Skip to content

Commit

Permalink
non-ascii chars (#18568)
Browse files Browse the repository at this point in the history
  • Loading branch information
marciocloudflare authored Dec 4, 2024
1 parent c7718b3 commit 6565e1b
Show file tree
Hide file tree
Showing 2 changed files with 19 additions and 19 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -313,11 +313,11 @@ To validate east-west traffic flow, perform a traceroute as shown in the example

The example shows a client in GCP East (`10.3.0.3`), which can ping the private IP of a client in GCP West (`10.30.0.4`).

The traceroute shows the path going from the client (`10.3.0.3`) <br/>
→ to the GCP East lan0 IP on the EdgeConnect (`10.3.0.2`) <br/>
→ to the Cloudflare private GRE endpoint IP (`10.4.8.11`) <br/>
→ to the GCP West lan0 IP on the West EdgeConnect (`10.30.0.3`) <br/>
→ to the GCP West client (`10.30.0.4`).
The traceroute shows the path going from the client (`10.3.0.3`) to:
- the GCP East lan0 IP on the EdgeConnect (`10.3.0.2`)
- the Cloudflare private GRE endpoint IP (`10.4.8.11`)
- the GCP West lan0 IP on the West EdgeConnect (`10.30.0.3`)
- the GCP West client (`10.30.0.4`)

This validates the east-west traffic flow through Cloudflare Magic WAN.

Expand All @@ -343,11 +343,11 @@ To validate east-west traffic flow, perform a traceroute as shown in the example

The example shows a client in GCP Central (`10.22.0.9`), which can ping the private IP of a client in GCP West (`10.77.0.10`).

The traceroute shows the path going from the client (`10.22.0.9`) <br/>
→ to the GCP Central lan0 IP on the EdgeConnect (`10.22.0.2`) <br/>
→ to the Cloudflare private IPsec endpoint IP (`192.168.10.11`) <br/>
→ to the GCP West EdgeConnect private IPsec endpoint IP (`192.168.15.10`) <br/>
→ to the GCP West client (`10.77.0.10`).
The traceroute shows the path going from the client (`10.22.0.9`) to:
- the GCP Central lan0 IP on the EdgeConnect (`10.22.0.2`)
- the Cloudflare private IPsec endpoint IP (`192.168.10.11`)
- the GCP West EdgeConnect private IPsec endpoint IP (`192.168.15.10`)
- the GCP West client (`10.77.0.10`)

This validates the east-west traffic flow through Cloudflare Magic WAN.

Expand Down
18 changes: 9 additions & 9 deletions src/content/docs/magic-wan/reference/device-compatibility.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -18,25 +18,25 @@ The matrix below includes example devices and links to the integration guides.
| Cisco Meraki | Compatibility on roadmap | Compatibility on roadmap |
| [Cisco SD-WAN](/magic-wan/configuration/manually/third-party/viptela/) |||
| [Fortinet](/magic-wan/configuration/manually/third-party/fortinet/)| Specifications compatible[^1] ||
| [Furukawa Electric FITELnet](/magic-wan/configuration/manually/third-party/fitelnet/) | ||
| [Juniper Networks SRX Series Firewalls](/magic-wan/configuration/manually/third-party/juniper/) | ||
| [Furukawa Electric FITELnet](/magic-wan/configuration/manually/third-party/fitelnet/) | - ||
| [Juniper Networks SRX Series Firewalls](/magic-wan/configuration/manually/third-party/juniper/) | - ||
| [Palo Alto Networks Next-Generation Firewall](/magic-wan/configuration/manually/third-party/palo-alto/) |||
| [pfSense](/magic-wan/configuration/manually/third-party/pfsense/)|||
| Prisma SD-WAN (Palo Alto) | Specifications compatible[^1] | Specifications compatible[^1] |
| Riverbed | Specifications compatible[^1] | Specifications compatible[^1] |
| [SonicWall](/magic-wan/configuration/manually/third-party/sonicwall/)| ||
| [SonicWall](/magic-wan/configuration/manually/third-party/sonicwall/)| - ||
| [Sophos Firewall](/magic-wan/configuration/manually/third-party/sophos-firewall/) |||
| [strongSwan](/magic-wan/configuration/manually/third-party/strongswan/) | ||
| [strongSwan](/magic-wan/configuration/manually/third-party/strongswan/) | - ||
| Velocloud | Compatibility on roadmap | Compatibility on roadmap |
| Versa | Specifications compatible[^1] | Compatibility on roadmap |
| [VyOS](/magic-wan/configuration/manually/third-party/vyos/)|||

| VPN | GRE tunnel | IPsec tunnel |
| --- | --- | --- |
| [Alibaba Cloud VPN Gateway](/magic-wan/configuration/manually/third-party/alibaba-cloud/) | ||
| [Amazon AWS Transit Gateway](/magic-wan/configuration/manually/third-party/aws/) | ||
| [Azure VPN Gateway](/magic-wan/configuration/manually/third-party/azure/) | ||
| [GCP Cloud VPN](/magic-wan/configuration/manually/third-party/google/) | ||
| [Oracle Cloud](/magic-wan/configuration/manually/third-party/oracle/) | ||
| [Alibaba Cloud VPN Gateway](/magic-wan/configuration/manually/third-party/alibaba-cloud/) | - ||
| [Amazon AWS Transit Gateway](/magic-wan/configuration/manually/third-party/aws/) | - ||
| [Azure VPN Gateway](/magic-wan/configuration/manually/third-party/azure/) | - ||
| [GCP Cloud VPN](/magic-wan/configuration/manually/third-party/google/) | - ||
| [Oracle Cloud](/magic-wan/configuration/manually/third-party/oracle/) | - ||

[^1]: Specifications compatible per vendor documentation

0 comments on commit 6565e1b

Please sign in to comment.