one/networks/connectors/wan-tunnels/analytics/traceroutes/", graphQlTunnelBandwidthURL: "/cloudflare-one/networks/connectors/wan-tunnels/analytics/query-bandwidth/", diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/analytics/network-analytics.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/analytics/network-analytics.mdx index a447a042ee4efe..ff616d073fab75 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/analytics/network-analytics.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/analytics/network-analytics.mdx @@ -10,10 +10,9 @@ head: import { Render } from "~/components"; - diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/analytics/site-analytics.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/analytics/site-analytics.mdx index 4e8392161ae2f2..c32c3681c77b9f 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/analytics/site-analytics.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/analytics/site-analytics.mdx @@ -17,7 +17,6 @@ import { Render } from "~/components" params={{ instructions: "Refer to [Set up a site](/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/sites/) for more information on how to set up a site.", magicWord: "WAN Tunnels", - productName: "Magic WAN", networkOverviewPageName: "Network visibility", magicTunnelHcsURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/configure-magic-tunnel-health-alerts/", setGeoCoordinatesURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/sites/#set-geographic-coordinates" diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/index.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/index.mdx index 30bd8fb1c53b7d..d6d7cefe4fd5e8 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/index.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/index.mdx @@ -15,6 +15,7 @@ import { Render } from "~/components"; productName: "Magic WAN Connector", maintenanceURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/", dashName: "WAN Tunnels", + deviceTypeName: "appliance", sfpURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/sfp-port-information/", wan: "refers to the physical Connector Ethernet port that you are using for your WAN. The ports are labeled `GE1`, `GE2`, `GE3`, `GE4`, `GE5`, and `GE6`. Choose the number corresponding to the port that you are using in Connector.
If you need a throughput higher than 1 Gbps, you can use one of the SFP+ ports. Refer to [SFP+ port information](/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/sfp-port-information/) for more information on the hardware supported.", lan: "refers to the physical Connector Ethernet port that you are using for your WAN. The ports are labeled `GE1`, `GE2`, `GE3`, `GE4`, `GE5`, and `GE6`. Choose a number corresponding to the port that you are using in Connector.
If you need a throughput higher than 1 Gbps, you can use one of the SFP+ ports. Refer to [SFP+ port information](/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/sfp-port-information/) for more information on the hardware supported.", @@ -26,7 +27,6 @@ import { Render } from "~/components"; shippedLanguage: "The Connector is shipped to you deactivated", hardSoftConn: "You need to deploy two Connectors in your premises before you can set up a site in high availability.", hcConfigsURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/reference/#high-availability-configurations", - finalInstructions: "Follow the instructions in [Set up your Connector](#set-up-your-connector) and [Activate Connector](#activate-connector) to finish setting up your Connector.", ipsecTunnelsRefURL: "/cloudflare-one/networks/connectors/wan-tunnels/reference/gre-ipsec-tunnels/#ipsec-tunnels", trafficSteeringURL: "/cloudflare-one/networks/connectors/wan-tunnels/reference/traffic-steering/", vlanIdURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/reference/#vlan-id", diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/sfp-port-information.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/sfp-port-information.mdx index 615f661ff138e7..3daaa5c9d6b01a 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/sfp-port-information.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/sfp-port-information.mdx @@ -7,8 +7,4 @@ title: SFP+ port information import { Render } from "~/components"; \ No newline at end of file + product="networking-services" /> \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-virtual-connector.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-virtual-connector.mdx index 80e170dd25b0a9..0054f9dd33d679 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-virtual-connector.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-virtual-connector.mdx @@ -16,6 +16,7 @@ import { Render } from "~/components"; productNameVirtual: "Virtual Connector", maintenanceURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/", dashName: "WAN Tunnels", + deviceTypeName: "appliance", wan: "needs to correspond to the virtual network interface on the Virtual Connector instance you have set up in VMware. Following our example from the previous steps, you need to choose port `1` since that is what corresponds to the `eno1` port we set up in VMware.", lan: "needs to correspond to the virtual LAN interface on the Virtual Connector instance you have set up in VMware. Following our example from the previous steps, you need to choose port `2` since that is what corresponds to the `eno2` port we set up in VMware.", noConnectorShows: "For a Virtual Connector to show up you need to:
\nFor more information, refer to [Configure a virtual machine](#configure-a-virtual-machine) and select the appropriate tab.\n", @@ -26,7 +27,6 @@ import { Render } from "~/components"; shippedLanguage: "Virtual Connector is deactivated after you install it", hardSoftConn: "You need to install two Virtual Connectors before you can set up a site in high availability.", hcConfigsURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/reference/#high-availability-configurations", - finalInstructions: "Follow the instructions in [Activate Connector](#activate-connector) to finish setting up your Connectors.", ipsecTunnelsRefURL: "/cloudflare-one/networks/connectors/wan-tunnels/reference/gre-ipsec-tunnels/#ipsec-tunnels", trafficSteeringURL: "/cloudflare-one/networks/connectors/wan-tunnels/reference/traffic-steering/", vlanIdURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/reference/#vlan-id", diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/device-metrics.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/device-metrics.mdx index 399fdcfd241486..45b6a782bc2113 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/device-metrics.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/device-metrics.mdx @@ -11,7 +11,6 @@ import { Render } from "~/components"; file="mconn/device-metrics" product="networking-services" params={{ - productName: "Magic WAN Connector", troubleshootingURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/troubleshooting/" }} /> \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/activate-connector.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/activate-connector.mdx index f95190ae92a115..fd1d13b8003973 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/activate-connector.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/activate-connector.mdx @@ -11,7 +11,6 @@ import { Render } from "~/components"; file="mconn/maintenance/activate-connectors" product="networking-services" params={{ - productName: "Magic WAN Connector", - hardwareConnectorURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/#activate-connector", - virtualConnectorURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-virtual-connector/#activate-connector", + hardwareConnectorURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/#activate-appliance", + virtualConnectorURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-virtual-connector/#activate-appliance", }} /> \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/add-remove-connectors.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/add-remove-connectors.mdx index 9ecefc2f09d639..8bff6e8e34f86a 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/add-remove-connectors.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/add-remove-connectors.mdx @@ -11,7 +11,6 @@ import { Render } from "~/components"; file="mconn/maintenance/add-remove-connectors" product="networking-services" params={{ - productName: "Magic WAN Connector", dashName: "WAN Tunnels", }} /> \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/deactivate-connector.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/deactivate-connector.mdx index 8191d3a3b9ce1c..330e3d5ea37f44 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/deactivate-connector.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/deactivate-connector.mdx @@ -12,7 +12,6 @@ import { Render } from "~/components"; file="mconn/maintenance/deactivate-connector" product="networking-services" params={{ - productName: "Magic WAN Connector", dashName: "WAN Tunnels", }} /> \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/default-password.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/default-password.mdx index a19ead7a6f76c4..da9d7a42dd37c5 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/default-password.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/default-password.mdx @@ -11,9 +11,4 @@ import { Render } from "~/components"; \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/edit-basic-info.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/edit-basic-info.mdx index d0b1c0f4596617..231c716f9b7c44 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/edit-basic-info.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/edit-basic-info.mdx @@ -11,7 +11,6 @@ import { Render } from "~/components"; file="mconn/maintenance/edit-basic-info" product="networking-services" params={{ - productName: "Magic WAN Connector", dashName: "WAN Tunnels", }} /> \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/edit-network-settings.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/edit-network-settings.mdx index 0819e5514e9edf..51c66572dc001a 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/edit-network-settings.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/edit-network-settings.mdx @@ -11,7 +11,6 @@ import { Render } from "~/components"; file="mconn/maintenance/edit-network-settings" product="networking-services" params={{ - productName: "Magic WAN Connector", dashName: "WAN Tunnels", }} /> \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/edit-traffic-steering-settings.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/edit-traffic-steering-settings.mdx index 96c7bd5a608135..93ad46937517d1 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/edit-traffic-steering-settings.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/edit-traffic-steering-settings.mdx @@ -11,7 +11,6 @@ import { Render } from "~/components"; file="mconn/maintenance/edit-traffic-steering" product="networking-services" params={{ - productName: "Magic WAN Connector", dashName: "WAN Tunnels", }} /> \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/heartbeat.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/heartbeat.mdx index 8558ad44b6e09f..b684c37e1e58ab 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/heartbeat.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/heartbeat.mdx @@ -12,7 +12,6 @@ import { Render } from "~/components"; file="mconn/maintenance/heartbeat" product="networking-services" params={{ - productName: "Magic WAN Connector", dashName: "WAN Tunnels", }} /> \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/interrupt-service-window.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/interrupt-service-window.mdx index 8ff16480ec3c6f..3825ecced82573 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/interrupt-service-window.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/interrupt-service-window.mdx @@ -14,7 +14,6 @@ import { Render } from "~/components"; file="mconn/maintenance/interrupt-service-window" product="networking-services" params={{ - productName: "Magic WAN Connector", dashName: "WAN Tunnels", }} /> \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/register-appliance.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/register-appliance.mdx index 5269d2967ba0e1..b7c1a75fd6e88b 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/register-appliance.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/register-appliance.mdx @@ -8,4 +8,4 @@ sidebar: import { Render } from "~/components"; - \ No newline at end of file + \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/application-based-policies/breakout-traffic.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/application-based-policies/breakout-traffic.mdx index 9b31f87ec92538..246dccd87bea3b 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/application-based-policies/breakout-traffic.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/application-based-policies/breakout-traffic.mdx @@ -12,7 +12,6 @@ import { Render } from "~/components"; product="networking-services" params={{ magicWord: "breakout", - productName: "Magic WAN Connector", featureName: "Breakout traffic", trafficSteeringURL: "/cloudflare-one/networks/connectors/wan-tunnels/reference/traffic-steering/", whatHappensApp: "will now go directly to the Internet and bypass Cloudflare's filtering", diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/application-based-policies/index.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/application-based-policies/index.mdx index a52f82eb5297be..92d4673a2f73b9 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/application-based-policies/index.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/application-based-policies/index.mdx @@ -9,7 +9,6 @@ import { Render } from "~/components" diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/application-based-policies/prioritized-traffic.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/application-based-policies/prioritized-traffic.mdx index 5aed15c5aa9c77..41a95f418a014a 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/application-based-policies/prioritized-traffic.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/application-based-policies/prioritized-traffic.mdx @@ -12,7 +12,6 @@ import { Render } from "~/components"; product="networking-services" params={{ magicWord: "prioritized", - productName: "Magic WAN Connector", featureName: "Prioritized traffic", whatHappensApp: "is now processed first by Connector", dashName: "WAN Tunnels", diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/dhcp/dhcp-relay.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/dhcp/dhcp-relay.mdx index e32d851372e874..c789dd03cc2193 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/dhcp/dhcp-relay.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/dhcp/dhcp-relay.mdx @@ -9,7 +9,6 @@ import { Render } from "~/components"; \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/nat-subnet.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/nat-subnet.mdx index 435793371adc1d..f297f634aa7189 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/nat-subnet.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/nat-subnet.mdx @@ -10,10 +10,6 @@ import { Render } from "~/components" \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/network-segmentation.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/network-segmentation.mdx index 72989bc3206b45..b05189044817c7 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/network-segmentation.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/network-segmentation.mdx @@ -9,11 +9,8 @@ import { Render } from "~/components" diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/routed-subnets.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/routed-subnets.mdx index 064748fc53a324..7a870c9433c58e 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/routed-subnets.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/network-options/routed-subnets.mdx @@ -10,10 +10,7 @@ import { Render } from "~/components" diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/reference.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/reference.mdx index e667a51d2e94ef..ed5ba1dbf2c7da 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/reference.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/reference.mdx @@ -11,17 +11,13 @@ import { Render } from "~/components"; file="mconn/mconn-reference" product="networking-services" params={{ - productName: "Magic WAN Connector", dashName: "WAN Tunnels", - virtualProductName: "Virtual Connector", - gatewayURL: "/cloudflare-one/policies/gateway/", + gatewayURL: "/cloudflare-one/traffic-policies/", hardConnectorURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/", virtualConnectorURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-virtual-connector/", - configHardProductName: "Configure hardware Connector", - configVirtualProductName: "Configure Virtual Connector", haSetupURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/#create-a-high-availability-configuration", ecmpRoutingURL: "/cloudflare-one/networks/connectors/wan-tunnels/reference/traffic-steering/#equal-cost-multi-path-routing", - multipleWansURL: "(magic-wan/appliances/configure-hardware-connector/#create-a-wan", + multipleWansURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/#create-a-wan", sfpURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/sfp-port-information/", vlanIdURL: "#vlan-id", trafficSteeringURL: "/cloudflare-one/networks/connectors/wan-tunnels/reference/traffic-steering/", diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/troubleshooting.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/troubleshooting.mdx index 4359a05099ed07..cd0de7605de016 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/troubleshooting.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/troubleshooting.mdx @@ -11,11 +11,9 @@ import { Render } from "~/components"; file="mconn/troubleshooting/troubleshooting" product="networking-services" params={{ - productName: "Magic WAN Connector", dashName: "WAN Tunnels", activateURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/#activate-connector", firewallURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/configure-hardware-connector/#firewall-settings-required", heartbeatURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/heartbeat/" }} - - /> \ No newline at end of file +/> \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/check-tunnel-health-dashboard.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/check-tunnel-health-dashboard.mdx index a51c98c86f6c1d..2fcb39a95e3b35 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/check-tunnel-health-dashboard.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/check-tunnel-health-dashboard.mdx @@ -37,7 +37,6 @@ import { Render } from "~/components"; file="tunnel-health/mconn-heartbeat-health" product="networking-services" params={{ - productName: "Magic WAN Connector", heartbeatURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/maintenance/heartbeat/" }} /> diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/custom-ike-id-ipsec.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/custom-ike-id-ipsec.mdx index c96052a1699082..b1452c38a25edf 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/custom-ike-id-ipsec.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/custom-ike-id-ipsec.mdx @@ -7,10 +7,4 @@ sidebar: import { Render } from "~/components"; - + diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/enable-magic-roles.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/enable-magic-roles.mdx index bf6edc680b689a..9f31f8cd7b784a 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/enable-magic-roles.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/enable-magic-roles.mdx @@ -10,10 +10,4 @@ sidebar: import { Render } from "~/components"; - + diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/sites.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/sites.mdx index defeee3fc950e3..06d35d53fc8b95 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/sites.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/sites.mdx @@ -14,7 +14,6 @@ import { Render } from "~/components"; product="networking-services" params={{ magicWord: "WAN Tunnels", - productName: "Magic WAN", greIpsecTunnelsURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/how-to/configure-tunnel-endpoints/", connectorURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/appliances/", cniURL: "/cloudflare-one/networks/connectors/wan-tunnels/network-interconnect/", diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/how-to/configure-tunnel-endpoints.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/how-to/configure-tunnel-endpoints.mdx index 2d6c0d45c9031b..cc5c3f2b7017b0 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/how-to/configure-tunnel-endpoints.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/how-to/configure-tunnel-endpoints.mdx @@ -21,10 +21,8 @@ import { GlossaryTooltip, Render } from "~/components"; ciphersPagePath: "/cloudflare-one/networks/connectors/wan-tunnels/reference/gre-ipsec-tunnels/#supported-configuration-parameters", antiReplayPagePath: "/cloudflare-one/networks/connectors/wan-tunnels/reference/anti-replay-protection/", cniLink: "/cloudflare-one/networks/connectors/wan-tunnels/network-interconnect/", - targetPageName: "Configuration", updateHCFrequencyPage: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/update-tunnel-health-checks-frequency/", tunnelHealthChecksPage: "/cloudflare-one/networks/connectors/wan-tunnels/reference/tunnel-health-checks/", - antiReplayPagePath: "/cloudflare-one/networks/connectors/wan-tunnels/reference/anti-replay-protection/", biVsUniHealthCheck: "bidirectional", tunnelHealthDash: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/common-settings/check-tunnel-health-dashboard/", biVsUniHealthCheckDefaults: "For WAN Tunnels this option defaults to bidirectional", diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/how-to/traceroute.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/how-to/traceroute.mdx index 30104d0f595188..0c42826fb234a0 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/how-to/traceroute.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/how-to/traceroute.mdx @@ -14,7 +14,6 @@ import { Render } from "~/components"; file="routing/traceroute" product="networking-services" params={{ - productName: "Magic WAN", greIpsecURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/how-to/configure-tunnel-endpoints/", warpURL: "/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/warp/", cfTunnelURL: "/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/cloudflare-tunnel/" diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/third-party/aruba-edgeconnect.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/third-party/aruba-edgeconnect.mdx index 24413c073e021e..e38b30e18b222f 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/third-party/aruba-edgeconnect.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/third-party/aruba-edgeconnect.mdx @@ -11,5 +11,5 @@ import { Render } from "~/components"; params={{ tunnelHealthCheckUrl: "/cloudflare-one/networks/connectors/wan-tunnels/reference/tunnel-health-checks/", magicFirewallUrl: "/magic-firewall/", - gatewayUrl: "/cloudflare-one/policies/gateway/" + gatewayUrl: "/cloudflare-one/traffic-policies/" }} /> diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/glossary.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/glossary.mdx deleted file mode 100644 index edd169e7bcc875..00000000000000 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/glossary.mdx +++ /dev/null @@ -1,13 +0,0 @@ ---- -title: Glossary -pcx_content_type: glossary -sidebar: - order: 14 - ---- - -import { Glossary } from "~/components" - -Review the definitions for terms used across Cloudflare's WAN Tunnels documentation. - - diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/load-balancing.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/load-balancing.mdx index 02e89130336cee..c74341f4310421 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/load-balancing.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/load-balancing.mdx @@ -7,11 +7,4 @@ sidebar: import { Render } from "~/components"; - + diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/network-interconnect.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/network-interconnect.mdx index 4749aef2c7c90c..dfe9f4a072738f 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/network-interconnect.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/network-interconnect.mdx @@ -16,10 +16,8 @@ import { Render } from "~/components"; file="traceroute" product="networking-services" params={{ - productName: "Magic WAN", greIpsecURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/how-to/configure-tunnel-endpoints/", warpURL: "/cloudflare-one/team-and-resources/devices/warp/", - cloudflareTunnelURL: "/cloudflare-one/networks/connectors/cloudflare-tunnel/", tracerouteURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/how-to/traceroute/" }} /> diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/on-ramps.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/on-ramps.mdx index 166b952d46adac..8304362e326a50 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/on-ramps.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/on-ramps.mdx @@ -18,6 +18,7 @@ import { Render } from "~/components"; thirdPartyURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/third-party/", cniURL: "/cloudflare-one/networks/connectors/wan-tunnels/network-interconnect/", cfTunnelURL: "/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/cloudflare-tunnel/", - warpURL: "/cloudflare-one/team-and-resources/devices/warp/" + warpURL: "/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/warp/", + thirdPartyIntegrationURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/third-party/" }} /> diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/reference/bandwidth-measurement.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/reference/bandwidth-measurement.mdx index 6ff0ef6f1e767d..71ee4c07b3caef 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/reference/bandwidth-measurement.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/reference/bandwidth-measurement.mdx @@ -11,9 +11,6 @@ import { Render } from "~/components"; file="magic-wan/reference/bandwidth-measurement" product="networking-services" params={{ - productName: "Magic WAN", - cloudflareTunnelURL: "/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/cloudflare-tunnel/", - warpURL: "/cloudflare-one/team-and-resources/devices/warp/" - + cloudflareTunnelURL: "/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/cloudflare-tunnel/" }} /> diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/reference/device-compatibility.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/reference/device-compatibility.mdx index e8df991a7b8aa3..4e3e9ba373b5f9 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/reference/device-compatibility.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/reference/device-compatibility.mdx @@ -10,7 +10,6 @@ import { Render } from "~/components"; diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/cloudflare-gateway.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/cloudflare-gateway.mdx index ab10a08c9f1a99..c4777d0f9657ee 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/cloudflare-gateway.