
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Tue, 14 Apr 2026 22:45:07 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Announcing General Availability for the Magic WAN Connector: the easiest way to jumpstart SASE transformation for your network]]></title>
            <link>https://blog.cloudflare.com/magic-wan-connector-general-availability/</link>
            <pubDate>Tue, 03 Oct 2023 12:55:34 GMT</pubDate>
            <description><![CDATA[ We’re announcing the general availability of the Magic WAN Connector, which serves as the glue between your existing network hardware and Cloudflare’s networ ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6C3g58PPEB5JrT1nTVF2Fp/27aa99e113979042f578d83b50c35aea/Magic-WAN-Connector--buy-our-box-or-BYO-.png" />
            
            </figure><p>Today, we’re announcing the general availability of the <a href="https://www.cloudflare.com/network-services/products/magic-wan/">Magic WAN Connector</a>, a key component of our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> platform, Cloudflare One. Magic WAN Connector is the glue between your existing network hardware and Cloudflare’s network — it provides a super simplified software solution that comes pre-installed on Cloudflare-certified hardware, and is entirely managed from the Cloudflare One dashboard.</p><p>It takes only a few minutes from unboxing to seeing your network traffic automatically routed to the closest Cloudflare location, where it flows through a full stack of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security controls</a> before taking an accelerated path to its destination, whether that’s another location on your private network, a SaaS app, or any application on the open Internet.</p><p>Since we <a href="/magic-wan-connector/">announced</a> our beta earlier this year, organizations around the world have deployed the Magic WAN Connector to connect and secure their network locations. We’re excited for the general availability of the Magic WAN Connector to accelerate SASE transformation at scale.</p><p>When customers tell us about their journey to embrace SASE, one of the most common stories we hear is:</p><blockquote><p><i>We started with our remote workforce, deploying modern solutions to secure access to internal apps and Internet resources. But now, we’re looking at the broader landscape of our enterprise network connectivity and security, and it’s daunting. We want to shift to a cloud and Internet-centric model for all of our infrastructure, but we’re struggling to figure out how to start.</i></p></blockquote><p>The Magic WAN Connector was created to address this problem.</p>
    <div>
      <h3>Zero-touch connectivity to your new corporate WAN</h3>
      <a href="#zero-touch-connectivity-to-your-new-corporate-wan">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> enables organizations of any size to connect and secure all of their users, devices, <a href="https://www.cloudflare.com/application-services/solutions/">applications</a>, networks, and data with a unified platform delivered by our global <a href="https://www.cloudflare.com/connectivity-cloud/">connectivity cloud</a>. <a href="https://www.cloudflare.com/network-services/products/magic-wan/">Magic WAN</a> is the network connectivity “glue” of Cloudflare One, allowing our customers to migrate away from legacy private circuits and use our network as an extension of their own.</p><p>Previously, customers have connected their locations to Magic WAN with Anycast GRE or IPsec tunnels configured on their edge network equipment (usually existing routers or firewalls), or plugged into us directly with <a href="https://www.cloudflare.com/network-services/products/network-interconnect/">CNI</a>. But for the past few years, we’ve heard requests from hundreds of customers asking for a zero-touch approach to connecting their branches: <i>We just want something we can plug in and turn on, and it handles the rest.</i></p><p>The Magic WAN Connector is exactly this. Customers receive Cloudflare-certified hardware with our software pre-installed on it, and everything is controlled via the Cloudflare dashboard. What was once a time-consuming, complex process now takes a matter of minutes, enabling robust Zero-Trust protection for all of your traffic.  </p><p>In addition to automatically configuring tunnels and routing policies to direct your network traffic to Cloudflare, the Magic WAN Connector will also handle traffic steering, shaping and failover to make sure your packets always take the best path available to the closest Cloudflare network location — which is likely only milliseconds away. You’ll also get <a href="https://www.cloudflare.com/learning/performance/what-is-observability/">enhanced visibility into all your traffic flows in analytics and logs</a>, providing a unified observability experience across both your branches and the traffic through Cloudflare’s network.</p>
    <div>
      <h3>Zero Trust security for all your traffic</h3>
      <a href="#zero-trust-security-for-all-your-traffic">
        
      </a>
    </div>
    <p>Once the Magic WAN Connector is deployed at your network location, you have automatic access to enforce Zero Trust security policies across both public and private traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6kj1RPtJdlJHyz4A5kwDb8/e0c0f7cac3b5f849c102ee4e2d31be42/Branch-Connector-Diagram.png" />
            
            </figure>
    <div>
      <h4>A secure on-ramp to the Internet</h4>
      <a href="#a-secure-on-ramp-to-the-internet">
        
      </a>
    </div>
    <p>An easy first step to improving your organization’s security posture after connecting network locations to Cloudflare is creating Secure Web Gateway policies to defend against ransomware, phishing, and other threats for faster, safer Internet browsing. By default, all Internet traffic from locations with the Magic WAN Connector will route through Cloudflare Gateway, providing a unified management plane for traffic from physical locations and remote employees.</p>
    <div>
      <h4>A more secure private network</h4>
      <a href="#a-more-secure-private-network">
        
      </a>
    </div>
    <p>The Magic WAN Connector also enables routing private traffic between your network locations, with multiple layers of network and Zero Trust security controls in place. Unlike a traditional network architecture, which requires deploying and managing a stack of security hardware and backhauling branch traffic through a central location for filtering, a SASE architecture provides private traffic filtering and control built-in: enforced across a distributed network, but managed from a single dashboard interface or API.</p>
    <div>
      <h4>A simpler approach for hybrid cloud</h4>
      <a href="#a-simpler-approach-for-hybrid-cloud">
        
      </a>
    </div>
    <p>Cloudflare One enables connectivity for any physical or <a href="https://www.cloudflare.com/learning/cloud/what-is-cloud-networking/">cloud network</a> with easy on-ramps depending on location type. The Magic WAN Connector provides easy connectivity for branches, but also provides automatic connectivity to other networks including VPCs connected using cloud-native constructs (e.g., VPN Gateways) or direct cloud connectivity (via <a href="/cloud-cni/">Cloud CNI</a>). With a unified connectivity and control plane across physical and cloud infrastructure, IT and security teams can reduce overhead and cost of managing multi- and hybrid cloud networks.</p>
    <div>
      <h3>Single-vendor SASE dramatically reduces cost and complexity</h3>
      <a href="#single-vendor-sase-dramatically-reduces-cost-and-complexity">
        
      </a>
    </div>
    <p>With the general availability of the Magic WAN Connector, we’ve put the final piece in place to deliver a unified SASE platform, developed and fully integrated from the ground up. Deploying and managing all the components of SASE with a single vendor, versus piecing together different solutions for <a href="https://www.cloudflare.com/network-security/">networking and security</a>, significantly simplifies deployment and management by reducing complexity and potential integration challenges. Many vendors that market a full SASE solution have actually stitched together separate products through acquisition, leading to an un-integrated experience similar to what you would see deploying and managing multiple separate vendors. In contrast, Cloudflare One (now with the Magic WAN Connector for simplified branch functions) enables organizations to achieve the true promise of SASE: a simplified, efficient, and highly secure network and security infrastructure that reduces your total cost of ownership and adapts to the evolving needs of the modern digital landscape.</p>
    <div>
      <h3>Evolving beyond SD-WAN</h3>
      <a href="#evolving-beyond-sd-wan">
        
      </a>
    </div>
    <p>Cloudflare One addresses many of the challenges that were left behind as organizations deployed SD-WAN to help simplify networking operations. <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-sd-wan/">SD-WAN</a> provides orchestration capabilities to help manage devices and configuration in one place, as well as last mile traffic management to steer and shape traffic based on more sophisticated logic than is possible in traditional routers. But SD-WAN devices generally don't have embedded security controls, leaving teams to stitch together a patchwork of hardware, virtualized and cloud-based tools to keep their networks secure. They can make decisions about the best way to send traffic out from a customer’s branch, but they have no way to influence traffic hops between the last mile and the traffic's destination. And while some SD-WAN providers have surfaced virtualized versions of their appliances that can be deployed in cloud environments, they don't support native cloud connectivity and can complicate rather than ease the transition to cloud.</p><p>Cloudflare One represents the next evolution of enterprise networking, and has a fundamentally different architecture from either legacy networking or SD-WAN. It's based on a "light branch, heavy cloud" principle: deploy the minimum required hardware within physical locations (or virtual hardware within virtual networks, e.g., cloud VPCs) and use low-cost Internet connectivity to reach the nearest "service edge" location. At those locations, traffic can flow through security controls and be optimized on the way to its destination, whether that's another location within the customer's private network or an application on the public Internet. This architecture also enables remote user access to connected networks.</p><p>This shift — moving most of the "smarts" from the branch to a distributed global network edge, and leaving only the functions at the branch that absolutely require local presence, delivered by the Magic WAN Connector — solves our customers’ current problems and sets them up for <a href="https://www.cloudflare.com/cybersecurity-risk-management/">easier management and a stronger security posture</a> as the connectivity and attack landscape continues to evolve.</p><table><colgroup><col></col><col></col><col></col><col></col><col></col></colgroup><tbody><tr><td><p><span>Aspect</span></p></td><td><p><span>Example</span></p></td><td><p><span>MPLS/VPN Service</span></p></td><td><p><span>SD-WAN</span></p></td><td><p><span>SASE with </span></p><p><span>Cloudflare One </span></p></td></tr><tr><td><p><span>Configuration</span></p></td><td><p><span>New site setup, configuration and management</span></p></td><td><p><span>By MSP through service request</span></p></td><td><p><span>Simplified orchestration and  </span><span><br /></span><span>management via centralized controller</span></p></td><td><p><span>Automated orchestration via SaaS portal</span></p><p><span>Single Dashboard</span></p></td></tr><tr><td><p><span>Last mile </span></p><p><span>traffic control</span></p></td><td><p><span>Traffic balancing, QoS, and failover</span></p></td><td><p><span>Covered by MPLS SLAs</span></p></td><td><p><span>Best Path selection available </span><span><br /></span><span>in SD-WAN appliance </span></p></td><td><p><span>Minimal on-prem deployment to control local decision making</span></p></td></tr><tr><td><p><span>Middle mile </span></p><p><span>traffic control</span></p></td><td><p><span>Traffic steering around middle mile congestion</span></p></td><td><p><span>Covered by MPLS SLAs</span></p></td><td><p><span>“Tunnel Spaghetti” and still no control over the middle mile</span></p></td><td><p><span>Integrated traffic management &amp; private backbone controls in a unified dashboard</span></p></td></tr><tr><td><p><span>Cloud integration</span></p></td><td><p><span>Connectivity for cloud migration</span></p></td><td><p><span>Centralized breakout</span></p></td><td><p><span>Decentralized breakout</span></p></td><td><p><span>Native connectivity with Cloud Network Interconnect</span></p></td></tr><tr><td><p><span>Security</span></p></td><td><p><span>Filter in &amp; outbound Internet traffic for malware</span></p></td><td><p><span>Patchwork of hardware controls</span></p></td><td><p><span>Patchwork of hardware </span><span><br /></span><span>and/or software controls</span></p></td><td><p><span>Native integration with user, data, application &amp; network security tools</span></p></td></tr><tr><td><p><span>Cost</span></p></td><td><p><span>Maximize ROI for network investments</span></p></td><td><p><span>High cost for hardware and connectivity</span></p></td><td><p><span>Optimized connectivity costs at the expense of increased </span></p><p><span>hardware and software costs</span></p></td><td><p><span>Decreased hardware and connectivity costs for maximized ROI</span></p></td></tr></tbody></table><p><i>Summary of legacy, SD-WAN based, and SASE architecture considerations</i></p><p>Love and want to keep your current SD-WAN vendor? No problem - you can still use any appliance that supports IPsec or GRE as an on-ramp for Cloudflare One.</p>
    <div>
      <h3>Ready to simplify your SASE journey?</h3>
      <a href="#ready-to-simplify-your-sase-journey">
        
      </a>
    </div>
    <p>You can learn more about the Magic WAN Connector, including device specs, specific feature info, onboarding process details, and more at our <a href="https://developers.cloudflare.com/magic-wan/connector/">dev docs</a>, or <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/">contact us</a> to get started today.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <category><![CDATA[Magic WAN Connector]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <guid isPermaLink="false">Rf29gLGgJJqRz3DJoViF1</guid>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Switching to Cloudflare can cut your network carbon emissions up to 96% (and we're joining the SBTi)]]></title>
            <link>https://blog.cloudflare.com/switching-cloudflare-cut-your-network-carbon-emissions-sbti/</link>
            <pubDate>Mon, 25 Sep 2023 13:02:00 GMT</pubDate>
            <description><![CDATA[ We’re excited to share an independent report this week that found that switching enterprise network services from on premises devices to Cloudflare services can cut carbon emissions up to 96% ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6os38nIl6ZzZZZzdFgP2Hu/248a7f796534890442d0d30a54f5f96d/image4-6.png" />
            
            </figure><p>Since our founding, Cloudflare has helped customers save on costs, increase security, and boost performance and reliability by migrating legacy hardware functions to the cloud. More recently, our customers have been asking about whether this transition can also improve the environmental impact of their operations.</p><p>We are excited to share an independent report published this week that found that switching <a href="https://www.cloudflare.com/network-services/solutions/enterprise-network-security/">enterprise network services</a> from on premises devices to Cloudflare services can <b>cut related carbon emissions up to 96%</b>, depending on your current network footprint. The majority of these gains come from consolidating services, which improves carbon efficiency by increasing the utilization of servers that are providing multiple network functions.</p><p>And we are not stopping there. Cloudflare is also proud to announce that we have applied to set carbon reduction targets through the <a href="https://sciencebasedtargets.org/">Science Based Targets initiative</a> (SBTi) in order to help continue to cut emissions across our operations, facilities, and supply chain.</p><p>As we wrap up the <a href="https://www.cnn.com/2023/09/06/world/hottest-summer-record-climate-intl/index.html">hottest summer on record</a>, it's clear that we all have a part to play in understanding and reducing our carbon footprint. Partnering with Cloudflare on your network transformation journey is an easy way to get started. <a href="https://www.cloudflare.com/plans/">Come join us today</a>!</p>
    <div>
      <h3>Traditional vs. cloud-based networking and security</h3>
      <a href="#traditional-vs-cloud-based-networking-and-security">
        
      </a>
    </div>
    <p>Historically, corporate networks relied on dedicated circuits and specialized hardware to connect and secure their infrastructure. Companies built or rented space in data centers that were physically located within or close to major office locations, and hosted business applications on servers in these data centers. Employees in offices connected to these applications through the <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-lan/">local area network</a> (LAN) or over private <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-wan/">wide area network</a> (WAN) links from branch locations. A stack of security hardware in each data center, including <a href="https://www.cloudflare.com/learning/security/what-is-a-firewall/">firewalls</a>, intrusion detection systems, <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS</a> mitigation appliances, VPN concentrators, and more enforced security for all traffic flowing in and out.</p><p>This architecture model broke down when applications shifted to the cloud and users left the office, requiring a new approach to connecting and securing corporate networks. Cloudflare’s model, which aligns with the <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE framework</a>, shifts network and security functions from on premises hardware to our distributed global network.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7y79xLVnfhGKqC2B3YfLoV/e5a65bc463f84da832ac57950a3e3743/image1-8.png" />
            
            </figure><p><i>Traditional vs. cloud-based networking and security architecture</i></p><p>This approach improves performance by enforcing policy close to where users are, increases security with <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> principles, and saves costs by delivering functions more efficiently. We are now excited to report that it materially reduces the total power consumption of the services required to connect and secure your organization, which reduces carbon emissions.</p>
    <div>
      <h3>Reduced carbon emissions through cloud migration and consolidation</h3>
      <a href="#reduced-carbon-emissions-through-cloud-migration-and-consolidation">
        
      </a>
    </div>
    <p>An independent study published this week by Analysys Mason outlines how shifting networking and security functions to the cloud, and particularly consolidating services in a unified platform, directly improves the sustainability of organizations’ network, security, and IT operations. You can read the full study <a href="https://downloads.ctfassets.net/slt3lc6tev37/25p5KbWP3RwWan5FdVb5ym/d9b3f9a285fe3e7e4972fee797b22ac2/Analysys-Mason-for-Cloudflare-Carbon-Savings-of-ENF-Report-Sep-2023.pdf">here</a>, but here are a few key points.</p><p>The study compared a typical hardware stack deployed in an enterprise data center or IT closet, and its associated energy consumption, to the energy consumption of comparable functions delivered by Cloudflare’s global network. The stack used for comparison included network firewall and WAF, DDoS mitigation, <a href="https://www.cloudflare.com/learning/performance/what-is-load-balancing/">load balancing</a>, WAN optimization, and <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-sd-wan/">SD-WAN</a>. Researchers analyzed the average power consumption for devices with differing capacity and found that higher-capacity devices only consume incrementally more energy:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/77SMJCdVB0dWu1hAvWrhGO/2559577414202ae0642ec3f3a13b609b/image5-4.png" />
            
            </figure><p><i>Power consumption across representative networking and security hardware devices with varying traffic capacity</i></p><p>The study noted that specialized hardware is more efficient per watt of electricity consumed at performing specific functions — in other words, a device optimized for intrusion detection will perform intrusion detection functions using less power per request processed than a generic server designed to host multiple different workloads. This can be seen in the bar labeled “impact of cloud processing efficiency” in the graph below.</p><p>However, these gains are only relevant when a specialized hardware device is consistently utilized close to its capacity, which most appliances in corporate environments are not. Network, security, and IT teams intentionally provision devices with higher capacity than they will need the majority of the time in order to be able to gracefully handle spikes or peaks.</p><p>For example, a security engineer might have traditionally specced a DDoS protection appliance that can handle up to 10 Gbps of traffic in case an attack of that size came in, but the vast majority of the time, the appliance is processing far less traffic (maybe only tens or hundreds of Mbps). This means that it is actually much more efficient for those functions to run on a generic device that is also running other kinds of processes and therefore can operate at a higher baseline utilization, using the same power to get more work done. These benefits are shown in the “utilization gains from cloud” bar in the following graph.</p><p>There are also some marginal efficiency gains from other aspects of cloud architecture, such as improved power usage effectiveness (PUE) and carbon intensity of data centers optimized for cloud workloads vs. traditional enterprise infrastructure. These are represented on the right of the graph below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5QrmagNGo8ws5vxpDRGAbH/4b07820cc1a8dd29c0071ee3abb96164/image2-6.png" />
            
            </figure><p><i>The analysis shows that processing efficiency in the cloud is lower than specialized on-premises equipment; however, utilization gains through shared cloud services combined with expected PUE and carbon intensity yield potentially 86% emissions savings for large enterprises.</i>  </p><p>Researchers compared multiple examples of enterprise IT environments, from small to large traffic volume and complexity, and found that these factors contribute to overall carbon emissions reduction of 78-96% depending on the network analyzed.</p><p>One of the most encouraging parts of this study was that it did <i>not</i> include Cloudflare's renewable energy or offset purchases in its findings. A number of studies have concluded that migrating various applications and compute functions from on premises hardware to the cloud can significantly cut carbon emissions. But, those studies also relied in part on carbon accounting benefits like renewable energy or carbon offsets to demonstrate those savings.</p><p>Cloudflare also powers its operations with <a href="https://www.cloudflare.com/impact/">100% renewable energy</a> and purchases high-quality offsets to account for its annual emissions footprint. Meaning, the emissions savings of potentially switching to Cloudflare are likely even higher than those reported.</p><p>Overall, consolidating and migrating to Cloudflare’s services and retiring legacy hardware can substantially reduce energy consumption and emissions. And while you are at it, make sure to consider sustainable end-of-life practices for those retired devices — we will even help you <a href="/sustainable-end-of-life-hardware/">recycle them</a>!</p>
    <div>
      <h3>Cloudflare is joining the Science Based Targets initiative (SBTi)</h3>
      <a href="#cloudflare-is-joining-the-science-based-targets-initiative-sbti">
        
      </a>
    </div>
    <p>We're incredibly proud that Cloudflare is helping move the Internet toward a zero emissions future. But, we know that we can do more.</p><p>Cloudflare is thrilled to announce that we have submitted our application to join <a href="https://sciencebasedtargets.org/">SBTi</a> and set science-based carbon reduction targets across our facilities, operations, and supply chain.</p><p>SBTi is one of the world's most ambitious corporate climate action commitments. It requires companies to achieve verifiable emissions reductions across their operations and supply chain without the use of carbon offsets. Companies' short- and long-term reduction goals must be consistent with the <a href="https://unfccc.int/process-and-meetings/the-paris-agreement">Paris Climate Agreement</a> goal of limiting global warming to 1.5 degrees above pre-industrial levels.</p><p>Once approved, Cloudflare will work over the next 24 months with SBTi to develop and validate our short and long term reduction targets. Stay tuned to our blog and our <a href="https://www.cloudflare.com/impact/">Impact page</a> for updates as we go.</p><p>Cloudflare's commitment to SBTi reduction targets builds on our ongoing commitments to 100% renewable energy, to offset or remove historic carbon emissions associated with powering our network by 2025, and <a href="/more-bots-more-trees/">reforestation efforts</a>.</p><p>As <a href="/helping-build-a-green-internet/">we have said before</a>, Cloudflare's original goal was not to reduce the Internet's environmental impact. But, that has changed.</p><p>Come join Cloudflare today and help us work towards a zero emissions Internet.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5lAeHmuiBZ2cPSApblr2NX/cdb8352ca840cb15118ce3b4ea945496/FU9ovXAxWwaFLdJanVg8vTOoqre14ZIA9dxSPIykeN_bSn2QPv3SbRgpIgFLN2yPIw5X9bB5UUNg3AMt8lD-3qBaZyASGPFHJzeZLpOJbknyrDnZ5OGY8HITYYDy.png" />
            
            </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Emissions]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">rjyIWF5BlP6YxuP7hXhgX</guid>
            <dc:creator>Patrick Day</dc:creator>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Application Services for private networks: do more with the tools you already love]]></title>
            <link>https://blog.cloudflare.com/app-services-private-networks/</link>
            <pubDate>Fri, 13 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to announce new integrations that make it possible to unlock operational and cost efficiencies for IT teams by allowing them to do more with fewer tools, and enable new use cases that are impossible without Cloudflare’s  “every service everywhere” architecture. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/19EYuMAVuO7G3gCRRRPhWg/2fe36298d6366dd5948372ab4bd08b06/image2-28.png" />
            
            </figure><p>Cloudflare’s <a href="https://www.cloudflare.com/application-services/">Application Services</a> have been hard at work keeping Internet-facing websites and applications secure, fast, and reliable for over a decade. <a href="https://www.cloudflare.com/cloudflare-one/#transformation">Cloudflare One</a> provides similar security, performance, and reliability benefits for your entire corporate network. And today, we’re excited to announce new integrations that make it possible to use these services together in new ways. These integrations unlock operational and cost efficiencies for IT teams by allowing them to do more with fewer tools, and enable new use cases that are impossible without Cloudflare’s  “every service everywhere” architecture.</p><blockquote><p><i>“Just as Canva simplifies graphic design, Cloudflare simplifies performance and security. Thanks to Cloudflare, we can focus on growing our product and expanding into new markets with confidence, knowing that our platform is fast, reliable, and secure.” - </i><b><i>Jim Tyrrell</i></b><i>, Head of Infrastructure, Canva</i></p></blockquote>
    <div>
      <h3>Every service everywhere, now for every network</h3>
      <a href="#every-service-everywhere-now-for-every-network">
        
      </a>
    </div>
    <p>One of Cloudflare’s fundamental architectural principles has always been to treat our network like one homogeneous supercomputer. Rather than deploying services in specific locations - for example, using some of our points of presence to enforce <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> policies, others for Zero Trust controls, and others for traffic optimization - every server runs a virtually identical stack of all of our software services. This way, a packet can land on any server and flow through a full set of security filters in a single pass, without having to incur the performance tax of hair pinning to multiple locations.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2feVltGTqj2dzzVvq7r0YQ/a3f5a8d3edd5bbfc86f4ab3e6af61a07/image1-38.png" />
            
            </figure><p>The software that runs on each of these servers is Linux-based and takes advantage of core concepts of the Linux kernel in order to create “wiring” between services. This <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">deep dive on our DDoS mitigation stack</a> explains just one example of how we use these tools to route packets through multiple layers of protection without sacrificing performance. This approach also enables us to easily add new paths for packets and requests, enabling deeper integrations and new possibilities for traffic routed to Cloudflare’s network from any source or to any destination. Let’s walk through some of these new use cases we’re developing for private networks.</p>
    <div>
      <h3>Web Application Firewall for private apps with any off-ramp</h3>
      <a href="#web-application-firewall-for-private-apps-with-any-off-ramp">
        
      </a>
    </div>
    <p>Today, millions of customers trust Cloudflare’s WAF to protect their applications that are exposed to the public Internet - either fully public apps or private apps connected via <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/">Cloudflare Tunnel</a> and surfaced with a public hostname. We’ve increasingly heard from customers that are excited about putting our WAF controls in front of any application with any traffic on or off-ramp, for a variety of reasons.</p><p>Some customers want to do this in order to enforce stronger <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust principles</a>: filtering all traffic, even requests sourced from within a “trusted” private network, as though it came from the open Internet. Other customers want to connect an entire datacenter or cloud property with a network-layer on-ramp like a GRE or IPsec tunnel or <a href="https://developers.cloudflare.com/network-interconnect/">CNI</a>. And yet others want to adopt the Cloudflare WAF for their private apps without specifying public hostnames.</p><p>By fully integrating Cloudflare’s WAF with the Cloudflare One dataplane, we’re excited to address all of these use cases: enabling customers to create WAF policies in-path for fully private traffic flows by building their private network on Cloudflare.</p>
    <div>
      <h3>API security for internal APIs</h3>
      <a href="#api-security-for-internal-apis">
        
