
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 15 Apr 2026 19:31:49 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Simplifying how enterprises connect to Cloudflare with Express Cloudflare Network Interconnect]]></title>
            <link>https://blog.cloudflare.com/announcing-express-cni/</link>
            <pubDate>Wed, 06 Mar 2024 14:00:18 GMT</pubDate>
            <description><![CDATA[ Express Cloudflare Network Interconnect makes it fast and easy to connect your network to Cloudflare. Customers can now order Express CNIs directly from the Cloudflare dashboard, and they will be ready to use in 3 minutes. Express CNI also simplifies setting up Magic Transit and Magic WAN ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4YLq6dIHmtmzYSFO271qpe/a4a88239acbe6c456307339e1d707705/image5-6.png" />
            
            </figure><p>We’re excited to announce the largest update to Cloudflare Network Interconnect (CNI) since its <a href="/cloudflare-network-interconnect">launch</a>, and because we’re making CNIs faster and easier to deploy, we’re calling this Express CNI. At the most basic level, CNI is a cable between a customer’s network router and Cloudflare, which facilitates the direct exchange of information between networks instead of via the Internet. CNIs are fast, secure, and reliable, and have connected customer networks directly to Cloudflare for years. We’ve been listening to how we can improve the CNI experience, and today we are sharing more information about how we’re making it faster and easier to order CNIs, and connect them to Magic Transit and Magic WAN.</p>
    <div>
      <h3>Interconnection services and what to consider</h3>
      <a href="#interconnection-services-and-what-to-consider">
        
      </a>
    </div>
    <p>Interconnection services provide a private connection that allows you to connect your networks to other networks like the Internet, cloud service providers, and other businesses directly. This private connection benefits from improved connectivity versus going over the Internet and reduced exposure to common threats like <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service (DDoS)</a> attacks.</p><p>Cost is an important consideration when evaluating any vendor for interconnection services. The cost of an interconnection is typically comprised of a fixed port fee, based on the capacity (speed) of the port, and the variable amount of data transferred. Some cloud providers also add complex inter-region bandwidth charges.</p><p>Other important considerations include the following:</p><ul><li><p>How much capacity is needed?</p></li><li><p>Are there variable or fixed costs associated with the port?</p></li><li><p>Is the provider located in the same colocation facility as my business?</p></li><li><p>Are they able to scale with my network infrastructure?</p></li><li><p>Are you able to predict your costs without any unwanted surprises?</p></li><li><p>What additional products and services does the vendor offer?</p></li></ul><p>Cloudflare does not charge a port fee for Cloudflare Network Interconnect, nor do we charge for inter-region bandwidth. Using CNI with products like Magic Transit and Magic WAN may even reduce bandwidth spending with Internet service providers. For example, you can deliver Magic Transit-cleaned traffic to your data center with a CNI instead of via your Internet connection, reducing the amount of bandwidth that you would pay an Internet service provider for.</p><p>To underscore the value of CNI, <a href="https://aws.amazon.com/directconnect/pricing/">one vendor</a> charges nearly \$20,000 a year for a 10 Gigabit per second (Gbps) direct connect port. The same 10 Gbps CNI on Cloudflare for one year is $0. Their cost also does not include any costs related to the amount of data transferred between different regions or geographies, or <a href="/aws-egregious-egress">outside of their cloud</a>. We have never charged for CNIs, and are committed to making it even easier for customers to connect to Cloudflare, and destinations beyond on the open Internet.</p>
    <div>
      <h3>3 Minute Provisioning</h3>
      <a href="#3-minute-provisioning">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7h6VD2SSNO1J1jud76BvNf/fab2c8e59a383b028febc970dd53bc3b/image6-1.png" />
            
            </figure><p>Our first big announcement is a new, faster approach to CNI provisioning and deployment. Starting today, all Magic Transit and Magic WAN customers can order CNIs directly from their Cloudflare account. The entire process is about 3 clicks and takes less than 3 minutes (roughly the time to make coffee). We’re going to show you how simple it is to order a CNI.</p><p>The first step is to find out whether Cloudflare is in the same data center or colocation facility as your routers, servers, and network hardware. Let’s navigate to the new “<b>Interconnects</b>” section of the Cloudflare dashboard, and order a new Direct CNI.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4z8AbF030XyVSgzj4RAt3L/52cb6aef06137caa30847bb9de90ef46/image4-20.png" />
            
            </figure><p>Search for the city of your data center, and quickly find out if Cloudflare is in the same facility. I’m going to stand up a CNI to connect my example network located in Ashburn, VA.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Zqx0cB5urfxIgkil06Qm6/b2b6f866ef75f370db7d3f816625596b/image6-3.png" />
            
            </figure><p>It looks like Cloudflare is in the same facility as my network, so I’m going to select the location where I’d like to connect.</p><p>As of right now, my data center is only exchanging a few hundred Megabits per second of traffic on Magic Transit, so I’m going to select a 1 Gigabit per second interface, which is the smallest port speed available. I can also order a 10 Gbps link if I have more than 1 Gbps of traffic in a single location. Cloudflare also supports 100 Gbps CNIs, but if you have this much traffic to exchange with us, we recommend that you coordinate with your account team.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7y8r8T0LfLzGertimjKu4j/b15413f51753ba7ba84bd5c722927a7e/image5-12.png" />
            
            </figure><p>After selecting your preferred port speed, you can name your CNI, which will be referenceable later when you direct your Magic Transit or Magic WAN traffic to the interconnect. We are given the opportunity to verify that everything looks correct before confirming our CNI order.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4zi43jRdQmaGYFwbHgUC5j/8fd658d4368a8d470dc9c1761b24570a/image2-16.png" />
            
            </figure><p>Once we click the “Confirm Order” button, Cloudflare will provision an interface on our router for your CNI, and also assign IP addresses for you to configure on your router interface. Cloudflare will also issue you a Letter of Authorization (LOA) for you to order a cross connect with the local facility. Cloudflare will provision a port on our router for your CNI within 3 minutes of your order, and you will be able to ping across the CNI as soon as the interface line status comes up.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4CfV6hjtbtFSYARhuaXFBC/db9f8359d9a02fbcbefb581c4e3f5a37/image3-18.png" />
            
            </figure><p>After downloading the Letter of Authorization (LOA) to order a cross connect, we’ll navigate back to our Interconnects area. Here we can see the point to point IP addressing, and the CNI name that is used in our Magic Transit or Magic WAN configuration. We can also redownload the LOA if needed.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1qmjbvR2g79H5US8TOKB2W/89d354f557500ffb78e377581a77f7b1/image1-21.png" />
            
            </figure>
    <div>
      <h3>Simplified Magic Transit and Magic WAN onboarding</h3>
      <a href="#simplified-magic-transit-and-magic-wan-onboarding">
        
      </a>
    </div>
    <p>Our second major announcement is that Express CNI dramatically simplifies how <a href="https://www.cloudflare.com/network-services/products/magic-transit/">Magic Transit</a> and <a href="https://www.cloudflare.com/network-services/products/magic-wan/">Magic WAN</a> customers connect to Cloudflare. Getting packets into Magic Transit or Magic WAN in the past with a CNI required customers to configure a <a href="https://www.cloudflare.com/learning/network-layer/what-is-gre-tunneling/">GRE</a> (Generic Routing Encapsulation) tunnel on their router. These configurations are complex, and not all routers and switches support these changes. Since both Magic Transit and Magic WAN protect networks, and operate at the network layer on packets, customers rightly asked us, “If I connect directly to Cloudflare with CNI, why do I also need a GRE tunnel for Magic Transit and Magic WAN?”</p><p>Starting today, GRE tunnels are no longer required with Express CNI. This means that Cloudflare supports standard 1500-byte packets on the CNI, and there’s no need for complex GRE or MSS adjustment configurations to get traffic into Magic Transit or Magic WAN. This significantly reduces the amount of configuration required on a router for Magic Transit and Magic WAN customers who can connect over Express CNI. If you’re not familiar with Magic Transit, the key takeaway is that we’ve reduced the complexity of changes you must make on your router to protect your network with Cloudflare.</p>
    <div>
      <h3>What’s next for CNI?</h3>
      <a href="#whats-next-for-cni">
        
      </a>
    </div>
    <p>We’re excited about how Express CNI simplifies connecting to Cloudflare’s network. Some customers connect to Cloudflare through our Interconnection Platform Partners, like Equinix and Megaport, and we plan to bring the Express CNI features to our partners too.</p><p>We have upgraded a number of our data centers to support Express CNI, and plan to upgrade many more over the next few months. We are rapidly expanding the number of global locations that support Express CNI as we install new network hardware. If you’re interested in connecting to Cloudflare with Express CNI, but are unable to find your data center, please let your account team know.</p><p>If you’re on an existing classic CNI today, and you don’t need Express CNI features, there is no obligation to migrate to Express CNI. Magic Transit and Magic WAN customers have been asking for BGP support to control how Cloudflare routes traffic back to their networks, and we expect to extend BGP support to Express CNI first, so keep an eye out for more Express CNI announcements later this year.</p>
    <div>
      <h3>Get started with Express CNI today</h3>
      <a href="#get-started-with-express-cni-today">
        
      </a>
    </div>
    <p>As we’ve demonstrated above, Express CNI makes it fast and easy to connect your network to Cloudflare. If you’re a Magic Transit or Magic WAN customer, the new “Interconnects” area is now available on your Cloudflare dashboard. To deploy your first CNI, you can follow along with the screenshots above, or refer to our updated <a href="https://developers.cloudflare.com/network-interconnect/">interconnects documentation</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Network Interconnect]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <category><![CDATA[Application Services]]></category>
            <guid isPermaLink="false">1oHct79PFqX8gOk85m6g29</guid>
            <dc:creator>Ben Ritter</dc:creator>
            <dc:creator>Mike Ripley</dc:creator>
            <dc:creator>Ammar Zuberi</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare's global network grows to 300 cities and ever closer to end users with connections to 12,000 networks]]></title>
            <link>https://blog.cloudflare.com/cloudflare-connected-in-over-300-cities/</link>
            <pubDate>Mon, 19 Jun 2023 13:00:16 GMT</pubDate>
            <description><![CDATA[ We are pleased to announce that Cloudflare is now connected to over 12,000 Internet networks in over 300 cities around the world ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4PkXmBAp3jn8r0gnWqIEAx/15007c52bdd3178d13352edb92914e97/12-000-networks-1.png" />
            
            </figure><p>We make no secret about how passionate we are about building a world-class global <a href="https://www.cloudflare.com/network/">network</a> to deliver the best possible experience for our customers. This means an unwavering and continual dedication to always improving the breadth (number of cities) and depth (number of interconnects) of our network.</p><p><b>This is why we are pleased to announce that Cloudflare is now connected to over 12,000 Internet networks in over 300 cities around the world!</b></p><p>The Cloudflare global network runs every service in every data center so your users have a consistent experience everywhere—whether you are in <a href="/reykjavik-cloudflares-northernmost-location/">Reykjavík</a>, <a href="/cloudflare-deployment-in-guam/">Guam</a> or in the vicinity of any of the 300 cities where Cloudflare lives. This means all customer traffic is processed at the data center closest to its source, with no backhauling or performance tradeoffs.</p><p>Having Cloudflare’s network present in hundreds of cities globally is critical to providing new and more convenient ways to serve our customers and their customers. However, the breadth of our infrastructure network provides other critical purposes. Let’s take a closer look at the reasons we build and the real world impact we’ve seen to customer experience:</p>
    <div>
      <h3>Reduce latency</h3>
      <a href="#reduce-latency">
        
      </a>
    </div>
    <p>Our network allows us to sit approximately 50 ms from 95% of the Internet-connected population globally. Nevertheless, we are constantly reviewing network performance metrics and working with local regional Internet service providers to ensure we focus on growing underserved markets where we can add value and improve performance. So far, in 2023 we’ve already added 12 new cities to bring our network to over 300 cities spanning 122 unique countries!</p>
<table>
<thead>
  <tr>
    <th><span>City</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Albuquerque, New Mexico, US</span></td>
  </tr>
  <tr>
    <td><span>Austin, Texas, US</span></td>
  </tr>
  <tr>
    <td><span>Bangor, Maine, US</span></td>
  </tr>
  <tr>
    <td><span>Campos dos Goytacazes, Brazil</span></td>
  </tr>
  <tr>
    <td><span>Fukuoka, Japan</span></td>
  </tr>
  <tr>
    <td><span>Kingston, Jamaica</span></td>
  </tr>
  <tr>
    <td><span>Kinshasa, Democratic Republic of the Congo</span></td>
  </tr>
  <tr>
    <td><span>Lyon, France</span></td>
  </tr>
  <tr>
    <td><span>Oran, Algeria</span></td>
  </tr>
  <tr>
    <td><span>São José dos Campos, Brazil</span></td>
  </tr>
  <tr>
    <td><span>Stuttgart, Germany</span></td>
  </tr>
  <tr>
    <td><span>Vitoria, Brazil</span></td>
  </tr>
</tbody>
</table><p>In May, we activated a new data center in Campos dos Goytacazes, Brazil, where we interconnected with a regional network provider, serving 100+ local ISPs. While it's not too far from Rio de Janeiro (270km) it still cut our 50th and 75th percentile latency measured from the TCP handshake between Cloudflare's servers and the user's device in half and provided a noticeable performance improvement!</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1CETPT4paJnZPdfob5xoWw/868652ca9f3643e7d1affa1f908b758d/image1-8.png" />
            
            </figure>
    <div>
      <h3>Improve interconnections</h3>
      <a href="#improve-interconnections">
        
      </a>
    </div>
    <p>A larger number of local interconnections facilitates direct connections between network providers, <a href="https://www.cloudflare.com/learning/cdn/what-is-a-cdn/">content delivery networks</a>, and regional Internet Service Providers. These interconnections enable faster and more efficient data exchange, content delivery, and collaboration between networks.</p><p>Currently there are approximately 74,000<sup>1</sup> AS numbers routed globally. An <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/">Autonomous System</a> (AS) number is a unique number allocated per ISP, enterprise, cloud, or similar network that maintains Internet routing capabilities using BGP. Of these approximate 74,000 ASNs, 43,000<sup>2</sup> of them are stub ASNs, or only connected to one other network. These are often enterprise, or internal use ASNs, that only connect to their own ISP or internal network, but not with other networks.</p><p>It’s mind blowing to consider that Cloudflare is directly connected to 12,372 unique Internet networks, or approximately 1/3rd of the possible networks to connect globally! This direct connectivity builds resilience and enables performance, making sure there are multiple places to connect between networks, ISPs, and enterprises, but also making sure those connections are as fast as possible.</p><p>A previous example of this was shown as we started connecting more locally. As seen in this <a href="/30-more-traffic-in-less-than-a-blink-of-an-ey/">blog post</a> the local connections even increased how much our network was being used: better performance drives further usage!</p><p>At Cloudflare we ensure that infrastructure expansion strategically aligns to building in markets where we can interconnect deeper, because increasing our network breadth is only as valuable as the number of local interconnections that it enables. For example, we recently connected to a local ISP (representing a new ASN connection) in Pakistan, where the 50th percentile improved from ~90ms to 5ms!</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6LklYvBqVmhxoxrOmREPqr/047aa3b950c377ea6894dde7b9fa4cc3/image2-7.png" />
            
