<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Cloudflare changelogs | Cloudflare WAN</title><description>Cloudflare changelogs for Cloudflare WAN</description><link>https://developers.cloudflare.com/changelog/</link><item><title>Cloudflare One, Cloudflare WAN, Cloudflare Network Firewall, Network Flow - Cloudflare One Product Name Updates</title><link>https://developers.cloudflare.com/changelog/post/2026-02-17-product-name-updates/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-02-17-product-name-updates/</guid><description>&lt;p&gt;We are updating naming related to some of our Networking products to better clarify their place in the Zero Trust and Secure Access Service Edge (SASE) journey.&lt;/p&gt;
&lt;p&gt;We are retiring some older brand names in favor of names that describe exactly what the products do within your network. We are doing this to help customers build better, clearer mental models for comprehensive SASE architecture delivered on Cloudflare.&lt;/p&gt;
&lt;h4&gt;What&apos;s changing&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Magic WAN&lt;/strong&gt; → &lt;strong&gt;Cloudflare WAN&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Magic WAN IPsec&lt;/strong&gt; → &lt;strong&gt;Cloudflare IPsec&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Magic WAN GRE&lt;/strong&gt; → &lt;strong&gt;Cloudflare GRE&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Magic WAN Connector&lt;/strong&gt; → &lt;strong&gt;Cloudflare One Appliance&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Magic Firewall&lt;/strong&gt; → &lt;strong&gt;Cloudflare Network Firewall&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Magic Network Monitoring&lt;/strong&gt; → &lt;strong&gt;Network Flow&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Magic Cloud Networking&lt;/strong&gt; → &lt;strong&gt;Cloudflare One Multi-cloud Networking&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;No action is required by you&lt;/strong&gt; — all functionality, existing configurations, and billing will remain exactly the same.&lt;/p&gt;
&lt;p&gt;For more information, visit the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/&quot;&gt;Cloudflare One documentation&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 17 Feb 2026 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Cloudflare WAN</category><category>Cloudflare Network Firewall</category><category>Network Flow</category></item><item><title>Cloudflare WAN - Anycast IPs displayed on the dashboard</title><link>https://developers.cloudflare.com/changelog/post/2026-02-12-anycast-ips-on-dashboard/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-02-12-anycast-ips-on-dashboard/</guid><description>&lt;p&gt;Cloudflare WAN now displays your Anycast IP addresses directly in the dashboard when you configure IPsec or GRE tunnels.&lt;/p&gt;
&lt;p&gt;Previously, customers received their Anycast IPs during onboarding or had to retrieve them with an API call. The dashboard now pre-loads these addresses, reducing setup friction and preventing configuration errors.&lt;/p&gt;
&lt;p&gt;No action is required. All Cloudflare WAN customers can see their Anycast IPs in the tunnel configuration form automatically.&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/manually/how-to/configure-tunnel-endpoints/&quot;&gt;Configure tunnel endpoints&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 12 Feb 2026 00:00:00 GMT</pubDate><product>Cloudflare WAN</product><category>Cloudflare WAN</category></item><item><title>Cloudflare One, Cloudflare WAN - Post-quantum encryption support for Cloudflare One Appliance</title><link>https://developers.cloudflare.com/changelog/post/2026-02-11-appliance-post-quantum-encryption/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-02-11-appliance-post-quantum-encryption/</guid><description>&lt;p&gt;Cloudflare One Appliance version 2026.2.0 adds &lt;a href=&quot;https://developers.cloudflare.com/ssl/post-quantum-cryptography/&quot;&gt;post-quantum encryption&lt;/a&gt; support using hybrid ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism).&lt;/p&gt;
&lt;p&gt;The appliance now uses TLS 1.3 with hybrid ML-KEM for its connection to the Cloudflare edge. During the TLS handshake, the appliance and the edge share a symmetric secret over the TLS connection and inject it into the ESP layer of IPsec. This protects IPsec data plane traffic against harvest-now, decrypt-later attacks.&lt;/p&gt;