      </a>
    </div>
    <p>After web applications, one of the next <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">attack surfaces</a> our customers turn to addressing is their public-facing <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api/">APIs</a>. Cloudflare offers <a href="https://www.cloudflare.com/application-services/solutions/api-security/">services</a> to protect public APIs from DDoS, abuse, sensitive data loss, and many other attack vectors. But security concerns don’t stop with public-facing APIs: as engineering organizations continue to embrace distributed architecture, multicloud and microsegmentation, <a href="https://www.cloudflare.com/cio/">CIOs</a> and teams that provide internal services are also interested in securing their private APIs.</p><p>With Cloudflare One, customers can connect and route their entire private network through our global fabric, enabling private API traffic to flow through the same stack of security controls we’ve previously made available for public APIs. Networking and security teams will be able to apply the principles of zero trust to their private API traffic flow to help improve their overall security posture.</p>
    <div>
      <h3>Global and local traffic management for private apps</h3>
      <a href="#global-and-local-traffic-management-for-private-apps">
        
      </a>
    </div>
    <p>So far, we’ve focused on the security controls customers have available to filter malicious traffic to their applications and APIs. But Cloudflare’s services don’t stop with security: we make anything connected to the Internet faster and more reliable. One of the key tools enabling this is our suite of load balancing services, which include application-layer controls for any origin server behind Cloudflare’s <a href="https://www.cloudflare.com/learning/cdn/glossary/reverse-proxy/">reverse proxy</a> and <a href="https://developers.cloudflare.com/magic-wan/about/traffic-steering/">network-layer controls</a> for any IP traffic.</p><p>Customers have asked for even more flexibility and new ways to use our traffic management tools: the ability to create application-layer load balancing policies for traffic connected with any off-ramp, such as Cloudflare Tunnel for applications, GRE or IPsec tunnels or CNI for IP networks. They also are excited about the potential to extend load balancing policies into their local networks, managing traffic across servers within a datacenter or cloud property in addition to across multiple “global” locations. These capabilities, which will improve resiliency for any application - both by enforcing more granular controls for private apps and managing local traffic for any app - are coming soon; stay tuned for more updates.</p>
    <div>
      <h3>Full-stack performance optimization for private apps</h3>
      <a href="#full-stack-performance-optimization-for-private-apps">
        
      </a>
    </div>
    <p>Cloudflare has always obsessed over the speed of every request routed through our network. We’re constantly developing new ways to deliver content closer to users, automatically optimize any kind of traffic, and route packets over the best possible paths, avoiding congestion and other issues on the Internet. <a href="https://www.cloudflare.com/products/argo-smart-routing/">Argo Smart Routing</a> speeds up any reverse proxied traffic with application-layer optimizations and IP packets with intelligent decisions at the network layer, using Cloudflare’s extensive interconnectivity and global private backbone to make sure that traffic is delivered as quickly and efficiently as possible.</p><p>As we more deeply integrate Cloudflare’s private networking dataplane and our application services to realize the security and reliability benefits described above, customers will automatically be able to see the benefits of Argo Smart Routing at all layers of the OSI stack for any traffic connected to Cloudflare.</p>
    <div>
      <h3>Private DNS for one-stop management of internal network resources</h3>
      <a href="#private-dns-for-one-stop-management-of-internal-network-resources">
        
      </a>
    </div>
    <p>Cloudflare’s industry-leading <a href="https://www.cloudflare.com/dns/">authoritative DNS</a> protects millions of public Internet domains. These can be queried by anyone on the public Internet, which is great for most organizations, but some want to be able to restrict this access. With our private DNS, customers will be able to resolve queries to private domains only when connected to the Zero Trust private network they define within Cloudflare. Because we’re building this using our robust authoritative DNS and Gateway filtering services, you can expect all the other goodness already possible with Cloudflare to also apply to private DNS: support for all common DNS record types, the ability to resolve to DNS queries to virtual networks with overlapping IPs, and all the other Zero Trust filtering control offered by Gateway DNS filtering. Consolidating management of external and internal DNS in one place, with the fastest response time, unparalleled redundancy, and advanced security already built in, will greatly simplify customers’ infrastructure and save time and operational overhead.</p>
    <div>
      <h3>And more new use cases every day</h3>
      <a href="#and-more-new-use-cases-every-day">
        
      </a>
    </div>
    <p>We love hearing about new ways you’re using Cloudflare to make any user, application, or network faster, more secure, and more reliable. <a href="https://www.cloudflare.com/lp/application-services-for-private-networks/">Get on the list</a> for beta access to the new integrations described today and reach out to us in the comments if you’ve got more ideas for new problems you’d like to solve using Cloudflare.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <category><![CDATA[NaaS]]></category>
            <guid isPermaLink="false">45eViIuDoxN53vCcJ5RO3m</guid>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing the Magic WAN Connector: the easiest on-ramp to your next generation network]]></title>
            <link>https://blog.cloudflare.com/magic-wan-connector/</link>
            <pubDate>Tue, 10 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare is making it even easier to get connected with the Magic WAN Connector: a lightweight software package you can install in any physical or cloud network to automatically connect, steer, and shape any IP traffic. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5x4P53d0PbmTYOlBqLqC04/3ae5cf230c0e205875d29528db19ae05/image4-4.png" />
            
            </figure><p>Cloudflare One enables organizations to <a href="https://www.cloudflare.com/learning/network-layer/how-to-prepare-for-network-modernization-projects/">modernize their corporate networks</a> by connecting any traffic source or destination and layering <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> security policies on top, saving cost and complexity for IT teams and delivering a better experience for users. Today, we’re excited to make it even easier for you to get connected with the Magic WAN Connector: a lightweight software package you can install in any physical or cloud network to automatically connect, steer, and shape any IP traffic.</p><p>You can install the Magic WAN Connector on physical or virtual hardware you already have, or purchase it pre-installed on a Cloudflare-certified device. It ensures the best possible connectivity to the closest Cloudflare network location, where we’ll apply security controls and send traffic on an optimized route to its destination. Embracing <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> has never been simpler.</p>
    <div>
      <h3>Solving today’s problems and setting up for tomorrow</h3>
      <a href="#solving-todays-problems-and-setting-up-for-tomorrow">
        
      </a>
    </div>
    <p>Over the past few years, we’ve had the opportunity to learn from IT teams about how their corporate networks have evolved and the challenges they’re facing today. Most organizations describe a starting point of private connectivity and “castle and moat” security controls: a corporate <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-wan/">WAN</a> composed of point-to-point and <a href="https://www.cloudflare.com/learning/network-layer/what-is-mpls/">MPLS</a> circuits and hardware appliances at the <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">perimeter of physical networks</a>. This architecture model worked well in a pre-cloud world, but as applications have shifted outside of the walls of the corporate data center and users can increasingly work from anywhere, the concept of the perimeter has crumbled.</p><p>In response to these shifts, traditional networking and security vendors have developed a wide array of point solutions to fill specific gaps: a virtual appliance to filter web traffic, a physical one to optimize bandwidth use across multiple circuits, a cloud-based tool to prevent data loss, and so on. IT teams now need to manage a broader-than-ever set of tools and contend with gaps in security, visibility, and control as a result.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4qve46P1BhXgMXPq3Vl99p/6ad6959ea94207ae8578f6a74f4f1923/image3-7.png" />
            
            </figure><p><i>Today’s fragmented corporate network</i></p><p>We view this current state, with IT teams contending with a patchwork of tools and a never-ending ticket queue, as a transitional period to a world where the Internet forms the foundation of the corporate network. Cloudflare One is enabling organizations of all sizes to make the transition to SASE: connecting any traffic source and destination to a secure, fast, reliable global network where all security functions are enforced and traffic is optimized on the way to its destination, whether that’s within a private network or on the public Internet.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4qsXt9CqefEYzvzH18z8Ml/7e4294ece12db47f651af64838d0eeba/image1-18.png" />
            
            </figure><p><i>Secure Access Service Edge architecture</i></p>
    <div>
      <h3>Magic WAN Connector: the easiest way to connect your network to Cloudflare</h3>
      <a href="#magic-wan-connector-the-easiest-way-to-connect-your-network-to-cloudflare">
        
      </a>
    </div>
    <p>The first step to adopting SASE is getting connected – establishing a secure path from your existing network to the closest location where Zero Trust security policies can be applied. Cloudflare offers a broad set of “on-ramps” to enable this connectivity, including client-based and clientless access options for roaming users, application-layer tunnels established by deploying a lightweight software daemon, network-layer connectivity with standard GRE or IPsec tunnels, and physical or virtual interconnection.</p><p>Today, to make this first step to SASE even easier, we’re introducing a new member to this family of on-ramps. The Magic WAN Connector can be deployed in any physical or cloud network to provide automatic connectivity to the closest Cloudflare network location, leveraging your existing last mile Internet connectivity and removing the requirement for IT teams to manually configure network gear to get connected.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Xs3oFe75DtE5m9uqsirPz/6468cd151f0ac9c824e1a12ec8026269/image2-10.png" />
            
            </figure><p><i>Magic WAN Connector provides easy connectivity to Cloudflare’s network</i></p>
    <div>
      <h3>End-to-end traffic management</h3>
      <a href="#end-to-end-traffic-management">
        
      </a>
    </div>
    <p>Hundreds of customer conversations over the past few years have helped us define a slim set of functionality that customers need within their on-premise and cloud networks. They’ve described this as “light branch, heavy cloud” architecture – minimizing the footprint at corporate network locations and shifting the majority of functions that used to be deployed in on-premise hardware to a globally distributed network.</p><p>The Magic WAN Connector includes a critical feature set to make the best possible use of available last mile connectivity. This includes traffic routing, load balancing, and failover; application-aware traffic steering and shaping; and automatic configuration and orchestration. These capabilities connect you automatically to the closest Cloudflare location, where traffic is optimized and routed to its destination. This approach allows you to use Cloudflare’s network – presence in 275 cities and 100 countries across the globe, 11,000+ interconnects and a growing fiber backbone – as an extension of your own.</p><table>
<thead>
  <tr>
    <th>Network function</th>
    <th>Magic WAN Connector</th>
    <th>Cloudflare Network</th>
  </tr>
</thead>
<tbody>
  <tr>
    <td>Branch routing (traffic shaping, failover, QoS)</td>
    <td>Application-aware routing and traffic steering between multiple last mile Internet circuits</td>
    <td>Application-aware routing and traffic steering across the middle mile to get traffic to its destination</td>
  </tr>
  <tr>
    <td>Centralized device management</td>
    <td>Connector config controlled from unified Cloudflare dashboard</td>
    <td>Cloudflare unified dashboard portal, observability, Zero Trust services</td>
  </tr>
  <tr>
    <td>Zero-touch configuration</td>
    <td>Automagic config; boots with smart defaults and sets up tunnels + routes</td>
    <td>Automagic config; Magic WAN Connector pulls down updates from central control plane</td>
  </tr>
  <tr>
    <td>VPN + Firewall</td>
    <td>VPN termination + basic network segmentation included</td>
    <td>Full-featured SASE platform including ZTNA, FWaaS, DDoS, WAAP, and Email Security</td>
  </tr>
  <tr>
    <td>Application-aware path selection</td>
    <td>Application-aware traffic shaping for last mile</td>
    <td>Application-aware Enhanced Internet for middle mile</td>
  </tr>
  <tr>
    <td>Application auto discovery</td>
    <td>Works with Cloudflare network to perform application discovery and classification in real time</td>
    <td>1+1=3: Cloudflare Zero Trust application classification tools reused in this context</td>
  </tr>
  <tr>
    <td><a href="https://www.cloudflare.com/application-services/solutions/app-performance-monitoring/">Application performance visibility</a></td>
    <td>Acts as telemetry source for Cloudflare observability tools</td>
    <td>Cloudflare One Analytics platform &amp; Digital Experience Monitoring</td>
  </tr>
  <tr>
    <td>Software can be deployed in the cloud</td>
    <td>Software can be deployed as a public cloud VM</td>
    <td>All configuration controlled via unified Cloudflare dashboard</td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Fully integrated security from day 0</h3>
      <a href="#fully-integrated-security-from-day-0">
        
      </a>
    </div>
    <p>The Magic WAN Connector, like all of Cloudflare’s products, was developed from the ground up to natively integrate with the rest of the Cloudflare One portfolio. Connecting your network to Cloudflare’s with the Magic WAN Connector means automatic access to a full suite of SASE security capabilities, including our <a href="https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/">Firewall-as-a-Service</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust Network Access</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a>, Data Loss Prevention, Browser Isolation, Cloud Access Security Broker, Email Security, and more.</p>
    <div>
      <h3>Optionally pre-packaged to make deployment easy</h3>
      <a href="#optionally-pre-packaged-to-make-deployment-easy">
        
      </a>
    </div>
    <p>Cloudflare’s goal is to make it as easy as possible to on-ramp to our network, so there are flexible deployment options available for the Magic WAN Connector. You can install the software on physical or virtual Linux appliances that you manage, or purchase it pre-installed and configured on a hardware appliance for the lowest-friction path to SASE connectivity. Plug the device into your existing network and you’ll be automatically connected to and secured by the Cloudflare network within minutes.</p>
    <div>
      <h3>And open source to make it even easier</h3>
      <a href="#and-open-source-to-make-it-even-easier">
        
      </a>
    </div>
    <p>We’re excited to make access to these capabilities available to all kinds of organizations, including those who want to DIY more aspects of their network deployments. To do this, we’ll be open sourcing the Magic WAN Connector software, so customers can even more easily connect to Cloudflare’s network from existing hardware.</p>
    <div>
      <h3>Part of a growing family of on-ramps</h3>
      <a href="#part-of-a-growing-family-of-on-ramps">
        
      </a>
    </div>
    <p>In addition to introducing the Magic WAN Connector today, we’re continuing to grow the options for how customers can connect to us using existing hardware. We are excited to expand our <a href="https://www.cloudflare.com/network-onramp-partners/">Network On-Ramp partnerships</a> to include leading networking companies Cisco,  and SonicWall, joining previous partners Aruba, VMWare, and Arista, to help you onboard traffic to Cloudflare smoothly.</p><p>Customers can connect to us from appliances offered by these vendors using either Anycast GRE or IPSec tunnels. Our partners have validated their solutions and tested that their networking hardware can connect to Cloudflare using these standards. To make setup easier for our mutual customers, detailed configuration instructions will be available soon at both the Cloudflare Developer Docs and partner websites.</p><p>If you are a networking solutions provider and are interested in <a href="https://www.cloudflare.com/partners/technology-partners/">becoming a Network On-Ramp partner</a>, please reach out to us.</p>
    <div>
      <h3>Ready to start building the future of your corporate network?</h3>
      <a href="#ready-to-start-building-the-future-of-your-corporate-network">
        
      </a>
    </div>
    <p>We’re beyond excited to get the Magic WAN Connector into customer hands and help you jumpstart your transition to SASE. Learn more and sign up for early access <a href="https://www.cloudflare.com/lp/magic-wan-connector">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[NaaS]]></category>
            <category><![CDATA[Magic WAN Connector]]></category>
            <guid isPermaLink="false">6m4spUyKCFDb8ABD1SGkBd</guid>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare protection for all your cardinal directions]]></title>
            <link>https://blog.cloudflare.com/cardinal-directions-and-network-traffic/</link>
            <pubDate>Tue, 10 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ In this post, we’ll recap how definitions of corporate network traffic have shifted and how Cloudflare One provides protection for all traffic flows, regardless of source or destination. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>As the Internet becomes the new corporate network, traditional definitions within corporate networking are becoming blurry. Concepts of the corporate WAN, “north/south” and “east/west” traffic, and private versus public application access dissolve and shift their meaning as applications shift outside corporate data center walls and users can access them from anywhere. And security requirements for all of this traffic have become more stringent as new attack vectors continue to emerge.</p><p>The good news: Cloudflare’s got you covered! In this post, we’ll recap how definitions of corporate network traffic have shifted and how Cloudflare One provides protection for all traffic flows, regardless of source or destination.</p>
    <div>
      <h3>North, south, east, and west traffic</h3>
      <a href="#north-south-east-and-west-traffic">
        
      </a>
    </div>
    <p>In the traditional <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">perimeter security model</a>, IT and network teams defined a “trusted” private network made up of the LANs at corporate locations, and the WAN connecting them. Network architects described traffic flowing between the trusted network and another, untrusted one as “north/south,” because those traffic flows are typically depicted spatially on network diagrams like the one below.</p><p>Connected north/south networks could be private, such as one belonging to a partner company, or public like the Internet. Security teams made sure all north/south traffic flowed through one or a few central locations where they could enforce controls across all the “untrusted” traffic, making sure no malicious actors could get in, and no sensitive data could get out.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7nSbqXVgnub8P58qQSHyoA/d17e829d6622a527b3cd69935ace2a2c/image2-8.png" />
            
            </figure><p><i>Network diagram depicting traditional corporate network architecture</i></p><p>Traffic on a single LAN, such as requests from a desktop computer to a printer in an office, was referred to as “east/west” and generally was not subject to the same level of security control. The “east/west” definition also sometimes expanded to include traffic between LANs in a small geographic area, such as multiple buildings on a large office campus. As organizations became more distributed and the need to share information between geographically dispersed locations grew, “east/west” also often included WAN traffic transferred over trusted private connections like <a href="https://www.cloudflare.com/learning/network-layer/what-is-mpls/">MPLS links</a>.</p><p>As applications moved to the Internet and the cloud and users moved out of the office, clean definitions of north/south/east/west traffic started to dissolve. Traffic and data traditionally categorized as “private” and guarded within the boundaries of the corporate perimeter is now commonly transferred over the Internet, and organizations are shifting to cloud-first security models such as <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> which redefine where security controls are enforced across that traffic.</p>
    <div>
      <h3>How Cloudflare keeps you protected</h3>
      <a href="#how-cloudflare-keeps-you-protected">
        
      </a>
    </div>
    <p>Cloudflare’s services can be used to secure and accelerate all of your traffic flows, regardless of whether your network architecture is fully cloud-based and Internet-native or more traditional and physically defined.</p><p>For “north/south” traffic from external users accessing your public applications, Cloudflare provides protection at all layers of the OSI stack and for a wide range of threats. Our <a href="https://www.cloudflare.com/application-security/">application security</a> portfolio, including DDoS protection, Web Application Firewall, API security, Bot Management, and more includes all the tools you need to keep public facing apps safe from malicious actors outside your network; our <a href="https://www.cloudflare.com/network-services/">network services</a> extend similar benefits to all your IP traffic. <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> has you covered for the growing amount of north/south traffic from internal users - <a href="https://www.cloudflare.com/products/zero-trust/zero-trust-network-access/">Zero Trust Network Access</a> provides access to corporate resources on the Internet without sacrificing security, and <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Secure Web Gateway</a> filters outgoing traffic to keep your data safe from malware, ransomware, phishing, command and control, and other threats.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ohLGeQfrRETUF6sV5csSN/2132d0cc24bfbacb9c60d8ab47115794/image3-6.png" />
            
            </figure><p><i>Cloudflare protection for all your traffic flows</i></p><p>As customers adopt SASE and multicloud architectures, the amount of east/west traffic within a single location continues to decrease. Cloudflare One enables customers to use Cloudflare’s network as an extension of theirs for east/west traffic between locations with a variety of secure on-ramp options including a device client, application and network-layer tunnels, and direct connections, and apply Zero Trust policies to all traffic regardless of where it’s headed. Some customers choose to use Cloudflare One for filtering local traffic as well, which involves a quick hop out to the closest <a href="https://www.cloudflare.com/network/">Cloudflare location</a> - less than 50ms from 95% of the world’s Internet-connected population - and enables security and IT teams to enforce consistent security policy across all traffic from a single control plane.</p><p>Because Cloudflare’s services are all delivered on every server in all locations across our network, customers can connect to us to get access to a full “service mesh” for any traffic. As we develop new capabilities, they can apply across any traffic flow regardless of source or destination. Watch out for some new product announcements coming later this week that enhance these integrations even further.</p>
    <div>
      <h3>Get started today</h3>
      <a href="#get-started-today">
        
      </a>
    </div>
    <p>As the Internet becomes the new corporate network, Cloudflare’s mission to help build a better Internet enables us to help you protect anything connected to it. Stay tuned for the rest of CIO Week for new capabilities to make all of your north, south, east, and west traffic faster, more secure, and more reliable, including updates on even more flexible application-layer capabilities for your private network traffic.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[NaaS]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <guid isPermaLink="false">5t3HpgTzfUZiViaBhUw2nD</guid>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[A more sustainable end-of-life for your legacy hardware appliances with Cloudflare and Iron Mountain]]></title>
            <link>https://blog.cloudflare.com/sustainable-end-of-life-hardware/</link>
            <pubDate>Wed, 14 Dec 2022 14:00:00 GMT</pubDate>
            <description><![CDATA[ Today, as part of Cloudflare’s Impact Week, we’re excited to announce an opportunity for Cloudflare customers to make it easier to decommission and dispose of their used hardware appliances sustainably. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1WxJA85fI6x55aF4RuwqUc/270e974f3ece5319c3e847bdbd7647be/image2-24.png" />
            
            </figure><p>Today, as part of Cloudflare’s Impact Week, we’re excited to announce an opportunity for Cloudflare customers to make it easier to decommission and dispose of their used hardware appliances sustainably. We’re partnering with Iron Mountain to offer preferred pricing and discounts for Cloudflare customers that recycle or remarket legacy hardware through its service.</p>
    <div>
      <h2>Replacing legacy hardware with Cloudflare’s network</h2>
      <a href="#replacing-legacy-hardware-with-cloudflares-network">
        
      </a>
    </div>
    <p>Cloudflare’s products enable customers to replace legacy hardware appliances with our <a href="/welcome-to-the-supercloud-and-developer-week-2022/">global network</a>. Connecting to our network enables access to firewall (including <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> and Network Firewalls, Intrusion Detection Systems, etc), DDoS mitigation, VPN replacement, WAN optimization, and other networking and security functions that were traditionally delivered in physical hardware. These are served from our network and delivered as a service. This creates a myriad of benefits for customers including stronger security, better performance, lower operational overhead, and none of the headaches of traditional hardware like capacity planning, maintenance, or upgrade cycles. It’s also better for the Earth: our multi-tenant SaaS approach means more efficiency and a <a href="/understand-and-reduce-your-carbon-impact-with-cloudflare/">lower carbon footprint</a> to deliver those functions.</p><p>But what happens with all that hardware you no longer need to maintain after switching to Cloudflare?</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7L7PZ2pt6xmIMZ1W4j6TIG/793a9e4359d63349e4e5473a247e8e9d/image1-23.png" />
            
            </figure>
    <div>
      <h2>The life of a hardware box</h2>
      <a href="#the-life-of-a-hardware-box">
        
      </a>
    </div>
    <p>The life of a hardware box begins on the factory line at the manufacturer. These are then packaged, shipped and installed at the destination infrastructure where they provide processing power to run front-end products or services, and routing network traffic. Occasionally, if the hardware fails to operate, or its performance declines over time, it will get fixed or will be returned for replacement under the warranty.</p><p>When none of these options work, the hardware box is considered end-of-life and it “dies”. This hardware must be decommissioned by being disconnected from the network, and then physically removed from the data center for disposal.</p><p>The useful lifespan of hardware depends on the availability of newer generations of processors which help realize critical efficiency improvements around cost, performance, and power. In general, the industry standard of hardware decommissioning timeline is between three and six years after installation. There are additional benefits to refreshing these physical assets at the lower end of the hardware lifespan spectrum, keeping your infrastructure at optimal performance.</p><p>In the instance where the hardware still works, but is replaced by newer technologies, it would be such a waste to discard this gear. Instead, there could be recoverable value in this outdated hardware. And simply tossing unwanted hardware into the trash indiscriminately, which will eventually become part of the landfill, causes devastating consequences as these electronic devices contain hazardous materials like lithium, palladium, lead, copper and cobalt or mercury, and those could contaminate the environment. Below, we explain sustainable alternatives and cost-beneficial practices one can pursue to dispose of your infrastructure hardware.</p>
    <div>
      <h3>Option 1: Remarket / Reuse</h3>
      <a href="#option-1-remarket-reuse">
        
      </a>
    </div>
    <p>For hardware that still works, the most sustainable route is to sanitize it of data, refurbish, and resell it in the second-hand market at a depreciated cost. Some IT asset disposition firms would also repurpose used hardware to maximize its market value. For example, harvesting components from a device to build part of another product and selling that at a higher price. For working parts that have very little resale value, companies can also consider reusing them to build a spare parts inventory for replacing failed parts later in the data centers.</p><p>The benefits of remarket and reuse are many. It helps maximize a hardware’s return of investment by including any reclaimed value at end-of-life stage, offering financial benefits to the business. And it reduces discarded electronics, or e-waste and their harmful efforts on our environment, helping socially responsible organizations build a more sustainable business. Lastly, it provides alternatives to individuals and organizations that cannot afford to buy new IT equipment.</p>
    <div>
      <h3>Option 2: Recycle</h3>
      <a href="#option-2-recycle">
        
      </a>
    </div>
    <p>For used hardware that is not able to be remarketed, it is recommended to engage an asset disposition firm to professionally strip it of any valuable and recyclable materials, such as precious metal and plastic, before putting it up for physical destruction. Similar to remarketing, recycling also reduces environmental impact, and cuts down the amount of raw materials needed to manufacture new products.</p><p>A key factor in hardware recycling is a secure chain of custody. Meaning, a supplier has the right certification, preferably its own fleet and secure facilities to properly and securely process the equipment.</p>
    <div>
      <h3>Option 3: Destroy</h3>
      <a href="#option-3-destroy">
        
      </a>
    </div>
    <p>From a sustainable point of view, this route should only be used as a last resort. When hardware does not operate as it is intended to, and has no remarketed nor recycled value, an asset disposition supplier would remove all the asset tags and information from it in preparation for a physical destruction. Depending on disposal policies, some companies would choose to sanitize and destroy all the data bearing hardware, such as SSD or HDD, for security reasons.</p><p>To further maximize recycling value and reduce e-waste, it is recommended to keep security policy up to date on discarded IT equipment and explore the option of reusing working devices after a professional data wiping as much as possible.</p><p>At Cloudflare, we follow an industry-standard capital depreciation timeline, which culminates in recycling actions through the engagement of IT asset disposition partners including Iron Mountain. Through these partnerships, besides data bearing hardware which follows the security policy to be sanitized and destroyed, approximately 99% of the rest decommissioned IT equipment from Cloudflare is sold or recycled.</p>
    <div>
      <h2>Partnering with Iron Mountain to make sustainable goals more accessible</h2>
      <a href="#partnering-with-iron-mountain-to-make-sustainable-goals-more-accessible">
        
