diff --git a/src/assets/images/reference-architecture/optimizing-roaming-experience-with-geolocated-ips/figure1.svg b/src/assets/images/reference-architecture/optimizing-roaming-experience-with-geolocated-ips/figure1.svg
new file mode 100644
index 00000000000000..198064a00cc966
--- /dev/null
+++ b/src/assets/images/reference-architecture/optimizing-roaming-experience-with-geolocated-ips/figure1.svg
@@ -0,0 +1,107 @@
+
diff --git a/src/assets/images/reference-architecture/optimizing-roaming-experience-with-geolocated-ips/figure2.svg b/src/assets/images/reference-architecture/optimizing-roaming-experience-with-geolocated-ips/figure2.svg
new file mode 100644
index 00000000000000..7a610120e48499
--- /dev/null
+++ b/src/assets/images/reference-architecture/optimizing-roaming-experience-with-geolocated-ips/figure2.svg
@@ -0,0 +1,146 @@
+
diff --git a/src/content/docs/reference-architecture/diagrams/network/optimizing-roaming-experience-with-geolocated-ips.mdx b/src/content/docs/reference-architecture/diagrams/network/optimizing-roaming-experience-with-geolocated-ips.mdx
new file mode 100644
index 00000000000000..df3b250895f8a0
--- /dev/null
+++ b/src/content/docs/reference-architecture/diagrams/network/optimizing-roaming-experience-with-geolocated-ips.mdx
@@ -0,0 +1,68 @@
+---
+title: Optimizing device roaming experience with geolocated IPs
+pcx_content_type: reference-architecture-diagram
+products:
+ - Magic WAN
+ - Gateway
+sidebar:
+ order: 1
+ label: Device roaming with geolocated IPs
+updated: 2024-12-13
+---
+
+## Introduction
+
+A private APN enables devices, like connected vehicles, connected containers, healthcare devices or drones, to be connected while roaming across different countries. The device connects with a SIM or eSIM card to a dedicated network and as the device moves to a new country, it automatically selects the appropriate private APN for the local provider.
+
+APN traffic, typically managed by a third party provider such as a telecommunications company, is routed through specific regional Internet breakouts to get access to the Internet. This architecture can create challenges in regards to the localization of that traffic. For example, a device roaming in France, might have traffic exit to the Internet from a UK based Internet breakout. Therefore web sites and other Internet services will treat the device as if it is in the UK, and deliver content in the wrong language or apply regional restrictions.
+
+In this document, we'll discuss how Cloudflare can be used to solve this problem and we will use the example of a service provider using private mobile networks [Access Point Names](https://en.wikipedia.org/wiki/Access_Point_Name) (APN) to connect devices roaming across multiple countries through regional Internet breakouts. This use case is relevant to global enterprises with regional offices, transportation fleets with connected vehicles, or any organization needing to maintain consistent, secure, and region-specific connectivity for roaming devices.
+
+![Figure 1: Showing how Internet breakouts can present an egress IP that doesn't match the country the device is in.](~/assets/images/reference-architecture/optimizing-roaming-experience-with-geolocated-ips/figure1.svg "Figure 1: Showing how Internet breakouts can present an egress IP that doesn't match the country the device is in.")
+
+# Correctly locate and secure devices by connecting them to the Cloudflare global network
+
+Cloudflare addresses these challenges by routing device traffic from the Internet breakout to our global network, where traffic is processed at a Cloudflare data center close to the Internet breakout. This allows for two benefits.
+
+1. Cloudflare can analyse the traffic, determine the original country of origin, and then ensure that traffic egresses onto the Internet from an IP address that is geolocated to the same country of origin.
+2. Cloudflare can filter traffic based on [secure web gateway](/cloudflare-one/policies/gateway/) policies, allowing you to protect devices from access risky Internet hosts. It also allows you to lock down access for devices to specific Internet hosts, such as only allow devices to make requests to APIs that support their function.
+
+The architecture diagram below provides a visual representation of this solution, showing how traffic from various countries — routed via different mobile network APN — is directed through Internet breakouts. Cloudflare optimizes and secures the Internet connection by leveraging [geolocated public IPs](/cloudflare-one/policies/gateway/egress-policies/dedicated-egress-ips/), ensuring that the traffic is secure and regionally localized to the device location.
+
+This diagram is intended for network engineers, IT architects, and decision-makers looking to improve service relevance and performance for end-users. Key use cases include multinational corporations aiming to provide faster, region-specific Internet access and services in users' native languages, ensuring a superior user experience across diverse geographical locations.
+
+![Figure 2: Using Cloudflare you can ensure the egress IP as seen by Internet sites matches the country the device is roaming in.](~/assets/images/reference-architecture/optimizing-roaming-experience-with-geolocated-ips/figure2.svg "Figure 2: Using Cloudflare you can ensure the egress IP as seen by Internet sites matches the country the device is roaming in.")
+
+1. **Data collection and regional routing**.
+
+ Traffic from roaming devices is securely collected through the service provider's private APN and routed to third-party regional Internet breakouts. Each country in the network is assigned a specific RFC1918 IP subnet, simplifying traffic segmentation and management.
+
+2. **Traffic sorting**.
+
+ The Internet breakout will categorize the traffic into separate buckets to identify its country of origin \- in this example each country's APN is given a dedicated private IP subnet.
+
+3. **Connectivity options**.
+
+ Cloudflare supports multiple connection methods to integrate with the regional breakout architecture:
+
+ - [**GRE tunnels**](/magic-wan/reference/tunnels/) for ease of use.
+ - [**IPsec tunnels**](/magic-wan/reference/tunnels/) for encrypted communication.
+ - [**Cloudflare Network Interconnect (CNI)**](/magic-wan/network-interconnect/) for direct, high-performance connections.
+
+4. **Localized Internet breakout using [Magic WAN](/magic-wan/) and [Gateway](/cloudflare-one/policies/gateway/)**.
+
+ With Magic WAN and using [dedicated egress](/cloudflare-one/policies/gateway/egress-policies/dedicated-egress-ips/) with our [secure web gateway](/cloudflare-one/policies/gateway/), Cloudflare enables Internet traffic to exit with source IPs registered in the desired country. This ensures end-users benefit from geolocalized content and services, such as access to region-specific platforms, tailored to their location.
+
+5. **Advanced security and filtering options**.
+
+ Cloudflare enhances the security of Internet breakouts with advanced features, including:
+
+ - [**DNS filtering**](/cloudflare-one/policies/gateway/initial-setup/dns/) to manage and block access to unwanted, high risk domains.
+ - [**Network firewalling**](/cloudflare-one/policies/gateway/network-policies/) for enforcing detailed security policies. For example, you can restrict vehicles to only send data over the internet to a designated set of cloud telemetry systems while blocking all other traffic.
+ - [**Full SSL inspection**](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) to protect against sophisticated threats and provide traffic visibility on encrypted traffic. It enables additional protections such as antivirus scanning, malware prevention, and file sandboxing.
+
+# Related Resources
+
+- [Gateway](/cloudflare-one/policies/gateway/)
+- [Magic WAN](/magic-wan/)
+- [Cloudflare servers don't own IPs anymore](https://blog.cloudflare.com/cloudflare-servers-dont-own-ips-anymore/)