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/cloudflare-gateway.mdx @@ -12,22 +12,18 @@ import { Render } from "~/components"; file="magic-wan/zero-trust/gateway" product="networking-services" params={{ - gatewayURL: "/cloudflare-one/policies/gateway/", - magicFirewallName: "Magic Firewall", - magicFirewallURL: "/magic-firewall/", + gatewayURL: "/cloudflare-one/traffic-policies/", warpURL: "/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/warp/", cfAutoCertificatesURL: "/cloudflare-one/team-and-resources/devices/user-side-certificates/automated-deployment/", cfManualCertificatesURL: "/cloudflare-one/team-and-resources/devices/user-side-certificates/manual-deployment/", - decryptTlsURL: "/cloudflare-one/policies/gateway/http-policies/tls-decryption/", - doNotInspectURL: "/cloudflare-one/policies/gateway/http-policies/#do-not-inspect", - magicWANName: "Magic WAN", - warpChecksURL: "/cloudflare-one/identity/devices/warp-client-checks/", - osVersionChecks: "/cloudflare-one/identity/devices/warp-client-checks/os-version/", + decryptTlsURL: "/cloudflare-one/traffic-policies/http-policies/tls-decryption/", + doNotInspectURL: "/cloudflare-one/traffic-policies/http-policies/#do-not-inspect", + warpChecksURL: "/cloudflare-one/reusable-components/posture-checks/warp-client-checks/", + osVersionChecks: "/cloudflare-one/reusable-components/posture-checks/warp-client-checks/os-version/", mwanOnrampsURL: "/cloudflare-one/networks/connectors/wan-tunnels/on-ramps/", - gatewayResolverPoliciesURL: "/cloudflare-one/policies/gateway/resolver-policies/", - gatewayInternalDnsURL: "/cloudflare-one/policies/gateway/resolver-policies/#internal-dns", - egressPoliciesURL: "/cloudflare-one/policies/gateway/egress-policies/", - cloudflareTunnelURL:"/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/cloudflare-tunnel/", + gatewayResolverPoliciesURL: "/cloudflare-one/traffic-policies/resolver-policies/", + gatewayInternalDnsURL: "/cloudflare-one/traffic-policies/resolver-policies/#internal-dns", + egressPoliciesURL: "/cloudflare-one/traffic-policies/egress-policies/", gatewayLogsURL: "/cloudflare-one/insights/logs/gateway-logs/#http-logs", tcpMssClampingURL: "/cloudflare-one/networks/connectors/wan-tunnels/get-started/#set-maximum-segment-size", ikeURL: "/cloudflare-one/networks/connectors/wan-tunnels/reference/gre-ipsec-tunnels/#supported-configuration-parameters", diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/cloudflare-tunnel.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/cloudflare-tunnel.mdx index 23dd91163a745a..642998690422d8 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/cloudflare-tunnel.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/cloudflare-tunnel.mdx @@ -9,13 +9,9 @@ import { Render } from "~/components"; file="magic-wan/zero-trust/tunnel" product="networking-services" params={{ - productName: "Magic WAN", - tunnelURL: "/cloudflare-one/networks/connectors/cloudflare-tunnel/", - gatewayURL: "/cloudflare-one/policies/gateway/", - privateRoutesURL: "/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/cloudflared/", + gatewayURL: "/cloudflare-one/traffic-policies/", greIpsecURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/how-to/configure-tunnel-endpoints/", - warpURL: "/cloudflare-one/connections/connect-devices/warp/", - cloudflareTunnelURL: "/cloudflare-one/networks/connectors/cloudflare-tunnel/", + warpURL: "/cloudflare-one/team-and-resources/devices/warp/", tracerouteURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/how-to/traceroute/" }} /> diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/index.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/index.mdx index 2cd2bcb160796c..875510b7d154c6 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/index.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/index.mdx @@ -1,13 +1,12 @@ --- -title: Zero Trust integration +title: Cloudflare One integration pcx_content_type: navigation sidebar: order: 7 head: - tag: title - content: Cloudflare Zero Trust integration tutorials -description: Learn how to integrate Magic WAN with other Cloudflare - Zero Trust products, such as Cloudflare Gateway and Cloudflare WARP. + content: Cloudflare One integration tutorials +description: Learn how to integrate Magic WAN with other Cloudflare One products, such as Cloudflare Gateway and Cloudflare WARP. --- @@ -16,7 +15,4 @@ import { Render } from "~/components"; diff --git a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/warp.mdx b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/warp.mdx index ec2fd263fd5071..e20dba801d96b1 100644 --- a/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/warp.mdx +++ b/src/content/docs/cloudflare-one/networks/connectors/wan-tunnels/zero-trust/warp.mdx @@ -14,11 +14,8 @@ import { Render } from "~/components"; file="magic-wan/zero-trust/warp" product="networking-services" params={{ - productName: "Magic WAN", warpURL: "/cloudflare-one/team-and-resources/devices/warp/", greIpsecURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/how-to/configure-tunnel-endpoints/#add-tunnels", - magicFirewallName: "Magic Firewall", - magicFirewallURL: "/magic-firewall/", setupZeroTrustAccountURL: "/cloudflare-one/setup/#create-a-zero-trust-organization", ztDashPath: "My Team > Devices", splitTunnelsURL: "/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/", @@ -26,7 +23,6 @@ import { Render } from "~/components"; warpIngressIpURL: "/cloudflare-one/team-and-resources/devices/warp/deployment/firewall/#warp-ingress-ip", mwanConnectorName: "Magic WAN Connector", domainFallbackURL: "/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/local-domains/#add-a-domain", - cloudflareTunnelURL: "/cloudflare-one/networks/connectors/cloudflare-tunnel/", tracerouteURL: "/cloudflare-one/networks/connectors/wan-tunnels/configuration/manually/how-to/traceroute/" }} diff --git a/src/content/docs/magic-transit/analytics/network-analytics.mdx b/src/content/docs/magic-transit/analytics/network-analytics.mdx index 9f312e7cc3cf6c..28f2f06b0928fc 100644 --- a/src/content/docs/magic-transit/analytics/network-analytics.mdx +++ b/src/content/docs/magic-transit/analytics/network-analytics.mdx @@ -9,22 +9,11 @@ head: --- -import { GlossaryTooltip, Render } from "~/components" +import { Render } from "~/components"; -[Network Analytics](/analytics/network-analytics/) gives you real-time visibility into Magic Transit traffic entering and leaving Cloudflare's network through GRE or IPsec tunnels. - - - -Refer to [Network Analytics](/analytics/network-analytics/) documentation to learn more. - -## Network traffic data filters - - - -## Access Magic Tunnel traffic analytics - - diff --git a/src/content/docs/magic-transit/how-to/configure-tunnel-endpoints.mdx b/src/content/docs/magic-transit/how-to/configure-tunnel-endpoints.mdx index 2a77037172b2cb..57b0da226b9e22 100644 --- a/src/content/docs/magic-transit/how-to/configure-tunnel-endpoints.mdx +++ b/src/content/docs/magic-transit/how-to/configure-tunnel-endpoints.mdx @@ -20,11 +20,9 @@ import { Render } from "~/components"; ciphersPagePath: "/magic-transit/reference/gre-ipsec-tunnels/#supported-configuration-parameters", antiReplayPagePath: "/magic-transit/reference/anti-replay-protection/", cniLink: "/magic-transit/network-interconnect/", - targetPageName: "Configuration", dashButtonPath: "/?to=/:account/magic-transit/configuration", updateHCFrequencyPage: "/magic-transit/network-health/update-tunnel-health-checks-frequency/", tunnelHealthChecksPage: "/magic-transit/reference/tunnel-health-checks/", - antiReplayPagePath: "/magic-transit/reference/anti-replay-protection/", biVsUniHealthCheck: "unidirectional", tunnelHealthDash: "/magic-transit/network-health/check-tunnel-health-dashboard/", biVsUniHealthCheckDefaults: "For Magic Transit this option defaults to unidirectional" diff --git a/src/content/docs/magic-wan/analytics/network-analytics.mdx b/src/content/docs/magic-wan/analytics/network-analytics.mdx index 8d62dc03e29404..5d809f9ecb2d85 100644 --- a/src/content/docs/magic-wan/analytics/network-analytics.mdx +++ b/src/content/docs/magic-wan/analytics/network-analytics.mdx @@ -10,10 +10,9 @@ head: import { Render } from "~/components"; - \ No newline at end of file diff --git a/src/content/docs/magic-wan/analytics/site-analytics.mdx b/src/content/docs/magic-wan/analytics/site-analytics.mdx index d88eb449a4aa2f..5e0e2bfc438546 100644 --- a/src/content/docs/magic-wan/analytics/site-analytics.mdx +++ b/src/content/docs/magic-wan/analytics/site-analytics.mdx @@ -17,7 +17,6 @@ import { Render } from "~/components" params={{ instructions: "Refer to [Set up a site](/magic-wan/configuration/common-settings/sites/) for more information on how to set up a site.", magicWord: "Magic WAN", - productName: "Magic WAN", networkOverviewPageName: "Network overview (beta)", magicTunnelHcsURL: "/magic-wan/configuration/common-settings/configure-magic-tunnel-health-alerts/", setGeoCoordinatesURL: "/magic-wan/configuration/common-settings/sites/#set-geographic-coordinates" diff --git a/src/content/docs/magic-wan/configuration/common-settings/check-tunnel-health-dashboard.mdx b/src/content/docs/magic-wan/configuration/common-settings/check-tunnel-health-dashboard.mdx index 7e37a6727ace27..a4c0212034be8f 100644 --- a/src/content/docs/magic-wan/configuration/common-settings/check-tunnel-health-dashboard.mdx +++ b/src/content/docs/magic-wan/configuration/common-settings/check-tunnel-health-dashboard.mdx @@ -37,7 +37,6 @@ import { Render } from "~/components"; file="tunnel-health/mconn-heartbeat-health" product="networking-services" params={{ - productName: "Magic WAN Connector", heartbeatURL: "/magic-wan/configuration/connector/maintenance/heartbeat/" }} /> diff --git a/src/content/docs/magic-wan/configuration/common-settings/custom-ike-id-ipsec.mdx b/src/content/docs/magic-wan/configuration/common-settings/custom-ike-id-ipsec.mdx index 9e72143a024bc9..48b289b0e55588 100644 --- a/src/content/docs/magic-wan/configuration/common-settings/custom-ike-id-ipsec.mdx +++ b/src/content/docs/magic-wan/configuration/common-settings/custom-ike-id-ipsec.mdx @@ -7,10 +7,4 @@ sidebar: import { Render } from "~/components"; - \ No newline at end of file + \ No newline at end of file diff --git a/src/content/docs/magic-wan/configuration/common-settings/sites.mdx b/src/content/docs/magic-wan/configuration/common-settings/sites.mdx index d63f3ab58b3eb2..392365b45cbf92 100644 --- a/src/content/docs/magic-wan/configuration/common-settings/sites.mdx +++ b/src/content/docs/magic-wan/configuration/common-settings/sites.mdx @@ -14,7 +14,6 @@ import { Render } from "~/components"; product="networking-services" params={{ magicWord: "Magic WAN", - productName: "Magic WAN", greIpsecTunnelsURL: "/magic-wan/configuration/manually/how-to/configure-tunnel-endpoints/", connectorURL: "/magic-wan/configuration/connector/", cniURL: "/magic-wan/network-interconnect/", diff --git a/src/content/docs/magic-wan/configuration/connector/configure-hardware-connector/index.mdx b/src/content/docs/magic-wan/configuration/connector/configure-hardware-connector/index.mdx index ff7d302ba570d3..4a0ad7b32162fb 100644 --- a/src/content/docs/magic-wan/configuration/connector/configure-hardware-connector/index.mdx +++ b/src/content/docs/magic-wan/configuration/connector/configure-hardware-connector/index.mdx @@ -15,6 +15,7 @@ import { Render } from "~/components"; productName: "Magic WAN Connector", maintenanceURL: "/magic-wan/configuration/connector/maintenance/", dashName: "Magic WAN", + deviceTypeName: "Connector", sfpURL: "/magic-wan/configuration/connector/configure-hardware-connector/sfp-port-information/", wan: "refers to the physical Magic WAN Connector Ethernet port that you are using for your WAN. The ports are labeled `GE1`, `GE2`, `GE3`, `GE4`, `GE5`, and `GE6`. Choose the number corresponding to the port that you are using in Connector.
If you need a throughput higher than 1 Gbps, you can use one of the SFP+ ports. Refer to [SFP+ port information](/magic-wan/configuration/connector/configure-hardware-connector/sfp-port-information/) for more information on the hardware supported.", lan: "refers to the physical Magic WAN Connector Ethernet port that you are using for your WAN. The ports are labeled `GE1`, `GE2`, `GE3`, `GE4`, `GE5`, and `GE6`. Choose a number corresponding to the port that you are using in Connector.
If you need a throughput higher than 1 Gbps, you can use one of the SFP+ ports. Refer to [SFP+ port information](/magic-wan/configuration/connector/configure-hardware-connector/sfp-port-information/) for more information on the hardware supported.", @@ -26,7 +27,6 @@ import { Render } from "~/components"; shippedLanguage: "The Magic WAN Connector is shipped to you deactivated", hardSoftConn: "You need to deploy two Connectors in your premises before you can set up a site in high availability.", hcConfigsURL: "/magic-wan/configuration/connector/reference/#high-availability-configurations", - finalInstructions: "Follow the instructions in [Set up your Magic WAN Connector](#set-up-your-magic-wan-connector) and [Activate appliance](#activate-appliance) to finish setting up your Connectors.", ipsecTunnelsRefURL: "/magic-wan/reference/gre-ipsec-tunnels/#ipsec-tunnels", trafficSteeringURL: "/magic-wan/reference/traffic-steering/", vlanIdURL: "/magic-wan/configuration/connector/reference/#vlan-id", diff --git a/src/content/docs/magic-wan/configuration/connector/configure-hardware-connector/sfp-port-information.mdx b/src/content/docs/magic-wan/configuration/connector/configure-hardware-connector/sfp-port-information.mdx index 615f661ff138e7..3daaa5c9d6b01a 100644 --- a/src/content/docs/magic-wan/configuration/connector/configure-hardware-connector/sfp-port-information.mdx +++ b/src/content/docs/magic-wan/configuration/connector/configure-hardware-connector/sfp-port-information.mdx @@ -7,8 +7,4 @@ title: SFP+ port information import { Render } from "~/components"; \ No newline at end of file + product="networking-services" /> \ No newline at end of file diff --git a/src/content/docs/magic-wan/configuration/connector/configure-virtual-connector.mdx b/src/content/docs/magic-wan/configuration/connector/configure-virtual-connector.mdx index 1a523c50c68ef4..d274eb38c5e543 100644 --- a/src/content/docs/magic-wan/configuration/connector/configure-virtual-connector.mdx +++ b/src/content/docs/magic-wan/configuration/connector/configure-virtual-connector.mdx @@ -16,6 +16,7 @@ import { Render } from "~/components"; productNameVirtual: "Virtual Connector", maintenanceURL: "/magic-wan/configuration/connector/maintenance/", dashName: "Magic WAN", + deviceTypeName: "Connector", wan: "needs to correspond to the virtual network interface on the Virtual Connector instance you have set up in VMware. Following our example from the previous steps, you need to choose port `1` since that is what corresponds to the `eno1` port we set up in VMware.", lan: "needs to correspond to the virtual LAN interface on the Virtual Connector instance you have set up in VMware. Following our example from the previous steps, you need to choose port `2` since that is what corresponds to the `eno2` port we set up in VMware.", noConnectorShows: "For a Virtual Connector to show up you need to:
  • VMWare: Have already obtained your OVA package and license keys if you are installing on VMWare.
  • Proxmox: Have already obtained your Virtual Connector Script and license keys if you are installing on Proxmox.
\nFor more information, refer to [Configure a virtual machine](#configure-a-virtual-machine) and select the appropriate tab.\n", @@ -26,7 +27,6 @@ import { Render } from "~/components"; shippedLanguage: "Virtual Magic WAN Connector is deactivated after you install it", hardSoftConn: "You need to install two Virtual Connectors before you can set up a site in high availability.", hcConfigsURL: "/magic-wan/configuration/connector/reference/#high-availability-configurations", - finalInstructions: "Follow the instructions in [Activate appliance](#activate-appliance) to finish setting up your Connectors.", ipsecTunnelsRefURL: "/magic-wan/reference/gre-ipsec-tunnels/#ipsec-tunnels", trafficSteeringURL: "/magic-wan/reference/traffic-steering/", vlanIdURL: "/magic-wan/configuration/connector/reference/#vlan-id", diff --git a/src/content/docs/magic-wan/configuration/connector/device-metrics.mdx b/src/content/docs/magic-wan/configuration/connector/device-metrics.mdx index f1c4ab8f23885b..4aea0e2a0c5f2b 100644 --- a/src/content/docs/magic-wan/configuration/connector/device-metrics.mdx +++ b/src/content/docs/magic-wan/configuration/connector/device-metrics.mdx @@ -11,7 +11,6 @@ import { Render } from "~/components"; file="mconn/device-metrics" product="networking-services" params={{ - productName: "Magic WAN Connector", troubleshootingURL: "/magic-wan/configuration/connector/troubleshooting/" }} /> \ No newline at end of file diff --git a/src/content/docs/magic-wan/configuration/connector/maintenance/activate-connector.mdx b/src/content/docs/magic-wan/configuration/connector/maintenance/activate-connector.mdx index a135a4db3caa3e..9c980a41edbdb1 100644 --- a/src/content/docs/magic-wan/configuration/connector/maintenance/activate-connector.mdx +++ b/src/content/docs/magic-wan/configuration/connector/maintenance/activate-connector.mdx @@ -11,7 +11,6 @@ import { Render } from "~/components"; file="mconn/maintenance/activate-connectors" product="networking-services" params={{ - productName: "Magic WAN Connector", hardwareConnectorURL: "/magic-wan/configuration/connector/configure-hardware-connector/#activate-appliance", virtualConnectorURL: "/magic-wan/configuration/connector/configure-virtual-connector/#activate-appliance", }} /> \ No newline at end of file diff --git a/src/content/docs/magic-wan/configuration/connector/maintenance/add-remove-connectors.mdx b/src/content/docs/magic-wan/configuration/connector/maintenance/add-remove-connectors.mdx index 39355b1f0ed411..60ffb16fb2fd17 100644 --- a/src/content/docs/magic-wan/configuration/connector/maintenance/add-remove-connectors.mdx +++ b/src/content/docs/magic-wan/configuration/connector/maintenance/add-remove-connectors.mdx @@ -11,7 +11,6 @@ import { Render } from "~/components"; file="mconn/maintenance/add-remove-connectors" product="networking-services" params={{ - productName: "Magic WAN Connector", dashName: "Magic WAN", }} /> \ No newline at end of file diff --git a/src/content/docs/magic-wan/configuration/connector/maintenance/deactivate-connector.mdx b/src/content/docs/magic-wan/configuration/connector/maintenance/deactivate-connector.mdx index c344b46783ecfe..482e6811289f3b 100644 --- a/src/content/docs/magic-wan/configuration/connector/maintenance/deactivate-connector.mdx +++ b/src/content/docs/magic-wan/configuration/connector/maintenance/deactivate-connector.mdx @@ -12,7 +12,6 @@ import { Render } from "~/components"; file="mconn/maintenance/deactivate-connector" product="networking-services" params={{ - productName: "Magic WAN Connector", dashName: "Magic WAN", }} /> \ No newline at end of file diff --git a/src/content/docs/magic-wan/configuration/connector/maintenance/default-password.mdx b/src/content/docs/magic-wan/configuration/connector/maintenance/default-password.mdx index 8ef0a1523cc7aa..da9d7a42dd37c5 100644 --- a/src/content/docs/magic-wan/configuration/connector/maintenance/default-password.mdx +++ b/src/content/docs/magic-wan/configuration/connector/maintenance/default-password.mdx @@ -11,9 +11,4 @@ import { Render } from "~/components"; \ No newline at end of file diff --git a/src/content/docs/magic-wan/configuration/connector/maintenance/edit-basic-info.mdx b/src/content/docs/magic-wan/configuration/connector/maintenance/edit-basic-info.mdx index ed80df85b3737d..961ca15fdf1474 100644 --- a/src/content/docs/magic-wan/configuration/connector/maintenance/edit-basic-info.mdx +++ b/src/content/docs/magic-wan/configuration/connector/maintenance/edit-basic-info.mdx @@ -11,7 +11,6 @@ import { Render } from "~/components"; file="mconn/maintenance/edit-basic-info" product="networking-services" params={{ - productName: "Magic WAN Connector", dashName: "Magic WAN", }} /> \ No newline at end of file diff --git a/src/content/docs/magic-wan/configuration/connector/maintenance/edit-network-settings.mdx b/src/content/docs/magic-wan/configuration/connector/maintenance/edit-network-settings.mdx index bab05686f62295..ec5f3364172aec 100644 --- a/src/content/docs/magic-wan/configuration/connector/maintenance/edit-network-settings.mdx +++ b/src/content/docs/magic-wan/configuration/connector/maintenance/edit-network-settings.mdx @@ -11,7 +11,6 @@ import { Render } from "~/components"; file="mconn/maintenance/edit-network-settings" product="networking-services" params={{ - productName: "Magic WAN Connector", dashName: "Magic WAN", }} /> \ No newline at end of file diff --git a/src/content/docs/magic-wan/configuration/connector/maintenance/edit-traffic-steering-settings.mdx b/src/content/docs/magic-wan/configuration/connector/maintenance/edit-traffic-steering-settings.mdx index 67cdee2c21a931..aa59d1967b1f6b 100644 --- a/src/content/docs/magic-wan/configuration/connector/maintenance/edit-traffic-steering-settings.mdx +++ b/src/content/docs/magic-wan/configuration/connector/maintenance/edit-traffic-steering-settings.mdx @@ -11,7 +11,6 @@ import { Render } from "~/components"; file="mconn/maintenance/edit-traffic-steering" product="networking-services" params={{ - productName: "Magic WAN Connector", dashName: "Magic WAN", }} /> \ No newline at end of file diff --git a/src/content/docs/magic-wan/configuration/connector/maintenance/heartbeat.mdx b/src/content/docs/magic-wan/configuration/connector/maintenance/heartbeat.mdx index b32465500fd8f1..bf11f733dce3f7 100644 --- a/src/content/docs/magic-wan/configuration/connector/maintenance/heartbeat.mdx +++ b/src/content/docs/magic-wan/configuration/connector/maintenance/heartbeat.mdx @@ -12,7 +12,6 @@ import { Render } from "~/components"; file="mconn/maintenance/heartbeat" product="networking-services" params={{ - productName: "Magic WAN Connector", dashName: "Magic WAN", }} /> \ No newline at end of file diff --git a/src/content/docs/magic-wan/configuration/connector/maintenance/interrupt-service-window.mdx b/src/content/docs/magic-wan/configuration/connector/maintenance/interrupt-service-window.mdx index daca60bbef8eaf..d1ce803add9cc7 100644 --- a/src/content/docs/magic-wan/configuration/connector/maintenance/interrupt-service-window.mdx +++ b/src/content/docs/magic-wan/configuration/connector/maintenance/interrupt-service-window.mdx @@ -14,7 +14,6 @@ import { Render } from "~/components"; file="mconn/maintenance/interrupt-service-window" product="networking-services" params={{ - productName: "Magic WAN Connector", dashName: "Magic WAN", }} /> \ No newline at end of file diff --git a/src/content/docs/magic-wan/configuration/connector/maintenance/register-appliance.mdx b/src/content/docs/magic-wan/configuration/connector/maintenance/register-appliance.mdx index 0d90d78d744812..da905fdd092eb5 100644 --- a/src/content/docs/magic-wan/configuration/connector/maintenance/register-appliance.mdx +++ b/src/content/docs/magic-wan/configuration/connector/maintenance/register-appliance.mdx @@ -8,4 +8,4 @@ sidebar: import { Render } from "~/components"; - \ No newline at end of file + \ No newline at end of file diff --git a/src/content/docs/magic-wan/configuration/connector/network-options/application-based-policies/breakout-traffic.mdx b/src/content/docs/magic-wan/configuration/connector/network-options/application-based-policies/breakout-traffic.mdx index 9168f89d77adb5..11df0b7890fc5a 100644 --- a/src/content/docs/magic-wan/configuration/connector/network-options/application-based-policies/breakout-traffic.mdx +++ b/src/content/docs/magic-wan/configuration/connector/network-options/application-based-policies/breakout-traffic.mdx @@ -12,7 +12,6 @@ import { Render } from "~/components"; product="networking-services" params={{ magicWord: "breakout", - productName: "Magic WAN Connector", featureName: "Breakout traffic", trafficSteeringURL: "/magic-wan/reference/traffic-steering/", whatHappensApp: "will now go directly to the Internet and bypass Cloudflare's filtering", diff --git a/src/content/docs/magic-wan/configuration/connector/network-options/application-based-policies/index.mdx b/src/content/docs/magic-wan/configuration/connector/network-options/application-based-policies/index.mdx index 6af8d44de8da88..a1a3a2d11fa6d1 100644 --- a/src/content/docs/magic-wan/configuration/connector/network-options/application-based-policies/index.mdx +++ b/src/content/docs/magic-wan/configuration/connector/network-options/application-based-policies/index.mdx @@ -9,7 +9,6 @@ import { Render } from "~/components"; file="mconn/network-options/app-aware-policies/overview" product="networking-services" params={{ - productName: "Magic WAN Connector", gatewayPoliciesURL: "/cloudflare-one/traffic-policies/", appTypesGatewayURL: "/cloudflare-one/traffic-policies/application-app-types/", diff --git a/src/content/docs/magic-wan/configuration/connector/network-options/application-based-policies/prioritized-traffic.mdx b/src/content/docs/magic-wan/configuration/connector/network-options/application-based-policies/prioritized-traffic.mdx index d5663411d24515..257e22a06f1a08 100644 --- a/src/content/docs/magic-wan/configuration/connector/network-options/application-based-policies/prioritized-traffic.mdx +++ b/src/content/docs/magic-wan/configuration/connector/network-options/application-based-policies/prioritized-traffic.mdx @@ -12,7 +12,6 @@ import { Render } from "~/components"; product="networking-services" params={{ magicWord: "prioritized", - productName: "Magic WAN Connector", featureName: "Prioritized traffic", whatHappensApp: "is now processed first by Connector", dashName: "Magic WAN", diff --git a/src/content/docs/magic-wan/configuration/connector/network-options/dhcp/dhcp-relay.mdx b/src/content/docs/magic-wan/configuration/connector/network-options/dhcp/dhcp-relay.mdx index a3b05892ce281b..69f353494fd658 100644 --- a/src/content/docs/magic-wan/configuration/connector/network-options/dhcp/dhcp-relay.mdx +++ b/src/content/docs/magic-wan/configuration/connector/network-options/dhcp/dhcp-relay.mdx @@ -9,7 +9,6 @@ import { Render } from "~/components"; \ No newline at end of file diff --git a/src/content/docs/magic-wan/configuration/connector/network-options/nat-subnet.mdx b/src/content/docs/magic-wan/configuration/connector/network-options/nat-subnet.mdx index ac668336bd355a..b12eb971646cf5 100644 --- a/src/content/docs/magic-wan/configuration/connector/network-options/nat-subnet.mdx +++ b/src/content/docs/magic-wan/configuration/connector/network-options/nat-subnet.mdx @@ -10,10 +10,6 @@ import { Render } from "~/components" \ No newline at end of file diff --git a/src/content/docs/magic-wan/configuration/connector/network-options/network-segmentation.mdx b/src/content/docs/magic-wan/configuration/connector/network-options/network-segmentation.mdx index 48ba04db13a418..6a285b1938b512 100644 --- a/src/content/docs/magic-wan/configuration/connector/network-options/network-segmentation.mdx +++ b/src/content/docs/magic-wan/configuration/connector/network-options/network-segmentation.mdx @@ -9,11 +9,8 @@ import { Render } from "~/components" diff --git a/src/content/docs/magic-wan/configuration/connector/network-options/routed-subnets.mdx b/src/content/docs/magic-wan/configuration/connector/network-options/routed-subnets.mdx index 241451af31d7ca..ee2be5c2fe651b 100644 --- a/src/content/docs/magic-wan/configuration/connector/network-options/routed-subnets.mdx +++ b/src/content/docs/magic-wan/configuration/connector/network-options/routed-subnets.mdx @@ -10,10 +10,7 @@ import { Render } from "~/components" diff --git a/src/content/docs/magic-wan/configuration/connector/reference.mdx