
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Tue, 14 Apr 2026 19:18:57 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Eliminating hardware with Load Balancing and Cloudflare One]]></title>
            <link>https://blog.cloudflare.com/eliminating-hardware-with-load-balancing-and-cloudflare-one/</link>
            <pubDate>Tue, 16 Jul 2024 13:02:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare is adding support for end-to-end private traffic flows to our local traffic management (LTM) load balancing solution, and allowing for the replacement of hardware load balancers ]]></description>
            <content:encoded><![CDATA[ <p></p><p>In 2023, Cloudflare <a href="https://blog.cloudflare.com/elevate-load-balancing-with-private-ips-and-cloudflare-tunnels-a-secure-path-to-efficient-traffic-distribution/"><u>introduced a new load balancing solution</u></a> supporting Private Network Load Balancing. This year, we took it a step further by introducing support for <a href="https://blog.cloudflare.com/extending-local-traffic-management-load-balancing-to-layer-4-with-spectrum/"><u>layer 4 load balancing to private networks via Spectrum</u></a>. Now, organizations can seamlessly balance public HTTP(S), TCP, and UDP traffic to their <a href="https://www.cloudflare.com/developer-platform/solutions/hosting/">privately hosted applications</a>. Today, we’re thrilled to unveil our latest enhancement: support for end-to-end private traffic flows as well as WARP authenticated device traffic, eliminating the need for dedicated hardware load balancers! These groundbreaking features are powered by the enhanced integration of <a href="https://www.cloudflare.com/application-services/products/load-balancing/"><u>Cloudflare load balancing</u></a> with our Cloudflare One platform, and are available to our enterprise customers. With this upgrade, our customers can now utilize Cloudflare load balancers for both public and private traffic directed at private networks.</p>
    <div>
      <h3>Cloudflare Load Balancing today</h3>
      <a href="#cloudflare-load-balancing-today">
        
      </a>
    </div>
    <p>Before discussing the new features, let's review Cloudflare's existing load balancing support and the challenges customers face.</p><p>Cloudflare currently supports four main load balancing traffic flows:</p><ol><li><p>Internet-facing load balancers connecting to <b>publicly</b> accessible endpoints at layer 7, supporting HTTP(S).</p></li><li><p>Internet-facing load balancers connecting to <b>publicly</b> accessible endpoints at layer 4 (Spectrum), supporting TCP and UDP services</p></li><li><p>Internet-facing load balancers connecting to <b>private</b> endpoints at layer 7 HTTP(S) via Cloudflare Tunnels.</p></li><li><p>Internet-facing load balancers connecting to <b>private</b> endpoints at layer 4 (Spectrum), supporting TCP and UDP services via Cloudflare Tunnels.</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/37XvcgIiO2eVu1DtYJMDae/8409b6ae682fe57f2f0c67bed2e35d7a/image3-10.png" />
            
            </figure><p>One of the biggest advantages of Cloudflare’s load balancing solutions is the elimination of hardware costs and maintenance. Unlike hardware-based load balancers, which are costly to purchase, license, operate, and upgrade, Cloudflare’s solution requires no hardware. There's no need to buy additional modules or new licenses, and you won't face end-of-life issues with equipment that necessitate costly replacements.</p><p>With Cloudflare, you can focus on innovation and growth. <a href="https://www.cloudflare.com/learning/performance/what-is-load-balancing/">Load balancers</a> are deployed in every Cloudflare data center across the globe, in over 300 cities, providing virtually unlimited scale and capacity. You never need to worry about bandwidth constraints, deployment locations, extra hardware modules, downtime, upgrades, or supply chain constraints. Cloudflare’s global <a href="https://www.cloudflare.com/learning/cdn/glossary/anycast-network/">Anycast</a> network ensures that every customer connects to a nearby data center and load balancer, where policies, rules, and steering are applied efficiently. And now, the resilience, scale, and simplicity of Cloudflare load balancers can be integrated into your private networks! We have worked hard to ensure that Cloudflare load balancers are highly available and disaster ready, from the core to the edge – <a href="/major-data-center-power-failure-again-cloudflare-code-orange-tested/">even when datacenters lose power</a>.</p>
    <div>
      <h3>Keeping private resources private with Magic WAN</h3>
      <a href="#keeping-private-resources-private-with-magic-wan">
        
      </a>
    </div>
    <p>Before today's announcement, all of Cloudflare's load balancers operating at layer 4 have been connected to the public Internet. Customers have been able to secure the traffic flowing to their load balancers with WAF rules and Zero Trust policies, but some customers would prefer to keep certain resources private and under no circumstances exposed to the Internet. It’s been possible to isolate origin servers and endpoints this way, which can exist on private networks that are only accessible via <a href="https://www.cloudflare.com/products/tunnel/">Cloudflare Tunnels</a>. And as of today, we can offer a similar level of isolation to customers’ layer 4 load balancers.</p><p><a href="/elevate-load-balancing-with-private-ips-and-cloudflare-tunnels-a-secure-path-to-efficient-traffic-distribution/">In our previous blog post</a>, we discussed connecting these internal or private resources to the Cloudflare global network and how Cloudflare would soon introduce load balancers that are accessible via private IP addresses. Unlike other Cloudflare load balancers, these do not have an associated hostname. Rather, they are accessible via an <a href="https://datatracker.ietf.org/doc/html/rfc1918">RFC 1918</a> private IP address. In the land of load balancers, this is often referred to as a virtual IP (VIP). As of today, load balancers that are accessible at private IPs can now be used within a virtual network to isolate traffic to a certain set of Cloudflare tunnels, enabling customers to load balance traffic within their private network without exposing applications to the public Internet.</p><p>The question you might be asking is, “If I have a private IP load balancer and privately hosted applications, how do I or my users actually reach these now-private services?”</p><p><a href="https://www.cloudflare.com/network-services/products/magic-wan/">Cloudflare Magic WAN</a> can now be used as an on-ramp in tandem with Cloudflare load balancers that are accessible via an assigned private IP address. Magic WAN provides a secure and high-performance connection to internal resources, ensuring that traffic remains private and optimized across our global network. With Magic WAN, customers can connect their corporate networks directly to Cloudflare's global network with <a href="https://www.cloudflare.com/learning/network-layer/what-is-gre-tunneling/">GRE</a> or <a href="https://www.cloudflare.com/learning/network-layer/what-is-ipsec/">IPSec</a> tunnels, maintaining privacy and security while enjoying seamless connectivity. The Magic WAN Connector easily establishes connectivity to Cloudflare without the need to configure network gear, and it can be deployed at any physical or cloud location! With the enhancements to Cloudflare’s load balancing solution, customers can confidently keep their corporate applications resilient while maintaining the end-to-end privacy and security of their resources.</p><p>This enhancement opens up numerous use cases for internal load balancing, such as managing traffic between different data centers, efficiently routing traffic for internally hosted applications, optimizing resource allocation for critical applications, and ensuring high availability for internal services. Organizations can now replace traditional hardware-based load balancers, reducing complexity and lowering costs associated with maintaining physical infrastructure. By leveraging Cloudflare load balancing and Magic WAN, companies can achieve greater flexibility and scalability, adapting quickly to changing network demands without the need for additional hardware investments.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/70wo9SnF4FzjaQJpqcddUQ/344b162093a4686c6bb86e4369ffff01/image2-6.png" />
            
            </figure><p>But what about latency? Load balancing is all about keeping your applications resilient and performant and Cloudflare was built with <a href="/recapping-speed-week-2023/">speed at its core</a>. There is a Cloudflare datacenter within 50ms of 95% of the Internet-connected population globally! Now, we support all Cloudflare One on-ramps to not only provide seamless and secure connectivity, but also to dramatically reduce latency compared to legacy solutions. Load balancing also works seamlessly with <a href="https://www.cloudflare.com/application-services/products/argo-smart-routing/">Argo Smart Routing</a> to intelligently route around network congestion to improve your application performance by up to 30%! Check out the blogs <a href="/magic-makes-your-network-faster/">here</a> and <a href="/the-zero-trust-platform-built-for-speed">here</a> to read more about how Cloudflare One can reduce application latency.</p>
    <div>
      <h3>Supporting distributed users with Cloudflare WARP</h3>
      <a href="#supporting-distributed-users-with-cloudflare-warp">
        
      </a>
    </div>
    <p>But what about when users are distributed and not connected to the local corporate network? <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/">Cloudflare WARP</a> can now be used as an on-ramp to reach Cloudflare load balancers that are configured with private IP addresses. The Cloudflare WARP client allows you to protect corporate devices by securely and privately sending traffic from those devices to Cloudflare’s global network, where Cloudflare Gateway can apply advanced web filtering. The WARP client also makes it possible to apply advanced <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> policies that check a device’s health before it connects to corporate applications.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5q6TyuYcWbbbFdPere5Ib/b14bb1820ee05ea4d89fb392879f8d90/image1-10.png" />
            
            </figure><p>In this load balancing use case, WARP pairs up perfectly with <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/">Cloudflare Tunnels</a> so that customers can place their private origins within virtual networks to help either isolate traffic or handle overlapping private IP addresses. Once these virtual networks are defined, administrators can configure WARP profiles to allow their users to connect to the proper virtual networks. Once connected, WARP takes the configuration of the virtual networks and installs routes on the end users’ devices. These routes will tell the end user’s device how to reach the Cloudflare load balancer that was created with a private, non-publicly routable IP address. The administrator could then create a <a href="https://www.cloudflare.com/learning/dns/dns-records/">DNS record</a> locally that would point to that private IP address. Once DNS resolves locally, the device would route all subsequent traffic over the WARP connection. This is all seamless to the user and occurs with minimal latency.</p>
    <div>
      <h3>How we connected load balancing to Cloudflare One</h3>
      <a href="#how-we-connected-load-balancing-to-cloudflare-one">
        
      </a>
    </div>
    <p>In contrast to public L4 or L7 load balancers, private L4 load balancers are not going to have publicly addressable hostnames or IP addresses, but we still need to be able to handle their traffic. To make this possible, we had to integrate existing load balancing services with private networking services created by our Cloudflare One team. To do this, upon creation of a private load balancer, we now assign a private IP address within the customer's virtual network. When traffic destined for a private load balancer enters Cloudflare, our private networking services make a request to load balancing to determine which endpoint to connect to. The information in the response from load balancing is used to connect directly to a privately hosted endpoint via a variety of secure traffic off-ramps. This differs significantly from our public load balancers where traffic is off-ramped to the public internet. In fact, we can now direct traffic from any on-ramp to any off-ramp! This allows for significant flexibility in architecture. For example, not only can we direct WARP traffic to an endpoint connected via GRE or IPSec, but we can also off-ramp this traffic to Cloudflare Tunnel, a CNI connection, or out to the public internet! Now, instead of purchasing a bespoke load balancing solution for each traffic type, like an application or network load balancer, you can configure a single load balancing solution to handle virtually any permutation of traffic that your business needs to run!</p>
    <div>
      <h3>Getting started with internal load balancing</h3>
      <a href="#getting-started-with-internal-load-balancing">
        
      </a>
    </div>
    <p>We are excited to be releasing these new load balancing features that solve critical connectivity issues for our customers and effectively eliminate the need for a hardware load balancer. Cloudflare load balancers now support end-to-end private traffic flows with Cloudflare One. To get started with configuring this feature, take a look at our <a href="https://developers.cloudflare.com/load-balancing/">load balancing documentation</a>.</p><p>We are just getting started with our local traffic management load balancing support. There is so much more to come including user experience changes, enhanced layer 4 session affinity, new steering methods, refined control of egress ports, and more.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <category><![CDATA[WARP]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Load Balancing]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Hardware]]></category>
            <guid isPermaLink="false">1yN3NeaPbXuFjUrmpQeDhV</guid>
            <dc:creator>Noah Crouch</dc:creator>
        </item>
        <item>
            <title><![CDATA[Free network flow monitoring for all enterprise customers]]></title>
            <link>https://blog.cloudflare.com/free-network-monitoring-for-enterprise/</link>
            <pubDate>Thu, 07 Mar 2024 14:00:43 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to announce that a free version of Cloudflare’s network flow monitoring product, Magic Network Monitoring, is now available to all Enterprise Customers ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4JDYfP3P5eCvUA6t2OVQRW/9623c870e75e74e813cd0abc5a9b8da9/image1-24.png" />
            
            </figure><p>A key component of <a href="https://www.cloudflare.com/network-security/">effective corporate network security</a> is establishing end to end visibility across all traffic that flows through the network. Every network engineer needs a complete overview of their network traffic to confirm their security policies work, to identify new vulnerabilities, and to analyze any shifts in traffic behavior. Often, it’s difficult to build out effective network monitoring as teams struggle with problems like configuring and tuning data collection, managing storage costs, and analyzing traffic across multiple visibility tools.</p><p>Today, we’re excited to announce that a free version of Cloudflare’s <a href="https://www.cloudflare.com/network-services/solutions/network-monitoring-tools/">network flow monitoring</a> product, Magic Network Monitoring, is available to all Enterprise Customers. Every Enterprise Customer can configure Magic Network Monitoring and immediately improve their network visibility in as little as 30 minutes via our self-serve onboarding process.</p><p>Enterprise Customers can visit the <a href="https://www.cloudflare.com/network-services/products/magic-network-monitoring/">Magic Network Monitoring product page</a>, click “Talk to an expert”, and fill out the form. You’ll receive access within 24 hours of submitting the request. Over the next month, the free version of Magic Network Monitoring will be rolled out to all Enterprise Customers. The product will automatically be available by default without the need to submit a form.</p>
    <div>
      <h3>How it works</h3>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>Cloudflare customers can send their network flow data (either NetFlow or sFlow) from their routers to Cloudflare’s network edge.</p><p>Magic Network Monitoring will pick up this data, parse it, and instantly provide insights and analytics on your network traffic. These analytics include traffic volume overtime in bytes and packets, top protocols, sources, destinations, ports, and TCP flags.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6AZo6eGAZteqDAzTz8JSzc/83dd771696c34386f200144f95fb8207/image3-20.png" />
            
            </figure>
    <div>
      <h3>Dogfooding Magic Network Monitoring during the remediation of the Thanksgiving 2023 security incident</h3>
      <a href="#dogfooding-magic-network-monitoring-during-the-remediation-of-the-thanksgiving-2023-security-incident">
        
      </a>
    </div>
    <p>Let’s review a recent example of how Magic Network Monitoring improved Cloudflare’s own network security and traffic visibility during the <a href="/thanksgiving-2023-security-incident">Thanksgiving 2023 security incident</a>. Our security team needed a lightweight method to identify malicious packet characteristics in our core data center traffic. We monitored for any network traffic sourced from or destined to a list of ASNs associated with the bad actor. Our security team setup Magic Network Monitoring and established visibility into our first core data center within 24 hours of the project kick-off. Today, Cloudflare continues to use Magic Network Monitoring to monitor for traffic related to bad actors and to provide real time traffic analytics on more than 1 Tbps of core data center traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/15lzmYJOViOw36MiEo7RR1/e3252df389014e6a52aad4eab6a78b7c/Screenshot-2024-03-07-at-10.55.47.png" />
            
            </figure><p><i>Magic Network Monitoring - Traffic Analytics</i></p>
    <div>
      <h3>Monitoring local network traffic from IoT devices</h3>
      <a href="#monitoring-local-network-traffic-from-iot-devices">
        
      </a>
    </div>
    <p>Magic Network Monitoring also improves visibility on any network traffic that doesn’t go through Cloudflare. Imagine that you’re a network engineer at ACME Corporation, and it’s your job to manage and troubleshoot IoT devices in a factory that are connected to the factory’s internal network. The traffic generated by these IoT devices doesn’t go through Cloudflare because it is destined to other devices and endpoints on the internal network. Nonetheless, you still need to establish network visibility into device traffic over time to monitor and troubleshoot the system.</p><p>To solve the problem, you configure a router or other network device to securely send encrypted traffic flow summaries to Cloudflare via an IPSec tunnel. Magic Network Monitoring parses the data, and instantly provides you with insights and analytics on your network traffic. Now, when an IoT device goes down, or a connection between IoT devices is unexpectedly blocked, you can analyze historical network traffic data in Magic Network Monitoring to speed up the troubleshooting process.</p>
    <div>
      <h3>Monitoring cloud network traffic</h3>
      <a href="#monitoring-cloud-network-traffic">
        
