: Features Introduced in SD-WAN Plugin 2.2
Focus
Focus

Features Introduced in SD-WAN Plugin 2.2

Table of Contents

Features Introduced in SD-WAN Plugin 2.2

Features introduced in SD-WAN Plugin 2.2 releases.
Our SD-WAN subscription integrates with PAN-OS to provide intelligent, dynamic path selection on top of the industry leading security that PAN-OS software already delivers. Secure SD-WAN provides the optimal end-user experience by leveraging multiple ISP links to ensure application performance and scale capacity. See Upgrade/Downgrade Considerations and Upgrade the SD-WAN Plugin in the PAN-OS Upgrade Guide 10.1.
The SD-WAN Administrator’s Guide 2.2 provides information about how to use the SD-WAN plugin features in this release.

What's New in SD-WAN Plugin 2.2.7

New FeatureDescription
SD-WAN Plugin Improvements
Earlier to SD-WAN plugin 2.2.7 version, the SD-WAN generated configurations (such as the IKE ID and tunnel names) uses the active firewall's serial number. Therefore, whenever a HA failover occurs, the SD-WAN generated configurations would reset with the active firewall's serial number that results in temporary tunnel flaps.
We have improved the SD-WAN plugin 2.2.7 version by using the lower serial number among the HA devices for generating the SD-WAN configurations that remove tunnel flaps. This improvement also introduces the following SD-WAN configuration changes:
  • the IKE key ID is formed with the lower serial number between the HA devices.
  • the SD-WAN generated configurations, such as route table entry in virtual router, tunnel name, IKE gateway name, BGP import rule name, routing profile, BGP peer, and BGP filtering profile will be reset.
  • Tunnel names and corresponding IP address would change as the tunnel names are created from a lower serial number among the two HA devices.
MongoDB HA Synchronization CLI Commands
We have introduced the following mongoDB related HA peer synchronization commands that must be executed only on the active HA peer:
  • debug plugins sd_wan mongo-db sync-db-to-peer—Use this command to synchronize the SD-WAN mongo database from active HA peer with the passive HA peer. You must execute this command in the following cases:
    We recommend you to check the status of the operation log by executing debug plugins sd_wan mongo-db sync-status command before executing debug plugins sd_wan mongo-db sync-db-to-peer command. Because, the SD-WAN mongo DB operation log synchronization must be successful before you synchronize the HA peers.
  • debug plugins sd_wan mongo-db sync-status—Use this command to check the synchronization status of the operation log (oplog). This command only checks the operation logs.

What's New in SD-WAN Plugin 2.2.6

The SD-WAN plugin 2.2.6 release provides bug and performance fixes.

What's New in SD-WAN Plugin 2.2.5

The SD-WAN plugin 2.2.5 release provides bug and performance fixes.

What's New in SD-WAN Plugin 2.2.4

The SD-WAN plugin 2.2.4 release provides bug and performance fixes.

What's New in SD-WAN Plugin 2.2.3

The SD-WAN plugin 2.2.3 release provides bug and performance fixes.

What’s New in SD-WAN Plugin 2.2.2

The SD-WAN plugin 2.2.2 release provides bug and performance fixes.

What’s New in SD-WAN Plugin 2.2.1

Key features introduced with the SD-WAN plugin 2.2.1 release:
New SD-WAN FeatureDescription
Copy ToS Header Support
SD-WAN hubs and branches allow you to automatically copy the ToS or Differentiated Services Code Point (DSCP) markings from the inner IPv4 header to the VPN header of packets so that traffic going through the VPN tunnel can preserve that information for QoS.

What’s New in SD-WAN Plugin 2.2.0

Key features introduced with the SD-WAN plugin 2.2.0 release:
New SD-WAN FeatureDescription
Prisma Access Hub Support
As more internet services move to the cloud, PAN-OS Secure SD-WAN now offers security in the cloud using Prisma Access, in addition to security on-premises using PAN-OS firewalls. The SD-WAN hub-and-spoke topology now supports a Prisma Access hub. You can secure your internet traffic for specific applications at the branch location or in the cloud with Prisma Access and have this traffic fail over to any other VPN tunnel if necessary.
This feature is available for early evaluation and will go live in January, 2022. Until then, ask your sale representative to request a manual upgrade of your Prisma Access IPSec Termination Nodes to run PAN-OS 10.0.7, so you can participate in the early evaluation and onboard a branch office to the Prisma Access Hub.