&lt;p&gt;This upgrade deploys automatically to all appliances during their configured interrupt windows with no manual action required.&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/appliance/&quot;&gt;Cloudflare One Appliance&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Cloudflare WAN</category></item><item><title>Cloudflare WAN, Magic Transit, Cloudflare One - BGP over GRE and IPsec tunnels</title><link>https://developers.cloudflare.com/changelog/post/2026-01-30-bgp-over-tunnels/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-01-30-bgp-over-tunnels/</guid><description>&lt;p&gt;Magic WAN and Magic Transit customers can use the Cloudflare dashboard to configure and manage BGP peering between their networks and their Magic routing table when using IPsec and GRE tunnel on-ramps (beta).&lt;/p&gt;
&lt;p&gt;Using BGP peering allows customers to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Automate the process of adding or removing networks and subnets.&lt;/li&gt;
&lt;li&gt;Take advantage of failure detection and session recovery features.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;With this functionality, customers can:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Establish an eBGP session between their devices and the Magic WAN / Magic Transit service when connected via IPsec and GRE tunnel on-ramps.&lt;/li&gt;
&lt;li&gt;Secure the session by MD5 authentication to prevent misconfigurations.&lt;/li&gt;
&lt;li&gt;Exchange routes dynamically between their devices and their Magic routing table.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For configuration details, refer to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/manually/how-to/configure-routes/#configure-bgp-routes&quot;&gt;Configure BGP routes for Magic WAN&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/magic-transit/how-to/configure-routes/#configure-bgp-routes&quot;&gt;Configure BGP routes for Magic Transit&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Fri, 30 Jan 2026 00:00:00 GMT</pubDate><product>Cloudflare WAN</product><category>Cloudflare WAN</category><category>Magic Transit</category><category>Cloudflare One</category></item><item><title>Cloudflare One, Cloudflare WAN - Configure Cloudflare source IPs (beta)</title><link>https://developers.cloudflare.com/changelog/post/2026-01-27-configure-cloudflare-source-ips/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-01-27-configure-cloudflare-source-ips/</guid><description>&lt;p&gt;Cloudflare source IPs are the IP addresses used by Cloudflare services (such as Load Balancing, Gateway, and Browser Isolation) when sending traffic to your private networks.&lt;/p&gt;
&lt;p&gt;For customers using legacy mode routing, traffic to private networks is sourced from public Cloudflare IPs, which may cause IP conflicts. For customers using Unified Routing mode (beta), traffic to private networks is sourced from dedicated, non-Internet-routable private IPv4 range to ensure:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Symmetric routing over private network connections&lt;/li&gt;
&lt;li&gt;Proper firewall state preservation&lt;/li&gt;
&lt;li&gt;Private traffic stays on secure paths&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Key details:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;IPv4&lt;/strong&gt;: Sourced from &lt;code&gt;100.64.0.0/12&lt;/code&gt; by default, configurable to any &lt;code&gt;/12&lt;/code&gt; CIDR&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;IPv6&lt;/strong&gt;: Sourced from &lt;code&gt;2606:4700:cf1:5000::/64&lt;/code&gt; (not configurable)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Affected connectors&lt;/strong&gt;: GRE, IPsec, CNI, WARP Connector, and WARP Client (Cloudflare Tunnel is not affected)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Configuring Cloudflare source IPs requires Unified Routing (beta) and the &lt;code&gt;Cloudflare One Networks Write&lt;/code&gt; permission.&lt;/p&gt;
&lt;p&gt;For configuration details, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/manually/how-to/configure-cloudflare-source-ips/&quot;&gt;Configure Cloudflare source IPs&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 27 Jan 2026 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Cloudflare WAN</category></item><item><title>Magic Transit, Cloudflare Network Firewall, Cloudflare WAN, Network Flow - Network Services navigation update</title><link>https://developers.cloudflare.com/changelog/post/2026-01-15-networking-navigation-update/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-01-15-networking-navigation-update/</guid><description>&lt;p&gt;The Network Services menu structure in Cloudflare&apos;s dashboard has been updated to reflect solutions and capabilities instead of product names. This will make it easier for you to find what you need and better reflects how our services work together.&lt;/p&gt;