      </a>
    </div>
    <p>As <a href="https://www.cloudflare.com/learning/cloud/what-is-cloud-networking/">cloud networking</a> becomes increasingly prevalent, it is essential for enterprises to <a href="https://www.cloudflare.com/network-services/solutions/enterprise-network-security/">invest in visibility</a> across their cloud environments. Let’s say you’re responsible for monitoring and troubleshooting your corporation's cloud network operations which are spread across multiple public cloud providers. You need to improve visibility into your cloud network traffic to analyze and troubleshoot any unexpected traffic patterns like configuration drift that leads to an exposed network port.</p><p>To improve traffic visibility across different cloud environments, you can export cloud traffic flow logs from any virtual device that supports NetFlow or sFlow to Cloudflare. In the future, we are building support for native cloud VPC flow logs in conjunction with <a href="/introducing-magic-cloud-networking">Magic Cloud Networking</a>. Cloudflare will parse this traffic flow data and provide alerts plus analytics across all your cloud environments in a single pane of glass on the Cloudflare dashboard.</p>
    <div>
      <h3>Improve your security posture today in less than 30 minutes</h3>
      <a href="#improve-your-security-posture-today-in-less-than-30-minutes">
        
      </a>
    </div>
    <p>If you’re an existing Enterprise customer, and you want to improve your corporate network security, you can get started right away. Visit the <a href="https://www.cloudflare.com/network-services/products/magic-network-monitoring/">Magic Network Monitoring product page</a>, click “Talk to an expert”, and fill out the form. You’ll receive access within 24 hours of submitting the request. You can begin the self-serve onboarding tutorial, and start monitoring your first batch of network traffic in less than 30 minutes.</p><p>Over the next month, the free version of Magic Network Monitoring will be rolled out to all Enterprise Customers. The product will be automatically available by default without the need to submit a form.</p><p>If you’re interested in becoming an Enterprise Customer, and have more questions about Magic Network Monitoring, you can <a href="https://www.cloudflare.com/network-services/products/magic-network-monitoring/">talk with an expert</a>. If you’re a free customer, and you’re interested in testing a limited beta of Magic Network Monitoring, you can <a href="https://docs.google.com/forms/d/1umsmwHmXgMesP2t4wH94uVExHaT60tb5RTeawqR_9Cg/edit">fill out this form to request access</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Magic Network Monitoring]]></category>
            <category><![CDATA[Network]]></category>
            <category><![CDATA[Monitoring]]></category>
            <category><![CDATA[IoT]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <guid isPermaLink="false">5kxbpURa5uO3pOPgoXY9Ga</guid>
            <dc:creator>Chris Draper</dc:creator>
        </item>
        <item>
            <title><![CDATA[Magic Cloud Networking simplifies security, connectivity, and management of public clouds]]></title>
            <link>https://blog.cloudflare.com/introducing-magic-cloud-networking/</link>
            <pubDate>Wed, 06 Mar 2024 14:01:00 GMT</pubDate>
            <description><![CDATA[ Introducing Magic Cloud Networking, a new set of capabilities to visualize and automate cloud networks to give our customers secure, easy, and seamless connection to public cloud environments ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4EE4QTE18JtBWAk0XucBb2/818464eba98f9928bbfa7bfe179780d8/image5-5.png" />
            
            </figure><p>Today we are excited to announce Magic Cloud Networking, supercharged by <a href="https://www.cloudflare.com/press-releases/2024/cloudflare-enters-multicloud-networking-market-unlocks-simple-secure/">Cloudflare’s recent acquisition of Nefeli Networks</a>’ innovative technology. These new capabilities to visualize and automate cloud networks will give our customers secure, easy, and seamless connection to public cloud environments.</p><p>Public clouds offer organizations a scalable and on-demand IT infrastructure without the overhead and expense of running their own datacenter. <a href="https://www.cloudflare.com/learning/cloud/what-is-cloud-networking/">Cloud networking</a> is foundational to applications that have been migrated to the cloud, but is difficult to manage without automation software, especially when operating at scale across multiple cloud accounts. Magic Cloud Networking uses familiar concepts to provide a single interface that controls and unifies multiple cloud providers’ native network capabilities to create reliable, cost-effective, and secure cloud networks.</p><p>Nefeli’s approach to multi-cloud networking solves the problem of building and operating end-to-end networks within and across public clouds, allowing organizations to <a href="https://www.cloudflare.com/application-services/solutions/">securely leverage applications</a> spanning any combination of internal and external resources. Adding Nefeli’s technology will make it easier than ever for our customers to connect and protect their users, private networks and applications.</p>
    <div>
      <h2>Why is cloud networking difficult?</h2>
      <a href="#why-is-cloud-networking-difficult">
        
      </a>
    </div>
    <p>Compared with a traditional on-premises data center network, cloud networking promises simplicity:</p><ul><li><p>Much of the complexity of physical networking is abstracted away from users because the physical and ethernet layers are not part of the network service exposed by the cloud provider.</p></li><li><p>There are fewer control plane protocols; instead, the cloud providers deliver a simplified <a href="https://www.cloudflare.com/learning/network-layer/what-is-sdn/">software-defined network (SDN)</a> that is fully programmable via API.</p></li><li><p>There is capacity — from zero up to very large — available instantly and on-demand, only charging for what you use.</p></li></ul><p>However, that promise has not yet been fully realized. Our customers have described several reasons cloud networking is difficult:</p><ul><li><p><b>Poor end-to-end visibility</b>: Cloud network visibility tools are difficult to use and silos exist even within single cloud providers that impede end-to-end monitoring and troubleshooting.</p></li><li><p><b>Faster pace</b>: Traditional IT management approaches clash with the promise of the cloud: instant deployment available on-demand. Familiar ClickOps and CLI-driven procedures must be replaced by automation to meet the needs of the business.</p></li><li><p><b>Different technology</b>: Established network architectures in on-premises environments do not seamlessly transition to a public cloud. The missing ethernet layer and advanced control plane protocols were critical in many network designs.</p></li><li><p><b>New cost models</b>: The dynamic pay-as-you-go usage-based cost models of the public clouds are not compatible with established approaches built around fixed cost circuits and 5-year depreciation. Network solutions are often architected with financial constraints, and accordingly, different architectural approaches are sensible in the cloud.</p></li><li><p><b>New security risks</b>: Securing public clouds with true <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust</a> and least-privilege demands mature operating processes and automation, and familiarity with cloud-specific policies and IAM controls.</p></li><li><p><b>Multi-vendor:</b> Oftentimes enterprise networks have used single-vendor sourcing to facilitate interoperability, operational efficiency, and targeted hiring and training. Operating a network that extends beyond a single cloud, into other clouds or on-premises environments, is a multi-vendor scenario.</p></li></ul><p>Nefeli considered all these problems and the tensions between different customer perspectives to identify where the problem should be solved.</p>
    <div>
      <h2>Trains, planes, and automation</h2>
      <a href="#trains-planes-and-automation">
        
      </a>
    </div>
    <p>Consider a train system. To operate effectively it has three key layers:</p><ul><li><p>tracks and trains</p></li><li><p>electronic signals</p></li><li><p>a company to manage the system and sell tickets.</p></li></ul><p>A train system with good tracks, trains, and signals could still be operating below its full potential because its agents are unable to keep up with passenger demand. The result is that passengers cannot plan itineraries or purchase tickets.</p><p>The train company eliminates bottlenecks in process flow by simplifying the schedules, simplifying the pricing, providing agents with better booking systems, and installing automated ticket machines. Now the same fast and reliable infrastructure of tracks, trains, and signals can be used to its full potential.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/342dyvSqIvF0hJJoCDyf0I/8e92b93f922412344fa34cbbea7a4be1/image8.png" />
            
            </figure>
    <div>
      <h3>Solve the right problem</h3>
      <a href="#solve-the-right-problem">
        
      </a>
    </div>
    <p>In networking, there are an analogous set of three layers, called the <a href="https://www.cloudflare.com/learning/network-layer/what-is-the-control-plane/">networking planes</a>:</p><ul><li><p><b>Data Plane:</b> the network paths that transport data (in the form of packets) from source to destination.</p></li><li><p><b>Control Plane:</b> protocols and logic that change how packets are steered across the data plane.</p></li><li><p><b>Management Plane:</b> the configuration and monitoring interfaces for the data plane and control plane.</p></li></ul><p>In public cloud networks, these layers map to:</p><ul><li><p><b>Cloud Data Plane:</b> The underlying cables and devices are exposed to users as the <a href="https://www.cloudflare.com/learning/cloud/what-is-a-virtual-private-cloud/">Virtual Private Cloud (VPC)</a> or Virtual Network (VNet) service that includes subnets, routing tables, security groups/ACLs and additional services such as load-balancers and VPN gateways.</p></li><li><p><b>Cloud Control Plane:</b> In place of distributed protocols, the cloud control plane is a <a href="https://www.cloudflare.com/learning/network-layer/what-is-sdn/">software defined network (SDN)</a> that, for example, programs static route tables. (There is limited use of traditional control plane protocols, such as BGP to interface with external networks and ARP to interface with VMs.)</p></li><li><p><b>Cloud Management Plane:</b> An administrative interface with a UI and API which allows the admin to fully configure the data and control planes. It also provides a variety of monitoring and logging capabilities that can be enabled and integrated with 3rd party systems.</p></li></ul><p>Like our train example, most of the problems that our customers experience with cloud networking are in the third layer: the management plane.</p><p>Nefeli simplifies, unifies, and automates cloud network management and operations.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/nb9xcqGaRRaYIe0lvlbIs/83da6094ec1f7bc3e4a7d72a17fc511c/image2-6.png" />
            
            </figure>
    <div>
      <h3>Avoid cost and complexity</h3>
      <a href="#avoid-cost-and-complexity">
        
      </a>
    </div>
    <p>One common approach to tackle management problems in cloud networks is introducing Virtual Network Functions (VNFs), which are <a href="https://www.cloudflare.com/learning/cloud/what-is-a-virtual-machine/">virtual machines (VMs)</a> that do packet forwarding, in place of native cloud data plane constructs. Some VNFs are routers, firewalls, or load-balancers ported from a traditional network vendor’s hardware appliances, while others are software-based proxies often built on open-source projects like NGINX or Envoy. Because VNFs mimic their physical counterparts, IT teams could continue using familiar management tooling, but VNFs have downsides:</p><ul><li><p>VMs do not have custom network silicon and so instead rely on raw compute power. The VM is sized for the peak anticipated load and then typically runs 24x7x365. This drives a high cost of compute regardless of the actual utilization.</p></li><li><p>High-availability (HA) relies on fragile, costly, and complex network configuration.</p></li><li><p>Service insertion — the configuration to put a VNF into the packet flow — often forces packet paths that incur additional bandwidth charges.</p></li><li><p>VNFs are typically licensed similarly to their on-premises counterparts and are expensive.</p></li><li><p>VNFs lock in the enterprise and potentially exclude them benefitting from improvements in the cloud’s native data plane offerings.</p></li></ul><p>For these reasons, enterprises are turning away from VNF-based solutions and increasingly looking to rely on the native network capabilities of their cloud service providers. The built-in public cloud networking is elastic, performant, robust, and priced on usage, with high-availability options integrated and backed by the cloud provider’s service level agreement.</p><p>In our train example, the tracks and trains are good. Likewise, the cloud network data plane is highly capable. Changing the data plane to solve management plane problems is the wrong approach. To make this work at scale, organizations need a solution that works together with the native network capabilities of cloud service providers.</p><p>Nefeli leverages native cloud data plane constructs rather than third party VNFs.</p>
    <div>
      <h2>Introducing Magic Cloud Networking</h2>
      <a href="#introducing-magic-cloud-networking">
        
      </a>
    </div>
    <p>The Nefeli team has joined Cloudflare to integrate cloud network management functionality with Cloudflare One. This capability is called Magic Cloud Networking and with it, enterprises can use the Cloudflare dashboard and API to manage their public cloud networks and connect with Cloudflare One.</p>
    <div>
      <h3>End-to-end</h3>
      <a href="#end-to-end">
        
      </a>
    </div>
    <p>Just as train providers are focused only on completing train journeys in their own network, cloud service providers deliver network connectivity and tools within a single cloud account. Many large enterprises have hundreds of cloud accounts across multiple cloud providers. In an end-to-end network this creates disconnected networking silos which introduce operational inefficiencies and risk.</p><p>Imagine you are trying to organize a train journey across Europe, and no single train company serves both your origin and destination. You know they all offer the same basic service: a seat on a train. However, your trip is difficult to arrange because it involves multiple trains operated by different companies with their own schedules and ticketing rates, all in different languages!</p><p>Magic Cloud Networking is like an online travel agent that aggregates multiple transportation options, books multiple tickets, facilitates changes after booking, and then delivers travel status updates.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4P7EhpKlEfTnU7WdPq4dt6/4de908c385b406a89c97f4dc274b3acb/image6.png" />
            
            </figure><p>Through the Cloudflare dashboard, you can discover all of your network resources across accounts and cloud providers and visualize your end-to-end network in a single interface. Once Magic Cloud Networking discovers your networks, you can build a scalable network through a fully automated and simple workflow.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2qXuFK0Q1q96NtH0FYRNg0/3c449510b24a3f206b63b01e1799dddd/image3-8.png" />
            
            </figure><p><i>Resource inventory shows all configuration in a single and responsive UI</i></p>
    <div>
      <h3>Taming per-cloud complexity</h3>
      <a href="#taming-per-cloud-complexity">
        
      </a>
    </div>
    <p>Public clouds are used to deliver applications and services. Each cloud provider offers a composable stack of modular building blocks (resources) that start with the foundation of a billing account and then add on security controls. The next foundational layer, for server-based applications, is VPC networking. Additional resources are built on the VPC network foundation until you have compute, storage, and network infrastructure to host the enterprise application and data. Even relatively simple architectures can be composed of hundreds of resources.</p><p>The trouble is, these resources expose abstractions that are different from the building blocks you would use to build a service on prem, the abstractions differ between cloud providers, and they form a web of dependencies with complex rules about how configuration changes are made (rules which differ between resource types and cloud providers). For example, say I create 100 VMs, and connect them to an IP network. Can I make changes to the IP network while the VMs are using the network? The answer: it depends.</p><p>Magic Cloud Networking handles these differences and complexities for you. It configures native cloud constructs such as VPN gateways, routes, and security groups to securely connect your cloud VPC network to Cloudflare One without having to learn each cloud’s incantations for creating VPN connections and hubs.</p>
    <div>
      <h3>Continuous, coordinated automation</h3>
      <a href="#continuous-coordinated-automation">
        
      </a>
    </div>
    <p>Returning to our train system example, what if the railway maintenance staff find a dangerous fault on the railroad track? They manually set the signal to a stop light to prevent any oncoming trains using the faulty section of track. Then, what if, by unfortunate coincidence, the scheduling office is changing the signal schedule, and they set the signals remotely which clears the safety measure made by the maintenance crew? Now there is a problem that no one knows about and the root cause is that multiple authorities can change the signals via different interfaces without coordination.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/VNaeoX2TNwYwZsweytYSZ/40806d02108119204f638ed5f111d5d0/image1-10.png" />
            
            </figure><p>The same problem exists in cloud networks: configuration changes are made by different teams using different automation and configuration interfaces across a spectrum of roles such as billing, support, security, networking, firewalls, database, and application development.</p><p>Once your network is deployed, Magic Cloud Networking monitors its configuration and health, enabling you to be confident that the security and connectivity you put in place yesterday is still in place today. It tracks the cloud resources it is responsible for, automatically reverting drift if they are changed out-of-band, while allowing you to manage other resources, like storage buckets and application servers, with other automation tools. And, as you change your network, Cloudflare takes care of route management, injecting and withdrawing routes globally across Cloudflare and all connected cloud provider networks.</p><p>Magic Cloud Networking is fully programmable via API, and can be integrated into existing automation toolchains.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3h360ewBWWCRUjhqjrm6wF/5006f8267a880b98ccbe9bfc91cb9029/image7-1.png" />
            
            </figure><p><i>The interface warns when cloud network infrastructure drifts from intent</i></p>
    <div>
      <h2>Ready to start conquering cloud networking?</h2>
      <a href="#ready-to-start-conquering-cloud-networking">
        