            </figure>
    <div>
      <h3>Build resilience</h3>
      <a href="#build-resilience">
        
      </a>
    </div>
    <p>Network expansion may be driven by reducing latency and improving interconnections, but it’s equally valuable to our existing network infrastructure. Increasing our geographic reach strengthens our redundancy, localizes failover and helps further distribute compute workload resulting in more effective capacity management. This improved resilience reduces the risk of service disruptions and ensures network availability even in the event of hardware failures, natural disasters, or other unforeseen circumstances. It enhances reliability and prevents single points of failure in the network architecture.</p><p>Ultimately, our commitment to strategically expanding the breadth and depth of our network delivers improved latency, stronger interconnections and a more resilient architecture - all critical components of a better Internet! If you’re a network operator, and are interested in how, together, we can deliver an improved user experience, we’re here to help! Please check out our <a href="https://www.cloudflare.com/partners/peering-portal/">Edge Partner Program</a> and let’s get connected.</p><p>........</p><p><sup>1</sup><a href="https://www.cidr-report.org/as2.0/">CIDR Report</a></p><p><sup>2</sup><a href="https://bgp.potaroo.net/cgi-bin/plota?file=%2fvar%2fdata%2fbgp%2frva%2dmrt%2f6447%2fbgp%2das%2done%2etxt&amp;descr=Origin%20ASs%20announced%20via%20a%20single%20AS%20path&amp;ylabel=Origin%20ASs%20announced%20via%20a%20single%20AS%20path&amp;with=step">Origin ASs announced via a single AS path</a></p> ]]></content:encoded>
            <category><![CDATA[Speed Week]]></category>
            <category><![CDATA[Network]]></category>
            <category><![CDATA[Network Interconnect]]></category>
            <guid isPermaLink="false">1NlDmm0M6PYgsQlYzkeBLz</guid>
            <dc:creator>Damian Matacz</dc:creator>
            <dc:creator>Marcelo Affonso</dc:creator>
            <dc:creator>Tom Paseka</dc:creator>
            <dc:creator>Joanne Liew</dc:creator>
        </item>
        <item>
            <title><![CDATA[Using Cloudflare Access with CNI]]></title>
            <link>https://blog.cloudflare.com/access-aegis-cni/</link>
            <pubDate>Mon, 13 Mar 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ We are thrilled to introduce an innovative new approach to secure hosted applications via Cloudflare Access without the need for any installed software or custom code on your application server. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We are thrilled to introduce an innovative new approach to secure hosted applications via <a href="https://www.cloudflare.com/products/zero-trust/access/">Cloudflare Access</a> without the need for any installed software or custom code on your application server. But before we dive into how this is possible, let's review why Access previously required installed software or custom code on your application server.</p>
    <div>
      <h2>Protecting an application with Access</h2>
      <a href="#protecting-an-application-with-access">
        
      </a>
    </div>
    <p>Traditionally, companies used a Virtual Private Network (VPN) to access a hosted application, where all they had to do was configure an IP allowlist rule for the VPN. However, this is a major security threat because anyone on the VPN can access the application, including unauthorized users or attackers.</p><p>We built Cloudflare Access to <a href="https://www.cloudflare.com/products/zero-trust/vpn-replacement/">replace VPNs</a> and provide the option to enforce <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust policies</a> in hosted applications. Access allows you to verify a user's identity before they even reach the application. By acting as a proxy in front of your application's hostname (e.g. app.example.com), Cloudflare enables strong verification techniques such as identity, <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/">device posture</a>, <a href="https://developers.cloudflare.com/cloudflare-one/policies/access/mfa-requirements/#:~:text=When%20users%20authenticate%20with%20their%20identity%20provider%2C%20the,%28MFA%29%20method%20presented%20by%20the%20user%20to%20login.">hardkey MFA</a>, and more. All without having to add SSO or Authentication logic directly into your applications.</p><p>However, since Access enforces at a hostname level, there is still a potential for bypass - the origin server IP address. This means that if someone knows your origin server IP address, they can bypass Access and directly interact with the target application. Seems scary, right? Luckily, there are <a href="https://www.cloudflare.com/application-services/solutions/">proven solutions</a> to prevent an origin IP attack.</p><p>Traditionally, organizations use two approaches to prevent an Origin IP bypass: <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/">Cloudflare Tunnel</a> and <a href="https://developers.cloudflare.com/cloudflare-one/identity/authorization-cookie/validating-json/">JSON Web Token (JWT) Validation</a>.</p>
    <div>
      <h3>Cloudflare Tunnel</h3>
      <a href="#cloudflare-tunnel">
        
      </a>
    </div>
    <p>Cloudflare Tunnel creates a secure, outbound-only tunnel from your origin server to Cloudflare, with no origin IP address. This means that the only inbound traffic to your origin is coming from Cloudflare. However, it does require a daemon to be installed in your origin server's network.</p>
    <div>
      <h3>JWT Validation</h3>
      <a href="#jwt-validation">
        
      </a>
    </div>
    <p>JWT validation, on the other hand, prevents requests coming from unauthenticated sources by issuing a JWT when a user successfully authenticates. Application software can then be modified to check any inbound HTTP request for the Access JWT. The Access JWT uses signature-based verification to ensure that it cannot be easily spoofed by malicious users. However, modifying the logic of legacy hosted applications can be cumbersome or even impossible, making JWT validation a limited option for some.</p>
    <div>
      <h2>Protecting an application without installed or custom software</h2>
      <a href="#protecting-an-application-without-installed-or-custom-software">
        
      </a>
    </div>
    <p>And now, the exciting news - our new approach to protect Access applications from bypass without any installed software or code modifications! We achieve this using <a href="/cloudflare-network-interconnect/">Cloud Network Interconnect (CNI)</a> and a new Cloudflare product called Aegis.</p><p>In this blog, we'll explore the benefits of using Access, CNI, and Aegis together to protect and optimize your applications. This offers a better way to securely connect your on-premise or cloud infrastructure to the Cloudflare network, as well as manage access to your applications and resources. All without having to install additional software.</p>
    <div>
      <h3>Cloudflare Access</h3>
      <a href="#cloudflare-access">
        
      </a>
    </div>
    <p>Cloudflare Access is a cloud-based <a href="https://www.cloudflare.com/learning/access-management/what-is-identity-and-access-management/">identity and access management</a> solution that allows users to secure access to their applications and resources. With Access, users can easily set up single sign-on (SSO) and multi-factor authentication (MFA) to protect against unauthorized access.</p><p>Many companies use Access today to protect their applications. However, since Access is based on an application’s hostname, there is still a possibility that security controls are bypassed by going straight to an application’s IP address. The solution to this is using Cloudflare Tunnels and JWT validation, to ensure that any request to the application server is legitimate and coming directly from Cloudflare.</p><p>Both Cloudflare Tunnels and JWT validation require additional software (e.g. cloudflared) or code customization in the application itself. This takes time and requires ongoing monitoring and maintenance.</p>
    <div>
      <h3>Cloudflare Network Interconnect</h3>
      <a href="#cloudflare-network-interconnect">
        
      </a>
    </div>
    <p>Cloudflare Network Interconnect (CNI) enables users to securely connect their on-premises or cloud infrastructure to the Cloudflare network. Until recently, direct network connections were a cumbersome and manual process. Cloud CNI allows users to manage their own direct connections of their infrastructure and Cloudflare.</p><p>Cloudflare peers with over <a href="https://www.peeringdb.com/net/4224">11,500 networks</a> directly and is located in over 285 cities which means there are many opportunities for direct connections with a company’s own private network. This can massively reduce latency of requests between an application server and Cloudflare, leading to a better application user experience.</p>
    <div>
      <h3>Aegis</h3>
      <a href="#aegis">
        
      </a>
    </div>
    <p>Cloudflare Aegis allows a customer to define a reliable IP address for traffic from Cloudflare to their own infrastructure. With Aegis it is assured that the assigned IP address is coming only from Cloudflare and for traffic associated with a specific account. This means that a company can configure their origin applications to verify all inbound requests are coming from the known IP. You can read more about <a href="/cloudflare-aegis">Aegis here</a>.</p>
    <div>
      <h2>Access + CNI and Aegis</h2>
      <a href="#access-cni-and-aegis">
        
      </a>
    </div>
    <p>With CNI and Aegis, the only configuration required is an allowlist rule based on the inbound IP address. Cloudflare takes care of the rest and ensures that all requests are verified by Access (and other security products like DDoS and <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewall</a>). All without requiring software or application code modification!</p><p>This is a different approach from traditional IP allowlists for VPNs because you can still enforce Zero Trust policies on the inbound request. Plus, Cloudflare has logic in place to ensure that the Aegis IP address can only be used by Cloudflare services.</p><p>Hosting your own infrastructure and applications can be a powerful way to have complete control and customization over your online presence. However, one of the challenges of hosting your own infrastructure is providing secure access to your applications and resources.</p><p>Traditionally, users have relied on virtual private networks (VPNs) or private circuits to provide secure access to their applications. While these solutions can be effective, they can also be complex to set up and maintain, and may not offer the same level of security and performance as newer solutions.</p>
    <div>
      <h2>How it works</h2>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>An application can be secured behind Access if its hostname is configured in Cloudflare. That hostname can be pointed to either a Cloudflare Tunnel, Load Balancer or direct IP Address. An application can then be configured to enforce specific security policies like identity provider group, hard key MFA, device posture and more.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/8emNtTNyRNtdYBM69HBh9/fb4c3ec2acfc7d586acf4552d5be546e/image1-19.png" />
            
            </figure><p>However, the network path that the application takes can be different and Cloudflare Network Interconnect allows for a completely private path from Cloudflare to your application. For example, Cloudflare Tunnel implicitly assumes that the network path between Cloudflare and your application is using the public Internet. Cloudflare Tunnel encrypts your traffic over the public Internet and ensures that your connection to Cloudflare is secure. But the public Internet is still a concern for a lot of people, who don’t want to harden their service to the public Internet at all.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/22LDH8UFB8wdr2QrefGTtv/9a57d848ddb57eb42f75c4302c7de3e1/pasted-image-0-6.png" />
            
            </figure><p>What if you implicitly knew that your connection was secure because nobody else was using it? That’s what Cloudflare Network Interconnect allows you to guarantee: private, performant connectivity back to Cloudflare.</p><p>By configuring Access and CNI together, you get protected application access over a private link. Cloudflare Aegis provides a dedicated IP that allows you to apply network-level firewall policies to ensure that your solution is completely airgapped: no one can access your application but Cloudflare-protected Access calls that come from their own dedicated IP address.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ckxEDcHts2Ui6RsEBDyUH/500ea5bac401cb9f60afed1622e7958b/pasted-image-0--4-.png" />
            
            </figure><p>Even if somebody could access your application over the CNI, they would get blocked by your firewall because they didn’t go through Access. This provides security at Layer 7 and Layer 3: at the application and the network.</p>
    <div>
      <h2>Getting started</h2>
      <a href="#getting-started">
        
      </a>
    </div>
    <p>Access, Cloud CNI and Aegis are generally available to all Enterprise customers. If you would like to learn more about protecting and accelerating your private applications, please reach out to your account team for more information and how to enable your account.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Network Interconnect]]></category>
            <guid isPermaLink="false">6oBOTQj6lUvo1nUyYfxp48</guid>
            <dc:creator>David Tuber</dc:creator>
            <dc:creator>Kenny Johnson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare's network expansion in Indonesia]]></title>
            <link>https://blog.cloudflare.com/indonesia/</link>
            <pubDate>Fri, 10 Mar 2023 20:49:00 GMT</pubDate>
            <description><![CDATA[ Building a world class network isn’t always easy, otherwise everyone would do it. I wanted to share with you some of the challenges that we’ve faced and how we’ve gone about overcoming them to become a leader for network performance in Indonesia. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>As home to over 200 million Internet users and the fourth-largest population in the world, Indonesians depend on fast and reliable Internet, but this has always been a challenging part of the world for Internet infrastructure. This has real world implications on performance and reliability (IP transit is on average 6x more expensive than our major South East Asian interconnection markets). That said, first we wanted to share what makes things challenging in Indonesia; geography, infrastructure, and market dynamics.</p><p><b>Geography:</b> The Internet backbone for many countries is almost entirely delivered by terrestrial fiber optic cables, where connectivity is more affordable and easier to build when the land mass is contiguous and there is a concentrated population distribution. However, Indonesia is a collection of over 18,000 islands, spanning three time zones, and approximately 3,200 miles (5,100 km) east to west. By comparison, the United States is 2,800 miles (4,500 km) east to west. While parts of Indonesia are geographically close to Singapore (the regional Internet hub with over 60% of the region's data centers) given how large Indonesia is, much of it is far away.</p><p><b>Infrastructure:</b> Indonesia is a large country and to connect it to the rest of the Internet it currently relies on <a href="https://www.submarinecablemap.com/country/indonesia">submarine</a> fiber optic cables. There are a total of 22 separate submarine cables connecting Indonesia to Singapore, Malaysia, Australia and onward. Many of the cable systems cross the Strait of Malacca, a narrow stretch of water, between the Malay Peninsula (Peninsular Malaysia) and the Indonesian island of Sumatra to the southwest, connecting the Indian and Pacific Oceans. This makes reliability challenging as a result of human activities, such as ships dropping their anchors, fishing trawlers, and dredging as it is one of the world's top five busiest shipping lanes. Additionally, Indonesia is geographically located in a very active seismic zone and is very earthquake prone.</p><p>There are a number of new submarine cable systems that have come online and four significant builds planned (<a href="https://www.submarinecablemap.com/submarine-cable/apricot">Apricot</a>, <a href="https://www.submarinecablemap.com/submarine-cable/asia-connect-cable-1-acc-1">ACC-1</a>, <a href="http://echo2023">Echo</a> and <a href="https://www.submarinecablemap.com/submarine-cable/hawaiki-nui">Nui</a>) that will improve both available capacity and cost economics in the market. Right now the cost is still significantly higher than comparable distances. For example Jakarta to Singapore is approximately 60 times more expensive than a service the same distance would be in the continental US or Europe for a 100Gbps wavelength service. Staying in Asia, a similar distance from Hong Kong to Taiwan costs around 1/6th that of Jakarta to Singapore.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5C4hPVq3bypCgoyKbWHOE7/b458eb1b9387f0a7697bd34001d0e916/image5-1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3EzXf2nvPcBK8xqu2mVxjK/9dcf8ea977498345c11c575d1318ff61/image1-9.png" />
            