&lt;p&gt;Your existing configurations will remain the same, and you will have access to all of the same features and functionality.&lt;/p&gt;
&lt;p&gt;The changes visible in your dashboard may vary based on the products you use. Overall, changes relate to &lt;a href=&quot;https://developers.cloudflare.com/magic-transit/&quot; target=&quot;_blank&quot;&gt;Magic Transit&lt;/a&gt;, &lt;a href=&quot;https://developers.cloudflare.com/magic-wan/&quot; target=&quot;_blank&quot;&gt;Magic WAN&lt;/a&gt;, and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-network-firewall/&quot; target=&quot;_blank&quot;&gt;Magic Firewall&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Summary of changes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A new &lt;strong&gt;Overview&lt;/strong&gt; page provides access to the most common tasks across Magic Transit and Magic WAN.&lt;/li&gt;
&lt;li&gt;Product names have been removed from top-level navigation.&lt;/li&gt;
&lt;li&gt;Magic Transit and Magic WAN configuration is now organized under &lt;strong&gt;Routes&lt;/strong&gt; and &lt;strong&gt;Connectors&lt;/strong&gt;. For example, you will find IP Prefixes under &lt;strong&gt;Routes&lt;/strong&gt;, and your GRE/IPsec Tunnels under &lt;strong&gt;Connectors.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Magic Firewall policies are now called &lt;strong&gt;Firewall Policies.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Magic WAN Connectors and Connector On-Ramps are now referenced in the dashboard as &lt;strong&gt;Appliances&lt;/strong&gt; and &lt;strong&gt;Appliance profiles.&lt;/strong&gt; They can be found under &lt;strong&gt;Connectors &gt; Appliances.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Network analytics, network health, and real-time analytics are now available under &lt;strong&gt;Insights.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Packet Captures are found under &lt;strong&gt;Insights &gt; Diagnostics.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;You can manage your Sites from &lt;strong&gt;Insights &gt; Network health.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;You can find Magic Network Monitoring under &lt;strong&gt;Insights &gt; Network flow&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If you would like to provide feedback, complete &lt;a href=&quot;https://forms.gle/htWyjRsTjw1usdis5&quot; target=&quot;_blank&quot;&gt;this form&lt;/a&gt;. You can also find these details in the January 7, 2026 email titled &lt;strong&gt;[FYI] Upcoming Network Services Dashboard Navigation Update&lt;/strong&gt;.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/networking-overview-and-navigation.CeMgEFaZ_Z20HKl.webp&quot; alt=&quot;Networking Navigation&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;</description><pubDate>Thu, 15 Jan 2026 00:00:00 GMT</pubDate><product>Magic Transit</product><category>Magic Transit</category><category>Cloudflare Network Firewall</category><category>Cloudflare WAN</category><category>Network Flow</category></item><item><title>Cloudflare One, Cloudflare WAN - Breakout traffic visibility via NetFlow</title><link>https://developers.cloudflare.com/changelog/post/2025-12-31-connector-breakout-traffic-netflow/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-12-31-connector-breakout-traffic-netflow/</guid><description>&lt;p&gt;Magic WAN Connector now exports NetFlow data for breakout traffic to Magic Network Monitoring (MNM), providing visibility into traffic that bypasses Cloudflare&apos;s security filtering.&lt;/p&gt;
&lt;p&gt;This feature allows you to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Monitor breakout traffic statistics in the Cloudflare dashboard.&lt;/li&gt;
&lt;li&gt;View traffic patterns for applications configured to bypass Cloudflare.&lt;/li&gt;