b/src/content/docs/magic-wan/configuration/connector/reference.mdx index 84c433c75eae94..347fcbdbe54022 100644 --- a/src/content/docs/magic-wan/configuration/connector/reference.mdx +++ b/src/content/docs/magic-wan/configuration/connector/reference.mdx @@ -11,22 +11,18 @@ import { Render } from "~/components"; file="mconn/mconn-reference" product="networking-services" params={{ - productName: "Magic WAN Connector", dashName: "Magic WAN", - virtualProductName: "Virtual Connector", gatewayURL: "/cloudflare-one/traffic-policies/", hardConnectorURL: "/magic-wan/configuration/connector/configure-hardware-connector/", virtualConnectorURL: "/magic-wan/configuration/connector/configure-virtual-connector/", - configHardProductName: "Configure hardware Connector", - configVirtualProductName: "Configure Virtual Connector", haSetupURL: "/magic-wan/configuration/connector/configure-hardware-connector/#create-a-high-availability-configuration", ecmpRoutingURL: "/magic-wan/reference/traffic-steering/#equal-cost-multi-path-routing", multipleWansURL: - "(magic-wan/configuration/connector/configure-hardware-connector/#create-a-wan", + "/magic-wan/configuration/connector/configure-hardware-connector/#create-a-wan", sfpURL: "/magic-wan/configuration/connector/configure-hardware-connector/sfp-port-information/", vlanIdURL: "#vlan-id", diff --git a/src/content/docs/magic-wan/configuration/connector/troubleshooting.mdx b/src/content/docs/magic-wan/configuration/connector/troubleshooting.mdx index 44508eec6aa7ed..a03975b467f141 100644 --- a/src/content/docs/magic-wan/configuration/connector/troubleshooting.mdx +++ b/src/content/docs/magic-wan/configuration/connector/troubleshooting.mdx @@ -11,11 +11,9 @@ import { Render } from "~/components"; file="mconn/troubleshooting/troubleshooting" product="networking-services" params={{ - productName: "Magic WAN Connector", dashName: "Magic WAN", activateURL: "/magic-wan/configuration/connector/configure-hardware-connector/#activate-appliance", firewallURL: "/magic-wan/configuration/connector/configure-hardware-connector/#firewall-settings-required", heartbeatURL: "/magic-wan/configuration/connector/maintenance/heartbeat/" }} - - /> \ No newline at end of file +/> \ No newline at end of file diff --git a/src/content/docs/magic-wan/configuration/manually/how-to/configure-tunnel-endpoints.mdx b/src/content/docs/magic-wan/configuration/manually/how-to/configure-tunnel-endpoints.mdx index 7c3f7de78c851f..4d594a119765ba 100644 --- a/src/content/docs/magic-wan/configuration/manually/how-to/configure-tunnel-endpoints.mdx +++ b/src/content/docs/magic-wan/configuration/manually/how-to/configure-tunnel-endpoints.mdx @@ -21,11 +21,9 @@ import { GlossaryTooltip, Render } from "~/components"; ciphersPagePath: "/magic-wan/reference/gre-ipsec-tunnels/#supported-configuration-parameters", antiReplayPagePath: "/magic-wan/reference/anti-replay-protection/", cniLink: "/magic-wan/network-interconnect/", - targetPageName: "Configuration", dashButtonPath: "/?to=/:account/magic-wan/configuration", - updateHCFrequencyPage: "/magic-wan/configuration/common-settings/update-tunnel-health-checks-frequency//", + updateHCFrequencyPage: "/magic-wan/configuration/common-settings/update-tunnel-health-checks-frequency/", tunnelHealthChecksPage: "/magic-wan/reference/tunnel-health-checks/", - antiReplayPagePath: "/magic-wan/reference/anti-replay-protection/", biVsUniHealthCheck: "bidirectional", tunnelHealthDash: "/magic-wan/configuration/common-settings/check-tunnel-health-dashboard/", biVsUniHealthCheckDefaults: "For Magic WAN this option defaults to bidirectional", diff --git a/src/content/docs/magic-wan/configuration/manually/how-to/traceroute.mdx b/src/content/docs/magic-wan/configuration/manually/how-to/traceroute.mdx index 337b75ac650e3e..062801dbb767b6 100644 --- a/src/content/docs/magic-wan/configuration/manually/how-to/traceroute.mdx +++ b/src/content/docs/magic-wan/configuration/manually/how-to/traceroute.mdx @@ -14,7 +14,6 @@ import { Render } from "~/components"; file="routing/traceroute" product="networking-services" params={{ - productName: "Magic WAN", greIpsecURL: "/magic-wan/configuration/manually/how-to/configure-tunnel-endpoints/", warpURL: "/magic-wan/zero-trust/warp/", cfTunnelURL: "/magic-wan/zero-trust/cloudflare-tunnel/" diff --git a/src/content/docs/magic-wan/load-balancing.mdx b/src/content/docs/magic-wan/load-balancing.mdx index da5643663925fb..183c9042e185f2 100644 --- a/src/content/docs/magic-wan/load-balancing.mdx +++ b/src/content/docs/magic-wan/load-balancing.mdx @@ -7,13 +7,6 @@ sidebar: import { Render } from "~/components"; - + diff --git a/src/content/docs/magic-wan/network-interconnect.mdx b/src/content/docs/magic-wan/network-interconnect.mdx index 13d60dc9137442..8189bb4d71e604 100644 --- a/src/content/docs/magic-wan/network-interconnect.mdx +++ b/src/content/docs/magic-wan/network-interconnect.mdx @@ -16,10 +16,8 @@ import { Render } from "~/components"; file="traceroute" product="networking-services" params={{ - productName: "Magic WAN", greIpsecURL: "/magic-wan/configuration/manually/how-to/configure-tunnel-endpoints/", warpURL: "/cloudflare-one/team-and-resources/devices/warp/", - cloudflareTunnelURL: "/cloudflare-one/networks/connectors/cloudflare-tunnel/", tracerouteURL: "/magic-wan/configuration/manually/how-to/traceroute/" }} /> diff --git a/src/content/docs/magic-wan/on-ramps.mdx b/src/content/docs/magic-wan/on-ramps.mdx index b1455abc0d127d..3df73e51536498 100644 --- a/src/content/docs/magic-wan/on-ramps.mdx +++ b/src/content/docs/magic-wan/on-ramps.mdx @@ -18,6 +18,7 @@ import { Render } from "~/components"; thirdPartyURL: "/magic-wan/configuration/manually/third-party/", cniURL: "/magic-wan/network-interconnect/", cfTunnelURL: "/magic-wan/zero-trust/cloudflare-tunnel/", - warpURL: "/cloudflare-one/team-and-resources/devices/warp/" + warpURL: "/magic-wan/zero-trust/warp/", + thirdPartyIntegrationURL: "/magic-wan/configuration/manually/third-party/" }} /> diff --git a/src/content/docs/magic-wan/reference/bandwidth-measurement.mdx b/src/content/docs/magic-wan/reference/bandwidth-measurement.mdx index a88acec65602f8..3d17f957d8c027 100644 --- a/src/content/docs/magic-wan/reference/bandwidth-measurement.mdx +++ b/src/content/docs/magic-wan/reference/bandwidth-measurement.mdx @@ -11,9 +11,6 @@ import { Render } from "~/components"; file="magic-wan/reference/bandwidth-measurement" product="networking-services" params={{ - productName: "Magic WAN", - cloudflareTunnelURL: "/magic-wan/zero-trust/cloudflare-tunnel/", - warpURL: "/cloudflare-one/team-and-resources/devices/warp/" - + cloudflareTunnelURL: "/magic-wan/zero-trust/cloudflare-tunnel/" }} /> \ No newline at end of file diff --git a/src/content/docs/magic-wan/reference/device-compatibility.mdx b/src/content/docs/magic-wan/reference/device-compatibility.mdx index 74e36ff9498275..e0cd3dd03e14e6 100644 --- a/src/content/docs/magic-wan/reference/device-compatibility.mdx +++ b/src/content/docs/magic-wan/reference/device-compatibility.mdx @@ -10,7 +10,6 @@ import { Render } from "~/components"; diff --git a/src/content/docs/magic-wan/zero-trust/cloudflare-gateway.mdx b/src/content/docs/magic-wan/zero-trust/cloudflare-gateway.mdx index 8987de8581d9a7..320c0857dc7a95 100644 --- a/src/content/docs/magic-wan/zero-trust/cloudflare-gateway.mdx +++ b/src/content/docs/magic-wan/zero-trust/cloudflare-gateway.mdx @@ -13,21 +13,17 @@ import { Render } from "~/components"; product="networking-services" params={{ gatewayURL: "/cloudflare-one/traffic-policies/", - magicFirewallName: "Magic Firewall", - magicFirewallURL: "/magic-firewall/", warpURL: "/magic-wan/zero-trust/warp/", - cfAutoCertificatesURL: "/cloudflare-one/connections/connect-devices/user-side-certificates/automated-deployment/", - cfManualCertificatesURL: "/cloudflare-one/connections/connect-devices/user-side-certificates/manual-deployment/", - decryptTlsURL: "/cloudflare-one/policies/gateway/http-policies/tls-decryption/", - doNotInspectURL: "/cloudflare-one/policies/gateway/http-policies/#do-not-inspect", - magicWANName: "Magic WAN", + cfAutoCertificatesURL: "/cloudflare-one/team-and-resources/devices/user-side-certificates/automated-deployment/", + cfManualCertificatesURL: "/cloudflare-one/team-and-resources/devices/user-side-certificates/manual-deployment/", + decryptTlsURL: "/cloudflare-one/traffic-policies/http-policies/tls-decryption/", + doNotInspectURL: "/cloudflare-one/traffic-policies/http-policies/#do-not-inspect", warpChecksURL: "/cloudflare-one/reusable-components/posture-checks/warp-client-checks/", osVersionChecks: "/cloudflare-one/reusable-components/posture-checks/warp-client-checks/os-version/", mwanOnrampsURL: "/magic-wan/on-ramps/", - gatewayResolverPoliciesURL: "/cloudflare-one/policies/gateway/resolver-policies/", - gatewayInternalDnsURL: "/cloudflare-one/policies/gateway/resolver-policies/#internal-dns", - egressPoliciesURL: "/cloudflare-one/policies/gateway/egress-policies/", - cloudflareTunnelURL:"/magic-wan/zero-trust/cloudflare-tunnel/", + gatewayResolverPoliciesURL: "/cloudflare-one/traffic-policies/resolver-policies/", + gatewayInternalDnsURL: "/cloudflare-one/traffic-policies/resolver-policies/#internal-dns", + egressPoliciesURL: "/cloudflare-one/traffic-policies/egress-policies/", gatewayLogsURL: "/cloudflare-one/insights/logs/gateway-logs/#http-logs", tcpMssClampingURL: "/magic-wan/get-started/#set-maximum-segment-size", ikeURL: "/magic-wan/reference/gre-ipsec-tunnels/#supported-configuration-parameters", diff --git a/src/content/docs/magic-wan/zero-trust/cloudflare-tunnel.mdx b/src/content/docs/magic-wan/zero-trust/cloudflare-tunnel.mdx index 5765fbb8f6dc64..6ac6da0406b0f1 100644 --- a/src/content/docs/magic-wan/zero-trust/cloudflare-tunnel.mdx +++ b/src/content/docs/magic-wan/zero-trust/cloudflare-tunnel.mdx @@ -9,13 +9,9 @@ import { Render } from "~/components"; file="magic-wan/zero-trust/tunnel" product="networking-services" params={{ - productName: "Magic WAN", - tunnelURL: "/cloudflare-one/connections/connect-networks/", - gatewayURL: "/cloudflare-one/policies/gateway/", - privateRoutesURL: "/cloudflare-one/connections/connect-networks/private-net/cloudflared/", + gatewayURL: "/cloudflare-one/traffic-policies/", greIpsecURL: "/magic-wan/configuration/manually/how-to/configure-tunnel-endpoints/", - warpURL: "/cloudflare-one/connections/connect-devices/warp/", - cloudflareTunnelURL: "/cloudflare-one/connections/connect-networks/", + warpURL: "/cloudflare-one/team-and-resources/devices/warp/", tracerouteURL: "/magic-wan/configuration/manually/how-to/traceroute/" }} /> diff --git a/src/content/docs/magic-wan/zero-trust/index.mdx b/src/content/docs/magic-wan/zero-trust/index.mdx index 492d0136572462..4ab48876befac4 100644 --- a/src/content/docs/magic-wan/zero-trust/index.mdx +++ b/src/content/docs/magic-wan/zero-trust/index.mdx @@ -1,13 +1,13 @@ --- -title: Zero Trust integration +title: Cloudflare One integration pcx_content_type: navigation sidebar: order: 7 head: - tag: title - content: Cloudflare Zero Trust integration tutorials + content: Cloudflare One integration tutorials description: Learn how to integrate Cloudflare Magic WAN with other Cloudflare - Zero Trust products, such as Cloudflare Gateway and Cloudflare WARP. + Cloudflare One products, such as Cloudflare Gateway and Cloudflare WARP. --- @@ -16,7 +16,4 @@ import { Render } from "~/components"; diff --git a/src/content/docs/magic-wan/zero-trust/warp.mdx b/src/content/docs/magic-wan/zero-trust/warp.mdx index 735f63806072ab..e00b93883a7d38 100644 --- a/src/content/docs/magic-wan/zero-trust/warp.mdx +++ b/src/content/docs/magic-wan/zero-trust/warp.mdx @@ -14,19 +14,15 @@ import { Render } from "~/components"; file="magic-wan/zero-trust/warp" product="networking-services" params={{ - productName: "Magic WAN", warpURL: "/cloudflare-one/team-and-resources/devices/warp/", greIpsecURL: "/magic-wan/configuration/manually/how-to/configure-tunnel-endpoints/#add-tunnels", - magicFirewallName: "Magic Firewall", - magicFirewallURL: "/magic-firewall/", setupZeroTrustAccountURL: "/cloudflare-one/setup/#create-a-zero-trust-organization", ztDashPath: "My Team > Devices", - splitTunnelsURL: "/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/", - warpDeploymentURL: "/cloudflare-one/connections/connect-devices/warp/deployment/", - warpIngressIpURL: "/cloudflare-one/connections/connect-devices/warp/deployment/firewall/#warp-ingress-ip", + splitTunnelsURL: "/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/", + warpDeploymentURL: "/cloudflare-one/team-and-resources/devices/warp/deployment/", + warpIngressIpURL: "/cloudflare-one/team-and-resources/devices/warp/deployment/firewall/#warp-ingress-ip", mwanConnectorName: "Magic WAN Connector", - domainFallbackURL: "/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#add-a-domain", - cloudflareTunnelURL: "/cloudflare-one/connections/connect-networks/", + domainFallbackURL: "/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/local-domains/#add-a-domain", tracerouteURL: "/magic-wan/configuration/manually/how-to/traceroute/" }} diff --git a/src/content/partials/networking-services/analytics/magic-tunnel-traffic-analytics.mdx b/src/content/partials/networking-services/analytics/magic-tunnel-traffic-analytics.mdx deleted file mode 100644 index 5d72f7f75de3f8..00000000000000 --- a/src/content/partials/networking-services/analytics/magic-tunnel-traffic-analytics.mdx +++ /dev/null @@ -1,27 +0,0 @@ ---- -{} ---- - -1. Go to the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account. -2. Select **Analytics & Logs** > **Network Analytics**. -3. In the **All Traffic** tab, scroll to **Top Insights** to access network traffic filters. By default, the dashboard shows five items, but you can display up to 25 items at once. Select the drop-down menu to make your change. -4. (Optional) Hover your mouse over one of the types of traffic. You can then choose to filter for that type of traffic, or exclude it from the results. -5. You can also apply filters to adjust the scope of information displayed. Scroll to **All traffic** > **Add filter**. -6. In the **New filter** popover, choose what type of data you want to display from the left dropdown menu, an operator from the middle dropdown menu, and an action from the right dropdown menu. For example: - - ```txt - | _equals_ | - ``` - - This lets you examine traffic from specific Source tunnels and/or Destination tunnels. - -## Feature notes - -- For Magic Transit customers, `Non-tunnel traffic` will often represent traffic from the public Internet or traffic via [CNIs](/network-interconnect/). -- For Magic WAN / WAN tunnels customers, `Non-tunnel traffic` refers to traffic outside of GRE or IPsec tunnels. This can include traffic from: - - [WARP](/cloudflare-one/team-and-resources/devices/warp/) - - [CNIs](/network-interconnect/) - - Traffic destined for the public Internet via [Gateway](/cloudflare-one/traffic-policies/) - - Traffic destined for applications behind [Cloudflare Tunnel](/cloudflare-one/networks/connectors/cloudflare-tunnel/) - -The label `Non-Tunnel traffic` is a placeholder, and more specific labels will be applied to this category of traffic in the near future. diff --git a/src/content/partials/networking-services/analytics/network-analytics-data-averages.mdx b/src/content/partials/networking-services/analytics/network-analytics-data-averages.mdx deleted file mode 100644 index f1cd0cc9e32dad..00000000000000 --- a/src/content/partials/networking-services/analytics/network-analytics-data-averages.mdx +++ /dev/null @@ -1,5 +0,0 @@ ---- -{} ---- - -Data is aggregated over time intervals that vary based on your selected zoom level. For example, a daily view shows 24-hour averages, which can flatten out short-term traffic spikes. As a result, longer time intervals will display lower peak bandwidth values compared to more granular views like five-minute intervals. \ No newline at end of file diff --git a/src/content/partials/networking-services/analytics/network-analytics.mdx b/src/content/partials/networking-services/analytics/network-analytics.mdx new file mode 100644 index 00000000000000..454f28d475aa72 --- /dev/null +++ b/src/content/partials/networking-services/analytics/network-analytics.mdx @@ -0,0 +1,96 @@ +--- +params: + - magicWord +--- + +import { GlossaryTooltip, Markdown } from "~/components" + +{ props.magicWord === "Magic Transit" && ( + <> + + +)} + +{ (props.magicWord === "Magic WAN" || props.magicWord === "WAN Tunnels") && ( + <> + + +)} + +Data is aggregated over time intervals that vary based on your selected zoom level. For example, a daily view shows 24-hour averages, which can flatten out short-term traffic spikes. As a result, longer time intervals will display lower peak bandwidth values compared to more granular views like five-minute intervals. + +Refer to [Network Analytics](/analytics/network-analytics/) documentation to learn more. + +## Network traffic data filters + +{ props.magicWord === "Magic Transit" && ( + <> + + + ) +} + +{ (props.magicWord === "Magic WAN" || props.magicWord === "WAN Tunnels") && ( + <> + + + ) +} + +The complete list of filters includes: + +- A list of your top tunnels by traffic volume. +- Traffic source and destination for type of traffic, on-ramps and off-ramps, IP addresses, and ports. +- Destination IP ranges and ASNs. +- Protocols and packet sizes. +- Samples of all GRE or IPsec tunnel traffic entering or leaving Cloudflare's network. +- Mitigations applied (such as DDoS and Magic Firewall) to traffic entering Cloudflare. + +Refer below to [Access Magic Tunnel traffic analytics](#access-magic-tunnel-traffic-analytics) to learn how to access these filters. + +## Access Magic Tunnel traffic analytics + +1. Go to the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account. +2. Select **Analytics & Logs** > **Network Analytics**. +3. In the **All Traffic** tab, scroll to **Top Insights** to access network traffic filters. By default, the dashboard shows five items, but you can display up to 25 items at once. Select the drop-down menu to make your change. +4. (Optional) Hover your mouse over one of the types of traffic. You can then choose to filter for that type of traffic, or exclude it from the results. +5. You can also apply filters to adjust the scope of information displayed. Scroll to **All traffic** > **Add filter**. +6. In the **New filter** popover, choose what type of data you want to display from the left dropdown menu, an operator from the middle dropdown menu, and an action from the right dropdown menu. For example: + + ```txt + | _equals_ | + ``` + + This lets you examine traffic from specific Source tunnels and/or Destination tunnels. + +## Feature notes + +- For Magic Transit customers, `Non-tunnel traffic` will often represent traffic from the public Internet or traffic via [CNIs](/network-interconnect/). +- For Magic WAN / WAN tunnels customers, `Non-tunnel traffic` refers to traffic outside of GRE or IPsec tunnels. This can include traffic from: + - [WARP](/cloudflare-one/team-and-resources/devices/warp/) + - [CNIs](/network-interconnect/) + - Traffic destined for the public Internet via [Gateway](/cloudflare-one/traffic-policies/) + - Traffic destined for applications behind [Cloudflare Tunnel](/cloudflare-one/networks/connectors/cloudflare-tunnel/) + +The label `Non-Tunnel traffic` is a placeholder, and more specific labels will be applied to this category of traffic in the near future. diff --git a/src/content/partials/networking-services/analytics/network-traffic-filters.mdx b/src/content/partials/networking-services/analytics/network-traffic-filters.mdx deleted file mode 100644 index ac3b44a24c13c6..00000000000000 --- a/src/content/partials/networking-services/analytics/network-traffic-filters.mdx +++ /dev/null @@ -1,47 +0,0 @@ ---- -params: - - magicWord? - - productName? ---- - -import { Markdown, GlossaryTooltip } from "~/components"; - -{ props.magicWord === "Magic Transit" && ( - <> - - - ) -} - -{ (props.magicWord === "Magic WAN" || props.magicWord === "WAN Tunnels") && ( - <> - - - ) -} - -The complete list of filters includes: - -- A list of your top tunnels by traffic volume. -- Traffic source and destination for type of traffic, on-ramps and off-ramps, IP addresses, and ports. -- Destination IP ranges and ASNs. -- Protocols and packet sizes. -- Samples of all GRE or IPsec tunnel traffic entering or leaving Cloudflare's network. -- Mitigations applied (such as DDoS and Magic Firewall) to traffic entering Cloudflare. - -Refer below to [Access Magic Tunnel traffic analytics](#access-magic-tunnel-traffic-analytics) to learn how to access these filters. diff --git a/src/content/partials/networking-services/analytics/overview.mdx b/src/content/partials/networking-services/analytics/overview.mdx index 0429c1067dbdc0..7e081d307136fe 100644 --- a/src/content/partials/networking-services/analytics/overview.mdx +++ b/src/content/partials/networking-services/analytics/overview.mdx @@ -17,13 +17,9 @@ import { AnchorHeading, Markdown } from "~/components"; { (props.magicWord === "Magic WAN" || props.magicWord === "WAN Tunnels") && ( <> - {/* Generate dynamic anchor link: converts product name to lowercase and replaces spaces with hyphens - e.g., "Magic WAN" becomes "#magic-wan-site-analytics", "WAN Tunnels" becomes "#wan-tunnels-site-analytics" */} ) @@ -35,7 +31,7 @@ import { AnchorHeading, Markdown } from "~/components"; { (props.magicWord === "Magic WAN" || props.magicWord === "WAN Tunnels") && ( <> - + +After adding your sites, the {props.networkOverviewPageName} section of the dashboard provides a summary of the connectivity status and traffic analytics for all your sites. This is a great place to start if you receive a Magic WAN alert, need to begin the troubleshooting process, or are performing routine monitoring. {props.networkOverviewPageName} has the following data types available:
- - [Aggregate {props.productName} site health](#site-health) - - [{props.productName} availability status for sites](#no-status-available) - - [{props.productName} site geographic location](#no-location-set) + - [Aggregate Magic WAN site health](#site-health) + - [Magic WAN availability status for sites](#no-status-available) + - [Magic WAN site geographic location](#no-location-set)
-
+
- Site Name - Site Health - Site Tunnel Names @@ -31,12 +30,12 @@ After adding your sites, the {props.networkOverviewPageName} section of the dash - Site Traffic Received
-
+
- Traffic Sent by Tunnel - Traffic Received by Tunnel
-To start using {props.productName} site analytics: +To start using Magic WAN site analytics: { props.magicWord === "WAN Tunnels" ? ( <> @@ -67,7 +66,7 @@ Review the topics below to learn more about the options available to you. ### Network map and traffic overview -The network map section shows all the sites configured with {props.productName}. At a glance, you can check: +The network map section shows all the sites configured with Magic WAN. At a glance, you can check: - How many active sites you have - Location for sites in a map (if you set up their geographic location) @@ -79,7 +78,7 @@ Just below the map, Traffic overview shows a more granular list of your sites an #### Site health -Sites can be healthy or unhealthy, and {props.productName} uses this information to route traffic. Refer to [Set thresholds for site health](#set-thresholds-for-site-health) to learn more about this topic. +Sites can be healthy or unhealthy, and Magic WAN uses this information to route traffic. Refer to [Set thresholds for site health](#set-thresholds-for-site-health) to learn more about this topic. #### No status available @@ -92,7 +91,7 @@ The dashboard shows you the number of sites with no location set, meaning sites ### Traffic overview -Traffic overview aggregates all {props.productName} sites configured in your account. Here, you can check at-a-glance information about each site like: +Traffic overview aggregates all Magic WAN sites configured in your account. Here, you can check at-a-glance information about each site like: - Site status - Traffic sent and received diff --git a/src/content/partials/networking-services/magic-user-role.mdx b/src/content/partials/networking-services/magic-user-role.mdx index ac25c4deb39397..127cc88ece3e20 100644 --- a/src/content/partials/networking-services/magic-user-role.mdx +++ b/src/content/partials/networking-services/magic-user-role.mdx @@ -1,11 +1,10 @@ --- -params: - - magicWord? +{} --- import { DashButton } from "~/components"; -You can determine which users have, or do not have, configuration edit access for {props.magicWord === "WAN Tunnels" ? "WAN Tunnels" : "Magic products, including Magic Transit, Magic WAN, and Magic Firewall"}. +You can determine which users have, or do not have, configuration edit access for Magic products, including Magic Transit, Magic WAN, and Magic Firewall. For example, if you have multiple Cloudflare products managed by different teams on the same account, you may want to provide select users with edit access and other users with read-only access. diff --git a/src/content/partials/networking-services/magic-wan/analytics/network-analytics.mdx b/src/content/partials/networking-services/magic-wan/analytics/network-analytics.mdx deleted file mode 100644 index 5cb9580678da22..00000000000000 --- a/src/content/partials/networking-services/magic-wan/analytics/network-analytics.mdx +++ /dev/null @@ -1,31 +0,0 @@ ---- -params: - - productName ---- - -import { GlossaryTooltip, Render } from "~/components" - -{props.productName} customers can view their real-time and historical network data in Network Analytics. Customers can see their network data in a time series that shows {props.productName} traffic (in packets or bytes) over time, and can filter the time series data by different types of [packet](https://www.cloudflare.com/learning/network-layer/what-is-a-packet/) characteristics. - - - -Refer to [Network Analytics](/analytics/network-analytics/) documentation to learn more. - -## Network traffic data filters - -{/* Pass both magicWord and productName to network-traffic-filters partial: - - magicWord: Used for conditional rendering (checks if === "Magic WAN" or "WAN Tunnels") - - productName: Used in text content for product name display - Both are passed to ensure the partial works correctly for all products */} - - -## Access Magic Tunnel traffic analytics - - diff --git a/src/content/partials/networking-services/magic-wan/custom-ike-id-ipsec.mdx b/src/content/partials/networking-services/magic-wan/custom-ike-id-ipsec.mdx index 2201c679cbcf32..a4483b298ba240 100644 --- a/src/content/partials/networking-services/magic-wan/custom-ike-id-ipsec.mdx +++ b/src/content/partials/networking-services/magic-wan/custom-ike-id-ipsec.mdx @@ -1,11 +1,10 @@ --- -params: - - productName +{} --- import { CURL } from "~/components"; -{props.productName} customers can configure a custom IKE ID for their IPsec tunnels. Customers that are using {props.productName} and a VeloCloud SD-WAN device together should utilize this option to create a high availability configuration. +Magic WAN customers can configure a custom IKE ID for their IPsec tunnels. Customers that are using Magic WAN and a VeloCloud SD-WAN device together should utilize this option to create a high availability configuration. :::note This feature is only available via API. There are no configuration options for a custom IKE ID for an IPsec tunnel in the Cloudflare dashboard. @@ -13,7 +12,7 @@ This feature is only available via API. There are no configuration options for a VeloCloud has a high availability mechanism that allows customers to specify one set of IKE parameters (like IKE ID) and multiple remote IPs. Customers create an IKE ID, and then assign the same custom IKE ID to their primary IPsec tunnel and their backup IPsec tunnel. FQDN is the only supported type for custom IKE IDs. -{props.productName} customers can set a custom IKE ID for an IPsec tunnel using the following API call. Customers will need to fill in the appropriate values for ``, ``, and the FQDN wildcard before running the API call. +Magic WAN customers can set a custom IKE ID for an IPsec tunnel using the following API call. Customers will need to fill in the appropriate values for ``, ``, and the FQDN wildcard before running the API call. {props.productNameConnector}, a lightweight software package you can install in corporate network locations to automatically connect, steer, and shape any IP traffic. @@ -25,8 +26,7 @@ Additional compatible on-ramps include:
  • Magic Cloud Networking: Automatically create on-ramps from your cloud networks to Magic WAN.
  • -
  • - Network on-ramp partnerships: Refer to our third-party integration tutorials for guidance on configuring the most asked for third-party products. -
  • )} + +- Network on-ramp partnerships: Refer to our third-party integration tutorials for guidance on configuring the most asked for third-party products. \ No newline at end of file diff --git a/src/content/partials/networking-services/magic-wan/reference/bandwidth-measurement.mdx b/src/content/partials/networking-services/magic-wan/reference/bandwidth-measurement.mdx index c8d81a90ad57fd..5019aa395532ed 100644 --- a/src/content/partials/networking-services/magic-wan/reference/bandwidth-measurement.mdx +++ b/src/content/partials/networking-services/magic-wan/reference/bandwidth-measurement.mdx @@ -1,12 +1,10 @@ --- params: - - productName - cloudflareTunnelURL - - warpURL --- -Cloudflare measures {props.productName} usage based on the 95th percentile of bandwidth utilized by the customer's configured network. +Cloudflare measures Magic WAN usage based on the 95th percentile of bandwidth utilized by the customer's configured network. -Configured {props.productName} network's bandwidth refers to the sum of traffic routed in and out of Magic WAN network namespace by measuring and summing each active customer's configured [GRE](https://www.cloudflare.com/learning/network-layer/what-is-gre-tunneling/), [IPSEC](https://www.cloudflare.com/learning/network-layer/what-is-ipsec/), Cloudflare Tunnel and [Cloudflare Network Interconnect](/network-interconnect/) tunnel's highest P95th percentile (ingress or egress traffic). The usage measurement excludes WARP traffic. +Configured Magic WAN network's bandwidth refers to the sum of traffic routed in and out of Magic WAN network namespace by measuring and summing each active customer's configured [GRE](https://www.cloudflare.com/learning/network-layer/what-is-gre-tunneling/), [IPSEC](https://www.cloudflare.com/learning/network-layer/what-is-ipsec/), Cloudflare Tunnel and [Cloudflare Network Interconnect](/network-interconnect/) tunnel's highest P95th percentile (ingress or egress traffic). The usage measurement excludes [WARP](/cloudflare-one/team-and-resources/devices/warp/) traffic. To measure 95th percentile bandwidth at each tunnel, Cloudflare records bandwidth incoming and leaving our global network at five minute intervals, sorts these measurements in descending order, and discards the top 5% of recorded measurements. The highest remaining value constitutes the 95th percentile bandwidth measurement for that time period. diff --git a/src/content/partials/networking-services/magic-wan/reference/device-compatibility.mdx b/src/content/partials/networking-services/magic-wan/reference/device-compatibility.mdx index b329ab405a0144..0c446249360345 100644 --- a/src/content/partials/networking-services/magic-wan/reference/device-compatibility.mdx +++ b/src/content/partials/networking-services/magic-wan/reference/device-compatibility.mdx @@ -1,6 +1,5 @@ --- params: - - productName - supportedConfigurationParametersUrl - arubaEdgeconnectUrl - ciscoIosXeUrl @@ -23,7 +22,7 @@ params: import { GlossaryTooltip } from "~/components" -{props.productName} is compatible with any device that supports IPsec with the supported configuration parameters or supports GRE. +Magic WAN is compatible with any device that supports IPsec with the supported configuration parameters or supports GRE. The matrix below includes example devices and links to the integration guides. diff --git a/src/content/partials/networking-services/magic-wan/security-filters.mdx b/src/content/partials/networking-services/magic-wan/security-filters.mdx index d70975d0f2d16f..eda81fae04e221 100644 --- a/src/content/partials/networking-services/magic-wan/security-filters.mdx +++ b/src/content/partials/networking-services/magic-wan/security-filters.mdx @@ -1,14 +1,10 @@ --- params: - - productNameWAN - - magicFirewallPlansURL - - productNameFirewall - - magicFirewallURL - gatewayURL --- -{props.productNameWAN} customers have automatic access to Magic Firewall. {props.productNameFirewall} is Cloudflare's firewall-as-a-service solution that allows you to protect your infrastructure. {props.productNameFirewall} supports layers three and four of the [OSI model](https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/), and enables you to allow or block traffic on a variety of packet characteristics. +Magic WAN customers have automatic access to Magic Firewall. Magic Firewall is Cloudflare's firewall-as-a-service solution that allows you to protect your infrastructure. Magic Firewall supports layers three and four of the [OSI model](https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/), and enables you to allow or block traffic on a variety of packet characteristics. -Refer to {props.productNameFirewall} for more information about this product. +Refer to Magic Firewall for more information about this product. -As a {props.productNameWAN} customer, you can also use Cloudflare Gateway to set up policies to inspect network and HTTP traffic to the Internet or your private network infrastructure. Refer to Connect to Cloudflare Gateway with Magic WAN to learn how to filter {props.productNameWAN} traffic with Gateway policies. \ No newline at end of file +As a Magic WAN customer, you can also use Cloudflare Gateway to set up policies to inspect network and HTTP traffic to the Internet or your private network infrastructure. Refer to Connect to Cloudflare Gateway with Magic WAN to learn how to filter Magic WAN traffic with Gateway policies. \ No newline at end of file diff --git a/src/content/partials/networking-services/magic-wan/zero-trust/gateway.mdx b/src/content/partials/networking-services/magic-wan/zero-trust/gateway.mdx index 7671f3f7b05ac0..1735a4b483eb05 100644 --- a/src/content/partials/networking-services/magic-wan/zero-trust/gateway.mdx +++ b/src/content/partials/networking-services/magic-wan/zero-trust/gateway.mdx @@ -1,21 +1,17 @@ --- params: - gatewayURL - - magicFirewallName - - magicFirewallURL - warpURL - cfAutoCertificatesURL - cfManualCertificatesURL - decryptTlsURL - doNotInspectURL - - magicWANName - warpChecksURL - osVersionChecks - mwanOnrampsURL - gatewayResolverPoliciesURL - gatewayInternalDnsURL - egressPoliciesURL - - cloudflareTunnelURL - gatewayLogsURL - tcpMssClampingURL - ikeURL @@ -27,13 +23,13 @@ import { Render } from "~/components"; Cloudflare Gateway, our comprehensive Secure Web Gateway, allows you to set up policies to inspect DNS, network, HTTP, and egress traffic. -You can apply network and HTTP Gateway policies alongside {props.magicFirewallName} policies (for L3/4 traffic filtering) to Internet-bound traffic or private traffic entering the Cloudflare network via {props.magicWANName}. Additionally, you can configure Gateway to [resolve DNS queries](#dns-filtering) from {props.magicWANName}. +You can apply network and HTTP Gateway policies alongside Magic Firewall policies (for L3/4 traffic filtering) to Internet-bound traffic or private traffic entering the Cloudflare network via Magic WAN. Additionally, you can configure Gateway to [resolve DNS queries](#dns-filtering) from Magic WAN. ## HTTPS filtering In order to inspect HTTPS traffic, you need to install a Cloudflare root certificate on each client device. You can use the WARP client to automatically install a Cloudflare certificate on supported devices. If your device or application does not support certificate installation via WARP, you can manually install a certificate. A certificate is required for Cloudflare to decrypt TLS. -If you cannot or do not want to install the certificate, you can create Do Not Inspect policies to exempt incompatible {props.magicWANName} traffic from inspection or to disable TLS decryption entirely. Because Gateway cannot discern {props.magicWANName} traffic, you must use WARP client checks or the IP addresses associated with {props.magicWANName} to match traffic with Gateway policies. For example, if your organization onboards devices to {props.magicWANName} via WARP, you can exempt devices not running WARP using OS version checks: +If you cannot or do not want to install the certificate, you can create Do Not Inspect policies to exempt incompatible Magic WAN traffic from inspection or to disable TLS decryption entirely. Because Gateway cannot discern Magic WAN traffic, you must use WARP client checks or the IP addresses associated with Magic WAN to match traffic with Gateway policies. For example, if your organization onboards devices to Magic WAN via WARP, you can exempt devices not running WARP using OS version checks: | Selector | Operator | Value | Logic | Action | | ---------------------------- | -------- | -------------------- | ----- | -------------- | @@ -43,7 +39,7 @@ If you cannot or do not want to install the certificate, you can create on-ramp other than WARP, you can exempt devices from inspection using the IP addresses for your Magic IPsec tunnels: +If your organization onboards users to Magic WAN via an on-ramp other than WARP, you can exempt devices from inspection using the IP addresses for your Magic IPsec tunnels: | Selector | Operator | Value | Action | | --------- | -------- | ---------------- | -------------- | @@ -51,7 +47,7 @@ If your organization onboards users to {props.magicWANName} via an resolver policies for queries intended for internal DNS records. +You can configure the DNS resolver for your Magic WAN networks to the shared IP addresses for the Gateway DNS resolver. The Gateway DNS resolver IPs are `172.64.36.1` and `172.64.36.2`. When you resolve DNS queries from Magic WAN through Gateway, Gateway will log the queries with the private source IP. You can use the private source IP to create resolver policies for queries intended for internal DNS records.
     	{`
    @@ -65,7 +61,7 @@ flowchart LR
         ResolverPolicies -- Retain and use
    Source Internal IP --> InternalDNS CloudflareGatewayDNSResolver --
    --> ResolverPolicies WarpConnector["WARP Connector"] -- DHCP/DNS resolver --> IPSecTunnel["IPsec tunnel"] - MagicWAN[${props.magicWANName}] -- DHCP/DNS resolver --> IPSecTunnel + MagicWAN[$Magic WAN] -- DHCP/DNS resolver --> IPSecTunnel IPSecTunnel -- Shared IP endpoints --> CloudflareGatewayDNSResolver ResolverPolicies@{ shape: proc} WarpConnector@{ shape: in-out} @@ -75,20 +71,20 @@ flowchart LR ## Outbound Internet traffic -By default, the following traffic routed through {props.magicWANName} tunnels and destined to public IP addresses is proxied/filtered through Cloudflare Gateway: +By default, the following traffic routed through Magic WAN tunnels and destined to public IP addresses is proxied/filtered through Cloudflare Gateway: - TCP, UDP, and ICMP traffic sourced from [RFC 1918](https://datatracker.ietf.org/doc/html/rfc1918) IPs or WARP devices. - TCP and UDP traffic sourced from [BYO](/byoip/) or [Leased IPs](/magic-transit/cloudflare-ips/) and destined to a well-known port (`0`-`1023`). -Traffic destined to public IPs will be routed over the public Internet, unless explicitly specified otherwise. If you want to configure specific public IP ranges to be routed through your {props.magicWANName} tunnels instead of over the public Internet after filtering, contact your account team. +Traffic destined to public IPs will be routed over the public Internet, unless explicitly specified otherwise. If you want to configure specific public IP ranges to be routed through your Magic WAN tunnels instead of over the public Internet after filtering, contact your account team. This traffic will egress from Cloudflare according to the egress policies you define in Cloudflare Gateway. By default, it will egress from a shared Cloudflare public IP range. ## Private traffic -By default, TCP, UDP, and ICMP traffic routed through {props.magicWANName} tunnels and destined to routes behind Cloudflare Tunnel will be proxied/filtered through Cloudflare Gateway. +By default, TCP, UDP, and ICMP traffic routed through Magic WAN tunnels and destined to routes behind Cloudflare Tunnel will be proxied/filtered through Cloudflare Gateway. -Contact your account team to enable Gateway filtering for traffic destined to routes behind {props.magicWANName} tunnels. +Contact your account team to enable Gateway filtering for traffic destined to routes behind Magic WAN tunnels. If enabled, by default TCP/UDP traffic meeting **all** the following criteria will be proxied/filtered by Cloudflare Gateway: @@ -108,20 +104,18 @@ Source ports are hard-coded to `1024`-`65535` and may not be overridden. file="traceroute" product="networking-services" params={{ - productName: props.magicWANName, greIpsecURL: props.greIpsecURL, warpURL: props.warpURL, - cloudflareTunnelURL: props.cloudflareTunnelURL, tracerouteURL: props.tracerouteURL }} /> ## Test Gateway integration -To check if Gateway is working properly with your {props.magicWANName} connection, open a browser from a host behind your customer premise equipment, and browse to `https://ifconfig.me`. +To check if Gateway is working properly with your Magic WAN connection, open a browser from a host behind your customer premise equipment, and browse to `https://ifconfig.me`. If you are still in the process of testing Gateway, and Cloudflare is not your default route, configure a policy-based route on your router to send traffic to Cloudflare Gateway first, before browsing to `https://ifconfig.me`. -Confirm there is an entry for the test in HTTP Gateway Activity Logs. The destination IP address should be the public IP address of `ifconfig.me`, and the source IP address should be the private (WAN) address of the host with the browser. Your outbound connection should be sourced from a {props.magicWANName} IP address, and not any public IP address that Cloudflare might be advertising on your behalf. This is true as well when using [Magic Transit With Egress Option](/reference-architecture/architectures/magic-transit/#magic-transit-with-egress-option-enabled). +Confirm there is an entry for the test in HTTP Gateway Activity Logs. The destination IP address should be the public IP address of `ifconfig.me`, and the source IP address should be the private (WAN) address of the host with the browser. Your outbound connection should be sourced from a Magic WAN IP address, and not any public IP address that Cloudflare might be advertising on your behalf. This is true as well when using [Magic Transit With Egress Option](/reference-architecture/architectures/magic-transit/#magic-transit-with-egress-option-enabled). Additionally, test both `http://ifconfig.me` (non-TLS) and `https://ifconfig.me` (TLS) to ensure that your TCP maximum segment size (MSS Clamping) has been set properly. If the response to the HTTPS query hangs or fails, but HTTP works, it is possible that the MSS value is too high or not set. Reduce this value on your customer premise equipment to match the overhead introduced by your IKE and [ESP](https://en.wikipedia.org/wiki/IPsec#Encapsulating_Security_Payload) settings. diff --git a/src/content/partials/networking-services/magic-wan/zero-trust/overview.mdx b/src/content/partials/networking-services/magic-wan/zero-trust/overview.mdx index dcbc78cca11e6f..9029331c30f981 100644 --- a/src/content/partials/networking-services/magic-wan/zero-trust/overview.mdx +++ b/src/content/partials/networking-services/magic-wan/zero-trust/overview.mdx @@ -1,12 +1,11 @@ --- -params: - - productName + {} --- import { DirectoryListing } from "~/components" -Review the tutorials to learn more about how you can use {props.productName} with the following Cloudflare Zero Trust products. +Review the tutorials to learn more about how you can use Magic WAN with the following Cloudflare One products. -If you want a deep dive into key architecture and functionalities aspects of Cloudflare One, and learn more about {props.productName} and its structure, refer to [Evolving to a SASE architecture with Cloudflare](/reference-architecture/architectures/sase/). \ No newline at end of file +If you want a deep dive into key architecture and functionalities aspects of Cloudflare One, and learn more about Magic WAN and its structure, refer to [Evolving to a SASE architecture with Cloudflare](/reference-architecture/architectures/sase/). \ No newline at end of file diff --git a/src/content/partials/networking-services/magic-wan/zero-trust/tunnel.mdx b/src/content/partials/networking-services/magic-wan/zero-trust/tunnel.mdx index a7dd93ad8ca43e..f44e0b7499dc32 100644 --- a/src/content/partials/networking-services/magic-wan/zero-trust/tunnel.mdx +++ b/src/content/partials/networking-services/magic-wan/zero-trust/tunnel.mdx @@ -1,45 +1,39 @@ --- params: - - productName - - tunnelURL - gatewayURL - - privateRoutesURL - greIpsecURL - warpURL - - cloudflareTunnelURL - tracerouteURL --- import { Render } from "~/components" -{props.productName} can be used together with Cloudflare Tunnel for easy access between your networks and applications. +Magic WAN can be used together with Cloudflare Tunnel for easy access between your networks and applications. -By default, TCP, UDP, and ICMP traffic routed through {props.productName} tunnels and destined to routes behind Cloudflare Tunnel will be proxied/filtered through Cloudflare Gateway. +By default, TCP, UDP, and ICMP traffic routed through Magic WAN tunnels and destined to routes behind Cloudflare Tunnel will be proxied/filtered through Cloudflare Gateway. ## Cloudflare Tunnel and Magic Networking Route interactions -Private network routes are evaluated together across Cloudflare Tunnel and Magic Networking routing tables. If traffic matches either a Cloudflare Tunnel route (in any virtual network) or a Magic Networking route, then the matched route will determine the next-hop. +Private network routes are evaluated together across Cloudflare Tunnel and Magic Networking routing tables. If traffic matches either a Cloudflare Tunnel route (in any virtual network) or a Magic Networking route, then the matched route will determine the next-hop. To design solutions where a destination IP may match both a Cloudflare Tunnel private network route and a Magic Networking route, consult your solutions engineer for guidance. ## Test `cloudflared` tunnel integration -To check if a `cloudflared` tunnel is working properly with your {props.productName} connection, open a browser from a host behind your customer premise equipment, and browse to the `cloudflared` tunnel endpoint. +To check if a `cloudflared` tunnel is working properly with your Magic WAN connection, open a browser from a host behind your customer premise equipment, and browse to the `cloudflared` tunnel endpoint. -For example, imagine you have a Cloudflare Tunnel set up with a private network CIDR of `10.1.2.3/32`, a static route defined in {props.productName} for `10.1.2.3/24`, and the device you are trying to connect to is a web server. You can test connectivity to the web server by using a browser to load `https://10.1.2.3`. If the page loads correctly, your Cloudflare Tunnel is working properly. In this scenario, you have overlapping routes defined for Cloudflare Tunnel and {props.productName}. +For example, imagine you have a Cloudflare Tunnel set up with a private network CIDR of `10.1.2.3/32`, a static route defined in Magic WAN for `10.1.2.3/24`, and the device you are trying to connect to is a web server. You can test connectivity to the web server by using a browser to load `https://10.1.2.3`. If the page loads correctly, your Cloudflare Tunnel is working properly. In this scenario, you have overlapping routes defined for Cloudflare Tunnel and Magic WAN. -As mentioned above, if you have overlapping routes in your {props.productName} and Cloudflare Tunnel routing configurations, Cloudflare Tunnel will take precedence. This happens whenever a `cloudflared` tunnel CIDR matches a packet, regardless of prefix length. For example, a `cloudflared` tunnel with prefix `10.1.2.0/24` will take precedence over a static route configured to `10.1.2.4/32`, sending packets over a GRE tunnel. +As mentioned above, if you have overlapping routes in your Magic WAN and Cloudflare Tunnel routing configurations, Cloudflare Tunnel will take precedence. This happens whenever a `cloudflared` tunnel CIDR matches a packet, regardless of prefix length. For example, a `cloudflared` tunnel with prefix `10.1.2.0/24` will take precedence over a static route configured to `10.1.2.4/32`, sending packets over a GRE tunnel. -For more information, refer to Connect private networks. +For more information, refer to Connect private networks. diff --git a/src/content/partials/networking-services/magic-wan/zero-trust/warp.mdx b/src/content/partials/networking-services/magic-wan/zero-trust/warp.mdx index d197879c8dc34d..69df3d691e5f65 100644 --- a/src/content/partials/networking-services/magic-wan/zero-trust/warp.mdx +++ b/src/content/partials/networking-services/magic-wan/zero-trust/warp.mdx @@ -1,10 +1,7 @@ --- params: - - productName - warpURL - greIpsecURL - - magicFirewallName - - magicFirewallURL - setupZeroTrustAccountURL - ztDashPath - splitTunnelsURL @@ -12,33 +9,32 @@ params: - warpIngressIpURL - mwanConnectorName - domainFallbackURL - - cloudflareTunnelURL - tracerouteURL --- :::note -By default, direct WARP-to-WARP connections are not supported for devices located behind {props.productName} with WARP enabled. This is due to issues caused by double encapsulation and asymmetric routing. +By default, direct WARP-to-WARP connections are not supported for devices located behind Magic WAN with WARP enabled. This is due to issues caused by double encapsulation and asymmetric routing. -When a device is behind {props.productName}, it is recommended to avoid enabling WARP. Instead, access the device using its local LAN IP from remote systems, rather than relying on WARP-to-WARP communication. +When a device is behind Magic WAN, it is recommended to avoid enabling WARP. Instead, access the device using its local LAN IP from remote systems, rather than relying on WARP-to-WARP communication. -If you do want to use WARP on a device behind {props.productName} and connect to its WARP IP (within the `100.96.0.0/12` range), you will need to adjust your WARP profiles. Specifically, exclude the `100.96.0.0/12` subnet from the on-premises WARP profile, and include it in the off-premises profile. +If you do want to use WARP on a device behind Magic WAN and connect to its WARP IP (within the `100.96.0.0/12` range), you will need to adjust your WARP profiles. Specifically, exclude the `100.96.0.0/12` subnet from the on-premises WARP profile, and include it in the off-premises profile. ::: import { GlossaryTooltip, Render } from "~/components"; -Use WARP as an on-ramp to {props.productName} and route traffic from user devices with WARP installed to any network connected with Cloudflare Tunnel or Magic IP-layer tunnels (anycast GRE, IPsec, or [CNI](/network-interconnect/)). Take advantage of the integration between {props.productName} and {props.magicFirewallName} and enforce policies at Cloudflare's global network. +Use WARP as an on-ramp to Magic WAN and route traffic from user devices with WARP installed to any network connected with Cloudflare Tunnel or Magic IP-layer tunnels (anycast GRE, IPsec, or [CNI](/network-interconnect/)). Take advantage of the integration between Magic WAN and Magic Firewall and enforce policies at Cloudflare's global network. ## Prerequisites -Before you can begin using WARP as an on-ramp to {props.productName}, you must set up your Zero Trust account. +Before you can begin using WARP as an on-ramp to Magic WAN, you must set up your Zero Trust account. ## IP ranges -When connecting a WARP device to {props.productName}, you will have virtual IP addresses from WARP, in the `100.96.0.0/12` range. +When connecting a WARP device to Magic WAN, you will have virtual IP addresses from WARP, in the `100.96.0.0/12` range. --- -## Set up WARP with {props.productName} +## Set up WARP with Magic WAN ### 1. Route packets back to WARP devices @@ -75,19 +71,17 @@ You must log out and log back in with at least one WARP device to ensure the con file="traceroute" product="networking-services" params={{ - productName: props.productName, greIpsecURL: props.greIpsecURL, warpURL: props.warpURL, - cloudflareTunnelURL: props.cloudflareTunnelURL, tracerouteURL: props.tracerouteURL }} /> ## Double encapsulation -When a WARP user goes to a location (like an office) with a {props.productName} tunnel already set up, WARP traffic is doubly encapsulated - first by WARP and then by {props.productName}. This is unnecessary, since each on-ramp method provides full Zero Trust protection. +When a WARP user goes to a location (like an office) with a Magic WAN tunnel already set up, WARP traffic is doubly encapsulated - first by WARP and then by Magic WAN. This is unnecessary, since each on-ramp method provides full Zero Trust protection. -Since WARP traffic is already protected on its own, Cloudflare recommends that you set up {props.productName} to exclude WARP traffic, sending it to the Internet through regular connections. +Since WARP traffic is already protected on its own, Cloudflare recommends that you set up Magic WAN to exclude WARP traffic, sending it to the Internet through regular connections. To learn which IP addresses and UDP ports you should exclude to accomplish this, refer to WARP ingress IP. @@ -107,7 +101,7 @@ Before testing, be sure to configure domain fa If WARP integration has been enabled for the account within the last day, log off and on again in the WARP client before testing. -To check if WARP is working correctly as an on-ramp, you can do a resolution test on a [fully qualified domain name (FQDN)](https://en.wikipedia.org/wiki/Fully_qualified_domain_name) for a server or service in the {props.productName}. Test this from a user with a WARP device. +To check if WARP is working correctly as an on-ramp, you can do a resolution test on a [fully qualified domain name (FQDN)](https://en.wikipedia.org/wiki/Fully_qualified_domain_name) for a server or service in the Magic WAN. Test this from a user with a WARP device. For example: diff --git a/src/content/partials/networking-services/mconn/configure-connectors.mdx b/src/content/partials/networking-services/mconn/configure-connectors.mdx index 0fe0c27b9a6ed1..ec2721ee617de9 100644 --- a/src/content/partials/networking-services/mconn/configure-connectors.mdx +++ b/src/content/partials/networking-services/mconn/configure-connectors.mdx @@ -5,6 +5,7 @@ params: - productNameVirtual? - maintenanceURL - dashName + - deviceTypeName - sfpURL? - wan - lan @@ -16,7 +17,6 @@ params: - shippedLanguage - hardSoftConn - hcConfigsURL - - finalInstructions - ipsecTunnelsRefURL - trafficSteeringURL - vlanIdURL @@ -44,6 +44,7 @@ import { DashButton, } from "~/components"; +{/* Virtual Connector */} { props.magicWord === "virtual" && ( <>