      </a>
    </div>
    <p>We are thrilled to introduce Magic Cloud Networking as another pivotal step to fulfilling the promise of the <a href="https://www.cloudflare.com/connectivity-cloud/">Connectivity Cloud</a>. This marks our initial stride in empowering customers to seamlessly integrate Cloudflare with their public clouds to get securely connected, stay securely connected, and gain flexibility and cost savings as they go.</p><p>Join us on this journey for early access: learn more and sign up <a href="https://cloudflare.com/lp/cloud-networking/">here</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/610Vl5u7JVsnszRAmQz0Yt/3bb2a75f47826c1c1969c1d9b0c1db8d/image4-10.png" />
            
            </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Network]]></category>
            <category><![CDATA[AWS]]></category>
            <category><![CDATA[EC2]]></category>
            <category><![CDATA[Google Cloud]]></category>
            <category><![CDATA[Microsoft Azure]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Multi-Cloud]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <category><![CDATA[Acquisitions]]></category>
            <guid isPermaLink="false">2qMDjBOoY9rSrSaeNzUDzL</guid>
            <dc:creator>Steve Welham</dc:creator>
            <dc:creator>David Naylor</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare treats SASE anxiety for VeloCloud customers]]></title>
            <link>https://blog.cloudflare.com/treating-sase-anxiety/</link>
            <pubDate>Wed, 06 Mar 2024 14:00:40 GMT</pubDate>
            <description><![CDATA[ The turbulence in the SASE market is driving many customers to seek help. We’re doing our part to help VeloCloud customers who are caught in the crosshairs of shifting strategies ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We understand that your VeloCloud deployment may be partially or even fully deployed. You may be experiencing discomfort from <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> anxiety. Symptoms include:</p><ul><li><p><b>Sudden vendor whiplash</b> - Over the past 5 years, the ownership and strategic direction of VeloCloud has undergone a series of dramatic changes. VeloCloud was <a href="https://blogs.vmware.com/networkvirtualization/2017/12/vmware-closes-velocloud.html/">acquired by VMware</a> in 2017, then VMware was spun off from <a href="https://www.dell.com/en-us/dt/corporate/newsroom/announcements/detailpage.press-releases~usa~2021~11~20211101-dell-technologies-announces-completion-of-vmware-spin-off.htm">Dell EMC in 2021</a>, and in 2023 <a href="https://investors.broadcom.com/news-releases/news-release-details/broadcom-completes-acquisition-vmware">Broadcom completed its acquisition of VMware and VeloCloud</a>.</p></li><li><p><b>Dizziness from product names</b> - VeloCloud helpfully published a list of some of its previous product names, which include <a href="https://sase.vmware.com/sd-wan/velocloud">VeloCloud, Velo, Velo SD-WAN, VeloCloud SD-WAN, and VMware SD-WAN by VeloCloud</a>.  But the list also misses other names such as “VMware NSX SD-WAN by VeloCloud” as well. Recently, VMware announced yet another name change by renaming <a href="https://blogs.vmware.com/sase/2024/02/20/back-to-the-future-with-velocloud-the-intelligent-overlay-for-the-software-defined-edge/">VMware SD-WAN to VMware VeloCloud SD-WAN, and renamed VMware SASE to VMware VeloCloud SASE, secured by Symantec</a>.</p></li><li><p><b>Irregular priorities and strategies</b> -  With the number of times that VMware reorganized its various networking and security products into different business units, it’s now about to embark on yet another as Broadcom pursues single vendor SASE.</p></li></ul><p>If you’re a VeloCloud customer, we are here to help you with your transition to Magic WAN, with planning, products and services. You’ve experienced the turbulence, and that’s why we are taking steps to help. First, it’s necessary to illustrate what’s fundamentally wrong with the architecture by acquisition model in order to define the right path forward. Second, we document the steps involved for making a transition from VeloCloud to Cloudflare. Third, we are offering a helping hand to help VeloCloud customers to get their SASE strategies back on track.</p>
    <div>
      <h2>Architecture is the key to SASE</h2>
      <a href="#architecture-is-the-key-to-sase">
        
      </a>
    </div>
    <p>Your IT organization must deliver stability across your information systems, because the future of your business depends on the decisions that you make today. You need to make sure that your SASE journey is backed by vendors that you can depend on. Indecisive vendors and unclear strategies rarely inspire confidence, and it’s driving organizations to reconsider their relationship.</p><p>It’s not just VeloCloud that’s pivoting. Many vendors are chasing the brass ring to meet the requirement for Single Vendor SASE, and they’re trying to reduce their time to market by acquiring features on their checklist, rather than taking the time to build the right architecture for consistent management and user experience. It’s led to rapid consolidation of both startups and larger product stacks, but now we’re seeing many many instances of vendors having to rationalize their overlapping product lines. Strange days indeed.</p><p>But the thing is, Single Vendor SASE is not a feature checklist game. It’s not like shopping for PC antivirus software where the most attractive option was the one with the most checkboxes. It doesn’t matter if you acquire a large stack of product acronyms (ZTNA, SD-WAN, SWG, CASB, DLP,  FWaaS, SD-WAN to name but a few) if the results are just as convoluted as the technology it aims to replace.</p><p>If organizations are new to SASE, then it can be difficult to know what to look for. However, one clear sign of trouble is taking an SSE designed by one vendor and combining it with SD-WAN from another. Because you can’t get a converged platform out of two fundamentally incongruent technologies.</p>
    <div>
      <h2>Why SASE Math Doesn’t Work</h2>
      <a href="#why-sase-math-doesnt-work">
        
      </a>
    </div>
    <p>The conceptual model for SASE typically illustrates two half circles, with one consisting of cloud-delivered networking and the other being cloud-delivered security. With this picture in mind, it’s easy to see how one might think that combining an implementation of cloud-delivered networking (VeloCloud SD-WAN) and an implementation of cloud-delivered security (Symantec Network Protection - SSE) might satisfy the requirements. Does Single Vendor SASE = SD-WAN + SSE?</p><p>In practice, networking and network security do not exist in separate universes, but SD-WAN and SSE implementations do, especially when they were designed by different vendors. That’s why the math doesn’t work, because even with the requisite SASE functionality, the implementation of the functionality doesn’t fit. <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-sd-wan/">SD-WAN</a> is designed for network connectivity between sites over the SD-WAN fabric, whereas <a href="https://www.cloudflare.com/learning/access-management/security-service-edge-sse/">SSE</a> largely focuses on the enforcement of security policy for user-&gt;application traffic from remote users or traffic leaving (rather than traversing) the SD-WAN fabric. Therefore, to bring these two worlds together, you end up with security inconsistency, proxy chains which create a burden on latency, or implementing security at the edge rather than in the cloud.</p>
    <div>
      <h2>Why Cloudflare is different</h2>
      <a href="#why-cloudflare-is-different">
        
      </a>
    </div>
    <p>At Cloudflare, the basis for our approach to single vendor SASE starts from building a global network designed with private data centers, overprovisioned network and compute capacity, and a private backbone designed to deliver our customer’s traffic to any destination. It’s what we call any-to-any connectivity. It’s not using the public cloud for SASE services, because the public cloud was designed as a destination for traffic rather than being optimized for transit. We are in full control of the design of our data centers and network and we’re obsessed with making it even better every day.</p><p>It’s from this network that we deliver networking and <a href="https://www.cloudflare.com/network-security/">security services</a>. Conceptually, we implement a philosophy of composability, where the fundamental network connection between the customer’s site and the Cloudflare data center remains the same across different use cases. In practice, and unlike traditional approaches, it means no downtime for service insertion when you need more functionality — the connection to Cloudflare remains the same. It’s the services and the onboarding of additional destinations that changes as organizations expand their use of Cloudflare.</p><p>From the perspective of branch connectivity, use Magic WAN for the connectivity that ties your business together, no matter which way traffic passes. That’s because we don’t treat the directions of your network traffic as independent problems. We solve for consistency by on-ramping all traffic through one of Cloudflare’s 310+ anycasted data centers (whether inbound, outbound, or east-west) for enforcement of security policy. We solve for latency by eliminating the need to forward traffic to a compute location by providing full compute services in every data center. We implement SASE using a light edge / heavy cloud model, with services delivered within the Cloudflare connectivity cloud rather than on-prem.</p>
    <div>
      <h2>How to transition from VeloCloud to Cloudflare</h2>
      <a href="#how-to-transition-from-velocloud-to-cloudflare">
        
      </a>
    </div>
    <p>Start by contacting us to get a consultation session with our solutions architecture team. Our architects specialize in <a href="https://www.cloudflare.com/learning/network-layer/how-to-prepare-for-network-modernization-projects/">network modernization</a> and can map your SASE goals across a series of smaller projects. We’ve worked with hundreds of organizations to achieve their SASE goals with the Cloudflare connectivity cloud and can build a plan that your team can execute on.</p><p>For product education, join one of our product workshops on Magic WAN to get a deep dive into how it’s built and how it can be rolled out to your locations. Magic WAN uses a light edge, heavy cloud model that has multiple network insertion models (whether a tunnel from an existing device, using our turnkey Magic WAN Connector, or deploying a virtual appliance) which can work in parallel or as a replacement for your branch connectivity needs, thus allowing you to migrate at your pace. Our specialist teams can help you mitigate transitionary hardware and license costs as you phase out VeloCloud and accelerate your rollout of Magic WAN.</p><p>The Magic WAN technical engineers have a number of resources to help you build product knowledge as well. This includes reference architectures and quick start guides that address your organization’s connectivity goals, whether sizing down your on-prem network in favor of the emerging “coffee shop networking” philosophy, retiring legacy SD-WAN, and full replacement of conventional MPLS.</p><p>For services, our <a href="https://www.cloudflare.com/success-offerings/">customer success teams</a> are ready to support your transition, with services that are tailored specifically for Magic WAN migrations both large and small.</p>
    <div>
      <h2>Your next move</h2>
      <a href="#your-next-move">
        
      </a>
    </div>
    <p>Interested in learning more? <a href="https://www.cloudflare.com/lp/velocloud-replacement-sd-wan/">Contact us to get started</a>, and we’ll help you with your SASE journey. Contact us to learn how to replace VeloCloud with Cloudflare Magic WAN and use our network as an extension of yours.</p> ]]></content:encoded>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <category><![CDATA[Cloudflare Network]]></category>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">2psJqoZFr5Bh7pDmHQ0yUw</guid>
            <dc:creator>Brian Tokuyoshi</dc:creator>
        </item>
        <item>
            <title><![CDATA[Simplifying how enterprises connect to Cloudflare with Express Cloudflare Network Interconnect]]></title>
            <link>https://blog.cloudflare.com/announcing-express-cni/</link>
            <pubDate>Wed, 06 Mar 2024 14:00:18 GMT</pubDate>
            <description><![CDATA[ Express Cloudflare Network Interconnect makes it fast and easy to connect your network to Cloudflare. Customers can now order Express CNIs directly from the Cloudflare dashboard, and they will be ready to use in 3 minutes. Express CNI also simplifies setting up Magic Transit and Magic WAN ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4YLq6dIHmtmzYSFO271qpe/a4a88239acbe6c456307339e1d707705/image5-6.png" />
            
            </figure><p>We’re excited to announce the largest update to Cloudflare Network Interconnect (CNI) since its <a href="/cloudflare-network-interconnect">launch</a>, and because we’re making CNIs faster and easier to deploy, we’re calling this Express CNI. At the most basic level, CNI is a cable between a customer’s network router and Cloudflare, which facilitates the direct exchange of information between networks instead of via the Internet. CNIs are fast, secure, and reliable, and have connected customer networks directly to Cloudflare for years. We’ve been listening to how we can improve the CNI experience, and today we are sharing more information about how we’re making it faster and easier to order CNIs, and connect them to Magic Transit and Magic WAN.</p>
    <div>
      <h3>Interconnection services and what to consider</h3>
      <a href="#interconnection-services-and-what-to-consider">
        
      </a>
    </div>
    <p>Interconnection services provide a private connection that allows you to connect your networks to other networks like the Internet, cloud service providers, and other businesses directly. This private connection benefits from improved connectivity versus going over the Internet and reduced exposure to common threats like <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service (DDoS)</a> attacks.</p><p>Cost is an important consideration when evaluating any vendor for interconnection services. The cost of an interconnection is typically comprised of a fixed port fee, based on the capacity (speed) of the port, and the variable amount of data transferred. Some cloud providers also add complex inter-region bandwidth charges.</p><p>Other important considerations include the following:</p><ul><li><p>How much capacity is needed?</p></li><li><p>Are there variable or fixed costs associated with the port?</p></li><li><p>Is the provider located in the same colocation facility as my business?</p></li><li><p>Are they able to scale with my network infrastructure?</p></li><li><p>Are you able to predict your costs without any unwanted surprises?</p></li><li><p>What additional products and services does the vendor offer?</p></li></ul><p>Cloudflare does not charge a port fee for Cloudflare Network Interconnect, nor do we charge for inter-region bandwidth. Using CNI with products like Magic Transit and Magic WAN may even reduce bandwidth spending with Internet service providers. For example, you can deliver Magic Transit-cleaned traffic to your data center with a CNI instead of via your Internet connection, reducing the amount of bandwidth that you would pay an Internet service provider for.</p><p>To underscore the value of CNI, <a href="https://aws.amazon.com/directconnect/pricing/">one vendor</a> charges nearly \$20,000 a year for a 10 Gigabit per second (Gbps) direct connect port. The same 10 Gbps CNI on Cloudflare for one year is $0. Their cost also does not include any costs related to the amount of data transferred between different regions or geographies, or <a href="/aws-egregious-egress">outside of their cloud</a>. We have never charged for CNIs, and are committed to making it even easier for customers to connect to Cloudflare, and destinations beyond on the open Internet.</p>
    <div>
      <h3>3 Minute Provisioning</h3>
      <a href="#3-minute-provisioning">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7h6VD2SSNO1J1jud76BvNf/fab2c8e59a383b028febc970dd53bc3b/image6-1.png" />
            
            </figure><p>Our first big announcement is a new, faster approach to CNI provisioning and deployment. Starting today, all Magic Transit and Magic WAN customers can order CNIs directly from their Cloudflare account. The entire process is about 3 clicks and takes less than 3 minutes (roughly the time to make coffee). We’re going to show you how simple it is to order a CNI.</p><p>The first step is to find out whether Cloudflare is in the same data center or colocation facility as your routers, servers, and network hardware. Let’s navigate to the new “<b>Interconnects</b>” section of the Cloudflare dashboard, and order a new Direct CNI.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4z8AbF030XyVSgzj4RAt3L/52cb6aef06137caa30847bb9de90ef46/image4-20.png" />
            
            </figure><p>Search for the city of your data center, and quickly find out if Cloudflare is in the same facility. I’m going to stand up a CNI to connect my example network located in Ashburn, VA.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Zqx0cB5urfxIgkil06Qm6/b2b6f866ef75f370db7d3f816625596b/image6-3.png" />
            
            </figure><p>It looks like Cloudflare is in the same facility as my network, so I’m going to select the location where I’d like to connect.</p><p>As of right now, my data center is only exchanging a few hundred Megabits per second of traffic on Magic Transit, so I’m going to select a 1 Gigabit per second interface, which is the smallest port speed available. I can also order a 10 Gbps link if I have more than 1 Gbps of traffic in a single location. Cloudflare also supports 100 Gbps CNIs, but if you have this much traffic to exchange with us, we recommend that you coordinate with your account team.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7y8r8T0LfLzGertimjKu4j/b15413f51753ba7ba84bd5c722927a7e/image5-12.png" />
            
            </figure><p>After selecting your preferred port speed, you can name your CNI, which will be referenceable later when you direct your Magic Transit or Magic WAN traffic to the interconnect. We are given the opportunity to verify that everything looks correct before confirming our CNI order.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4zi43jRdQmaGYFwbHgUC5j/8fd658d4368a8d470dc9c1761b24570a/image2-16.png" />
            
            </figure><p>Once we click the “Confirm Order” button, Cloudflare will provision an interface on our router for your CNI, and also assign IP addresses for you to configure on your router interface. Cloudflare will also issue you a Letter of Authorization (LOA) for you to order a cross connect with the local facility. Cloudflare will provision a port on our router for your CNI within 3 minutes of your order, and you will be able to ping across the CNI as soon as the interface line status comes up.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4CfV6hjtbtFSYARhuaXFBC/db9f8359d9a02fbcbefb581c4e3f5a37/image3-18.png" />
            
            </figure><p>After downloading the Letter of Authorization (LOA) to order a cross connect, we’ll navigate back to our Interconnects area. Here we can see the point to point IP addressing, and the CNI name that is used in our Magic Transit or Magic WAN configuration. We can also redownload the LOA if needed.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1qmjbvR2g79H5US8TOKB2W/89d354f557500ffb78e377581a77f7b1/image1-21.png" />
            
