-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New reference architecture diagram - Magic WAN Connector deployment options #18203
base: production
Are you sure you want to change the base?
New reference architecture diagram - Magic WAN Connector deployment options #18203
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
1 files reviewed, 12 total issue(s) found.
src/content/docs/reference-architecture/diagrams/sase/magic-wan-connector-deployment.mdx
Outdated
Show resolved
Hide resolved
src/content/docs/reference-architecture/diagrams/sase/magic-wan-connector-deployment.mdx
Outdated
Show resolved
Hide resolved
src/content/docs/reference-architecture/diagrams/sase/magic-wan-connector-deployment.mdx
Show resolved
Hide resolved
src/content/docs/reference-architecture/diagrams/sase/magic-wan-connector-deployment.mdx
Outdated
Show resolved
Hide resolved
src/content/docs/reference-architecture/diagrams/sase/magic-wan-connector-deployment.mdx
Outdated
Show resolved
Hide resolved
src/content/docs/reference-architecture/diagrams/sase/magic-wan-connector-deployment.mdx
Outdated
Show resolved
Hide resolved
src/content/docs/reference-architecture/diagrams/sase/magic-wan-connector-deployment.mdx
Outdated
Show resolved
Hide resolved
src/content/docs/reference-architecture/diagrams/sase/magic-wan-connector-deployment.mdx
Outdated
Show resolved
Hide resolved
src/content/docs/reference-architecture/diagrams/sase/magic-wan-connector-deployment.mdx
Outdated
Show resolved
Hide resolved
src/content/docs/reference-architecture/diagrams/sase/magic-wan-connector-deployment.mdx
Outdated
Show resolved
Hide resolved
Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com>
Deploying cloudflare-docs with Cloudflare Pages
|
Minor changes
|
||
The first decision for a Magic WAN Connector deployment is its location in the network, and this relates to whether the organization wants to keep the existing Customer Premises Equipment (CPE, edge router or firewall at a site), and if so, for what reason. Experience shows that this decision usually leads to three different topologies: | ||
|
||
- **Connector replacing the CPE** (Figure 1a) \- When the link is an Internet connection and the organization does not have any real use of existing equipment since the Connector supports all the required networking features such as DHCP, DNS, NAT, Trunking (801.1Q), IP access lists, breakout traffic, etc. Examples could be: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- **Connector replacing the CPE** (Figure 1a) \- When the link is an Internet connection and the organization does not have any real use of existing equipment since the Connector supports all the required networking features such as DHCP, DNS, NAT, Trunking (801.1Q), IP access lists, breakout traffic, etc. Examples could be: | |
- **Connector replacing the CPE** (Figure 1a): When the link is an Internet connection and the organization does not have any real use of existing equipment since the Connector supports all the required networking features such as DHCP, DNS, NAT, Trunking (801.1Q), IP access lists, breakout traffic, etc. Examples could be: |
1. The transition from MPLS to Internet-based connectivity, where the MPLS router probably does not add any value in the deployment. | ||
2. An Internet-facing CPE reaching, or already having exceeded, its end of life. | ||
3. An Internet-facing CPE that is redundant with Magic WAN Connector and can be removed for simplicity's sake. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
1. The transition from MPLS to Internet-based connectivity, where the MPLS router probably does not add any value in the deployment. | |
2. An Internet-facing CPE reaching, or already having exceeded, its end of life. | |
3. An Internet-facing CPE that is redundant with Magic WAN Connector and can be removed for simplicity's sake. | |
- The transition from MPLS to Internet-based connectivity, where the MPLS router probably does not add any value in the deployment. | |
- An Internet-facing CPE reaching, or already having exceeded, its end of life. | |
- An Internet-facing CPE that is redundant with Magic WAN Connector and can be removed for simplicity's sake. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We only use numbers for steps that have to be performed in a particular order. I think here we should change to a regular unordered list.