            </figure><p><i>Cyber 1 and Cyber 3 (NTT NexCenter) Data Center Buildings in Jakarta, 2019 (Photo Credit: Tom Paseka).</i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ibw2OjEHoRHEV7NvnqVFm/b93c6e886e0ee020cb4896ff6012a105/image6-3.png" />
            
            </figure><p><i>Picture of Cyber 1 Lobby Directory</i></p><p>While areas like Batam are becoming increasingly popular for data center builds due to its proximity to Singapore, Jakarta is still the most developed and mature market. It has the largest and best interconnected data centers in the country, including the two pictured.</p><p>Cloudflare is deployed in the facility on the right (<a href="https://www.peeringdb.com/fac/5865">NTT NexCenter</a>), however most ISPs are inside the building on the left (Cyber 1). The two buildings are approximately 30-50 meters apart, yet it's surprisingly difficult to be able to connect between them. One of the reasons why is market fragmentation and how many options are available. In the adjacent picture of the Cyber 1 building lobby directory many of the listings are unique data centers each with different policies and access conditions.</p><p>In the past, we’ve talked about the <a href="/the-relative-cost-of-bandwidth-around-the-world/">Cost of Bandwidth</a> around the world (and updated <a href="/bandwidth-costs-around-the-world/">here</a>), but we’ve never talked about Indonesia specifically. Using the same methodology as we’ve used in the past, Indonesia's cost is 43x times more expensive than North America or Europe, or even multiples more expensive than other countries in Asia.</p><p><b>Market dynamics:</b> While Indonesia has good and functioning <a href="https://www.peeringdb.com/advanced_search?country__in=ID&amp;reftag=ix">Internet Exchanges</a>, there are a few ISPs who dominate the market. The three largest ISPs in the country (Telkom Indonesia, Indosat Ooredoo Hutchison and XL Axiata) collectively control 80% of the market, while Telkom Indonesia alone has a market share of around 60% by revenue.</p><p>This results in Telkom Indonesia having a heavily dominant market share position to leverage resulting in refusal to <a href="/think-global-peer-local-peer-with-cloudflare-at-100-internet-exchange-points/">peer</a>, or exchange Internet traffic in Indonesia without expensive payments, or instead, preferring to connect to other networks outside of Indonesia, introducing latency and diminished performance.</p><p>Despite all of these challenges, our network has come a long way since our initial deployment to Jakarta in 2019.</p><p>We’ve established:</p><ul><li><p>A carrier neutral local point of presence at NTT Indonesia Nexcenter Data Center, one of the major interconnection hubs in Jakarta</p></li><li><p>An edge partnership point of presence in Yogyakarta with CitranetIX</p></li><li><p>Direct interconnections in country with two of the top three networks.</p></li><li><p>Peering across three of the larger local internet exchanges, Indonesia Internet Exchange, Jakarta Internet Exchange and Biznet Internet Exchange</p></li><li><p>Dedicated 100G wavelength transport back to Singapore</p></li></ul><p>All of this results in a more performant and reliable network for our local customers.</p><p>We wanted to see how our network is performing since deployment. We <a href="/benchmarking-edge-network-performance/">mentioned</a> during <i>Speed Week</i> in 2021 how we benchmark against different networks, and sharing some of those benchmarks here.</p><p>At the end of December 2021, Cloudflare was only faster in a few networks, as compared to other providers in Indonesia.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1UsRMtbolIkSubuPwmCq8x/faf95e48cec6eacaf6f61be7ba433560/pasted-image-0--7--1.png" />
            
            </figure><p>Fast forward twelve months to December 2022, Cloudflare is significantly faster in even more networks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/158Ot8bNSMcfMEJWBobgJI/ace6c44a2307ee004f69d083b5c5d94c/pasted-image-0-3.png" />
            
            </figure><p>The TCP protocol is a connection-oriented protocol, which means that a connection is established and maintained until the application programs at each end have finished exchanging messages. The Connect Time summarizes how fast a session can be set up between a client and a server over a network. TTLB (or time to last byte) is the time taken to send the entire response to the web browser. It’s a good measure of how long a complete download takes. Check out our recent blog on <a href="/benchmarking-edge-network-performance/">Benchmarking Edge Network Performance</a> for more information on how we measure the performance of our network and benchmark ourselves against industry players.</p><p>On closer inspection against the three major ISPs specifically, we’re the top provider for two out of the three networks. Cloudflare’s performance has improved year-on-year (16% reduction) and continues to lead (comparative to the other networks) meaning faster and more responsive services for our customers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6VBeeXEj5tWRIeHbvJCyQE/824796333c626a826cee7fed1793a008/pasted-image-0--1-.png" />
            
            </figure><p>Helping build a better Internet for Indonesia doesn’t stop here and there is always more work to be done! We want to be the number one network everywhere and won’t rest until we are. We are continuing to connect to more networks locally, invest in direct submarine cable capacity, as well as further deployments into new data center buildings, Internet Exchanges and new cities too!</p><p>Are you operating a network and not yet peering with Cloudflare? Log-in to our <a href="https://peering.cloudflare.com/">Peering Portal</a> or find out more information <a href="https://www.cloudflare.com/partners/peering-portal/">here</a> for ways to set up peering, or request we deploy nodes into your network directly.</p> ]]></content:encoded>
            <category><![CDATA[Network Interconnect]]></category>
            <category><![CDATA[Indonesian]]></category>
            <category><![CDATA[APJC]]></category>
            <guid isPermaLink="false">77dXiV9PhpPshl0lKfrIsd</guid>
            <dc:creator>Damian Matacz</dc:creator>
            <dc:creator>Joanne Liew</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloud CNI privately connects your clouds to Cloudflare]]></title>
            <link>https://blog.cloudflare.com/cloud-cni/</link>
            <pubDate>Fri, 13 Jan 2023 14:02:00 GMT</pubDate>
            <description><![CDATA[ Customers using Google Cloud Platform, Azure, Oracle Cloud, IBM Cloud, and Amazon Web Services can now open direct connections from their private cloud instances into Cloudflare ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3QdKiRzTrBGSbPvJJaZpiA/b94d9bcbaaad4b0bb2d1c45b4a356463/image3-23.png" />
            
            </figure><p>For CIOs, networking is a hard process that is often made harder. Corporate networks have so many things that need to be connected and each one of them needs to be connected differently: user devices need managed connectivity through a <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a>, offices need to be connected using the public Internet or dedicated connectivity, data centers need to be managed with their own private or public connectivity, and then you have to <a href="https://www.cloudflare.com/cio/">manage cloud connectivity</a> on top of it all! It can be exasperating to manage connectivity for all these different scenarios and all their privacy and compliance requirements when all you want to do is enable your users to access their resources privately, securely, and in a non-intrusive manner.</p><p>Cloudflare helps simplify your connectivity story with Cloudflare One. Today, we’re excited to announce that we support direct cloud interconnection with our Cloudflare Network Interconnect, allowing Cloudflare to be your one-stop shop for all your interconnection needs.</p><p>Customers using IBM Cloud, Google Cloud, Azure, Oracle Cloud Infrastructure, and Amazon Web Services can now open direct connections from their private cloud instances into Cloudflare. In this blog, we’re going to talk about why direct cloud interconnection is important, how Cloudflare makes it easy, and how Cloudflare integrates direct cloud connection with our existing Cloudflare One products to bring new levels of <a href="https://www.cloudflare.com/learning/network-layer/network-security/">security</a> to your corporate networks built on top of Cloudflare.</p>
    <div>
      <h3>Privacy in a public cloud</h3>
      <a href="#privacy-in-a-public-cloud">
        
      </a>
    </div>
    <p>Public cloud compute providers are built on the idea that the compute power they provide can be used by anyone: your cloud VM and my cloud VM can run next to each other on the same machine and neither of us will know. The same is true for bits on the wire going in and out of these clouds: your bits and my bits may flow on the same wire, interleaved with each other, and neither of us will know that it’s happening.</p><p>The abstraction and relinquishment of ownership is comforting in one way but can be terrifying in another: neither of us need to run a physical machine and buy our own connectivity, but we have no guarantees about how or where our data and compute lives except that it lives in a datacenter with millions of other users.</p><p>For many enterprises, this isn’t acceptable: enterprises need compute that can only be accessed by them. Maybe the compute in the cloud is storing payment data that can’t be publicly accessible, and must be accessed through a private connection. Maybe the cloud customer has compliance requirements due to government restrictions that require the cloud not be accessible to the public Internet. Maybe the customer simply doesn’t trust public clouds or the public Internet and wants to limit exposure as much as possible. Customers want a private cloud that only they can access: a virtual private cloud, or a VPC.</p><p>To help solve this problem and ensure that only compute owners can access cloud compute that needs to stay private, clouds developed private cloud interconnects: direct cables from clouds to their customers. You may know them by their product names: AWS calls theirs DirectConnect, Azure calls theirs ExpressRoute, Google Cloud calls theirs Cloud Interconnect, OCI calls theirs FastConnect, and IBM calls theirs Direct Link. By providing private cloud connectivity to the customer datacenter, clouds satisfy the chief pain points for their customers: providing compute in a private manner. With these private links, VPCs are only accessible from the corporate networks that they’re plugged into, providing air-gapped security while allowing customers to turn over operations and maintenance of the datacenters to the clouds.</p>
    <div>
      <h3>Privacy on the public Internet</h3>
      <a href="#privacy-on-the-public-internet">
        
      </a>
    </div>
    <p>But while VPCs and direct cloud interconnection have solved the problem of infrastructure moving to the cloud, as corporate networks move out of on-premise deployments, the cloud brings a completely new challenge: how do I keep my private cloud connections if I’m getting rid of my corporate network that connects all my resources together?</p><p>Let’s take an example company that connects a data center, an office, and an Azure instance together. Today, this company may have remote users that connect to applications hosted in either the datacenter, the office, or the cloud instance. Users in the office may connect to applications in the cloud, and all of it today is managed by the company. To do this, they may employ VPNs that tunnel the remote users into the data center or office before accessing the necessary applications. The office and data center are often connected through <a href="https://www.cloudflare.com/learning/network-layer/what-is-mpls/">MPLS</a> lines that are leased from connectivity providers. And then there’s the private IBM instance that is connected via IBM Direct Link. That’s three different connectivity providers for CIOs to manage, and we haven’t even started talking about access policies for the internal applications, firewalls for the cross-building network, and implementing MPLS routing on top of the provider underlay.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6w6gFveBWCskbGmfcK6VW2/cb556f159fdeef78a1e478cb676d7829/pasted-image-0-1.png" />
            
            </figure><p>Cloudflare One helps simplify this by allowing companies to insert Cloudflare as the network for all the different connectivity options. Instead of having to run connections between buildings and clouds, all you need to do is manage your connections to Cloudflare.</p><p>WARP manages connectivity for remote users, Cloudflare Network Interconnect provides the private connectivity from data centers and offices to Cloudflare, and all of that can be managed with Access policies for policing applications and Magic WAN to provide the routing that gets your users where they need to go. When we released Cloudflare One, we were able to simplify the connectivity story to look like this:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3sFiKaY8z9BJz379RSrARQ/6bc04bccec2fd0239768776cc892e726/pasted-image-0--1--1.png" />
            
            </figure><p>Before, users with private clouds had to either expose their cloud instances to the public Internet, or maintain suboptimal routing by keeping their private cloud instances connected to their data centers instead of directly connecting to Cloudflare. This means that these customers have to maintain their private connections directly to their data centers, which adds toil to a solution that is supposed to be easier:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Ct4W3INP8JoIrxcjHTG0A/15ac27eb67289b4102a7e32ac140c8c6/pasted-image-0--2--1.png" />
            
            </figure><p>Now that CNI supports cloud environments, this company can open a private cloud link directly into Cloudflare instead of into their data center. This allows the company to use Cloudflare as a true intermediary between all of their resources, and they can rely on Cloudflare to manage firewalls, access policies, and routing for all of their resources, trimming the number of vendors they need to manage for routing down to one: just Cloudflare!</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5YZG5m6lM51q3psWX3KdB1/20c77c740d894632d798fdd844876092/pasted-image-0--3--1.png" />
            
            </figure><p>Once everything is directly connected to Cloudflare, this company can manage their cross-resource routing and firewalls through Magic WAN, they can set their user policies directly in Access, and they can set egress policies out to the public Internet through any one of Cloudflare’s 250+ data centers through Gateway. All the offices and clouds talk to each other on a hermetically sealed network with no public access or publicly shared peering links, and most importantly, all of these security and privacy efforts are done completely transparently to the user.</p><p>So let’s talk about how we can get your cloud connected to us.</p>
    <div>
      <h3>Quick cloud connectivity</h3>
      <a href="#quick-cloud-connectivity">
        
      </a>
    </div>
    <p>The most important thing with cloud connectivity is how easy it should be: you shouldn’t have to spend lots of time waiting for cross-connects to come up, get LOAs, monitor light levels and do all the things that you would normally do when provisioning connectivity. Getting connected from your cloud provider should be cloud-native: you should just be able to provision cloud connectivity directly from your existing portals and follow the existing steps laid out for direct cloud connection.</p><p>That’s why our new cloud support makes it even easier to connect with Cloudflare. We now support direct cloud connectivity with IBM, AWS, Azure, Google Cloud, and OCI so that you can provision connections directly from your cloud provider into Cloudflare like you would to a datacenter. Moving private connections to Cloudflare means you don’t have to maintain your own infrastructure anymore, Cloudflare becomes your infrastructure, so you don’t have to worry about ordering cross-connects into your devices, getting LOAs, or checking light levels. To show you how easy this can be, let’s walk through an example of how easy this is using Google Cloud.</p><p>The first step to provisioning connectivity in any cloud is to request a connection. In Google Cloud, you can do this by selecting “Private Service Connect” in the VPC network details:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4pQ5nP4ARIDvH3B5EFSNZL/087f8c749db2c1e6d8096fa6d859aef6/Untitled.png" />
            
            </figure><p>That will allow you to select a partner connection or a direct connection. In Cloudflare’s case, you should select a partner connection. Follow the instructions to select a connecting region and datacenter site, and you’ll get what’s called a connection ID, which is used by Google Cloud and Cloudflare to identify the private connection with your VPC:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1WtaGJnX060HuFTjxDWp4k/76d0f0d0c3581ae24826720ae52369bf/Untitled--1-.png" />
            
            </figure><p>You’ll notice in this screenshot that it says you need to configure the connection on the partner side. In this case, you can take that key and use it to automatically provision a virtual connection on top of an already existing link. The provisioning process consists of five steps:</p><ol><li><p>Assigning unique VLANs to your connection to ensure a private connection</p></li><li><p>Assigning unique IP addresses for a BGP point-to-point connection</p></li><li><p>Provisioning a BGP connection on the Cloudflare side</p></li><li><p>Passing this information back to Google Cloud and creating the connection</p></li><li><p>Accepting the connection and finishing BGP provisioning on your VPC</p></li></ol><p>All of these steps are performed automatically in seconds so that by the time you get your IP address and VLANs, Cloudflare has already provisioned our end of the connection. When you accept and configure the connection, everything will be ready to go, and it’s easy to start privately routing your traffic through Cloudflare.</p><p>Now that you’ve finished setting up your connection, let’s talk about how private connectivity to your cloud instances can integrate with all of your Cloudflare One products.</p>
    <div>
      <h3>Private routing with Magic WAN</h3>
      <a href="#private-routing-with-magic-wan">
        