            </figure>
    <div>
      <h3>Simplified Magic Transit and Magic WAN onboarding</h3>
      <a href="#simplified-magic-transit-and-magic-wan-onboarding">
        
      </a>
    </div>
    <p>Our second major announcement is that Express CNI dramatically simplifies how <a href="https://www.cloudflare.com/network-services/products/magic-transit/">Magic Transit</a> and <a href="https://www.cloudflare.com/network-services/products/magic-wan/">Magic WAN</a> customers connect to Cloudflare. Getting packets into Magic Transit or Magic WAN in the past with a CNI required customers to configure a <a href="https://www.cloudflare.com/learning/network-layer/what-is-gre-tunneling/">GRE</a> (Generic Routing Encapsulation) tunnel on their router. These configurations are complex, and not all routers and switches support these changes. Since both Magic Transit and Magic WAN protect networks, and operate at the network layer on packets, customers rightly asked us, “If I connect directly to Cloudflare with CNI, why do I also need a GRE tunnel for Magic Transit and Magic WAN?”</p><p>Starting today, GRE tunnels are no longer required with Express CNI. This means that Cloudflare supports standard 1500-byte packets on the CNI, and there’s no need for complex GRE or MSS adjustment configurations to get traffic into Magic Transit or Magic WAN. This significantly reduces the amount of configuration required on a router for Magic Transit and Magic WAN customers who can connect over Express CNI. If you’re not familiar with Magic Transit, the key takeaway is that we’ve reduced the complexity of changes you must make on your router to protect your network with Cloudflare.</p>
    <div>
      <h3>What’s next for CNI?</h3>
      <a href="#whats-next-for-cni">
        
      </a>
    </div>
    <p>We’re excited about how Express CNI simplifies connecting to Cloudflare’s network. Some customers connect to Cloudflare through our Interconnection Platform Partners, like Equinix and Megaport, and we plan to bring the Express CNI features to our partners too.</p><p>We have upgraded a number of our data centers to support Express CNI, and plan to upgrade many more over the next few months. We are rapidly expanding the number of global locations that support Express CNI as we install new network hardware. If you’re interested in connecting to Cloudflare with Express CNI, but are unable to find your data center, please let your account team know.</p><p>If you’re on an existing classic CNI today, and you don’t need Express CNI features, there is no obligation to migrate to Express CNI. Magic Transit and Magic WAN customers have been asking for BGP support to control how Cloudflare routes traffic back to their networks, and we expect to extend BGP support to Express CNI first, so keep an eye out for more Express CNI announcements later this year.</p>
    <div>
      <h3>Get started with Express CNI today</h3>
      <a href="#get-started-with-express-cni-today">
        
      </a>
    </div>
    <p>As we’ve demonstrated above, Express CNI makes it fast and easy to connect your network to Cloudflare. If you’re a Magic Transit or Magic WAN customer, the new “Interconnects” area is now available on your Cloudflare dashboard. To deploy your first CNI, you can follow along with the screenshots above, or refer to our updated <a href="https://developers.cloudflare.com/network-interconnect/">interconnects documentation</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Network Interconnect]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <category><![CDATA[Application Services]]></category>
            <guid isPermaLink="false">1oHct79PFqX8gOk85m6g29</guid>
            <dc:creator>Ben Ritter</dc:creator>
            <dc:creator>Mike Ripley</dc:creator>
            <dc:creator>Ammar Zuberi</dc:creator>
        </item>
        <item>
            <title><![CDATA[Fulfilling the promise of single-vendor SASE through network modernization]]></title>
            <link>https://blog.cloudflare.com/single-vendor-sase-announcement-2024/</link>
            <pubDate>Wed, 07 Feb 2024 14:00:55 GMT</pubDate>
            <description><![CDATA[ Today, we are announcing a series of updates to our SASE platform, Cloudflare One, that further the promise of a single-vendor SASE architecture ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1mOcjLGteDYQYsMp32AjAy/d7b797f902795cc3fbfe6aa19fb989ee/Single-vendor-SASE-simplified-for-security--networking--and-DevOps-1.png" />
            
            </figure><p>As more organizations collectively progress toward adopting a <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> architecture, it has become clear that the traditional SASE market definition (<a href="https://www.cloudflare.com/learning/access-management/security-service-edge-sse/">SSE</a> + <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-sd-wan/">SD-WAN</a>) is not enough. It forces some teams to work with multiple vendors to address their specific needs, introducing performance and security tradeoffs. More worrisome, it draws focus more to a checklist of services than a vendor’s underlying architecture. Even the most advanced individual security services or traffic on-ramps don’t matter if organizations ultimately send their traffic through a fragmented, flawed network.</p><p>Single-vendor SASE is a critical trend to converge disparate security and networking technologies, yet enterprise "any-to-any connectivity" needs true network modernization for SASE to work for all teams. Over the past <a href="/introducing-cloudflare-one">few years</a>, Cloudflare has launched capabilities to <a href="https://www.cloudflare.com/learning/network-layer/how-to-prepare-for-network-modernization-projects/">help organizations modernize their networks</a> as they navigate their short- and long-term roadmaps of SASE use cases. We’ve helped simplify SASE implementation, regardless of the team leading the initiative.</p>
    <div>
      <h2>Announcing (even more!) flexible on-ramps for single-vendor SASE</h2>
      <a href="#announcing-even-more-flexible-on-ramps-for-single-vendor-sase">
        
      </a>
    </div>
    <p>Today, we are announcing a series of updates to our SASE platform, <a href="https://www.cloudflare.com/zero-trust/">Cloudflare One</a>, that further the promise of a single-vendor SASE architecture. Through these new capabilities, Cloudflare makes SASE networking more flexible and accessible for security teams, more efficient for traditional networking teams, and uniquely extend its reach to an underserved technical team in the larger SASE connectivity conversation: DevOps.</p><p>These platform updates include:</p><ul><li><p>Flexible on-ramps for site-to-site connectivity that enable both agent/proxy-based and appliance/routing-based implementations, simplifying SASE networking for both security and networking teams.</p></li><li><p>New WAN-as-a-service (WANaaS) capabilities like high availability, application awareness, a virtual machine deployment option, and enhanced visibility and analytics that boost operational efficiency while reducing network costs through a "light branch, heavy cloud" approach.</p></li><li><p><a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> connectivity for DevOps: mesh and peer-to-peer (P2P) secure networking capabilities that extend <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">ZTNA</a> to support service-to-service workflows and bidirectional traffic.</p></li></ul><p>Cloudflare offers a wide range of SASE on- and off-ramps — including connectors for your WAN, applications, services, systems, devices, or any other internal network resources — to more easily route traffic to and from Cloudflare services. This helps organizations align with their best fit connectivity paradigm, based on existing environment, technical familiarity, and job role.</p><p>We recently dove into the <a href="/magic-wan-connector-general-availability/">Magic WAN Connector</a> in a separate blog post and have explained how all our on-ramps fit together in our <a href="https://developers.cloudflare.com/reference-architecture/architectures/sase/">SASE reference architecture</a>, including our new <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/private-net/warp-connector/">WARP Connector</a>. This blog focuses on the main impact those technologies have for customers approaching SASE networking from different angles.</p>
    <div>
      <h2>More flexible and accessible for security teams</h2>
      <a href="#more-flexible-and-accessible-for-security-teams">
        
      </a>
    </div>
    <p>The process of implementing a SASE architecture can challenge an organization’s status quo for internal responsibilities and collaboration across IT, security, and networking. Different teams own various security or networking technologies whose replacement cycles are not necessarily aligned, which can reduce the organization's willingness to support particular projects.</p><p>Security or IT practitioners need to be able to protect resources no matter where they reside. Sometimes a small connectivity change would help them more efficiently protect a given resource, but the task is outside their domain of control. Security teams don’t want to feel reliant on their networking teams in order to do their jobs, and yet they also don’t need to cause downstream trouble with existing network infrastructure. They need an easier way to connect subnets, for instance, without feeling held back by bureaucracy.</p>
    <div>
      <h3>Agent/proxy-based site-to-site connectivity</h3>
      <a href="#agent-proxy-based-site-to-site-connectivity">
        
      </a>
    </div>
    <p>To help push these security-led projects past the challenges associated with traditional siloes, Cloudflare offers both agent/proxy-based and appliance/routing-based implementations for site-to-site or subnet-to-subnet connectivity. This way, networking teams can pursue the traditional networking concepts with which they are familiar through our appliance/routing-based WANaaS — a modern architecture vs. legacy SD-WAN overlays. Simultaneously, security/IT teams can achieve connectivity through agent/proxy-based software connectors (like the <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/private-net/warp-connector/">WARP Connector</a>) that may be more approachable to implement. This agent-based approach blurs the lines between industry norms for branch connectors and app connectors, bringing WAN and ZTNA technology closer together to help achieve least-privileged access everywhere.</p><p>Agent/proxy-based connectivity may be a complementary fit for a subset of an organization's total network connectivity. These software-driven site-to-site use cases could include microsites with no router or firewall, or perhaps cases in which teams are unable to configure <a href="https://www.cloudflare.com/learning/network-layer/what-is-ipsec/">IPsec</a> or GRE tunnels like in tightly regulated managed networks or cloud environments like Kubernetes. Organizations can mix and match traffic on-ramps to fit their needs; all options can be used composably and concurrently.</p><p>Our agent/proxy-based approach to site-to-site connectivity uses the same underlying technology that helps security teams fully replace VPNs, supporting ZTNA for apps with server-initiated or bidirectional traffic. These include services such as Voice over Internet Protocol (VoIP) and Session Initiation Protocol (SIP) traffic, Microsoft’s System Center Configuration Manager (SCCM), Active Directory (AD) domain replication, and as detailed later in this blog, DevOps workflows.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1WoJQPnDHFTkHmaoIOSQny/016a189f6f78e6672768d21a32ed0871/Any-to-Any-Diagram---SVSASE-Blog.png" />
            
            </figure><p>This new Cloudflare on-ramp enables site-to-site, bidirectional, and mesh networking connectivity without requiring changes to underlying network routing infrastructure, acting as a router for the subnet within the private network to on-ramp and off-ramp traffic through Cloudflare.</p>
    <div>
      <h2>More efficient for networking teams</h2>
      <a href="#more-efficient-for-networking-teams">
        
      </a>
    </div>
    <p>Meanwhile, for networking teams who prefer a network-layer appliance/routing-based implementation for site-to-site connectivity, the industry norms still force too many tradeoffs between <a href="https://www.cloudflare.com/network-services/solutions/enterprise-network-security/">security</a>, performance, cost, and reliability. Many (if not most) large enterprises still rely on legacy forms of private connectivity such as <a href="https://www.cloudflare.com/learning/network-layer/what-is-mpls/">MPLS</a>. MPLS is generally considered expensive and inflexible, but it is highly reliable and has features such as quality of service (QoS) that are used for bandwidth management.</p><p>Commodity Internet connectivity is widely available in most parts of the inhabited world, but has a number of challenges which make it an imperfect replacement to MPLS. In many countries, high speed Internet is fast and cheap, but this is not universally true. Speed and costs depend on the local infrastructure and the market for regional service providers. In general, broadband Internet is also not as reliable as MPLS. Outages and slowdowns are not unusual, with customers having varying degrees of tolerance to the frequency and duration of disrupted service. For businesses, outages and slowdowns are not tolerable. Disruptions to network service means lost business, unhappy customers, lower productivity and frustrated employees. Thus, despite the fact that a significant amount of corporate traffic flows have shifted to the Internet anyway, many organizations face difficulty migrating away from MPLS.</p><p>SD-WAN introduced an alternative to MPLS that is transport neutral and improves networking stability over conventional broadband alone. However, it introduces new topology and security challenges. For example, many SD-WAN implementations can increase risk if they bypass inspection between branches. It also has implementation-specific challenges such as how to address scaling and the use/control (or more precisely, the lack of) a middle mile. Thus, the promise of making a full cutover to Internet connectivity and eliminating MPLS remains unfulfilled for many organizations.  These issues are also not very apparent to some customers at the time of purchase and require continuing market education.</p>
    <div>
      <h3>Evolution of the enterprise WAN</h3>
      <a href="#evolution-of-the-enterprise-wan">
        
      </a>
    </div>
    <p>Cloudflare <a href="https://developers.cloudflare.com/magic-wan/">Magic WAN</a> follows a different paradigm built from the ground up in Cloudflare's <a href="https://www.cloudflare.com/connectivity-cloud/">connectivity cloud</a>; it takes a "light branch, heavy cloud" approach to augment and eventually replace existing network architectures including MPLS circuits and SD-WAN overlays. While Magic WAN has similar cloud-native routing and configuration controls to what customers would expect from traditional SD-WAN, it is easier to deploy, manage, and consume. It scales with changing business requirements, with security built in. Customers like Solocal agree that the benefits of this architecture ultimately improve their total cost of ownership:</p><blockquote><p><i>"Cloudflare's Magic WAN Connector offers a centralized and automated management of network and security infrastructure, in an intuitive approach. As part of Cloudflare’s SASE platform, it provides a consistent and homogeneous single-vendor architecture, founded on market standards and best practices. Control over all data flows is ensured, and risks of breaches or security gaps are reduced. It is obvious to Solocal that it should provide us with significant savings, by reducing all costs related to acquiring, installing, maintaining, and upgrading our branch network appliances by up to 40%. A high-potential connectivity solution for our IT to modernize our network."</i><b><i>– Maxime Lacour, Network Operations Manager, Solocal</i></b></p></blockquote><p>This is quite different from other single-vendor SASE vendor approaches which have been trying to reconcile acquisitions that were designed around fundamentally different design philosophies. These “stitched together” solutions lead to a non-converged experience due to their fragmented architectures, similar to what organizations might see if they were managing multiple separate vendors anyway. Consolidating the components of SASE with a vendor that has built a unified, integrated solution, versus piecing together different solutions for networking and security, significantly simplifies deployment and management by reducing complexity, bypassed security, and potential integration or connectivity challenges.</p><p>Magic WAN can automatically establish IPsec tunnels to Cloudflare via our Connector device, manually via Anycast IPsec or GRE Tunnels initiated on a customer’s edge router or firewall, or via Cloudflare Network Interconnect (CNI) at private peering locations or public cloud instances. It pushes beyond “integration” claims with SSE to truly converge security and networking functionality and help organizations more efficiently modernize their networks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3loYghphtdKcxfSOh1RssS/c21b0e50fbfdac2bcd7092f47a38f85e/Magic-WAN-Diagram---SVSASE-Blog.png" />
            
            </figure>
    <div>
      <h3>New Magic WAN Connector capabilities</h3>
      <a href="#new-magic-wan-connector-capabilities">
        
      </a>
    </div>
    <p>In October 2023, we announced the general availability of the Magic WAN Connector, a lightweight device that customers can drop into existing network environments for zero-touch connectivity to Cloudflare One, and ultimately used to replace other networking hardware such as legacy SD-WAN devices, routers, and firewalls. Today, we’re excited to announce new capabilities of the Magic WAN Connector including:</p><ul><li><p><b>High Availability (HA) configurations for critical environments:</b> In enterprise deployments, organizations generally desire support for high availability to mitigate the risk of hardware failure. High availability uses a pair of Magic WAN Connectors (running as a VM or on a supported hardware device) that work in conjunction with one another to seamlessly resume operation if one device fails. Customers can manage HA configuration, like all other aspects of the Magic WAN Connector, from the unified Cloudflare One dashboard.</p></li><li><p><b>Application awareness:</b> One of the central differentiating features of SD-WAN vs. more traditional networking devices has been the ability to create traffic policies based on well-known applications, in addition to network-layer attributes like IP and port ranges. Application-aware policies provide easier management and more granularity over traffic flows. Cloudflare’s implementation of application awareness leverages the intelligence of our global network, using the same categorization/classification already shared across security tools like our Secure Web Gateway, so IT and security teams can expect consistent behavior across routing and inspection decisions - a capability not available in dual-vendor or stitched-together SASE solutions.</p></li><li><p><b>Virtual machine deployment option:</b> The Magic WAN Connector is now available as a virtual appliance software image, that can be downloaded for immediate deployment on any supported virtualization platform / hypervisor. The virtual Magic WAN Connector has the same ultra-low-touch deployment model and centralized fleet management experience as the hardware appliance, and is offered to all Magic WAN customers at no additional cost.</p></li><li><p><b>Enhanced visibility and analytics:</b> The Magic WAN Connector features enhanced visibility into key metrics such as connectivity status, CPU utilization, memory consumption, and device temperature. These analytics are available via dashboard and API so operations teams can integrate the data into their NOCs.</p></li></ul>
    <div>
      <h2>Extending SASE’s reach to DevOps</h2>
      <a href="#extending-sases-reach-to-devops">
        
