Tunnel health checks
A tunnel health check probe consists of an ICMP (Internet Control Message Protocol) ↗ payload encapsulated in the protocol of the tunnel the probe is being conducted for. For example, if the tunnel is an IPsec tunnel, the ICMP packet is encrypted within the Encapsulating Security Payload (ESP) packet of the tunnel.
A tunnel health check probe comes from Cloudflare to the tunnel origin, then returns a response to Cloudflare. This response is used to determine the outcome of the probe, which is used to calculate the state of the tunnel (this is explained in greater detail below).
A tunnel health check probe has important attributes described below.
A tunnel health check probe tests whether Cloudflare can successfully connect to a specific address or endpoint via the tunnel. The target is the address you want to ensure is reachable through the tunnel. This helps verify that the tunnel is functional and traffic can flow properly to the intended destination. It is optional, and there are certain defaults depending on the direction of the health check (refer to Direction for more information).
A tunnel health check probe can have two possible directions — unidirectional and bidirectional.
A unidirectional health check probe stays encapsulated in one direction and comes into the origin via the tunnel (from Cloudflare to the origin). The response comes back to Cloudflare unencapsulated and is routed outside of the tunnel following standard Internet routing.
The target defaults to the publicly routable origin specified as the customer_endpoint
on the tunnel, if present. Otherwise, you can use a custom target.
A bidirectional probe stays encapsulated in both directions, that is, the probe comes in via the tunnel and the response also leaves encapsulated via the tunnel.
By default, these packets are destined for the Cloudflare side of the interface address field set on the tunnel, and are sourced from the client of the tunnel. For example, if the interface address is 10.100.0.8/31
, then the packet will be destined for 10.100.0.9
and sourced from 10.100.0.8
.
Note that the interface address field is always a /30
or /31
CIDR range. In the case of a /31
range, the IP provided will be the Cloudflare side, whereas the other will be the client side. For example, if the interface address is 10.100.0.8/31
, 10.100.0.8
is the Cloudflare side, and 10.100.0.9
is the client side. In the case of a /30
range, the IP provided will be the Cloudflare side whereas the other IP (excluding the broadcast and network identifier) will be the client side. For example, if the interface address is 10.100.0.9/30
, 10.100.0.9
will be the Cloudflare side and 10.100.0.10
will be the client side.
A bidirectional health check can also be configured with a custom public target and is the recommended approach for an Azure Active Standby tunnel setup.
These packets will flow to and from Cloudflare over the tunnels you have configured to provide full visibility into the traffic path between our network and your sites. You will need to configure traffic selectors to accept the health check packets in the case of IPsec tunnels.
Refer to Add tunnels to learn how to configure bidirectional or unidirectional health checks.
For customers using the legacy health check system with a public IP range, Cloudflare recommends:
- Configuring the tunnel health check target IP address to one within the
172.64.240.252/30
prefix range. - Applying a policy-based route that matches packets with a source IP address equal to the configured tunnel health check target (for example
172.64.240.253/32
), and route them over the tunnel back to Cloudflare.
A tunnel health check probe can have two possible types: request and reply. For each type, the source and destination address depends on the direction. Refer to Add tunnels to learn how to change this setting.
In a request style health check the payload probe is an ICMP request.
For a unidirectional probe, the source address is the Cloudflare side of the tunnel (a publicly routable address) and the destination is the origin router (also publicly routable). The origin router receives the probe and produces an ICMP response with the opposite source and destination, and sends it outside of the tunnel.
For a bidirectional probe, the source address is the interface address of the Cloudflare side of the tunnel (a privately routable address) and the destination is the interface address of the tunnel (also privately routable). The origin router receives the probe and produces an ICMP response with the opposite source and destination and sends it into the tunnel.
In a reply style health check the payload probe is an ICMP response.
For a unidirectional probe, the destination address is the Cloudflare side of the tunnel (a publicly routable address) and the source is the origin router (also publicly routable). The origin router receives the probe and sends it back as the response, unchanged, outside of the tunnel.
For a Bidirectional probe, the destination address is the interface address of the Cloudflare side of the tunnel (a privately routable address) and the source is the interface address of the tunnel (also privately routable). The origin router receives the probe packet and sends the probe packet back as the response (unchanged) into the tunnel as the destination is routed via the tunnel.