      </a>
    </div>
    <p>Hardware discomission can be a burden on a business, from operational strain to complex processes, a lack of streamlined execution to the risk of a data breach. Our experience shows that partnering with an established firm like Iron Mountain who is specialized in IT asset disposition would help kick-start one's hardware recycling journey.</p><p>Iron Mountain has more than two decades of experience working with Hyperscale technology and data centers. A market leader in decommissioning, data security and remarketing capabilities. It has a wide footprint of facilities to support their customers’ sustainability goals globally.</p><p>Today, Iron Mountain has generated more than US$1.5 billion through value recovery and has been continually developing new ways to sell mass volumes of technology for their best use. Other than their end-to-end decommission offering, there are two additional value adding services that Iron Mountain provides to their customers that we find valuable. They offer a quarterly survey report which presents insights in the used market, and a sustainability report that measures the environmental impact based on total hardware processed with their customers.</p>
    <div>
      <h2>Get started today</h2>
      <a href="#get-started-today">
        
      </a>
    </div>
    <p>Get started today with Iron Mountain on your hardware recycling journey and sign up from <a href="https://reach.ironmountain.com/data-centers-decomm-contact-us">here</a>. After receiving the completed contact form, Iron Mountain will consult with you on the best solution possible. It has multiple programs to support including revenue share, fair market value, and guaranteed destruction with proper recycling. For example, when it comes to reselling used IT equipment, Iron Mountain would propose an appropriate revenue split, namely how much percentage of sold value will be shared with the customer, based on business needs. Iron Mountain's secure chain of custody with added solutions such as redeployment, equipment retrieval programs, and onsite destruction can ensure it can tailor the solution that works best for your company's security and environmental needs.</p><p>And in collaboration with Cloudflare, Iron Mountain offers additional two percent on your revenue share of the remarketed items and a five percent discount on the standard fees for other IT asset disposition services if you are new to Iron Mountain and choose to use these services via the link in this blog.</p> ]]></content:encoded>
            <category><![CDATA[Impact Week]]></category>
            <category><![CDATA[Cloudflare Network]]></category>
            <category><![CDATA[Hardware]]></category>
            <category><![CDATA[Sustainability]]></category>
            <guid isPermaLink="false">1I5RdBJCDUlcgzlHiHHztN</guid>
            <dc:creator>May Ma</dc:creator>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare expands Project Pangea to connect and protect (even) more community networks]]></title>
            <link>https://blog.cloudflare.com/project-pangea-expansion/</link>
            <pubDate>Tue, 13 Dec 2022 14:00:00 GMT</pubDate>
            <description><![CDATA[ A year and a half ago, Cloudflare launched Project Pangea to help provide Internet services to underserved communities. Today, we're sharing what we've learned by partnering with community networks, and announcing an expansion of the project. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2jplrBJ1BC6xfrR3F8DzoQ/e8d0f70244f6e44f904459f444ddf5e5/image1-19.png" />
            
            </figure><p>In July 2021, Cloudflare <a href="/pangea/">announced Project Pangea</a> to help underserved community networks get access to the Internet for free. Today, as part of <a href="https://www.cloudflare.com/impact-week/">Impact Week</a>, we’re excited to expand this program to support even more communities by relaxing the <a href="https://www.cloudflare.com/pangea/">technical requirements</a> to participate.</p><p>Previously, in order to be eligible for Project Pangea, participants would need to bring at least a /24 block of IP space for Cloudflare to advertise on their behalf (referred to as “<a href="https://developers.cloudflare.com/byoip/">Bring Your Own IP</a>”). But everyone should have secure, fast, and reliable access to the Internet, without being gated by costly network resources like IPv4 space. Starting now, participants no longer need to bring a /24 in order to access Pangea services: Internet connectivity, DDoS protection, network firewalling, traffic acceleration, and more, are available for free for eligible networks.</p>
    <div>
      <h3>How is Project Pangea helping community networks?</h3>
      <a href="#how-is-project-pangea-helping-community-networks">
        
      </a>
    </div>
    <p>The Internet Society, or ISOC, describes community networks as “when people come together to build and maintain the necessary infrastructure for Internet connection.” Most often, community networks emerge from need, and in response to the lack or absence of available Internet connectivity.</p><p>Cloudflare’s global network, which spans more than 275 cities across the world, provides us with the unique opportunity to help community networks of all shapes and sizes. Cloudflare offers community networks secure, fast, and reliable Internet access through <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a>, and frees up time for community network operators by mitigating malicious traffic. This empowers operators to focus more on managing the <a href="/last-mile-insights/">last mile</a> connections to network users.</p><p>By placing a community network behind Cloudflare with Magic Transit, those networks are automatically protected against <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service</a> attacks which often overwhelm network and security devices, or undersized Internet connections. Beyond mitigating DDoS attacks, Cloudflare also offers <a href="https://www.cloudflare.com/magic-firewall/">Magic Firewall</a> through Project Pangea. Magic Firewall is a firewall as a service, and enables operators to remove physical firewalls and still enforce network level firewall rules. Implementing Magic Firewall in place of a physical firewall removes a single point of failure, and another device which needs to be upgraded during a maintenance window.</p><p>As community networks grow to support more users, the bandwidth required and the exposure to attack traffic also grows. One challenge with growing a network and providing security is that on premise firewalls need to be replaced or upgraded when they hit specific bandwidth limitations. The security appliance is often an expensive bottleneck to upgrade, preventing networks from helping more users. One unique benefit to using Cloudflare for network connectivity is that unlike an on premise network firewall, operators never need to upgrade Cloudflare. Incoming traffic is distributed across hundreds of locations, allowing Cloudflare to provide security services, and block attacks across the whole Cloudflare network.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5I04lgj13q6VUMufBbyYTJ/f6dfe08fc3696cdfb481c8029c857c7c/image2-18.png" />
            
            </figure><p><i>One of several possible</i> <a href="/pangea/"><i>deployment models</i></a> <i>Pangea participants can use to get connected</i></p>
    <div>
      <h3>Pangea participant highlight: Ayva Networks</h3>
      <a href="#pangea-participant-highlight-ayva-networks">
        
      </a>
    </div>
    <p>Ayva Networks is a not-for-profit Wireless Internet Service Provider that provides backbone and Internet services to approximately 400 households in the rural mountain areas west of Boulder, Colorado. In 2023, they will grow their network to provide more gigabit network access. Nick Wilson from Ayva Networks explains that "<i>reliable Internet in our community isn't a privilege, it's an essential utility, and often provides the only means of communication for many homes in our region as cellular service is generally rare.</i>"</p><p>After connecting through Magic Transit, Nick shared "<i>speeds are noticeably better on Magic Transit, especially for those who work with cloud resources</i>" and that "<i>our firewalls deal with a lot less background noise</i>" due to all the attack traffic mitigated by Cloudflare.</p><p>Colorado's environment can be pretty extreme, and present many challenges to running a Wireless Internet Service Provider. Ayva Networks responds to 100+ mph wind, massive hail, blizzards, flooding, insects, lightning, and fire. By using Magic Transit, Ayva Networks is better able “<i>to engineer traffic flows much more granularly than we otherwise are able to with BGP alone, and has become an essential tool for us in mitigating and responding to outages.</i>"</p>
    <div>
      <h3>What have we learned since launching Project Pangea?</h3>
      <a href="#what-have-we-learned-since-launching-project-pangea">
        
      </a>
    </div>
    <p>We’ve been privileged to help a lot of great organizations like Ayva Networks connect more people to the Internet. Many community networks are passion projects, and are run by volunteers who want to make a difference in their community. Volunteers often only have limited time to contribute, and this has emphasized how simple we need to make it for organizations of any size to get up and running behind Cloudflare.</p><p>Another challenge we did not foresee is that many community networks do not have their own network IP address space. IP addresses are needed by all computers to communicate on the Internet. Until today, Magic Transit and Magic Firewall required that community networks provide their own IP addresses. We recently extended Magic Transit to support customers without their own IP address space with <a href="/protect-all-network-traffic/">Magic Transit with Cloudflare IPs</a>, and we’re excited to bring this functionality to community networks via Project Pangea.</p>
    <div>
      <h3>How can my community network get involved?</h3>
      <a href="#how-can-my-community-network-get-involved">
        
      </a>
    </div>
    <p>Check out our <a href="https://www.cloudflare.com/pangea/">landing page</a> to learn more and apply for Project Pangea today.</p> ]]></content:encoded>
            <category><![CDATA[Impact Week]]></category>
            <category><![CDATA[Project Pangea]]></category>
            <category><![CDATA[Better Internet]]></category>
            <guid isPermaLink="false">3ArYFZgZKX6vlpf4KQrqaa</guid>
            <dc:creator>Ben Ritter</dc:creator>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare partners to simplify China connectivity for corporate networks]]></title>
            <link>https://blog.cloudflare.com/cloudflare-one-in-china/</link>
            <pubDate>Tue, 29 Nov 2022 16:35:47 GMT</pubDate>
            <description><![CDATA[ Today we’re excited to announce expansion of our Cloudflare One product suite to tackle these problems, with the goal of creating the best SASE experience for users and organizations in China ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/59bEi3ASQdbRkn2o4KBhIp/14f5f5a20f816a36f1a48100134f8443/image2-57.png" />
            
            </figure><p>IT teams have historically faced challenges with performance, security, and reliability for employees and network resources in mainland China. Today, along with our strategic partners, we’re excited to announce expansion of our Cloudflare One product suite to tackle these problems, with the goal of creating the best <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> experience for users and organizations in China.</p><p>Cloudflare One, our comprehensive SASE platform, allows organizations to connect any source or destination and apply single-pass security policies from one unified control plane. Cloudflare One is built on our <a href="https://www.cloudflare.com/network/">global network</a>, which spans 275 cities across the globe and is within 50ms of 95% of the world’s Internet-connected population. Our ability to serve users extremely close to wherever they’re working—whether that’s in a corporate office, their home, or a <a href="https://www.cloudflare.com/learning/access-management/coffee-shop-networking/">coffee shop</a>—has been a key reason customers choose our platform since day one.</p><p>In 2015, we extended our <a href="https://www.cloudflare.com/application-services/">Application Services</a> portfolio to cities in mainland China; in 2020, we expanded these capabilities to offer better performance and security through our strategic partnership with <a href="/cloudflare-partners-with-jd-cloud/">JD Cloud</a>. Today, we’re unveiling our latest steps in this journey: extending the capabilities of Cloudflare One to users and organizations in mainland China, through additional strategic partnerships. Let’s break down a few ways you can achieve better connectivity, security, and performance for your China network and users with Cloudflare One.</p>
    <div>
      <h3>Accelerating traffic from China networks to private or public resources outside of China through China partner networks</h3>
      <a href="#accelerating-traffic-from-china-networks-to-private-or-public-resources-outside-of-china-through-china-partner-networks">
        
      </a>
    </div>
    <p>Performance and reliability for traffic flows across the mainland China border have been a consistent challenge for IT teams within multinational organizations. Packets crossing the China border often experience reachability, congestion, loss, and latency challenges on their way to an origin server outside of China (and vice versa on the return path). Security and IT teams can also struggle to enforce consistent policies across this traffic, since many aspects of China networking are often treated separately from the rest of an organization’s global network because of their unique challenges.</p><p>Cloudflare is excited to address these challenges with our strategic China partners, combining our network infrastructure to deliver a better end-to-end experience to customers. Here’s an example architecture demonstrating the optimized packet flow with our partners and Cloudflare together:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/doTXbrCkWraGqKxZeLky4/6899fdb9b2492b3f150cceff8beefef0/1-7.png" />
            
            </figure><p>Acme Corp, a multinational organization, has offices in Shanghai and Beijing. Users in those offices need to reach resources hosted in Acme’s data centers in Ashburn and London, as well as SaaS applications like Jira and Workday. Acme procures last mile connectivity at each office in mainland China from Cloudflare’s China partners.</p><p>Cloudflare’s partners route local traffic to its destination within China, and global traffic across a secure link to the closest available Cloudflare data center on the other side of the Chinese border.</p><p>At that data center, Cloudflare enforces a full stack of security functions across the traffic including network <a href="https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/">firewall-as-a-service</a> and Secure Web Gateway policies. The traffic is then routed to its destination, whether that’s another connected location on Acme’s private network (via Anycast GRE or IPsec tunnel or <a href="https://www.cloudflare.com/network-interconnect/">direct connection</a>) or a resource on the public Internet, across an optimized middle-mile path. Acme can choose whether Internet-bound traffic egresses from a shared or dedicated Cloudflare-owned IP pool.</p><p>Return traffic back to Acme’s connected network location in China takes the opposite path: source → Cloudflare’s network (where, again, security policies are applied) → Partner network → Acme local network.</p><p>Cloudflare and our partners are excited to help customers solve challenges with cross-border performance and security. This <a href="https://www.cloudflare.com/application-services/solutions/">solution</a> is easy to deploy and available now - reach out to your account team to get started today.</p>
    <div>
      <h3>Enforcing uniform security policy across remote China user traffic</h3>
      <a href="#enforcing-uniform-security-policy-across-remote-china-user-traffic">
        
      </a>
    </div>
    <p>The same challenges that impact connectivity from China-based networks reaching out to global resources also impact remote users working in China. Expanding on the network connectivity solution we just described, we’re looking forward to improving user connectivity to cross-border resources by adapting our device client (WARP). This solution will also allow security teams to enforce consistent policy across devices connecting to corporate resources, rather than managing separate security stacks for users inside and outside of China.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7aU3IiM5L9cZa0n6oQvd7q/669873c7e709dc2e18e271defe8e84a4/2-2.png" />
            
            </figure><p>Acme Corp has users that are either based in or traveling to China for business and need to access corporate resources that are hosted beyond China, without necessarily being physically in an Acme office in order to enable this access. Acme uses an MDM provider to install the WARP client on company-managed devices and enroll them in Acme’s Cloudflare Zero Trust organization. Within China, the WARP client utilizes Cloudflare’s China partner networks to establish the same Wireguard tunnel to the nearest Cloudflare point of presence outside of mainland China. Cloudflare’s partners act as the carrier of our customers’ IP traffic through their acceleration service and the content remains secure inside WARP.</p><p>Just as with traffic routed via our partners to Cloudflare at the network layer, WARP client traffic arriving at its first stop outside of China is filtered through Gateway and Access policies. Acme’s IT administrators can choose to enforce the same, or additional policies for device traffic from China vs other global locations. This setup makes life easier for Acme’s IT and security teams - they only need to worry about installing and managing a single device client in order to grant access and control security regardless of where employees are in the world.</p><p>Cloudflare and our partners are actively testing this solution in private beta. If you’re interested in getting access as soon as it’s available to the broader public, please contact your account team.</p>
    <div>
      <h3>Extending SASE filtering to local China data centers (future)</h3>
      <a href="#extending-sase-filtering-to-local-china-data-centers-future">
        
      </a>
    </div>
    <p>The last two use cases have focused primarily on granting network and user access from within China to resources on the other side of the border - but what about improving connectivity and security for local traffic?</p><p>We’ve heard from both China-based and multinational organizations that are excited to have the full suite of Cloudflare One functions available across China to achieve a full SASE architecture just a few milliseconds from everywhere their users and applications are in the world. We’re actively working toward this objective with our strategic partners, expanding upon the current availability of our application services platform across 45 data centers in 38 unique cities in mainland China.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/UxurdJVTv7uXteViJbplD/232f198ea2e618df95c9db12bcc934e8/image4-36.png" />
            
            </figure><p>Talk to your account team today to get on the waitlist for the full suite of Cloudflare One functions delivered across our China Network and be notified as soon as beta access is available!</p>
    <div>
      <h3>Get started today</h3>
      <a href="#get-started-today">
        
      </a>
    </div>
    <p>We’re so excited to help organizations improve connectivity, performance and security for China networks and users. Contact your account team today to learn more about how Cloudflare One can help you transform your network and achieve a SASE architecture inside and outside of mainland China.</p><p>If you'd like to learn more, join us for a live webinar on Dec 6, 2022 10:00 AM PST through this <a href="https://gateway.on24.com/wcc/eh/2153307/lp/4010917/navigating-the-challenges-of-connecting-with-your-audience-in-china?partnerref=blog">link</a> where we can answer all your questions about connectivity in China.</p> ]]></content:encoded>
            <category><![CDATA[China]]></category>
            <category><![CDATA[Network]]></category>
            <guid isPermaLink="false">3qxWHx7DkFzf8F2FAc6UDl</guid>
            <dc:creator>Kyle Krum</dc:creator>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[A stronger bridge to Zero Trust]]></title>
            <link>https://blog.cloudflare.com/stronger-bridge-to-zero-trust/</link>
            <pubDate>Thu, 23 Jun 2022 15:26:28 GMT</pubDate>
            <description><![CDATA[ Today, we’re announcing more enhancements to the Cloudflare One platform that make a transition from legacy architecture to the Zero Trust network of the future easier than ever ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We know that migration to Zero Trust architecture won’t be an overnight process for most organizations, especially those with years of traditional hardware deployments and networks stitched together through M&amp;A. But part of why we’re so excited about Cloudflare One is that it provides a bridge to <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> for companies migrating from legacy network architectures.</p><p>Today, we’re doubling down on this — announcing more enhancements to the Cloudflare One platform that make a transition from legacy architecture to the Zero Trust network of the future easier than ever: new plumbing for more Cloudflare One on-ramps, expanded support for additional IPsec parameters, and easier on-ramps from your existing <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-sd-wan/">SD-WAN appliances</a>.</p>
    <div>
      <h3>Any on- or off-ramp: fully composable and interoperable</h3>
      <a href="#any-on-or-off-ramp-fully-composable-and-interoperable">
        
      </a>
    </div>
    <p>When we announced <a href="/cloudflare-one/">our vision for Cloudflare One</a>, we emphasized the importance of allowing customers to connect to our network however they want — with hardware devices they’ve already deployed, with any carrier they already have in place, with existing technology standards like IPsec tunnels or more Zero Trust approaches like our lightweight <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/">application connector</a>. In hundreds of customer conversations since that launch, we’ve heard you reiterate the importance of this flexibility. You need a platform that meets you where you are today <i>and</i> gives you a smooth path to your future network architecture by acting as a global router with a single control plane for any way you want to connect and manage your network traffic.</p><p>We’re excited to share that over the past few months, the last pieces of this puzzle have fallen into place, and customers can now use any Cloudflare One on-ramp and off-ramp together to route traffic seamlessly between devices, offices, data centers, cloud properties, and self-hosted or SaaS applications. This includes (new since our last announcement, and rounding out the compatibility matrix below) the ability to route traffic from networks connected with a GRE tunnel, IPsec tunnel, or CNI to applications connected with <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/">Cloudflare Tunnel</a>.</p><table><tr><td><p><b>Fully composable Cloudflare One on-ramps</b></p></td><td><p></p></td><td><p></p></td><td><p></p></td><td><p></p></td><td><p></p></td><td><p></p></td></tr><tr><td><p><b>From ↓ To →</b></p></td><td><p><b>BYOIP</b></p></td><td><p><b>WARP client</b></p></td><td><p><b>CNI</b></p></td><td><p><b>GRE tunnel</b></p></td><td><p><b>IPSec tunnel</b></p></td><td><p><b>Cloudflare Tunnel</b></p></td></tr><tr><td><p><b>BYOIP</b></p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td></tr><tr><td><p><b>WARP client</b></p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td></tr><tr><td><p><b>CNI</b></p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td></tr><tr><td><p><b>GRE tunnel</b></p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td></tr><tr><td><p><b>IPSec tunnel</b></p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td><td><p>✅</p></td></tr></table><p>This interoperability is key to organizations’ strategy for migrating from legacy network architecture to Zero Trust. You can start by improving performance and enhancing security using technologies that look similar to what you’re used to today, and incrementally upgrade to Zero Trust at a pace that makes sense for your organization.</p>
    <div>
      <h3>Expanded options and easier management of Anycast IPsec tunnels</h3>
      <a href="#expanded-options-and-easier-management-of-anycast-ipsec-tunnels">
        
      </a>
    </div>
    <p>We’ve seen incredibly exciting demand since our launch of <a href="/anycast-ipsec/">Anycast IPsec as an on-ramp for Cloudflare One</a> back in December. Since IPsec has been the industry standard for encrypted network connectivity for almost thirty years, there are many implementations and parameters available to choose from, and our customers are using a wide variety of network devices to terminate these tunnels. To make the process of setting up and managing IPsec tunnels from any network easier, we’ve built on top of our initial release with support for new parameters, a new UI and Terraform provider support, and step-by-step guides for popular implementations.</p><ul><li><p><b>Expanded support for additional configuration parameters:</b> We started with a small set of default parameters based on industry best practices, and have expanded from there - you can see the up-to-date list in our <a href="https://developers.cloudflare.com/magic-wan/tutorials/ipsec/#supported-configuration-parameters">developer docs</a>. Since we wrote our own IPsec implementation from scratch (read more about why in our <a href="/anycast-ipsec/">announcement blog</a>), we’re able to add support for new parameters with just a single (quick!) development cycle. If the settings you’re looking for aren’t on our list yet, contact us to learn about our plans for supporting them.</p></li><li><p><b>Configure and manage tunnels from the Cloudflare dashboard:</b> Anycast IPsec and GRE tunnel configuration can be managed with just a few clicks from the Cloudflare dashboard. After creating a tunnel, you can view connectivity to it from every Cloudflare location worldwide and run traceroutes or <a href="/packet-captures-at-edge/">packet captures on-demand</a> to get a more in-depth view of your traffic for troubleshooting.</p></li><li><p><b>Terraform provider support to manage your network as code:</b> Busy IT teams love the fact that they can manage all their network configuration from a single place with <a href="https://registry.terraform.io/providers/cloudflare/cloudflare/3.10.1/docs/resources/ipsec_tunnel">Terraform</a>.</p></li><li><p><b>Step-by-step guides for setup with your existing devices:</b> We’ve developed and will continue to add new guides in our <a href="https://developers.cloudflare.com/magic-wan/tutorials/ipsec/">developer docs</a> to walk you through establishing IPsec tunnels with Cloudflare from a variety of devices.</p></li></ul>
    <div>
      <h3>(Even) easier on-ramp from your existing SD-WAN appliances</h3>
      <a href="#even-easier-on-ramp-from-your-existing-sd-wan-appliances">
        
      </a>
    </div>
    <p>We’ve heard from you consistently that you want to be able to use whatever hardware you have in place today to connect to Cloudflare One. One of the easiest on-ramp methods is leveraging your existing SD-WAN appliances to connect to us, especially for organizations with many locations. Previously, we announced <a href="https://www.cloudflare.com/network-onramp-partners/">partnerships with leading SD-WAN providers</a> to make on-ramp configuration even smoother; today, we’re expanding on this by introducing new <a href="https://developers.cloudflare.com/magic-wan/get-started/">integration guides</a> for additional devices and tunnel mechanisms including Cisco Viptela. Your IT team can follow these verified step-by-step instructions to easily configure connectivity to Cloudflare’s network.</p>
    <div>
      <h3>Get started on your Zero Trust journey today</h3>
      <a href="#get-started-on-your-zero-trust-journey-today">
        
      </a>
    </div>
    <p>Our team is helping thousands of organizations like yours transition from legacy network architecture to Zero Trust - and we love hearing from you about the new products and features we can continue building to make this journey even easier. <a href="https://www.cloudflare.com/cloudflare-one/#transformation">Learn more about Cloudflare One</a> or reach out to your account team to talk about how we can partner to transform your network, starting today!</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">3DiPQyVbUoRHG459FuDXZx</guid>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Next generation intrusion detection: an update on Cloudflare’s IDS capabilities]]></title>
            <link>https://blog.cloudflare.com/intrusion-detection/</link>
            <pubDate>Tue, 21 Jun 2022 13:12:47 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s IDS capabilities operate across all of your network traffic - any IP port or protocol — whether it flows to your IPs that we advertise on your behalf, IPs we lease to you, or soon, traffic within your private network. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1aRh3bYrMalEcfeBy9hvbT/9a6b9404cc7ce952904f0688274cd76e/image1-21.png" />
            
            </figure><p>In an ideal world, intrusion detection would apply across your entire network - data centers, cloud properties, and branch locations. It wouldn’t impact the performance of your traffic. And there’d be no capacity constraints. Today, we’re excited to bring this one step closer to reality by announcing the private beta of Cloudflare’s intrusion detection capabilities: live monitoring for threats across all of your network traffic, delivered as-a-service — with none of the constraints of legacy hardware approaches.</p><p>Cloudflare’s Network Services, part of Cloudflare One, help you connect and secure your entire <a href="https://www.cloudflare.com/learning/network-layer/enterprise-networking/">corporate network</a> — data center, cloud, or hybrid — from DDoS attacks and other malicious traffic. You can apply <a href="/replace-your-hardware-firewalls-with-cloudflare-one/">Firewall rules</a> to keep unwanted traffic out or enforce a positive security model, and integrate custom or managed IP lists into your firewall policies to block traffic associated with known malware, bots, or anonymizers. Our new Intrusion Detection System (IDS) capabilities expand on these critical security controls by actively monitoring for a wide range of known threat signatures in your traffic.</p>
    <div>
      <h2>What is an IDS?</h2>
      <a href="#what-is-an-ids">
        
      </a>
    </div>
    <p>Intrusion Detection Systems are traditionally deployed as standalone appliances but often incorporated as features in more modern or higher end firewalls. They expand the security coverage of traditional firewalls - which focus on blocking traffic you <i>know</i> you don’t want in your network - to analyze traffic against a broader threat database, detecting a variety of sophisticated attacks such as ransomware, data exfiltration, and network scanning based on signatures or “fingerprints” in network traffic. Many IDSs also incorporate anomaly detection, monitoring activity against a baseline to identify unexpected traffic patterns that could indicate malicious activity. (If you’re interested in the evolution of network firewall capabilities, we recommend <a href="/replace-your-hardware-firewalls-with-cloudflare-one/">this</a> where we’ve dived deeper on the topic).</p>
    <div>
      <h2>What problems have users encountered with existing IDS solutions?</h2>
      <a href="#what-problems-have-users-encountered-with-existing-ids-solutions">
        