2. An Internet-facing CPE reaching, or already having exceeded, its end of life. | ||
3. An Internet-facing CPE that is redundant with Magic WAN Connector and can be removed for simplicity's sake. | ||
|
||
- **Connector north of the CPE** (Figure 1b) \- This option might be preferred when the existing CPE is a firewall, and the organization wants to keep it for: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- **Connector north of the CPE** (Figure 1b) \- This option might be preferred when the existing CPE is a firewall, and the organization wants to keep it for: | |
- **Connector north of the CPE** (Figure 1b): This option might be preferred when the existing CPE is a firewall, and the organization wants to keep it for: |
1. Additional LAN protection as a result of a defense-in-depth approach. | ||
2. Advanced segmentation requirements, for example allowing/blocking traffic between segments based on various Layer 3 to Layer 7 rules, since Magic WAN Connector supports segmentation only on layers 3 and 4 of the OSI model. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
1. Additional LAN protection as a result of a defense-in-depth approach. | |
2. Advanced segmentation requirements, for example allowing/blocking traffic between segments based on various Layer 3 to Layer 7 rules, since Magic WAN Connector supports segmentation only on layers 3 and 4 of the OSI model. | |
- Additional LAN protection as a result of a defense-in-depth approach. | |
- Advanced segmentation requirements, for example allowing/blocking traffic between segments based on various Layer 3 to Layer 7 rules, since Magic WAN Connector supports segmentation only on layers 3 and 4 of the OSI model. |
1. Additional LAN protection as a result of a defense-in-depth approach. | ||
2. Advanced segmentation requirements, for example allowing/blocking traffic between segments based on various Layer 3 to Layer 7 rules, since Magic WAN Connector supports segmentation only on layers 3 and 4 of the OSI model. | ||
|
||
- **Connector south of the CPE** (Figure 1c) \- Reasons for installing Magic WAN Connector south of an existing Internet-facing CPE might be: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- **Connector south of the CPE** (Figure 1c) \- Reasons for installing Magic WAN Connector south of an existing Internet-facing CPE might be: | |
- **Connector south of the CPE** (Figure 1c): Reasons for installing Magic WAN Connector south of an existing Internet-facing CPE might be: |
|
||
![Figure 5. 'Split Tunneling' use case.](~/assets/images/reference-architecture/magic-wan-connector-deployment/figure05.svg "Figure 5. 'Split Tunneling' use case.") | ||
|
||
In this example, the organization wants Cloudflare to protect all Internet web traffic (HTTP/HTTPS), while the rest of the traffic flows out via the existing firewall. The latter could be traffic towards existing VPNs, or non-web traffic exiting the site, but protected by the on-prem firewall. This method could take the advantage of local device policy-based routing (PBR) capabilities, for example: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In this example, the organization wants Cloudflare to protect all Internet web traffic (HTTP/HTTPS), while the rest of the traffic flows out via the existing firewall. The latter could be traffic towards existing VPNs, or non-web traffic exiting the site, but protected by the on-prem firewall. This method could take the advantage of local device policy-based routing (PBR) capabilities, for example: | |
In this example, the organization wants Cloudflare to protect all Internet web traffic (HTTP/HTTPS), while the rest of the traffic flows out via the existing firewall. The latter could be traffic towards existing VPNs, or non-web traffic exiting the site, but protected by the on-premises firewall. This method could take the advantage of local device policy-based routing (PBR) capabilities, for example: |
1. Local devices use the on premises firewall as their default gateway | ||
2. Firewall uses PBR to direct appropriate traffic to the right destination | ||
3. Web traffic (TCP 80/443) is sent towards Cloudflare via the Magic WAN Connector | ||
4. All other traffic exits via the on premises firewall |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
4. All other traffic exits via the on premises firewall | |
4. All other traffic exits via the on-premises firewall |
|
||
In this example, the organization wants Cloudflare to protect all Internet web traffic (HTTP/HTTPS), while the rest of the traffic flows out via the existing firewall. The latter could be traffic towards existing VPNs, or non-web traffic exiting the site, but protected by the on-prem firewall. This method could take the advantage of local device policy-based routing (PBR) capabilities, for example: | ||