    {props.productNameVirtual} is a virtual device alternative to the hardware based {props.productName}. These two versions of {props.productName} are identical otherwise.

    Currently, you can set up {props.productNameVirtual} on VMWare ESXi and Proxmox Virtual Environment. Support for Proxmox is in beta.

    @@ -65,6 +66,7 @@ In this page you will find instructions on how to configure {props.productName}. ) } +{/* Virtual Connector */} { props.magicWord === "virtual" && ( <>

    {props.productNameVirtual} uses a DHCP connection at first boot to download your settings and go through the activation process. However, if you need to use a static IP in your {props.productNameVirtual}, and this is a fresh install:

    @@ -177,6 +180,7 @@ You cannot enable high availability for an existing { props.magicWord === "virtu ) } +{/* Virtual Connector */} { props.magicWord === "virtual" && ( <> @@ -274,7 +278,7 @@ You cannot enable high availability for an existing { props.magicWord === "virtu Contact your account team at Cloudflare to obtain your license keys and the ${props.productNameVirtual} script for Proxmox. The script will set up and configure a Proxmox virtual machine with the appropriate settings for ${props.productNameVirtual}. Refer to [Prerequisites](#prerequisites) for more information on system requirements. - The script can be deployed multiple times to create several instances of a ${props.productNameVirtual}, in different locations or on the same Proxmox host. You will consume one license key for each instance created. For example, if you want to deploy 10 ${props.productNameVirtual}s you should request 10 license keys. + The script can be deployed multiple times to create several instances of a ${props.productNameVirtual}, in different locations or on the same Proxmox host. You will consume one license key for each instance created. For example, if you want to deploy 10 ${props.productNameVirtual}s you should request 10 license keys, and your account team will create 10 ${props.productNameVirtual} instances in your Cloudflare dashboard. **2. Deploy the ${props.productNameVirtual} on Proxmox** @@ -323,13 +327,11 @@ You cannot enable high availability for an existing { props.magicWord === "virtu { props.magicWord === "hardware" && ( <> -

    To set up and use Magic WAN, you first need to register it with your account.