      </a>
    </div>
    <p>Magic WAN integrates extremely well with Cloud CNI, allowing customers to connect their VPCs directly to the private network built with Magic WAN. Since the routing is private, you can even advertise your private address spaces reserved for internal routing, such as your 10.0.0.0/8 space.</p><p>Previously, your cloud VPC needed to be publicly addressable. But with Cloud CNI, we assign a point-to-point IP range, and you can advertise your internal spaces back to Cloudflare and Magic WAN will route traffic to your internal address spaces!</p>
    <div>
      <h3>Secure authentication with Access</h3>
      <a href="#secure-authentication-with-access">
        
      </a>
    </div>
    <p>Many customers love Cloudflare Tunnel in combination with Access for its secure paths to authentication servers hosted in cloud providers. But what if your authentication server didn’t need to be publicly accessible at all? With Access + Cloud CNI, you can connect your authentication services to Cloudflare and Access will route all your authentication traffic through the private path back to your service without needing the public Internet.</p>
    <div>
      <h3>Manage your cloud egress with Gateway</h3>
      <a href="#manage-your-cloud-egress-with-gateway">
        
      </a>
    </div>
    <p>While you may want to protect your cloud services from ever being accessed by anyone not on your network, sometimes your cloud services need to talk out to the public Internet. Luckily for you, Gateway has you covered and with Cloud CNI you can get a private path to Cloudflare which will manage all of your egress policies, ensuring that you can carefully watch your cloud service outbound traffic from the same place you monitor all other traffic leaving your network.</p>
    <div>
      <h3>Cloud CNI: safe, performant, easy</h3>
      <a href="#cloud-cni-safe-performant-easy">
        
      </a>
    </div>
    <p>Cloudflare is committed to making <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust</a> and <a href="https://www.cloudflare.com/network-security/">network security</a> easy and unobtrusive. Cloud CNI is another step towards ensuring that your network is as easy to manage as everything else so that you can stop focusing on how to build your network, and start focusing on what goes on top of it.</p><p>If you’re interested in Cloud CNI, <a href="https://www.cloudflare.com/lp/cio-week-2023-cloudflare-one-contact-us/">contact us</a> today to get connected to a seamless and easy Zero Trust world.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[NaaS]]></category>
            <category><![CDATA[Network Interconnect]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">1Z0kIJhiPA1nkfwU9IVwgg</guid>
            <dc:creator>David Tuber</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare Is Solving Network Interconnection for CIOs]]></title>
            <link>https://blog.cloudflare.com/more-offices-faster/</link>
            <pubDate>Sat, 11 Dec 2021 13:59:53 GMT</pubDate>
            <description><![CDATA[ Instant network provisioning in over 1000 new locations coming over the next year makes it faster and easier than ever to interconnect with Cloudflare. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4nM5vG4CjYfhdxKuYJv2qj/2b01a4558680e0e38a003b609cedfc2d/image3-28.png" />
            
            </figure><p>Building a corporate network is hard. We want to enable IT teams to focus on exploring and deploying cutting edge technologies to make employees happier and more productive — not figuring out how to add 100 Mbps of capacity on the third floor of a branch office building.</p><p>And yet, as we speak to CIOs and IT teams, we consistently hear of the challenge required to manage organization connectivity. Today, we’re sharing more about how we’re solving connectivity challenges for CIOs and IT teams. There are three parts to our approach: we’re making our network more valuable in terms of the benefit you get from connecting to us; we’re expanding our reach, so we can offer connectivity in more places; and we’re further reducing our provisioning times, so there’s no more need to plan six months in advance.</p>
    <div>
      <h2>Making Interconnection Valuable</h2>
      <a href="#making-interconnection-valuable">
        
      </a>
    </div>
    <p>Cloudflare delivers security, reliability, and performance products as a service, all from our global network. We’ve spent the past week talking about new releases and enhanced functionality — if you haven’t yet, please check out some exciting posts on <a href="/replace-your-hardware-firewalls-with-cloudflare-one">how to replace your hardware firewall</a>, <a href="/cloudflare-acquires-zaraz-to-enable-cloud-loading-of-third-party-tools">managing third party tools in the cloud</a>, and <a href="/page-shield-generally-available">protecting your web pages from malicious scripting</a>. By interconnecting with us, you get access to all these new products and features with zero additional latency and super easy configuration. This includes, for example, leveraging private paths from Cloudflare’s <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> to your datacenters, completely bypassing the public Internet. It also includes the ability to leverage our private backbone and global network, to gain dramatic performance improvements throughout your network. You can read more examples about how interconnection gives you faster, more secure access to our products which improve your Internet experience in our <a href="/cloudflare-network-interconnect/">Cloudflare Network Interconnect blog</a>.</p><p>But it’s not just all the products and features you gain access to. Cloudflare has over 28 million Internet properties that rely on it to protect and accelerate their Internet presence. Every time a new property connects to our network, our network becomes more useful. Our free customers or consumers who use 1.1.1.1 provide us unparalleled vision into the Internet to improve our network performance. Similarly, as we expand our surface area on the Internet, it helps us improve our threat detection; it’s like an immune system that learns as it gets exposed to more pathogens. Each customer we make faster and more secure helps others in turn. We have a vast network of customers, including the titans of ecommerce, banking, ERP and CRM systems, and other cloud services. It’s only continuing to grow — and that will be to your advantage.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/X5p5RpdYCcOsihrutDIOs/644424ae05b6c79052081ef4de1c0ac3/image1-60.png" />
            
            </figure>
    <div>
      <h2>Making Interconnection Available Everywhere</h2>
      <a href="#making-interconnection-available-everywhere">
        
      </a>
    </div>
    <p>Building corporate networks requires diverse types of locations to connect to each other: data centers, remote workers, branches in various locations, factories, and more. To accommodate the diversity and geographic spread of modern networks, Cloudflare offers many interconnection options, from our 250 locations around the world to 1000 new interconnection locations that will be enabled over the next year as a part of Cloudflare for Offices.</p>
    <div>
      <h3>Connecting data centers to Cloudflare</h3>
      <a href="#connecting-data-centers-to-cloudflare">
        
      </a>
    </div>
    <p>You can interconnect with Cloudflare in over 250 locations around the world. Check out our <a href="https://www.peeringdb.com/net/4224">peeringDB page</a> to learn more about where you can connect with us.</p><p>We also have several Interconnect Partners who provide even more locations for interconnection. If you already have datacenter presence in these locations, interconnection with Cloudflare becomes even easier. Go to <a href="https://www.cloudflare.com/network-interconnect-partnerships/">our partnership page</a> to learn more about how to get connected through one of our partners.</p>
    <div>
      <h3>Connecting your branch offices</h3>
      <a href="#connecting-your-branch-offices">
        
      </a>
    </div>
    <p>A refresher on our <a href="/cloudflare-for-offices/">Birthday Week post</a>: Cloudflare for Offices is our initiative to bring Cloudflare’s presence to office buildings and multi-homed dwellings. Simply put, Cloudflare is coming to an office near you. That means that by plugging into Cloudflare you get direct, private, performant access to all Cloudflare services, particularly Cloudflare One. With Cloudflare for Offices, your Gateway queries never traverse the public Internet before Cloudflare, your private network built on Magic WAN is even more private, and Argo for Packets makes your offices faster than before. Cloudflare for Offices is the ultimate on-ramp for all on-premise traffic.</p><p>If we’re going to 1000 new locations, there has to be a method to the madness! The process for selecting new locations includes a number of factors. Our goal for each location is to allow the most customers to interconnect with us, while also leveraging our network partners to get connected as fast as possible.</p>
    <div>
      <h3>What does a building need to have?</h3>
      <a href="#what-does-a-building-need-to-have">
        
      </a>
    </div>
    <p>We want to offer reliable, turnkey connectivity to our zero trust security and other services customers connect to our network to consume.</p><p>When we evaluate any building, it has to meet the following criteria:</p><ol><li><p>It must be connected to the Internet with one or more telecom partners. Working with existing providers reduces overhead and time to provision. Plugging into our network to get protected doesn’t work if we have to lay fiber for three months.</p></li><li><p>It must be multi-tenant and in a large metro area. Eventually we want to go everywhere, even to buildings with only one tenant. But as we’re starting from zero, we want to go to the places where we can have the most impact immediately. That means looking at buildings that are large, have a large number of potential or active customers, and have large population counts.</p></li></ol><p>However, once we’ve chosen the building, the journey is far from over. Getting connected in a building has a host of challenges beyond just choosing a connectivity partner to the building. After the building is selected, Cloudflare works with building operators and network providers to provide connectivity to tenants in the building. Regardless of how we get to your office, we want to make it as easy as possible to get connected. And our expansion into 1000 more buildings means we’re on the path to being everywhere.</p><p>Once a building is provisioned for connectivity, you have to get connected. We’ve been working to provide a one-stop solution for all your office and datacenter connectivity that will look the same, regardless of location.</p>
    <div>
      <h2>Getting Interconnection Done Quickly</h2>
      <a href="#getting-interconnection-done-quickly">
        
      </a>
    </div>
    <p>Interconnection should be easy, and should just involve plugging in and getting connected. Cloudflare has been hard at work since the release of Cloudflare Network Interconnect thinking through the best ways to streamline connectivity to make provisioning an interconnection as seamless as plugging in a cable. With Cloudflare for Offices expanding its reach as we detailed above, this will be easy: users who are connecting via offices are using pre-established connectivity through partners.</p><p>But for customers who aren’t in a building covered by Cloudflare for Offices, or who use Cloudflare Network Interconnect, it’s not that simple. Provisioning network connectivity has traditionally been a time-consuming process for everyone involved. Customers need to deal with datacenter providers, receive letters of authorization (or LOAs for short), contract remote hands to plug in cables, read light levels, and that’s before software gets involved. This process has typically taken weeks in the industry, and Cloudflare has spent a lot of time shrinking that down. We don’t want weeks, we want minutes, and we’re excited that we are finally getting there.</p><p>There are three main initiatives we are pursuing to get this done: automating BGP configurations, streamlining cross-connect provisioning, and improving uptime. Let’s dive into each of those.</p>
    <div>
      <h3>Instant BGP session turnup</h3>
      <a href="#instant-bgp-session-turnup">
        
      </a>
    </div>
    <p>When you provision a CNI, you’re essentially creating a brand new road between your neighborhood and the Cloudflare neighborhood. If the cross-connected cable is the paving of the actual street, BGP sessions are the street signs and map applications that tell everyone the new road is up. Establishing a BGP session is critical to using a CNI because it lets traffic going through Cloudflare and through your network know that a new private path exists between the two networks.</p><p>But when you pave a new road, you update the street signs in parallel to building the road. So why shouldn’t you do the same with interconnection? Cloudflare is now provisioning BGP sessions once the cross-connects are ordered so that the session is up and ready for you to configure. This cuts down on lots of back-and-forth and also parallelizes critical work to reduce overall provisioning time.</p>
    <div>
      <h3>Cross-connect provisioning and Interconnect partners</h3>
      <a href="#cross-connect-provisioning-and-interconnect-partners">
        
      </a>
    </div>
    <p>Building the road itself takes a lot of time, and provisioning cross-connects can run into similar issues if we’re following the metaphor. Although we all wish <a href="https://www.prnewswire.com/news-releases/wave2wave-launches-rome-max-series-of-robotic-cross-connects-for-data-centers-300793288.html">robots could manage cross-connects</a> in every data center, we still rely on booking time with humans and filling out purchase orders, completing methods of procedure (or MOP) to tell them what to do, and hoping that nobody bumps any cables or is accidentally clumsy during the maintenance. Imagine trying to plug your cables into one of these.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/75DdbmvcPJPQKxwStMAu4n/99b9fa99f3c7bcbf1915eb231136474c/image2-45.png" />
            
            </figure><p>To fix this and reduce complexity, Cloudflare is standardizing connectivity in our datacenters to make it easy for humans to know where things get plugged in. We’re also better utilizing things like <a href="https://www.racksolutions.com/news/blog/patch-panel/#:~:text=A%20patch%20panel%20is%20a,organize%20a%20group%20of%20cables.&amp;text=Patch%20panels%20can%20be%20quite,RJ45%20cables%2C%20and%20many%20others.">patch panels</a>, which allow operators to interconnect with us without having to go in cages. This reduces time and complexity because operators are less likely to bump into things in cages, causing outages.</p><p>In addition, we also have our Interconnect Partners, which leverage existing connectivity with Cloudflare to provide virtual interconnection. Our list of partners is ever growing, and they’re super excited to work with us and you to give you the best, fastest, most secure connectivity experience possible.</p><blockquote><p>"Megaport's participation in Cloudflare Network Interconnect as an Interconnection Platform Partner helps make connectivity easier for our mutual customers. Reducing the time it takes for customers to go live with new Virtual Cross Connects and Megaport Cloud Routers helps them realize the promise of software-defined networking."- <b>Peter Gallagher</b>, Head of Channel, Megaport</p></blockquote><blockquote><p>“Console Connect and Cloudflare are continuing our partnership as part of Cloudflare's Network Interconnect program, helping our mutual customers enhance the performance and control of their network through Software-Defined Interconnection®. As more and more customers move from physical to virtual connectivity, our partnership will help shorten onboarding times and make interconnecting easier than ever before.”- <b>Michael Glynn</b>, VP of Digital Automated Innovation, Console Connect.</p></blockquote>
    <div>
      <h3>Improving connection resilience uptime</h3>
      <a href="#improving-connection-resilience-uptime">
        
      </a>
    </div>
    <p>One customer quote that always resonates is, “I love using your services and products, but if you’re not up, then that doesn’t matter.” In the arena of interconnectivity, that is never more true. To that end, Cloudflare is excited to announce Bidirectional Forwarding Detection (or BFD) support on physical CNI links. BFD is a networking protocol that constantly monitors links and BGP sessions down to the second by sending a constant stream of traffic across the session. If a small number of those packets does not make it to the other side of the session, that session is considered down. This solution is useful for CNI customers who cannot tolerate any amount of packet loss during the session. If you’re a CNI customer, or even just a Cloudflare customer who has a low-loss requirement, CNI with BFD is a great solution to ensure that quick decisions are made with regard to your CNI to ensure your traffic always gets through.</p>
    <div>
      <h2>Get connected today</h2>
      <a href="#get-connected-today">
        