|
||
1. Local devices use the on premises firewall as their default gateway |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
1. Local devices use the on premises firewall as their default gateway | |
1. Local devices use the on-premises firewall as their default gateway |
1. **Internet security**: Segment 1 adheres to Cloudflare security policies, bypassing the local firewall policy. | ||
2. **Site-to-site connectivity**: Segment 1 can connect to local segments in other locations (or entire sites, for example Site 2), depending on the organization's policy. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
1. **Internet security**: Segment 1 adheres to Cloudflare security policies, bypassing the local firewall policy. | |
2. **Site-to-site connectivity**: Segment 1 can connect to local segments in other locations (or entire sites, for example Site 2), depending on the organization's policy. | |
- **Internet security**: Segment 1 adheres to Cloudflare security policies, bypassing the local firewall policy. | |
- **Site-to-site connectivity**: Segment 1 can connect to local segments in other locations (or entire sites, for example Site 2), depending on the organization's policy. |
1. **Intra-segment**: Traffic between LAN ports on the same Connector is blocked by default, hence, Subnet A and Subnet B in Segment 1 cannot talk to each other. The administrator would have to explicitly allow this traffic flow by using configuration logic similar to IP access lists. This ability to hairpin local traffic via the Connector's LAN ports, avoids traffic tromboning via the Cloudflare platform (that is, travel out and back in via the Magic WAN tunnel), which could result in those segments losing connectivity to each other in the event of Internet circuit outage. Therefore, this capability allows local nodes that do not necessarily require Internet access to function, for example printers, file servers, network attached storage (NAS) nodes, and various Internet of Things (IoT) devices, to continue being accessible by local hosts in different segments during Internet outages. | ||
2. **Inter-segment**: Magic WAN Connector does not allow any inbound traffic on its WAN ports. Therefore, Segments 1 and 2 cannot talk to each other. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
1. **Intra-segment**: Traffic between LAN ports on the same Connector is blocked by default, hence, Subnet A and Subnet B in Segment 1 cannot talk to each other. The administrator would have to explicitly allow this traffic flow by using configuration logic similar to IP access lists. This ability to hairpin local traffic via the Connector's LAN ports, avoids traffic tromboning via the Cloudflare platform (that is, travel out and back in via the Magic WAN tunnel), which could result in those segments losing connectivity to each other in the event of Internet circuit outage. Therefore, this capability allows local nodes that do not necessarily require Internet access to function, for example printers, file servers, network attached storage (NAS) nodes, and various Internet of Things (IoT) devices, to continue being accessible by local hosts in different segments during Internet outages. | |
2. **Inter-segment**: Magic WAN Connector does not allow any inbound traffic on its WAN ports. Therefore, Segments 1 and 2 cannot talk to each other. | |
- **Intra-segment**: Traffic between LAN ports on the same Connector is blocked by default, hence, Subnet A and Subnet B in Segment 1 cannot talk to each other. The administrator would have to explicitly allow this traffic flow by using configuration logic similar to IP access lists. This ability to hairpin local traffic via the Connector's LAN ports, avoids traffic tromboning via the Cloudflare platform (that is, travel out and back in via the Magic WAN tunnel), which could result in those segments losing connectivity to each other in the event of Internet circuit outage. Therefore, this capability allows local nodes that do not necessarily require Internet access to function, for example printers, file servers, network attached storage (NAS) nodes, and various Internet of Things (IoT) devices, to continue being accessible by local hosts in different segments during Internet outages. | |
- **Inter-segment**: Magic WAN Connector does not allow any inbound traffic on its WAN ports. Therefore, Segments 1 and 2 cannot talk to each other. |
Summary
New reference architecture diagram - Magic WAN Connector deployment options