Add an SD-WAN Device
Table of Contents
Expand all | Collapse all
-
- Create a Link Tag
- Configure an SD-WAN Interface Profile
- Configure a Physical Ethernet Interface for SD-WAN
- Configure an Aggregate Ethernet Interface and Subinterfaces for SD-WAN
- Configure Layer 3 Subinterfaces for SD-WAN
- Configure a Virtual SD-WAN Interface
- Create a Default Route to the SD-WAN Interface
-
- Create a Path Quality Profile
-
- Create a SaaS Quality Profile
- Use Case: Configure SaaS Monitoring for a Branch Firewall
- Use Case: Configure a Hub Firewall Failover for SaaS Monitoring from a Branch Firewall to the Same SaaS Application Destination
- Use Case: Configure a Hub Firewall Failover for SaaS Monitoring from a Branch Firewall to a Different SaaS Application Destination
- SD-WAN Traffic Distribution Profiles
- Create a Traffic Distribution Profile
- Create an Error Correction Profile
- Configure an SD-WAN Policy Rule
- Allow Direct Internet Access Traffic Failover to MPLS Link
- Configure DIA AnyPath
- Distribute Unmatched Sessions
- Configure HA Devices for SD-WAN
- Create a VPN Cluster
- Create a Full Mesh VPN Cluster with DDNS Service
- Create a Static Route for SD-WAN
- Configure Advanced Routing for SD-WAN
Add an SD-WAN Device
Add a single SD-WAN hub or branch firewall for the Panorama management server to manage.
Add an SD-WAN hub or branch firewall to be managed by the Panorama™ management server. When
adding your devices, you specify what type of device it is (branch or hub) and you
give each device its site name for easy identification. Before adding your devices,
plan your SD-WAN configuration to
ensure that you have all the required IP addresses and you understand the SD-WAN
topology. This helps in reducing any configuration errors.
If you have preexisting zones for your Palo Alto Networks
®
firewalls, you’ll be
mapping them to the predefined zones used in SD-WAN.If you want to have active/passive HA running on two branch firewalls or two hub firewalls, don’t
add those firewalls as SD-WAN devices at this time. You’ll add them as HA peers
separately when you Configure HA Devices for SD-WAN.
If you’re using BGP routing, you must add a Security policy rule to allow BGP from the internal
zone to the hub zone and from the hub zone to the internal zone. If you want to
use 4-byte ASNs, you must first enable 4-byte ASNs for the virtual router.
When viewing SD-WAN devices, if no data is present or the screen indicates that SD-WAN is
undefined, check in the Compatibility Matrix that the Panorama
release you’re using supports the SD-WAN plugin release you’re trying to
use.
- SelectandPanoramaSD-WANDevicesAdda new SD-WAN firewall.
- Select the managed firewallNameto add as an SD-WAN device. You must add your SD-WAN firewalls as managed devices before you can add them as an SD-WAN device.
- Select theTypeof SD-WAN device.
- Hub—A centralized firewall deployed at a primary office or location to which all branch devices connect using a VPN connection. Traffic between branches passes through the hub before continuing to the target branch, and connects branches to centralized resources at the hub location. The hub device processes traffic, enforces policy rules, and manages link swapping at the primary office or location.
- Branch—A firewall deployed at a physical branch location that connects the hub using a VPN connection and provides security at the branch level. The branch device processes traffic, enforces policy rules, and manages link swapping at the branch location.
- Select theRouter Nameto use for routing between the SD-WAN hub and branches. By default, ansdwan-defaultvirtual router is created and enables Panorama to automatically push router configurations.() If you have configured advanced routing and the logical routers are created successfully,Advanced RoutingenabledRouter Namedisplays both virtual and logical router names:
- If the virtual router and logical router names are the same, then theRouter Namedisplays the same name because advanced routing creates a logical router with the same name as the virtual router, by default. It's important that the logical router name and virtual router name are the same for the same template when using the advanced routing engine.
- If the virtual router and logical router names are different (which happens only when you update the logical router name manually), then the router name displays both the virtual and logical router names. You can select either virtual router (for legacy engine) or logical router (for advanced routing engine) based on your requirement. If you haven't enabledAdvanced Routing, then you’ll have only virtual routers to select from theRouter Name(for the legacy engine).
- Enter the SD-WANSitename to identify the geographical location or purpose of the device.The SD-WAN Site name supports all upper-case and lower-case alphanumerical and special characters. Spaces aren’t supported in the Site name and result in monitoring () data for that site not to be displayed.PanoramaMonitoringAll SD-WAN devices, including SD-WAN devices in a high availability (HA) configuration, must have a unique Site name.
- Select theLink Tagyou created for the hub virtual interface (or branch virtual interface), which Auto VPN will assign to the virtual interface. You’ll use this Link Tag in a Traffic Distribution profile to allow the hub (or branch) to participate in DIA AnyPath.