      </a>
    </div>
    <p>We’ve interviewed tons of customers about their experiences deploying IDS and the pain points they’re hoping we can solve. Customers have mentioned the full list of historical problems we hear frequently with other hardware-based security solutions, including capacity planning, location planning and back hauling traffic through a central location for monitoring, downtime for installation, maintenance, and upgrades, and vulnerability to congestion or failure with large volumes of traffic (e.g. DDoS attacks).</p><p>Customers we talked to also consistently cited challenges making trade off decisions between <a href="https://www.cloudflare.com/learning/network-layer/network-security/">security</a> and performance for their network traffic. One network engineer explained:</p><blockquote><p><i>“I know my security team hates me for this, but I can’t let them enable the IDS function on our on-prem firewalls - in the tests my team ran, it cut my throughput by almost a third. I know we have this gap in our security now, and we’re looking for an alternative way to get IDS coverage for our traffic, but I can’t justify slowing down the network for everyone in order to catch some theoretical bad traffic.”</i></p></blockquote><p>Finally, customers who did choose to take the performance hit and invest in an IDS appliance reported that they often mute or ignore the feed of alerts coming into their SOC after turning it on. With the amount of noise on the Internet and the potential risk of missing an important signal, IDSs can end up generating a lot of false positives or non-actionable notifications. This volume can lead busy SOC teams to get alert fatigue and end up silencing potentially important signals buried in the noise.</p>
    <div>
      <h2>How is Cloudflare tackling these problems?</h2>
      <a href="#how-is-cloudflare-tackling-these-problems">
        
      </a>
    </div>
    <p>We believe there’s a more elegant, efficient, and effective way to monitor all of your network traffic for threats without introducing performance bottlenecks or burning your team out with non-actionable alerts. Over the past year and a half, we’ve learned from your feedback, experimented with different technology approaches, and developed a solution to take those tough trade off decisions out of the picture.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Id6E00d62OVsRV9dzrqDB/16abf903347574b6835f48363b5f10da/unnamed-2.png" />
            
            </figure>
    <div>
      <h3>One interface across all your traffic</h3>
      <a href="#one-interface-across-all-your-traffic">
        
      </a>
    </div>
    <p>Cloudflare’s IDS capabilities operate across all of your network traffic - any IP port or protocol — whether it flows to your <a href="https://developers.cloudflare.com/byoip/">IPs that we advertise on your behalf</a>, <a href="/protect-all-network-traffic/">IPs we lease to you</a>, or soon, traffic <a href="https://www.cloudflare.com/magic-wan/">within your private network</a>. You can enforce consistent monitoring and security control across your entire network in one place.</p>
    <div>
      <h3>No more hardware headaches</h3>
      <a href="#no-more-hardware-headaches">
        
      </a>
    </div>
    <p>Like all of our security functions, we built our IDS from scratch in software, and it is deployed across every server on Cloudflare’s global Anycast network. This means:</p><ul><li><p><b>No more capacity planning</b>: Cloudflare’s entire global network capacity is now the capacity of your IDS - currently 142 Tbps and counting.</p></li><li><p><b>No more location planning</b>: No more picking regions, backhauling traffic to central locations, or deploying primary and backup appliances - because every server runs our IDS software and traffic is automatically attracted to the closest network location to its source, redundancy and failover are built in.</p></li><li><p><b>No maintenance downtime</b>: Improvements to Cloudflare’s IDS capabilities, like all of our products, are deployed continuously across our global network.</p></li></ul>
    <div>
      <h3>Threat intelligence from across our interconnected global network</h3>
      <a href="#threat-intelligence-from-across-our-interconnected-global-network">
        
      </a>
    </div>
    <p>The attack landscape is constantly evolving, and you need an IDS that stays ahead of it. Because Cloudflare’s IDS is delivered in software we wrote from the ground up and maintain, we’re able to continuously feed threat intelligence from the 20+ million Internet properties on Cloudflare back into our policies, keeping you protected from both known and new attack patterns.</p><p>Our threat intelligence combines open-source feeds that are maintained and trusted by the security community - like <a href="https://suricata.io/">Suricata</a> threat signatures - with information collected from our unique vantage point as an <a href="https://www.cloudflare.com/network/">incredibly interconnected network</a> carrying a significant percentage of all Internet traffic. Not only do we share these insights publicly through tools like <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>; we also feed them back into our security tools including IDS so that our customers are protected as quickly as possible from emerging threats. Cloudflare’s newly announced <a href="/introducing-cloudforce-one-threat-operations-and-threat-research/">Threat Intel team</a> will augment these capabilities even further, applying additional expertise to understanding and deriving insights from our network data.</p>
    <div>
      <h2>Excited to get started?</h2>
      <a href="#excited-to-get-started">
        
      </a>
    </div>
    <p>If you’re an <a href="https://developers.cloudflare.com/magic-firewall/plans/#advanced-features">Advanced Magic Firewall</a> customer, you can get access to these features in private beta starting now. You can reach out to your account team to learn more or get started now - we can’t wait to hear your feedback as we continue to develop these capabilities!</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">6UtXbwEndH50FbqwsxgNNq</guid>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zero Trust, SASE and SSE: foundational concepts for your next-generation network]]></title>
            <link>https://blog.cloudflare.com/zero-trust-sase-and-sse-foundational-concepts-for-your-next-generation-network/</link>
            <pubDate>Sun, 19 Jun 2022 17:13:39 GMT</pubDate>
            <description><![CDATA[ If you’ve been thinking about Zero Trust or SASE, Cloudflare One Week will demonstrate why Cloudflare One is one of the most complete SASE offerings in the market, with some of the best performance, and why it will only continue to improve ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/21UFByweCBqJi9J6nQXevx/325e292c01cc164c1b3b0dc366879251/unnamed.png" />
            
            </figure><p>If you’re a security, network, or IT leader, you’ve most likely heard the terms Zero Trust, Secure Access Service Edge (SASE) and Secure Service Edge (SSE) used to describe a new approach to <a href="https://www.cloudflare.com/learning/network-layer/enterprise-networking/">enterprise network architecture</a>. These frameworks are shaping a wave of technology that will fundamentally change the way corporate networks are built and operated, but the terms are often used interchangeably and inconsistently. It can be easy to get lost in a sea of buzzwords and lose track of the goals behind them: a more secure, faster, more reliable experience for your end users, applications, and networks. Today, we’ll break down each of these concepts — Zero Trust, SASE, and SSE — and outline the critical components required to achieve these goals. An evergreen version of this content is available at our Learning Center <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">here</a>.</p>
    <div>
      <h3>What is Zero Trust?</h3>
      <a href="#what-is-zero-trust">
        
      </a>
    </div>
    <p>Zero Trust is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside the network perimeter. This is in contrast to the traditional perimeter-based security model, where users are able to access resources once they’re granted access to the network — also known as a “castle and moat” architecture.</p><p>More simply put: <a href="https://www.cloudflare.com/learning/network-layer/network-security/">traditional IT network security</a> trusts anyone and anything inside the network. A Zero Trust architecture trusts no one and nothing. You can learn more about Zero Trust security <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">here</a>.</p>
    <div>
      <h3>What is Secure Access Service Edge (SASE)?</h3>
      <a href="#what-is-secure-access-service-edge-sase">
        
      </a>
    </div>
    <p>Gartner introduced SASE as the framework to implement a Zero Trust architecture across any organization. SASE combines <a href="https://www.cloudflare.com/learning/network-layer/what-is-sdn/">software-defined networking capabilities</a> with a number of <a href="https://www.cloudflare.com/network-security/">network security functions</a>, all of which are delivered from a single cloud platform. In this way, SASE enables employees to authenticate and securely connect to internal resources from anywhere, and gives organizations better control over the traffic and data that enters and leaves their internal network.</p><p>The Secure Access component of SASE includes defining Zero Trust security policies across user devices and applications as well as branch, data center, and cloud traffic. The Service Edge component allows all traffic, regardless of its location, to pass through the Secure Access controls — without requiring back hauling to a central “hub” where those controls are enforced. You can learn more about SASE <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">here</a>.</p>
    <div>
      <h3>What is Security Service Edge (SSE)?</h3>
      <a href="#what-is-security-service-edge-sse">
        
      </a>
    </div>
    <p>SSE, also coined by Gartner, is a subset of SASE functionality specifically focused on security enforcement capabilities. It is a common stepping stone to a full SASE deployment, which extends SSE security controls to the corporate <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-wan/">Wide Area Network (WAN)</a> and includes software-defined networking capabilities such as traffic shaping and quality of service. You can learn more about SSE <a href="https://www.cloudflare.com/learning/access-management/security-service-edge-sse/">here</a>.</p>
    <div>
      <h2>What makes up SASE?</h2>
      <a href="#what-makes-up-sase">
        
      </a>
    </div>
    <p>The most commonly available definitions of SASE list a number of security functions like Zero Trust Network Access (ZTNA) and Cloud Access Security Broker (CASB), focusing on <b>what</b> a SASE platform needs to do. Security functions are a critical piece of the story, but these definitions are incomplete: they miss describing <b>how</b> the functions are achieved, which is just as important.</p><p>The complete definition of SASE builds on this list of security functions to include three distinct aspects: secure access, on-ramps, and service edge.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7aoYXIpKOMM3TuXTw0EdDJ/92741252716755789f174b68925ca257/image7-3.png" />
            
            </figure>
    <div>
      <h2>Cloudflare One: a comprehensive SASE platform</h2>
      <a href="#cloudflare-one-a-comprehensive-sase-platform">
        
      </a>
    </div>
    <p>Cloudflare One is a complete SASE platform that combines a holistic set of secure access functions with flexible on-ramps to connect any traffic source and destination, all delivered on Cloudflare’s global network that acts as a blazing fast and reliable service edge. For organizations who want to start with SSE as a stepping stone to SASE, Cloudflare One also has you covered. It’s completely composable, so components can be deployed individually to address immediate use cases and build toward a full SASE architecture at your own pace.</p><p>Let’s break down each of the components of a SASE architecture in more detail and explain how Cloudflare One delivers them.</p>
    <div>
      <h2>Secure access: security functions</h2>
      <a href="#secure-access-security-functions">
        
      </a>
    </div>
    <p>Secure Access functions operate across your traffic to keep your users, applications, network, and data secure. In an <a href="https://en.wikipedia.org/wiki/IPO_model">input/process/output (IPO) model</a>, you can think of secure access as the <i>processes</i> that monitor and act on your traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ouEbE4c8xtfUrq3swLUZE/6544982bc674086b5187e2bc90286304/image1-10.png" />
            
            </figure>
    <div>
      <h3>Zero Trust Network Access (ZTNA)</h3>
      <a href="#zero-trust-network-access-ztna">
        
      </a>
    </div>
    <p>Zero Trust Network Access is the technology that makes it possible to implement a Zero Trust security model by requiring strict verification for every user and every device before authorizing them to access internal resources. Compared to traditional virtual private networks (VPNs), which grant access to an entire local network at once, ZTNA only grants access to the specific application requested and denies access to applications and data by default.</p><p>ZTNA can work together with other application security functions, like <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewalls</a>, <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS protection</a>, and <a href="https://www.cloudflare.com/learning/bots/what-is-bot-management/">bot management</a>, to provide complete protection for applications on the public Internet. More on ZTNA <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">here</a>.</p><p><img src="http://staging.blog.mrk.cfdata.org/content/images/2022/06/image2-14.png" />Cloudflare One includes a ZTNA solution, <a href="https://www.cloudflare.com/products/zero-trust/access/">Cloudflare Access</a>, which operates in client-based or clientless modes to grant access to self-hosted and SaaS applications.</p>
    <div>
      <h3>Secure Web Gateway (SWG)</h3>
      <a href="#secure-web-gateway-swg">
        
      </a>
    </div>
    <p>A Secure Web Gateway operates between a corporate network and the Internet to enforce security policies and protect company data. Whether traffic originates from a user device, branch office, or application, SWGs provide layers of protection including <a href="https://www.cloudflare.com/learning/access-management/what-is-url-filtering/">URL filtering</a>, malware detection and blocking, and application control. As a higher and higher percentage of corporate network traffic shifts from private networks to the Internet, deploying SWG has become critical to keeping company devices, networks, and data safe from a variety of security threats.</p><p>SWGs can work together with other tools including <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewalls</a> and <a href="https://www.cloudflare.com/learning/security/what-is-next-generation-firewall-ngfw/">Network Firewalls</a> to secure both inbound and outbound traffic flows across a corporate network. They can also integrate with <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation</a> (RBI) to prevent malware and other attacks from affecting corporate devices and networks, without completely blocking user access to Internet resources. More on SWG <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">here</a>.</p><p><img src="http://staging.blog.mrk.cfdata.org/content/images/2022/06/image4-8.png" />Cloudflare One includes a SWG solution, <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a>, which provides DNS, HTTP, and Network filtering for traffic from user devices and network locations.</p>
    <div>
      <h3>Remote Browser Isolation (RBI)</h3>
      <a href="#remote-browser-isolation-rbi">
        
      </a>
    </div>
    <p>Browser isolation is a technology that keeps browsing activity secure by separating the process of loading webpages from the user devices displaying the webpages. This way, potentially malicious webpage code does not run on a user’s device, preventing malware infections and other cyber attacks from impacting both user devices and internal networks.</p><p>RBI works together with other secure access functions - for example, security teams can configure Secure Web Gateway policies to automatically isolate traffic to known or potentially suspicious websites. More on Browser Isolation <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">here</a>.</p><p><img src="http://staging.blog.mrk.cfdata.org/content/images/2022/06/image9-6.png" />Cloudflare One includes <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Browser Isolation</a>. In contrast to legacy remote browser approaches, which send a slow and clunky version of the web page to the user, Cloudflare Browser Isolation draws an exact replica of the page on the user’s device, and then delivers that replica so quickly that it feels like a regular browser.</p>
    <div>
      <h3>Cloud Access Security Broker (CASB)</h3>
      <a href="#cloud-access-security-broker-casb">
        
      </a>
    </div>
    <p>A <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">cloud access security broker</a> scans, detects, and continuously monitors for security issues in SaaS applications. Organizations use CASB for:</p><ul><li><p>Data security - e.g. ensuring a wrong file or folder is not shared publicly in Dropbox</p></li><li><p>User activity - e.g. alerting to suspicious user permissions changing in Workday at 2:00 AM</p></li><li><p>Misconfigurations - e.g. keeping Zoom recordings from becoming publicly accessible</p></li><li><p>Compliance - e.g. tracking and reporting who modified Bitbucket branch permissions</p></li><li><p>Shadow IT - e.g. detecting users that signed up for an unapproved application with their work email</p></li></ul><p>API-driven CASBs leverage API integrations with various SaaS applications and take just a few minutes to connect. CASB can also be used in tandem with RBI to detect and then prevent unwanted behaviors to both approved and unsanctioned SaaS applications, like disabling the ability to download files or copy text out of documents. More on CASB <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">here</a>.</p><p><img src="http://staging.blog.mrk.cfdata.org/content/images/2022/06/image6-6.png" />Cloudflare One includes an API-driven <a href="https://www.cloudflare.com/products/zero-trust/casb/">CASB</a> which gives comprehensive visibility and control over SaaS apps, so you can easily <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp">prevent data leaks</a> and compliance violations.</p>
    <div>
      <h3>Data Loss Prevention (DLP)</h3>
      <a href="#data-loss-prevention-dlp">
        
      </a>
    </div>
    <p>Data loss prevention tools detect and prevent data exfiltration (data moving without company authorization) or data destruction. Many DLP solutions analyze network traffic and internal "endpoint" devices to identify the leakage or loss of confidential information such as credit card numbers and personally identifiable information (PII). DLP uses a number of techniques to detect sensitive data including data fingerprinting, keyword matching, pattern matching, and file matching. More on DLP <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">here</a>.</p><p><img src="http://staging.blog.mrk.cfdata.org/content/images/2022/06/image12.png" /><a href="https://www.cloudflare.com/teams/lp/dlp/">DLP</a> capabilities for Cloudflare One are coming soon. These will include the ability to check data against common patterns like PII, label and index specific data you need to protect, and combine DLP rules with other Zero Trust policies.</p>
    <div>
      <h3>Firewall-as-a-service</h3>
      <a href="#firewall-as-a-service">
        
      </a>
    </div>
    <p>Firewall-as-a-service, also referred to as cloud firewall, filters out potentially malicious traffic without requiring a physical hardware presence within a customer network. More on firewall-as-a-service <a href="https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/">here</a>.</p><p><img src="http://staging.blog.mrk.cfdata.org/content/images/2022/06/image14.png" />Cloudflare One includes <a href="https://www.cloudflare.com/magic-firewall/">Magic Firewall</a>, a firewall-as-a-service that allows you to filter any IP traffic from a single control plane and (new!) enforce IDS policies across your traffic.</p>
    <div>
      <h3>Email security</h3>
      <a href="#email-security">
        
      </a>
    </div>
    <p>Email security is the process of preventing email-based cyber attacks and unwanted communications. It spans protecting inboxes from takeover, protecting domains from spoofing, stopping phishing attacks, preventing <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">fraud</a>, blocking malware delivery, filtering spam, and using encryption to protect the contents of emails from unauthorized persons.</p><p><a href="https://www.cloudflare.com/zero-trust/products/email-security/">Email security tools</a> can be used in conjunction with other secure access functions including DLP and RBI - for example, potentially suspicious links in emails can be launched in an isolated browser without blocking false positives. More on email security <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">here</a>.</p><p><img src="http://staging.blog.mrk.cfdata.org/content/images/2022/06/image5-7.png" />Cloudflare One includes <a href="https://www.cloudflare.com/products/zero-trust/email-security/">Area 1</a> email security, which crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks at the earliest stages of the attack cycle. Area 1 enhances built-in security from cloud email providers with deep integrations into Microsoft and Google environments and workflows.</p>
    <div>
      <h2>On-ramps: get connected</h2>
      <a href="#on-ramps-get-connected">
        
      </a>
    </div>
    <p>In order to apply secure access functions to your traffic, you need mechanisms to get that traffic from its source (whether that’s a remote user device, branch office, data center, or cloud) to the service edge (see below) where those functions operate. On-ramps are those mechanisms - the inputs and outputs in the IPO model, or in other words, the ways your traffic gets from point A to point B after filters have been applied.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7KCqogxul3sS5kWi26bCqS/2b6479241c59d6ec366a19934c4e0561/image13.png" />
            
            </figure>
    <div>
      <h3>Reverse proxy (for applications)</h3>
      <a href="#reverse-proxy-for-applications">
        
      </a>
    </div>
    <p>A reverse proxy sits in front of web servers and forwards client (e.g. web browser) requests to those web servers. Reverse proxies are typically implemented to help increase security, performance, and reliability. When used in conjunction with identity and endpoint security providers, a reverse proxy can be used to grant network access to web-based applications.</p><p>Cloudflare One includes one of the world’s most-used reverse proxies, which processes over 1.39 billion DNS requests every day.</p>
    <div>
      <h3>Application connector (for applications)</h3>
      <a href="#application-connector-for-applications">
        
      </a>
    </div>
    <p>For private or non-web-based applications, IT teams can install a lightweight daemon in their infrastructure and create an outbound-only connection to the service edge. These application connectors enable connectivity to HTTP web servers, <a href="https://www.cloudflare.com/learning/access-management/what-is-ssh/">SSH servers</a>, remote desktops, and other applications/protocols without opening the applications to potential attacks.</p><p>Cloudflare One includes <a href="https://www.cloudflare.com/products/tunnel/">Cloudflare Tunnel</a>. Users can install a lightweight daemon that creates an encrypted tunnel between their origin web server and Cloudflare’s nearest data center without opening any public inbound ports.</p>
    <div>
      <h3>Device client (for users)</h3>
      <a href="#device-client-for-users">
        
      </a>
    </div>
    <p>In order to get traffic from devices, including laptops and phones, to the service edge for filtering and private network access, users can install a client. This client, or “roaming agent,” acts as a forward proxy to direct some or all traffic from the device to the service edge.</p><p>Cloudflare One includes the <a href="https://1.1.1.1/">WARP</a> device client, which is used by millions of users worldwide and available for iOS, Android, ChromeOS, Mac, Linux, and Windows.</p>
    <div>
      <h3>Bring-your-own or lease IPs (for branches, data centers, and clouds)</h3>
      <a href="#bring-your-own-or-lease-ips-for-branches-data-centers-and-clouds">
        
      </a>
    </div>
    <p>Depending on the capabilities of a SASE provider’s network/service edge, organizations may elect to bring their own IPs or lease IPs to enable entire network connectivity via BGP advertisement.</p><p>Cloudflare One includes <a href="https://developers.cloudflare.com/byoip/">BYOIP</a> and leased IP options, both of which involve advertising ranges across our entire Anycast network.</p>
    <div>
      <h3>Network tunnels (for branches, data centers, and clouds)</h3>
      <a href="#network-tunnels-for-branches-data-centers-and-clouds">
        
      </a>
    </div>
    <p>Most hardware or virtual hardware devices that sit at physical network perimeters are able to support one or multiple types of industry-standard tunneling mechanisms such as <a href="https://www.cloudflare.com/learning/network-layer/what-is-gre-tunneling/">GRE</a> and <a href="https://www.cloudflare.com/learning/network-layer/what-is-ipsec/">IPsec</a>. These tunnels can be established to the service edge from branches, data centers and public clouds to enable network level connectivity.</p><p>Cloudflare One includes Anycast GRE and <a href="/anycast-ipsec/">IPsec</a> tunnel options, which are configured like traditional point-to-point tunnels but grant automatic connectivity to Cloudflare’s entire Anycast network for ease of management and redundancy. These options also enable easy connectivity from existing <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-sd-wan/">SD-WAN devices</a>, which can enable simple to manage or entirely automated tunnel configuration.</p>
    <div>
      <h3>Direct connection (for branches and data centers)</h3>
      <a href="#direct-connection-for-branches-and-data-centers">
        
      </a>
    </div>
    <p>A final on-ramp option for networks with high reliability and capacity needs is to directly connect to the service edge, either with a physical cross-connect/last mile connection or a virtual interconnection through a virtual fabric provider.</p><p>Cloudflare One includes <a href="https://www.cloudflare.com/network-interconnect/">Cloudflare Network Interconnect</a> (CNI), which enables you to connect with Cloudflare’s network via a direct physical connection or virtual connection through a partner. <a href="/cloudflare-for-offices/">Cloudflare for Offices</a> brings CNI directly to your physical premise for even simpler connectivity.</p>
    <div>
      <h2>Service edge: the network that powers it all</h2>
      <a href="#service-edge-the-network-that-powers-it-all">
        
      </a>
    </div>
    <p>Secure access functions need somewhere to operate. In the traditional perimeter architecture model, that place was a rack of hardware boxes in a corporate office or data center; with SASE, it’s a distributed network that is located as close as possible to users and applications wherever they are in the world. But not all service edges are created equal: for a SASE platform to deliver a good experience for your users, applications, and networks, the underlying network needs to be fast, intelligent, interoperable, programmable, and transparent. Let’s break down each of these platform capabilities in more detail.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1x1gDSatgIo32YdVSgYKbH/a746c0b9c2f07b834cd80e47884c48f5/image10-2.png" />
            
            </figure>
    <div>
      <h3>Performance: locations, interconnectivity, speed, capacity</h3>
      <a href="#performance-locations-interconnectivity-speed-capacity">
        
      </a>
    </div>
    <p>Historically, IT teams have had to make tough trade off decisions between security and performance. These could include whether and which traffic to back haul to a central location for security filtering and which security functions to enable to balance throughput with processing overhead. With SASE, those trade-offs are no longer required, as long as the service edge is:</p><ul><li><p><b>Geographically dispersed</b>: it’s important to have service edge locations as close as possible to where your users and applications are, which increasingly means potentially anywhere in the world.</p></li><li><p><b>Interconnected:</b> your service edge needs to be interconnected with other networks, including major transit, cloud, and SaaS providers, in order to deliver reliable and fast connectivity to the destinations you’re ultimately routing traffic to.</p></li><li><p><b>Fast:</b> as expectations for user experience continue to rise, your service edge needs to keep up. Perceived application performance is influenced by many factors, from the availability of fast last-mile Internet connectivity to the impact of security filtering and encryption/decryption steps, so SASE providers need to take a holistic approach to measuring and improving network performance.</p></li><li><p><b>High capacity:</b> with a SASE architecture model, you should never need to think about capacity planning for your security functions - “what size box to buy” is a question of the past. This means that your service edge needs to have enough capacity at each location where your network traffic can land, and the ability to intelligently load balance traffic to use that capacity efficiently across the service edge.</p></li></ul><p>Cloudflare One is built on <a href="https://www.cloudflare.com/network/">Cloudflare’s global network</a>, which spans over 270 cities in over 100 countries, 10,500+ interconnected networks, and 140+ Tbps capacity.</p>
    <div>
      <h3>Traffic intelligence: shaping, QoS, telemetry-based routing</h3>
      <a href="#traffic-intelligence-shaping-qos-telemetry-based-routing">
        
      </a>
    </div>
    <p>On top of the inherent performance attributes of a network/service edge, it’s also important to be able to influence traffic based on characteristics of your individual network. Techniques like traffic shaping, quality of service (QoS), and telemetry-based routing can further improve performance for traffic across the security service edge by prioritizing bandwidth for critical applications and routing around congestion, latency, and other problems along intermediate paths.</p><p>Cloudflare One includes <a href="https://www.cloudflare.com/products/argo-smart-routing/">Argo Smart Routing</a>, which optimizes Layer 3 through 7 traffic to intelligently route around congestion, packet loss, and other issues on the Internet. Additional traffic shaping and QoS capabilities are on the Cloudflare One roadmap.</p>
    <div>
      <h3>Threat intelligence</h3>
      <a href="#threat-intelligence">
        
      </a>
    </div>
    <p>In order to power the secure access functions, your service edge needs a continuously updating feed of intelligence that includes known and new attack types across all layers of the OSI stack. The ability to integrate third party threat feeds is a good start, but native threat intelligence from the traffic flowing across the service edge is even more powerful.</p><p>Cloudflare One includes <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">threat intelligence</a> gathered from the 20M+ Internet properties on Cloudflare’s network, which is continuously fed back into our secure access policies to keep customers protected from emerging threats.</p>
    <div>
      <h3>Interoperability: integrations, standards, and composability</h3>
      <a href="#interoperability-integrations-standards-and-composability">
        