&lt;li&gt;Maintain visibility across all traffic passing through your Magic WAN Connector.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For more information, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/analytics/netflow-analytics/&quot;&gt;NetFlow statistics&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Wed, 31 Dec 2025 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Cloudflare WAN</category></item><item><title>Cloudflare One, Cloudflare WAN - Automatic Return Routing (Beta)</title><link>https://developers.cloudflare.com/changelog/post/2025-11-06-automatic-return-routing-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-11-06-automatic-return-routing-beta/</guid><description>&lt;p&gt;Magic WAN now supports Automatic Return Routing (ARR), allowing customers to configure Magic on-ramps (IPsec/GRE/CNI) to learn the return path for traffic flows without requiring static routes.&lt;/p&gt;
&lt;p&gt;Key benefits:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Route-less mode&lt;/strong&gt;: Static or dynamic routes are optional when using ARR.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Overlapping IP space support&lt;/strong&gt;: Traffic originating from customer sites can use overlapping private IP ranges.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Symmetric routing&lt;/strong&gt;: Return traffic is guaranteed to use the same connection as the original on-ramp.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This feature is currently in beta and requires the new Unified Routing mode (beta).&lt;/p&gt;
&lt;p&gt;For configuration details, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/manually/how-to/configure-routes/#configure-automatic-return-routing-beta&quot;&gt;Configure Automatic Return Routing&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 06 Nov 2025 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Cloudflare WAN</category></item><item><title>Cloudflare One, Cloudflare WAN - Designate WAN link for breakout traffic</title><link>https://developers.cloudflare.com/changelog/post/2025-11-06-connector-designate-wan-link-breakout/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-11-06-connector-designate-wan-link-breakout/</guid><description>&lt;p&gt;Magic WAN Connector now allows you to designate a specific WAN port for breakout traffic, giving you deterministic control over the egress path for latency-sensitive applications.&lt;/p&gt;
&lt;p&gt;With this feature, you can:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Pin breakout traffic for specific applications to a preferred WAN port.&lt;/li&gt;
&lt;li&gt;Ensure critical traffic (such as Zoom or Teams) always uses your fastest or most reliable connection.&lt;/li&gt;
&lt;li&gt;Benefit from automatic failover to standard WAN port priority if the preferred port goes down.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This is useful for organizations with multiple ISP uplinks who need predictable egress behavior for performance-sensitive traffic.&lt;/p&gt;
&lt;p&gt;For configuration details, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/appliance/network-options/application-based-policies/breakout-traffic/#designate-wan-ports-for-breakout-apps&quot;&gt;Designate WAN ports for breakout apps&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 06 Nov 2025 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Cloudflare WAN</category></item><item><title>Gateway, Cloudflare WAN, Cloudflare Tunnel for SASE - DNS filtering for private network onramps</title><link>https://developers.cloudflare.com/changelog/post/2025-09-11-dns-filtering-for-private-network-onramps/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-11-dns-filtering-for-private-network-onramps/</guid><description>&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/zero-trust/cloudflare-gateway/#dns-filtering&quot;&gt;Magic WAN&lt;/a&gt; and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/warp-connector/site-to-internet/#configure-dns-resolver-on-devices&quot;&gt;WARP Connector&lt;/a&gt; users can now securely route their DNS traffic to the Gateway resolver without exposing traffic to the public Internet.&lt;/p&gt;