      </a>
    </div>
    <p>Cloudflare is always trying to push the boundaries of what’s possible. We built a better path through the Internet with Argo, took on edge computing with Workers, and showed that zero trust networking could be done in the cloud with Cloudflare One. Pushing the boundaries of improving connectivity is the next step in Cloudflare’s journey to help build a better Internet. There are hard problems for people to solve on the Internet, like how to best protect what belongs to you. Figuring out how to get connected and protected should be fast and easy. With Cloudflare for Offices and CNI, we want to make it that easy.</p><p>If you are interested in CNI or Cloudflare for Offices, visit our <a href="https://www.cloudflare.com/cloudflare-for-offices/">landing page</a> or reach out to your account team to get plugged in today!</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Network Interconnect]]></category>
            <guid isPermaLink="false">2tLVfIfxmmCeilcqz68575</guid>
            <dc:creator>David Tuber</dc:creator>
            <dc:creator>Michael King</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare’s Technology Partner Program]]></title>
            <link>https://blog.cloudflare.com/technology-partner-program/</link>
            <pubDate>Fri, 15 Oct 2021 15:30:00 GMT</pubDate>
            <description><![CDATA[ We aim to continue expanding our ecosystem of programs and partners to make it seamless for our customers to use Cloudflare. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>The Internet is built on a series of shared protocols, all working in harmony to deliver the collective experience that has changed the way we live and work. These open standards have created a platform such that a myriad of companies can build unique services and products that work together seamlessly. As a steward and supporter of an open Internet, we aspire to provide an interoperable platform that works with all the complementary technologies that our customers use across their technology stack. This has been the guiding principle for the multiple partnerships we have launched over the last few years.  </p><p>One example is our <a href="https://www.cloudflare.com/bandwidth-alliance/">Bandwidth Alliance</a> — launched in 2018, this alliance with 18 cloud and storage providers aims to reduce <a href="https://www.cloudflare.com/learning/cloud/what-are-data-egress-fees/">egress fees</a>, also known as data transfer fees, for our customers. The Bandwidth Alliance has broken the norms of the cloud industry so that customers can move data more freely. Since then, we have launched <a href="https://www.cloudflare.com/partners/technology-partners/">several technology partner programs</a> with over 40+ partners, including:</p><ul><li><p><a href="https://www.cloudflare.com/partners/analytics/"><b>Analytics</b></a> — Visualize Cloudflare logs and metrics easily, and help customers better understand events and trends from websites and applications on the Cloudflare network.</p></li><li><p><a href="https://www.cloudflare.com/network-interconnect-partnerships/"><b>Network Interconnect</b></a> — Partnerships with best-in-class Interconnection platforms offer private, secure, software-defined links with near instant-turn-up of ports.</p></li><li><p><a href="https://www.cloudflare.com/endpoint-partners/"><b>Endpoint Protection Partnerships</b></a> — With these integrations, every connection to our customer’s corporate application gets an additional layer of identity assurance without the need to connect to VPN.</p></li><li><p><a href="https://developers.cloudflare.com/cloudflare-one/identity"><b>Identity Providers</b></a> — Easily integrate your organization's single sign-on provider and benefit from the ease-of-use and functionality of Cloudflare Access.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2PTRvs7ECj4IQlmJ90plAI/75879214cc9fa9da46c67bd5f419fc62/Screen-Shot-2021-10-14-at-12.59.29-PM.png" />
            
            </figure><p>These partner programs have helped us serve our customers better alongside our partners with our complementary solutions. The integrations we have driven have made it easy for <i>thousands of customers</i> to use Cloudflare with other parts of their stack.</p><p>We aim to continue expanding the <a href="https://www.cloudflare.com/partners/">Cloudflare Partner Network</a> to make it seamless for our customers to use Cloudflare. To support our growing ecosystem of partners, we are excited to launch our Technology Partner Program.</p>
    <div>
      <h3>Announcing Cloudflare’s Technology Partner Program</h3>
      <a href="#announcing-cloudflares-technology-partner-program">
        
      </a>
    </div>
    <p>Cloudflare’s <a href="https://www.cloudflare.com/partners/technology-partners/">Technology Partner Program</a> facilitates innovative integrations that create value for our customers, our technology partners, and Cloudflare. Our partners not only benefit from technical integrations with us, but also have the opportunity to drive sales and marketing efforts to better serve mutual customers and prospects.</p><p>This program offers a guiding structure so that our partners can benefit across three key areas:</p><ul><li><p><b>Build with Cloudflare:</b> Sandbox access to <a href="https://www.cloudflare.com/plans/enterprise/">Cloudflare enterprise features</a> and APIs to build and test integrations. Opportunity to collaborate with Cloudflare’s product teams to build innovative solutions.</p></li><li><p><b>Market with Cloudflare:</b> Develop joint solution brief and host joint events to drive awareness and adoption of integrations. Leverage a range of our partners tools and resources to bring our joint solutions to market.</p></li><li><p><b>Sell with Cloudflare:</b> Align with our sales teams to jointly target relevant customer segments across geographies.</p></li></ul>
    <div>
      <h3>Technology Partner Tiers</h3>
      <a href="#technology-partner-tiers">
        
      </a>
    </div>
    <p>Depending on the maturity of the integration and fit with Cloudflare’s product portfolio, we have two types of partners:</p><ul><li><p><b>Strategic partners:</b> Strategic partners have mature integrations across the Cloudflare product suite. They are leaders in their industries and have a significant overlap with our customer base. These partners are strategically aligned with our sales and marketing efforts, and they collaborate with our product teams to bring innovative solutions to market.</p></li><li><p><b>Integration partners:</b> Integration partners are early participants in Cloudflare’s partnership ecosystem. They already have or are on a path to build validated, functional integrations with Cloudflare. These partners have programmatic access to resources that will help them experiment with and build integrations with Cloudflare.</p></li></ul>
    <div>
      <h3>Work with Us</h3>
      <a href="#work-with-us">
        
      </a>
    </div>
    <p>If you are interested in working with our Technology Partnerships team to develop and bring to market a joint solution, we’d love to hear from you!  Partners can complete the application on our <a href="https://www.cloudflare.com/partners/technology-partners/">Technology Partner Program website</a> and we will reach out quickly to discuss how we can help build solutions for our customers together.</p> ]]></content:encoded>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Bandwidth Alliance]]></category>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[Network Interconnect]]></category>
            <guid isPermaLink="false">3NG8dDAu6663un1Lsesqal</guid>
            <dc:creator>Matt Lewis</dc:creator>
            <dc:creator>Deeksha Lamba</dc:creator>
        </item>
        <item>
            <title><![CDATA[Making Magic Transit health checks faster and more responsive]]></title>
            <link>https://blog.cloudflare.com/making-magic-transit-health-checks-faster-and-more-responsive/</link>
            <pubDate>Mon, 23 Aug 2021 13:08:32 GMT</pubDate>
            <description><![CDATA[ Magic Transit advertises our customer’s IP prefixes directly from our edge network, applying DDoS mitigation and firewall policies to all traffic destined for the customer’s network.  ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4orYvvMFXsOYqJH0tpL4Y7/b89e432069398acb30aeff8fd417d4c9/Magic-Transit-Heath-Checks.png" />
            
            </figure><p><a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> advertises our customer’s IP prefixes directly from our edge network, applying DDoS mitigation and firewall policies to all traffic destined for the customer’s network. After the traffic is scrubbed, we deliver clean traffic to the customer over <a href="https://www.cloudflare.com/learning/network-layer/what-is-gre-tunneling/">GRE tunnels</a> (over the public Internet or <a href="https://www.cloudflare.com/network-interconnect/">Cloudflare Network Interconnect</a>). But sometimes, we experience inclement weather on the Internet: network paths between Cloudflare and the customer can become unreliable or go down. Customers often configure multiple tunnels through different network paths and rely on Cloudflare to pick the best tunnel to use if, for example, some router on the Internet is having a stormy day and starts dropping traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5oMkYeGKWm0pGXZ1j7418Q/edd502203a8124d601913fba908eecc6/Magic-Transit-Health-Checks-GRE-Tunnels-1.png" />
            
            </figure><p>Because we use Anycast GRE, every server across Cloudflare’s 200+ locations globally can send GRE traffic to customers. Every server needs to know the status of every tunnel, and every location has completely different network routes to customers. Where to start?</p><p>In this post, I’ll break down my work to improve the Magic Transit GRE tunnel health check system, creating a more stable experience for customers and dramatically reducing CPU and memory usage at Cloudflare’s edge.</p>
    <div>
      <h2>Everybody has their own weather station</h2>
      <a href="#everybody-has-their-own-weather-station">
        
      </a>
    </div>
    <p>To decide where to send traffic, Cloudflare edge servers need to periodically send <a href="https://developers.cloudflare.com/magic-transit/about/health-checks">health checks</a> to each customer tunnel endpoint.</p><p>When Magic Transit was first launched, every server sent a health check to every tunnel once per minute. This naive, “shared-nothing” approach was simple to implement and served customers well, but would occasionally deliver less than optimal health check behavior in two specific ways.</p>
    <div>
      <h3>Way #1: Inconsistent weather reports</h3>
      <a href="#way-1-inconsistent-weather-reports">
        
      </a>
    </div>
    <p>Sometimes a server just runs into bad luck, and a check randomly fails. From there, the server would mark the tunnel as degraded and immediately start shifting traffic towards a fallback tunnel. Imagine you and I were standing right next to each other under a clear sky, and I felt a single drop of water and declared, “It’s raining!” whereas you felt no raindrops and declared, “It’s all clear!”</p><p>With relatively minimal data per server, it means that health determinations can be imprecise. It also means that individual servers could overreact to individual failures. From a customer’s point of view, it’s like Cloudflare detected a problem with the primary tunnel. But, in reality, the server just got a bad weather forecast and made a different judgement call.</p>
    <div>
      <h3>Way #2: Slow to respond to storms</h3>
      <a href="#way-2-slow-to-respond-to-storms">
        
      </a>
    </div>
    <p>Even when tunnel states are consistent across servers, they can be slow to respond. In this case, if a server runs a health check which succeeds, but a second later the tunnel goes down, the next health check won't happen for another 59 seconds. Until that next health check fails, the server has no idea anything is wrong, so it keeps sending traffic over unhealthy tunnels, leading to packet loss and latency for the customer.</p><p>Much like how a live, up-to-the-minute rain forecast helps you decide when to leave to avoid the rain, servers that send tunnel checks more frequently get a finer view of the Internet weather and can respond faster to localized storms. But if every server across Cloudflare’s edge sent health checks too frequently, we would very quickly start to overwhelm our customers’ networks.</p>
    <div>
      <h2>All of the weather stations nearby start sharing observations</h2>
      <a href="#all-of-the-weather-stations-nearby-start-sharing-observations">
        
      </a>
    </div>
    <p>Clearly, we needed to hammer out some kinks. We wanted servers in the same location to come to the same conclusions about where to send traffic, and we wanted faster detection of issues without increasing the frequency of tunnel checks.</p><p>Health checks sent from servers in the same data center take the same route across the Internet. Why not share the results among them?</p><p>Instead of a single raindrop causing me to declare that it’s raining, I’d tell you about the raindrop I felt, and you’d tell me about the clear sky you’re looking at. Together, we come to the same conclusion: there isn’t enough rain to open an umbrella.</p><p>There is even a special networking protocol that allows us to easily share information between servers in the same private network. From the makers of <a href="https://www.cloudflare.com/learning/cdn/glossary/anycast-network/">Unicast and Anycast</a>, now presenting: <i>Multicast</i>!</p><p>A single IP address does not necessarily represent a single machine in a network. The Internet Protocol specifies a way to send one message that gets delivered to a group of machines, like writing to an email list. Every machine has to opt into the group—we can’t just enroll people at random for our email list—but once a machine joins, it receives a copy of any message sent to the group’s address.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5RVyvQRZIEC2vurlUqhpc2/c77720644c20cc5b9743fdb7464b1f6a/Multicast.png" />
            
            </figure><p>The servers in a Cloudflare edge data center are part of the same private network, so for “version 2” of our health check system, we had each server in a data center join a multicast group and share their health check results with one another. Each server still made an independent assessment for each tunnel, but that assessment was based on data collected by all servers in the same location.</p><p>This second version of tunnel health checks resulted in more consistent  tunnel health determinations by servers in the same data center. It also resulted in faster response times—especially in large data centers where servers receive updates from their peers very rapidly.</p><p>However, we started seeing scaling problems. As we added more customers, we added more tunnel endpoints where we need to check the weather. In some of our larger data centers, each server was receiving close to half a billion messages per minute.</p><p>Imagine it's not just you and me telling each other about the weather above us. You’re in a crowd of hundreds of people, and now everyone is shouting the weather updates for thousands of cities around the world!</p>
    <div>
      <h2>One weather station to rule them all</h2>
      <a href="#one-weather-station-to-rule-them-all">
        
      </a>
    </div>
    <p>As an engineering intern on the Magic Transit team, my project this summer has been developing a third approach. Rather than having every server <i>infrequently</i> check the weather for <i>every</i> tunnel and shouting the <i>observation</i> to everyone else, now every server tunnel can <i>frequently</i> check the weather for <i>a few</i> tunnels. With this new approach, servers would then only tell the others about the overall weather report—not every individual measurement.</p><p>That scenario sounds more efficient, but we need to distribute the task of sending tunnel health checks across all the servers in a location so one server doesn’t get an overwhelming amount of work. So how can we assign tunnels to servers in a way that doesn’t require a centralized orchestrator or shared database? Enter <a href="https://www.toptal.com/big-data/consistent-hashing">consistent hashing</a>, the single coolest distributed computing concept I got to apply this summer.</p><p>Every server sends a multicast “heartbeat” every few seconds. Then, by listening for multicast heartbeats, each server can construct a list of the IP addresses of peers known to be alive, including its own address, sorted by taking the hash of each address. Every server in a data center has the same list of peers in the same order.</p><p>When a server needs to decide which tunnels it is responsible for sending health checks to, the server simply hashes each tunnel to an integer and searches through the list of peer addresses to find the peer with the smallest hash greater than the tunnel’s hash, wrapping around to the first peer if no peer is found. The server is responsible for sending health checks to the tunnel when the assigned peer’s address equals the server’s address.</p><p>If a server stops sending messages for a long enough period of time, the server gets removed from the known peers list. As a consequence, the next time another server tries to hash a tunnel the removed peer was previously assigned, the tunnel simply gets reassigned to the next peer in the list.</p><p>And like magic, we have devised a scheme to consistently assign tunnels to servers in a way that is resilient to server failures and does not require any extra coordination between servers beyond heartbeats. Now, the assigned server can send health checks way more frequently, compose more precise weather forecasts, and share those forecasts without being drowned out by the crowd.</p>
    <div>
      <h2>Results</h2>
      <a href="#results">
        
      </a>
    </div>
    <p>Releasing the new health check system globally reduced Magic Transit’s CPU usage by over 70% and memory usage by nearly 85%.</p><p>Memory usage (measured in terabytes):</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7jIhwrwiVgb5ZVSndRsEFX/1a6ca8f95e94ee8e1d19357ebb940b1f/pasted-image-0-4.png" />
            
