Network Analytics
Network Analytics gives you real-time visibility into Magic Transit traffic entering and leaving Cloudflare's network through GRE or IPsec tunnels.
Data is aggregated over time intervals that vary based on your selected zoom level. For example, a daily view shows 24-hour averages, which can flatten out short-term traffic spikes. As a result, longer time intervals will display lower peak bandwidth values compared to more granular views like five-minute intervals.
Refer to Network Analytics documentation to learn more.
Magic Transit customers can account for all traffic flows that ingresses Cloudflare's network, is blocked by DDoS rules or Magic Firewall, and egresses Cloudflare's network. This allows customers to track the total packets and bytes that traverse Cloudflare's network and are ultimately destined for their own network. This will also give Magic Transit customers increased visibility into any traffic flows that are unaccounted for.
The complete list of filters includes:
- A list of your top tunnels by traffic volume.
- Traffic source and destination for type of traffic, on-ramps and off-ramps, IP addresses, and ports
- Destination IP ranges and ASNs
- Protocols and packet sizes
- Samples of all GRE or IPsec tunnel traffic entering or leaving Cloudflare's network.
- Mitigations applied (such as DDoS and Magic Firewall) to traffic entering Cloudflare.
Refer below to Access Magic Tunnel traffic analytics to learn how to access these filters.
-
Go to the Cloudflare dashboard ↗ and select your account.
-
Select Analytics & Logs > Network Analytics.
-
In the All Traffic tab, scroll to Top Insights to access network traffic filters. By default, the dashboard shows five items, but you can display up to 25 items at once. Select the drop-down menu to make your change.
-
(Optional) Hover your mouse over one of the types of traffic. You can then choose to filter by that type of traffic or exclude it from the results.
-
You can also apply filters to adjust the scope of information displayed. Scroll to All traffic > Add filter.
-
In the New filter popover, choose what type of data you want to display from the left dropdown menu, an operator from the middle dropdown menu, and an action from the right dropdown menu. For example:
<DESTINATION_TUNNELS> | _equals_ | <NAME_OF_YOUR_TUNNEL>This lets you examine traffic from specific Source tunnels and/or Destination tunnels.
- For Magic Transit customers,
Non-tunnel traffic
will often represent traffic from the public Internet or traffic via CNIs. - For Magic WAN customers,
Non-tunnel traffic
refers to traffic outside of GRE or IPsec tunnels. This can include traffic from:- WARP
- CNIs
- Traffic destined for the public Internet via Gateway
- Traffic destined for applications behind Cloudflare Tunnel
The label Non-Tunnel traffic
is a placeholder, and more specific labels will be applied to this category of traffic in the near future.
Was this helpful?
- Resources
- API
- New to Cloudflare?
- Products
- Sponsorships
- Open Source
- Support
- Help Center
- System Status
- Compliance
- GDPR
- Company
- cloudflare.com
- Our team
- Careers
- 2025 Cloudflare, Inc.
- Privacy Policy
- Terms of Use
- Report Security Issues
- Trademark