&lt;p&gt;Routing DNS traffic to the Gateway resolver allows DNS resolution and filtering for traffic coming from private networks while preserving source internal IP visibility. This ensures Magic WAN users have full integration with our Cloudflare One features, including &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/resolver-policies/#internal-dns&quot;&gt;Internal DNS&lt;/a&gt; and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/egress-policies/#selector-prerequisites&quot;&gt;hostname-based policies&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;To configure DNS filtering, change your Magic WAN or WARP Connector DNS settings to use Cloudflare&apos;s shared resolver IPs, &lt;code&gt;172.64.36.1&lt;/code&gt; and &lt;code&gt;172.64.36.2&lt;/code&gt;. Once you configure DNS resolution and filtering, you can use &lt;em&gt;Source Internal IP&lt;/em&gt; as a traffic selector in your &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/resolver-policies/&quot;&gt;resolver policies&lt;/a&gt; for routing private DNS traffic to your &lt;a href=&quot;https://developers.cloudflare.com/dns/internal-dns/&quot;&gt;Internal DNS&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 11 Sep 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category><category>Cloudflare WAN</category><category>Cloudflare Tunnel for SASE</category></item><item><title>Cloudflare WAN - Custom IKE ID for IPsec Tunnels</title><link>https://developers.cloudflare.com/changelog/post/2025-09-08-custom-ike-id-ipsec-tunnels/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-08-custom-ike-id-ipsec-tunnels/</guid><description>&lt;p&gt;Now, Magic WAN customers can configure a custom IKE ID for their IPsec tunnels. Customers that are using Magic WAN and a VeloCloud SD-WAN device together can utilize this new feature to create a high availability configuration.&lt;/p&gt;
&lt;p&gt;This feature is available via API only. Customers can read the Magic WAN documentation to learn more about the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/common-settings/custom-ike-id-ipsec/&quot;&gt;Custom IKE ID feature and the API call to configure it&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Mon, 08 Sep 2025 00:00:00 GMT</pubDate><product>Cloudflare WAN</product><category>Cloudflare WAN</category></item><item><title>Cloudflare WAN - Bidirectional tunnel health checks are compatible with all Magic on-ramps</title><link>https://developers.cloudflare.com/changelog/post/2025-09-05-bidirectional-health-check-any-on-ramp/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-05-bidirectional-health-check-any-on-ramp/</guid><description>&lt;p&gt;All bidirectional tunnel health check return packets are accepted by any Magic on-ramp.&lt;/p&gt;
&lt;p&gt;Previously, when a Magic tunnel had a bidirectional health check configured, the bidirectional health check would pass when the return packets came back to Cloudflare over the same tunnel that was traversed by the forward packets.&lt;/p&gt;
&lt;p&gt;There are SD-WAN devices, like VeloCloud, that do not offer controls to steer traffic over one tunnel versus another in a high availability tunnel configuration.&lt;/p&gt;
&lt;p&gt;Now, when a Magic tunnel has a bidirectional health check configured, the bidirectional health check will pass when the return packet traverses over any tunnel in a high availability configuration.&lt;/p&gt;</description><pubDate>Fri, 05 Sep 2025 00:00:00 GMT</pubDate><product>Cloudflare WAN</product><category>Cloudflare WAN</category></item><item><title>Cloudflare WAN - Terraform V5 support for tunnels and routes</title><link>https://developers.cloudflare.com/changelog/post/2025-07-31-terraform-v5-tunnels-routes/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-31-terraform-v5-tunnels-routes/</guid><description>&lt;p&gt;The Cloudflare Terraform provider resources for Cloudflare WAN tunnels and routes now support Terraform provider version 5. Customers using infrastructure-as-code workflows can manage their tunnel and route configuration with the latest provider version.&lt;/p&gt;
&lt;p&gt;For more information, refer to the &lt;a href=&quot;https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs&quot; target=&quot;_blank&quot;&gt;Cloudflare Terraform provider documentation&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 31 Jul 2025 00:00:00 GMT</pubDate><product>Cloudflare WAN</product><category>Cloudflare WAN</category></item><item><title>Magic Transit, Cloudflare WAN - Magic Transit and Magic WAN health check data is fully compatible with the CMB EU setting.</title><link>https://developers.cloudflare.com/changelog/post/2025-07-30-mt-mwan-health-check-cmb-eu/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-30-mt-mwan-health-check-cmb-eu/</guid><description>&lt;p&gt;Today, we are excited to announce that all Magic Transit and Magic WAN customers with CMB EU (&lt;a href=&quot;https://developers.cloudflare.com/data-localization/metadata-boundary/&quot;&gt;Customer Metadata Boundary - Europe&lt;/a&gt;) enabled in their account will be able to access GRE, IPsec, and CNI health check and traffic volume data in the Cloudflare dashboard and via API.&lt;/p&gt;
