From 6565e1bac895b85821113e81c6803a4b0d1a985e Mon Sep 17 00:00:00 2001
From: marciocloudflare <83226960+marciocloudflare@users.noreply.github.com>
Date: Wed, 4 Dec 2024 15:23:10 +0000
Subject: [PATCH] non-ascii chars (#18568)
---
.../third-party/aruba-edgeconnect.mdx | 20 +++++++++----------
.../reference/device-compatibility.mdx | 18 ++++++++---------
2 files changed, 19 insertions(+), 19 deletions(-)
diff --git a/src/content/docs/magic-wan/configuration/manually/third-party/aruba-edgeconnect.mdx b/src/content/docs/magic-wan/configuration/manually/third-party/aruba-edgeconnect.mdx
index 88cf5fffe82bc7..803bb418f1311d 100644
--- a/src/content/docs/magic-wan/configuration/manually/third-party/aruba-edgeconnect.mdx
+++ b/src/content/docs/magic-wan/configuration/manually/third-party/aruba-edgeconnect.mdx
@@ -313,11 +313,11 @@ To validate east-west traffic flow, perform a traceroute as shown in the example
The example shows a client in GCP East (`10.3.0.3`), which can ping the private IP of a client in GCP West (`10.30.0.4`).
-The traceroute shows the path going from the client (`10.3.0.3`)
-→ to the GCP East lan0 IP on the EdgeConnect (`10.3.0.2`)
-→ to the Cloudflare private GRE endpoint IP (`10.4.8.11`)
-→ to the GCP West lan0 IP on the West EdgeConnect (`10.30.0.3`)
-→ to the GCP West client (`10.30.0.4`).
+The traceroute shows the path going from the client (`10.3.0.3`) to:
+- the GCP East lan0 IP on the EdgeConnect (`10.3.0.2`)
+- the Cloudflare private GRE endpoint IP (`10.4.8.11`)
+- the GCP West lan0 IP on the West EdgeConnect (`10.30.0.3`)
+- the GCP West client (`10.30.0.4`)
This validates the east-west traffic flow through Cloudflare Magic WAN.
@@ -343,11 +343,11 @@ To validate east-west traffic flow, perform a traceroute as shown in the example
The example shows a client in GCP Central (`10.22.0.9`), which can ping the private IP of a client in GCP West (`10.77.0.10`).
-The traceroute shows the path going from the client (`10.22.0.9`)
-→ to the GCP Central lan0 IP on the EdgeConnect (`10.22.0.2`)
-→ to the Cloudflare private IPsec endpoint IP (`192.168.10.11`)
-→ to the GCP West EdgeConnect private IPsec endpoint IP (`192.168.15.10`)
-→ to the GCP West client (`10.77.0.10`).
+The traceroute shows the path going from the client (`10.22.0.9`) to:
+- the GCP Central lan0 IP on the EdgeConnect (`10.22.0.2`)
+- the Cloudflare private IPsec endpoint IP (`192.168.10.11`)
+- the GCP West EdgeConnect private IPsec endpoint IP (`192.168.15.10`)
+- the GCP West client (`10.77.0.10`)
This validates the east-west traffic flow through Cloudflare Magic WAN.
diff --git a/src/content/docs/magic-wan/reference/device-compatibility.mdx b/src/content/docs/magic-wan/reference/device-compatibility.mdx
index 6f471a1db48c27..2748e020bec214 100644
--- a/src/content/docs/magic-wan/reference/device-compatibility.mdx
+++ b/src/content/docs/magic-wan/reference/device-compatibility.mdx
@@ -18,25 +18,25 @@ The matrix below includes example devices and links to the integration guides.
| Cisco Meraki | Compatibility on roadmap | Compatibility on roadmap |
| [Cisco SD-WAN](/magic-wan/configuration/manually/third-party/viptela/) | ✅ | ✅ |
| [Fortinet](/magic-wan/configuration/manually/third-party/fortinet/)| Specifications compatible[^1] | ✅ |
-| [Furukawa Electric FITELnet](/magic-wan/configuration/manually/third-party/fitelnet/) | — | ✅ |
-| [Juniper Networks SRX Series Firewalls](/magic-wan/configuration/manually/third-party/juniper/) | — | ✅ |
+| [Furukawa Electric FITELnet](/magic-wan/configuration/manually/third-party/fitelnet/) | - | ✅ |
+| [Juniper Networks SRX Series Firewalls](/magic-wan/configuration/manually/third-party/juniper/) | - | ✅ |
| [Palo Alto Networks Next-Generation Firewall](/magic-wan/configuration/manually/third-party/palo-alto/) | ✅ | ✅ |
| [pfSense](/magic-wan/configuration/manually/third-party/pfsense/)| ✅ | ✅ |
| Prisma SD-WAN (Palo Alto) | Specifications compatible[^1] | Specifications compatible[^1] |
| Riverbed | Specifications compatible[^1] | Specifications compatible[^1] |
-| [SonicWall](/magic-wan/configuration/manually/third-party/sonicwall/)| — | ✅ |
+| [SonicWall](/magic-wan/configuration/manually/third-party/sonicwall/)| - | ✅ |
| [Sophos Firewall](/magic-wan/configuration/manually/third-party/sophos-firewall/) | ✅ | ✅ |
-| [strongSwan](/magic-wan/configuration/manually/third-party/strongswan/) | — | ✅ |
+| [strongSwan](/magic-wan/configuration/manually/third-party/strongswan/) | - | ✅ |
| Velocloud | Compatibility on roadmap | Compatibility on roadmap |
| Versa | Specifications compatible[^1] | Compatibility on roadmap |
| [VyOS](/magic-wan/configuration/manually/third-party/vyos/)| ✅ | ✅ |
| VPN | GRE tunnel | IPsec tunnel |
| --- | --- | --- |
-| [Alibaba Cloud VPN Gateway](/magic-wan/configuration/manually/third-party/alibaba-cloud/) | — | ✅ |
-| [Amazon AWS Transit Gateway](/magic-wan/configuration/manually/third-party/aws/) | — | ✅ |
-| [Azure VPN Gateway](/magic-wan/configuration/manually/third-party/azure/) | — | ✅ |
-| [GCP Cloud VPN](/magic-wan/configuration/manually/third-party/google/) | — | ✅ |
-| [Oracle Cloud](/magic-wan/configuration/manually/third-party/oracle/) | — | ✅ |
+| [Alibaba Cloud VPN Gateway](/magic-wan/configuration/manually/third-party/alibaba-cloud/) | - | ✅ |
+| [Amazon AWS Transit Gateway](/magic-wan/configuration/manually/third-party/aws/) | - | ✅ |
+| [Azure VPN Gateway](/magic-wan/configuration/manually/third-party/azure/) | - | ✅ |
+| [GCP Cloud VPN](/magic-wan/configuration/manually/third-party/google/) | - | ✅ |
+| [Oracle Cloud](/magic-wan/configuration/manually/third-party/oracle/) | - | ✅ |
[^1]: Specifications compatible per vendor documentation