Configure the Nuage Networks Remote Network
Configure the remote network between the Nuage Networks
SD-WAN and Prisma Access by completing the following workflows:
Set up the Remote Network Tunnel in Prisma Access
Complete the following task to configure the
remote network connection as a site-to-site IPSec tunnel.
- Make sure you have specified theTemplateofRemote_Network_Templatebefore starting this task.
- Give the profile a name and specify IKE settings.Make a note of these settings; you specify the same settings when you create the IPSec tunnel in the Nuage Networks SD-WAN.
- Specify a name for the profile and specify IPSec crypto parameters.Make a note of these parameters; you specify these same parameters when you configure the Nuage Networks side of the remote network tunnel in a later task.
- Specify aName,Version,Peer IP Address Type, andAuthentication, and specify aPeer Identificationthat will be synchronized with the Nuage Networks configuration.Make note of the of theUser FQDN (email address)that you use for thePeer Identificationand thePre-Shared keyyou use; you must match these settings for the Nuage Networks side of the connection in 6 when you Set Up the Remote Network Tunnel in Nuage Networks.
- Click theAdvanced Optionstab and make sure thatEnable Passive ModeandEnable NAT Traversalare selected.The Nuage Network Services Gateway (NSG) initiates the IKE negotiation, and allows the negotiation to occur even if Nuage Networks side is behind NAT.
- Select theIKE GatewayandIPSec Crypto Profileyou created earlier in this task.
- Select theProxy IDstab and create a default route for all local and remote prefixes.Creating this route ensures that all prefixes in the VPN use this IPSec tunnel.
- SelectandPanoramaCloud ServicesConfigurationRemote NetworksAddthe connection.
- Enter aName, select theBandwidthandRegion, and select theIPSec Tunnelyou specified in a previous step, and specify a route to the Nuage Networks SD-WAN.You cannot change the name of this tunnel after you create it.This example specifies aStatic Routeto the Nuage Networks SD-WAN with an IP address of 10.61.0.0/16.
- Commit the configuration changes to Panorama and push the configuration out to Prisma Access for remote networks.
- Click.CommitCommit to Panorama
- Click. ClickCommitCommit and Push, and select both Prisma Access for remote networks and Prisma Access for service setup to push the configuration out to the service.Edit SelectionsPrisma Access
- ClickOK, then clickCommit and Push.Prisma Access displays a success page after the commit succeeds.
- Make a note of theService IP addressof the Prisma Access side of the tunnel. To find this address in Panorama, select, click thePanoramaCloud ServicesStatusNetwork DetailsRemote Networksradio button, and find the address in theService IP Addressfield.
Set Up the Remote Network Tunnel in Nuage Networks
After you configure the remote network tunnel
in Prisma Access, configure the tunnel in Nuage Networks by completing
the following task.
Note that Dead Peer Detection (DPD) is
only configured in Nuage Networks. No DPD configuration is required
in Prisma Access because the NSG is the DPD initiator and Prisma
Access can only reply to requests.
- In your organization, create the Gateway using the Nuage Networks IKE gateway object.In theIP Addressfield, enter theService IP addressthat you retrieved after you completed the setup of the remote network tunnel in Prisma Access (Step 13.
- Define the remote subnet for which traffic will be sent to the gateway.The IKE gateway connection uses the underlay breakout mechanism as shown in the following diagram:All traffic to Prisma Access is through the underlay. If you enable underlay, and if the remote subnet associated with Prisma Access matches the destination IP in the customer packet, then the Nuage Networks SD-WAN sends the packet to Prisma Access. If the destination IP does not match, the SD-WAN sends the packet to internet breakout using underlay breakout and port address translation (PAT) rules.
- Specify a default route to the gateway so that the network sends all internet traffic to Prisma Access.
- Create an IKE encryption profile.This profile must match the values that you specified in the Prisma Access IPSec configuration.
- Create an IKE gateway profile.
- Enter aNamefor the gateway profile.
- SelectCheck anti-replay.
- Select theService class.
- Select theGatewayandEncryption Profile, using the settings you created for Prisma Access.
The example in the following screenshot uses one pre-shared key per connection, which means that the IKE Gateway profile won't use a pre-shared key object, and theAuthentication Methodfield is empty. - Associate the remote network connection with the NSG uplink port.You associate the remote network connection with the Nuage Networks NSG at the uplink VLAN level. This association contains an NSG identifier in RFC 822 format and includes the pre-shared key that is used for the connection.
- Check the status of the tunnel connection by entering the following command.A status ofUPindicates that the connection is successful.A:vsc1# tools vswitch 86.229.176.112 command "nuage-nsg-ike-cli show tunnel-status-summary" ------------------------------------------------------------------------------- Gateway Name Local IP Remote IP Phase1 Phase2 ------------------------------------------------------------------------------- paloalto 192.168.0.103 3.121.193.101 up up -------------------------------------------------------------------------------
- Next steps: Learn how Nuage Networks monitors the remote network, and troubleshoot the Nuage Networks remote network connection to Prisma Access, if required.
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.