&lt;p&gt;This ensures that all Magic Transit and Magic WAN customers with CMB EU enabled will be able to access all Magic Transit and Magic WAN features.&lt;/p&gt;
&lt;p&gt;Specifically, these two GraphQL endpoints are now compatible with CMB EU:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;magicTransitTunnelHealthChecksAdaptiveGroups&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;magicTransitTunnelTrafficAdaptiveGroups&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Wed, 30 Jul 2025 00:00:00 GMT</pubDate><product>Magic Transit</product><category>Magic Transit</category><category>Cloudflare WAN</category></item><item><title>Cloudflare One, Cloudflare WAN - Virtual Cloudflare One Appliance with KVM support (open beta)</title><link>https://developers.cloudflare.com/changelog/post/2025-07-21-virtual-appliance-kvm-proxmox/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-21-virtual-appliance-kvm-proxmox/</guid><description>&lt;p&gt;The KVM-based virtual Cloudflare One Appliance is now in open beta with official support for Proxmox VE.&lt;/p&gt;
&lt;p&gt;Customers can deploy the virtual appliance on KVM hypervisors to connect branch or data center networks to Cloudflare WAN without dedicated hardware.&lt;/p&gt;
&lt;p&gt;For setup instructions, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/appliance/configure-virtual-appliance/&quot;&gt;Configure a virtual Cloudflare One Appliance&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Mon, 21 Jul 2025 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Cloudflare WAN</category></item><item><title>Cloudflare One, Cloudflare WAN - Cloudflare One Appliance supports multiple DNS server IPs</title><link>https://developers.cloudflare.com/changelog/post/2025-04-30-appliance-multiple-dns-servers/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-04-30-appliance-multiple-dns-servers/</guid><description>&lt;p&gt;Cloudflare One Appliance DHCP server settings now support specifying multiple DNS server IP addresses in the DHCP pool.&lt;/p&gt;
&lt;p&gt;Previously, customers could only configure a single DNS server per DHCP pool. With this update, you can specify multiple DNS servers to provide redundancy for clients at branch locations.&lt;/p&gt;
&lt;p&gt;For configuration details, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/appliance/network-options/dhcp/dhcp-server/&quot;&gt;DHCP server&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Wed, 30 Apr 2025 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Cloudflare WAN</category></item><item><title>Cloudflare WAN - Configure your Magic WAN Connector to connect via static IP assigment</title><link>https://developers.cloudflare.com/changelog/post/2025-02-14-local-console-access/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-02-14-local-console-access/</guid><description>&lt;p&gt;You can now locally configure your &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/appliance/&quot;&gt;Magic WAN Connector&lt;/a&gt; to work in a static IP configuration.&lt;/p&gt;
&lt;p&gt;This local method does not require having access to a DHCP Internet connection. However, it does require being comfortable with using tools to access the serial port on Magic WAN Connector as well as using a serial terminal client to access the Connector&apos;s environment.&lt;/p&gt;
&lt;p&gt;For more details, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/appliance/configure-hardware-appliance/#bootstrap-via-serial-console&quot;&gt;WAN with a static IP address&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Fri, 14 Feb 2025 00:00:00 GMT</pubDate><product>Cloudflare WAN</product><category>Cloudflare WAN</category></item><item><title>Magic Transit, Cloudflare WAN, Network Interconnect - Establish BGP peering over Direct CNI circuits</title><link>https://developers.cloudflare.com/changelog/post/2024-12-17-bgp-support-cni/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2024-12-17-bgp-support-cni/</guid><description>&lt;p&gt;Magic WAN and Magic Transit customers can use the Cloudflare dashboard to configure and manage BGP peering between their networks and their Magic routing table when using a Direct CNI on-ramp.&lt;/p&gt;
&lt;p&gt;Using BGP peering allows customers to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Automate the process of adding or removing networks and subnets.&lt;/li&gt;