    ) @@ -344,7 +346,7 @@ You cannot enable high availability for an existing { props.magicWord === "virtu
    1. Log in to Cloudflare One, and go to Networks.
    2. Go to Connectors > Appliances.
    3. -
    4. Select Create a new profile.
    5. +
    6. Select Create a profile.
    ) @@ -367,8 +369,8 @@ You cannot enable high availability for an existing { props.magicWord === "virtu 4. In **Name**, enter a descriptive name for your { props.magicWord === "virtual" ? props.productNameVirtual : props.productName }. Optionally, you can also add a description for it. 5. You need to decide if you want to turn on high availability for the { props.magicWord === "virtual" ? props.productNameVirtual : props.productName }. Refer to [About high availability configurations](#about-high-availability-configurations) for more information. 6. Select **Create and continue**. -7. Select **Add { props.magicWord === "virtual" ? props.productNameVirtual : props.productName }**. This will show you a list of devices associated with your account. -8. If you have more than one { props.magicWord === "virtual" ? props.productNameVirtual : props.productName }, choose the one that corresponds to the on-ramp you are creating. { props.magicWord === "virtual" ? props.productNameVirtual : props.productName } devices are identified by a serial number, also known as a service tag. Use this information to choose the right { props.magicWord === "virtual" ? props.productNameVirtual : props.productName }.
    Select **Select { props.magicWord === "virtual" ? props.productNameVirtual : props.productName }** when you are ready to proceed. +7. Select **Add {props.deviceTypeName}**. This will show you a list of devices associated with your account. +8. If you have more than one { props.magicWord === "virtual" ? props.productNameVirtual : props.productName }, choose the one that corresponds to the on-ramp you are creating. { props.magicWord === "virtual" ? props.productNameVirtual : props.productName } devices are identified by a serial number, also known as a service tag. Use this information to choose the right { props.magicWord === "virtual" ? props.productNameVirtual : props.productName }.
    Select **Add Connector** when you are ready to proceed. 9. { props.magicWord === "virtual" ? props.productNameVirtual : props.productName } will be added to your account with an **Interrupt window** defined. The interrupt window is the time period when the { props.magicWord === "virtual" ? props.productNameVirtual : props.productName } software can update, which may result in interruption to existing connections. You can change this later. Refer to Interrupt window for more details on how to define when the { props.magicWord === "virtual" ? props.productNameVirtual : props.productName } can update its systems. 10. Select **Continue** to proceed to creating your WAN and LAN networks. @@ -829,10 +831,10 @@ inline={false} /> 2. After naming your site, select **Turn on high availability**. 3. Select **Create and continue**. -4. Select **Add { props.magicWord === "virtual" ? props.productNameVirtual : props.productName }**. -5. From the list, choose your first { props.magicWord === "virtual" ? props.productNameVirtual : props.productName } > **Add { props.magicWord === "virtual" ? props.productNameVirtual : props.productName }**. -6. Back on the previous screen, select **Add secondary { props.magicWord === "virtual" ? props.productNameVirtual : props.productName }**. -7. From the list, choose your second { props.magicWord === "virtual" ? props.productNameVirtual : props.productName } > **Add { props.magicWord === "virtual" ? props.productNameVirtual : props.productName }**. +4. Select **Add {props.deviceTypeName}**. +5. From the list, choose your first { props.magicWord === "virtual" ? props.productNameVirtual : props.productName } > **Add {props.deviceTypeName}**. +6. Back on the previous screen, select **Add secondary {props.deviceTypeName}**. +7. From the list, choose your second { props.magicWord === "virtual" ? props.productNameVirtual : props.productName } > **Add {props.deviceTypeName}**. 8. Select **Continue** to create a WAN. If you are configuring a static IP, configure the IP for the primary node as the static address, and the IP for the secondary node as the secondary static address. 9. To create a LAN, follow the steps mentioned above in [Create a LAN](#create-a-lan) up until step 4. 10. In **Static address**, enter the IP for the primary node in your site. For example, `192.168.10.1/24`. @@ -840,7 +842,7 @@ inline={false} 12. In **Virtual static address**, enter the IP that the LAN south of the { props.magicWord === "virtual" ? props.productNameVirtual : props.productName } device will forward traffic to. For example, `192.168.10.3/24`. 13. Select **Save**. 14. From the **High availability probing link** drop-down menu, select the port that should be used to monitor the node's health. Cloudflare recommends you choose a reliable interface as the HA probing link. The primary and secondary node's probing link should be connected over a switch, and cannot be a direct connection. -15. +15. {props.magicWord === "hardware" && (<>Follow the instructions in Set up your Magic WAN Connector and Activate appliance to finish setting up your Connectors.)} {props.magicWord === "virtual" && (<>Follow the instructions in Activate appliance to finish setting up your Connectors.)} --- diff --git a/src/content/partials/networking-services/mconn/device-metrics.mdx b/src/content/partials/networking-services/mconn/device-metrics.mdx index 03ec1fa432c1d0..c27bb9834897c3 100644 --- a/src/content/partials/networking-services/mconn/device-metrics.mdx +++ b/src/content/partials/networking-services/mconn/device-metrics.mdx @@ -1,14 +1,13 @@ --- params: - - productName - troubleshootingURL --- -Cloudflare customers can inspect metrics for a specific {props.productName} in the Cloudflare dashboard. These metrics help you troubleshoot potential issues with your {props.productName}. Refer to Troubleshooting for more information. +Cloudflare customers can inspect metrics for a specific Magic WAN Connector in the Cloudflare dashboard. These metrics help you troubleshoot potential issues with your Magic WAN Connector. Refer to Troubleshooting for more information. ## Query metrics with GraphQL -Customers can query Cloudflare's GraphQL API to fetch their {props.productName} device metrics. The Cloudflare dashboard displays {props.productName} device metrics over the past one hour. Via the GraphQL API, customers can query for up to 30 days of historical {props.productName} device metrics. +Customers can query Cloudflare's GraphQL API to fetch their Magic WAN Connector device metrics. The Cloudflare dashboard displays Magic WAN Connector device metrics over the past one hour. Via the GraphQL API, customers can query for up to 30 days of historical Magic WAN Connector device metrics. For example: @@ -72,8 +71,8 @@ query telemetry( ### Average CPU load explained -The metric `average CPU load` is unique and distinctly different from `CPU utilization` which is another common CPU metric. The {props.productName} uses a [Unix-style CPU load calculation](). +The metric `average CPU load` is unique and distinctly different from `CPU utilization` which is another common CPU metric. The Magic WAN Connector uses a [Unix-style CPU load calculation](). -CPU load is a measure of the number of processes that are currently running and that are waiting to be run on the CPU. Cloudflare collects the one minute load average from the device and converts that into a percentage based on the total number of cores in the CPU. If the {props.productName} CPU has eight cores, and a one minute load average of two, then the average CPU load is 25%. If the average CPU load is above 100%, then there are processes in the queue that are waiting to be executed on the CPU. +CPU load is a measure of the number of processes that are currently running and that are waiting to be run on the CPU. Cloudflare collects the one minute load average from the device and converts that into a percentage based on the total number of cores in the CPU. If the Magic WAN Connector CPU has eight cores, and a one minute load average of two, then the average CPU load is 25%. If the average CPU load is above 100%, then there are processes in the queue that are waiting to be executed on the CPU. -Cloudflare is still evaluating the typical CPU load operating range on the {props.productName}. In general, a healthy range for average CPU load on any device is between 30% and 70%. Customers may experience decreased {props.productName} performance if the average CPU load is consistently above 100%. \ No newline at end of file +Cloudflare is still evaluating the typical CPU load operating range on the Magic WAN Connector. In general, a healthy range for average CPU load on any device is between 30% and 70%. Customers may experience decreased Magic WAN Connector performance if the average CPU load is consistently above 100%. \ No newline at end of file diff --git a/src/content/partials/networking-services/mconn/maintenance/activate-connectors.mdx b/src/content/partials/networking-services/mconn/maintenance/activate-connectors.mdx index cfe5a7cd047ddb..8e079af31538da 100644 --- a/src/content/partials/networking-services/mconn/maintenance/activate-connectors.mdx +++ b/src/content/partials/networking-services/mconn/maintenance/activate-connectors.mdx @@ -1,11 +1,10 @@ --- params: - - productName - hardwareConnectorURL - virtualConnectorURL --- -Before you can activate your {props.productName}, you need to follow Cloudflare's instructions regarding DHCP. For full instructions on this, refer to: +Before you can activate your Magic WAN Connector, you need to follow Cloudflare's instructions regarding DHCP. For full instructions on this, refer to: -- The hardware version of {props.productName} -- The virtual version of {props.productName} \ No newline at end of file +- The hardware version of Magic WAN Connector +- The virtual version of Magic WAN Connector \ No newline at end of file diff --git a/src/content/partials/networking-services/mconn/maintenance/add-remove-connectors.mdx b/src/content/partials/networking-services/mconn/maintenance/add-remove-connectors.mdx index a0eb0952dec2f1..3456a26cf5d69a 100644 --- a/src/content/partials/networking-services/mconn/maintenance/add-remove-connectors.mdx +++ b/src/content/partials/networking-services/mconn/maintenance/add-remove-connectors.mdx @@ -1,19 +1,18 @@ --- params: - - productName - dashName --- import { Markdown } from "~/components"; -To add a new {props.productName} you first need to remove the one associated with the on-ramps. You can only have more than one {props.productName} if you initially enabled high availability on your on-ramp. +To add a new Magic WAN Connector you first need to remove the one associated with the on-ramps. You can only have more than one Magic WAN Connector if you initially enabled high availability on your on-ramp. { props.dashName === "WAN Tunnels" ? ( <> Cloudflare One, and go to **Networks**. - 2. Go to **Connectors** > **Appliances**. + 2. Go to **Connectors** > **Appliances** > **Profiles**. `} inline={false} /> @@ -30,7 +29,7 @@ To add a new {props.productName} you first need to remove the one associated wit ) } -3. Find the {props.productName} that you want to edit > select the three dots next to it > **Edit**. -4. In **{props.productName}**, remove the {props.productName} associated with the on-ramp. -5. Select **Add {props.productName}** to add a different {props.productName} to your on-ramp. +3. Find the Magic WAN Connector that you want to edit > select the three dots next to it > **Edit**. +4. In **{props.dashName === "WAN Tunnels" ? "Appliances" : "Connectors"}**, remove the Magic WAN Connector associated with the on-ramp. +5. Select **{props.dashName === "WAN Tunnels" ? "Add appliance" : "Add Connector"}** to add a different Magic WAN Connector to your on-ramp. 6. Select **Save**. \ No newline at end of file diff --git a/src/content/partials/networking-services/mconn/maintenance/deactivate-connector.mdx b/src/content/partials/networking-services/mconn/maintenance/deactivate-connector.mdx index 02223ea28e6ca7..15e843e739451f 100644 --- a/src/content/partials/networking-services/mconn/maintenance/deactivate-connector.mdx +++ b/src/content/partials/networking-services/mconn/maintenance/deactivate-connector.mdx @@ -1,6 +1,5 @@ --- params: - - productName - dashName --- @@ -11,8 +10,8 @@ import { DashButton, Markdown } from '~/components'; Cloudflare One, and go to **Networks**. - 2. Go to **Connectors** > **Appliances** > **Profiles**. - 3. Find the ${props.productName} you want to deactivate, select the three dots next to it > **Edit**. + 2. Go to **Connectors** > **Appliances** > **Appliances**. + 3. Find the Magic WAN Connector you want to deactivate, select the three dots next to it > **Edit**. `} inline={false} /> @@ -28,7 +27,7 @@ import { DashButton, Markdown } from '~/components'; **Edit**. + 3. In the **Magic WAN Connector** tab, find the Magic WAN Connector you want to deactivate, select the three dots next to it > **Edit**. `} inline={false} /> diff --git a/src/content/partials/networking-services/mconn/maintenance/default-password.mdx b/src/content/partials/networking-services/mconn/maintenance/default-password.mdx index 1abf75b6fc17e1..e84624142e3f43 100644 --- a/src/content/partials/networking-services/mconn/maintenance/default-password.mdx +++ b/src/content/partials/networking-services/mconn/maintenance/default-password.mdx @@ -1,18 +1,15 @@ --- -params: - - productName - - hardwareConnectorName - - virtualConnectorName +{} --- -{props.productName} ships to you with a default password that enables you to access the hardware box or the virtual machine. Cloudflare recommends that you change this password after the first boot. +Magic WAN Connector ships to you with a default password that enables you to access the hardware box or the virtual machine. Cloudflare recommends that you change this password after the first boot. -## Default password to access hardware {props.hardwareConnectorName} +## Default password to access hardware Magic WAN Connector -The default password for {props.productName} is the serial number (also known as a Service Tag for Dell devices), all uppercase followed by an `!` (exclamation mark). For example, `A1B2C3D!` +The default password for Magic WAN Connector is the serial number (also known as a Service Tag for Dell devices), all uppercase followed by an `!` (exclamation mark). For example, `A1B2C3D!` -## Default password to access {props.virtualConnectorName} +## Default password to access Virtual Connector -The default password for {props.virtualConnectorName} is the last seven characters of your license key, all uppercase, plus an `!` (exclamation mark). +The default password for Virtual Connector is the last seven characters of your license key, all uppercase, plus an `!` (exclamation mark). For example, if your license key is `mconn-abcdefghijklmnopqrstuvwxyz`, your default password will be `TUVWXYZ!`. \ No newline at end of file diff --git a/src/content/partials/networking-services/mconn/maintenance/edit-basic-info.mdx b/src/content/partials/networking-services/mconn/maintenance/edit-basic-info.mdx index a9a70dabf74534..e00cb3aaba8a83 100644 --- a/src/content/partials/networking-services/mconn/maintenance/edit-basic-info.mdx +++ b/src/content/partials/networking-services/mconn/maintenance/edit-basic-info.mdx @@ -1,19 +1,18 @@ --- params: - - productName - dashName --- import { DashButton, Markdown } from "~/components"; -In **Basic information**, you can change the name and description of your {props.productName}. +In **Basic information**, you can change the name and description of your Magic WAN Connector. { props.dashName === "WAN Tunnels" ? ( <> Cloudflare One, and go to **Networks**. - 2. Go to **Connectors** > **Appliances**. + 2. Go to **Connectors** > **Appliances** > **Appliances**. `} inline={false} /> @@ -30,6 +29,6 @@ In **Basic information**, you can change the name and description of your {props ) } -3. Find the {props.productName} that you want to edit > select the three dots next to it > **Edit**. +3. Find the Magic WAN Connector that you want to edit > select the three dots next to it > **Edit**. 4. In **Basic information** make the necessary changes. 5. Select **Save**. \ No newline at end of file diff --git a/src/content/partials/networking-services/mconn/maintenance/edit-network-settings.mdx b/src/content/partials/networking-services/mconn/maintenance/edit-network-settings.mdx index f868a98b1ab588..fbf0b20046567c 100644 --- a/src/content/partials/networking-services/mconn/maintenance/edit-network-settings.mdx +++ b/src/content/partials/networking-services/mconn/maintenance/edit-network-settings.mdx @@ -1,6 +1,5 @@ --- params: - - productName - dashName --- @@ -11,7 +10,7 @@ import { Markdown } from "~/components"; Cloudflare One, and go to **Networks**. - 2. Go to **Connectors** > **Appliances**. + 2. Go to **Connectors** > **Appliances** > **Profiles**. `} inline={false} /> @@ -28,7 +27,7 @@ import { Markdown } from "~/components"; ) } -3. Find the on-ramp that you want to edit > select the three dots next to it > **Edit**. +3. Find the Connector that you want to edit > select the three dots next to it > **Edit**. 4. Go to **Network configuration** > **WAN configuration** or **LAN configuration**. 5. Find the WAN/LAN you want to edit > select the three dots next to it > **Edit**. 6. Make the necessary changes. diff --git a/src/content/partials/networking-services/mconn/maintenance/edit-traffic-steering.mdx b/src/content/partials/networking-services/mconn/maintenance/edit-traffic-steering.mdx index 26c1f2b540d63f..ad4ac18b0a9345 100644 --- a/src/content/partials/networking-services/mconn/maintenance/edit-traffic-steering.mdx +++ b/src/content/partials/networking-services/mconn/maintenance/edit-traffic-steering.mdx @@ -1,6 +1,5 @@ --- params: - - productName - dashName --- @@ -13,7 +12,7 @@ You can only add or remove applications to Breakout traffic and Prioritized traf Cloudflare One, and go to **Networks**. - 2. Go to **Connectors** > **Appliances**. + 2. Go to **Connectors** > **Appliances** > **Profiles**. `} inline={false} /> @@ -30,7 +29,7 @@ You can only add or remove applications to Breakout traffic and Prioritized traf ) } -3. Find the on-ramp that you want to edit > select the three dots next to it > **Edit**. +3. Find the Connector that you want to edit > select the three dots next to it > **Edit**. 4. Go to **Traffic steering** > **Breakout traffic** or **Prioritized traffic**. 5. Select **Add** to add a new application. 6. To delete an application, find the one you want to delete from **Breakout traffic** or **Prioritized traffic** > select the three dots next to it > **Remove**. \ No newline at end of file diff --git a/src/content/partials/networking-services/mconn/maintenance/heartbeat.mdx b/src/content/partials/networking-services/mconn/maintenance/heartbeat.mdx index c93fd178e95970..8dcaaa1e6d7df8 100644 --- a/src/content/partials/networking-services/mconn/maintenance/heartbeat.mdx +++ b/src/content/partials/networking-services/mconn/maintenance/heartbeat.mdx @@ -1,30 +1,29 @@ --- params: - - productName - dashName --- import { DashButton, Markdown } from '~/components'; -{props.productName} communicates periodically with Cloudflare via HTTPS. This is also known as a heartbeat, and lets Cloudflare know that the {props.productName} in question is connected to the Internet and reachable. +Magic WAN Connector communicates periodically with Cloudflare via HTTPS. This is also known as a heartbeat, and lets Cloudflare know that the Magic WAN Connector in question is connected to the Internet and reachable. -The heartbeat calls are made to `api.cloudflare.com`. Each {props.productName} has a heartbeat frequency of 10 seconds, independently of the number of WAN interfaces you have running on your device. +The heartbeat calls are made to `api.cloudflare.com`. Each Magic WAN Connector has a heartbeat frequency of 10 seconds, independently of the number of WAN interfaces you have running on your device. -There are three symbols for the heartbeat signal that allow you to quickly check the status of {props.productName}: +There are three symbols for the heartbeat signal that allow you to quickly check the status of Magic WAN Connector: -- **Blue `i`**: {props.productName} is contacting Cloudflare as expected. -- **Yellow triangle**: {props.productName} has not yet connected to Cloudflare. -- **Red triangle**: There is a potential problem with {props.productName}. +- **Blue `i`**: Magic WAN Connector is contacting Cloudflare as expected. +- **Yellow triangle**: Magic WAN Connector has not yet connected to Cloudflare. +- **Red triangle**: There is a potential problem with Magic WAN Connector. -### Access {props.productName}'s heartbeat +### Access Magic WAN Connector's heartbeat { props.dashName === "WAN Tunnels" ? ( <> Cloudflare One, and go to **Networks**. - 2. Go to **Connectors** > **Appliances** > **Profiles**. - 3. Find your ${props.productName}, and place your cursor over the icon on the **Status** column to check the timestamp. The timestamp shows you the last time ${props.productName} successfully contacted Cloudflare. + 2. Go to **Connectors** > **Appliances** > **Appliances**. + 3. Find your Magic WAN Connector, and place your cursor over the icon on the **Status** column to check the timestamp. The timestamp shows you the last time Magic WAN Connector successfully contacted Cloudflare. `} inline={false} /> @@ -40,7 +39,7 @@ There are three symbols for the heartbeat signal that allow you to quickly check diff --git a/src/content/partials/networking-services/mconn/maintenance/interrupt-service-window.mdx b/src/content/partials/networking-services/mconn/maintenance/interrupt-service-window.mdx index bea2656247da67..a36e614c3d54a4 100644 --- a/src/content/partials/networking-services/mconn/maintenance/interrupt-service-window.mdx +++ b/src/content/partials/networking-services/mconn/maintenance/interrupt-service-window.mdx @@ -1,19 +1,18 @@ --- params: - - productName - dashName --- import { DashButton, Markdown } from '~/components'; -The Interrupt window defines when {props.productName} can update its systems. When {props.productName} is updating, this may result in an interruption to existing connections. Set up a time window that minimizes disruption to your sites. +The Interrupt window defines when Magic WAN Connector can update its systems. When Magic WAN Connector is updating, this may result in an interruption to existing connections. Set up a time window that minimizes disruption to your sites. { props.dashName === "WAN Tunnels" ? ( <> Cloudflare One, and go to **Networks** > **Connectors**. - 2. In **Appliances** > **Profiles**, select the ${props.productName} for which you want to set up the update window > **Edit**. + 2. In **Appliances** > **Appliances**, select the Magic WAN Connector for which you want to set up the update window > **Edit**. `} inline={false} /> @@ -29,14 +28,14 @@ The Interrupt window defines when {props.productName} can update its systems. Wh **Edit**. + 2. In the **Magic WAN Connector** tab, select the Magic WAN Connector for which you want to set up the update window > **Edit**. `} inline={false} /> ) } -3. In **Interrupt window**, select the most appropriate time for the {props.productName} to update its systems: - - **Timezone**: Select the time zone for the {props.productName} to update. - - **Start time**: Choose an hour for the {props.productName} to start updating. Cloudflare recommends you choose an hour when there is minimal activity in your network, to avoid potential disruptions. - - **Duration**: Duration indicates the time window during which the {props.productName} is scheduled to update. For example, if you configure your {props.productName} to update at `22:00` and specify a **Duration** of `4 hours`, the {props.productName} will attempt to update within the four-hour period following `22:00`. +3. In **Interrupt window**, select the most appropriate time for the Magic WAN Connector to update its systems: + - **Timezone**: Select the time zone for the Magic WAN Connector to update. + - **Start time**: Choose an hour for the Magic WAN Connector to start updating. Cloudflare recommends you choose an hour when there is minimal activity in your network, to avoid potential disruptions. + - **Duration**: Duration indicates the time window during which the Magic WAN Connector is scheduled to update. For example, if you configure your Magic WAN Connector to update at `22:00` and specify a **Duration** of `4 hours`, the Magic WAN Connector will attempt to update within the four-hour period following `22:00`. diff --git a/src/content/partials/networking-services/mconn/maintenance/register-hardware-appliance.mdx b/src/content/partials/networking-services/mconn/maintenance/register-hardware-appliance.mdx index e536e1ff252e6e..a9ffd86eabb0ed 100644 --- a/src/content/partials/networking-services/mconn/maintenance/register-hardware-appliance.mdx +++ b/src/content/partials/networking-services/mconn/maintenance/register-hardware-appliance.mdx @@ -1,12 +1,11 @@ --- params: - dashName - - productName --- import { DashButton } from "~/components"; -To set up and use the hardware version of {props.productName}, you first need to register it with your account. This is not applicable to Virtual {props.productName}. +To set up and use the hardware version of Magic WAN Connector, you first need to register it with your account. This is not applicable to Virtual Magic WAN Connector. {/* Dashboard steps for WAN Tunnels (Cloudflare One dashboard) */} { props.dashName === "WAN Tunnels" && ( @@ -31,8 +30,8 @@ To set up and use the hardware version of {props.productName}, you first need to ) } -3. In **Appliance details** > **Serial number**, insert the serial number for your device. You can optionally add notes about the {props.productName} you are adding to the dashboard. -4. (Optional) Select **Add** below **Serial number** to add multiple {props.productName}s at once to your account. +3. In **Appliance details** > **Serial number**, insert the serial number for your device. You can optionally add notes about the Magic WAN Connector you are adding to the dashboard. +4. (Optional) Select **Add** below **Serial number** to add multiple Magic WAN Connectors at once to your account. 5. Select **Register appliance**. Your device is now registered with your account. \ No newline at end of file diff --git a/src/content/partials/networking-services/mconn/mconn-reference.mdx b/src/content/partials/networking-services/mconn/mconn-reference.mdx index 33b75082635d54..dd8bed1c85a849 100644 --- a/src/content/partials/networking-services/mconn/mconn-reference.mdx +++ b/src/content/partials/networking-services/mconn/mconn-reference.mdx @@ -1,13 +1,9 @@ --- params: - - productName - dashName - - virtualProductName - gatewayURL - hardConnectorURL - virtualConnectorURL - - configHardProductName - - configVirtualProductName - haSetupURL - ecmpRoutingURL - multipleWansURL @@ -22,41 +18,41 @@ params: import { GlossaryTooltip, Render } from "~/components" -The {props.productName} software is certified for use on the [Dell Networking Virtual Edge Platform](https://www.dell.com/support/home/en-us/product-support/product/dell-emc-networking-vep1445-vep1485/docs). It can be purchased with software pre-installed through our partner network for plug-and-play connectivity to Cloudflare One. +The Magic WAN Connector software is certified for use on the [Dell Networking Virtual Edge Platform](https://www.dell.com/support/home/en-us/product-support/product/dell-emc-networking-vep1445-vep1485/docs). It can be purchased with software pre-installed through our partner network for plug-and-play connectivity to Cloudflare One. ## Security and other information -- Cloudflare ensures the {props.productName} device is secure and is not altered via TPM/Secure boot (does not apply to {props.virtualProductName}). -- Connectivity to the Cloudflare global network is secure and all traffic is encrypted through IPsec tunneling. The {props.productName} uses ESP-in-UDP with GCM-AES-256 encryption. Cloudflare uses a non-IKE keying protocol built into our control plane, secured with TLS. -- The {props.productName} does not support fail open. +- Cloudflare ensures the Magic WAN Connector device is secure and is not altered via TPM/Secure boot (does not apply to Virtual Connector). +- Connectivity to the Cloudflare global network is secure and all traffic is encrypted through IPsec tunneling. The Magic WAN Connector uses ESP-in-UDP with GCM-AES-256 encryption. Cloudflare uses a non-IKE keying protocol built into our control plane, secured with TLS. +- The Magic WAN Connector does not support fail open. - Customers have the ability to layer on additional security features/policies that are enforced at the Cloudflare network. --- ## ICMP traffic -ICMP traffic is routed through the Internet and bypasses Cloudflare Gateway. This enables you to ping resources on the Internet from the {props.productName} directly, which can be useful for debugging. +ICMP traffic is routed through the Internet and bypasses Cloudflare Gateway. This enables you to ping resources on the Internet from the Magic WAN Connector directly, which can be useful for debugging. --- ## VLAN ID -This feature allows you to have multiple [virtual LANs](https://www.cloudflare.com/learning/network-layer/what-is-a-lan/) (VLANs) configured over the same physical port on your {props.productName}. VLAN tagging adds an extra header to [packets](https://www.cloudflare.com/learning/network-layer/what-is-a-packet/) in order to identify which VLAN the packet belongs to and to route it appropriately. This effectively allows you to run multiple networks over the same physical port. +This feature allows you to have multiple [virtual LANs](https://www.cloudflare.com/learning/network-layer/what-is-a-lan/) (VLANs) configured over the same physical port on your Magic WAN Connector. VLAN tagging adds an extra header to [packets](https://www.cloudflare.com/learning/network-layer/what-is-a-packet/) in order to identify which VLAN the packet belongs to and to route it appropriately. This effectively allows you to run multiple networks over the same physical port. -A non-zero value set up for the VLAN ID field in your WAN/LAN is used to handle VLAN-tagged traffic. Cloudflare uses the VLAN ID to handle traffic coming into your {props.productName} device, and applies a VLAN tag with the configured VLAN ID for traffic going out of your {props.productName} through WAN/LAN. +A non-zero value set up for the VLAN ID field in your WAN/LAN is used to handle VLAN-tagged traffic. Cloudflare uses the VLAN ID to handle traffic coming into your Magic WAN Connector device, and applies a VLAN tag with the configured VLAN ID for traffic going out of your Magic WAN Connector through WAN/LAN. -You can setup VLAN IDs both for WAN and LAN. Refer to {props.configHardProductName} or {props.configVirtualProductName} to learn where you can set up VLAN IDs. +You can setup VLAN IDs both for WAN and LAN. Refer to Configure hardware Connector or Configure Virtual Connector to learn where you can set up VLAN IDs. ## High availability configurations ### Terminology -- **Primary/Secondary**: Used to identify the two nodes which are part of a high availability (HA) configuration pair of {props.productName}s. This identity allows the node to identify which configuration is attributed to it — for example, specifying a primary and secondary IP in a LAN configuration. This identity is configured by the user on the Cloudflare dashboard. +- **Primary/Secondary**: Used to identify the two nodes which are part of a high availability (HA) configuration pair of Magic WAN Connectors. This identity allows the node to identify which configuration is attributed to it — for example, specifying a primary and secondary IP in a LAN configuration. This identity is configured by the user on the Cloudflare dashboard. - **Active/Standby**: These are states that the two nodes in a HA pair will dynamically assume based on an election process. Only one node at any time is expected to be active. ### High availability -A site set up in high availability (HA) mode has two {props.productName}s with the same configuration but replicated in two nodes. In case of failure of one {props.productName}, the other {props.productName} becomes the active node, taking over configuration of the LAN gateway IP and allowing traffic to continue without disruption. +A site set up in high availability (HA) mode has two Magic WAN Connectors with the same configuration but replicated in two nodes. In case of failure of one Magic WAN Connector, the other Magic WAN Connector becomes the active node, taking over configuration of the LAN gateway IP and allowing traffic to continue without disruption. ### Active/Standby Election @@ -68,7 +64,7 @@ The HA pair is configured in non-preemptive mode, meaning that once a node becom ### Configuration -The two {props.productName}s of a high availability (HA) pair are part of a single site. You designate the {props.productName} as primary and secondary in the Cloudflare dashboard. +The two Magic WAN Connectors of a high availability (HA) pair are part of a single site. You designate the Magic WAN Connector as primary and secondary in the Cloudflare dashboard. :::note The HA link cannot be connected back-to-back. It has to be connected over a switch. This is because, in a direct connection, if the link is unplugged on one end, the other end also detects a link failure. Since we have configured the system to enter a `FAULT` state when the HA link goes down, the affected node will be unable to function as the active node. @@ -76,7 +72,7 @@ The HA link cannot be connected back-to-back. It has to be connected over a swit ### Failure detection and failover -The {props.productName}'s health can be in one of three states: +The Magic WAN Connector's health can be in one of three states: - **Good** : All health parameters are good - **Degraded** : One of the following is true: @@ -85,9 +81,9 @@ The {props.productName}'s health can be in one of three states: - **Down** : If one of the following is true: - Health of all tunnels is `DOWN` - All LAN interfaces are disconnected - - {props.productName}'s software is not healthy + - Magic WAN Connector's software is not healthy -A failover happens when the active node's health declines to a level lower than that of the standby node. For example, from `GOOD` to `DEGRADED`, or from `DEGRADED` to `DOWN`. In the case of a failover where one {props.productName} is acting as a DHCP server, DHCP leases will be synchronized. +A failover happens when the active node's health declines to a level lower than that of the standby node. For example, from `GOOD` to `DEGRADED`, or from `DEGRADED` to `DOWN`. In the case of a failover where one Magic WAN Connector is acting as a DHCP server, DHCP leases will be synchronized. When a failover occurs, traffic is moved to the new active node. It could take up to 30 seconds for traffic to be fully restored over the new active node. @@ -95,12 +91,12 @@ When a failover occurs, traffic is moved to the new active node. It could take u This is where you add and configure your WAN connections. Each configured WAN will create one IPsec tunnel, unless you have more than one anycast IP configured in your account. - + -When you have multiple WANs you can attribute different priorities to each one. Lower values mean a higher priority. This translates in {props.productName} routing traffic through the higher priority WANs or, more precisely, over the IPsec tunnels established over that interface. On the other hand, if you configure multiple WANs of equal priority, traffic will be distributed over those links through Equal-Cost Multi-Path (ECMP routing). +When you have multiple WANs you can attribute different priorities to each one. Lower values mean a higher priority. This translates in Magic WAN Connector routing traffic through the higher priority WANs or, more precisely, over the IPsec tunnels established over that interface. On the other hand, if you configure multiple WANs of equal priority, traffic will be distributed over those links through Equal-Cost Multi-Path (ECMP routing). -Creating several WAN connections also means {props.productName} can failover between circuits according to their health. +Creating several WAN connections also means Magic WAN Connector can failover between circuits according to their health. ### High-capacity use cases @@ -112,22 +108,22 @@ If you do not have more than one anycast IP configured in your account, and you ### WAN settings -- **Interface number:** When using the hardware version of {props.productName}, this refers to the Ethernet port that you are using for your WAN. If you need a throughput higher than 1 Gbps, you can use one of the SFP+ ports. Refer to SFP+ port information for more information on the hardware supported.
    If you are using {props.virtualProductName}, this needs to correspond to the virtual network interface on the {props.virtualProductName} instance you have set up in your virtual machine. -- **VLAN ID**: Allows you to have multiple virtual WANs configured over the same port on your {props.productName}. Refer to VLAN ID for more information. +- **Interface number:** When using the hardware version of Magic WAN Connector, this refers to the Ethernet port that you are using for your WAN. If you need a throughput higher than 1 Gbps, you can use one of the SFP+ ports. Refer to SFP+ port information for more information on the hardware supported.
    If you are using Virtual Connector, this needs to correspond to the virtual network interface on the Virtual Connector instance you have set up in your virtual machine. +- **VLAN ID**: Allows you to have multiple virtual WANs configured over the same port on your Magic WAN Connector. Refer to VLAN ID for more information. - **Priority**: Assigns a priority to the WAN interface. Lower numbers have higher priority. Refer to Traffic steering to learn more about how Cloudflare calculates priorities. - **Health check rate:** Configures the health check frequency for your WAN. Options are low, mid, and high. Refer to Update tunnel health checks frequency for more information. -- **Addressing:** Configures the {props.productName} to work in a DHCP or static IP environment. +- **Addressing:** Configures the Magic WAN Connector to work in a DHCP or static IP environment. ## LAN settings -- **Interface number:** When using the hardware version of {props.productName}, this refers to the Ethernet port that you are using for your LAN. If you need a throughput higher than 1 Gbps, you can use one of the SFP+ ports. Refer to SFP+ port information for more information on the hardware supported.
    If you are using the {props.virtualProductName}, this needs to correspond to the virtual LAN interface on the {props.virtualProductName} instance you have set up in your virtual machine. -- **VLAN ID**: Allows you to have multiple virtual LANs configured over the same port on your {props.productName}. Refer to VLAN ID for more information. +- **Interface number:** When using the hardware version of Magic WAN Connector, this refers to the Ethernet port that you are using for your LAN. If you need a throughput higher than 1 Gbps, you can use one of the SFP+ ports. Refer to SFP+ port information for more information on the hardware supported.
    If you are using the Virtual Connector, this needs to correspond to the virtual LAN interface on the Virtual Connector instance you have set up in your virtual machine. +- **VLAN ID**: Allows you to have multiple virtual LANs configured over the same port on your Magic WAN Connector. Refer to VLAN ID for more information. - **Static addressing:** Configures the type of IP addressing for your Connector. Depending on your use case, this is where you configure your LAN interface IP address, or enable DHCP server or DHCP relay. Refer to DHCP options to learn more. - **Static NAT prefix**: Enable NAT (network address translation). This is an optional setting. - **Routed subnets:** Configures additional subnets behind a layer 3 router. Refer to Routed subnets for more information. ### Restrict traffic to your premises -Depending on your use case, you can define policies in your {props.productName} to either allow traffic to flow between your LANs without it leaving your local premises or to forward it via the Cloudflare network where you can add additional security features. The default behavior is to drop all LAN-to-LAN traffic. These policies can be created for specific subnets, and link two LANs. +Depending on your use case, you can define policies in your Magic WAN Connector to either allow traffic to flow between your LANs without it leaving your local premises or to forward it via the Cloudflare network where you can add additional security features. The default behavior is to drop all LAN-to-LAN traffic. These policies can be created for specific subnets, and link two LANs. Refer to Network segmentation for more information. \ No newline at end of file diff --git a/src/content/partials/networking-services/mconn/network-options/app-aware-policies/breakout-prioritized.mdx b/src/content/partials/networking-services/mconn/network-options/app-aware-policies/breakout-prioritized.mdx index 87346f78ac0951..1df28683b3e54a 100644 --- a/src/content/partials/networking-services/mconn/network-options/app-aware-policies/breakout-prioritized.mdx +++ b/src/content/partials/networking-services/mconn/network-options/app-aware-policies/breakout-prioritized.mdx @@ -1,7 +1,6 @@ --- params: - magicWord - - productName - featureName - trafficSteeringURL? - whatHappensApp @@ -12,7 +11,7 @@ import { APIRequest, Aside, AnchorHeading, CURL, Markdown, Render, TabItem, Tabs { props.magicWord === "breakout" && ( <> -

    Breakout traffic allows you to define which applications should bypass Cloudflare's security filtering, and go directly to the Internet. It works via DNS requests inspection. This means that if your network is caching DNS requests, Breakout traffic will only take effect after you cache entries expire and your client issues a new DNS request that {props.productName} can detect. This can take several minutes.

    +

    Breakout traffic allows you to define which applications should bypass Cloudflare's security filtering, and go directly to the Internet. It works via DNS requests inspection. This means that if your network is caching DNS requests, Breakout traffic will only take effect after you cache entries expire and your client issues a new DNS request that Magic WAN Connector can detect. This can take several minutes.

    ) @@ -20,7 +19,7 @@ import { APIRequest, Aside, AnchorHeading, CURL, Markdown, Render, TabItem, Tabs { props.magicWord === "prioritized" && ( <> -

    Prioritized traffic allows you to define which applications {props.productName} should process first. Applications not in the list will be queued behind prioritized traffic.

    +

    Prioritized traffic allows you to define which applications Magic WAN Connector should process first. Applications not in the list will be queued behind prioritized traffic.

    Similarly to breakout traffic, prioritized traffic also works via DNS requests inspection.