      </a>
    </div>
    <p>Complex <a href="https://www.cloudflare.com/learning/serverless/glossary/what-is-ci-cd/">continuous integration and continuous delivery (CI/CD) pipeline</a> interaction is famous for being agile, so the connectivity and security supporting these workflows should match. DevOps teams too often rely on traditional <a href="https://www.cloudflare.com/learning/access-management/what-is-a-vpn/">VPNs</a> to accomplish remote access to various development and operational tools. VPNs are cumbersome to manage, susceptible to exploit with known or zero-day vulnerabilities, and use a legacy hub-and-spoke connectivity model that is too slow for modern workflows.</p><p>Of any employee group, developers are particularly capable of finding creative workarounds that decrease friction in their daily workflows, so all corporate security measures need to “just work,” without getting in their way. Ideally, all users and servers across build, staging, and production environments should be orchestrated through centralized, Zero Trust <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">access controls</a>, no matter what components and tools are used and no matter where they are located. Ad hoc policy changes should be accommodated, as well as temporary Zero Trust access for contractors or even emergency responders during a production server incident.</p>
    <div>
      <h3>Zero Trust connectivity for DevOps</h3>
      <a href="#zero-trust-connectivity-for-devops">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">ZTNA</a> works well as an industry paradigm for secure, least-privileged user-to-app access, but it should extend further to secure networking use cases that involve server-initiated or bidirectional traffic. This follows an emerging trend that imagines an overlay mesh connectivity model across clouds, VPCs, or network segments without a reliance on routers. For true any-to-any connectivity, customers need flexibility to cover all of their network connectivity and application access use cases. Not every SASE vendor’s network on-ramps can extend beyond client-initiated traffic without requiring network routing changes or making security tradeoffs, so generic "any-to-any connectivity" claims may not be what they initially seem.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ZKS8DznwKSILFDtZB3uqO/9a3dc4cfaf7f63f12812d3286ef837aa/DevOps-Diagram---SVSASE-Blog.png" />
            
            </figure><p>Cloudflare extends the reach of ZTNA to ensure all user-to-app use cases are covered, plus mesh and P2P secure networking to make connectivity options as broad and flexible as possible. DevOps service-to-service workflows can run efficiently on the same platform that accomplishes ZTNA, VPN replacement, or enterprise-class SASE. Cloudflare acts as the connectivity “glue” across all DevOps users and resources, regardless of the flow of traffic at each step. This same technology, i.e., <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/private-net/warp-connector/">WARP Connector</a>, enables admins to manage different private networks with overlapping IP ranges — VPC &amp; RFC1918, support server-initiated traffic and P2P apps (e.g., SCCM, AD, VoIP &amp; SIP traffic) connectivity over existing private networks, build P2P private networks (e.g., CI/CD resource flows), and deterministically route traffic. Organizations can also automate management of their SASE platform with Cloudflare’s Terraform provider.</p>
    <div>
      <h2>The Cloudflare difference</h2>
      <a href="#the-cloudflare-difference">
        
      </a>
    </div>
    <p>Cloudflare’s single-vendor SASE platform, <a href="https://www.cloudflare.com/zero-trust/">Cloudflare One</a>, is built on our <a href="https://www.cloudflare.com/connectivity-cloud/">connectivity cloud</a> — the next evolution of the public cloud, providing a unified, intelligent platform of programmable, composable services that enable connectivity between all networks (enterprise and Internet), clouds, apps, and users. Our connectivity cloud is flexible enough to make "any-to-any connectivity" a more approachable reality for organizations <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implementing</a> a SASE architecture, accommodating deployment preferences alongside prescriptive guidance. Cloudflare is built to offer the breadth and depth needed to help organizations regain IT control through single-vendor SASE and beyond, while simplifying workflows for every team that contributes along the way.</p><p>Other SASE vendors designed their data centers for egress traffic to the Internet. They weren’t designed to handle or secure East-West traffic, providing neither middle mile nor security services for traffic passing from branch to HQ or branch to branch. Cloudflare’s middle mile global backbone supports security and networking for any-to-any connectivity, whether users are on-prem or remote, and whether apps are in the data center or in the cloud.</p><p>To learn more, read our reference architecture, “<a href="https://developers.cloudflare.com/reference-architecture/sase-reference-architecture/">Evolving to a SASE architecture with Cloudflare</a>,” or <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/">talk to a Cloudflare One expert</a>.</p> ]]></content:encoded>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[DevOps]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <category><![CDATA[WARP Connector]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <guid isPermaLink="false">5Emh2Yz5XTRKse4w0c40dp</guid>
            <dc:creator>Michael Keane</dc:creator>
        </item>
        <item>
            <title><![CDATA[Network flow monitoring is GA, providing end-to-end traffic visibility]]></title>
            <link>https://blog.cloudflare.com/network-flow-monitoring-generally-available/</link>
            <pubDate>Wed, 18 Oct 2023 13:00:53 GMT</pubDate>
            <description><![CDATA[ Network engineers often need better visibility into their network’s traffic when analyzing DDoS attacks or troubleshooting other traffic anomalies. To solve this problem, Cloudflare offers a network flow monitoring product that gives customers end-to-end traffic visibility across their network. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4EZamNYbSPCC1yBqXXwaZR/d3e36168073dcc8f08b715ab7d4bbe5e/image4-4.png" />
            
            </figure><p>Network engineers often find they need better visibility into their network’s traffic and operations while analyzing DDoS attacks or troubleshooting other traffic anomalies. These engineers typically have some high level metrics about their network traffic, but they struggle to collect essential information on the specific traffic flows that would clarify the issue. To solve this problem, Cloudflare has been piloting a <a href="https://www.cloudflare.com/network-services/solutions/network-monitoring-tools/">cloud network flow monitoring product</a> called <a href="https://www.cloudflare.com/network-services/products/magic-network-monitoring/">Magic Network Monitoring</a> that gives customers end-to-end visibility into all traffic across their network.</p><p>Today, Cloudflare is excited to announce that Magic Network Monitoring (previously called <a href="/flow-based-monitoring-for-magic-transit/">Flow Based Monitoring</a>) is now generally available to all enterprise customers. Over the last year, the Cloudflare engineering team has significantly improved Magic Network Monitoring; we’re excited to offer a network services product that will help our customers identify threats faster, reduce vulnerabilities, and <a href="https://www.cloudflare.com/network-services/solutions/enterprise-network-security/">make their network more secure</a>.</p><p>Magic Network Monitoring is automatically enabled for all Magic Transit and Magic WAN enterprise customers. The product is located at the account level of the Cloudflare dashboard and can be opened by navigating to “Analytics &amp; Logs &gt; Magic Monitoring”. The onboarding process for Magic Network Monitoring is self-serve, and all enterprise customers with access can begin configuring the product today.</p><p>Any enterprise customers without Magic Transit or Magic WAN that are interested in testing Magic Network Monitoring can receive access to the free version (with some <a href="https://developers.cloudflare.com/magic-network-monitoring/magic-network-monitoring-free/">limitations</a> on traffic volume) by submitting a request to their Cloudflare account team or filling out this form to <a href="https://cloudflare.com/network-services/products/magic-network-monitoring/">talk with an expert</a>.</p>
    <div>
      <h3>What is Magic Network Monitoring?</h3>
      <a href="#what-is-magic-network-monitoring">
        
      </a>
    </div>
    <p>Magic Network Monitoring is a cloud network flow monitor. <a href="https://en.wikipedia.org/wiki/Traffic_flow_(computer_networking)">Network traffic flow</a> refers to any stream of packets between one source and one destination with the same Internet protocol and set of ports. Customers can send network flow reports from their routers (or any other network flow generator) to a publicly available endpoint on <a href="https://www.cloudflare.com/learning/cdn/glossary/anycast-network/">Cloudflare’s anycast network</a>, even if the traffic didn’t originally pass through Cloudflare’s network. Cloudflare analyzes the network flow data, then provides customers visibility into key network traffic metrics via an analytics dashboard. These metrics include: traffic volume (in bits or packets) over time, source IPs, destination IPs, ports, traffic protocols, and router IPs. Customers can also configure alerts to identify <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attacks</a> and any other abnormal traffic volume activities.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3CrObnYrLzKlSOjSUS8dH6/c59b39388b98ba4e7492121d5db3bacf/1-1.png" />
            
            </figure><p>Send flow data from your network to Cloudflare for analysis</p>
    <div>
      <h3>Enterprise DDoS attack type detection</h3>
      <a href="#enterprise-ddos-attack-type-detection">
        
      </a>
    </div>
    <p><a href="https://developers.cloudflare.com/magic-transit/on-demand/">Magic Transit On Demand</a> (MTOD) customers will experience significant traffic visibility benefits when using Magic Network Monitoring. <a href="https://www.cloudflare.com/network-services/products/magic-transit/">Magic Transit</a> is a <a href="https://www.cloudflare.com/network-security/">network security solution</a> that offers DDoS protection and traffic acceleration from every Cloudflare data center for on-premise, cloud-hosted, and hybrid networks. Magic Transit On Demand customers can activate Magic Transit for protection when a DDoS attack is detected.</p><p>In general, we noticed that some MTOD customers lacked the network visibility tools to quickly identify DDoS attacks and take the appropriate mitigation action. Now, MTOD customers can use Magic Network Monitoring to analyze their network data and receive an alert if a DDoS attack is detected.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6HcgWfT995D5YTtTjI7t0x/8f5265dc6c920df9aa4de7db814bfc71/2-1.png" />
            
            </figure><p>Cloudflare detects a DDoS attack from the customer’s network flow data</p><p>Once a DDoS attack is detected, Magic Network Monitoring customers can choose to either manually or automatically enable Magic Transit to mitigate any DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5FlxXObNPK0L8lx2sN0S6S/8a47e805c9ec45f41c1f9d3bf6d84a33/3-1.png" />
            
            </figure><p>Activate Magic Transit for DDoS protection</p>
    <div>
      <h3>Enterprise network monitoring</h3>
      <a href="#enterprise-network-monitoring">
        
      </a>
    </div>
    <p>Cloudflare’s Magic WAN and Cloudflare One customers can also benefit from using Magic Network Monitoring. Today, these customers have excellent visibility into the traffic they send through Cloudflare’s network, but sometimes they may lack visibility into traffic that isn’t sent through Cloudflare. This can include traffic that remains on a local network, or network traffic sent in between cloud environments. Magic WAN and Cloudflare One customers can add Magic Network Monitoring into their suite of product solutions to establish end-to-end network visibility across all traffic on their network.</p>
    <div>
      <h3>A deep dive into network flow and network traffic sampling</h3>
      <a href="#a-deep-dive-into-network-flow-and-network-traffic-sampling">
        
      </a>
    </div>
    <p>Magic Network Monitoring gives customers better visibility into their network traffic by ingesting and analyzing network flow data.</p><p>The process starts when a router (or other network flow generation device) collects <a href="https://en.wikipedia.org/wiki/Sampling_(statistics)">statistical samples</a> of inbound and / or outbound packet data. These samples are collected by examining 1 in every X packets, where X is the sampling rate configured on the router. Typical sampling rates range from 1 in every 1,000 to 1 in every 4,000 packets. The ideal sampling rate depends on the traffic volume, traffic diversity, and the compute / memory power of your router’s hardware. You can read more about the <a href="https://developers.cloudflare.com/magic-network-monitoring/routers/recommended-sampling-rate/">recommended network flow sampling rate</a> in Cloudflare’s MNM Developer Docs.</p><p>The sampled data is packaged into one of two industry standard formats for network flow data: NetFlow or sFlow. In NetFlow, the sampled packet data is grouped by different packet characteristics such as source / destination IP, port, and protocol. Each group of sampled packet data also includes a traffic volume estimate. In sFlow, the entire packet header is selected as the representative sample, and there isn’t any data summarization. As a result, sFlow is a richer data format and includes more details about network traffic than NetFlow data. Once either the NetFlow or sFlow data samples are collected, they’re sent to Magic Network Monitoring for analysis and alerting.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2XoUWHVTlsaVD6wYjekYm6/951cff39344b3912444f239618af64c6/4-1.png" />
            
            </figure>
    <div>
      <h3>Why simple random sampling didn’t work for Magic Network Monitoring</h3>
      <a href="#why-simple-random-sampling-didnt-work-for-magic-network-monitoring">
        
      </a>
    </div>
    <p>Magic Network Monitoring has come a long way from its early access release one year ago. In particular, the Cloudflare engineering team invested significant time in improving the accuracy of the traffic volume estimations in MNM. In the early access version of Magic Network Monitoring, customers were unexpectedly reporting that their network traffic volume estimates were too high and didn’t match the expected value.</p><p>Magic Network Monitoring performs its own sampling of the NetFlow or sFlow data it receives, so it can effectively scale and manage the data ingested across Cloudflare’s global network. Increasing the accuracy of the traffic volume estimations was more difficult than expected, as the NetFlow or sFlow data parsed by MNM is already built on sampled packet data. This introduces multiple distinct layers of data sampling in the product’s analytics.</p><p>The first version of Magic Network Monitoring used <a href="https://en.wikipedia.org/wiki/Simple_random_sample">random sampling</a> where a random subset of network flow data with the same timestamp was selected to represent the traffic volume at that point in time. A characteristic of network flow data is that some samples are more significant than others and represent a greater volume of network traffic. In order to account for this significance, we can associate a <a href="https://en.wikipedia.org/wiki/Weighting">weight</a> with each sample based on the traffic volume it represents. Network flow data weights are always positive numbers, and they follow a <a href="https://en.wikipedia.org/wiki/Long_tail">long tail distribution</a>. These data characteristics caused MNM’s random sampling to incorrectly estimate the traffic volume of a customer’s network. Customers would see false spikes in their traffic volume analytics when an outlying data sample from the long tail was randomly selected to be the representative of all traffic at that point in time.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Tje0Xn9GucCoNamBEyvVE/0d097130617a1c6584efa8679f91c87a/5-1.png" />
            
            </figure>
    <div>
      <h3>Increasing accuracy with VarOpt reservoir sampling</h3>
      <a href="#increasing-accuracy-with-varopt-reservoir-sampling">
        
      </a>
    </div>
    <p>To solve this problem, the Cloudflare engineering team implemented an alternative <a href="https://en.wikipedia.org/wiki/Reservoir_sampling">reservoir sampling</a> technique called <a href="https://arxiv.org/pdf/0803.0473.pdf">VarOpt</a>. VarOpt is designed to collect samples from a stream of data when the length of the data stream is unknown (a perfect application for analyzing incoming network flow data). In the MNM implementation of VarOpt, we start with an empty reservoir of a fixed size that is filled with samples of network flow data. When the reservoir is full, and there is still new incoming network flow data, an old sample is randomly discarded from the reservoir and replaced with a new one.</p><p>After a certain number of samples have been observed, we calculate the traffic volume across all weighted samples in the reservoir, and that is the estimated traffic volume of a customer’s network flow at that point in time. Finally, the reservoir is emptied, and the VarOpt loop is restarted by filling the reservoir with the next set of the latest network flow samples.</p><p>The new VarOpt sampling method significantly increased the accuracy of the traffic volume estimations in Magic Network Monitoring, and solved our customer’s problems. These sampling improvements paved the way for general availability, and we’re excited to make accurate network flow analytics available to everyone.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2NYGpyTodAgtP9K8KycjGZ/fa5e290cdf3286c7efcbbe53954e1540/6-1.png" />
            
            </figure>
    <div>
      <h3>Developer Docs and Discord Community</h3>
      <a href="#developer-docs-and-discord-community">
        
      </a>
    </div>
    <p>There are detailed <a href="https://developers.cloudflare.com/magic-network-monitoring/">Developer Docs for Magic Network Monitoring</a> that explain the product’s features and outlines a step-by-step configuration guide for new customers. As you’re working through the Magic Network Monitoring documentation, please feel free to provide feedback by clicking the “Give Feedback” button in the top right corner of the Developer Docs.</p><p>We’ve also created a channel in Cloudflare’s Discord community built around debugging configuration problems, testing new features, and providing product feedback. You can follow this link to join the <a href="https://discord.gg/cloudflaredev">Cloudflare Discord server</a>.</p>
    <div>
      <h3>Free version</h3>
      <a href="#free-version">
        
