From 6565e1bac895b85821113e81c6803a4b0d1a985e Mon Sep 17 00:00:00 2001 From: marciocloudflare <83226960+marciocloudflare@users.noreply.github.com> Date: Wed, 4 Dec 2024 15:23:10 +0000 Subject: [PATCH] non-ascii chars (#18568) --- .../third-party/aruba-edgeconnect.mdx | 20 +++++++++---------- .../reference/device-compatibility.mdx | 18 ++++++++--------- 2 files changed, 19 insertions(+), 19 deletions(-) diff --git a/src/content/docs/magic-wan/configuration/manually/third-party/aruba-edgeconnect.mdx b/src/content/docs/magic-wan/configuration/manually/third-party/aruba-edgeconnect.mdx index 88cf5fffe82bc7..803bb418f1311d 100644 --- a/src/content/docs/magic-wan/configuration/manually/third-party/aruba-edgeconnect.mdx +++ b/src/content/docs/magic-wan/configuration/manually/third-party/aruba-edgeconnect.mdx @@ -313,11 +313,11 @@ To validate east-west traffic flow, perform a traceroute as shown in the example The example shows a client in GCP East (`10.3.0.3`), which can ping the private IP of a client in GCP West (`10.30.0.4`). -The traceroute shows the path going from the client (`10.3.0.3`)
-→ to the GCP East lan0 IP on the EdgeConnect (`10.3.0.2`)
-→ to the Cloudflare private GRE endpoint IP (`10.4.8.11`)
-→ to the GCP West lan0 IP on the West EdgeConnect (`10.30.0.3`)
-→ to the GCP West client (`10.30.0.4`). +The traceroute shows the path going from the client (`10.3.0.3`) to: +- the GCP East lan0 IP on the EdgeConnect (`10.3.0.2`) +- the Cloudflare private GRE endpoint IP (`10.4.8.11`) +- the GCP West lan0 IP on the West EdgeConnect (`10.30.0.3`) +- the GCP West client (`10.30.0.4`) This validates the east-west traffic flow through Cloudflare Magic WAN. @@ -343,11 +343,11 @@ To validate east-west traffic flow, perform a traceroute as shown in the example The example shows a client in GCP Central (`10.22.0.9`), which can ping the private IP of a client in GCP West (`10.77.0.10`). -The traceroute shows the path going from the client (`10.22.0.9`)
-→ to the GCP Central lan0 IP on the EdgeConnect (`10.22.0.2`)
-→ to the Cloudflare private IPsec endpoint IP (`192.168.10.11`)
-→ to the GCP West EdgeConnect private IPsec endpoint IP (`192.168.15.10`)
-→ to the GCP West client (`10.77.0.10`). +The traceroute shows the path going from the client (`10.22.0.9`) to: +- the GCP Central lan0 IP on the EdgeConnect (`10.22.0.2`) +- the Cloudflare private IPsec endpoint IP (`192.168.10.11`) +- the GCP West EdgeConnect private IPsec endpoint IP (`192.168.15.10`) +- the GCP West client (`10.77.0.10`) This validates the east-west traffic flow through Cloudflare Magic WAN. diff --git a/src/content/docs/magic-wan/reference/device-compatibility.mdx b/src/content/docs/magic-wan/reference/device-compatibility.mdx index 6f471a1db48c27..2748e020bec214 100644 --- a/src/content/docs/magic-wan/reference/device-compatibility.mdx +++ b/src/content/docs/magic-wan/reference/device-compatibility.mdx @@ -18,25 +18,25 @@ The matrix below includes example devices and links to the integration guides. | Cisco Meraki | Compatibility on roadmap | Compatibility on roadmap | | [Cisco SD-WAN](/magic-wan/configuration/manually/third-party/viptela/) | ✅ | ✅ | | [Fortinet](/magic-wan/configuration/manually/third-party/fortinet/)| Specifications compatible[^1] | ✅ | -| [Furukawa Electric FITELnet](/magic-wan/configuration/manually/third-party/fitelnet/) | — | ✅ | -| [Juniper Networks SRX Series Firewalls](/magic-wan/configuration/manually/third-party/juniper/) | — | ✅ | +| [Furukawa Electric FITELnet](/magic-wan/configuration/manually/third-party/fitelnet/) | - | ✅ | +| [Juniper Networks SRX Series Firewalls](/magic-wan/configuration/manually/third-party/juniper/) | - | ✅ | | [Palo Alto Networks Next-Generation Firewall](/magic-wan/configuration/manually/third-party/palo-alto/) | ✅ | ✅ | | [pfSense](/magic-wan/configuration/manually/third-party/pfsense/)| ✅ | ✅ | | Prisma SD-WAN (Palo Alto) | Specifications compatible[^1] | Specifications compatible[^1] | | Riverbed | Specifications compatible[^1] | Specifications compatible[^1] | -| [SonicWall](/magic-wan/configuration/manually/third-party/sonicwall/)| — | ✅ | +| [SonicWall](/magic-wan/configuration/manually/third-party/sonicwall/)| - | ✅ | | [Sophos Firewall](/magic-wan/configuration/manually/third-party/sophos-firewall/) | ✅ | ✅ | -| [strongSwan](/magic-wan/configuration/manually/third-party/strongswan/) | — | ✅ | +| [strongSwan](/magic-wan/configuration/manually/third-party/strongswan/) | - | ✅ | | Velocloud | Compatibility on roadmap | Compatibility on roadmap | | Versa | Specifications compatible[^1] | Compatibility on roadmap | | [VyOS](/magic-wan/configuration/manually/third-party/vyos/)| ✅ | ✅ | | VPN | GRE tunnel | IPsec tunnel | | --- | --- | --- | -| [Alibaba Cloud VPN Gateway](/magic-wan/configuration/manually/third-party/alibaba-cloud/) | — | ✅ | -| [Amazon AWS Transit Gateway](/magic-wan/configuration/manually/third-party/aws/) | — | ✅ | -| [Azure VPN Gateway](/magic-wan/configuration/manually/third-party/azure/) | — | ✅ | -| [GCP Cloud VPN](/magic-wan/configuration/manually/third-party/google/) | — | ✅ | -| [Oracle Cloud](/magic-wan/configuration/manually/third-party/oracle/) | — | ✅ | +| [Alibaba Cloud VPN Gateway](/magic-wan/configuration/manually/third-party/alibaba-cloud/) | - | ✅ | +| [Amazon AWS Transit Gateway](/magic-wan/configuration/manually/third-party/aws/) | - | ✅ | +| [Azure VPN Gateway](/magic-wan/configuration/manually/third-party/azure/) | - | ✅ | +| [GCP Cloud VPN](/magic-wan/configuration/manually/third-party/google/) | - | ✅ | +| [Oracle Cloud](/magic-wan/configuration/manually/third-party/oracle/) | - | ✅ | [^1]: Specifications compatible per vendor documentation