    @@ -33,7 +32,7 @@ import { APIRequest, Aside, AnchorHeading, CURL, Markdown, Render, TabItem, Tabs {` flowchart LR accTitle: In this example, the applications go directly to the Internet, skipping Cloudflare's security. filtering - a(${props.productName}) --> b(Cloudflare) -->|Filtered traffic|c(Internet) + a(Magic WAN Connector) --> b(Cloudflare) -->|Filtered traffic|c(Internet) a-- Breakout traffic ---d(Application1) & e(Application2) --> c @@ -58,7 +57,7 @@ import { APIRequest, Aside, AnchorHeading, CURL, Markdown, Render, TabItem, Tabs ## Add an application to your account -Before you can add or remove {props.featureName} applications to your {props.productName}, you need to create an account-level list with the applications that you want to configure. Currently, adding to or modifying this list is only possible via API, through the [`managed_app_id`](/api/resources/magic_transit/subresources/apps/methods/create/) endpoint. +Before you can add or remove {props.featureName} applications to your Magic WAN Connector, you need to create an account-level list with the applications that you want to configure. Currently, adding to or modifying this list is only possible via API, through the [`managed_app_id`](/api/resources/magic_transit/subresources/apps/methods/create/) endpoint. To add applications to your account: @@ -87,9 +86,9 @@ Send a `POST` request to add new apps to your account. } ``` -You can now add this new app to the {props.featureName} list in your {props.productName}. +You can now add this new app to the {props.featureName} list in your Magic WAN Connector. -### Add an application to {props.productName} +### Add an application to Magic WAN Connector You need to configure {props.featureName} applications for each of your existing sites, as this is a per-site configuration. @@ -119,9 +118,9 @@ You need to configure {props.featureName} applications for each of your existing } **Edit**. +3. Select the Magic WAN Connector you want to configure > **Edit**. 4. Select **Traffic Steering**. -5. In **${props.featureName}**, select **Assign application traffic**. +5. In **${props.featureName}**, select **${props.dashName === "WAN Tunnels" ? "Create" : "Assign application traffic"}**. 6. Select one or more applications that should bypass Cloudflare filtering from the list. You can also use the search box. `} inline={false} @@ -213,7 +212,7 @@ The traffic for the application you chose ${props.whatHappensApp}. -### Delete an application from {props.productName} +### Delete an application from Magic WAN Connector @@ -243,7 +242,7 @@ The traffic for the application you chose ${props.whatHappensApp}. text={` 3. Select the Connector you want to configure > **Edit**. 4. Select **Traffic Steering**. -5. In **${props.featureName}**, find the application you want to delete > select the **three dots** next to it > **Remove**. +5. In **${props.featureName}**, find the application you want to delete > select the **three dots** next to it > **Remove application traffic**. 6. (Optional) If you have several pages of applications, you can use the search box to quickly find the application you are looking for. `} inline={false} @@ -306,7 +305,7 @@ You need to delete {props.featureName} applications for each of your existing si Cloudflare One dashboard, and go to **Networks**. 2. Go to **Connectors** > **Appliances** > **Profiles**. - 3. Select the ${props.productName} you want to configure> **Edit**. + 3. Select the Magic WAN Connector you want to configure> **Edit**. `} inline={false} /> diff --git a/src/content/partials/networking-services/mconn/network-options/app-aware-policies/overview.mdx b/src/content/partials/networking-services/mconn/network-options/app-aware-policies/overview.mdx index c22ec831c3b213..84c7c63c93f4a0 100644 --- a/src/content/partials/networking-services/mconn/network-options/app-aware-policies/overview.mdx +++ b/src/content/partials/networking-services/mconn/network-options/app-aware-policies/overview.mdx @@ -1,19 +1,18 @@ --- params: - - productName - gatewayPoliciesURL - appTypesGatewayURL --- import { DirectoryListing } from "~/components" -In addition to traffic policies based on network-layer attributes like IP and port ranges, {props.productName} supports the ability to classify traffic based on well-known applications. Application-aware policies provide easier management and more granularity over traffic flows. +In addition to traffic policies based on network-layer attributes like IP and port ranges, Magic WAN Connector supports the ability to classify traffic based on well-known applications. Application-aware policies provide easier management and more granularity over traffic flows. Cloudflare's implementation of application awareness leverages the intelligence of our global network, using the same categorization/classification already shared across security tools like our Secure Web Gateway, so IT and security teams can expect consistent behavior across routing and inspection decisions. For more information, refer to Applications and app types. -{props.productName}'s ability to classify traffic allows you to define which applications should bypass Cloudflare's security filtering, and go directly to the Internet. You can also give some applications a higher priority, and Connector will process them first. This is useful when your network is at capacity, for example. +Magic WAN Connector's ability to classify traffic allows you to define which applications should bypass Cloudflare's security filtering, and go directly to the Internet. You can also give some applications a higher priority, and Connector will process them first. This is useful when your network is at capacity, for example. Refer to the following pages for more information. diff --git a/src/content/partials/networking-services/mconn/network-options/dhcp/dhcp-relay.mdx b/src/content/partials/networking-services/mconn/network-options/dhcp/dhcp-relay.mdx index e5d6bfe5a7022f..4c8a966a1f973e 100644 --- a/src/content/partials/networking-services/mconn/network-options/dhcp/dhcp-relay.mdx +++ b/src/content/partials/networking-services/mconn/network-options/dhcp/dhcp-relay.mdx @@ -1,6 +1,5 @@ --- params: - - productName - dashName - cfTunnelURL - cfVsCoreDashNamingMwanCni @@ -8,13 +7,13 @@ params: import { APIRequest, Markdown, Render, TabItem, Tabs } from "~/components"; -DHCP Relay provides a way for DHCP clients to communicate with DHCP servers that are not available on the same local subnet/broadcast domain. When you enable DHCP Relay, {props.productName} forwards DHCP discover messages to a predefined DHCP server, and routes the responses back to the original device that sent the discover message. +DHCP Relay provides a way for DHCP clients to communicate with DHCP servers that are not available on the same local subnet/broadcast domain. When you enable DHCP Relay, Magic WAN Connector forwards DHCP discover messages to a predefined DHCP server, and routes the responses back to the original device that sent the discover message.
     	{`
     		flowchart LR
     		accTitle: An example of Connector in DHCP Relay mode
    -				a(${props.productName}) <--> b(Cloudflare/Magic WAN) <--> c(DHCP server)
    +				a(Magic WAN Connector) <--> b(Cloudflare/Magic WAN) <--> c(DHCP server)
     
     				subgraph Site A
     				d[LAN 1] <--> a
    @@ -29,7 +28,7 @@ DHCP Relay provides a way for DHCP clients to communicate with DHCP servers that
     	`}
     
    -_The above graph shows {props.productName} sending DHCP discover messages to a DHCP server offsite._ +_The above graph shows Magic WAN Connector sending DHCP discover messages to a DHCP server offsite._ :::caution DHCP relay will not work if your DHCP server is behind a Cloudflare Tunnel. To enable DHCP relay functionality, use either a {props.cfVsCoreDashNamingMwanCni}. @@ -63,7 +62,7 @@ To configure DHCP relay: } **Edit**. +3. Select your Magic WAN Connector > **Edit**. 4. Select **Network Configuration**. 5. In **LAN configuration**, select the LAN where you need to configure DHCP relay. 6. Select **Edit**. diff --git a/src/content/partials/networking-services/mconn/network-options/dhcp/dhcp-server.mdx b/src/content/partials/networking-services/mconn/network-options/dhcp/dhcp-server.mdx index b2adabb36b23f5..84695960f4d8a7 100644 --- a/src/content/partials/networking-services/mconn/network-options/dhcp/dhcp-server.mdx +++ b/src/content/partials/networking-services/mconn/network-options/dhcp/dhcp-server.mdx @@ -1,12 +1,11 @@ --- params: - - productName - dashName --- import { APIRequest, Markdown, Render, TabItem, Tabs, DashButton } from "~/components"; -When you use a static IP address, {props.productName} can also act as a DHCP server in your network. To enable this feature: +When you use a static IP address, Magic WAN Connector can also act as a DHCP server in your network. To enable this feature: @@ -34,7 +33,7 @@ When you use a static IP address, {props.productName} can also act as a DHCP ser } {/* Command needed so list starts on number 3 since steps 1, 2 are inside conditional render */}
      -
    1. Select your {props.productName} you want to configure > Edit.
    2. +
    3. Select your Magic WAN Connector you want to configure > Edit.
    4. Select Network Configuration, and scroll down to LAN configuration.
    5. In LAN configuration, select the LAN where you want to enable DHCP server.
    6. Select Edit.
    7. diff --git a/src/content/partials/networking-services/mconn/network-options/dhcp/dhcp-static-address-reservation.mdx b/src/content/partials/networking-services/mconn/network-options/dhcp/dhcp-static-address-reservation.mdx index 70103e220bb38d..83a67d692e8a83 100644 --- a/src/content/partials/networking-services/mconn/network-options/dhcp/dhcp-static-address-reservation.mdx +++ b/src/content/partials/networking-services/mconn/network-options/dhcp/dhcp-static-address-reservation.mdx @@ -1,16 +1,15 @@ --- params: - - productName - dhcpServerURL --- import { APIRequest, Render, TabItem, Tabs } from "~/components"; -If you configure your {props.productName} to be a DHCP server, you can also assign IP addresses to specific devices on your network. To reserve IP addresses: +If you configure your Magic WAN Connector to be a DHCP server, you can also assign IP addresses to specific devices on your network. To reserve IP addresses: -1. Configure your {props.productName} to be a DHCP server. +1. Configure your Magic WAN Connector to be a DHCP server. 2. Select **Add DHCP Reservation**. 3. In **Hardware Address** enter the [MAC address](https://en.wikipedia.org/wiki/MAC_address) for the device you want a specific IP address for. 4. In **IP Address**, enter the IP address for that device. diff --git a/src/content/partials/networking-services/mconn/network-options/nat-subnet.mdx b/src/content/partials/networking-services/mconn/network-options/nat-subnet.mdx index 251ececaf68585..4e0a05808e9588 100644 --- a/src/content/partials/networking-services/mconn/network-options/nat-subnet.mdx +++ b/src/content/partials/networking-services/mconn/network-options/nat-subnet.mdx @@ -1,28 +1,24 @@ --- params: - - productName - - connectorName - hardConnectorURL - virtualConnectorURL - - configHardProductName - - configVirtualProductName --- -Each subnet (directly-attached or routed) must have a unique address space within your {props.productName}. You can re-use address spaces locally by enabling static network address translation (NAT) for a subnet. NAT is static. This means that inbound connections - from {props.productName} to the site behind the {props.connectorName} - are allowed, and connections do not have to be initiated by hosts behind the {props.connectorName}. NAT is also 1:1, that is, the {props.connectorName} will translate between corresponding addresses in two equal-sized prefixes. +Each subnet (directly-attached or routed) must have a unique address space within your Magic WAN. You can re-use address spaces locally by enabling static network address translation (NAT) for a subnet. NAT is static. This means that inbound connections - from Magic WAN to the site behind the Connector - are allowed, and connections do not have to be initiated by hosts behind the Magic WAN Connector. NAT is also 1:1, that is, the Connector will translate between corresponding addresses in two equal-sized prefixes. -To enable NAT, supply a WAN-facing address prefix the same size as the subnet's prefix, and the {props.connectorName} will translate between the two. +To enable NAT, supply a WAN-facing address prefix the same size as the subnet's prefix, and the Magic WAN Connector will translate between the two. For example: - **Prefix**: `192.168.100.0/24` - **Static NAT prefix**: `10.10.100.0/24` -With the example above, outbound traffic from host `192.168.100.13` in the subnet is translated to `10.10.100.13` in the {props.connectorName} (and vice versa for incoming traffic). +With the example above, outbound traffic from host `192.168.100.13` in the subnet is translated to `10.10.100.13` in the Magic WAN Connector (and vice versa for incoming traffic). :::note -Even if NAT is enabled, the local prefix for a subnet must be unique within its LAN. It can, however, be reused on other LANs or other sites. Overlay-facing prefixes - that is, a subnet's NAT prefix if NAT is enabled, and its local prefix otherwise - must always be unique across your whole {props.productName}. +Even if NAT is enabled, the local prefix for a subnet must be unique within its LAN. It can, however, be reused on other LANs or other sites. Overlay-facing prefixes - that is, a subnet's NAT prefix if NAT is enabled, and its local prefix otherwise - must always be unique across your whole Magic WAN. ::: ## Create NATs for subnets -For more information on how to a create a NAT for a subnets, refer to **Create a LAN**, either in {props.configHardProductName} or in {props.configVirtualProductName}. +For more information on how to a create a NAT for a subnets, refer to **Create a LAN**, either in Configure hardware Connector or in Configure Virtual Connector. diff --git a/src/content/partials/networking-services/mconn/network-options/network-segmentation.mdx b/src/content/partials/networking-services/mconn/network-options/network-segmentation.mdx index 2f5e3cb640805c..bc063096b4e743 100644 --- a/src/content/partials/networking-services/mconn/network-options/network-segmentation.mdx +++ b/src/content/partials/networking-services/mconn/network-options/network-segmentation.mdx @@ -1,23 +1,20 @@ --- params: - - productName - dashName - hardConnectorURL - virtualConnectorURL - - configHardProductName - - configVirtualProductName --- import { APIRequest, Markdown, Render, TabItem, Tabs } from "~/components"; -You can define policies in your {props.productName} to either allow traffic to flow between your LANs without it leaving your local premises or to forward it via the Cloudflare network where you can add additional security features. The default behavior is to drop all LAN-to-LAN traffic. These policies can be created for specific subnets, and link two LANs. +You can define policies in your Magic WAN Connector to either allow traffic to flow between your LANs without it leaving your local premises or to forward it via the Cloudflare network where you can add additional security features. The default behavior is to drop all LAN-to-LAN traffic. These policies can be created for specific subnets, and link two LANs.
       	{`
       		flowchart LR
       		accTitle: In this example, there are LANs where traffic flows between each other, instead of going to Cloudflare first.
      -				a(${props.productName}) <---> b(Internet) <---> c(Cloudflare)
      +				a(Magic WAN Connector) <---> b(Internet) <---> c(Cloudflare)
       
       				subgraph Customer site
       				d[LAN 1] <---> a
      @@ -43,7 +40,7 @@ If you enable LAN to LAN traffic flows, communications can only be initiated fro
       
       Unidirectional communication can be enabled for UDP and ICMP, but it is not available for TCP, as it would break that protocol.
       
      -The following guide assumes you have already created a site and configured your {props.productName}. To learn how to create a site and configure your {props.productName}, refer to {props.configHardProductName} or {props.configVirtualProductName}, depending on the type of {props.productName} you have on your premises.
      +The following guide assumes you have already created a site and configured your Magic WAN Connector. To learn how to create a site and configure your Magic WAN Connector, refer to Configure hardware Connector or Configure Virtual Connector, depending on the type of Magic WAN Connector you have on your premises.
       
       ## Create a policy
       
      @@ -73,22 +70,35 @@ Follow the steps below to create a new LAN policy to segment your network. Only
       	