- If you’re adding a hub that is behind a device performing NAT for the hub, you must specify the IP address or FQDN of the public-facing interface on that upstream NAT-performing device, so that Auto VPN configuration can use that address as the tunnel endpoint of the hub. It’s the IP address that the branch office’s IKE and IPSec flows must be able to reach. (You must have already configured a physical Ethernet interface for SD-WAN.)
- On theUpstream NATtab, enableUpstream NAT.
- AddanSD-WAN interface; select an interface you already configured for SD-WAN.
- SelectIP AddressorFQDNand enter the IPv4 address without a subnet mask (for example, 192.168.3.4) or the FQDN of the upstream device, respectively.
- ClickOK.Additionally, on the upstream device that is performing NAT you must set up the inbound destination NAT with a one-to-one NAT policy, and you must not configure port translation to the IKE or IPSec traffic flows.If the IP address on the upstream device changes, you must configure the new IP address and push it to the VPN cluster. You must use the CLI commandsclear vpn ipsec-sa,clear vpn ike-sa, andclear session allon both the branch and hub. You must alsoclear session allon the virtual router where you configured the NAT policy for the IP addresses.Upstream NAT isn’t supported on Layer 2 interfaces.
- (Full Mesh Deployments Only) If you’re adding a branch that is behind a device performing NAT for the branch, you must specify the IP address or FQDN of the public-facing interface on that upstream NAT-performing device, or select DDNS to indicate that the IP address for the interface on the NAT device is obtained from the Palo Alto Networks DDNS service. Thus, Auto VPN Configuration uses that public IP address as the tunnel endpoint for the branch. It is the IP address that the branch office’s IKE and IPSec flows must be able to reach. (You must have already configured a physical Ethernet interface for SD-WAN.)
- On theUpstream NATtab, enableUpstream NAT.
- AddanSD-WAN interface; select an interface you already configured for SD-WAN.
- If you select theNAT IP Address Typeto beStatic IP, selectIP AddressorFQDNand enter the IPv4 address without a subnet mask (for example, 192.168.3.4) or the FQDN of the upstream device, respectively.
- Alternatively, select theNAT IP Address Typeto beDDNS.
- ClickOK.Additionally, on the upstream device that is performing NAT you must set up the inbound destination NAT with a one-to-one NAT policy, and you must not configure port translation to the IKE or IPSec traffic flows.If the IP address on the upstream device changes, you must configure the new IP address and push it to the VPN cluster. You must use the CLI commandsclear ipsec,clear ike-sa, andclear session allon both the branch and hub. You must alsoclear session allon the virtual router where you configured the NAT policy for the IP addresses.There is a second location in the web interface where you can configure Upstream NAT for a branch, but the following location isn't preferred and you shouldn't configure Upstream NAT for a branch in both places. The secondary, non-preferred location to configure Upstream NAT is on Panorama at, select a template in theNetworkInterfacesEthernetTemplatefield, select an Ethernet interface, and select theSD-WANtab. At this point you canEnableUpstream NAT, and select aNAT IP Address Type. This second method takes precedence. If Upstream NAT is first configured for the Ethernet interface on Panorama through the template stack, then the SD-WAN plugin won’t change the settings, even if you use different settings on the plugin device configuration page. Only if there is no Upstream NAT configured on Panorama through the template stack, then the plugin configuration for Upstream NAT takes effect.Upstream NAT is not supported on Layer 2 interfaces.
- (Required for preexisting customers) Map your preexisting zones to predefined zones used for SD-WAN.When you map your existing zones to an SD-WAN zone, you must modify your security policy rules and add the SD-WAN zones to the correctSourceandDestinationzones.
- SelectZone InternetandAddthe preexisting zones that will egress SD-WAN traffic to the internet.
- SelectZone to HubandAddthe preexisting zones that will egress SD-WAN traffic to the hub.
- SelectZone to BranchandAddthe preexisting zones that will egress SD-WAN traffic to the branch.
- SelectZone InternalandAddthe preexisting zones that will egress SD-WAN traffic to an internal zone.
- If your application traffic is tagged with Type of Service (ToS) bits or Differentiated Services Code Point (DSCP) markings, copy the ToS field from the inner IPv4 header to the outer VPN header of encapsulated packets going through the VPN tunnel to preserve QoS information.
- Select theVPN Tunneltab.
- SelectCopy ToS Header.
- ClickOK.
- (Optional) Configure BGP routing.To automatically set up BGP routing between the VPN cluster members, enter the BGP information below. If you want to manually configure BGP routing on each firewall or use a separate Panorama template to configure BGP routing for more control, leave the BGP information below blank.Before implementing SD-WAN with BGP routing in an environment where BGP is already in use, ensure that the BGP configuration generated by the SD-WAN plugin doesn’t conflict with your preexisting BGP configuration. For example, you must use the existing BGP AS number and router ID values for the corresponding SD-WAN device values. If the BGP configuration generated by the plugin conflicts with your preexisting BGP configuration, the preexisting BGP configuration takes precedence. If you want the pushed configuration to take precedence, you must enable the force template value when doing a Panorama push.
