Configure the Riverbed SteelConnect Remote Network
Configure the remote network between the SteelConnect
SD-WAN and Prisma Access by completing the steps in the following
workflows:
If
you have any issues after you complete these tasks, Troubleshoot the Riverbed SteelConnect Remote Network.
Configure Internet Breakout from Branches to Prisma Access
Use this workflow to configure three sites
to use a ClassicVPN tunnel to establish VPN connectivity with Prisma
Access. You must match the configuration in SCM with the configuration
in Prisma Access. Each management interface has its own default
settings, so we recommend that you confirm each setting between
SCM and Panorama.
This workflow assumes that you have
already configured the remote network
tunnel for the tunnels you want to create. You need the IP
address of the Prisma Access side of the tunnel to complete this
configuration. To find this address in Panorama, select and
find the
Panorama
Cloud Services
Status
Network Details
Service IP Address
in the Remote
Networks
area.The following figure shows
a total of six RouteVPN tunnels. They are identified by solid orange
lines. SteelConnect automatically forms these tunnels over the internet
WAN between SteelConnect appliances. Three of these tunnels use
the internet between sites, and the other three use the MPLS cloud
between sites. These tunnels form the
overlay network
. This
term is an abstraction of the internet and WAN in which the gateways
communicate with each other. The communication for the overlay network
takes place on an underlay network
. The underlay is the series
of network devices owned by a provider or customer making up a network
infrastructure.
The
organizational networking defaults you set in SCM determine how
the SD-WAN processes traffic. For traffic going to the internet
breakout, the traffic uses the internet uplink. For traffic between
sites, the SD-WAN prefers the RouteVPN over the internet uplink
over the RouteVPN over the MPLS WAN. Based on organizational defaults,
SCM automates the creation of a full-mesh RouteVPN over the internet
uplink and establishes encrypted tunnels over the MPLS network.
The
following figure shows the internet breakout preferences as defined
in SCM.

The
following diagram illustrates the logical traffic flow. The traffic
between Thousand Oaks and New York, HQ and New York, and HQ and
Thousand Oaks takes the RouteVPN over the MPLS overlay by default,
while traffic from each branch to the internet takes the internet
uplink by default. The workflow in this section configures ClassicVPN
tunnels and defines traffic rules in SCM so that traffic from the
SD-WAN to the internet takes the ClassicVPN tunnels to Prisma Access.

You
can override organizational defaults by Traffic Path Rules. The
following figure shows an SCM configuration that directs traffic
between the New York site 172.16.3.0/24 subnet to the HQ 172.16.1.0/24
subnet or the Thousand Oaks 172.16.2.0/24 subnet to use the RouteVPN
tunnel instead of the ClassicVPN tunnels used for internet traffic.
The settings in SCM specify these tunnels to use the MPLS WAN.