            </figure><p>CPU usage (measured in CPU-seconds per two minute interval, averaged over two days):</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4nO6YapeDukQjXoesRQKyg/baba9631a11b0fc7a590980fd564dd0c/pasted-image-0--1--1.png" />
            
            </figure><p>Reducing the number of multicast messages means that servers can now keep up with the Internet weather, even in the largest data centers. We’re now poised for the next stage of Magic Transit’s growth, just in time for our <a href="/magic-transit/">two-year anniversary</a>.</p><p>If you want to help build the future of networking, <a href="https://www.cloudflare.com/careers/">join our team</a>.</p> ]]></content:encoded>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Network Interconnect]]></category>
            <category><![CDATA[Network Services]]></category>
            <guid isPermaLink="false">1KwN1yyk2mLbERJzPzevmh</guid>
            <dc:creator>Meyer Zinn</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing Project Pangea: Helping Underserved Communities Expand Access to the Internet For Free]]></title>
            <link>https://blog.cloudflare.com/pangea/</link>
            <pubDate>Mon, 26 Jul 2021 12:59:25 GMT</pubDate>
            <description><![CDATA[ Cloudflare is excited to announce Project Pangea. We’re launching a program that provides secure, performant, reliable access to the Internet for community networks that support underserved communities, and we’re doing it for free because we want to help build an Internet for everyone. ]]></description>
            <content:encoded><![CDATA[ <p></p><p><a href="https://www.weforum.org/agenda/2020/04/coronavirus-covid-19-pandemic-digital-divide-internet-data-broadband-mobbile/">Half of the world’s population has no access to the Internet</a>, with many more limited to poor, expensive, and unreliable connectivity. This problem persists despite large levels of public investment, private infrastructure, and effort by local organizers.</p><p>Today, Cloudflare is excited to announce Project Pangea: a piece of the puzzle to help solve this problem. We’re launching a program that provides secure, performant, reliable access to the Internet for community networks that support underserved communities, and we’re doing it for free<sup>1</sup> because <a href="/understanding-where-the-internet-isnt-good-enough-yet/">we want to help build an Internet for everyone</a>.</p>
    <div>
      <h3>What is Cloudflare doing to help?</h3>
      <a href="#what-is-cloudflare-doing-to-help">
        
      </a>
    </div>
    <p>Project Pangea is Cloudflare’s project to help bring underserved communities secure connectivity to the Internet through Cloudflare’s global and interconnected network.</p><p>Cloudflare is offering our suite of network services — <a href="https://www.cloudflare.com/network-interconnect/">Cloudflare Network Interconnect</a>, <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a>, and <a href="/introducing-magic-firewall/">Magic Firewall</a> — for free to nonprofit community networks, local networks, or other networks primarily focused on providing Internet access to local underserved or developing areas. This service would dramatically reduce the cost for communities to connect to the Internet, with industry leading security and performance functions built-in:</p><ul><li><p><b>Cloudflare Network Interconnect</b> provides access to Cloudflare’s edge in 200+ cities across the globe through physical and virtual connectivity options.</p></li><li><p><b>Magic Transit</b> acts as a conduit to and from the broader Internet and protects community networks by mitigating DDoS attacks within seconds at the edge.</p></li><li><p><b>Magic Firewall</b> gives community networks access to a network-layer <a href="https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/">firewall as a service</a>, providing further protection from malicious traffic.</p></li></ul><p>We’ve learned from working with customers that pure connectivity is not enough to keep a network sustainably connected to the Internet. Malicious traffic, such as DDoS attacks, can target a network and saturate Internet service links, which can lead to providers aggressively rate limiting or even entirely shutting down incoming traffic until the attack subsides. This is why we’re including our security services in addition to connectivity as part of Project Pangea: no attacker should be able to keep communities closed off from accessing the Internet.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6qlqh0LQN6YOGyFRsyBFNO/b970dd6fa3f24e243ac30a6c206a504b/pangea-flow.png" />
            
            </figure>
    <div>
      <h3>What is a community network?</h3>
      <a href="#what-is-a-community-network">
        
      </a>
    </div>
    <p>Community networks have existed almost as long as commercial subscribership to the Internet that began with dial-up service. The Internet Society, or <a href="https://www.internetsociety.org/issues/community-networks/">ISOC</a>, describes community networks as happening “when people come together to build and maintain the necessary infrastructure for Internet connection.”</p><p>Most often, community networks emerge from need, and in response to the lack or absence of available Internet connectivity. They consistently demonstrate success where public and private-sector initiatives have either failed or under-deliver. We’re not talking about stop-gap solutions here, either — community networks around the world have been providing reliable, sustainable, high-quality connections for years.</p><p>Many will operate only within their communities, but many others can grow, and have grown, to regional or national scale. The most common models of governance and operation are as not-for-profits or cooperatives, models that ensure reinvestment within the communities being served. For example, we see networks that reinvest their proceeds to replace Wi-Fi infrastructure with fibre-to-the-home.</p><p>Cloudflare celebrates these networks’ successes, and also the diversity of the communities that these networks represent. In that spirit, we’d like to dispel myths that we encountered during the launch of this program — many of which we wrongly assumed or believed to be true — because the myths turn out to be barriers that communities so often are forced to overcome.  Community networks are built on knowledge sharing, and so we’re sharing some of that knowledge, so others can help accelerate community projects and policies, rather than rely on the assumptions that impede progress.</p><p><b>Myth #1: Only very rural or remote regions are underserved and in need.</b> It’s true that remote regions are underserved. It is also true that underserved regions exist within 10 km (about six miles) of large city centers, and even within the largest cities themselves, as evidenced by the existence of some of our launch partners.</p><p><b>Myth #2: Remote, rural, or underserved is also low-income.</b> This might just be the biggest myth of all. Rural and remote populations are often thriving communities that can afford service, but have no access. In contrast, the need for urban community networks are often egalitarian, and emerge because the access that is available is unaffordable to many.</p><p><b>Myth #3: Service is necessarily more expensive.</b> This myth is sometimes expressed by statements such as, “if large service providers can’t offer affordable access, then no one can.”  More than a myth, this is a lie. Community networks (including our launch partners) use novel governance and cost models to ensure that subscribers pay rates similar to the wider market.</p><p><b>Myth #4: Technical expertise is a hard requirement and is unavailable.</b> There is a rich body of evidence and examples showing that, with small amounts of training and support, communities can build their own local networks cheaply and reliably with commodity hardware and non-specialist equipment.</p><p>These myths aside, there is one truth: <b>the path to sustainability is hard</b>. The start and initial growth of community networks often consists of volunteer time or grant funding, which are difficult to sustain in the long-term. Eventually the starting models need to transition to models of “willing to charge and willing to pay” — Project Pangea is designed to help fill this gap.</p>
    <div>
      <h2>What is the problem?</h2>
      <a href="#what-is-the-problem">
        
      </a>
    </div>
    <p>Communities around the world can and have put up Wi-Fi antennas and laid their own fibre. Even so, and however well-connected the community is to itself, <i>Internet services are prohibitively expensive — if they can be found at all</i>.</p><p>Two elements are required to connect to the Internet, and each incurs its own cost:</p><ul><li><p><b>Backhaul</b> connections to an interconnection point — the connection point may be anything from a local cabinet to a large Internet exchange point (IXP).</p></li><li><p><b>Internet Services</b> are provided by a network that interfaces with the wider Internet, and agrees to route traffic to and from on behalf of the community network.</p></li></ul><p>These are distinct elements. Backhaul service carries data packets along a physical link (a fibre cable or wireless medium). Internet service is separate and may be provided over that link, or at its endpoint.</p><p>The cost of Internet service for networks is both dominant and variable (with usage), so in most cases it is cheaper to purchase both as a bundle from service providers that also own or operate their own physical network. Telecommunications and energy companies are prime examples.</p><p>However, the operating costs and complexity of long-distance backhaul is significantly lower than the costs of Internet service. If reliable, high capacity service were affordable, then community networks could extend their knowledge and governance models sustainably to also provide their own backhaul.</p><p>For all that community networks can build, establish, and operate, the one element entirely outside their control is the cost of Internet service — a problem that Project Pangea helps to solve.</p>
    <div>
      <h3>Why does the problem persist?</h3>
      <a href="#why-does-the-problem-persist">
        
      </a>
    </div>
    <p>On this subject, I — Marwan — can only share insights drawn from prior experience as a computer science professor, and a co-founder of <a href="https://hubs.net.uk/">HUBS c.i.c.</a>, launched with talented professors and a network engineer. HUBS is a not-for-profit backhaul and Internet provider in Scotland. It is a cooperative of more than a dozen community networks — some that serve communities with no roads in or out — across thousands of square kilometers along Scotland’s West Coast and Borders regions. As is true of many community networks, not least some of Pangea’s launch partners, HUBS’ is award-<a href="https://digital-strategy.ec.europa.eu/en/news/winners-european-broadband-awards-2016">winning</a>, and engages in <a href="https://committees.parliament.uk/committee/136/scottish-affairs-committee/news/102790/ee-o2-three-and-vodafone-questioned-on-scotland-mobile-coverage/">advocacy and policy</a>.</p><p>During that time my co-founders and I engaged with research funders, economic development agencies, three levels of government, and so many communities that I lost track. After all that, the answer to the question is still far from clear. There are, however, noteworthy observations and experiences that stood out, and often came from surprising places:</p><ul><li><p>Cables on the ground get chewed by animals that, small or large, might never be seen.</p></li><li><p>Burying power and Ethernet cables, even 15 centimeters below soil, makes no difference because (we think) animals are drawn by the electrical current.</p></li><li><p>Property owners sometimes need to be convinced that 8 to 10 square meters to build a small tower in exchange for free Internet and community benefit is a good thing.</p></li><li><p>The raising of small towers, even that no one will see, is sometimes blocked by legislation or regulation that assumes private non-residential structures can only be a shed, or never taller than a shed.</p></li><li><p>Private fibre backbone installations installed with public funds are often inaccessible, or are charged by distance even though the cost to light 100 meters of fibre is identical to the cost of lighting 1 km of fibre.</p></li><li><p>Civil service agencies may be enthusiastic, but are also cautious, even in the face of evidence. Be patient, suffer frustration, be more patient, and repeat. Success is possible.</p></li><li><p>If and where possible, it’s best to avoid attempts to deliver service where national telecommunications companies have plans to do so.</p></li><li><p>Never underestimate tidal fading -- twice a day, wireless signals over water will be amazing, and will completely disappear. We should have known!</p></li></ul><p>All anecdotes aside, the best policies and practices are non-trivial -- but because of so many prior community efforts, and organizations such as <a href="https://www.internetsociety.org/issues/access/">ISOC</a>, the <a href="https://www.apc.org/">APC</a>, the <a href="https://a4ai.org/">A4AI</a>, and more, the challenges and solutions are better understood than ever before.</p>
    <div>
      <h3>How does a community network reach the Internet?</h3>
      <a href="#how-does-a-community-network-reach-the-internet">
        
      </a>
    </div>
    <p>First, we’d like to honor the many organisations we’ve learned from who might say that there are no <i>technical</i> barriers to success. Connections within the community networks may be shaped by geographical features or regional regulations. For example, wireless lines of sight between antenna towers on personal property are guided by hills or restricted by regulations. Similarly, Ethernet cables and fibre deployments are guided by property ownership, digging rights, and the presence or migration of grazing animals that dig into soil and gnaw at cables — yes, they do, even small rabbits.</p><p>Once the community establishes its own area network, the connections to meet Internet services are more conventional, more familiar. In part, the choice is influenced or determined by proximity to Internet exchanges, PoPs, or regional fibre cabinet installations. The connections with community networks fall into three broad categories.</p><p><b>Colocation.</b> A community network may be fortunate enough to have service coverage that overlaps with, or is near to, an Internet eXchange Point (IXP), as shown in the figure below. In this case a natural choice is to colocate a router within the exchange, near to the Internet service provider’s router (labeled as Cloudflare in the figure). Our launch partner <a href="https://www.nycmesh.net/">NYC Mesh</a> connects in this manner. Unfortunately, being that exchanges are most often located in urban settings, colocation is unavailable to many, if not most, community networks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4yA8E4pM9To8f8Cp3Hz7xJ/e2dbbf0a0ce39a2045a2afa6b69eb0a1/Colocation-Community-Network.png" />
            
            </figure><p><b>Conventional point-to-point backhaul.</b> Community networks that are remote must establish a point-to-point backhaul connection to the Internet exchange. This connection method is shown in the figure below in which the community network in the previous figure has moved to the left, and is joined by a physical long-distance link to the Internet service router that remains in the exchange on the right.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ZzArG47FqRbwCM0s4jU5T/6adc585aad03dc29b061ff50d1ac8072/Conventional-point-to-point-backhaul.png" />
            
            </figure><p>Point-to-point backhaul is familiar. If the infrastructure is available -- and this is a big ‘if’ -- then backhaul is most often available from a utility company, such as a telecommunications or energy provider, that may also bundle Internet service as a way to reduce total costs. Even bundled, the total cost is variable and unaffordable to individual community networks, and is exacerbated by distance. Some community networks have succeeded in acquiring backhaul through university, research and education, or publicly-funded networks that are compelled or convinced to offer the service in the public interest. On the west coast of Scotland, for example, <a href="https://www.tegola.org.uk/tegola-history.html">Tegola</a> launched with service from the University of Highlands and Islands and the University of Edinburgh.</p><p><b>Start a backhaul cooperative for point-to-point and colocation.</b> The last connection option we see among our launch partners overcomes the prohibitive costs by forming a cooperative network in which the individual subscriber community networks are also members. The cooperative model can be seen in the figure below. The exchange remains on the right. On the left the community network in the previous figure is now replaced by a collection of community networks that may optionally connect with each other (for example, to establish reliable routing if any link fails). Either directly or indirectly via other community networks, each of these community networks has a connection to a remote router at the near-end of the point-to-point connection. Crucially, the point-to-point backhaul service -- as well as the co-located end-points -- are owned and operated by the cooperative. In this manner, an otherwise expensive backhaul service is made affordable by being a shared cost.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Z87gKX4VyktNOkRqFCLhp/ab2e1d519d15fd892a854f81271b45c1/Launch-a-backhaul-cooperative-for-point-to-point-and-colocation.png" />
            
            </figure><p>Two of our launch partners, <a href="https://guifi.net/">Guifi.net</a> and <a href="https://hubs.net.uk/">HUBS c.i.c.</a>, are organised this way and their 10+ years in operation demonstrate both success and sustainability. Since the backhaul provider is a cooperative, the community network members have a say in the ways that revenue is saved, spent, and — best of all — reinvested back into the service and infrastructure.</p>
    <div>
      <h3>Why is Cloudflare doing this?</h3>
      <a href="#why-is-cloudflare-doing-this">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet, for <i>everyone</i>, not just those with privileged access based on their geographical location. Project Pangea aligns with this mission by extending the Internet we’re helping to build — a faster, more reliable, more secure Internet — to otherwise underserved communities.</p>
    <div>
      <h3>How can my community network get involved?</h3>
      <a href="#how-can-my-community-network-get-involved">
        