- Select theBGPtab and enableBGPto configure BGP routing for SD-WAN traffic.
- Enter the BGPRouter ID, which must be unique among all routers.
- (Specify a static IPv4Substeps 3 through 6 pertain to the web interface for SD-WAN plugin 3.1.0 only. For later 3.1 releases, skip to Step 13.)Loopback Addressfor BGP peering. Auto VPN configuration automatically creates a loopback interface with the same IPv4 address that you specify. If you specify an existing loopback address, the commit will fail, so you should specify an IPv4 address that isn’t already a loopback address.
- Enter theAS Number. The autonomous system number specifies a commonly defined routing policy to the internet. The AS number must be unique for every hub and branch location.
- Disable theRemove Private ASoption (the default is enabled) if you have endpoints that need to exchange routes with a hub or branch firewall in an SD-WAN BGP topology and therefore you don’t want to remove private AS numbers (64512 to 65534) from the AS_PATH attribute in BGP Updates. In this case, you want to allow the private AS numbers to leave the SD-WAN private AS in BGP Updates.TheRemove Private ASsetting applies to all BGP peer groups on the branch or hub firewall. If you need this setting to differ among BGP peer groups or peers, you must configure the setting outside of the SD-WAN plugin.If you change theRemove Private ASsetting, commit to all SD-WAN cluster nodes, and later downgrade to an SD-WAN plugin version earlier than 2.0.2, then you must perform all configuration related toRemove Private ASoutside of the SD-WAN plugin or directly on the firewalls.
- AddthePrefix(es) to Redistribute. On a hub device, you must add at least one prefix to redistribute over the SD-WAN tunnel. Branch devices don’t have this mandatory configuration requirement because subnets connected to branch locations are redistributed by default.
- (SD-WAN plugin 3.1.1 and later 3.1 releases using the legacy routing engine) To configure BGP to use IPv4, selectIPV4 BGP. Whether your BGP environment is only IPv4 or dual stack (IPv4 and IPv6), you must enable IPv4 BGP.
- Enable IPv4 BGP support.For an upgraded configuration (an already existing SD-WAN IPv4 configuration),Enable IPv4 BGP supportis selected by default. Otherwise, explicitlyEnable IPv4 BGP support.
- Specify a static IPv4Loopback Addressfor BGP peering. Auto VPN configuration automatically creates a Loopback interface with the same IPv4 address that you specify. If you specify an existing loopback address, the commit will fail, so you must specify an IPv4 address that isn’t already a loopback address.
- Disable theRemove Private ASoption (the default is enabled) if you have endpoints that need to exchange routes with a hub or branch firewall in an SD-WAN BGP topology and therefore you don’t want to remove private AS numbers (64512 to 65534) from the AS_PATH attribute in BGP Updates. In this case, you want to allow the private AS numbers to leave the SD-WAN private AS in BGP Updates.TheRemove Private ASsetting applies to all BGP peer groups on the branch or hub firewall. If you need this setting to differ among BGP peer groups or peers, you must configure the setting outside of the SD-WAN plugin.If you change theRemove Private ASsetting, commit to all SD-WAN cluster nodes, and later downgrade to an SD-WAN plugin version earlier than 2.0.2, then you must perform all configuration related toRemove Private ASoutside of the SD-WAN plugin or directly on the firewalls.
- AddthePrefix(es) to Redistribute. On a hub device, you must enter at least one prefix to redistribute over the SD-WAN tunnel. Branch devices don't have this mandatory configuration requirement because subnets connected to branch locations are redistributed by default.
- (SD-WAN plugin 3.1.1 and later 3.1 releases using the legacy routing engine) To configure BGP to use IPv6, selectIPV6 BGP.
- Enable IPv6 BGP support.
- Specify a staticIPv6 Loopback Addressfor BGP peering. Auto VPN configuration automatically creates a loopback interface with the same IPv6 address that you specify. If you specify an existing loopback address, the commit will fail, so you must specify an IPv6 address that isn't already a loopback address.
- AddthePrefix(es) to Redistributeover the SD-WAN tunnel. On a hub device, you must enter at least one prefix to redistribute over the SD-WAN tunnel. Branch devices don't have this mandatory configuration requirement because subnets connected to branch locations are redistributed by default.
- ClickOK.
- SelectGroup HA Peersat the bottom of the screen to display branches (or hubs) that are HA peers together.
- Have Panorama create and push to firewalls a Security policy rule that allows BGP to run between branches and hubs.
- At the bottom of the screen, for SD-WAN plugin 3.1.0, selectBGP Policyor for SD-WAN plugin 3.1.1 and later releases on a legacy routing engine, selectandIPv4 BGP PolicyorIPv6 BGP Policy(depending on which type of BGP address you used)Adda policy rule.
- Enter aPolicy Namefor the Security policy rule that Panorama will automatically create.
- SelectTypeasHuborBranch.
- Select Device Groupsto specify the device groups to which Panorama pushes the Security policy rule.
- ClickOK.
- SelectPush to Devicesto push your configuration changes to your managed firewalls.