Attribute | Type | Unidirectional health checks | Bidirectional health checks |
---|---|---|---|
Source Address | Reply Style | Cloudflare Address (Publicly Routable) | Cloudflare Interface Address (Privately Routable) |
Destination Address | Reply Style | Origin Tunnel Endpoint (Publicly Routable) | Origin Interface Address (Privately Routable) / Custom Target |
Source Address | Request Style | Origin Tunnel Endpoint (Publicly Routable) | Origin Interface Address (Privately Routable) / Custom Target |
Destination Address | Reply Style | Cloudflare Address (Publicly Routable) | Cloudflare Interface Address (Privately Routable) |
flowchart TB subgraph Tunnel Healthcheck Probe cloudflare(Cloudflare) --- bare_echo_request([ICMP Echo Request]) bare_echo_request --> tunnel[Tunnel] tunnel --- encapsulated_echo_request([Tunnel Protocol < ICMP Echo Request >]) encapsulated_echo_request --> internet([Internet]) internet --- encapsulated_echo_request_2([Tunnel Protocol < ICMP Echo Request >]) encapsulated_echo_request_2 --> origin_tunnel(Tunnel) origin_tunnel --- received_bare_echo_request([ICMP Echo Request]) received_bare_echo_request --> origin(Origin) end subgraph Tunnel Healthcheck Response origin --> bare_echo_reply([ICMP Echo Reply]) bare_echo_reply --- origin_tunnel_2(Tunnel) origin_tunnel_2 --- encapsulated_echo_reply([Tunnel Protocol < ICMP Echo Reply >]) encapsulated_echo_reply --- internet_2([Internet]) internet_2 --> encapsulated_echo_reply_2([Tunnel Protocol < ICMP Echo Reply >]) encapsulated_echo_reply_2 --> tunnel_2[Tunnel] tunnel_2 --> bare_echo_reply_2([ICMP Echo Reply]) bare_echo_reply_2 --> cloudflare end
flowchart TB subgraph Tunnel Healthcheck Probe cloudflare(Cloudflare) --- bare_echo_probe([ICMP Echo Reply]) bare_echo_probe --> tunnel[Tunnel] tunnel --- encapsulated_echo_probe([Tunnel Protocol < ICMP Echo Reply >]) encapsulated_echo_probe --> internet([Internet]) internet --- encapsulated_echo_probe_2([Tunnel Protocol < ICMP Echo Reply >]) encapsulated_echo_probe_2 --> origin_tunnel(Tunnel) origin_tunnel --- received_bare_echo_reply([ICMP Echo Reply]) received_bare_echo_reply --> origin(Origin) end subgraph Tunnel Healthcheck Response origin --> bare_echo_reply([ICMP Echo Reply]) bare_echo_reply --- origin_tunnel_2(Tunnel) origin_tunnel_2 --- encapsulated_echo_reply([Tunnel Protocol < ICMP Echo Reply >]) encapsulated_echo_reply --- internet_2([Internet]) internet_2 --> encapsulated_echo_reply_2([Tunnel Protocol < ICMP Echo Reply >]) encapsulated_echo_reply_2 --> tunnel_2[Tunnel] tunnel_2 --> bare_echo_reply_2([ICMP Echo Reply]) bare_echo_reply_2 --> cloudflare end
flowchart TB cloudflare(Cloudflare) --- bare_echo_probe([ICMP Echo Request]) bare_echo_probe --> tunnel[Tunnel] tunnel --- encapsulated_echo_probe([Tunnel Protocol < ICMP Echo Request >]) encapsulated_echo_probe --> internet([Internet]) internet --- encapsulated_echo_probe_2([Tunnel Protocol < ICMP Echo Request >]) encapsulated_echo_probe_2 --> origin_tunnel(Tunnel) origin_tunnel --- received_bare_echo_reply([ICMP Echo Request]) received_bare_echo_reply --> origin(Origin) origin --- received_bare_echo_reply_2([ICMP Echo Reply]) received_bare_echo_reply_2 --> internet_2([Internet]) internet_2 --> cloudflare
flowchart TB cloudflare(Cloudflare) --- bare_echo_probe([ICMP Echo Reply]) bare_echo_probe --> tunnel[Tunnel] tunnel --- encapsulated_echo_probe([Tunnel Protocol < ICMP Echo Reply >]) encapsulated_echo_probe --> internet([Internet]) internet --- encapsulated_echo_probe_2([Tunnel Protocol < ICMP Echo Reply >]) encapsulated_echo_probe_2 --> origin_tunnel(Tunnel) origin_tunnel --- received_bare_echo_reply([ICMP Echo Reply]) received_bare_echo_reply --> origin(Origin) origin --- received_bare_echo_reply_2([ICMP Echo Reply]) received_bare_echo_reply_2 --> internet_2([Internet]) internet_2 --> cloudflare
Every Cloudflare data center configured to process your traffic sends tunnel health check probes. The rate at which these health check probes are sent varies based on tunnel and location. This rate can also be tuned up or down on a per tunnel basis by modifying the health_check
rate of a tunnel with the API or the dash. A customer can set the rate value as low, mid or high, with mid being the default option. The actual rate formula considers the number of servers in a Cloudflare data center or the number of servers with the customer namespace provisioned on them for dynamically provisioned namespaces. Thus, the rate is not a specific number; it is dynamic and depends on the size of our network.
When a probe attempt fails for a healthy tunnel, each server detecting the failure quickly probes up to two more times to obtain an accurate result. We also do the same if a tunnel has been down and probes start returning success. Because Cloudflare global network servers send probes up to every second, you can expect your network to receive several hundred health check packets per second — each Cloudflare data center will only send one health check packet as part of a probe. This represents a relatively trivial amount of traffic.