      </a>
    </div>
    <p>Check out our <a href="http://www.cloudflare.com/pangea">landing page</a> to learn more and apply for Project Pangea today.</p>
    <div>
      <h3>The ‘community’ in Cloudflare</h3>
      <a href="#the-community-in-cloudflare">
        
      </a>
    </div>
    <p>Lastly, in a blog post about community networks, we feel it is appropriate to acknowledge the ‘community’ at Cloudflare: Project Pangea is the culmination of multiple projects, and multiple peoples’ hours, effort, dedication, and community spirit. Many, many thanks to all.</p><p>______</p><p><sup>1</sup>For eligible networks, free up to 5Gbps at p95 levels.</p> ]]></content:encoded>
            <category><![CDATA[Impact Week]]></category>
            <category><![CDATA[Project Pangea]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Magic Firewall]]></category>
            <category><![CDATA[Network Interconnect]]></category>
            <guid isPermaLink="false">1QJVpfsZRMaJn1UAqQfa15</guid>
            <dc:creator>Marwan Fayed</dc:creator>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Interconnect Anywhere — Reach Cloudflare’s network from 1,600+ locations]]></title>
            <link>https://blog.cloudflare.com/interconnect-anywhere/</link>
            <pubDate>Fri, 11 Jun 2021 14:00:58 GMT</pubDate>
            <description><![CDATA[ Today, Cloudflare is excited to announce a new wave of interconnection points and partners that quadruples our interconnectivity. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Customers choose Cloudflare for our network performance, privacy and security.  Cloudflare Network Interconnect is the best on-ramp for our customers to utilize our diverse product suite. In the past, we’ve talked about Cloudflare’s physical footprint in over 200+ data centers, and how Cloudflare Network Interconnect enabled companies <i>in those data centers</i> to connect securely to Cloudflare’s network. Today, Cloudflare is excited to announce expanded partnerships that allows customers to connect to Cloudflare from their own Layer 2 service fabric. There are now over 1,600 locations where enterprise security and network professionals have the option to connect to Cloudflare securely and privately from their existing fabric.</p>
    <div>
      <h2>Interconnect Anywhere is a journey</h2>
      <a href="#interconnect-anywhere-is-a-journey">
        
      </a>
    </div>
    <p>Since we <a href="/cloudflare-network-interconnect/">launched Cloudflare Network Interconnect</a> (CNI) in August 2020, we’ve been focused on extending the availability of Cloudflare’s network to as many places as possible. The initial launch opened up 150 physical locations alongside 25 global partner locations. During Security Week this year, we grew that availability by <a href="/network-onramp-partnerships/">adding data center partners</a> to our CNI Partner Program. Today, we are adding even more connectivity options by expanding Cloudflare availability to <b>all</b> of our partners’ locations, as well as welcoming <a href="https://www.coresite.com/cloud-services/open-cloud-exchange">CoreSite Open Cloud Exchange (OCX</a>) and <a href="https://epsilontel.com/infiny/">Infiny by Epsilon</a> into our <a href="https://www.cloudflare.com/network-interconnect-partnerships/">CNI Partner Program</a>. This totals 1,638 locations where our customers can now connect securely to the Cloudflare network. As we continue to expand, customers are able to connect the fabric of their choice to Cloudflare from a growing list of data centers.</p>
<table>
<thead>
  <tr>
    <th><b>Fabric Partner</b></th>
    <th><b>Enabled Locations</b></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td>PacketFabric</td>
    <td>180+</td>
  </tr>
  <tr>
    <td>Megaport</td>
    <td>700+</td>
  </tr>
  <tr>
    <td>Equinix Fabric</td>
    <td>46+</td>
  </tr>
  <tr>
    <td>Console Connect</td>
    <td>440+</td>
  </tr>
  <tr>
    <td>CoreSite Open Cloud Exchange</td>
    <td>22+</td>
  </tr>
  <tr>
    <td>Infiny by Epsilon </td>
    <td>250+</td>
  </tr>
</tbody>
</table>
<p></p><blockquote><p><i>“We are excited to expand our partnership with Cloudflare to ensure that our mutual customers can benefit from our carrier-class Software Defined Network (SDN) and Cloudflare's network security in all Packetfabric locations. Now customers can easily connect from wherever they are located to access best of breed security services alongside Packetfabric's Cloud Connectivity options.”</i>- <b>Alex Henthorn-Iwane, PacketFabric's Chief Marketing Officer</b></p></blockquote><blockquote><p><i>"With the significant rise in DDoS attacks over the past year, it's becoming ever more crucial for IT and Operations teams to prevent and mitigate network security threats. We're thrilled to enable Cloudflare Interconnect everywhere on Megaport's global Software Defined Network, which is available in over 700 enabled locations in 24 countries worldwide. Our partnership will give organizations the ability to reduce their exposure to network attacks, improve customer experiences, and simplify their connectivity across our private on-demand network in a matter of a few mouse clicks."</i><i>-</i> <b>Misha Cetrone, Megaport VP of Strategic Partnerships</b></p></blockquote><blockquote><p><i>“Expanding the connectivity options to Cloudflare ensures that customers can provision hybrid architectures faster and more easily, leveraging enterprise-class network services and automation on the Open Cloud Exchange. Simplifying the process of establishing modern networks helps achieve critical business objectives, including reducing total cost of ownership, and improving business agility as well as interoperability.”</i><i>-</i> <b>Brian Eichman, CoreSite Senior Director of Product Development</b></p></blockquote><blockquote><p><i>“Partner accessibility is key in our cloud enablement and interconnection strategy. We are continuously evolving to offer our customers and partners simple and secure connectivity no matter where their network resides in the world. Infiny enables access to Cloudflare from across a global footprint while delivering high-quality cloud connectivity solutions at scale. Customers and partners gain an innovative Network-as-a-Service SDN platform that supports them with programmable and automated connectivity for their cloud and networking needs.”</i>- <b>Mark Daley, Epsilon Director of Digital Strategy</b></p></blockquote>
    <div>
      <h2>Uncompromising security and increased reliability from your choice of network fabric</h2>
      <a href="#uncompromising-security-and-increased-reliability-from-your-choice-of-network-fabric">
        
      </a>
    </div>
    <p>Now, companies can connect to Cloudflare’s suite of network and security products without traversing shared public networks by taking advantage of software-defined networking providers. No matter where a customer is connected to one of our fabric partners, Cloudflare’s 200+ data centers ensure that world-class <a href="https://www.cloudflare.com/network-security/">network security</a> is close by and readily available via a secure, low latency, and cost-effective connection. An increased number of locations further allows customers to have multiple secure connections to the Cloudflare network, increasing redundancy and reliability. As we further expand our global network and increase the number of data centers where Cloudflare and our partners are connected, latency becomes shorter and customers will reap the benefits.</p><p>Let’s talk about how a customer can use Cloudflare Network Interconnect to improve their security posture through a fabric provider.</p>
    <div>
      <h2>Plug and Play Fabric connectivity</h2>
      <a href="#plug-and-play-fabric-connectivity">
        
      </a>
    </div>
    <p>Acme Corp is an example company that wants to deliver highly performant digital services to their customers and ensure employees can securely connect to their business apps from anywhere. They’ve purchased Magic Transit and Cloudflare Access and are evaluating Magic WAN to secure their network while getting the performance Cloudflare provides. They want to avoid potential network traffic congestion and latency delays, so they have designed a network architecture with their <a href="https://www.cloudflare.com/learning/network-layer/what-is-sdn/">software-defined network</a> fabric and Cloudflare using Cloudflare Network Interconnect.</p><p>With <a href="https://www.cloudflare.com/network-interconnect">Cloudflare Network Interconnect</a>, provisioning this connection is simple. Acme goes to their partner portal, and requests a virtual layer 2 connection to Cloudflare with the bandwidth of their choice. Cloudflare accepts the connection, provides the BGP session establishment information and organizes a turn up call if required. Easy!</p><p>Let’s talk about how Cloudflare and our partners have worked together to simplify the interconnectivity experience for the customer.</p>
    <div>
      <h2>With Cloudflare Network interconnect, availability only gets better</h2>
      <a href="#with-cloudflare-network-interconnect-availability-only-gets-better">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2TpHb5wHpPJ1PWUL86KjvI/0ab8065b2c4aefdae6abd812bbc462f2/image3-6.png" />
            
            </figure><p>Connection Established with Cloudflare Network Interconnect</p><p>When a customer uses CNI to establish a connection between a fabric partner and Cloudflare, that connection runs over layer 2, configured via the partner user interface. Our new partnership model allows customers to connect privately and securely to Cloudflare’s network <i>even when the customer is not located in the same data center</i> as Cloudflare.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6dXgp5HIAzYpWRzLKOYp4T/8cc71bc8e0b79cd2f5bac891262db497/image1-6.png" />
            
            </figure><p>Shorter Customer Path with New Partner Locations‌‌</p><p>The diagram above shows a shorter customer path thanks to an incremental partner-enabled location. Every time Cloudflare brings a new data center online and connects with a partner fabric, all customers in that region immediately benefit from the closer proximity and reduced latency.</p>
    <div>
      <h2>Network fabrics in action</h2>
      <a href="#network-fabrics-in-action">
        
      </a>
    </div>
    <p>For those who want to self-serve, we’ve published documentation that details the steps in provisioning these connections. You can find the steps for each partner below:</p><ul><li><p><a href="https://developers.cloudflare.com/network-interconnect/partners/packet-fabric">PacketFabric Documentation</a></p></li><li><p><a href="https://developers.cloudflare.com/network-interconnect/partners/megaport">Megaport Documentation</a></p></li><li><p><a href="https://developers.cloudflare.com/network-interconnect/partners/console-connect">Console Connect Documentation</a></p></li><li><p><a href="https://developers.cloudflare.com/network-interconnect/partners/equinix-fabric">Equinix Fabric Documentation</a></p></li><li><p>CoreSite Documentation (Coming soon…)</p></li><li><p>Epsilon Documentation (Coming soon…)</p></li></ul><p>As we expand our network, it’s critical we provide more ways to allow our customers to connect easily. We will continue to shorten the time it takes to set up a new interconnection, drive down costs, strengthen security and improve customer experience with all of our <a href="https://www.cloudflare.com/network-onramp-partners/">Network On-Ramp partners</a>.</p><p>If you are using one of our software-defined networking partners and would like to connect to Cloudflare via their fabric, contact your fabric partner account team or reach out to us using the <a href="https://www.cloudflare.com/network-interconnect/">Cloudflare Network Interconnect page</a>. If you are not using a fabric today, but would like to take advantage of software-defined networking to connect to Cloudflare, reach out to your account team.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Network]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Network Interconnect]]></category>
            <guid isPermaLink="false">7AEMSvM8PA7vJGZpOH9bCh</guid>
            <dc:creator>Matt Lewis</dc:creator>
            <dc:creator>David Tuber</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare Network Interconnect]]></title>
            <link>https://blog.cloudflare.com/cloudflare-network-interconnect/</link>
            <pubDate>Tue, 04 Aug 2020 13:00:00 GMT</pubDate>
            <description><![CDATA[ We’re excited to announce Cloudflare Network Interconnect (CNI). CNI allows customers to connect branch and HQ locations with Cloudflare wherever they are. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today we’re excited to announce <a href="http://www.cloudflare.com/network-interconnect">Cloudflare Network Interconnect</a> (CNI). CNI allows our customers to <a href="https://www.cloudflare.com/learning/network-layer/what-is-branch-networking/">interconnect branch and HQ locations</a> directly with Cloudflare wherever they are, bringing Cloudflare’s full suite of network functions to their physical network edge. Using CNI to interconnect provides security, reliability, and performance benefits vs. using the public Internet to connect to Cloudflare. And because of Cloudflare’s global network reach, connecting to our network is straightforward no matter where on the planet your infrastructure and employees are.</p><p>At its most basic level, an interconnect is a link between two networks. Today, we’re offering customers the following options to interconnect with Cloudflare’s network:</p><ul><li><p>Via a private network interconnect (PNI). A physical cable (or a virtual “pseudo-wire”; more on that later) that connects two networks.</p></li><li><p>Over an Internet Exchange (IX). A common switch fabric where multiple Internet Service Providers (ISPs) and Internet networks can interconnect with each other.</p></li></ul><p>To use a real world analogy: Cloudflare over the years has built a network of highways across the Internet to handle all our customers' traffic. We’re now providing dedicated on-ramps for our customers’ on-prem networks to get onto those highways.</p>
    <div>
      <h2>Why interconnect with Cloudflare?</h2>
      <a href="#why-interconnect-with-cloudflare">
        
      </a>
    </div>
    <p>CNI provides more reliable, faster, and more private connectivity between your infrastructure and Cloudflare’s. This delivers benefits across our product suite. Here are some examples of specific products and how you can combine them with CNI:</p><ul><li><p><b>Cloudflare Access</b>: Cloudflare Access replaces corporate VPNs with Cloudflare’s network. Instead of placing internal tools on a private network, teams deploy them in any environment, including hybrid or multi-cloud models, and secure them consistently with Cloudflare’s network. CNI allows you to bring your own <a href="https://www.cloudflare.com/learning/network-layer/what-is-mpls/">MPLS network</a> to meet ours, allowing your employees to connect to your network <a href="https://www.cloudflare.com/network-services/solutions/enterprise-network-security/">securely</a> and quickly no matter where they are.</p></li><li><p><b>CDN</b>: Cloudflare’s CDN places content closer to visitors, improving site speed while minimizing origin load. CNI improves cache fill performance and reduces costs.</p></li><li><p><b>Magic Transit</b>: Magic Transit protects datacenter and branch networks from unwanted attack and malicious traffic. Pairing Magic Transit with CNI decreases jitter and drives throughput improvements, and further hardens infrastructure from attack.</p></li><li><p><b>Cloudflare Workers</b>: Workers is Cloudflare’s serverless compute platform. Integrating with CNI provides a secure connection to serverless cloud compute that does not traverse the public Internet, allowing customers to use Cloudflare’s unique set of Workers services with tighter network performance tolerances.</p></li></ul><p>Let’s talk more about how CNI delivers these benefits.</p>
    <div>
      <h2>Improving performance through interconnection</h2>
      <a href="#improving-performance-through-interconnection">
        
      </a>
    </div>
    <p>CNI is a great way to boost performance for many existing Cloudflare products. By utilizing CNI and setting up interconnection with Cloudflare wherever a customer’s origin infrastructure is, customers can get increased performance and security at lower cost than using public transit providers.</p>
    <div>
      <h3>CNI makes things faster</h3>
      <a href="#cni-makes-things-faster">
        