       )
       }
      -3. Select the {props.productName} you want to configure > **Edit**.
      -4. Go to **Network Configuration**, and scroll down to **LAN configuration**.
      -5. Select **LAN policies** > **Create Policy**.
      -6. In **Policy name**, enter a descriptive name for the policy you are creating.
      -7. From the drop-down menu **Origin (required)**, select your origin LAN.
      -8. Specify a subnet for your first LAN in **Subnets**.
      -9. In **Ports** specify the TCP/UDP ports you want to use. Valid ports range from `1` to `65535`. Zero (`0`) is not a valid port number. Add a comma to separate each of the ports or add a port range. For example, \`2,5,6,9-14\`.
      -10. In **Destination (required)**, select the destination LAN and repeat the above process to configure it.
      -11. In **Protocols**, select the type of traffic you want to allow. You can choose **TCP**, **UDP**, and **ICMP**. You can also select **Any** to choose all types of traffic.
      -12. In **Traffic direction** you can choose between bidirectional traffic (the default) and unidirectional traffic. What you can choose depends on the protocol that you chose for the policy:
      -	1. **Any**: If **Any** is selected and you choose **Unidirectional**, the system will alert you that this will break TCP traffic.
      -	2. **TCP**: You can only select **Bidirectional**.
      -	3. **UDP**: The system defaults to **Bidirectional** but you can choose **Unidirectional**.
      -	4. **ICMP**: The system defaults to **Bidirectional** but you can choose **Unidirectional**.
      -13. In **Traffic path**, select **Forwarded via Cloudflare** if you want traffic to be forwarded to Cloudflare to be processed. If you do not select this option, traffic will flow locally, in your premises without passing through Cloudflare.
      -14. Select **Create policy**.
      +{/* Command needed so list starts on number 3 since steps 1, 2 are inside conditional render */}
      +
        +
      1. Select the Magic WAN Connector you want to configure > Edit.
      2. + { props.dashName === "Magic WAN" && ( +
      3. Go to Network Configuration, and scroll down to LAN configuration.
      4. + ) + } +
      +{/* Command needed so list continues with correct number depending on product */} +
        +
      1. Select LAN policies > {props.dashName === "Magic WAN" ? "Create Policy" : "Create"}.
      2. +
      3. In Policy name, enter a descriptive name for the policy you are creating.
      4. +
      5. From the drop-down menu Origin (required), select your origin LAN.
      6. +
      7. Specify a subnet for your first LAN in Subnets.
      8. +
      9. In Ports specify the TCP/UDP ports you want to use. Valid ports range from 1 to 65535. Zero (0) is not a valid port number. Add a comma to separate each of the ports or add a port range. For example, 2,5,6,9-14.
      10. +
      11. In Destination (required), select the destination LAN and repeat the above process to configure it.
      12. +
      13. In Protocols, select the type of traffic you want to allow. You can choose TCP, UDP, and ICMP. You can also select Any to choose all types of traffic.
      14. +
      15. + In Traffic direction you can choose between bidirectional traffic (the default) and unidirectional traffic. What you can choose depends on the protocol that you chose for the policy: +
          +
        • Any: If Any is selected and you choose Unidirectional, the system will alert you that this will break TCP traffic.
        • +
        • TCP: You can only select Bidirectional.
        • +
        • UDP: The system defaults to Bidirectional but you can choose Unidirectional.
        • +
        • ICMP: The system defaults to Bidirectional but you can choose Unidirectional.
        • +
        +
      16. +
      17. In Traffic path, select Forwarded via Cloudflare if you want traffic to be forwarded to Cloudflare to be processed. If you do not select this option, traffic will flow locally, in your premises without passing through Cloudflare.
      18. +
      19. Select Save.
      20. +
      @@ -217,11 +227,20 @@ The new policy will ensure that traffic between the specified LANs flows locally ) } -3. Select the {props.productName} you want to configure > **Edit**. -4. Go to **Network Configuration**, and scroll down to **LAN configuration**. -5. Select **LAN policies**. -6. Select the policy you need to edit > **Edit**. -7. Make your changes, and select **Update policy**. +{/* Command needed so list starts on number 3 since steps 1, 2 are inside conditional render */} +
        +
      1. Select the Magic WAN Connector you want to configure > Edit.
      2. + { props.dashName === "Magic WAN" && ( +
      3. Go to Network Configuration, and scroll down to LAN configuration.
      4. + ) + } +
      +{/* Command needed so list continues with correct number depending on product */} +
        +
      1. Select LAN policies.
      2. +
      3. Select the policy you need to edit > Edit.
      4. +
      5. Make your changes, and select Update policy.
      6. +
      @@ -322,12 +341,21 @@ Example: ) } -3. Select the {props.productName} you want to configure > **Edit**. -4. Go to **Network Configuration**, and scroll down to **LAN configuration**. -5. Select **LAN policies**. -6. Select the policy you need to edit > **Edit**. -7. Select **Delete**. -8. Select **I understand that deleting a policy is permanent** in the dialog box > **Delete**. +{/* Command needed so list starts on number 3 since steps 1, 2 are inside conditional render */} +
        +
      1. Select the Magic WAN Connector you want to configure > Edit.
      2. + { props.dashName === "Magic WAN" && ( +
      3. Go to Network Configuration, and scroll down to LAN configuration.
      4. + ) + } +
      +{/* Command needed so list continues with correct number depending on product */} +
        +
      1. Select LAN policies.
      2. +
      3. Select the policy you need to edit > Edit.
      4. +
      5. Select Delete.
      6. +
      7. Select I understand that deleting a policy is permanent in the dialog box > Delete.
      8. +
      diff --git a/src/content/partials/networking-services/mconn/network-options/routed-subnets.mdx b/src/content/partials/networking-services/mconn/network-options/routed-subnets.mdx index 5af559004e6b72..e51e090b47c2f9 100644 --- a/src/content/partials/networking-services/mconn/network-options/routed-subnets.mdx +++ b/src/content/partials/networking-services/mconn/network-options/routed-subnets.mdx @@ -1,16 +1,13 @@ --- params: - - productName - netSubnetURL - hardConnectorURL - virtualConnectorURL - - configHardProductName - - configVirtualProductName --- -Each LAN interface (physical port + VLAN tag) on {props.productName} is part of a _directly-attached subnet_. When you specify a static address for the LAN interface, you indicate both the interface's address as well as the subnet it attaches to. For example, `192.168.100.13/24` means the LAN interface has the IP address `192.168.100.13`, and is part of the subnet `192.168.100.0/24`. +Each LAN interface (physical port + VLAN tag) on Magic WAN Connector is part of a _directly-attached subnet_. When you specify a static address for the LAN interface, you indicate both the interface's address as well as the subnet it attaches to. For example, `192.168.100.13/24` means the LAN interface has the IP address `192.168.100.13`, and is part of the subnet `192.168.100.0/24`. -Some LANs are more complex. In addition to the directly-attached subnet, they might have additional subnets sitting behind L3 routers south of the {props.productName}. We call these _routed subnets_. +Some LANs are more complex. In addition to the directly-attached subnet, they might have additional subnets sitting behind L3 routers south of the Magic WAN Connector. We call these _routed subnets_. Refer to the diagram below for an example of how this might work: @@ -26,7 +23,7 @@ Blue represents directly-attached subnets, and red represents routed subnets. a((WAN)) --> b - subgraph b [${props.productName}] + subgraph b [Magic WAN Connector] direction TB c(LAN 1) d(LAN n) @@ -51,11 +48,11 @@ Blue represents directly-attached subnets, and red represents routed subnets. To add a routed subnet to your LAN, you need: -- **A prefix**: The subnet's CIDR prefix; Cloudflare will automatically install static routes to this prefix in our global network (to forward [packets](https://www.cloudflare.com/learning/network-layer/what-is-a-packet/) for this subnet to the right {props.productName}), and in your {props.productName} (to forward packets for this subnet to the right LAN interface). In the figure above, the routed subnet in the center has the prefix `192.168.200.0/24`. -- **A next-hop address**: The address of the L3 router to which the {props.productName} should forward packets for this subnet. In the figure, the routed subnet in the center has the next-hop address `192.168.100.10`. +- **A prefix**: The subnet's CIDR prefix; Cloudflare will automatically install static routes to this prefix in our global network (to forward [packets](https://www.cloudflare.com/learning/network-layer/what-is-a-packet/) for this subnet to the right Magic WAN Connector), and in your Magic WAN Connector (to forward packets for this subnet to the right LAN interface). In the figure above, the routed subnet in the center has the prefix `192.168.200.0/24`. +- **A next-hop address**: The address of the L3 router to which the Magic WAN Connector should forward packets for this subnet. In the figure, the routed subnet in the center has the next-hop address `192.168.100.10`. Optionally, you can also enable NAT for a subnet by providing a static overlay prefix. ## Create routed subnets -For more information on how to create routed subnets, refer to **Create a LAN**, either in either in {props.configHardProductName} or in {props.configVirtualProductName}. +For more information on how to create routed subnets, refer to **Create a LAN**, either in either in Configure hardware Connector or in Configure Virtual Connector. diff --git a/src/content/partials/networking-services/mconn/spf-port-info.mdx b/src/content/partials/networking-services/mconn/spf-port-info.mdx index b172a8cad9256d..0a502bf795ed0c 100644 --- a/src/content/partials/networking-services/mconn/spf-port-info.mdx +++ b/src/content/partials/networking-services/mconn/spf-port-info.mdx @@ -1,13 +1,11 @@ --- -params: - - productName - - productNameVirtual +{} --- -The hardware version of {props.productName} includes two [SFP+ ports](https://en.wikipedia.org/wiki/Small_Form-factor_Pluggable) that support 10G throughput. These ports can be configured as either a WAN or a LAN port, like all of the 1G RJ45 ports in the machine. Because a 10G WAN uplink will often be bottlenecked by IPsec tunnel speeds, the SFP+ ports are most useful for configuring high speed LANs, and for using fiber connections. +The hardware version of Magic WAN Connector includes two [SFP+ ports](https://en.wikipedia.org/wiki/Small_Form-factor_Pluggable) that support 10G throughput. These ports can be configured as either a WAN or a LAN port, like all of the 1G RJ45 ports in the machine. Because a 10G WAN uplink will often be bottlenecked by IPsec tunnel speeds, the SFP+ ports are most useful for configuring high speed LANs, and for using fiber connections. -:::note[{props.productNameVirtual} and SFP+ ports] -Since you decide and set up the hardware where {props.productNameVirtual} runs, you can ignore the information on this page. +:::note[Virtual Connector and SFP+ ports] +Since you decide and set up the hardware where Virtual Connector runs, you can ignore the information on this page. ::: ## Port configuration @@ -23,7 +21,7 @@ _The left port, SFP+ 1, is port 7. The right port, SFP+ 2, is port 8._ ## SFP+ module compatibility -{props.productName} only supports 10Gbps SFP+ modules, including RJ45, DAC, and fiber, among others. Many 1 Gbps modules are incompatible with the Intel driver used internally, and thus are not supported. +Magic WAN Connector only supports 10Gbps SFP+ modules, including RJ45, DAC, and fiber, among others. Many 1 Gbps modules are incompatible with the Intel driver used internally, and thus are not supported. Cloudflare supports the following SFP+ inputs: @@ -40,8 +38,8 @@ Keep in mind that SFP+ modules/cables have to be compatible at both ends, that i ## Recover from unsupported SFP+ inputs -SFP+ modules should be installed and tested prior to deploying {props.productName} into production usage. +SFP+ modules should be installed and tested prior to deploying Magic WAN Connector into production usage. -An unsupported SFP+ input is indicated by the interface failing to come up (that is, the {props.productName} has no status lights), and also by the port (7 or 8) going offline until the hardware is rebooted. +An unsupported SFP+ input is indicated by the interface failing to come up (that is, the Magic WAN Connector has no status lights), and also by the port (7 or 8) going offline until the hardware is rebooted. -When an unsupported module is plugged, the module should be removed and then {props.productName} rebooted by removing power for five seconds. The module should not remain plugged during reboot, or {props.productName} will have to be rebooted again after the module is removed. +When an unsupported module is plugged, the module should be removed and then Magic WAN Connector rebooted by removing power for five seconds. The module should not remain plugged during reboot, or Magic WAN Connector will have to be rebooted again after the module is removed. diff --git a/src/content/partials/networking-services/mconn/troubleshooting/troubleshooting-steps.mdx b/src/content/partials/networking-services/mconn/troubleshooting/troubleshooting-steps.mdx index 2958dacf15c28c..6766cdfc629828 100644 --- a/src/content/partials/networking-services/mconn/troubleshooting/troubleshooting-steps.mdx +++ b/src/content/partials/networking-services/mconn/troubleshooting/troubleshooting-steps.mdx @@ -1,6 +1,5 @@ --- params: - - productName - dashName --- @@ -11,7 +10,8 @@ import { DashButton, Markdown } from "~/components"; Cloudflare One, and go to **Networks** > **Connectors**. - 2. Go to **Appliances** > **Profiles** > **View analytics**. + 2. Go to **Appliances** > **Profiles**. + 3. Select your Connector > **View analytics**. `} inline={false} /> @@ -27,7 +27,8 @@ import { DashButton, Markdown } from "~/components"; **View analytics**. + 2. In the **Magic WAN Connector** tab, select the Magic WAN Connector want to check analytics for. + 3. Select **View analytics**. `} inline={false} /> diff --git a/src/content/partials/networking-services/mconn/troubleshooting/troubleshooting.mdx b/src/content/partials/networking-services/mconn/troubleshooting/troubleshooting.mdx index 6b5d74fec72b15..c04e71cb70961c 100644 --- a/src/content/partials/networking-services/mconn/troubleshooting/troubleshooting.mdx +++ b/src/content/partials/networking-services/mconn/troubleshooting/troubleshooting.mdx @@ -1,6 +1,5 @@ --- params: - - productName - dashName - activateURL - firewallURL @@ -11,20 +10,20 @@ import { Render } from "~/components"; ## Device metrics -Cloudflare customers can inspect metrics for a specific {props.productName} in the Cloudflare dashboard. These metrics help you troubleshoot potential issues with your device. The information spans categories such as: +Cloudflare customers can inspect metrics for a specific Magic WAN Connector in the Cloudflare dashboard. These metrics help you troubleshoot potential issues with your device. The information spans categories such as: - Performance analytics - Port analytics - Event logs - DHCP leasing information -To find the information above and start troubleshooting your {props.productName}: +To find the information above and start troubleshooting your Magic WAN Connector: - + ### Performance analytics -In Performance analytics you can review your {props.productName}'s performance over time including: +In Performance analytics you can review your Magic WAN Connector's performance over time including: - Kernel boot time (how long it has been running and if it is activated or not) - Last device snapshot (this also shows the frequency with which your device captures the snapshots that are used in several troubleshooting procedures) @@ -34,24 +33,24 @@ In Performance analytics you can review your {props.productName}'s performance o To access performance analytics: - -3. Select **Performance analytics**. + +4. Select **Performance analytics**. ### Port analytics -Port analytics gives you access to information related to the packets sent and received through the ports in your {props.productName}. You can adjust the time range for the information displayed in the dashboard regarding to: +Port analytics gives you access to information related to the packets sent and received through the ports in your Magic WAN Connector. You can adjust the time range for the information displayed in the dashboard regarding to: - Rate for packets sent and received - Rate for data sent and received -The dashboard provides this information for all active ports in your {props.productName}. To access port analytics: +The dashboard provides this information for all active ports in your Magic WAN Connector. To access port analytics: - -3. Select **Port analytics**. + +4. Select **Port analytics**. ### Event logs -Use Event logs to identify general patterns and changes over time. This is useful to find correlations with other data and gather deeper insights into your {props.productName}. The following event logs are available: +Use Event logs to identify general patterns and changes over time. This is useful to find correlations with other data and gather deeper insights into your Magic WAN Connector. The following event logs are available: - `Init`: Initialized `mcon-agent` process. This process manages Connector. - `Leave`: Stopped `mcon-agent` process. @@ -72,43 +71,43 @@ Use Event logs to identify general patterns and changes over time. This is usefu To access event logs: - -3. Select **Events**. -4. You can filter results by specific events, and by time. + +4. Select **Events**. +5. You can filter results by specific events, and by time. ### DHCP leasing Refer to the DHCP leasing section to identify DHCP assigned leases and their expiration dates. To access DHCP leasing: - -3. Select **DHCP leasing**. + +4. Select **DHCP leasing**. ## Troubleshooting tips -If you are experiencing difficulties with your {props.productName}, refer to the following tips to troubleshoot what might be happening. +If you are experiencing difficulties with your Magic WAN Connector, refer to the following tips to troubleshoot what might be happening. -## I have set up a site, but my {props.productName} is not working +## I have set up a site, but my Magic WAN Connector is not working -Make sure that you have activated your {props.productName}. Cloudflare ships the {props.productName} deactivated, and the it will only establish a connection to the Cloudflare network when it is activated. +Make sure that you have activated your Magic WAN Connector. Cloudflare ships the Magic WAN Connector deactivated, and the it will only establish a connection to the Cloudflare network when it is activated. -## I have tried to activate {props.productName}, but it is still not working +## I have tried to activate Magic WAN Connector, but it is still not working -Check if your {props.productName} is connected to the Internet via a port that can serve DHCP. This is required the first time a {props.productName} boots up so that it can reach the Cloudflare global network and download the required configurations that you set up in the Site configuration step. Refer to Activate Connector for more details. +Check if your Magic WAN Connector is connected to the Internet via a port that can serve DHCP. This is required the first time a Magic WAN Connector boots up so that it can reach the Cloudflare global network and download the required configurations that you set up in the Site configuration step. Refer to Activate Connector for more details. -If you have a firewall deployed upstream of the {props.productName}, check your firewall settings. You might need to configure your firewall to allow traffic in specific ports for the {props.productName} to work properly. +If you have a firewall deployed upstream of the Magic WAN Connector, check your firewall settings. You might need to configure your firewall to allow traffic in specific ports for the Magic WAN Connector to work properly. -## I can access {props.productName}'s health checks, but there is no traffic +## I can access Magic WAN Connector's health checks, but there is no traffic -If you have a firewall deployed upstream of the {props.productName}, make sure you review your firewall settings. You might need to configure your firewall to allow traffic in specific ports for the {props.productName} to work properly. +If you have a firewall deployed upstream of the Magic WAN Connector, make sure you review your firewall settings. You might need to configure your firewall to allow traffic in specific ports for the Magic WAN Connector to work properly. -## Devices I have behind {props.productName} cannot connect to the Internet +## Devices I have behind Magic WAN Connector cannot connect to the Internet -If you have other routing appliances behind {props.productName}, make sure you create policy-based routing policies to send traffic from your devices through {props.productName}, instead of these other routing devices. +If you have other routing appliances behind Magic WAN Connector, make sure you create policy-based routing policies to send traffic from your devices through Magic WAN Connector, instead of these other routing devices. ## How do I know if my device is contacting Cloudflare? -{props.productName} sends a heartbeat periodically to Cloudflare. You can access the dashboard, and check for the heartbeat status of your Connector device. +Magic WAN Connector sends a heartbeat periodically to Cloudflare. You can access the dashboard, and check for the heartbeat status of your Connector device. -## What do I do in the event of hardware issues with {props.productName}? +## What do I do in the event of hardware issues with Magic WAN Connector? -Cloudflare is the single point of contact for any issues related to {props.productName}, including issues with hardware. When required, Cloudflare Support will work with our partner, TD Synnex, to resolve any issues with the physical device. +Cloudflare is the single point of contact for any issues related to Magic WAN Connector, including issues with hardware. When required, Cloudflare Support will work with our partner, TD Synnex, to resolve any issues with the physical device. diff --git a/src/content/partials/networking-services/routing/configure-routes.mdx b/src/content/partials/networking-services/routing/configure-routes.mdx index 28d92e89260ce4..e8d8a52d0d68a0 100644 --- a/src/content/partials/networking-services/routing/configure-routes.mdx +++ b/src/content/partials/networking-services/routing/configure-routes.mdx @@ -56,7 +56,7 @@ Refer to Traffic Steering for more infor Cloudflare One, and go to **Networks**. - 2. Go to **Routes** > **WAN Routes**, and select **Add a static route** to add a new route. + 2. Go to **Routes** > **WAN Routes**, and select **Create** to add a new route. `} inline={false} /> @@ -174,7 +174,8 @@ Example: <> **WAN Routes**, select the three dots > **Edit** next to the route you want to modify. + 1. In **Routes** > **WAN Routes** find the route you want to modify. + 2. Select the three dots next to it > **Edit**. `} inline={false} /> @@ -187,7 +188,8 @@ Example: <> **Edit** next to the route you want to modify. + 1. In **Routes** find the route you want to modify. + 2. Select the three dots next to it > **Edit**. `} inline={false} /> @@ -195,9 +197,9 @@ Example: ) } -2. Enter the updated route information. -3. (Optional) We highly recommend testing your route before adding it by selecting **Test routes**. -4. Select **Edit routes** to save the new information when you are done. +3. Enter the updated route information. +4. (Optional) We highly recommend testing your route before adding it by selecting **Test routes**. +5. Select **Edit routes** to save the new information when you are done. @@ -276,7 +278,8 @@ Example: <> **WAN Routes**, locate the static route you want to modify, select the three dots > **Delete**. + 1. In **Routes** > **WAN Routes**, locate the static route you want to modify. + 2. Select the three dots next to it > **Delete**. `} inline={false} /> @@ -289,7 +292,8 @@ Example: <> **Delete**. + 1. In **Routes**, locate the static route you want to modify. + 2. Select the three dots next to it > **Delete**. `} inline={false} /> @@ -297,7 +301,7 @@ Example: ) } -2. Confirm the action by selecting the checkbox and select **Delete**. +3. Confirm the action by selecting the checkbox and select **Delete**. @@ -371,7 +375,8 @@ To set this ASN: text={` 1. Log in to Cloudflare One, and go to **Networks**. 2. Go to **Routes** > **WAN configuration**. - 3. In **Account-level virtual network overlay**, select **Edit ASN** and enter your ASN. + 3. In **Border Gateway Protocol (BGP) configuration**, select **Edit** and enter your ASN. + 4. Select **Save**. `} inline={false} /> @@ -393,6 +398,7 @@ To set this ASN: text={` 2. Go to **BGP configuration**. 3. In **CF Account ASN**, enter Cloudflare's ASN. + 4. Select **Update**. `} inline={false} /> @@ -400,8 +406,6 @@ To set this ASN: ) } -4. Select **Update**. - { props.magicWord === "Magic Transit" && ( <> Cloudflare One, and go to **Networks**. 2. Go to **Routes** > **WAN configuration**. - 3. In **Account-level virtual network overlay**, select **Edit ASN** and enter your ASN. - 4. Go to **Networks** > **Interconnects**. + 3. In **Border Gateway Protocol (BGP) configuration**, select **Edit ASN** and enter your ASN. + 4. Go to **Networks** > **Connectors** > **Interconnects**. `} inline={false} /> diff --git a/src/content/partials/networking-services/routing/configure-tunnels.mdx b/src/content/partials/networking-services/routing/configure-tunnels.mdx index 47a416ef30b850..ba06ed886a3034 100644 --- a/src/content/partials/networking-services/routing/configure-tunnels.mdx +++ b/src/content/partials/networking-services/routing/configure-tunnels.mdx @@ -1,13 +1,12 @@ --- params: - - magicWord? + - magicWord - ipRange? - productName - tunnelsAndEncapsulationPagePath - ciphersPagePath - antiReplayPagePath - cniLink - - targetPageName - dashButtonPath? - updateHCFrequencyPage - tunnelHealthChecksPage @@ -86,11 +85,14 @@ Beyond GRE and IPsec tunnels, you can also use Network Interconnect (CNI) to onb {/* Dashboard steps for WAN Tunnels (Cloudflare One dashboard) */} { props.magicWord === "WAN Tunnels" && ( <> -
        -
      1. Log in to Cloudflare One, and go to Networks.
      2. -
      3. Go to Connectors > WAN Tunnels, and select Create a tunnel.
      4. -
      5. On the Add Tunnel page, choose either a GRE tunnel or IPsec tunnel.
      6. -
      + Cloudflare One, and go to **Networks**. + 2. Go to **Connectors** > **WAN Tunnels**, and select **Create**. + 3. On the **Add Tunnel** page, choose either a **GRE tunnel** or **IPsec tunnel**. + `} + inline={false} + /> ) } @@ -98,13 +100,20 @@ Beyond GRE and IPsec tunnels, you can also use Network Interconnect (CNI) to onb {/* Dashboard steps for Magic WAN and Magic Transit (standalone dashboards) */} { props.magicWord !== "WAN Tunnels" && ( <> -
        -
      1. In the Cloudflare dashboard, go to {props.productName}'s {props.targetPageName} page. - -
      2. -
      3. From the Tunnels tab, select Create.
      4. -
      5. On the Add tunnels page, choose either a GRE tunnel or IPsec tunnel.
      6. -
      + + + ) } diff --git a/src/content/partials/networking-services/routing/traceroute.mdx b/src/content/partials/networking-services/routing/traceroute.mdx index c127900d72c408..9fdf246d2b139e 100644 --- a/src/content/partials/networking-services/routing/traceroute.mdx +++ b/src/content/partials/networking-services/routing/traceroute.mdx @@ -1,6 +1,5 @@ --- params: - - productName - greIpsecURL - warpURL - cfTunnelURL @@ -8,7 +7,7 @@ params: import { GlossaryTooltip } from "~/components"; -If you have a {props.productName} client connected through GRE, IPsec, [CNI](/network-interconnect/) or WARP and want to perform a `traceroute` to an endpoint behind a Cloudflare Tunnel, the following settings must be applied for the command to return useful information. +If you have a Magic WAN client connected through GRE, IPsec, [CNI](/network-interconnect/) or WARP and want to perform a `traceroute` to an endpoint behind a Cloudflare Tunnel, the following settings must be applied for the command to return useful information. ## Inherited TTL value diff --git a/src/content/partials/networking-services/sites/sites.mdx b/src/content/partials/networking-services/sites/sites.mdx index def3ca75097d47..728c8048a7f12f 100644 --- a/src/content/partials/networking-services/sites/sites.mdx +++ b/src/content/partials/networking-services/sites/sites.mdx @@ -1,7 +1,6 @@ --- params: - magicWord - - productName - greIpsecTunnelsURL - connectorURL - cniURL @@ -51,7 +50,7 @@ When you are finished setting these up, refer to the steps below to learn how to 6. Choose one or more on-ramps for your site from the list. Remember to only choose the on-ramps available to that particular site, as the list might show on-ramps available on other locations. 7. Select **Continue**. 8. In **Define alert settings** you set up alerts to notify you when there are issues with your site's on-ramps. If you want to set up alerts later, select **Skip this for now** to complete your setup. Otherwise, continue reading. -9. In **{props.productName} Health Check Alert** > **Notification name**, enter a name for the site's alert. +9. In **Magic WAN Health Check Alert** > **Notification name**, enter a name for the site's alert. 10. Under **Alert settings**, choose how you want to be notified when there is an issue. You can add webhooks as well as email addresses. 11. In **Alert sensitivity level** define the threshold for Magic Tunnel health alerts to be fired. Refer to [How Cloudflare calculates Magic Tunnel health alerts](/magic-wan/reference/how-cloudflare-calculates-magic-tunnel-health-alerts/) for more information. 12. Select **Complete setup** to finish setting up your site. @@ -68,7 +67,6 @@ Your site is now set up. If you have other sites you need to set up, repeat the params={{ instructions: "", magicWord: props.magicWord, - productName: props.productName, networkOverviewPageName: props.magicWord === "WAN Tunnels" ? "Network visibility" : "Network overview (beta)", magicTunnelHcsURL: props.magicTunnelHcsURL, setGeoCoordinatesURL: "#set-geographic-coordinates" @@ -144,7 +142,7 @@ If you add geographic coordinates to your site, it will show up in the Network m file="analytics/set-thresholds-site-health" product="networking-services" params={{ - productName: props.productName, + productName: "Magic WAN", magicTunnelHcsURL: props.magicTunnelHcsURL }} /> diff --git a/src/content/partials/networking-services/traceroute.mdx b/src/content/partials/networking-services/traceroute.mdx index 3b00f2cf0cd40f..75561a4edfab8c 100644 --- a/src/content/partials/networking-services/traceroute.mdx +++ b/src/content/partials/networking-services/traceroute.mdx @@ -1,12 +1,10 @@ --- params: - - productName - greIpsecURL - warpURL - - cloudflareTunnelURL - tracerouteURL --- :::note[Run traceroute] -{props.productName} clients connecting through GRE, IPsec, [CNI](/network-interconnect/) or WARP that want to perform a `traceroute` to an endpoint behind a Cloudflare Tunnel will need to change some settings to make the command useful. Refer to Run `traceroute` for more information. +Magic WAN clients connecting through GRE, IPsec, [CNI](/network-interconnect/) or WARP that want to perform a `traceroute` to an endpoint behind a Cloudflare Tunnel will need to change some settings to make the command useful. Refer to Run `traceroute` for more information. ::: diff --git a/src/content/partials/networking-services/tunnel-health/check-tunnel-healthchecks-dash.mdx b/src/content/partials/networking-services/tunnel-health/check-tunnel-healthchecks-dash.mdx index 938b771b36ca56..711baf5e7fcf23 100644 --- a/src/content/partials/networking-services/tunnel-health/check-tunnel-healthchecks-dash.mdx +++ b/src/content/partials/networking-services/tunnel-health/check-tunnel-healthchecks-dash.mdx @@ -29,7 +29,7 @@ Not all data centers will be relevant to you at all times. You can refer to the 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/) and go to **Insights**. 2. Go to **Network visibility** > **WAN connector health**. - 3. In the next screen you can access a list of your tunnels and their current health status. You can also check the amount of health checks passed in the last hour as well as traffic volume for each tunnel. + 3. In this screen screen you can access a list of your tunnels and their current health status. You can also check the amount of health checks passed in the last hour as well as traffic volume for each tunnel. 4. Find the tunnel you wish to inspect, select the three dots in front of the tunnel and select: - **Create alert**: This will send you to the ${props.notificationsPath} so you can create specific alerts for that tunnel, to be warned when specific conditions are met. - **Network Analytics**: This will send you to the Analytics section of the dash, prefiltered with the tunnel you want to inspect. @@ -66,7 +66,7 @@ To check for anycast tunnel health: text={` 1. Log into the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account. 2. Go to **${props.productPath}**. - 3. In the next screen you can access a list of your tunnels and their current health status. You can also check the amount of health checks passed in the last hour as well as traffic volume for each tunnel. + 3. In this screen you can access a list of your tunnels and their current health status. You can also check the amount of health checks passed in the last hour as well as traffic volume for each tunnel. 4. Find the tunnel you wish to inspect, select the three dots in front of the tunnel and select: - **Create alert**: This will send you to the ${props.notificationsPath} so you can create specific alerts for that tunnel, to be warned when specific conditions are met. - **Network Analytics**: This will send you to the Analytics section of the dash, prefiltered with the tunnel you want to inspect. @@ -83,7 +83,7 @@ To check for anycast tunnel health: ## Check tunnel health for a specific tunnel -Beyond having a wide view into all connections, you can drill down into a specific tunnel to check its health status and other information. Refer to the blue note above to learn how to access the new dashboard experience, and: +Beyond having a wide view into all connections, you can drill down into a specific tunnel to check its health status and other information.{props.magicWord !== "WAN Tunnels" && <> Refer to the blue note above to learn how to access the new dashboard experience, and:} 1. Go to **{props.productPath}**. 2. Find and select the tunnel you wish to inspect. diff --git a/src/content/partials/networking-services/tunnel-health/mconn-heartbeat-health.mdx b/src/content/partials/networking-services/tunnel-health/mconn-heartbeat-health.mdx index 095b35ecc5a600..f8e99f55a12e1c 100644 --- a/src/content/partials/networking-services/tunnel-health/mconn-heartbeat-health.mdx +++ b/src/content/partials/networking-services/tunnel-health/mconn-heartbeat-health.mdx @@ -1,9 +1,8 @@ --- params: - - productName - heartbeatURL --- -{props.productName} also includes a heartbeat function, an additional way of communicating its health status which does not depend on successfully setting up any tunnels. The heartbeat function communicates periodically with Cloudflare via HTTPS and lets Cloudflare know that the {props.productName} in question is connected to the Internet and reachable. +Magic WAN Connector also includes a heartbeat function, an additional way of communicating its health status which does not depend on successfully setting up any tunnels. The heartbeat function communicates periodically with Cloudflare via HTTPS and lets Cloudflare know that the Magic WAN Connector in question is connected to the Internet and reachable. Refer to Heartbeat to learn more. \ No newline at end of file