&lt;li&gt;Take advantage of failure detection and session recovery features.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;With this functionality, customers can:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Establish an eBGP session between their devices and the Magic WAN / Magic Transit service when connected via CNI.&lt;/li&gt;
&lt;li&gt;Secure the session by MD5 authentication to prevent misconfigurations.&lt;/li&gt;
&lt;li&gt;Exchange routes dynamically between their devices and their Magic routing table.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/manually/how-to/configure-routes/#configure-bgp-routes&quot;&gt;Magic WAN BGP peering&lt;/a&gt; or &lt;a href=&quot;https://developers.cloudflare.com/magic-transit/how-to/configure-routes/#configure-bgp-routes&quot;&gt;Magic Transit BGP peering&lt;/a&gt; to learn more about this feature and how to set it up.&lt;/p&gt;</description><pubDate>Tue, 17 Dec 2024 00:00:00 GMT</pubDate><product>Magic Transit</product><category>Magic Transit</category><category>Cloudflare WAN</category><category>Network Interconnect</category></item><item><title>Access, Browser Isolation, CASB, Cloudflare Tunnel for SASE, Digital Experience Monitoring, Data Loss Prevention, Email security, Gateway, Multi-Cloud Networking, Cloudflare Network Firewall, Network Flow, Magic Transit, Cloudflare WAN, Network Interconnect, Risk Score, Cloudflare One Client - Explore product updates for Cloudflare One</title><link>https://developers.cloudflare.com/changelog/post/2024-06-16-cloudflare-one/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2024-06-16-cloudflare-one/</guid><description>&lt;p&gt;Welcome to your new home for product updates on &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/&quot;&gt;Cloudflare One&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Our &lt;a href=&quot;https://developers.cloudflare.com/changelog/&quot;&gt;new changelog&lt;/a&gt; lets you read about changes in much more depth, offering in-depth examples, images, code samples, and even gifs.&lt;/p&gt;
&lt;p&gt;If you are looking for older product updates, refer to the following locations.&lt;/p&gt;
&lt;details&gt; &lt;summary&gt;&lt;p&gt;Older product updates&lt;/p&gt;
&lt;/summary&gt; &lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/access/&quot;&gt;Access&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/browser-isolation/&quot;&gt;Browser Isolation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/casb/&quot;&gt;CASB&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/tunnel/&quot;&gt;Cloudflare Tunnel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/dlp/&quot;&gt;Data Loss Prevention&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/dex/&quot;&gt;Digital Experience Monitoring&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/email-security/&quot;&gt;Email security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/gateway/&quot;&gt;Gateway&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/multi-cloud-networking/changelog/&quot;&gt;Multi-Cloud Networking&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-network-firewall/changelog/&quot;&gt;Cloudflare Network Firewall&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/network-flow/changelog/&quot;&gt;Magic Network Monitoring&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/magic-transit/changelog/&quot;&gt;Magic Transit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/changelog/&quot;&gt;Magic WAN&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/network-interconnect/changelog/&quot;&gt;Network Interconnect&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/risk-score/&quot;&gt;Risk score&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/changelog/cloudflare-one-client/&quot;&gt;Cloudflare One Client&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt; &lt;/details&gt;</description><pubDate>Sun, 16 Jun 2024 00:00:00 GMT</pubDate><product>Access</product><category>Access</category><category>Browser Isolation</category><category>CASB</category><category>Cloudflare Tunnel for SASE</category><category>Digital Experience Monitoring</category><category>Data Loss Prevention</category><category>Email security</category><category>Gateway</category><category>Multi-Cloud Networking</category><category>Cloudflare Network Firewall</category><category>Network Flow</category><category>Magic Transit</category><category>Cloudflare WAN</category><category>Network Interconnect</category><category>Risk Score</category><category>Cloudflare One Client</category></item></channel></rss>