      </a>
    </div>
    <p>Your SASE platform will replace many of the components of your legacy network architecture, but you may choose to keep some of your existing tools and introduce new ones in the future. Your service edge needs to be compatible with your existing connectivity providers, hardware, and tools in order to enable a smooth migration to SASE.</p><p>At the same time, the service edge should also help you stay ahead of new technology and security standards like TLS 1.3 and HTTP3. It should also be fully composable, with every service working together to drive better outcomes than a stack of point solutions could alone.</p><p>Cloudflare One integrates with platforms like <a href="https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/">Identity Provider</a> and <a href="https://www.cloudflare.com/endpoint-partners/">Endpoint Protection</a> solutions, <a href="https://www.cloudflare.com/network-onramp-partners/">SD-WAN</a> appliances, <a href="https://www.cloudflare.com/network-interconnect-partnerships/">interconnection providers</a>, and Security Incident and Event Management tools (<a href="https://www.cloudflare.com/products/zero-trust/integrations/">SIEMs</a>). Existing security and IT tools can be used alongside Cloudflare One with minimal integration work.</p><p>Cloudflare is also a leader in advancing Internet and Networking standards. Any new web standard and protocols have likely been influenced by our research team.</p><p>Cloudflare One is also fully composable, allowing you to start with one use case and layer in additional functionality to create a “1+1=3” effect for your network.</p>
    <div>
      <h3>Orchestration: automation and programmability</h3>
      <a href="#orchestration-automation-and-programmability">
        
      </a>
    </div>
    <p>Deploying and managing your SASE configuration can be complex after scaling beyond a few users, applications, and locations. Your service edge should offer full automation and programmability, including the ability to manage your infrastructure as code with tools like Terraform.</p><p>Cloudflare One includes full API and <a href="https://developers.cloudflare.com/cloudflare-one/api-terraform/access-with-terraform/">Terraform</a> support for easily deploying and managing configuration.</p>
    <div>
      <h3>Visibility: analytics and logs</h3>
      <a href="#visibility-analytics-and-logs">
        
      </a>
    </div>
    <p>Your team should have full visibility into all the traffic routing through the service edge. In the classic <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">perimeter security model</a>, IT and security teams could get visibility by configuring network taps at the handful of locations where traffic entered and left the corporate network. As applications left the data center and users left the office, it became much more challenging to get access to this data. With a SASE architecture, because all of your traffic is routed through a service edge with a single control plane, you can get that visibility back - both via familiar formats like flow data and packet captures as well as rich logs and analytics.</p><p>All secure access components of Cloudflare One generate rich analytics and logs that can be evaluated directly in the Cloudflare One Dashboard or pushed in SIEM tools for advanced analytics.</p>
    <div>
      <h2>Get started on your SASE journey with Cloudflare One</h2>
      <a href="#get-started-on-your-sase-journey-with-cloudflare-one">
        
      </a>
    </div>
    <p>Over the next week, we will be announcing new features that further augment the capabilities of the Cloudflare One platform to make it even easier for your team to realize the vision of SASE. You can follow along at our Innovation Week homepage here or contact us to get started today.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">3CkKO5Wp2uhk6zyLZcw0Hp</guid>
            <dc:creator>Annika Garbers</dc:creator>
            <dc:creator>Kenny Johnson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Magic NAT: everywhere, unbounded, and lower cost]]></title>
            <link>https://blog.cloudflare.com/magic-nat/</link>
            <pubDate>Thu, 12 May 2022 12:58:42 GMT</pubDate>
            <description><![CDATA[ Today, we’re delighted to introduce a new approach to NAT that solves the problems of traditional hardware and virtual solutions ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Network Address Translation (NAT) is one of the most common and versatile network functions, used by everything from your home router to the largest ISPs. Today, we’re delighted to introduce a new approach to NAT that solves the problems of traditional hardware and virtual solutions. Magic NAT is free from capacity constraints, available everywhere through our global Anycast architecture, and operates across any network (physical or cloud). For Internet connectivity providers, Magic NAT for Carriers operates across high volumes of traffic, removing the complexity and cost associated with NATing thousands or millions of connections.</p>
    <div>
      <h3>What does NAT do?</h3>
      <a href="#what-does-nat-do">
        
      </a>
    </div>
    <p>The main function of NAT is in its name:  NAT is responsible for <i>translating the network address</i> in the header of an IP packet from one address to another - for example, translating the private IP 192.168.0.1 to the publicly routable IP 192.0.2.1. Organizations use NAT to grant Internet connectivity from private networks, enable routing within private networks with overlapping IP space, and preserve limited IP resources by mapping thousands of connections to a single IP. These use cases are typically accomplished with a hardware appliance within a physical network or a managed service delivered by a cloud provider.</p><p>Let’s look at those different use cases.</p>
    <div>
      <h3>Allowing traffic from private subnets to connect to the Internet</h3>
      <a href="#allowing-traffic-from-private-subnets-to-connect-to-the-internet">
        
      </a>
    </div>
    <p>Resources within private subnets often need to reach out to the public Internet. The most common example of this is connectivity from your laptop, which might be allocated a private address like 192.168.0.1, reaching out to a public resource like google.com. In order for Google to respond to a request from your laptop, the source IP of your request needs to be publicly routable on the Internet. To accomplish this, your ISP <i>translates</i> the private source IP in your request to a public IP (and reverse-translates for the responses back to you). This use case is often referred to as public NAT, performed by hardware or software acting as a “NAT gateway.”</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2c5BlXgYO4KygMXBbxo7Kw/f00fdf9e80a11c8924d46e5f20e64380/image1-28.png" />
            
            </figure><p><i>Public NAT translates private IP addresses to public ones so that traffic from within private networks can access the Internet.</i></p><p>Users might also have requirements around the specific IP addresses that outgoing packets are NAT’d to. For example, they may need packets to egress from only one or a small subset of IPs so that the services they’re reaching out to can positively identify them - e.g. “only allow traffic from this specific source IP and block everything else.” They might also want traffic to NAT to IPs that accurately reflect the source’s geolocation, in order to pass the “pizza test”: are the results returned for the search term “pizza near me” geographically relevant? These requirements can increase the complexity of a customer’s NAT setup.</p>
    <div>
      <h3>Enabling communication between private subnets with overlapping IP space</h3>
      <a href="#enabling-communication-between-private-subnets-with-overlapping-ip-space">
        
      </a>
    </div>
    <p>NATs are also used for routing traffic within fully private networks, in order to enable communication between resources with overlapping IP space. One example: imagine that you’re an IT architect at a retail company with a hundred geographically distributed store locations and a central data center. To make your life easier, you want to use the same IP address management scheme for all of your stores - e.g. host all of your printers on 10.0.1.0/24, point of sale devices on 10.0.2.0/24, and security cameras on 10.0.3.0/24. These devices need to reach out to resources hosted in your data center, which is also on your private network. The challenge: if multiple devices across your stores have the same source IP, how do return packets from your data center get back to the right device? This is where private NAT comes in.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7HCPpCpvedR5uQatgJl2YE/16db8f85aac1ea0f3d5b795c37ca3d35/image3-16.png" />
            
            </figure><p><i>Private NAT translates IPs into a different private range so that devices with overlapping IP space can communicate with each other.</i></p><p>A NAT gateway sitting in a private network can enable connectivity between overlapping subnets by translating the original source IP (the one shared by multiple resources) to an IP in a different range. This can enable communication between mirrored subnets and other resources (like in our store → datacenter example), as well as between the mirrored subnets themselves - e.g. if traffic needed to flow between our store locations directly, such as a VoIP call from one store to another.</p>
    <div>
      <h3>Conserving IP address space</h3>
      <a href="#conserving-ip-address-space">
        
      </a>
    </div>
    <p><a href="https://en.wikipedia.org/wiki/IPv4_address_exhaustion#:~:text=On%2025%20November%202019%2C%20RIPE,run%20out%20of%20IPv4%20addresses.%22">As of 2019</a>, the available pool of allocatable IPv4 space has been exhausted, making addresses a limited resource. In order to conserve their IPv4 space while the industry <a href="https://radar.cloudflare.com/notebooks/ipv6-adoption-2022">slowly transitions to IPv6</a>, ISPs have adopted carrier-grade NAT solutions to map multiple users to a single IP, maximizing the mileage of the space they have available. This uses the same mechanisms for address translation we’ve already described, but at a large scale - ISPs need to deploy devices that can handle thousands or millions of concurrent connections without impacting traffic performance.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3aDQgZ0q1V0dRjmMi4OgnQ/9c613bded60b0a5bc9c28b381bb9e6e0/image4-11.png" />
            
            </figure>
    <div>
      <h3>Challenges with existing NAT solutions</h3>
      <a href="#challenges-with-existing-nat-solutions">
        
      </a>
    </div>
    <p>Today, users accomplish the use cases we’ve described with a physical appliance (often a firewall) or a virtual appliance delivered as a managed service from a cloud provider. These approaches have the same fundamental limitations as other hardware and virtualized hardware solutions traditionally used to accomplish most network functions.</p>
    <div>
      <h3>Geography constraints</h3>
      <a href="#geography-constraints">
        
      </a>
    </div>
    <p>Physical or virtual devices performing NAT are deployed in one or a few specific locations (e.g. within a company’s data center or in a specific cloud region). Traffic may need to be backhauled out of its way through those specific locations to be NAT’d. A common example is the hub and spoke network architecture, where all Internet-bound traffic is backhauled from geographically distributed locations to be filtered and passed through a NAT gateway to the Internet at a central “hub.” (We’ve written about this challenge previously in the context of <a href="/replace-your-hardware-firewalls-with-cloudflare-one/">hardware firewalls</a>.)</p><p>Managed NAT services offered by cloud providers require customers to deploy NAT gateway instances in specific availability zones. This means that if customers have origin services in multiple availability zones, they either need to backhaul traffic from one zone to another, incurring fees and latency, or deploy instances in multiple zones. They also need to plan for redundancy - for example, AWS recommends configuring a NAT gateway in every availability zone for "zone-independent architecture."</p>
    <div>
      <h3>Capacity constraints</h3>
      <a href="#capacity-constraints">
        
      </a>
    </div>
    <p>Each appliance or virtual device can only support up to a certain amount of traffic, and higher supported traffic volumes usually come at a higher cost. Beyond these limits, users need to deploy multiple NAT instances and design mechanisms to load balance traffic across them, adding additional hardware and network hops to their stack.</p>
    <div>
      <h3>Cost challenges</h3>
      <a href="#cost-challenges">
        
      </a>
    </div>
    <p>Physical devices that perform NAT functionality have several costs associated - in addition to the upfront CAPEX for device purchases, organizations need to plan for installation, maintenance, and upgrade costs. While managed cloud services don’t carry the same cost line items of traditional hardware, leading providers’ models include multiple costs and variable pricing that can be hard to predict. A combination of <a href="/amazon-2bn-ipv4-tax-how-avoid-paying">hourly charges</a>, data processing charges, and data transfer charges can lead to surprises at the end of the month, especially if traffic experiences momentary spikes.</p>
    <div>
      <h3>Hybrid infrastructure challenges</h3>
      <a href="#hybrid-infrastructure-challenges">
        
      </a>
    </div>
    <p>More and more customers we talk to are embracing hybrid (datacenter/cloud), multi-cloud, or poly-cloud infrastructure to diversify their spend and leverage the best of breed features offered by each provider. This means deploying separate NAT instances across each of these networks, which introduces additional complexity, management overhead, and cost.</p>
    <div>
      <h3>Magic NAT: everywhere, unbounded, cross-platform, and predictably priced</h3>
      <a href="#magic-nat-everywhere-unbounded-cross-platform-and-predictably-priced">
        
      </a>
    </div>
    <p>Over the past few years, as we’ve been growing our portfolio of <a href="https://www.cloudflare.com/network-services/">network services</a>, we’ve heard over and over from customers that you want an alternative to the NAT solutions currently available on the market and a better way to address the challenges we described. We’re excited to introduce Magic NAT, the latest entrant in our “Magic” family of services designed to help customers build their next-generation networks on Cloudflare.</p>
    <div>
      <h3>How does it work?</h3>
      <a href="#how-does-it-work">
        
      </a>
    </div>
    <p>Magic NAT is built on the foundational components of <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a>, our Zero Trust <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/">network-as-a-service</a> platform. You can follow a few simple steps to get set up:</p><ol><li><p><b>Connect to Cloudflare.</b> Magic NAT works with all of our network-layer on-ramps including Anycast <a href="https://www.cloudflare.com/learning/network-layer/what-is-gre-tunneling/">GRE</a> or <a href="/anycast-ipsec/">IPsec</a>, <a href="/cloudflare-network-interconnect/">CNI</a>, and <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/download-warp/">WARP</a>. Users set up a tunnel or direct connection and route privately sourced traffic across it; packets land at the closest Cloudflare location automatically.</p></li><li><p><b>Upgrade for Internet connectivity.</b> Users can enable Internet-bound TCP and UDP traffic (any port) to access resources on the Internet from Cloudflare IPs.</p></li><li><p><b>(Optional) Enable dedicated egress IPs.</b> Available if you need traffic to egress from one or multiple dedicated IPs rather than a shared pool. Dedicated egress IPs may be useful if you interact with services that “allowlist” specific IP addresses or otherwise care about which IP addresses are seen by servers on the Internet.</p></li><li><p><b>(Optional) Layer on security policies for safe access.</b> Magic NAT works natively with Cloudflare One security tools including <a href="https://www.cloudflare.com/magic-firewall/">Magic Firewall</a> and our <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Secure Web Gateway</a>. Users can add policies on top of East/West and Internet-bound traffic to secure all network traffic with L3 through L7 protection.</p></li></ol><p>Address translation between IP versions will also be supported, including <i>4to6</i> and <i>6to4</i> NAT capabilities to ensure backwards and forwards compatibility when clients or servers are only reachable via IPv4 or IPv6.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/32wDFBTCpPkzsQJDt3OUMB/dd50654442eba5baa2018ea3ebc6bcd7/image5-6.png" />
            
            </figure>
    <div>
      <h3>Anycast: Magic NAT is everywhere, automatically</h3>
      <a href="#anycast-magic-nat-is-everywhere-automatically">
        
      </a>
    </div>
    <p>With Cloudflare’s Anycast architecture and <a href="https://www.cloudflare.com/network/">global network</a> of over 275 cities across the world, users no longer need to think about deploying NAT capabilities in specific locations or “availability zones.” Anycast on-ramps mean that traffic automatically lands at the closest Cloudflare location. If that location becomes unavailable (e.g. for maintenance), traffic fails over automatically to the next closest - zero configuration work from customers required. Failover from Cloudflare to customer networks is also automatic; we’ll always route traffic across the healthiest available path to you.</p>
    <div>
      <h3>Scale: Magic NAT leverages Cloudflare's entire network capacity</h3>
      <a href="#scale-magic-nat-leverages-cloudflares-entire-network-capacity">
        
      </a>
    </div>
    <p>Cloudflare’s global capacity is at <a href="https://www.cloudflare.com/network/">141 Tbps and counting</a>, and automated traffic management systems like <a href="/unimog-cloudflares-edge-load-balancer/">Unimog</a> allow us to take full advantage of that capacity to serve high volumes of traffic smoothly. We absorb some of the <a href="/15m-rps-ddos-attack/">largest DDoS attacks</a> on the Internet, <a href="/magic-firewall-optimizing-ip-lists/">process hundreds of Gbps</a> for customers through Magic Firewall, and provide <a href="/icloud-private-relay/">privacy for millions of user devices</a> across the world – and Magic NAT is built with this scale in mind. You’ll never need to provision and load balance across multiple instances or worry about traffic throttling or congestion again.</p>
    <div>
      <h3>Cost: no more hardware costs and no surprises</h3>
      <a href="#cost-no-more-hardware-costs-and-no-surprises">
        
      </a>
    </div>
    <p>Magic NAT, like our other network services, is priced based on the 95th percentile of clean bandwidth for your network: no installation, maintenance, or upgrades, and no surprise charges for data transfer spikes. Unlike managed services offered by cloud providers, we won’t charge you for traffic twice. This means fair, predictable billing based on what you actually use.</p>
    <div>
      <h3>Hybrid and multi-cloud: simplify networking across environments</h3>
      <a href="#hybrid-and-multi-cloud-simplify-networking-across-environments">
        
      </a>
    </div>
    <p>Today, customers deploying NAT across on-prem environments and cloud properties need to manage separate instances for each network. As with Cloudflare’s other products that provide an overlay across multiple environments (e.g. <a href="https://www.cloudflare.com/magic-firewall/">Magic Firewall</a>), we can dramatically simplify this architecture by giving users a single place for all their traffic to NAT through regardless of source/origin network.</p>
    <div>
      <h3>Summary</h3>
      <a href="#summary">
        
      </a>
    </div>
    <table><tr><td><p><b>Traditional NAT solutions</b></p></td><td><p><b>Magic NAT</b></p></td></tr><tr><td><p>Location-dependent
Deploy physical or virtual appliances in one or more locations; additional cost for redundancy.</p></td><td><p>Anycast
No more planning availability zones. Magic NAT is everywhere and extremely fault-tolerant, automatically.</p></td></tr><tr><td><p>Capacity-limited
Physical and virtual appliances have upper limits for throughput; need to deploy and load balance across multiple devices to overcome.</p></td><td><p>Scalable
No more planning for capacity and deploying multiple instances to load balance traffic across – Magic NAT leverages Cloudflare's entire network capacity, automatically.</p></td></tr><tr><td><p>High (hardware) and/or unpredictable (cloud) cost
CAPEX plus installation, maintenance, and upgrades or triple charge for managed cloud service.</p></td><td><p>Fairly and predictably priced
No more sticker shock from unexpected data processing charges at the end of the month.</p></td></tr><tr><td><p>Tied to physical network or single cloud
Need to deploy multiple instances to cover traffic flows across the entire network.</p></td><td><p>Multi-cloud
Simplify networking across environments; one control plane across all of your traffic flows.</p></td></tr></table>
    <div>
      <h3>Learn more</h3>
      <a href="#learn-more">
        
      </a>
    </div>
    <p>Magic NAT is currently in beta, translating network addresses globally for a variety of workloads, large and small. We’re excited to get your feedback about it and other new capabilities we’re cooking up to help you simplify and future-proof your network - <a href="http://www.cloudflare.com/lp/magic-nat/">learn more</a> or contact your account team about getting access today!</p> ]]></content:encoded>
            <category><![CDATA[Platform Week]]></category>
            <guid isPermaLink="false">7CYvBSUzRLiJyOquh4HYzU</guid>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[A bridge to Zero Trust]]></title>
            <link>https://blog.cloudflare.com/bridge-to-zero-trust/</link>
            <pubDate>Fri, 18 Mar 2022 13:00:15 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to announce the ability to route traffic from user devices with our lightweight roaming agent (WARP) installed to any network connected with our Magic IP-layer tunnels ]]></description>
            <content:encoded><![CDATA[ <p></p><p><a href="/cloudflare-one/">Cloudflare One</a> enables customers to build their corporate networks on a faster, more secure Internet by connecting any source or destination and configuring routing, security, and performance policies from a single control plane. Today, we’re excited to announce another piece of the puzzle to help organizations on their journey from traditional network architecture to <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>: the ability to route traffic from user devices with our lightweight roaming agent (<a href="https://developers.cloudflare.com/cloudflare-one/setup/#install-the-warp-client-on-your-devices">WARP</a>) installed to any network connected with our Magic IP-layer tunnels (Anycast <a href="https://www.cloudflare.com/learning/network-layer/what-is-gre-tunneling/">GRE</a>, <a href="/anycast-ipsec/">IPsec</a>, or <a href="/cloudflare-network-interconnect/">CNI</a>). From there, users can <a href="/private-networking/">upgrade to Zero Trust</a> over time, providing an easy path from traditional castle and moat to <a href="/welcome-to-cio-week/">next-generation architecture</a>.</p>
    <div>
      <h3>The future of corporate networks</h3>
      <a href="#the-future-of-corporate-networks">
        
      </a>
    </div>
    <p>Customers we talk to describe three distinct phases of architecture for their corporate networks that mirror the shifts we’ve seen with storage and compute, just with a 10 to 20 year delay. Traditional networks (“Generation 1”) existed within the walls of a datacenter or headquarters, with business applications hosted on company-owned servers and access granted via private LAN or WAN through perimeter security appliances. As applications shifted to the cloud and users left the office, companies have adopted “Generation 2” technologies like <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-sd-wan/">SD-WAN</a> and virtualized appliances to handle increasingly fragmented and Internet-dependent traffic. What they’re left with now is a frustrating patchwork of old and new technologies, gaps in visibility and security, and headaches for overworked IT and networking teams.</p><p>We think there’s a better future to look forward to:the architecture Gartner describes as <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a>, where security and network functions shift from physical or virtual appliances to true cloud-native services delivered just milliseconds away from users and applications regardless of where they are in the world. This new paradigm will mean vastly more secure, more performant, and more reliable networks, creating better experiences for users and reducing total cost of ownership. IT will shift from being viewed as a cost center and bottleneck for business changes to a driver of innovation and efficiency.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5fn0k1xEEaMpFYLKvrRaS5/c553bb76ef5a0884a5e4a72471a8d440/image2-64.png" />
            
            </figure><p><i>Generation 1: Castle and Moat; Generation 2: Virtualized Functions; Generation 3: Zero Trust Network</i></p><p>But transformative change can’t happen overnight. For many organizations, especially those transitioning from legacy architecture, it’ll take months or years to fully embrace Generation 3. The good news: Cloudflare is here to help, providing a bridge from your current network architecture to Zero Trust, no matter where you are on your journey.</p>
    <div>
      <h3>How do we get there?</h3>
      <a href="#how-do-we-get-there">
        
      </a>
    </div>
    <p>Cloudflare One, our combined Zero Trust network-as-a-service platform, allows customers to connect to our <a href="https://www.cloudflare.com/network/">global network</a> from any traffic source or destination with a variety of “on-ramps” depending on your needs. To connect individual devices, users can install the <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/download-warp/">WARP client</a>, which acts as a forward proxy to tunnel traffic to the closest Cloudflare location regardless of where users are in the world. <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/install-and-setup/">Cloudflare Tunnel</a> allows you to establish a secure, outbound-only connection between your origin servers and Cloudflare by installing a lightweight daemon.</p><p><a href="/private-networking/">Last year, we announced</a> the ability to route private traffic from WARP-enrolled devices to applications connected with Cloudflare Tunnel, enabling private network access for any TCP or UDP applications. This is the best practice architecture we recommend for <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust network access</a>, but we’ve also heard from customers with legacy architecture that you want options to enable a more gradual transition.</p><p>For network-level (OSI Layer 3) connectivity, we offer standards-based GRE or IPsec options, with a Cloudflare twist: these tunnels are Anycast, meaning one tunnel from your network connects automatically to Cloudflare’s entire network in 250+ cities, providing redundancy and simplifying network management. Customers also have the option to leverage <a href="/cloudflare-network-interconnect/">Cloudflare Network Interconnect</a>, which enables direct connectivity to the Cloudflare network through a physical or virtual connection in over 1,600 locations worldwide. These Layer 1 through 3 on-ramps allow you to connect your public and private networks to Cloudflare with familiar technologies that automatically make all of your IP traffic <a href="/magic-makes-your-network-faster/">faster</a> and more resilient.</p><p>Now, traffic from WARP-enrolled devices can route automatically to any network connected with an IP-layer on-ramp. This additional “plumbing” for Cloudflare One increases the flexibility that users have to connect existing network infrastructure, allowing organizations to transition from traditional VPN architecture to Zero Trust with application-level connectivity over time.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4B0lb7eIfp6hHFFnfmttDO/63476b1e4ed5a6130d7004781160abf9/image1-71.png" />
            
            </figure>
    <div>
      <h3>How does it work?</h3>
      <a href="#how-does-it-work">
        
      </a>
    </div>
    <p>Users can install the WARP client on any device to proxy traffic to the closest Cloudflare location. From there, if the device is enrolled in a Cloudflare account with Zero Trust and private routing enabled, its traffic will get delivered to the account’s dedicated, isolated network “namespace,” a logical copy of the Linux networking stack specific to a single customer. This namespace, which exists on every server in every Cloudflare data center, holds all the routing and tunnel configuration for a customer’s connected network.</p><p>Once traffic lands in a customer namespace, it’s routed to the destination network over the configured GRE, IPsec, or CNI tunnels. Customers can configure route prioritization to load balance traffic over multiple tunnels and automatically fail over to the healthiest possible traffic path from each Cloudflare location.</p><p>On the return path, traffic from customer networks to Cloudflare is also routed via Anycast to the closest Cloudflare location—but this location is different from that of the WARP session, so this return traffic is forwarded to the server where the WARP session is active. In order to do this, we leverage a new internal service called Hermes that allows data to be shared across all servers in our network. Just as our <a href="/introducing-quicksilver-configuration-distribution-at-internet-scale/">Quicksilver</a> service propagates key-value data from our core infrastructure throughout our network, Hermes allows servers to write data that can be read by other servers. When a WARP session is established, its location is written to Hermes. And when return traffic is received, the WARP session's location is read from Hermes, and the traffic is tunneled appropriately.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>This on-ramp method is available today for all Cloudflare One customers. Contact your account team to get set up! We’re excited to add more functionality to make it even easier for customers to transition to Zero Trust, including layering additional security policies on top of connected network traffic and providing service discovery to help organizations prioritize applications to migrate to Zero Trust connectivity.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">3A2d0as1fN6KMG7okn5PqR</guid>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Protect all network traffic with Cloudflare]]></title>
            <link>https://blog.cloudflare.com/protect-all-network-traffic/</link>
            <pubDate>Thu, 17 Mar 2022 12:59:25 GMT</pubDate>
            <description><![CDATA[ Today, we’re extending the availability of Magic Transit to customers with smaller networks by offering Magic Transit-protected, Cloudflare-managed IP space ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Magic Transit protects customers' entire networks—any port/protocol—from DDoS attacks and provides built-in performance and reliability. Today, we’re excited to extend the capabilities of Magic Transit to customers with any size network, from home networks to offices to large cloud properties, by offering Cloudflare-maintained and Magic Transit-protected IP space as a service.</p>
    <div>
      <h3>What is Magic Transit?</h3>
      <a href="#what-is-magic-transit">
        