There are three tunnel health states: healthy, degraded, and down.
Healthy tunnels are preferred to degraded tunnels, and degraded tunnels are preferred to those that are down.
Magic WAN steers traffic to tunnels based on priorities you set when you assign tunnel route priorities during onboarding. Tunnel routes with lower values have priority over those with higher values.
- When at least 0.1% or more of tunnel health checks fail in the previous five minutes (with at least two failures), Magic WAN considers the link lossy and sets the tunnel state to degraded (assuming the tunnel is not down).
- Magic WAN requires two failures so that a single lost packet does not trigger a penalty.
- Magic WAN then immediately sets the tunnel status to degraded and applies a priority penalty.
- When all health checks of at least three samples in the last one second fail, Magic WAN immediately transitions the tunnel from healthy or degraded to down, and applies a priority penalty to routes through that tunnel.
- A down state determination takes precedence over a degraded state determination. This means that a tunnel can only be one of the following: down, degraded, or healthy.
When Magic WAN identifies a route that is not healthy, it applies these penalties:
- Degraded: Add
500,000
to priority. - Down: Add
1,000,000
to priority.
The values for failure penalties are intentionally extreme so that they always exceed the priority values assigned during routing configuration.
Applying a penalty instead of removing the route altogether preserves redundancy and maintains options for customers with only one tunnel. Penalties also support the case when multiple tunnels are unhealthy.
In the event a Cloudflare data center is down, Cloudflare's global network does not advertise your prefixes, and your packets are routed to the next closest data center. To check the system status for Cloudflare's global network and dashboard, refer to Cloudflare System Status ↗.
Once a tunnel is in the down state, global network servers continue to emit probes according to the cadence described above. When a probe returns healthy, the global network server that received the healthy packet immediately sends two more probes. If the two probes return healthy, Magic WAN sets the tunnel status to degraded (as three consecutive successful probes no longer satisfy the condition for a down state).
Tunnels in a degraded state transition to healthy when the failure rate for the previous 30 probes is less than 0.1%. This transition may take up to 30 minutes.
Magic WAN's tunnel health check system allows a tunnel to quickly transition from healthy to degraded or down, but tunnel transition occurs slowly from degraded or down to healthy. This scenario is referred to as hysteresis — which is when a system's output depends on its history of past inputs — and dampens changes to tunnel routing caused by flapping and other intermittent network failures.
Consider two tunnels and their associated routing priorities. Remember that lower route values have priority.
- Tunnel 1, route priority
100
- Tunnel 2, route priority
200
When both tunnels are in a healthy state, routing priority directs traffic exclusively to Tunnel 1 because its route priority of 100
beats that of Tunnel 2. Tunnel 2 does not receive any traffic, except for tunnel health check probes. Endpoint health checks only flow over Tunnel 1 to their destination inside the origin network.
If the link between Tunnel 1 and Cloudflare becomes unusable, Cloudflare global network servers discover the failure on their next health check probe, and immediately issue two more probes (assuming the tunnel was initially healthy).
When a global network server does not receive the proper ICMP reply packets from these two additional probes, the global network server labels Tunnel 1 as down, and downgrades Tunnel 1 priority to 1,000,100
. The priority then shifts to Tunnel 2, and Magic WAN immediately steers packets arriving at that global network server to Tunnel 2.
Suppose the connectivity issue that set Tunnel 1 health to down becomes resolved. At the next health check interval, the issuing global network server receives a successful probe and immediately sends two more probes to validate tunnel health.
When all three probes return successfully, Magic WAN transitions the tunnel from down to degraded. As part of this transition, Cloudflare reduces the priority penalty for that route so that its priority becomes 500,100
. Because Tunnel 2 has a priority of 200
, traffic continues to flow over Tunnel 2.
Global network servers will continue probing Tunnel 1. When the health check failure rate drops below 0.1% for a five minute period, Magic WAN sets tunnel status to healthy. Tunnel 1's routing priority is fully restored to 100
, and traffic steering returns the data flow to Tunnel 1.
Endpoint health checks evaluate connectivity from Cloudflare distributed data centers to your origin network. Designed to provide a broad picture of Internet health, endpoint probes flow over available tunnels and do not inform tunnel selection or steering logic.
Cloudflare global network servers issue endpoint health checks outside of customer network namespaces and typically target endpoints beyond the tunnel-terminating border router.
During onboarding, you specify IP addresses to configure endpoint health checks.
Tunnel health checks monitor the status of the tunnels that route traffic from Cloudflare to your origin network. Magic WAN relies on health checks to steer traffic to the best available routes.
During onboarding, you specify the tunnel endpoints or tunnel health check targets the tunnel probes originating from Cloudflare's global network will target.
Tunnel health check results are exposed via API. These results are aggregated from individual health check results done on Cloudflare servers.