      </a>
    </div>
    <p>A <a href="https://developers.cloudflare.com/magic-network-monitoring/magic-network-monitoring-free/">free version of Magic Network Monitoring</a> is available to all Enterprise customers on request to their Cloudflare account team. The free version is designed to enable Enterprise customers to quickly test and evaluate Magic Network Monitoring before purchasing Magic Transit, Magic WAN, or Cloudflare One. Enterprise customers can fully configure Magic Network Monitoring themselves by following the <a href="https://developers.cloudflare.com/magic-network-monitoring/get-started/">step-by-step onboarding guide</a> in the product’s documentation. The free version has some <a href="https://developers.cloudflare.com/magic-network-monitoring/magic-network-monitoring-free/">limitations</a> on the quantity of traffic that can be processed which are further outlined in the product’s documentation.</p><p>The free version of Magic Network Monitoring is also available to all Free, Pro, and Business plan Cloudflare customers via a closed beta. Anyone can request access to the free version by <a href="https://developers.cloudflare.com/magic-network-monitoring/magic-network-monitoring-free/">reading the free version documentation</a> and <a href="https://forms.gle/z93ghpydpKdAFZ7P9">filling out this form</a>. Priority access is granted to anyone that joins <a href="https://discord.com/invite/cloudflaredev">Cloudflare’s Discord server</a> and sends a message in the Magic Network Monitoring Discord channel.</p>
    <div>
      <h3>Next steps that you can take today</h3>
      <a href="#next-steps-that-you-can-take-today">
        
      </a>
    </div>
    <p>Magic Network Monitoring is generally available, and all Magic Transit and Magic WAN customers have been automatically granted access to the product today. You can navigate to the product by going to the account level of the Cloudflare dashboard, then selecting “Analytics &amp; Logs &gt; Magic Monitoring”.</p><p>If you’re an enterprise customer without Magic Transit or Magic WAN, and you want to use Magic Network Monitoring to improve your traffic visibility, you can <a href="https://cloudflare.com/network-services/products/magic-network-monitoring/">talk with an MNM expert today</a>.</p><p>If you’re interested in using Magic Transit and Magic Network Monitoring for DDoS protection, you can <a href="https://www.cloudflare.com/network-services/products/magic-transit/">request a demo of Magic Transit</a>. If you want to use Magic WAN and Magic Network Monitoring together to establish end-to-end network traffic visibility, you can <a href="https://www.cloudflare.com/network-services/products/magic-wan/">talk with a Magic WAN expert</a>.</p> ]]></content:encoded>
            <category><![CDATA[Magic Network Monitoring]]></category>
            <category><![CDATA[Network Services]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">5Q496AB243DF9bETeys1Pq</guid>
            <dc:creator>Chris Draper</dc:creator>
            <dc:creator>Chris J Arges</dc:creator>
            <dc:creator>Ana Oliveira</dc:creator>
            <dc:creator>João Santos</dc:creator>
            <dc:creator>Luís Franco</dc:creator>
            <dc:creator>Nadin El-Yabroudi</dc:creator>
            <dc:creator>Dan Geraghty</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing General Availability for the Magic WAN Connector: the easiest way to jumpstart SASE transformation for your network]]></title>
            <link>https://blog.cloudflare.com/magic-wan-connector-general-availability/</link>
            <pubDate>Tue, 03 Oct 2023 12:55:34 GMT</pubDate>
            <description><![CDATA[ We’re announcing the general availability of the Magic WAN Connector, which serves as the glue between your existing network hardware and Cloudflare’s networ ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6C3g58PPEB5JrT1nTVF2Fp/27aa99e113979042f578d83b50c35aea/Magic-WAN-Connector--buy-our-box-or-BYO-.png" />
            
            </figure><p>Today, we’re announcing the general availability of the <a href="https://www.cloudflare.com/network-services/products/magic-wan/">Magic WAN Connector</a>, a key component of our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> platform, Cloudflare One. Magic WAN Connector is the glue between your existing network hardware and Cloudflare’s network — it provides a super simplified software solution that comes pre-installed on Cloudflare-certified hardware, and is entirely managed from the Cloudflare One dashboard.</p><p>It takes only a few minutes from unboxing to seeing your network traffic automatically routed to the closest Cloudflare location, where it flows through a full stack of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security controls</a> before taking an accelerated path to its destination, whether that’s another location on your private network, a SaaS app, or any application on the open Internet.</p><p>Since we <a href="/magic-wan-connector/">announced</a> our beta earlier this year, organizations around the world have deployed the Magic WAN Connector to connect and secure their network locations. We’re excited for the general availability of the Magic WAN Connector to accelerate SASE transformation at scale.</p><p>When customers tell us about their journey to embrace SASE, one of the most common stories we hear is:</p><blockquote><p><i>We started with our remote workforce, deploying modern solutions to secure access to internal apps and Internet resources. But now, we’re looking at the broader landscape of our enterprise network connectivity and security, and it’s daunting. We want to shift to a cloud and Internet-centric model for all of our infrastructure, but we’re struggling to figure out how to start.</i></p></blockquote><p>The Magic WAN Connector was created to address this problem.</p>
    <div>
      <h3>Zero-touch connectivity to your new corporate WAN</h3>
      <a href="#zero-touch-connectivity-to-your-new-corporate-wan">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> enables organizations of any size to connect and secure all of their users, devices, <a href="https://www.cloudflare.com/application-services/solutions/">applications</a>, networks, and data with a unified platform delivered by our global <a href="https://www.cloudflare.com/connectivity-cloud/">connectivity cloud</a>. <a href="https://www.cloudflare.com/network-services/products/magic-wan/">Magic WAN</a> is the network connectivity “glue” of Cloudflare One, allowing our customers to migrate away from legacy private circuits and use our network as an extension of their own.</p><p>Previously, customers have connected their locations to Magic WAN with Anycast GRE or IPsec tunnels configured on their edge network equipment (usually existing routers or firewalls), or plugged into us directly with <a href="https://www.cloudflare.com/network-services/products/network-interconnect/">CNI</a>. But for the past few years, we’ve heard requests from hundreds of customers asking for a zero-touch approach to connecting their branches: <i>We just want something we can plug in and turn on, and it handles the rest.</i></p><p>The Magic WAN Connector is exactly this. Customers receive Cloudflare-certified hardware with our software pre-installed on it, and everything is controlled via the Cloudflare dashboard. What was once a time-consuming, complex process now takes a matter of minutes, enabling robust Zero-Trust protection for all of your traffic.  </p><p>In addition to automatically configuring tunnels and routing policies to direct your network traffic to Cloudflare, the Magic WAN Connector will also handle traffic steering, shaping and failover to make sure your packets always take the best path available to the closest Cloudflare network location — which is likely only milliseconds away. You’ll also get <a href="https://www.cloudflare.com/learning/performance/what-is-observability/">enhanced visibility into all your traffic flows in analytics and logs</a>, providing a unified observability experience across both your branches and the traffic through Cloudflare’s network.</p>
    <div>
      <h3>Zero Trust security for all your traffic</h3>
      <a href="#zero-trust-security-for-all-your-traffic">
        
      </a>
    </div>
    <p>Once the Magic WAN Connector is deployed at your network location, you have automatic access to enforce Zero Trust security policies across both public and private traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6kj1RPtJdlJHyz4A5kwDb8/e0c0f7cac3b5f849c102ee4e2d31be42/Branch-Connector-Diagram.png" />
            
            </figure>
    <div>
      <h4>A secure on-ramp to the Internet</h4>
      <a href="#a-secure-on-ramp-to-the-internet">
        
      </a>
    </div>
    <p>An easy first step to improving your organization’s security posture after connecting network locations to Cloudflare is creating Secure Web Gateway policies to defend against ransomware, phishing, and other threats for faster, safer Internet browsing. By default, all Internet traffic from locations with the Magic WAN Connector will route through Cloudflare Gateway, providing a unified management plane for traffic from physical locations and remote employees.</p>
    <div>
      <h4>A more secure private network</h4>
      <a href="#a-more-secure-private-network">
        
      </a>
    </div>
    <p>The Magic WAN Connector also enables routing private traffic between your network locations, with multiple layers of network and Zero Trust security controls in place. Unlike a traditional network architecture, which requires deploying and managing a stack of security hardware and backhauling branch traffic through a central location for filtering, a SASE architecture provides private traffic filtering and control built-in: enforced across a distributed network, but managed from a single dashboard interface or API.</p>
    <div>
      <h4>A simpler approach for hybrid cloud</h4>
      <a href="#a-simpler-approach-for-hybrid-cloud">
        
      </a>
    </div>
    <p>Cloudflare One enables connectivity for any physical or <a href="https://www.cloudflare.com/learning/cloud/what-is-cloud-networking/">cloud network</a> with easy on-ramps depending on location type. The Magic WAN Connector provides easy connectivity for branches, but also provides automatic connectivity to other networks including VPCs connected using cloud-native constructs (e.g., VPN Gateways) or direct cloud connectivity (via <a href="/cloud-cni/">Cloud CNI</a>). With a unified connectivity and control plane across physical and cloud infrastructure, IT and security teams can reduce overhead and cost of managing multi- and hybrid cloud networks.</p>
    <div>
      <h3>Single-vendor SASE dramatically reduces cost and complexity</h3>
      <a href="#single-vendor-sase-dramatically-reduces-cost-and-complexity">
        
      </a>
    </div>
    <p>With the general availability of the Magic WAN Connector, we’ve put the final piece in place to deliver a unified SASE platform, developed and fully integrated from the ground up. Deploying and managing all the components of SASE with a single vendor, versus piecing together different solutions for <a href="https://www.cloudflare.com/network-security/">networking and security</a>, significantly simplifies deployment and management by reducing complexity and potential integration challenges. Many vendors that market a full SASE solution have actually stitched together separate products through acquisition, leading to an un-integrated experience similar to what you would see deploying and managing multiple separate vendors. In contrast, Cloudflare One (now with the Magic WAN Connector for simplified branch functions) enables organizations to achieve the true promise of SASE: a simplified, efficient, and highly secure network and security infrastructure that reduces your total cost of ownership and adapts to the evolving needs of the modern digital landscape.</p>
    <div>
      <h3>Evolving beyond SD-WAN</h3>
      <a href="#evolving-beyond-sd-wan">
        
      </a>
    </div>
    <p>Cloudflare One addresses many of the challenges that were left behind as organizations deployed SD-WAN to help simplify networking operations. <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-sd-wan/">SD-WAN</a> provides orchestration capabilities to help manage devices and configuration in one place, as well as last mile traffic management to steer and shape traffic based on more sophisticated logic than is possible in traditional routers. But SD-WAN devices generally don't have embedded security controls, leaving teams to stitch together a patchwork of hardware, virtualized and cloud-based tools to keep their networks secure. They can make decisions about the best way to send traffic out from a customer’s branch, but they have no way to influence traffic hops between the last mile and the traffic's destination. And while some SD-WAN providers have surfaced virtualized versions of their appliances that can be deployed in cloud environments, they don't support native cloud connectivity and can complicate rather than ease the transition to cloud.</p><p>Cloudflare One represents the next evolution of enterprise networking, and has a fundamentally different architecture from either legacy networking or SD-WAN. It's based on a "light branch, heavy cloud" principle: deploy the minimum required hardware within physical locations (or virtual hardware within virtual networks, e.g., cloud VPCs) and use low-cost Internet connectivity to reach the nearest "service edge" location. At those locations, traffic can flow through security controls and be optimized on the way to its destination, whether that's another location within the customer's private network or an application on the public Internet. This architecture also enables remote user access to connected networks.</p><p>This shift — moving most of the "smarts" from the branch to a distributed global network edge, and leaving only the functions at the branch that absolutely require local presence, delivered by the Magic WAN Connector — solves our customers’ current problems and sets them up for <a href="https://www.cloudflare.com/cybersecurity-risk-management/">easier management and a stronger security posture</a> as the connectivity and attack landscape continues to evolve.</p><table><colgroup><col></col><col></col><col></col><col></col><col></col></colgroup><tbody><tr><td><p><span>Aspect</span></p></td><td><p><span>Example</span></p></td><td><p><span>MPLS/VPN Service</span></p></td><td><p><span>SD-WAN</span></p></td><td><p><span>SASE with </span></p><p><span>Cloudflare One </span></p></td></tr><tr><td><p><span>Configuration</span></p></td><td><p><span>New site setup, configuration and management</span></p></td><td><p><span>By MSP through service request</span></p></td><td><p><span>Simplified orchestration and  </span><span><br /></span><span>management via centralized controller</span></p></td><td><p><span>Automated orchestration via SaaS portal</span></p><p><span>Single Dashboard</span></p></td></tr><tr><td><p><span>Last mile </span></p><p><span>traffic control</span></p></td><td><p><span>Traffic balancing, QoS, and failover</span></p></td><td><p><span>Covered by MPLS SLAs</span></p></td><td><p><span>Best Path selection available </span><span><br /></span><span>in SD-WAN appliance </span></p></td><td><p><span>Minimal on-prem deployment to control local decision making</span></p></td></tr><tr><td><p><span>Middle mile </span></p><p><span>traffic control</span></p></td><td><p><span>Traffic steering around middle mile congestion</span></p></td><td><p><span>Covered by MPLS SLAs</span></p></td><td><p><span>“Tunnel Spaghetti” and still no control over the middle mile</span></p></td><td><p><span>Integrated traffic management &amp; private backbone controls in a unified dashboard</span></p></td></tr><tr><td><p><span>Cloud integration</span></p></td><td><p><span>Connectivity for cloud migration</span></p></td><td><p><span>Centralized breakout</span></p></td><td><p><span>Decentralized breakout</span></p></td><td><p><span>Native connectivity with Cloud Network Interconnect</span></p></td></tr><tr><td><p><span>Security</span></p></td><td><p><span>Filter in &amp; outbound Internet traffic for malware</span></p></td><td><p><span>Patchwork of hardware controls</span></p></td><td><p><span>Patchwork of hardware </span><span><br /></span><span>and/or software controls</span></p></td><td><p><span>Native integration with user, data, application &amp; network security tools</span></p></td></tr><tr><td><p><span>Cost</span></p></td><td><p><span>Maximize ROI for network investments</span></p></td><td><p><span>High cost for hardware and connectivity</span></p></td><td><p><span>Optimized connectivity costs at the expense of increased </span></p><p><span>hardware and software costs</span></p></td><td><p><span>Decreased hardware and connectivity costs for maximized ROI</span></p></td></tr></tbody></table><p><i>Summary of legacy, SD-WAN based, and SASE architecture considerations</i></p><p>Love and want to keep your current SD-WAN vendor? No problem - you can still use any appliance that supports IPsec or GRE as an on-ramp for Cloudflare One.</p>
    <div>
      <h3>Ready to simplify your SASE journey?</h3>
      <a href="#ready-to-simplify-your-sase-journey">
        
      </a>
    </div>
    <p>You can learn more about the Magic WAN Connector, including device specs, specific feature info, onboarding process details, and more at our <a href="https://developers.cloudflare.com/magic-wan/connector/">dev docs</a>, or <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/">contact us</a> to get started today.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <category><![CDATA[Magic WAN Connector]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <guid isPermaLink="false">Rf29gLGgJJqRz3DJoViF1</guid>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Application Services for private networks: do more with the tools you already love]]></title>
            <link>https://blog.cloudflare.com/app-services-private-networks/</link>
            <pubDate>Fri, 13 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to announce new integrations that make it possible to unlock operational and cost efficiencies for IT teams by allowing them to do more with fewer tools, and enable new use cases that are impossible without Cloudflare’s  “every service everywhere” architecture. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/19EYuMAVuO7G3gCRRRPhWg/2fe36298d6366dd5948372ab4bd08b06/image2-28.png" />
            