      </a>
    </div>
    <p>Magic Transit extends the power of <a href="https://www.cloudflare.com/network/">Cloudflare’s global network</a> to customers, absorbing all traffic destined for your network at the location closest to its source. Once traffic lands at the closest Cloudflare location, it flows through a stack of security protections including industry-leading DDoS mitigation and cloud firewall. Detailed <a href="https://support.cloudflare.com/hc/en-us/articles/360038696631-Understanding-Cloudflare-Network-Analytics">Network Analytics</a>, alerts, and reporting give you deep visibility into all your traffic and attack patterns. Clean traffic is forwarded to your network using Anycast <a href="https://www.cloudflare.com/learning/network-layer/what-is-gre-tunneling/">GRE</a> or <a href="/anycast-ipsec/">IPsec</a> tunnels or <a href="/cloudflare-network-interconnect/">Cloudflare Network Interconnect</a>. Magic Transit includes load balancing and automatic failover across tunnels to steer traffic across the healthiest path possible, from everywhere in the world.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6nWPieP77NIQkEBK5sCXpG/9189a1c4f4466461263233ae3d02ce48/image2-54.png" />
            
            </figure><p><i>Magic Transit architecture: Internet BGP advertisement attracts traffic to Cloudflare’s network, where attack mitigation and security policies are applied before clean traffic is forwarded back to customer networks with an Anycast GRE tunnel or Cloudflare Network Interconnect.</i></p><p>The “Magic” is in our Anycast architecture: every server across our network runs every Cloudflare service, so traffic can be processed wherever it lands. This means the entire capacity of our network—121+Tbps as of this post—is available to block even the largest attacks. It also drives <a href="/magic-makes-your-network-faster/">huge benefits for performance</a> versus traditional “scrubbing center” solutions that route traffic to specialized locations for processing, and makes onboarding much easier for network engineers: one tunnel to Cloudflare automatically connects customer infrastructure to our entire network in over 250 cities worldwide.</p>
    <div>
      <h3>What’s new?</h3>
      <a href="#whats-new">
        
      </a>
    </div>
    <p>Historically, Magic Transit has required customers to <a href="/bringing-your-own-ips-to-cloudflare-byoip/">bring their own IP addresses</a>—a minimum of a /24—in order to use this service. This is because a /24 is the minimum prefix length that can be advertised via BGP on the public Internet, which is how we attract traffic for customer networks.</p><p>But not all customers have this much IP space; we've talked to many of you who want IP layer protection for a smaller network than we're able to advertise to the Internet on your behalf. Today, we’re extending the availability of Magic Transit to customers with smaller networks by offering Magic Transit-protected, Cloudflare-managed IP space. Starting now, you can direct your network traffic to dedicated static IPs and receive all the benefits of Magic Transit including industry leading DDoS protection, visibility, performance, and resiliency.</p><p>Let’s talk through some new ways you can leverage Magic Transit to protect and accelerate any network.</p>
    <div>
      <h3>Consistent cross-cloud security</h3>
      <a href="#consistent-cross-cloud-security">
        
      </a>
    </div>
    <p>Organizations adopting a hybrid or poly-cloud strategy have struggled to maintain consistent security controls across different environments. Where they used to manage a single firewall appliance in a datacenter, security teams now have a myriad of controls across different providers—physical, virtual, and cloud-based—all with different capabilities and control mechanisms.</p><p>Cloudflare is the single control plane across your hybrid cloud deployment, allowing you to manage security policies from one place, get uniform protection across your entire environment, and get deep visibility into your traffic and attack patterns.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3DSMWItkN5Z8lw8N8axZcl/40dc51f86aae1d6dd833c94654c09fc4/image5-12.png" />
            
            </figure>
    <div>
      <h3>Protecting branches of any size</h3>
      <a href="#protecting-branches-of-any-size">
        
      </a>
    </div>
    <p>As DDoS attack frequency and variety continues to grow, attackers are getting more creative with angles to target organizations. Over the past few years, we have seen a <a href="/tag/trends/">consistent rise</a> in attacks targeted at corporate infrastructure including internal applications. As the percentage of a corporate network dependent on the Internet continues to grow, organizations need consistent protection across their entire network.</p><p>Now, you can get any network location covered—branch offices, stores, remote sites, event venues, and more—with Magic Transit-protected IP space. Organizations can also <a href="/replace-your-hardware-firewalls-with-cloudflare-one/">replace legacy hardware firewalls</a> at those locations with our built-in cloud firewall, which filters bidirectional traffic and propagates changes globally within seconds.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2XRSzqVBvWObRHpKaco1RW/2e366ed5034f23676c0c3608c7bb9e19/image4-9.png" />
            
            </figure>
    <div>
      <h3>Keeping streams alive without worrying about leaked IPs</h3>
      <a href="#keeping-streams-alive-without-worrying-about-leaked-ips">
        
      </a>
    </div>
    <p>Generally, DDoS attacks target a specific application or network in order to impact the availability of an Internet-facing resource. But you don’t have to be <i>hosting</i> anything in order to get attacked, as many gamers and streamers have unfortunately discovered. The public IP associated with a home network can easily be leaked, giving attackers the ability to directly target and take down a live stream.</p><p>As a streamer, you can now route traffic from your home network through a Magic Transit-protected IP. This means no more worrying about leaking your IP: attackers targeting you will have traffic blocked at the closest Cloudflare location to them, far away from your home network. And no need to worry about impact to your game: thanks to Cloudflare’s globally distributed and interconnected network, you can get protected without sacrificing performance.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2SQtiM8AwhgF9qDcUrSafI/28614651822205e9ee79ffdaedf6c088/image3-25.png" />
            
            </figure>
    <div>
      <h3>Get started today</h3>
      <a href="#get-started-today">
        
      </a>
    </div>
    <p>This solution is available today; <a href="https://www.cloudflare.com/magic-transit/">learn more</a> or contact your account team to get started.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Cloudflare Network]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">2sBwFvGpLwJVFXDn9sC2YT</guid>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Packet captures at the edge]]></title>
            <link>https://blog.cloudflare.com/packet-captures-at-edge/</link>
            <pubDate>Thu, 17 Mar 2022 12:59:12 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to announce the general availability of on-demand packet captures from Cloudflare’s global network ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Packet captures are a critical tool used by network and security engineers every day. As more network functions migrate from legacy on-prem hardware to cloud-native services, teams risk losing the visibility they used to get by capturing 100% of traffic funneled through a single device in a datacenter rack. We know having easy access to packet captures across all your network traffic is important for troubleshooting problems and deeply understanding traffic patterns, so today, we’re excited to announce the general availability of on-demand packet captures from Cloudflare’s global network.</p>
    <div>
      <h3>What are packet captures and how are they used?</h3>
      <a href="#what-are-packet-captures-and-how-are-they-used">
        
      </a>
    </div>
    <p>A packet capture is a file that contains all packets that were seen by a particular network box, usually a firewall or router, during a specific time frame. Packet captures are a powerful and commonly used tool for debugging network issues or getting better visibility into attack traffic to tighten security (e.g. by adding firewall rules to block a specific attack pattern).</p><p>A network engineer might use a pcap file in combination with other tools, like <a href="https://www.cloudflare.com/learning/network-layer/what-is-mtr/">mtr</a>, to troubleshoot problems with reachability to their network. For example, if an end user reports intermittent connectivity to a specific application, an engineer can set up a packet capture filtered to the user’s source IP address to record all packets received from their device. They can then analyze that packet capture and compare it to other sources of information (e.g. pcaps from the end user’s side of the network path, traffic logs and analytics) to understand the magnitude and isolate the source of the problem.</p><p>Security engineers can also use packet captures to gain a better understanding of potentially malicious traffic. Let’s say an engineer notices an unexpected spike in traffic that they suspect could be an attempted attack. They can grab a packet capture to record the traffic as it’s hitting their network and analyze it to determine whether the packets are valid. If they’re not, for example, if the packet payload is randomly generated gibberish, the security engineer can create a firewall rule to block traffic that looks like this from entering their network.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6OKUEiSlnlCSXLryTslrWR/2a862de65c9be324e99751a35b0cee69/image1-65.png" />
            
            </figure><p><i>Example of a packet capture from a recent DDoS attack targeted at Cloudflare infrastructure. The contents of this pcap can be used to create a “signature” to block the attack.</i></p>
    <div>
      <h3>Fragmenting traffic creates gaps in visibility</h3>
      <a href="#fragmenting-traffic-creates-gaps-in-visibility">
        
      </a>
    </div>
    <p>Traditionally, users capture packets by logging into their router or firewall and starting a process like <a href="https://www.tcpdump.org/">tcpdump</a>. They’d set up a filter to only match on certain packets and grab the file. But as networks have become more fragmented and users are moving security functions out to the edge, it’s become increasingly challenging to collect packet captures for relevant traffic. Instead of just one device that all traffic flows through (think of a drawbridge in the “<a href="https://www.cloudflare.com/learning/access-management/castle-and-moat-network-security/">castle and moat</a>” analogy) engineers may have to capture packets across many different physical and virtual devices spread across locations. Many of these packets may not allow taking pcaps at all, and then users have to try to  stitch them back together to create a full picture of their network traffic. This is a nearly impossible task today and only getting harder as networks become more fractured and complex.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2oAYhpR8RTzQKGijeIYDbq/a815a486f88dc8a31a5d9bcb0a91df78/image2-56.png" />
            
            </figure>
    <div>
      <h3>On-demand packet captures from the Cloudflare global network</h3>
      <a href="#on-demand-packet-captures-from-the-cloudflare-global-network">
        
      </a>
    </div>
    <p>With Cloudflare, you can regain this visibility. With <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> and <a href="https://www.cloudflare.com/magic-wan/">Magic WAN</a>, customers route all their public and private IP traffic through Cloudflare’s network to make it more secure, faster, and more reliable, but also to increase visibility. You can think of Cloudflare like a giant, globally distributed version of the drawbridge in our old analogy: because we act as a single cloud-based router and firewall across all your traffic, we can capture packets across your entire network and deliver them back to you in one place.</p>
    <div>
      <h3>How does it work?</h3>
      <a href="#how-does-it-work">
        
      </a>
    </div>
    <p>Customers can request a packet capture using our <a href="https://developers.cloudflare.com/magic-firewall/how-to/collect-pcaps/">Packet Captures API</a>. To get the packets you’re looking for you can provide a filter with the IP address, ports, and protocol of the packets you want.</p>
            <pre><code>curl -X POST https://api.cloudflare.com/client/v4/accounts/${account_id}/pcaps \
-H 'Content-Type: application/json' \
-H 'X-Auth-Email: user@example.com' \
-H 'X-Auth-Key: 00000000000' \
--data '{
        "filter_v1": {
               "source_address": "1.2.3.4",
               "protocol": 6
        },
        "time_limit": 300,
        "byte_limit": "10mb",
        "packet_limit": 10000,
        "type": "simple",
        "system": "magic-transit"
}'</code></pre>
            <p>Example of a request for packet capture using our API.</p><p>We leverage <a href="https://netfilter.org/projects/nftables/">nftables</a> to apply the filter to the customer’s incoming packets and log them using <a href="https://www.netfilter.org/projects/libnetfilter_log/index.html">nflog</a>:</p>
            <pre><code>table inet pcaps_1 {
    chain pcap_1 {
        ip protocol 6 ip saddr 1.2.3.4 log group 1 comment “packet capture”
    }
}</code></pre>
            <p>Example nftables configuration used to filter log customer packets</p><p>nflog creates a netfilter socket through which logs of a packet are sent from the Linux kernel to user space. In user space, we use tcpdump to read packets off the netfilter socket and generate a packet capture file:</p>
            <pre><code>tcpdump -i nflog:1 -w pcap_1.pcap</code></pre>
            <p>Example tcpdump command to create a packet capture file.</p><p>Usually tcpdump is used by listening to incoming packets on a network interface, but in our case we configure it to read packet logs from an nflog group. tcpdump will convert the packet logs into a packet capture file.</p><p>Once we have a packet capture file, we need to deliver it to customers. Because packet capture files can be large and contain sensitive information (e.g. packet payloads), we send them to customers directly from our machines to a cloud storage service of their choice. This means we never store sensitive data, and it’s easy for customers to manage and store these large files.</p>
    <div>
      <h3>Get started today</h3>
      <a href="#get-started-today">
        
      </a>
    </div>
    <p>On-demand packet captures are now generally available for customers who have purchased the Advanced features of Magic Firewall. The <a href="https://developers.cloudflare.com/magic-firewall/how-to/collect-pcaps/">packet capture API</a> allows customers to capture the first 160 bytes of packets, sampled at a default rate of 1/100. More functionality including full packet captures and on-demand packet capture control in the Cloudflare Dashboard is coming in the following weeks. Contact your account team to stay updated on the latest!</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Edge]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Serverless]]></category>
            <guid isPermaLink="false">3lCeST96Ji4kMdmRbpTRav</guid>
            <dc:creator>Annika Garbers</dc:creator>
            <dc:creator>Nadin El-Yabroudi</dc:creator>
        </item>
        <item>
            <title><![CDATA[Replace your hardware firewalls with Cloudflare One]]></title>
            <link>https://blog.cloudflare.com/replace-your-hardware-firewalls-with-cloudflare-one/</link>
            <pubDate>Mon, 06 Dec 2021 14:00:01 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to announce new capabilities to help customers make the switch from hardware firewall appliances to a true cloud-native firewall built for next-generation networks. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today, we’re excited to announce new capabilities to help customers make the switch from hardware firewall appliances to a true cloud-native firewall built for next-generation networks. Cloudflare One provides a secure, performant, and Zero Trust-enabled platform for administrators to apply consistent security policies across all of their users and resources. Best of all, it’s built on top of our global network, so you never need to worry about scaling, deploying, or maintaining your edge security hardware.</p><p>As part of this announcement, Cloudflare launched the <a href="http://cloudflare.com/oahu">Oahu</a> program today to help customers leave legacy hardware behind; in this post we’ll break down the new capabilities that solve the problems of previous firewall generations and save IT teams time and money.</p>
    <div>
      <h2>How did we get here?</h2>
      <a href="#how-did-we-get-here">
        
      </a>
    </div>
    <p>In order to understand where we are today, it’ll be helpful to start with a brief history of IP firewalls.</p>
    <div>
      <h3>Stateless packet filtering for private networks</h3>
      <a href="#stateless-packet-filtering-for-private-networks">
        
      </a>
    </div>
    <p>The first generation of network firewalls were designed mostly to meet the security requirements of private networks, which started with the castle and moat architecture we defined as Generation 1 in <a href="/welcome-to-cio-week/">our post yesterday</a>. Firewall administrators could build policies around signals available at layers 3 and 4 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a> (primarily IPs and ports), which was perfect for (e.g.) enabling a group of employees on one floor of an office building to access servers on another via a LAN.</p><p>This packet filtering capability was sufficient until networks got more complicated, including by connecting to the Internet. IT teams began needing to protect their corporate network from bad actors on the outside, which required more sophisticated policies.</p>
    <div>
      <h3>Better protection with stateful &amp; deep packet inspection</h3>
      <a href="#better-protection-with-stateful-deep-packet-inspection">
        
      </a>
    </div>
    <p>Firewall hardware evolved to include stateful packet inspection and the beginnings of deep packet inspection, extending basic firewall concepts by tracking the state of connections passing through them. This enabled administrators to (e.g.) block all incoming packets not tied to an already present outgoing connection.</p><p>These new capabilities provided more sophisticated protection from attackers. But the advancement came at a cost: supporting this higher level of security required more compute and memory resources. These requirements meant that security and network teams had to get better at planning the capacity they’d need for each new appliance and make tradeoffs between cost and redundancy for their network.</p><p>In addition to cost tradeoffs, these new firewalls only provided some insight into how the network was used. You could tell users were accessing 198.51.100.10 on port 80, but to do a further investigation about what these users were accessing would require you to do a reverse lookup of the IP address. That alone would only land you at the front page of the provider, with no insight into what was accessed, reputation of the domain/host, or any other information to help answer “Is this a security event I need to investigate further?”. Determining the source would be difficult here as well, it would require correlating a private IP address handed out via DHCP with a device and then subsequently a user (if you remembered to set long lease times and never shared devices).</p>
    <div>
      <h3>Application awareness with next generation firewalls</h3>
      <a href="#application-awareness-with-next-generation-firewalls">
        
      </a>
    </div>
    <p>To accommodate these challenges, the industry introduced the <a href="https://www.cloudflare.com/learning/security/what-is-next-generation-firewall-ngfw/">Next Generation Firewall</a> (NGFW). These were the long reigning, and in some cases are still the industry standard, corporate edge security device. They adopted all the capabilities of previous generations while adding in application awareness to help administrators gain more control over what passed through their <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">security perimeter</a>. NGFWs introduced the concept of vendor-provided or externally-provided application intelligence, the ability to identify individual applications from traffic characteristics. Intelligence which could then be fed into policies defining what users could and couldn’t do with a given application.</p><p>As more applications moved to the cloud, NGFW vendors started to provide virtualized versions of their appliances. These allowed administrators to no longer worry about lead times for the next hardware version and allowed greater flexibility when deploying to multiple locations.</p><p>Over the years, as the threat landscape continued to evolve and networks became more complex, NGFWs started to build in additional security capabilities, some of which helped consolidate multiple appliances. Depending on the vendor, these included VPN Gateways, IDS/IPS, <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewalls</a>, and even things like Bot Management and <a href="https://www.cloudflare.com/ddos/">DDoS protection</a>. But even with these features, NGFWs had their drawbacks — administrators still needed to spend time designing and configuring redundant (at least primary/secondary) appliances, as well as choosing which locations had firewalls and incurring performance penalties from backhauling traffic there from other locations. And even still, careful IP address management was required when creating policies to apply pseudo identity.</p>
    <div>
      <h3>Adding user-level controls to move toward Zero Trust</h3>
      <a href="#adding-user-level-controls-to-move-toward-zero-trust">
        
      </a>
    </div>
    <p>As firewall vendors added more sophisticated controls, in parallel, a paradigm shift for network architecture was introduced to address the security concerns introduced as applications and users left the organization’s “castle” for the Internet. <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security</a> means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network. Firewalls started incorporating Zero Trust principles by integrating with identity providers (IdPs) and allowing users to build policies around user groups — “only Finance and HR can access payroll systems” — enabling finer-grained control and reducing the need to rely on IP addresses to approximate identity.</p><p>These policies have helped organizations lock down their networks and get closer to Zero Trust, but CIOs are still left with problems: what happens when they need to integrate another organization’s identity provider? How do they safely grant access to corporate resources for contractors? And these new controls don’t address the fundamental problems with managing hardware, which still exist and are getting more complex as companies go through business changes like adding and removing locations or embracing hybrid forms of work. <a href="https://www.cloudflare.com/cio/">CIOs need a solution</a> that works for the future of corporate networks, instead of trying to duct tape together solutions that address only some aspects of what they need.</p>
    <div>
      <h2>The cloud-native firewall for next-generation networks</h2>
      <a href="#the-cloud-native-firewall-for-next-generation-networks">
        
      </a>
    </div>
    <p>Cloudflare is helping customers build the future of their corporate networks by unifying network connectivity and Zero Trust security. Customers who adopt the Cloudflare One platform can deprecate their hardware firewalls in favor of a cloud-native approach, making IT teams’ lives easier by solving the problems of previous generations.</p>
    <div>
      <h3>Connect any source or destination with flexible on-ramps</h3>
      <a href="#connect-any-source-or-destination-with-flexible-on-ramps">
        
      </a>
    </div>
    <p>Rather than managing different devices for different use cases, all traffic across your network — from data centers, offices, cloud properties, and user devices — should be able to flow through a single global firewall. Cloudflare One enables you to connect to the Cloudflare network with a variety of flexible on-ramp methods including network-layer (GRE or <a href="/anycast-ipsec/">IPsec</a> tunnels) or <a href="https://www.cloudflare.com/products/tunnel/">application-layer</a> tunnels, <a href="https://www.cloudflare.com/network-interconnect/">direct connections</a>, <a href="/bringing-your-own-ips-to-cloudflare-byoip/">BYOIP</a>, and a <a href="/warp-for-desktop/">device client</a>. Connectivity to Cloudflare means access to our entire global network, which eliminates many of the challenges with physical or virtualized hardware:</p><ul><li><p><b>No more capacity planning</b>: The capacity of your firewall is the capacity of Cloudflare’s global network (currently &gt;100Tbps and growing).</p></li><li><p><b>No more location planning:</b> Cloudflare’s Anycast network architecture enables traffic to connect automatically to the closest location to its source. No more picking regions or worrying about where your primary/backup appliances are — redundancy and failover are built in by default.</p></li><li><p><b>No maintenance downtimes:</b> Improvements to Cloudflare’s firewall capabilities, like all of our products, are deployed continuously across our global edge.</p></li><li><p><b>DDoS protection built in:</b> No need to worry about DoS attacks overwhelming your firewalls; Cloudflare’s network automatically blocks attacks close to their source and sends only the clean traffic on to its destination.</p></li></ul>
    <div>
      <h3>Configure comprehensive policies, from packet filtering to Zero Trust</h3>
      <a href="#configure-comprehensive-policies-from-packet-filtering-to-zero-trust">
        
      </a>
    </div>
    <p>Cloudflare One policies can be used to secure and route your organizations traffic across all the various traffic ramps. These policies can be crafted using all the same attributes available through a traditional NGFW while expanding to include <a href="https://developers.cloudflare.com/cloudflare-one/identity">Zero Trust attributes</a> as well. These Zero Trust attributes can include one or more IdPs or endpoint security providers.</p><p>When looking strictly at layers 3 through 5 of the OSI model, policies can be based on IP, port, protocol, and other attributes in both a <a href="https://developers.cloudflare.com/magic-firewall/reference/magic-firewall-fields">stateless</a> and <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/network-policies#expressions">stateful</a> manner. These attributes can also be used to build your private network on Cloudflare when used in conjunction with any of the identity attributes and the Cloudflare device client.</p><p>Additionally, to help relieve the burden of managing IP allow/block lists, Cloudflare provides a set of managed lists that can be applied to both stateless and stateful policies. And on the more sophisticated end, you can also perform <a href="https://developers.cloudflare.com/magic-firewall/reference/magic-firewall-functions">deep packet inspection</a> and <a href="/programmable-packet-filtering-with-magic-firewall/">write programmable packet filters</a> to enforce a positive security model and thwart the largest of attacks.</p><p>Cloudflare’s intelligence helps power our application and content categories for our Layer 7 policies, which can be used to protect your users from security threats, prevent data exfiltration, and audit usage of company resources. This starts with our protected DNS resolver, which is built on top of our performance leading consumer 1.1.1.1 service. Protected DNS allows administrators to protect their users from navigating or resolving any known or potential <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/dns-policies-builder/dns-categories">security risks</a>. Once a domain is resolved, administrators can apply HTTP policies to intercept, inspect, and filter a user's traffic. And if those web applications are self-hosted or SaaS enabled you can even protect them using a Cloudflare access policy, which acts as a web based identity proxy.</p><p>Last but not least, to help prevent data exfiltration, administrators can lock down access to external HTTP applications by utilizing <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation">remote browser isolation</a>. And coming soon, administrators will be able to log and filter which commands a user can execute over an <a href="https://www.cloudflare.com/learning/access-management/what-is-ssh/">SSH session</a>.</p>
    <div>
      <h3>Simplify policy management: one click to propagate rules everywhere</h3>
      <a href="#simplify-policy-management-one-click-to-propagate-rules-everywhere">
        
      </a>
    </div>
    <p>Traditional firewalls required deploying policies on each device or configuring and maintaining an orchestration tool to help with this process. In contrast, Cloudflare allows you to manage policies across our entire network from a simple dashboard or API, or use Terraform to deploy infrastructure as code. Changes propagate across the edge in seconds thanks to our <a href="/introducing-quicksilver-configuration-distribution-at-internet-scale/">Quicksilver</a> technology. Users can get visibility into traffic flowing through the firewall with logs, which are <a href="/pii-and-selective-logging-controls-for-cloudflares-zero-trust-platform/">now configurable</a>.</p>
    <div>
      <h2>Consolidating multiple firewall use cases in one platform</h2>
      <a href="#consolidating-multiple-firewall-use-cases-in-one-platform">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/security/what-is-a-firewall/">Firewalls</a> need to cover a myriad of traffic flows to satisfy different security needs, including blocking bad inbound traffic, filtering outbound connections to ensure employees and applications are only accessing safe resources, and inspecting internal (“East/West”) traffic flows to enforce Zero Trust. Different hardware often covers one or multiple use cases at different locations; we think it makes sense to consolidate these as much as possible to improve ease of use and establish a single source of truth for firewall policies. Let’s walk through some use cases that were traditionally satisfied with hardware firewalls and explain how IT teams can satisfy them with Cloudflare One.</p>
    <div>
      <h3>Protecting a branch office</h3>
      <a href="#protecting-a-branch-office">
        
      </a>
    </div>
    <p>Traditionally, IT teams needed to provision at least one hardware firewall per office location (multiple for redundancy). This involved forecasting the amount of traffic at a given branch and ordering, installing, and maintaining the appliance(s). Now, customers can connect branch office traffic to Cloudflare from whatever hardware they already have — any standard router that supports GRE or IPsec will work — and control filtering policies across all of that traffic from Cloudflare’s dashboard.</p><p><b>Step 1: Establish a GRE or IPsec tunnel</b>The majority of mainstream hardware providers support GRE and/or IPsec as tunneling methods. Cloudflare will provide an Anycast IP address to use as the tunnel endpoint on our side, and you configure a standard GRE or IPsec tunnel with no additional steps — the Anycast IP provides automatic connectivity to every Cloudflare data center.</p><p><b>Step 2: Configure network-layer firewall rules</b>All IP traffic can be filtered through Magic Firewall, which includes the ability to construct policies based on any packet characteristic — e.g., source or destination IP, port, protocol, country, or bit field match. Magic Firewall also integrates with <a href="/introducing-ip-lists/">IP Lists</a> and includes advanced capabilities like <a href="/programmable-packet-filtering-with-magic-firewall/">programmable packet filtering</a>.</p><p><b>Step 3: Upgrade traffic for application-level firewall rules</b>After it flows through Magic Firewall, TCP and UDP traffic can be “upgraded” for fine-grained filtering through Cloudflare Gateway. This upgrade unlocks a full suite of filtering capabilities including application and content awareness, identity enforcement, SSH/HTTP proxying, and DLP.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/15mxsEXJnTAjsD1goBIwn3/f00d5d46972d43a07b14e1d256b5493b/unnamed-2.png" />
            