      </a>
    </div>
    <p>As an example of the performance improvements network interconnects can deliver for Cloudflare customers, consider an HTTP application workload which flows through Cloudflare’s CDN and <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a>. Many of our customers rely on our CDN to make their HTTP applications more responsive.</p><p>Cloudflare caches content very close to end users to provide the best performance possible. But, if content is not in cache, Cloudflare edge PoPs must contact the origin server to retrieve cacheable content. This can be slow, and places more load on an origin server compared to serving directly from cache.</p><p>With CNI, these origin pulls can be completed over a dedicated link, improving throughput and reducing overall time needed for origin pulls. Using Argo Tiered Cache, customers can manage tiered cache topologies and specify upstream cache tiers that correspond with locations where network interconnects are in place. Using Tiered Cache in this fashion lowers origin loads and increases cache hit rates, thereby improving performance and reducing origin infrastructures costs.</p><p>Here’s anonymized and sampled data from a real Cloudflare customer who recently provisioned interconnections between our network and theirs to further improve performance. Heavy users of our <a href="https://www.cloudflare.com/learning/cdn/what-is-a-cdn/">CDN</a>, they were able to shave off precious milliseconds from their origin <a href="https://www.cloudflare.com/learning/cdn/glossary/round-trip-time-rtt/">round trip time (RTT)</a> by adding PNIs in multiple locations.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/287Nl0Br3mV3gk7LaJldXK/533d139d62445b94c351bf1279a1cccc/Htmu4K3SVLYb5MLATaPHr1qv1aXV4033MS-rSKi8dKF4R8QUpW5mz7r0sOIhn94-4ljQm7fgnp0xXpqklh2tSM970ysEefBv5U66_Dci7Kw0setb3dzHqsV0rkJP.png" />
            
            </figure><p>As an example, their 90th percentile round trip time in Warsaw, Poland decreased by 6.5ms as a result of provisioning a private network interconnect (from 7.5ms to 1ms), which is a performance win of 87%!  The jitter (variation in delay in received packets) on the link decreased from 82.9 to 0.3, which speaks to the dedicated, reliable nature of the link. CNI helps deliver reliable and performant network connectivity to your customers and employees.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1IwhsdcF3frstere5VBOqR/c61862b89647b1c3a1065a9dd96270bf/V8TPtdGC1OLm3ND8mRE9soZyNNo0E2voDjDdxcJYGu0s56VuVU49jg6yLcNpMNiv2UuXHS2tm7vkJac9tIgkEsHaq4F2PFRu_DmwZA94TQNmpmylXnt9LCtchu9x.png" />
            
            </figure>
    <div>
      <h2>Enhanced security through private connectivity</h2>
      <a href="#enhanced-security-through-private-connectivity">
        
      </a>
    </div>
    <p>Customers with large on-premise networks want to move to the cloud: it’s cheaper, less hassle, and less overhead and maintenance.  However, customers want to also preserve their existing security and threat models.</p><p>Traditionally, CIOs trying to connect their IP networks to the Internet do so in two steps:</p><ol><li><p>Source connectivity to the Internet from transit providers (ISPs).</p></li><li><p>Purchase, operate, and maintain network function specific hardware appliances. Think hardware load balancers, firewalls, DDoS mitigation equipment, <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-wan/">WAN</a> optimization, and more.</p></li></ol><p>CNI allows CIOs to provision security services on Cloudflare and connect their existing networks to Cloudflare in a way that bypasses the public Internet.  Because Cloudflare integrates with on-premise networks and the cloud, customers can enforce security policies across both networks and create a consistent, secure boundary.</p><p>CNI increases cloud and <a href="https://www.cloudflare.com/learning/network-layer/network-security/">network security</a> by providing a private, dedicated link to the Cloudflare network. Since this link is reserved exclusively for the customer that provisions it, the customer’s traffic is isolated and private.</p>
    <div>
      <h3>CNI + Magic Transit: Removing public Internet exposure</h3>
      <a href="#cni-magic-transit-removing-public-internet-exposure">
        
      </a>
    </div>
    <p>To use a product-specific example: through CNI’s integration with Magic Transit, customers can take advantage of private connectivity to minimize exposure of their network to the public Internet.</p><p>Magic Transit attracts customers’ IP traffic to our data centers by advertising their IP addresses from our edge via BGP. When traffic arrives, it’s filtered and sent along to customers’ data centers. Before CNI, all Magic Transit traffic was sent from Cloudflare to customers via Generic Routing Encapsulation (GRE) tunnels over the Internet. Because GRE endpoints are publicly routable, there is some risk these endpoints could be discovered and attacked, bypassing Cloudflare’s DDoS mitigation and security tools.</p><p>Using CNI removes this exposure to the Internet. Advantages of using CNI with Magic Transit include:</p><ul><li><p><b>Reduced threat exposure</b>. Although there are many steps companies can take to increase network security, some risk-sensitive organizations prefer not to expose endpoints to the public Internet at all. CNI allows Cloudflare to absorb that risk and forward only clean traffic (via Magic Transit) through a truly private interface.</p></li><li><p><b>Increased reliability</b>. Traffic traveling over the public Internet is subject to factors outside of your control, including latency and packet loss on intermediate networks. Removing steps between Cloudflare’s network and yours means that after Magic Transit processes traffic, it’s forwarded directly and reliably to your network.</p></li><li><p><b>Simplified configuration</b>. Soon, Magic Transit + CNI customers will have the option to skip making MSS (maximum segment size) changes when onboarding, a step that’s required for GRE-over-Internet and can be challenging for customers who need to consider their downstream customers’ MSS as well (eg. <a href="https://www.cloudflare.com/magic-transit/service-providers/">service providers</a>).</p></li></ul>
    <div>
      <h3>Example deployment: Penguin Corp uses Cloudflare for Teams, Magic Transit, and CNI to protect branch and core networks, and employees.</h3>
      <a href="#example-deployment-penguin-corp-uses-cloudflare-for-teams-magic-transit-and-cni-to-protect-branch-and-core-networks-and-employees">
        
      </a>
    </div>
    <p>Imagine Penguin Corp, a hypothetical company, has a fully connected private MPLS network.  Maintaining their network is difficult and they have a dedicated team of network engineers to do this.  They are currently paying a lot of money to run their own private cloud. To minimize costs, they limit their network egress points to two worldwide.  This creates a major performance problem for their users, whose bits have to travel a long way to accomplish basic tasks while still traversing Penguin’s network boundary.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3TUgsWNvoBS5Hawy0cMQYw/c1565c1a37cdddb871e0464242aa7f65/_phA04NIplQYLGFp6NKPYCagymhemaHQBhFlYT_cX7lxV0QgVMt4g_W7eELJIfSufyH0iPiQZzWPQATMDHSul5Wcv3pDHTNqZI4wkTxcv787Lko8-F6cnGhXqaAy.png" />
            
            </figure><p><a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE (Secure Access Service Edge)</a> models look attractive to them, because they can, in theory, move away from their traditional MPLS network and move towards the cloud.  SASE deployments provide firewall, DDoS mitigation, and encryption services at the network edge, and bring security as a service to any cloud deployment, as seen in the diagram below:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5bwvqPDkbxBDPVfgJQSZ1g/326d5142f02a3d6c87efda8367a02f8f/4nyBvpgo5-gvehuP51_4TIU_LPPADT3Dw3Tw4HvdMxxbuPAYgz-ewgbg8ervMqgP_eQgf94Vl7MQdzqeu7LtIlAHuAlGpg1LOa35WmUbFQvvX6PD3lnwk0eMhBGe.png" />
            
            </figure><p>CNI allows Penguin to use Cloudflare as their true network edge, hermetically sealing their branch office locations and datacenters from the Internet. Penguin can adapt to a SASE-like model while keeping exposure to the public Internet at zero. Penguin establishes PNIs with Cloudflare from their branch office in San Jose to Cloudflare’s San Jose location to take advantage of Cloudflare for Teams, and from their core colocation facility in Austin to Cloudflare’s Dallas location to use Magic Transit to protect their core networks.</p><p>Like Magic Transit, Cloudflare for Teams replaces traditional security hardware on-premise with Cloudflare’s global network. Customers who relied on VPN appliances to reach internal applications can instead connect securely through Cloudflare Access. Organizations maintaining physical web gateway boxes can send Internet-bound traffic to Cloudflare Gateway for filtering and logging.</p><p>Cloudflare for Teams services run in every Cloudflare data center, bringing filtering and authentication closer to your users and locations to avoid compromising performance. CNI improves that even further with a direct connection from your offices to Cloudflare. With a simple configuration change, all branch traffic reaches Cloudflare’s edge where Cloudflare for Teams policies can be applied. The link improves speed and reliability for users and replaces the need to backhaul traffic to centralized filtering appliances.</p><p>Once interconnected this way, Penguin’s network and employees realize two benefits:</p><ol><li><p>They get to use Cloudflare’s full set of security services without having to provision expensive and centralized physical or virtualized network appliances.</p></li><li><p>Their security and performance services are running across Cloudflare’s global network in over 200 cities. This brings performance and usability improvements for users by putting security functions closer to them.</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4IBu3f64CyIACsK0f396K7/84f7ade0b504288e930c9a711b4d10c7/PVOb8h-7FT_nAHjY8nZ8RX8equpfCMRCj260_6anOjpmSvMbDc9W5AtUGXH-91k3EVpw8fyeEwPVsR2O--gs1AchU3kvLS10JwvWnHaKBcTw0nLj2iGogXcPApCu.png" />
            
            </figure>
    <div>
      <h2>Scalable, global, and flexible interconnection options</h2>
      <a href="#scalable-global-and-flexible-interconnection-options">
        
      </a>
    </div>
    <p>CNI offers a big benefit to customers because it allows them to take advantage of our global footprint spanning 200+ cities: their branch office and datacenter infrastructure can connect to Cloudflare wherever they are.</p><p>This matters for two reasons: our globally distributed network makes it easier to interconnect locally, no matter where a customer’s branches and core infrastructure is, and allows for a globally distributed workforce to interact with our edge network with low latency and improved performance.</p><p><b>Customers don’t have to worry about securely expanding their network footprint: that’s our job.</b></p><p>To this point, global companies need to interconnect at <i>many</i> points around the world. Cloudflare Network Interconnect is priced for global network scale: <b>Cloudflare doesn't charge anything for enterprise customers to provision CNI.</b> Customers may need to pay for access to an interconnection platform or a datacenter cross-connect. We’ll work with you and any other parties involved to make the ordering and provisioning process as smooth as possible.</p><p>In other words, CNI’s pricing is designed to accommodate complicated enterprise network topologies <i>and</i> modern IT budgets.</p>
    <div>
      <h2>How to interconnect</h2>
      <a href="#how-to-interconnect">
        
      </a>
    </div>
    <p>Customers can interconnect with Cloudflare in one of three ways: over a private network interconnect (PNI), over an IX, or through one of our interconnection platform partners. We have worked closely with our global partners to meet our customers where they are and how they want.</p>
    <div>
      <h3>Private Network Interconnects</h3>
      <a href="#private-network-interconnects">
        
      </a>
    </div>
    <p>Private Network Interconnects are available at <a href="https://www.peeringdb.com/net/4224">any of our listed private peering facilities</a>. Getting a physical connection to Cloudflare is easy: specify where you want to connect, port speeds, and target VLANs. From there, we’ll authorize it, you’ll place the order, and let us do the rest.  Customers should choose PNI as their connectivity option if they want higher throughput than a virtual connection or connection over an IX, or want to eliminate as many intermediaries from an interconnect as possible.</p>
    <div>
      <h3>Internet Exchanges</h3>
      <a href="#internet-exchanges">
        
      </a>
    </div>
    <p>Customers who want to use existing Internet Exchanges can interconnect with us <a href="https://bgp.he.net/AS13335#_ix">at any of the 235+ Internet Exchanges we</a> participate in. To connect with Cloudflare via an Internet Exchange, follow the IX’s instructions to connect, and Cloudflare will spin up our side of the connection.  Customers should choose Internet Exchanges as their connectivity option if they are either already peered at an IX, or they want to interconnect in a place where an interconnection platform isn’t present.</p>
    <div>
      <h3>Interconnection Platform Partners</h3>
      <a href="#interconnection-platform-partners">
        
      </a>
    </div>
    <p>Cloudflare is proud to be <a href="/cloudflare-network-interconnect-partner-program">partnering</a> with Equinix, Megaport, PCCW ConsoleConnect, PacketFabric, and Zayo to provide you with easy ways to virtually connect with us in any of the partner-supported locations. Customers should choose to connect with an interconnection platform if they are already using these providers or want a quick and easy way to onboard onto a secure cloud experience.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/j5CnoAvfpScBQcOPnaGzd/a54842cf5761f5d8caeda5ae886ba9a5/Gx7j3XMupKYaPdQoHPaCf7XsWSaQviOz6UM0LXL8USuCWMKLM0hkeCYXJm-8CJNJR73o6CVfTOSJgtlCXvDnGPkUAgQ6ncdWvgniQcdUELOrsZratj3klRo2DWL-.png" />
            
            </figure><p>If you’re interested in learning more, please see <a href="/cloudflare-peering-portal-beta/">this blog post</a> about all the different ways you can interconnect. For all of the interconnect methodologies described above, the BGP session establishment and IP routing are the same. The only thing that is different is the physical way in which we interconnect with other networks.</p>
    <div>
      <h2>How do I find the best places to interconnect?</h2>
      <a href="#how-do-i-find-the-best-places-to-interconnect">
        
      </a>
    </div>
    <p>Our <a href="https://www.cloudflare.com/network-interconnect">product page</a> for CNI includes tools to better understand the right places for your network to interconnect with ours.  Customers can use this data to help figure out the optimal place to interconnect to have the most connectivity with other cloud providers and other ISPs in general.</p>
    <div>
      <h2>What’s the difference between CNI and peering?</h2>
      <a href="#whats-the-difference-between-cni-and-peering">
        
      </a>
    </div>
    <p>Technically, peering and CNI use similar mechanisms and technical implementations behind the scenes.</p><p>We have had an open peering policy for years with any network and will continue to abide by that policy: it allows us to help build a better Internet for everyone by interconnecting networks together, making the Internet more reliable. Traditional networks use interconnect/peering to drive better performance for their customers and connectivity while driving down costs. With CNI, we are opening up our infrastructure to extend the same benefits to our customers as well.</p>
    <div>
      <h2>How do I learn more?</h2>
      <a href="#how-do-i-learn-more">
        
      </a>
    </div>
    <p>CNI provides customers with better performance, reliability, scalability, and security than using the public Internet. A customer can interconnect with Cloudflare in any of our physical locations today, getting dedicated links to Cloudflare that deliver security benefits and more stable latency, jitter, and available bandwidth through each interconnection point.</p><p>Contact our enterprise sales team about adding Cloudflare Network Interconnect to your existing offerings.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Network]]></category>
            <category><![CDATA[Network Interconnect]]></category>
            <guid isPermaLink="false">61ZDd2XSk7Wlt1CaO5s3sT</guid>
            <dc:creator>David Tuber</dc:creator>
        </item>
    </channel>
</rss>