            </figure><p>Cloudflare’s <a href="https://www.cloudflare.com/application-services/">Application Services</a> have been hard at work keeping Internet-facing websites and applications secure, fast, and reliable for over a decade. <a href="https://www.cloudflare.com/cloudflare-one/#transformation">Cloudflare One</a> provides similar security, performance, and reliability benefits for your entire corporate network. And today, we’re excited to announce new integrations that make it possible to use these services together in new ways. These integrations unlock operational and cost efficiencies for IT teams by allowing them to do more with fewer tools, and enable new use cases that are impossible without Cloudflare’s  “every service everywhere” architecture.</p><blockquote><p><i>“Just as Canva simplifies graphic design, Cloudflare simplifies performance and security. Thanks to Cloudflare, we can focus on growing our product and expanding into new markets with confidence, knowing that our platform is fast, reliable, and secure.” - </i><b><i>Jim Tyrrell</i></b><i>, Head of Infrastructure, Canva</i></p></blockquote>
    <div>
      <h3>Every service everywhere, now for every network</h3>
      <a href="#every-service-everywhere-now-for-every-network">
        
      </a>
    </div>
    <p>One of Cloudflare’s fundamental architectural principles has always been to treat our network like one homogeneous supercomputer. Rather than deploying services in specific locations - for example, using some of our points of presence to enforce <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> policies, others for Zero Trust controls, and others for traffic optimization - every server runs a virtually identical stack of all of our software services. This way, a packet can land on any server and flow through a full set of security filters in a single pass, without having to incur the performance tax of hair pinning to multiple locations.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2feVltGTqj2dzzVvq7r0YQ/a3f5a8d3edd5bbfc86f4ab3e6af61a07/image1-38.png" />
            
            </figure><p>The software that runs on each of these servers is Linux-based and takes advantage of core concepts of the Linux kernel in order to create “wiring” between services. This <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">deep dive on our DDoS mitigation stack</a> explains just one example of how we use these tools to route packets through multiple layers of protection without sacrificing performance. This approach also enables us to easily add new paths for packets and requests, enabling deeper integrations and new possibilities for traffic routed to Cloudflare’s network from any source or to any destination. Let’s walk through some of these new use cases we’re developing for private networks.</p>
    <div>
      <h3>Web Application Firewall for private apps with any off-ramp</h3>
      <a href="#web-application-firewall-for-private-apps-with-any-off-ramp">
        
      </a>
    </div>
    <p>Today, millions of customers trust Cloudflare’s WAF to protect their applications that are exposed to the public Internet - either fully public apps or private apps connected via <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/">Cloudflare Tunnel</a> and surfaced with a public hostname. We’ve increasingly heard from customers that are excited about putting our WAF controls in front of any application with any traffic on or off-ramp, for a variety of reasons.</p><p>Some customers want to do this in order to enforce stronger <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust principles</a>: filtering all traffic, even requests sourced from within a “trusted” private network, as though it came from the open Internet. Other customers want to connect an entire datacenter or cloud property with a network-layer on-ramp like a GRE or IPsec tunnel or <a href="https://developers.cloudflare.com/network-interconnect/">CNI</a>. And yet others want to adopt the Cloudflare WAF for their private apps without specifying public hostnames.</p><p>By fully integrating Cloudflare’s WAF with the Cloudflare One dataplane, we’re excited to address all of these use cases: enabling customers to create WAF policies in-path for fully private traffic flows by building their private network on Cloudflare.</p>
    <div>
      <h3>API security for internal APIs</h3>
      <a href="#api-security-for-internal-apis">
        
      </a>
    </div>
    <p>After web applications, one of the next <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">attack surfaces</a> our customers turn to addressing is their public-facing <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api/">APIs</a>. Cloudflare offers <a href="https://www.cloudflare.com/application-services/solutions/api-security/">services</a> to protect public APIs from DDoS, abuse, sensitive data loss, and many other attack vectors. But security concerns don’t stop with public-facing APIs: as engineering organizations continue to embrace distributed architecture, multicloud and microsegmentation, <a href="https://www.cloudflare.com/cio/">CIOs</a> and teams that provide internal services are also interested in securing their private APIs.</p><p>With Cloudflare One, customers can connect and route their entire private network through our global fabric, enabling private API traffic to flow through the same stack of security controls we’ve previously made available for public APIs. Networking and security teams will be able to apply the principles of zero trust to their private API traffic flow to help improve their overall security posture.</p>
    <div>
      <h3>Global and local traffic management for private apps</h3>
      <a href="#global-and-local-traffic-management-for-private-apps">
        
      </a>
    </div>
    <p>So far, we’ve focused on the security controls customers have available to filter malicious traffic to their applications and APIs. But Cloudflare’s services don’t stop with security: we make anything connected to the Internet faster and more reliable. One of the key tools enabling this is our suite of load balancing services, which include application-layer controls for any origin server behind Cloudflare’s <a href="https://www.cloudflare.com/learning/cdn/glossary/reverse-proxy/">reverse proxy</a> and <a href="https://developers.cloudflare.com/magic-wan/about/traffic-steering/">network-layer controls</a> for any IP traffic.</p><p>Customers have asked for even more flexibility and new ways to use our traffic management tools: the ability to create application-layer load balancing policies for traffic connected with any off-ramp, such as Cloudflare Tunnel for applications, GRE or IPsec tunnels or CNI for IP networks. They also are excited about the potential to extend load balancing policies into their local networks, managing traffic across servers within a datacenter or cloud property in addition to across multiple “global” locations. These capabilities, which will improve resiliency for any application - both by enforcing more granular controls for private apps and managing local traffic for any app - are coming soon; stay tuned for more updates.</p>
    <div>
      <h3>Full-stack performance optimization for private apps</h3>
      <a href="#full-stack-performance-optimization-for-private-apps">
        
      </a>
    </div>
    <p>Cloudflare has always obsessed over the speed of every request routed through our network. We’re constantly developing new ways to deliver content closer to users, automatically optimize any kind of traffic, and route packets over the best possible paths, avoiding congestion and other issues on the Internet. <a href="https://www.cloudflare.com/products/argo-smart-routing/">Argo Smart Routing</a> speeds up any reverse proxied traffic with application-layer optimizations and IP packets with intelligent decisions at the network layer, using Cloudflare’s extensive interconnectivity and global private backbone to make sure that traffic is delivered as quickly and efficiently as possible.</p><p>As we more deeply integrate Cloudflare’s private networking dataplane and our application services to realize the security and reliability benefits described above, customers will automatically be able to see the benefits of Argo Smart Routing at all layers of the OSI stack for any traffic connected to Cloudflare.</p>
    <div>
      <h3>Private DNS for one-stop management of internal network resources</h3>
      <a href="#private-dns-for-one-stop-management-of-internal-network-resources">
        
      </a>
    </div>
    <p>Cloudflare’s industry-leading <a href="https://www.cloudflare.com/dns/">authoritative DNS</a> protects millions of public Internet domains. These can be queried by anyone on the public Internet, which is great for most organizations, but some want to be able to restrict this access. With our private DNS, customers will be able to resolve queries to private domains only when connected to the Zero Trust private network they define within Cloudflare. Because we’re building this using our robust authoritative DNS and Gateway filtering services, you can expect all the other goodness already possible with Cloudflare to also apply to private DNS: support for all common DNS record types, the ability to resolve to DNS queries to virtual networks with overlapping IPs, and all the other Zero Trust filtering control offered by Gateway DNS filtering. Consolidating management of external and internal DNS in one place, with the fastest response time, unparalleled redundancy, and advanced security already built in, will greatly simplify customers’ infrastructure and save time and operational overhead.</p>
    <div>
      <h3>And more new use cases every day</h3>
      <a href="#and-more-new-use-cases-every-day">
        
      </a>
    </div>
    <p>We love hearing about new ways you’re using Cloudflare to make any user, application, or network faster, more secure, and more reliable. <a href="https://www.cloudflare.com/lp/application-services-for-private-networks/">Get on the list</a> for beta access to the new integrations described today and reach out to us in the comments if you’ve got more ideas for new problems you’d like to solve using Cloudflare.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <category><![CDATA[NaaS]]></category>
            <guid isPermaLink="false">45eViIuDoxN53vCcJ5RO3m</guid>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing the Authorized Partner Service Delivery Track for Cloudflare One]]></title>
            <link>https://blog.cloudflare.com/cloudflare-one-authorized-services-delivery-partner-track/</link>
            <pubDate>Tue, 10 Jan 2023 14:01:00 GMT</pubDate>
            <description><![CDATA[ This week we’re announcing the Authorized Services Delivery Partner (ASDP) Track designed to validate partners that want to deliver services around Cloudflare One ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2WjCFeq96IprfdXmILovkF/08a5822492b306118f48b60297d053d6/image1-12.png" />
            
            </figure><p>In this Sunday’s <a href="/welcome-to-cio-week-2023/">Welcome to CIO Week</a> blog, we talked about the value for CIOs in finding partners for <a href="https://www.cloudflare.com/cio/">long term digital transformation initiatives</a>. As the adage goes, “If you want to go fast, go alone, if you want to go far, go together.”</p><p>As Cloudflare has expanded into new customer segments and emerging market categories like <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> and <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>, we too have increasingly focused on expanding our relationship with go-to-market partners (e.g. service providers, implementation / consulting firms, system integrators, and more). Because security and network transformation can feel inherently daunting, customers often need strategic advice and practical support when implementing <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> – our SASE platform of Zero Trust security and networking services. These partners play a pivotal role in easing customer adoption by helping them assess, implement, and manage our services.</p><p>This blog is primarily intended for prospective and current Cloudflare go-to-market channel partners and highlights how we have grown our partnership program over the past year and will continue to, going forward.</p>
    <div>
      <h3>Cloudflare One: fastest growing portfolio among Cloudflare partners</h3>
      <a href="#cloudflare-one-fastest-growing-portfolio-among-cloudflare-partners">
        
      </a>
    </div>
    <p>Over the past year, adoption of Cloudflare One services has been the fastest area of growth among our customer base. Investments we have made to our channel ecosystem have helped us capitalize on increased customer demand for SASE platforms, including Zero Trust security and cloud-delivered networking.</p><p>In the last year alone, we’ve seen a 3x increase in Cloudflare One partner bookings. At the same time, the number of transacting partners has increased 70% YoY.</p><p>Partners repeatedly cite the simplicity of our platform to deploy and manage, our pace of innovation to give them confidence in our roadmap, and our global network to ensure scale, speed, and resilience as key differentiators that are fueling strong customer demand for Cloudflare One services.</p><p>Migrating from legacy, on-premise appliance to a cloud-delivered SASE architecture is a journey. For most customers, partners help break that journey into two categories, broadly defined: network layer transformation and Zero Trust security modernization.</p>
    <div>
      <h3>Transforming the network layer</h3>
      <a href="#transforming-the-network-layer">
        
      </a>
    </div>
    <p>Multi-cloud and hybrid cloud architecture are increasingly the norm. As enterprises embrace this approach, their networking infrastructure will likewise need to adapt to be able to easily connect to a variety of cloud environments.</p><p>Organizations that have traditionally relied on <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-sd-wan/">SD-WAN</a> and <a href="https://www.cloudflare.com/learning/network-layer/what-is-mpls/">MPLS</a> based technologies will turn to cloud-based <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/">network-as-a-service (NaaS)</a> offerings like Cloudflare’s <a href="https://www.cloudflare.com/magic-wan/">Magic WAN</a> (part of our Cloudflare One platform) to increase flexibility and reduce costs. This will also drive revenue opportunities for a new generation of <a href="https://www.cloudflare.com/learning/cloud/what-is-cloud-networking/">cloud networking</a> experts and advisors who have the skills to help organizations migrate from traditional on-premise hardware to a NaaS architecture.</p><p>For some organizations, transforming the network may in fact be a more attractive, initial entry point than beginning a Zero Trust security migration, as NaaS allows organizations to maintain their existing security tools while still providing a strategic path towards a full perimeter-less architecture with cloud-delivered protection in the future.</p>
    <div>
      <h3>Implementing a Zero Trust architecture</h3>
      <a href="#implementing-a-zero-trust-architecture">
        
      </a>
    </div>
    <p>For many organizations today, modernizing security for employees, devices, data, and offices with Zero Trust best practices is an equally critical priority. Trends towards hybrid and remote working have put additional pressure on IT and security teams to re-imagine how they <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">secure access to corporate resources</a> and move away from <a href="https://www.cloudflare.com/learning/access-management/castle-and-moat-network-security/">traditional ‘castle-and-moat’ architectures</a>. Zero Trust promises enhanced visibility, more granular controls, and identity-aware protection across all traffic, regardless of origin or destination.</p><p>While the benefits of moving to a Zero Trust architecture are undeniable, <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implementing a full Zero Trust architecture</a> is a journey that often requires the help of third parties. According to a recent report by iVanti, while 73% of companies plan to move to a cloud based architecture over the next 18 months, 46% of these companies IT security teams lack the confidence in their ability to apply a Zero Trust model on their own which is why 34% reportedly are relying on third party security providers to help them implement Zero Trust.<sup>1</sup> This is where partners can help.</p>
    <div>
      <h3>Announcing the Authorized Services Delivery Partner Track for Cloudflare One</h3>
      <a href="#announcing-the-authorized-services-delivery-partner-track-for-cloudflare-one">
        
      </a>
    </div>
    <p>Cloudflare is hyper focused on building the most compelling and easy-to-use SASE platform on the market to help accelerate how organizations can transform their network and security architectures. The scale and resiliency of our global network – which spans across 275+ cities in 100+ countries and has 172+ Tbps of network capacity – ensures that we can deliver our protections reliably and with high speed, regardless of where customers are around the world.</p><p>Just as our physical network of data centers continues to expand, so too does our strategic network of channel partners, who we rely on to deliver professional and managed services that customers may require as part of their Cloudflare One deployment. Cloudflare is actively working with partners worldwide to build advisory, migration, and managed services with the goal of wrapping partner services expertise around Cloudflare One engagements to ensure 100% customer adoption and satisfaction.</p><p>To help partners develop their Cloudflare One services expertise and distinguish themselves in the marketplace, today we are excited to announce the limited availability of a new specialization track for Authorized Services Delivery Partners (ASDP). This track is designed to authorize partners that meet Cloudflare’s high standards for professional services delivery around Cloudflare One.</p><p>To become an Authorized Partner, partners will need to go through a rigorous technical validation process and will be assessed on the merits of the security, performance, and reliability of their services delivery capabilities. Partners that achieve the Authorized Service Partner designation will receive a variety of benefits, such as:</p><ul><li><p>Engagement in Cloudflare One sourced opportunities requiring services</p></li><li><p>Access to named Cloudflare One partner service delivery managers who can assist partners in the building of their services practices</p></li><li><p>Access to special partner incentive funds designed to ensure that authorized partner services are actively used in Cloudflare One customer engagements.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7LffR3bsmxnG4OcvSsOLgH/96589f7ab25f171b76e5d8f7978d48ef/image2-7.png" />
            
            </figure><p>To support this new partner track, we are also announcing advanced enablement and training paths that will be available in both instructor-led training and online formats via our partner portal, as well as advanced lab environments designed to help partners learn how to implement and support Cloudflare One deployments. Partners that successfully complete the ASDP requirements will also be given opportunities to shadow customer deployments to further their capabilities and expertise.</p><p>For current and prospective Cloudflare partners interested in this track, we are launching a new <a href="https://www.cloudflare.com/static/16d21a3680c5673df2c243d3741c5f9e/Authorized_Service_Delivery_Partner_Track_for_CF1.pdf">Cloudflare Authorized Service Delivery Partner Validation checklist</a>, which includes details on the application process.</p><p>If you are an existing Cloudflare partner, you can also reach out to your named Channel Account Manager for additional information.</p><p>....
<sup>1</sup><a href="https://rs.ivanti.com/reports/ivi-2621-2021-zero-trust-progress-report.pdf">iVanti 2021 Zero Trust Progress Report</a></p><p></p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <category><![CDATA[Partners]]></category>
            <guid isPermaLink="false">4JJhsfWlZ7c6LsIcIcXRKN</guid>
            <dc:creator>Matthew Harrell</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare protection for all your cardinal directions]]></title>
            <link>https://blog.cloudflare.com/cardinal-directions-and-network-traffic/</link>
            <pubDate>Tue, 10 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ In this post, we’ll recap how definitions of corporate network traffic have shifted and how Cloudflare One provides protection for all traffic flows, regardless of source or destination. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>As the Internet becomes the new corporate network, traditional definitions within corporate networking are becoming blurry. Concepts of the corporate WAN, “north/south” and “east/west” traffic, and private versus public application access dissolve and shift their meaning as applications shift outside corporate data center walls and users can access them from anywhere. And security requirements for all of this traffic have become more stringent as new attack vectors continue to emerge.</p><p>The good news: Cloudflare’s got you covered! In this post, we’ll recap how definitions of corporate network traffic have shifted and how Cloudflare One provides protection for all traffic flows, regardless of source or destination.</p>
    <div>
      <h3>North, south, east, and west traffic</h3>
      <a href="#north-south-east-and-west-traffic">
        