            </figure>
    <div>
      <h3>Protecting a high-traffic data center or VPC</h3>
      <a href="#protecting-a-high-traffic-data-center-or-vpc">
        
      </a>
    </div>
    <p>Firewalls used for processing data at a high-traffic headquarters or data center location can be some of the largest capital expenditures in an IT team’s budget. Traditionally, data centers have been protected by beefy appliances that can handle high volumes gracefully, which comes at an increased cost. With Cloudflare’s architecture, because every server across our network can share the responsibility of processing customer traffic, no one device creates a bottleneck or requires expensive specialized components. Customers can on-ramp traffic to Cloudflare with BYOIP, a standard tunnel mechanism, or Cloudflare Network Interconnect, and process up to terabits per second of traffic through firewall rules smoothly.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5efjp1MCUcxTZfrszwZyKj/b2fc5a524ca4e7bd5269f1c08c975bfa/unnamed--1--1.png" />
            
            </figure>
    <div>
      <h3>Protecting a roaming or hybrid workforce</h3>
      <a href="#protecting-a-roaming-or-hybrid-workforce">
        
      </a>
    </div>
    <p>In order to connect to corporate resources or get secure access to the Internet, users in traditional network architectures establish a VPN connection from their devices to a central location where firewalls are located. There, their traffic is processed before it’s allowed to its final destination. This architecture introduces performance penalties and while modern firewalls can enable user-level controls, they don’t necessarily achieve Zero Trust. Cloudflare enables customers to use a device client as an on-ramp to Zero Trust policies; watch out for more updates later this week on how to smoothly deploy the client at scale.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3O3oEBTYP2VN6fDCLrjZ10/0c855b9a935dde38bb24d5c67fca348c/unnamed--2--1.png" />
            
            </figure>
    <div>
      <h2>What’s next</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We can’t wait to keep evolving this platform to serve new use cases. We’ve heard from customers who are interested in expanding NAT Gateway functionality through Cloudflare One, who want richer analytics, reporting, and <a href="https://www.cloudflare.com/application-services/solutions/app-performance-monitoring/">user experience monitoring</a> across all our firewall capabilities, and who are excited to adopt a full suite of DLP features across all of their traffic flowing through Cloudflare’s network. Updates on these areas and more are coming soon (stay tuned).</p><p>Cloudflare’s new firewall capabilities are available for enterprise customers today. Learn more <a href="https://www.cloudflare.com/magic-firewall/">here</a> and check out the <a href="http://cloudflare.com/oahu">Oahu Program</a> to learn how you can migrate from hardware firewalls to Zero Trust — or talk to your account team to get started today.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Firewall]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">NVgWtzBSDEvGcm5UE0AC5</guid>
            <dc:creator>Ankur Aggarwal</dc:creator>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing Anycast IPsec: a new on-ramp to Cloudflare One]]></title>
            <link>https://blog.cloudflare.com/anycast-ipsec/</link>
            <pubDate>Mon, 06 Dec 2021 13:59:45 GMT</pubDate>
            <description><![CDATA[ Today, we're excited to announce support for IPsec as an on-ramp to Cloudflare One. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today, we're excited to announce support for IPsec as an on-ramp to Cloudflare One. As a customer, you should be able to use whatever method you want to get your traffic to Cloudflare's network. We've heard from you that IPsec is your method of choice for connecting to us at the network layer, because of its near-universal vendor support and blanket layer of encryption across all traffic. So we built support for it! Read on to learn how our IPsec implementation is faster and easier to use than traditional IPsec connectivity, and how it integrates deeply with our Cloudflare One suite to provide unified security, performance, and reliability across all your traffic.</p>
    <div>
      <h3>Using the Internet as your corporate network</h3>
      <a href="#using-the-internet-as-your-corporate-network">
        
      </a>
    </div>
    <p>With <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a>, customers can connect any traffic source or destination — branch offices, data centers, cloud properties, user devices — to our network. Traffic is routed to the closest Cloudflare location, where security policies are applied before we send it along optimized routes to its destination — whether that’s within your private network or on the Internet. It is good practice to encrypt any traffic that’s sensitive at the application level, but for customers who are transitioning from forms of private connectivity like <a href="https://www.cloudflare.com/learning/network-layer/what-is-mpls/">Multiprotocol Label Switching (MPLS)</a>, this often isn’t a reality. We’ve talked to many customers who have legacy file transfer and other applications running across their MPLS circuits unencrypted, and are relying on the fact that these circuits are “private” to provide security. In order to start sending this traffic over the Internet, customers need a blanket layer of encryption across all of it; IPsec tunnels are traditionally an easy way to accomplish this.</p>
    <div>
      <h3>Traditional IPsec implementations</h3>
      <a href="#traditional-ipsec-implementations">
        
      </a>
    </div>
    <p>IPsec as a technology has been around since 1995, and is broadly implemented across many hardware and software platforms. Many companies have adopted IPsec VPNs for securely transferring corporate traffic over the Internet. These VPNs tend to have one of two main architectures: hub and spoke, or mesh.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/VgcVHiIXfIo3mp0ZGnoIV/b61543b156b8a4e200e42a89e7d4fbe1/image1-22.png" />
            
            </figure><p>In the hub and spoke model, each “spoke” node establishes an IPsec tunnel back to a core “hub,” usually a headquarters or data center location. Traffic between spokes flows through the hub for routing and in order to have security policies applied (like by an on-premise firewall). This architecture is simple because each node only needs to maintain one tunnel to get connectivity to other locations, but it can introduce significant performance penalties. Imagine a global network with two “spokes”, one in India and another one in Singapore, but a “hub” located in the United States — traffic needs to travel a round trip thousands of miles back and forth in order to get to its destination.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/51rrrTeThskEktKstglrC4/8947f899ee685f13b8f5d7fc1a1d8cd7/image3-9.png" />
            
            </figure><p>In the mesh model, every node is connected to every other node with a dedicated IPsec tunnel. This improves performance because traffic can take more direct paths, but in practice means an unmanageable number of tunnels after even a handful of locations are added.</p><p>Customers we’ve talked to about IPsec know they want it for the blanket layer of encryption and broad vendor support, but they haven’t been particularly <i>excited</i> about it because of the problems with existing architecture models. We knew we wanted to develop something that was easier to use and left those problems in the past, so that customers could get excited about building their next-generation network on Cloudflare. So how are we bringing IPsec out of the 90s? By delivering it on our global Anycast network: customers establish one IPsec tunnel to us and get automatic connectivity to 250+ locations. <b>It’s conceptually similar to the hub and spoke model, but the “hub” is everywhere, blazing fast, and easy to manage.</b></p>
    <div>
      <h3>So how does IPsec actually work?</h3>
      <a href="#so-how-does-ipsec-actually-work">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/network-layer/what-is-ipsec/">IPsec</a> was designed back in 1995 to provide authentication, integrity, and confidentiality for IP packets. One of the ways it does this is by creating tunnels between two hosts, encrypting the IP packets, and adding a new IP header onto encrypted packets. To make this happen, IPsec has two components working together: a userspace Internet Key Exchange (IKE) daemon and an IPsec stack in kernel-space. IKE is the protocol which creates Security Associations (SAs) for IPsec. An SA is a collection of all the security parameters, like those for authentication and encryption, that are needed to establish an IPsec tunnel.</p><p>When a new IPsec tunnel needs to be set up, one IKE daemon will initiate a session with another and create an SA. All the complexity of configuration, key negotiation, and key generation happens in a handful of packets between the two IKE daemons safely in userspace. Once the IKE Daemons have started their session, they hand off their nice and neat SA to the IPsec stack in kernel-space, which now has all the information it needs to intercept the right packets for encryption and decryption.</p><p>There are plenty of open source IKE daemons, including strongSwan, Libreswan, and Openswan, that we considered using for our IPsec implementation. These “swans” all tie speaking the IKE protocol tightly with configuring the IPsec stack. This is great for establishing point-to-point tunnels — installing one “swan” is all you need to speak IKE and configure an encrypted tunnel. But we’re building the next-generation network that takes advantage of Cloudflare’s entire global Anycast edge. So how do we make it so that a customer sets up one tunnel with Cloudflare with every single edge server capable of exchanging data on it?</p>
    <div>
      <h3>Anycast IPsec: an implementation for next-generation networks</h3>
      <a href="#anycast-ipsec-an-implementation-for-next-generation-networks">
        
      </a>
    </div>
    <p>The fundamental problem in the way of Anycast IPsec is that the SA needs to be handed off to the kernel-space IPsec stack on every Cloudflare edge server, but the SA is created on only one server — the one running the IKE daemon that the customer’s IKE daemon connects to. How do we solve this problem? The first thing that needs to be true is that every server needs to be able to create that SA.</p><p>Every Cloudflare server now runs an IKE daemon, so customers can have a fast, reliable connection to start a tunnel anywhere in the world. We looked at using one of the existing “swans” but that tight coupling of IKE with the IPsec stack meant that the SA was hard to untangle from configuring the dataplane. We needed the SA totally separate and neatly sharable from the server that created it to every other server on our edge. Naturally, we built our own “swan” to do just that.</p><p>To send our SA worldwide, we put a new spin on an old trick. With <a href="/argo-tunnels-that-live-forever/">Cloudflare Tunnels</a>, a customer’s cloudflared tunnel process creates connections to a few nearby Cloudflare edge servers. But traffic destined for that tunnel could arrive at <i>any</i> edge server, which needs to know how to proxy traffic to the tunnel-connected edge servers. So, we built technology that enables an edge server to rapidly distribute information about its Cloudflare Tunnel connections to all other edge servers.</p><p>Fundamentally, the problem of SA distribution is similar -- a customer’s IKE daemon connects to a single Cloudflare edge server’s IKE daemon, and information about that connection needs to be distributed to every other edge server. So, we upgraded the Cloudflare Tunnel technology to make it more general and are now using it to distribute SAs as part of Anycast IPsec support. Within seconds of an SA being created, it is distributed to every Cloudflare edge server where a streaming protocol applies the configuration to the kernel-space IPsec stack. Cloudflare’s Anycast IPsec benefits from the same reliability and resilience we’ve built in Cloudflare Tunnels and turns our network into one massively scalable, resilient IPsec tunnel to your network.</p>
    <div>
      <h3>On-ramp with IPsec, access all of Cloudflare One</h3>
      <a href="#on-ramp-with-ipsec-access-all-of-cloudflare-one">
        
      </a>
    </div>
    <p>We built IPsec as an on-ramp to Cloudflare One on top of our existing global system architecture, putting the principles customers care about first. You care about ease of deployment, so we made it possible for you to connect to your entire virtual network on Cloudflare One with a single IPsec tunnel. You care about performance, so we built technology that connects your IPsec tunnel to every Cloudflare location, eliminating <a href="/magic-makes-your-network-faster/">hub-and-spoke performance penalties</a>. You care about enforcing security policies across all your traffic regardless of source, so we integrated IPsec with the entire Cloudflare One suite including Magic Transit, Magic Firewall, Zero Trust, and more.</p><p>IPsec is in early access for Cloudflare One customers. If you’re interested in trying it out, contact your account team today!</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Anycast]]></category>
            <guid isPermaLink="false">3cUveDETHTeRr47vO01tsY</guid>
            <dc:creator>Annika Garbers</dc:creator>
            <dc:creator>Michael Vanderwater</dc:creator>
            <dc:creator>Arég Harutyunyan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Welcome to CIO Week and the future of corporate networks]]></title>
            <link>https://blog.cloudflare.com/welcome-to-cio-week/</link>
            <pubDate>Sun, 05 Dec 2021 20:58:39 GMT</pubDate>
            <description><![CDATA[ This week, we’ll demonstrate how Cloudflare One, our Zero Trust Network-as-a-Service, is helping CIOs transform their corporate networks.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>The world of a Chief Information Officer has changed — today’s corporate networks look nothing like those of even five or ten years ago — and these changes have created gaps in visibility and security, introduced high costs and operational burdens, and made networks fragile and brittle.</p><p>We’re optimistic that CIOs have a brighter future to look forward to. The Internet has evolved from a research project into integral infrastructure companies depend on, and we believe a better Internet is the path forward to solving the most challenging problems CIOs face today. Cloudflare is helping build an Internet that’s faster, more secure, more reliable, more private, and programmable, and by doing so, we’re enabling organizations to build their next-generation networks on ours.</p><p>This week, we’ll demonstrate how Cloudflare One, our Zero Trust <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/">Network-as-a-Service</a>, is helping CIOs transform their corporate networks. We’ll also introduce new functionality that expands the scope of Cloudflare’s platform to address existing and emerging needs for CIOs. But before we jump into the week, we wanted to spend some time on our vision for the corporate network of the future. We hope this explanation will clarify language and acronyms used by vendors and analysts who have realized the opportunity in this space (what does Zero Trust Network-as-a-Service mean, anyway?) and set context for how our innovative approach is realizing this vision for real CIOs today.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5rqxtwrgzS3N9UhobOEGAX/bc557cfb90dfba4bdb3d55e15a7798e3/Castle-and-Moat-to-Zero-Trust.png" />
            
            </figure>
    <div>
      <h2>Generation 1: Castle and moat</h2>
      <a href="#generation-1-castle-and-moat">
        
      </a>
    </div>
    <p>For years, corporate networks looked like this:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/fMla3Gx5wuISK48F7lJFf/d2fdcc99b10c6c9ded58a52c07a231ea/unnamed--1--16.png" />
            
            </figure><p>Companies built or rented space in data centers that were physically located within or close to major office locations. They hosted business applications — email servers, ERP systems, CRMs, etc. — on servers in these data centers. Employees in offices connected to these applications through the local area network (LAN) or over private <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-wan/">wide area network (WAN)</a> links from branch locations. A stack of security hardware (e.g., firewalls) in each data center enforced security for all traffic flowing in and out. Once on the corporate network, users could move laterally to other connected devices and hosted applications, but basic forms of network authentication and physical security controls like employee badge systems generally prevented untrusted users from getting access.</p><p><b>Network Architecture Scorecard: Generation 1</b></p><table><tr><td><p><b>Characteristic</b></p></td><td><p><b>Score</b></p></td><td><p><b>Description</b></p></td></tr><tr><td><p>Security</p></td><td><p>⭐⭐</p></td><td><p>All traffic flows through perimeter security hardware. Network access restricted with physical controls. Lateral movement is only possible once on network.</p></td></tr><tr><td><p>Performance</p></td><td><p>⭐⭐⭐</p></td><td><p>Majority of users and applications stay within the same building or regional network.</p></td></tr><tr><td><p>Reliability</p></td><td><p>⭐⭐</p></td><td><p>Dedicated data centers, private links, and security hardware present single points of failure. There are cost tradeoffs to purchase redundant links and hardware.</p></td></tr><tr><td><p>Cost</p></td><td><p>⭐⭐</p></td><td><p>Private connectivity and hardware are high cost capital expenditures, creating a high barrier to entry for small or new businesses. However, a limited number of links/boxes are required (trade off with redundancy/reliability). Operational costs are low to medium after initial installation.</p></td></tr><tr><td><p>Visibility</p></td><td><p>⭐⭐⭐</p></td><td><p>All traffic is routed through central location, so it’s possible to access NetFlow/packet captures and more for 100% of flows.</p></td></tr><tr><td><p>Agility</p></td><td><p>⭐</p></td><td><p>Significant network changes have a long lead time.</p></td></tr><tr><td><p>Precision</p></td><td><p>⭐</p></td><td><p>Controls are primarily exercised at the network layer (e.g., IP ACLs). Accomplishing “allow only HR to access employee payment data” looks like: <code>IP in range X allowed to access IP in range Y </code>(and requires accompanying spreadsheet to track IP allocation).</p></td></tr></table><p>Controls are primarily exercised at the network layer (e.g., IP ACLs). Accomplishing “allow only HR to access employee payment data” looks like: <code>IP in range X allowed to access IP in range Y</code> (and requires accompanying spreadsheet to track IP allocation).</p>
    <div>
      <h2>Applications and users left the castle</h2>
      <a href="#applications-and-users-left-the-castle">
        
      </a>
    </div>
    <p>So what changed? In short, the Internet. Faster than anyone expected, the Internet became critical to how people communicate and get work done. The Internet introduced a radical shift in how organizations thought about their computing resources: if any computer can talk to any other computer, why would companies need to keep servers in the same building as employees’ desktops? And even more radical, why would they need to buy and maintain their own servers at all? From these questions, the cloud was born, enabling companies to rent space on other servers and host their applications while minimizing operational overhead. An entire new industry of Software-as-a-Service emerged to simplify things even further, allowing companies to completely abstract away questions of capacity planning, server reliability, and other operational struggles.</p><p>This golden, Internet-enabled future — cloud and SaaS everything — sounds great! But CIOs quickly ran into problems. Established corporate networks with castle-and-moat architecture can’t just go down for months or years during a large-scale transition, so most organizations are in a hybrid state, one foot still firmly in the world of data centers, hardware, and <a href="https://www.cloudflare.com/learning/network-layer/what-is-mpls/">MPLS</a>. And traffic to applications still needs to stay secure, so even if it’s no longer headed to a server in a company-owned data center, many companies have continued to send it there (backhauled through private lines) to flow through a stack of firewall boxes and other hardware before it’s set free.</p><p>As more applications moved to the Internet, the volume of traffic leaving branches — and being backhauled through MPLS lines through data centers for security — continued to increase. Many CIOs faced an unpleasant surprise in their bandwidth charges the month after adopting Office 365: with traditional network architecture, more traffic to the Internet meant more traffic over expensive private links.</p><p>As if managing this first dramatic shift — which created complex hybrid architectures and brought unexpected cost increases — wasn’t enough, CIOs had another to handle in parallel. The Internet changed the game not just for applications, but also for users. Just as servers don’t need to be physically located at a company’s headquarters anymore, employees don’t need to be on the office LAN to access their tools. VPNs allow people working outside of offices to get access to applications hosted on the company network (whether physical or in the cloud).</p><p>These VPNs grant remote users access to the corporate network, but they’re slow, clunky to use, and can only support a limited number of people before performance degrades to the point of unusability. And from a security perspective, they’re terrifying — once a user is on the VPN, they can move laterally to discover and gain access to other resources on the corporate network. It’s much harder for CIOs and CISOs to control laptops with VPN access that could feasibly be brought anywhere — parks, public transportation, bars — than computers used by badged employees in the traditional castle-and-moat office environment.</p><p>In 2020, COVID-19 turned these emerging concerns about VPN cost, performance, and security into mission-critical, business-impacting challenges, and they’ll continue to be even as some employees return to offices.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3HuKGUFxfzPONVYODAM82x/528e8626d65bbb661fe59cfdb5acdb75/unnamed--2-.png" />
            
            </figure>
    <div>
      <h2>Generation 2: Smörgåsbord of point solutions</h2>
      <a href="#generation-2-smorgasbord-of-point-solutions">
        
      </a>
    </div>
    <p>Lots of vendors have emerged to tackle the challenges introduced by these major shifts, often focusing on one or a handful of use cases. Some providers offer virtualized versions of hardware appliances, delivered over different cloud platforms; others have cloud-native approaches that address a specific problem like application access or <a href="https://www.cloudflare.com/learning/access-management/what-is-url-filtering/">web filtering</a>. But stitching together a patchwork of point solutions has caused even more headaches for CIOs and most products available focused only on shoring up identity, endpoint, and application security without truly addressing <a href="https://www.cloudflare.com/learning/network-layer/network-security/">network security</a>.</p>
    <div>
      <h4><b>Gaps in visibility</b></h4>
      <a href="#gaps-in-visibility">
        
      </a>
    </div>
    <p>Compared to the castle and moat model, where traffic all flowed through a central stack of appliances, modern networks have extremely fragmented visibility. IT teams need to piece together information from multiple tools to understand what’s happening with their traffic. Often, a full picture is impossible to assemble, even with the support of tools including SIEM and SOAR applications that consolidate data from multiple sources. This makes troubleshooting issues challenging: IT support ticket queues are full of unsolved mysteries. How do you manage what you can’t see?</p>
    <div>
      <h4><b>Gaps in security</b></h4>
      <a href="#gaps-in-security">
        
      </a>
    </div>
    <p>This patchwork architecture — coupled with the visibility gaps it introduced — also creates security challenges. The concept of “Shadow IT” emerged to describe services that employees have adopted and are using without explicit IT permission or integration into the corporate network’s traffic flow and security policies. Exceptions to filtering policies for specific users and use cases have become unmanageable, and our customers have described a general “wild west” feeling about their networks as Internet use grew faster than anyone could have anticipated. And it’s not just gaps in filtering that scare CIOs — the proliferation of Shadow IT means company data can and does now exist in a huge number of unmanaged places across the Internet.</p>
    <div>
      <h4><b>Poor user experience</b></h4>
      <a href="#poor-user-experience">
        
      </a>
    </div>
    <p>Backhauling traffic through central locations to enforce security introduces latency for end users, amplified as they work in locations farther and farther away from their former offices. And the Internet, while it’s come a long way, is still fundamentally unpredictable and unreliable, leaving IT teams struggling to ensure availability and performance of apps for users with many factors (even down to shaky coffee shop Wi-Fi) out of their control.</p>
    <div>
      <h4><b>High (and growing) cost</b></h4>
      <a href="#high-and-growing-cost">
        
      </a>
    </div>
    <p>CIOs are still paying for MPLS links and hardware to enforce security across as much traffic as possible, but they’ve now taken on additional costs of point solutions to secure increasingly complex networks. And because of fragmented visibility and security gaps, coupled with performance challenges and rising expectations for a higher quality of user experience, the cost of providing IT support is growing.</p>
    <div>
      <h4><b>Network fragility</b></h4>
      <a href="#network-fragility">
        
      </a>
    </div>
    <p>All this complexity means that making changes can be really hard. On the legacy side of current hybrid architectures, provisioning MPLS lines and deploying new security hardware come with long lead times, only worsened by recent issues in the global hardware supply chain. And with the medley of point solutions introduced to manage various aspects of the network, a change to one tool can have unintended consequences for another. These effects compound in IT departments often being the bottleneck for business changes, limiting the flexibility of organizations to adapt to an only-accelerating rate of change.</p><p><b>Network Architecture Scorecard: Generation 2</b></p><table><tr><td><p><b>Characteristic</b></p></td><td><p><b>Score</b></p></td><td><p><b>Description</b></p></td></tr><tr><td><p>Security</p></td><td><p>⭐</p></td><td><p>Many traffic flows are routed outside of perimeter security hardware, Shadow IT is rampant, and controls that do exist are enforced inconsistently and across a hodgepodge of tools.</p></td></tr><tr><td><p>Performance</p></td><td><p>⭐</p></td><td><p>Traffic backhauled through central locations introduces latency as users move further away; VPNs and a bevy of security tools introduce processing overhead and additional network hops.</p></td></tr><tr><td><p>Reliability</p></td><td><p>⭐⭐</p></td><td><p>The redundancy/cost tradeoff from Generation 1 is still present; partial cloud adoption grants some additional resiliency but growing use of unreliable Internet introduces new challenges.</p></td></tr><tr><td><p>Cost</p></td><td><p>⭐</p></td><td><p>Costs from Generation 1 architecture are retained (few companies have successfully deprecated MPLS/security hardware so far), but new costs of additional tools added, and operational overhead is growing.</p></td></tr><tr><td><p>Visibility</p></td><td><p>⭐</p></td><td><p>Traffic flows and visibility are fragmented; IT stitches partial picture together across multiple tools.</p></td></tr><tr><td><p>Agility</p></td><td><p>⭐⭐</p></td><td><p>Some changes are easier to make for aspects of business migrated to cloud; others have grown more painful as additional tools introduce complexity.</p></td></tr><tr><td><p>Precision</p></td><td><p>⭐⭐</p></td><td><p>Mix of controls exercised at network layer and application layer. Accomplishing “allow only HR to access employee payment data” looks like: <code>Users in group X allowed to access IP in range Y </code>(and accompanying spreadsheet to track IP allocation)</p></td></tr></table><p>In summary — to reiterate where we started — modern CIOs have really hard jobs. But we believe there’s a better future ahead.</p>
    <div>
      <h2>Generation 3: The Internet as the new corporate network</h2>
      <a href="#generation-3-the-internet-as-the-new-corporate-network">
        
      </a>
    </div>
    <p>The next generation of corporate networks will be built on the Internet. This shift is already well underway, but CIOs need a platform that can help them get access to a <i>better</i> Internet — one that’s more secure, faster, more reliable, and preserves user privacy while navigating complex global data regulations.</p>
    <div>
      <h3>Zero Trust security at Internet scale</h3>
      <a href="#zero-trust-security-at-internet-scale">
        
      </a>
    </div>
    <p>CIOs are hesitant to give up expensive forms of private connectivity because they feel more secure than the public Internet. But a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust approach</a>, delivered on the Internet, dramatically increases security versus the classic castle and moat model or a patchwork of appliances and point software solutions adopted to create “defense in depth.” Instead of trusting users once they’re on the corporate network and allowing lateral movement, Zero Trust dictates authenticating and authorizing every request into, out of, and between entities on your network, ensuring that visitors can only get to applications they’re explicitly allowed to access. And delivering this authentication and policy enforcement from an edge location close to the user enables radically better performance, rather than forcing traffic to backhaul through central data centers or traverse a huge stack of security tools.</p><p>In order to enable this new model, CIOs need a platform that can:</p><p><b>Connect all the entities on their corporate network.</b></p><p>It has to not just be possible, but also easy and reliable to connect users, applications, offices, data centers, and cloud properties to each other as flexibly as possible. This means support for the hardware and connectivity methods customers have today, from enabling mobile clients to operate across OS versions to compatibility with standard tunnelling protocols and network peering with global telecom providers.</p><p><b>Apply comprehensive security policies.</b></p><p>CIOs need a solution that integrates tightly with their existing identity and endpoint security providers and provides Zero Trust protection at all layers of the OSI stack across traffic within their network. This includes end-to-end encryption, microsegmentation, sophisticated and precise filtering and inspection for traffic between entities on their network (“East/West”) and to/from the Internet (“North/South”), and protection from other threats like DDoS and <a href="https://www.cloudflare.com/learning/bots/what-is-a-bot-attack/">bot attacks</a>.</p><p><b>Visualize and provide insight on traffic.</b></p><p>At a base level, CIOs need to understand the full picture of their traffic: who’s accessing what resources and what does performance (latency, jitter, packet loss) look like? But beyond providing the information necessary to answer basic questions about traffic flows and user access, next-generation visibility tools should help users understand trends and highlight potential problems proactively, and they should provide easy-to-use controls to respond to those potential problems. Imagine logging into one dashboard that provides a comprehensive view of <a href="https://www.cloudflare.com/application-services/products/securitycenter/">your network’s attack surface</a>, user activity, and performance/traffic health, receiving customized suggestions to tighten security and optimize performance, and being able to act on those suggestions with a single click.</p>
    <div>
      <h3>Better quality of experience, everywhere in the world</h3>
      <a href="#better-quality-of-experience-everywhere-in-the-world">
        
