Cloudflare WAN Architecture
A Phased Approach to Secure Connectivity
Orange-cloud DNS proxy with DDoS mitigation, WAF rules, and bot management. Traffic inspected at Cloudflare's edge before reaching origin.
Encrypted IPSec tunnels from India campus to Cloudflare's global backbone. Secure, private connectivity to Perth and beyond.
Cloudflare Access for identity, Gateway for SWG, DLP for data protection. Complete Zero Trust architecture.
Unified policy across 330+ cities. Anycast routing ensures optimal performance from Mumbai to Perth and beyond.
Protection against DDoS, bots, and web attacks from day one
Low-latency connectivity to Perth and worldwide campuses
Identity-based access and comprehensive data protection
Objective: Protect UWA-India public-facing applications and websites
"Protect student portals and academic systems from day one. No hardware, no latency penalty."
Week 1-2 DNS cutover
Week 3-4 WAF tuning
Objective: Establish secure, private connectivity between Mumbai campus and Perth HQ
"Mumbai to Perth in under 100ms with encryption that doesn't slow you down."
Week 1 Tunnel configuration
Week 2 BGP peering
Objective: Complete Zero Trust SASE architecture for all users and devices
"One platform for identity, security, and connectivity. Simplify while strengthening."
Month 1 WARP deployment
Month 2 Access policies
Month 3 Gateway & DLP
Immediate protection
Weeks 1-4
Private connectivity
Weeks 5-8
Zero Trust complete
Months 3-6
One platform. Global reach. Zero Trust security.