      </a>
    </div>
    <p>In the traditional <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">perimeter security model</a>, IT and network teams defined a “trusted” private network made up of the LANs at corporate locations, and the WAN connecting them. Network architects described traffic flowing between the trusted network and another, untrusted one as “north/south,” because those traffic flows are typically depicted spatially on network diagrams like the one below.</p><p>Connected north/south networks could be private, such as one belonging to a partner company, or public like the Internet. Security teams made sure all north/south traffic flowed through one or a few central locations where they could enforce controls across all the “untrusted” traffic, making sure no malicious actors could get in, and no sensitive data could get out.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7nSbqXVgnub8P58qQSHyoA/d17e829d6622a527b3cd69935ace2a2c/image2-8.png" />
            
            </figure><p><i>Network diagram depicting traditional corporate network architecture</i></p><p>Traffic on a single LAN, such as requests from a desktop computer to a printer in an office, was referred to as “east/west” and generally was not subject to the same level of security control. The “east/west” definition also sometimes expanded to include traffic between LANs in a small geographic area, such as multiple buildings on a large office campus. As organizations became more distributed and the need to share information between geographically dispersed locations grew, “east/west” also often included WAN traffic transferred over trusted private connections like <a href="https://www.cloudflare.com/learning/network-layer/what-is-mpls/">MPLS links</a>.</p><p>As applications moved to the Internet and the cloud and users moved out of the office, clean definitions of north/south/east/west traffic started to dissolve. Traffic and data traditionally categorized as “private” and guarded within the boundaries of the corporate perimeter is now commonly transferred over the Internet, and organizations are shifting to cloud-first security models such as <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> which redefine where security controls are enforced across that traffic.</p>
    <div>
      <h3>How Cloudflare keeps you protected</h3>
      <a href="#how-cloudflare-keeps-you-protected">
        
      </a>
    </div>
    <p>Cloudflare’s services can be used to secure and accelerate all of your traffic flows, regardless of whether your network architecture is fully cloud-based and Internet-native or more traditional and physically defined.</p><p>For “north/south” traffic from external users accessing your public applications, Cloudflare provides protection at all layers of the OSI stack and for a wide range of threats. Our <a href="https://www.cloudflare.com/application-security/">application security</a> portfolio, including DDoS protection, Web Application Firewall, API security, Bot Management, and more includes all the tools you need to keep public facing apps safe from malicious actors outside your network; our <a href="https://www.cloudflare.com/network-services/">network services</a> extend similar benefits to all your IP traffic. <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> has you covered for the growing amount of north/south traffic from internal users - <a href="https://www.cloudflare.com/products/zero-trust/zero-trust-network-access/">Zero Trust Network Access</a> provides access to corporate resources on the Internet without sacrificing security, and <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Secure Web Gateway</a> filters outgoing traffic to keep your data safe from malware, ransomware, phishing, command and control, and other threats.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ohLGeQfrRETUF6sV5csSN/2132d0cc24bfbacb9c60d8ab47115794/image3-6.png" />
            
            </figure><p><i>Cloudflare protection for all your traffic flows</i></p><p>As customers adopt SASE and multicloud architectures, the amount of east/west traffic within a single location continues to decrease. Cloudflare One enables customers to use Cloudflare’s network as an extension of theirs for east/west traffic between locations with a variety of secure on-ramp options including a device client, application and network-layer tunnels, and direct connections, and apply Zero Trust policies to all traffic regardless of where it’s headed. Some customers choose to use Cloudflare One for filtering local traffic as well, which involves a quick hop out to the closest <a href="https://www.cloudflare.com/network/">Cloudflare location</a> - less than 50ms from 95% of the world’s Internet-connected population - and enables security and IT teams to enforce consistent security policy across all traffic from a single control plane.</p><p>Because Cloudflare’s services are all delivered on every server in all locations across our network, customers can connect to us to get access to a full “service mesh” for any traffic. As we develop new capabilities, they can apply across any traffic flow regardless of source or destination. Watch out for some new product announcements coming later this week that enhance these integrations even further.</p>
    <div>
      <h3>Get started today</h3>
      <a href="#get-started-today">
        
      </a>
    </div>
    <p>As the Internet becomes the new corporate network, Cloudflare’s mission to help build a better Internet enables us to help you protect anything connected to it. Stay tuned for the rest of CIO Week for new capabilities to make all of your north, south, east, and west traffic faster, more secure, and more reliable, including updates on even more flexible application-layer capabilities for your private network traffic.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[NaaS]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <guid isPermaLink="false">5t3HpgTzfUZiViaBhUw2nD</guid>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Magic makes your network faster]]></title>
            <link>https://blog.cloudflare.com/magic-makes-your-network-faster/</link>
            <pubDate>Thu, 16 Sep 2021 12:59:51 GMT</pubDate>
            <description><![CDATA[ Today, as part of Speed Week, we’ll break down the other side of the Magic: how using Cloudflare can automatically make your entire network faster.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We <a href="/magic-transit/">launched Magic Transit</a> two years ago, followed more recently by its siblings <a href="/magic-wan-firewall/">Magic WAN</a> and <a href="/introducing-magic-firewall/">Magic Firewall</a>, and have talked at length about how this suite of products helps security teams sleep better at night by protecting entire networks from malicious traffic. Today, as part of <a href="/fastest-internet/">Speed Week</a>, we’ll break down the other side of the Magic: how using Cloudflare can automatically make your entire network faster. Our scale and interconnectivity, use of data to make more intelligent routing decisions, and inherent architecture differences versus traditional networks all contribute to performance improvements across all IP traffic.</p>
    <div>
      <h3>What is Magic?</h3>
      <a href="#what-is-magic">
        
      </a>
    </div>
    <p>Cloudflare’s <a href="https://www.cloudflare.com/network-services/">“Magic” services</a> help customers connect and secure their networks without the cost and complexity of maintaining legacy hardware. Magic Transit provides connectivity and DDoS protection for Internet-facing networks; Magic WAN enables customers to replace legacy <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-wan/">WAN architectures</a> by routing private traffic through Cloudflare; and Magic Firewall protects all connected traffic with a built-in <a href="https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/">firewall-as-a-service</a>. All three share underlying architecture principles that form the basis of the performance improvements we’ll dive deeper into below.</p>
    <div>
      <h3>Anycast everything</h3>
      <a href="#anycast-everything">
        
      </a>
    </div>
    <p>In contrast to traditional “point-to-point” architecture, Cloudflare uses Anycast GRE or IPsec (coming soon) tunnels to send and receive traffic for customer networks. This means that customers can set up a single tunnel to Cloudflare, but effectively get connected to every single Cloudflare location, dramatically simplifying the process to configure and maintain network connectivity.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4y0u7nLWoslE47axWaq81g/cd10c416b9795196f6f6bd42df1934ff/D1.png" />
            
            </figure>
    <div>
      <h3>Every service everywhere</h3>
      <a href="#every-service-everywhere">
        
      </a>
    </div>
    <p>In addition to being able to send and receive traffic from anywhere, Cloudflare’s edge network is also designed to run every service on every server in every location. This means that incoming traffic can be processed wherever it lands, which allows us to <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">block DDoS attacks</a> and other malicious traffic within seconds, apply firewall rules, and route traffic efficiently and without bouncing traffic around between different servers or even different locations before it’s dispatched to its destination.</p>
    <div>
      <h3>Zero Trust + Magic: the next-gen network of the future</h3>
      <a href="#zero-trust-magic-the-next-gen-network-of-the-future">
        
      </a>
    </div>
    <p>With <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a>, customers can seamlessly combine <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> and network connectivity to build a faster, more secure, more reliable experience for their entire corporate network. Everything we’ll talk about today applies even more to customers using the entire Cloudflare One platform - stacking these products together means the performance benefits multiply (check out <a href="/the-zero-trust-platform-built-for-speed">our post on Zero Trust and speed</a> from today for more on this).</p>
    <div>
      <h3>More connectivity = faster traffic</h3>
      <a href="#more-connectivity-faster-traffic">
        
      </a>
    </div>
    <p>So where does the Magic come in? This part isn’t intuitive, especially for customers using Magic Transit in front of their network for DDoS protection: how can adding a network hop <i>subtract</i> latency?</p><p>The answer lies in Cloudflare’s network architecture — our web of connectivity to the rest of the Internet. Cloudflare has invested heavily in building one of the world’s most <a href="https://www.peeringdb.com/net/4224">interconnected networks</a> (9800 interconnections and counting, including with major ISPs, cloud services, and enterprises). We’re also continuing to grow our own <a href="/250-cities-is-just-the-start/">private backbone</a> and giving customers the ability to <a href="/cloudflare-network-interconnect/">directly connect with us</a>. And our expansive connectivity to <a href="/last-mile-insights/">last mile</a> providers means we’re just milliseconds away from the source of all your network traffic, regardless of where in the world your users or employees are.</p><p>This toolkit of varying connectivity options means traffic routed through the Cloudflare network is often meaningfully faster than paths across the public Internet alone, because more options available for <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/">BGP</a> path selection mean increased ability to choose more performant routes. Imagine having only one possible path between your house and the grocery store versus ten or more - chances are, adding more options means better alternatives will be available. A cornucopia of connectivity methods also means more resiliency: if there’s an issue on one of the paths (like construction happening on what is usually the fastest street), we can easily route around it to avoid impact to your traffic.</p><p>One common comparison customers are interested in is latency for inbound traffic. From the end user perspective, does routing through Cloudflare speed up or slow down traffic to networks protected by Magic Transit? Our response: let’s test it out and see! We’ve repeatedly compared Magic Transit vs standard Internet performance for customer networks across geographies and industries and consistently seen really exciting results. Here’s an example from one recent test where we used third-party probes to measure the ping time to the same customer network location (their data center in Qatar) before and after onboarding with Magic Transit:</p><table><tr><td><p><b>Probe location</b></p></td><td><p><b>RTT w/o Magic (ms)</b></p></td><td><p><b>RTT w/ Magic (ms)</b></p></td><td><p><b>Difference (ms)</b></p></td><td><p><b>Difference (% improvement)</b></p></td></tr><tr><td><p>Dubai</p></td><td><p>27</p></td><td><p>23</p></td><td><p>4</p></td><td><p>13%</p></td></tr><tr><td><p>Marseille</p></td><td><p>202</p></td><td><p>188</p></td><td><p>13</p></td><td><p>7%</p></td></tr><tr><td><p>Global (results averaged across 800+ distributed probes)</p></td><td><p>194</p></td><td><p>124</p></td><td><p>70</p></td><td><p>36%</p></td></tr></table><p>All of these results were collected <i>without</i> the use of Argo Smart Routing for Packets, which we announced on Tuesday. Early data indicates that networks using Smart Routing will see even more substantial gains.</p>
    <div>
      <h3>Modern architecture eliminates traffic trombones</h3>
      <a href="#modern-architecture-eliminates-traffic-trombones">
        
      </a>
    </div>
    <p>In addition to the performance boost available for traffic routed across the Cloudflare network versus the public Internet, customers using Magic products benefit from a new architecture model that totally removes up to thousands of miles worth of latency.</p><p>Traditionally, enterprises adopted a “hub and spoke” model for granting employees access to applications within and outside their network. All traffic from within a connected network location was routed through a central “hub” where a stack of network hardware (e.g. firewalls) was maintained. This model worked great in locations where the hub and spokes were geographically close, but started to strain as companies became more global and applications moved to the cloud.</p><p>Now, networks using hub and spoke architecture are often backhauling traffic thousands of miles, between continents and across oceans, just to apply security policies before packets are dispatched to their final destination, which is often physically closer to where they started! This creates a “trombone” effect, where precious seconds are wasted bouncing traffic back and forth across the globe, and performance problems are amplified by packet loss and instability along the way.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1M54AiCAu5Ph3fGu9Yp5at/609d30e5e2cc4fbdb6327e0fd64bc8cc/D2.png" />
            
            </figure><p>Network and security teams have tried to combat this issue by installing hardware at more locations to establish smaller, regional hubs, but this quickly becomes prohibitively expensive and hard to manage. The price of purchasing multiple hardware boxes and dedicated private links adds up quickly, both in network gear and connectivity itself as well as the effort required to maintain additional infrastructure. Ultimately, this cost usually outweighs the benefit of the seconds regained with shorter network paths.</p>
    <div>
      <h3>The “hub” is everywhere</h3>
      <a href="#the-hub-is-everywhere">
        
      </a>
    </div>
    <p>There’s a better way — with the Anycast architecture of Magic products, all traffic is automatically routed to the closest Cloudflare location to its source. There, security policies are applied with single-pass inspection before traffic is routed to its destination. This model is conceptually similar to a hub and spoke, except that the hub is everywhere: 95% of the entire Internet-connected world is within 50 ms of a Cloudflare location (check out this week’s <a href="/250-cities-is-just-the-start/">updates</a> on our quickly-expanding network presence for the latest). This means instead of tromboning traffic between locations, it can stop briefly at a Cloudflare hop in-path before it goes on its way: dramatically faster architecture without compromising security.</p><p>To demonstrate how this architecture shift can make a meaningful difference, we created a lab to mirror the setup we’ve heard many customers describe as they’ve explained performance issues with their existing network. This example customer network is headquartered in South Carolina and has branch office locations on the west coast, in California and Oregon. Traditionally, traffic from each branch would be backhauled through the South Carolina “hub” before being sent on to its destination, either another branch or the public Internet.</p><p>In our alternative setup, we’ve<a href="https://www.cloudflare.com/learning/network-layer/what-is-branch-networking/"> connected each customer network location</a> to Cloudflare with an Anycast GRE tunnel, simplifying configuration and removing the South Carolina trombone. We can also enforce network and application-layer filtering on all of this traffic, ensuring that the faster network path doesn’t compromise security.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1CowxWFJxc3QGwM1mauUi6/5494d0358d312c6556e746ec3b81d5a4/D4.png" />
            
            </figure><p>Here’s a summary of results from performance tests on this example network demonstrating the difference between the traditional hub and spoke setup and the Magic “global hub” — we saw up to 70% improvement in these tests, demonstrating the dramatic impact this architecture shift can make.</p><table><tr><td><p></p></td><td><p><b>LAX &lt;&gt; OR (ms)</b></p></td></tr><tr><td><p><b>ICMP round-trip for “Regular” (hub and spoke) WAN</b></p></td><td><p>127</p></td></tr><tr><td><p><b>ICMP round-trip for Magic WAN</b></p></td><td><p>38</p></td></tr><tr><td><p><b>Latency savings for Magic WAN vs “Regular” WAN</b></p></td><td><p>70%</p></td></tr></table><p>This effect can be amplified for networks with globally distributed locations — imagine the benefits for customers who are used to delays from backhauling traffic between different regions across the world.</p>
    <div>
      <h3>Getting smarter</h3>
      <a href="#getting-smarter">
        
      </a>
    </div>
    <p>Adding more connectivity options and removing traffic trombones provide a performance boost for all Magic traffic, but we’re not stopping there. In the same way we leverage insights from hundreds of billions of requests per day to block new types of malicious traffic, we’re also using our unique perspective on Internet traffic to make more intelligent decisions about routing customer traffic versus relying on BGP alone. Earlier this week, we announced <a href="/argo-v2/">updates to Argo Smart Routing</a> including the brand-new Argo Smart Routing for Packets. Customers using Magic products can enable it to automatically boost performance for any IP traffic routed through Cloudflare (by 10% on average according to results so far, and potentially more depending on the individual customer’s network topology) — read more on this in the <a href="/argo-v2/">announcement blog</a>.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>The modern architecture, well-connected network, and intelligent optimizations we’ve talked about today are just the start. Our vision is for any customer using Magic to connect and protect their network to have the best performance possible for all of their traffic, automatically. We’ll keep investing in expanding our presence, interconnections, and backbone, as well as continuously improving Smart Routing — but we’re also already cooking up brand-new products in this space to deliver optimizations in new ways, including WAN Optimization and Quality of Service functions. Stay tuned for more Magic coming soon, and get in touch with your account team to learn more about how we can help make your network faster starting today.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div><p></p> ]]></content:encoded>
            <category><![CDATA[Speed Week]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <category><![CDATA[Magic Firewall]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">9yAkdrsirUlHVaB340mt2</guid>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
    </channel>
</rss>