      </a>
    </div>
    <p>More classic critiques of the public Internet: it’s slow, unreliable, and increasingly subject to complicated regulations that make operating on the Internet as a CIO of a globally distributed company exponentially challenging. The platform CIOs need will make intelligent decisions to optimize performance and ensure reliability, while offering flexibility to make compliance easy.</p><p><b>Fast, in the ways that matter most.</b></p><p>Traditional methods of measuring network performance, like speed tests, don’t tell the full story of actual user experience. Next-generation platforms will measure performance holistically and consider application-specific factors, along with using real-time data on Internet health, to optimize traffic end-to-end.</p><p><b>Reliable, despite factors out of your control.</b></p><p>Scheduled downtime is a luxury of the past: today’s CIOs need to operate 24x7 networks with as close as possible to 100% uptime and reachability from everywhere in the world. They need a provider that’s resilient in its own services, but also has the capacity to handle massive attacks with grace and flexibility to route around issues with intermediary providers. Network teams should also not need to take action for their provider’s planned or unplanned data center outages, such as needing to manually configure new data center connections. And they should be able to onboard new locations at any time without waiting for vendors to provision additional capacity close to their network.</p><p><b>Localized and compliant with data privacy regulations.</b></p><p><a href="https://www.cloudflare.com/learning/privacy/what-is-data-sovereignty/">Data sovereignty</a> laws are rapidly evolving. CIOs need to bet on a platform that will give them the flexibility to adapt as new protections are rolled out across the globe, with one interface to manage their data (not fractured solutions in different regions).</p>
    <div>
      <h3>A paradigm shift that’s possible starting today</h3>
      <a href="#a-paradigm-shift-thats-possible-starting-today">
        
      </a>
    </div>
    <p>These changes sound radical and exciting. But they’re also intimidating — wouldn’t a shift this large be impossible to execute, or at least take an unmanageably long time, in complex modern networks? Our customers have proven this doesn’t have to be the case.</p><p><b>Meaningful change starting with just one flow</b></p><p>Generation 3 platforms should prioritize ease of use. It should be possible for companies to start their Zero Trust journey with just one traffic flow and grow momentum from there. There are lots of potential angles to start with, but we think one of the easiest is configuring clientless Zero Trust access for one application. Anyone, from the smallest to the largest organizations, should be able to pick an app and prove the value of this approach within minutes.</p><p><b>A bridge between the old &amp; new world</b></p><p>Shifting from network-level <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">access controls</a> (IP ACLs, VPNs, etc.) to application and user-level controls to enforce Zero Trust across your entire network will take time. CIOs should pick a platform that makes it easy to migrate infrastructure over time by allowing:</p><ul><li><p><b>Upgrading from IP-level to application-level architecture over time</b>: Start by connecting with a GRE or IPsec tunnel, then use automatic service discovery to identify high-priority applications to target for finer-grained connection.</p></li><li><p><b>Upgrading from more open to more restrictive policies over time</b>: Start with security rules that mirror your legacy architecture, then leverage analytics and logs to implement more restrictive policies once you can see who’s accessing what.</p></li><li><p><b>Making changes to be quick and easy</b>: Design your next-generation network using a modern SaaS interface.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2uR48rrlXRiy1jyHko824m/4bbe0c92c899d1e00da9b7210a1d9d5e/unnamed--3-.png" />
            
            </figure><p><b>Network Architecture Scorecard: Generation 3</b></p><table><tr><td><p><b>Characteristic</b></p></td><td><p><b>Score</b></p></td><td><p><b>Description</b></p></td></tr><tr><td><p>Security</p></td><td><p>⭐⭐⭐</p></td><td><p>Granular security controls are exercised on every traffic flow; attacks are blocked close to their source; technologies like Browser Isolation keep malicious code entirely off of user devices.</p></td></tr><tr><td><p>Performance</p></td><td><p>⭐⭐⭐</p></td><td><p>Security controls are enforced at location closest to each user; intelligent routing decisions ensure optimal performance for all types of traffic.</p></td></tr><tr><td><p>Reliability</p></td><td><p>⭐⭐⭐</p></td><td><p>The platform leverages redundant infrastructure to ensure 100% availability; no one device is responsible for holding policy and no one link is responsible for carrying all critical traffic.</p></td></tr><tr><td><p>Cost</p></td><td><p>⭐⭐</p></td><td><p>Total cost of ownership is reduced by consolidating functions.</p></td></tr><tr><td><p>Visibility</p></td><td><p>⭐⭐⭐</p></td><td><p>Data from across the edge is aggregated, processed and presented along with insights and controls to act on it.</p></td></tr><tr><td><p>Agility</p></td><td><p>⭐⭐⭐</p></td><td><p>Making changes to network configuration or policy is as simple as pushing buttons in a dashboard; changes propagate globally within seconds.</p></td></tr><tr><td><p>Precision</p></td><td><p>⭐⭐⭐</p></td><td><p>Controls are exercised at the user and application layer. Accomplishing “allow only HR to access employee payment data” looks like: <code>Users in HR on trusted devices allowed to access employee payment data</code></p></td></tr></table>
    <div>
      <h2>Cloudflare One is the first built-from-scratch, unified platform for next-generation networks</h2>
      <a href="#cloudflare-one-is-the-first-built-from-scratch-unified-platform-for-next-generation-networks">
        
      </a>
    </div>
    <p>In order to achieve the ambitious vision we’ve laid out, CIOs need a platform that can combine Zero Trust and network services operating on a world-class global network. We believe Cloudflare One is the first platform to enable CIOs to fully realize this vision.</p><p>We built Cloudflare One, our combined Zero Trust network-as-a-service platform, on our <a href="https://www.cloudflare.com/network/">global network</a> in software on commodity hardware. We initially started on this journey to serve the needs of our own IT and security teams and extended capabilities to our customers over time as we realized their potential to help other companies transform their networks. Every Cloudflare service runs on every server in over 250 cities with over 100 Tbps of capacity, providing unprecedented scale and performance. Our security services themselves are also faster — our DNS filtering runs on the world’s fastest public DNS resolver and identity checks run on Cloudflare Workers, the fastest serverless platform.</p><p>We leverage insights from over 28 million requests per second and 10,000+ interconnects to make smarter security and performance decisions for all of our customers. We provide both network connectivity and security services in a single platform with single-pass inspection and single-pane management to fill visibility gaps and deliver exponentially more value than the sum of point solutions could alone. We’re giving CIOs access to our globally distributed, blazing-fast, intelligent network to use as an extension of theirs.</p><p>This week, we’ll recap and expand on Cloudflare One, with examples from real customers who are building their next-generation networks on Cloudflare. We’ll dive more deeply into the capabilities that are available today and how they’re solving the problems introduced in Generation 2, as well as introduce some new product areas that will make CIOs’ lives easier by eliminating the cost and complexity of legacy hardware, hardening security across their networks and from multiple angles, and making all traffic routed across our already fast network even faster.</p><p>We’re so excited to share how we’re making our dreams for the future of corporate networks reality — we hope CIOs (and everyone!) reading this are excited to hear about it.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[NaaS]]></category>
            <guid isPermaLink="false">ZBDW05oRieXSKlFPx7O96</guid>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Magic makes your network faster]]></title>
            <link>https://blog.cloudflare.com/magic-makes-your-network-faster/</link>
            <pubDate>Thu, 16 Sep 2021 12:59:51 GMT</pubDate>
            <description><![CDATA[ Today, as part of Speed Week, we’ll break down the other side of the Magic: how using Cloudflare can automatically make your entire network faster.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We <a href="/magic-transit/">launched Magic Transit</a> two years ago, followed more recently by its siblings <a href="/magic-wan-firewall/">Magic WAN</a> and <a href="/introducing-magic-firewall/">Magic Firewall</a>, and have talked at length about how this suite of products helps security teams sleep better at night by protecting entire networks from malicious traffic. Today, as part of <a href="/fastest-internet/">Speed Week</a>, we’ll break down the other side of the Magic: how using Cloudflare can automatically make your entire network faster. Our scale and interconnectivity, use of data to make more intelligent routing decisions, and inherent architecture differences versus traditional networks all contribute to performance improvements across all IP traffic.</p>
    <div>
      <h3>What is Magic?</h3>
      <a href="#what-is-magic">
        
      </a>
    </div>
    <p>Cloudflare’s <a href="https://www.cloudflare.com/network-services/">“Magic” services</a> help customers connect and secure their networks without the cost and complexity of maintaining legacy hardware. Magic Transit provides connectivity and DDoS protection for Internet-facing networks; Magic WAN enables customers to replace legacy <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-wan/">WAN architectures</a> by routing private traffic through Cloudflare; and Magic Firewall protects all connected traffic with a built-in <a href="https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/">firewall-as-a-service</a>. All three share underlying architecture principles that form the basis of the performance improvements we’ll dive deeper into below.</p>
    <div>
      <h3>Anycast everything</h3>
      <a href="#anycast-everything">
        
      </a>
    </div>
    <p>In contrast to traditional “point-to-point” architecture, Cloudflare uses Anycast GRE or IPsec (coming soon) tunnels to send and receive traffic for customer networks. This means that customers can set up a single tunnel to Cloudflare, but effectively get connected to every single Cloudflare location, dramatically simplifying the process to configure and maintain network connectivity.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4y0u7nLWoslE47axWaq81g/cd10c416b9795196f6f6bd42df1934ff/D1.png" />
            
            </figure>
    <div>
      <h3>Every service everywhere</h3>
      <a href="#every-service-everywhere">
        
      </a>
    </div>
    <p>In addition to being able to send and receive traffic from anywhere, Cloudflare’s edge network is also designed to run every service on every server in every location. This means that incoming traffic can be processed wherever it lands, which allows us to <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">block DDoS attacks</a> and other malicious traffic within seconds, apply firewall rules, and route traffic efficiently and without bouncing traffic around between different servers or even different locations before it’s dispatched to its destination.</p>
    <div>
      <h3>Zero Trust + Magic: the next-gen network of the future</h3>
      <a href="#zero-trust-magic-the-next-gen-network-of-the-future">
        
      </a>
    </div>
    <p>With <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a>, customers can seamlessly combine <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> and network connectivity to build a faster, more secure, more reliable experience for their entire corporate network. Everything we’ll talk about today applies even more to customers using the entire Cloudflare One platform - stacking these products together means the performance benefits multiply (check out <a href="/the-zero-trust-platform-built-for-speed">our post on Zero Trust and speed</a> from today for more on this).</p>
    <div>
      <h3>More connectivity = faster traffic</h3>
      <a href="#more-connectivity-faster-traffic">
        
      </a>
    </div>
    <p>So where does the Magic come in? This part isn’t intuitive, especially for customers using Magic Transit in front of their network for DDoS protection: how can adding a network hop <i>subtract</i> latency?</p><p>The answer lies in Cloudflare’s network architecture — our web of connectivity to the rest of the Internet. Cloudflare has invested heavily in building one of the world’s most <a href="https://www.peeringdb.com/net/4224">interconnected networks</a> (9800 interconnections and counting, including with major ISPs, cloud services, and enterprises). We’re also continuing to grow our own <a href="/250-cities-is-just-the-start/">private backbone</a> and giving customers the ability to <a href="/cloudflare-network-interconnect/">directly connect with us</a>. And our expansive connectivity to <a href="/last-mile-insights/">last mile</a> providers means we’re just milliseconds away from the source of all your network traffic, regardless of where in the world your users or employees are.</p><p>This toolkit of varying connectivity options means traffic routed through the Cloudflare network is often meaningfully faster than paths across the public Internet alone, because more options available for <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/">BGP</a> path selection mean increased ability to choose more performant routes. Imagine having only one possible path between your house and the grocery store versus ten or more - chances are, adding more options means better alternatives will be available. A cornucopia of connectivity methods also means more resiliency: if there’s an issue on one of the paths (like construction happening on what is usually the fastest street), we can easily route around it to avoid impact to your traffic.</p><p>One common comparison customers are interested in is latency for inbound traffic. From the end user perspective, does routing through Cloudflare speed up or slow down traffic to networks protected by Magic Transit? Our response: let’s test it out and see! We’ve repeatedly compared Magic Transit vs standard Internet performance for customer networks across geographies and industries and consistently seen really exciting results. Here’s an example from one recent test where we used third-party probes to measure the ping time to the same customer network location (their data center in Qatar) before and after onboarding with Magic Transit:</p><table><tr><td><p><b>Probe location</b></p></td><td><p><b>RTT w/o Magic (ms)</b></p></td><td><p><b>RTT w/ Magic (ms)</b></p></td><td><p><b>Difference (ms)</b></p></td><td><p><b>Difference (% improvement)</b></p></td></tr><tr><td><p>Dubai</p></td><td><p>27</p></td><td><p>23</p></td><td><p>4</p></td><td><p>13%</p></td></tr><tr><td><p>Marseille</p></td><td><p>202</p></td><td><p>188</p></td><td><p>13</p></td><td><p>7%</p></td></tr><tr><td><p>Global (results averaged across 800+ distributed probes)</p></td><td><p>194</p></td><td><p>124</p></td><td><p>70</p></td><td><p>36%</p></td></tr></table><p>All of these results were collected <i>without</i> the use of Argo Smart Routing for Packets, which we announced on Tuesday. Early data indicates that networks using Smart Routing will see even more substantial gains.</p>
    <div>
      <h3>Modern architecture eliminates traffic trombones</h3>
      <a href="#modern-architecture-eliminates-traffic-trombones">
        
      </a>
    </div>
    <p>In addition to the performance boost available for traffic routed across the Cloudflare network versus the public Internet, customers using Magic products benefit from a new architecture model that totally removes up to thousands of miles worth of latency.</p><p>Traditionally, enterprises adopted a “hub and spoke” model for granting employees access to applications within and outside their network. All traffic from within a connected network location was routed through a central “hub” where a stack of network hardware (e.g. firewalls) was maintained. This model worked great in locations where the hub and spokes were geographically close, but started to strain as companies became more global and applications moved to the cloud.</p><p>Now, networks using hub and spoke architecture are often backhauling traffic thousands of miles, between continents and across oceans, just to apply security policies before packets are dispatched to their final destination, which is often physically closer to where they started! This creates a “trombone” effect, where precious seconds are wasted bouncing traffic back and forth across the globe, and performance problems are amplified by packet loss and instability along the way.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1M54AiCAu5Ph3fGu9Yp5at/609d30e5e2cc4fbdb6327e0fd64bc8cc/D2.png" />
            
            </figure><p>Network and security teams have tried to combat this issue by installing hardware at more locations to establish smaller, regional hubs, but this quickly becomes prohibitively expensive and hard to manage. The price of purchasing multiple hardware boxes and dedicated private links adds up quickly, both in network gear and connectivity itself as well as the effort required to maintain additional infrastructure. Ultimately, this cost usually outweighs the benefit of the seconds regained with shorter network paths.</p>
    <div>
      <h3>The “hub” is everywhere</h3>
      <a href="#the-hub-is-everywhere">
        
      </a>
    </div>
    <p>There’s a better way — with the Anycast architecture of Magic products, all traffic is automatically routed to the closest Cloudflare location to its source. There, security policies are applied with single-pass inspection before traffic is routed to its destination. This model is conceptually similar to a hub and spoke, except that the hub is everywhere: 95% of the entire Internet-connected world is within 50 ms of a Cloudflare location (check out this week’s <a href="/250-cities-is-just-the-start/">updates</a> on our quickly-expanding network presence for the latest). This means instead of tromboning traffic between locations, it can stop briefly at a Cloudflare hop in-path before it goes on its way: dramatically faster architecture without compromising security.</p><p>To demonstrate how this architecture shift can make a meaningful difference, we created a lab to mirror the setup we’ve heard many customers describe as they’ve explained performance issues with their existing network. This example customer network is headquartered in South Carolina and has branch office locations on the west coast, in California and Oregon. Traditionally, traffic from each branch would be backhauled through the South Carolina “hub” before being sent on to its destination, either another branch or the public Internet.</p><p>In our alternative setup, we’ve<a href="https://www.cloudflare.com/learning/network-layer/what-is-branch-networking/"> connected each customer network location</a> to Cloudflare with an Anycast GRE tunnel, simplifying configuration and removing the South Carolina trombone. We can also enforce network and application-layer filtering on all of this traffic, ensuring that the faster network path doesn’t compromise security.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1CowxWFJxc3QGwM1mauUi6/5494d0358d312c6556e746ec3b81d5a4/D4.png" />
            
            </figure><p>Here’s a summary of results from performance tests on this example network demonstrating the difference between the traditional hub and spoke setup and the Magic “global hub” — we saw up to 70% improvement in these tests, demonstrating the dramatic impact this architecture shift can make.</p><table><tr><td><p></p></td><td><p><b>LAX &lt;&gt; OR (ms)</b></p></td></tr><tr><td><p><b>ICMP round-trip for “Regular” (hub and spoke) WAN</b></p></td><td><p>127</p></td></tr><tr><td><p><b>ICMP round-trip for Magic WAN</b></p></td><td><p>38</p></td></tr><tr><td><p><b>Latency savings for Magic WAN vs “Regular” WAN</b></p></td><td><p>70%</p></td></tr></table><p>This effect can be amplified for networks with globally distributed locations — imagine the benefits for customers who are used to delays from backhauling traffic between different regions across the world.</p>
    <div>
      <h3>Getting smarter</h3>
      <a href="#getting-smarter">
        
      </a>
    </div>
    <p>Adding more connectivity options and removing traffic trombones provide a performance boost for all Magic traffic, but we’re not stopping there. In the same way we leverage insights from hundreds of billions of requests per day to block new types of malicious traffic, we’re also using our unique perspective on Internet traffic to make more intelligent decisions about routing customer traffic versus relying on BGP alone. Earlier this week, we announced <a href="/argo-v2/">updates to Argo Smart Routing</a> including the brand-new Argo Smart Routing for Packets. Customers using Magic products can enable it to automatically boost performance for any IP traffic routed through Cloudflare (by 10% on average according to results so far, and potentially more depending on the individual customer’s network topology) — read more on this in the <a href="/argo-v2/">announcement blog</a>.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>The modern architecture, well-connected network, and intelligent optimizations we’ve talked about today are just the start. Our vision is for any customer using Magic to connect and protect their network to have the best performance possible for all of their traffic, automatically. We’ll keep investing in expanding our presence, interconnections, and backbone, as well as continuously improving Smart Routing — but we’re also already cooking up brand-new products in this space to deliver optimizations in new ways, including WAN Optimization and Quality of Service functions. Stay tuned for more Magic coming soon, and get in touch with your account team to learn more about how we can help make your network faster starting today.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div><p></p> ]]></content:encoded>
            <category><![CDATA[Speed Week]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <category><![CDATA[Magic Firewall]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">9yAkdrsirUlHVaB340mt2</guid>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Greencloud]]></title>
            <link>https://blog.cloudflare.com/introducing-greencloud/</link>
            <pubDate>Fri, 30 Jul 2021 12:59:00 GMT</pubDate>
            <description><![CDATA[ Greencloud is a coalition of Cloudflare employees who are passionate about the environment. Initially founded in 2019, we’re a cross-functional, global team with a few areas of focus: Awareness, Support, and Advocacy. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Over the past few days, as part of Cloudflare’s Impact Week, we’ve written about the work we’re doing to help build a greener Internet. We’re making <a href="/cloudflare-committed-to-building-a-greener-internet/">bold climate commitments</a> for our own network and facilities and introducing <a href="/helping-build-a-green-internet/">new capabilities</a> that help customers understand and reduce their impact. And in addition to organization-level initiatives, we also recognize the importance of individual impact — which is why we’re excited to publicly introduce Greencloud, our sustainability-focused employee working group.</p>
    <div>
      <h2>What is Greencloud?</h2>
      <a href="#what-is-greencloud">
        
      </a>
    </div>
    <p>Greencloud is a coalition of Cloudflare employees who are passionate about the environment. Initially founded in 2019, we’re a cross-functional, global team with a few areas of focus:</p><ol><li><p><b><b><b>Awareness:</b></b></b> Greencloud compiles and shares resources about environmental activism with each other and the broader organization. We believe that collective action — not just conscious consumerism, but also engagement in local policy and community movements — is critical to a more sustainable future, and that the ability to affect change starts with education. We’re also consistently inspired by the great work other folks in tech are doing in this space, and love sharing updates from peers that push us to do better within our own spheres of influence.</p></li><li><p><b><b><b>Support:</b></b></b> Our membership includes Cloudflare team members from across the org chart, which enables us to be helpful in supporting multidisciplinary projects led by functional teams within Cloudflare.</p></li><li><p><b><b><b>Advocacy:</b></b></b> We recognize the importance of both individual and organization-level action. We continue to challenge ourselves, each other and the broader organization to think about environmental impact in every decision we make as a company.</p></li></ol><p>Our vision is to contribute on every level to addressing the climate crisis and creating a more sustainable future, helping Cloudflare become a clear leader in sustainable practices among tech companies. Moreover, we want to empower our colleagues to make more sustainable decisions in each of our individual lives.</p>
    <div>
      <h2>What has Greencloud done so far?</h2>
      <a href="#what-has-greencloud-done-so-far">
        
      </a>
    </div>
    <p>Since launching in 2019, Greencloud has created a space for conversation and idea generation around Cloudflare’s sustainability initiatives, many of which have been implemented across our organization. As a group, we’ve created content to educate ourselves and external audiences about a broad range of sustainability topics:</p><ul><li><p>Benchmarked Cloudflare’s sustainability practices against peer companies to understand our baseline and source ideas for improvement.</p></li><li><p>Curated guides for colleagues on peer-reviewed content, product recommendations, and “low-hanging fruit” actions we all have the ability to take, such as choosing a sustainable 401k investment plan and using a paperless option for all employee documents.</p></li><li><p>Hosted events such as sustainability-themed trivia/quiz nights to spark discussion and teach participants techniques for making more sustainable decisions in our own homes and lives.</p></li></ul><p>In addition to creating “evergreen” resources and hosting events, Greencloud threw a special celebration for April 22, 2021 — the 51st global Earth Day. For the surrounding week, we hosted a series of events to engage our employees and community in sustainability education and actions.</p>
    <div>
      <h3>Greencloud TV Takeover</h3>
      <a href="#greencloud-tv-takeover">
        
      </a>
    </div>
    <p>You can catch reruns of our Earth Week content on <a href="https://cloudflare.tv/live">Cloudflare TV</a>, covering a broad range of topics:</p><p><b>Tuesday: Infrastructure</b>A <a href="https://cloudflare.tv/event/7eKhY5nJAuAMEjcKnOXQM6">chat with Michael Aylward</a>, Head of Cloudflare's Network Partners Program and renewable energy expert, about the carbon footprint of Internet infrastructure. We explored how the Internet contributes to climate change and what tech companies, including Cloudflare, are doing to minimize this footprint.</p><p><b>Wednesday: Policy</b>An <a href="https://cloudflare.tv/event/63kmVf8Yn6LDfQnCGcEAYj">interview with Doug Kramer, Cloudflare's General Counsel, and Patrick Day, Cloudflare's Senior Policy Counsel</a>, on the overlap between sustainability, tech, and public policy. We dove into how tech companies, including Cloudflare, are working with policymakers to build a more sustainable future.</p><p><b>Thursday: Cloudflare and the Climate</b><a href="https://cloudflare.tv/event/4b59dsJonDA5aYp5oQePE7">Francisco Ponce de León interviewed Sagar Aryal</a>, the CTO of Plant for the Planet, an organization of young Climate Justice Ambassadors with the goal of planting one trillion trees. Plant for the Planet is a participant in <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>, Cloudflare's program providing free protection for at-risk public interest groups.</p><p>In addition, Amy Bibeau, our Greencloud Places team lead, <a href="https://cloudflare.tv/event/1XqkIkbJ6FAI7LMoQNVe12">interviewed</a> Cloudflare's Head Of Real Estate and Workplace Operations, Caroline Quick and LinkedIn's Dana Jennings, Senior Project Manager, Global Sustainability for a look into the opportunities and challenges around creating sustainable workplaces. Like most companies, Cloudflare is re-thinking what our workplace will look like post-COVID.  Baking sustainability into those plans, and being a model for other companies, can be game changing.</p><p><b>Friday: Personal Impact &amp; Trivia</b>A panel of Greencloud employees <a href="https://cloudflare.tv/event/7aua77oPST8zmxbPLKaScC">addressed the challenge</a> of personal versus collective/system-level action and broke down some of the highest value actions we’re working on taking in our own lives.</p><p>Finally, Greencloud took over Cloudflare TV’s signature game show <a href="https://cloudflare.tv/event/qlxaiWG9qDhdSDtu1BgkA">Silicon Valley Squares with Earth Day-themed questions!</a></p>
    <div>
      <h2>Get engaged</h2>
      <a href="#get-engaged">
        
      </a>
    </div>
    <p>No one person, group, or organization working alone can save our planet — the degree of collective action required to reverse climate change is staggering, but we’re excited and inspired by the work that leaders across every industry are pitching in every day. We’d love for you and/or your organization to join us in this calling to create a more sustainable planet and tell us about your initiatives to exchange ideas.</p> ]]></content:encoded>
            <category><![CDATA[Impact Week]]></category>
            <category><![CDATA[Earth Day]]></category>
            <category><![CDATA[Life at Cloudflare]]></category>
            <category><![CDATA[Sustainability]]></category>
            <category><![CDATA[Green]]></category>
            <guid isPermaLink="false">5WFvNmDkwMoQVcNWRBwuFI</guid>
            <dc:creator>Annika Garbers</dc:creator>
            <dc:creator>Francisco Ponce de León</dc:creator>
        </item>
    </channel>
</rss>