diff --git a/src/content/docs/magic-transit/reference/egress.mdx b/src/content/docs/magic-transit/reference/egress.mdx index 377f0a98a37fc6..48eb38223e6543 100644 --- a/src/content/docs/magic-transit/reference/egress.mdx +++ b/src/content/docs/magic-transit/reference/egress.mdx @@ -13,4 +13,4 @@ If you have implemented Magic Transit with egress traffic, below is a list of te - You may need to configure multiple GRE/IPsec tunnels as a way to load-share traffic sent to the Internet via Cloudflare. You can achieve this by applying two different PBR. Thus, traffic sourced from one IP/subnet is routed via one tunnel, and traffic from another IP/subnet is sent out via a different tunnel. - Your Magic Firewall rules will apply in both directions. Ensure that your Magic Firewall rules are set up for your intended traffic flows, both in and out. - If using Magic Transit egress then we recommend you set your GRE or IPSEC tunnel health check configuration to [bidirectional](/magic-transit/how-to/configure-tunnels/#add-tunnels), so that Cloudflare health checks are in-sync with the [data plane](https://en.wikipedia.org/wiki/Forwarding_plane) traffic flow. -- After setting up your traffic to egress to your GRE/IPsec tunnel, it is sent encapsulated toward the Cloudflare anycast endpoint. Your ISP will route the encapsulated traffic to a nearby available Cloudflare point of presence where your traffic will exit to the Internet from our connectivity options at that location. +- Once your traffic is configured to egress through the GRE/IPsec tunnel, it is encapsulated and sent to a Cloudflare anycast endpoint. Your ISP then routes the encapsulated traffic to the nearest available Cloudflare point of presence (PoP), where it exits to the Internet via Cloudflare's connectivity options at that location.