Internet
traffic uses the ClassicVPN tunnel at each site. Traffic from the
New York LAN to the internet uses the ClassicVPN tunnel in New York.
Traffic from Thousand Oaks to the internet uses the ClassicVPN tunnel
in Thousand Oaks, and traffic from HQ to the internet uses the ClassicVPN
tunnel in HQ.
This workflow creates and configures ClassicVPN
tunnels between the SteelConnect SD-WAN and Prisma Access.
- In SCM, select.Network DesignClassicVPN
- Create the ClassicVPN connection by completing the following steps:
- ClickNew ClassicVPN connection.
- Enter aNamefor the connection.
- Enter theRemote Gatewayaddress.The remote gateway address is the Service IP Address for the remote network in Prisma Access. To find this IP address in Panorama, selectand note thePanoramaCloud ServicesStatusNetwork DetailsService IP Addressfor the Remote Network. You must create a remote network tunnel in Prisma Access before you complete this workflow.
- Enter theRemote IPv4 network.In this case, the remote network is 0.0.0.0/0, because SCM should route all traffic that does not have a more specific route (that is, internet-bound traffic) over the ClassicVPN.
- Select the sourceSite.
- Select the sourceZones.In this example, traffic from LAN1 at HQ is sent over the ClassicVPN connection if a more specific route does not exist in the routing table of the gateway. For additional details on how packets are processed by the SteelConnect network, seeHow a Packet Traverses a SteelConnect Networkin theSteelConnect SD-WAN Deployment Guide.There is an additional zone listed in the following figure: NY-LAN2. In the workflow in Configure Internet Breakout from a Single Site to Prisma Access, internet traffic from the New York office is backhauled through the HQ site. Create this zone to establish the VPN tunnel. If you remove the NY-LAN2 zone from the configuration, the tunnel will go down.In addition, you must match any zones you create here, including any subnets, on the Prisma Access side. For example, this tunnel includes the 172.16.1.0/24 subnet (for the HQ site) and the 172.16.4.0/24 subnet (for the NY-LAN2 site). You also specified these subnets in Prisma Access for each remote network you created. To view these subnets in Panorama, selectand view the information in thePanoramaCloud ServicesConfigurationRemote NetworksBranch IP Subnetsfield.There are default values that SCM creates for you when you deploy a ClassicVPN. If you use the default values in SCM, you will need to edit the configuration in Panorama. If you use the defaults in Panorama, you will need to edit the configuration in SCM. Both sides must match. Our HQ configuration will match the Panorama configuration.
- Adjust the configuration in SCM by completing the following steps:
- Select theAuthenticationtab.
- Enter the Pre-shared Key to match what is configured in Panorama.
- ClickSubmit.
- Configure advanced tunnel settings by completing the following steps:
- Click theAdvancedtab.
- Enter theLocal ID.The Local-ID is the proxy-ID seen in the IPSec tunnel negotiation. If the Proxy-ID is not known on both ends, the tunnel will fail. This configuration was tested using the IP address as the endpoint ID instead of FQDN.
- Enter theRemote ID.The remote ID is the tunnel endpoint IP address in Prisma Access.
- ClickSubmit.
- Configure IKE settings (Phase 1) and IPSec (Phase 2) encryption settings by completing the following steps.IPSec VPNs establish in two phases, IKE phase 1 and IPSec phase 2. Phase 1 is used to create a secure channel in which parameters that apply to the data being encrypted are negotiated. In SCM, the IKE settings are for the phase 1 tunnel. The phase 2 tunnel negotiation defines how the user traffic is encrypted from the SteelConnect gateway to Prisma Access.The example used in this workflow creates an IKE tunnel with AES128 encryption, SHA1 hashing, and a lifetime of 28800 seconds (8 hours).
- Scroll down in the Advanced tab and selectIKEv1.IKEv1 uses the phase 1 and phase 2 method of negotiation, while IKEv2 creates parent and child security associations.
- SelectAES128.
- SelectSHA1.
- Enter28800in theIKE lifetimefield.This setting specifies the length of time that the IKE phase 1 tunnel remains up before it renegotiates.
- SelectAES256as theIPSec encryption cipher
- . SelectSHA1in theIPSec has algorithmfield.
- SelectDH Group 2 (1024 bit)in theIPSec DH Groupfield.
- Enter anIPSec lifetimeof2600seconds.
- ClickSubmit.
After submitting this configuration, the tunnel begins to establish. Once the tunnel establishes, you receive an event notification in SCM and the tunnel status displays asOnline, as seen in the following figure. - Repeat the steps in this workflow to add additional sites.
Configure the SteelConnect Tunnels
Since the configuration steps are the same
for additional branches, this workflow does not document the workflow
for all tunnels. However, note that you must complete the following
tasks after you add the two branch sites:
- If you use the SCM default values to create the tunnel in SCM, the Local ID is set as the FQDN. If the remote end supports FQDN (as Prisma Access does), you do not need to change this setting. If the remote end does not support FQDN, you must change this setting.
- SteelConnect creates a randomly-generated pre-shared Key. If you choose to use this key, you need to copy it and enter it in Prisma Access.
- Copy the auto-generated pre-shared key by completing the following steps:
- In SCM, clickAuthentication.
- ClickRevealto the right of thePreshared Keyfield.
- Copy the pre-shared key.
- (Optional) Modify the Local ID, if required, by completing the following steps:
- ClickAdvanced.
- Enter theLocal ID.
- Enter theRemote ID.
- ClickSubmit.There are now three established ClassicVPN sessions from each site to Prisma Access.
- Either modify the default rule, or disable it and add a new rule.The default outbound rule allows user traffic on the ClassicVPN. Since a 0.0.0.0/0 remote network is defined in the ClassicVPN configuration, the SD-WAN sends all traffic that does not have a more specific route in the routing table over the ClassicVPN to Prisma Access.The following SCM output shows the default outbound rules using Internet Access as the target.
- Modify the default outbound rule, or add a new one as shown in the following figure, to allow sites to communicate over the RouteVPN.
- (Optional) Add traffic rules to direct specific traffic over selected links.
Configure the Tunnel in Prisma Access
After you configure the tunnel in SCM, configure
the tunnel settings in Prisma Access to match the SCM settings.
- Select.NetworkRemote_Network_TemplateNetwork ProfilesIPSec Crypto
- ClickAddand create an IPSec cryptographic profile with settings that match the settings you made for the ClassicVPN tunnel in SCM.These settings are for the Phase 2 tunnel establishment.
- Select.NetworkRemote_Network_TemplateNetwork ProfilesIKE Crypto
- ClickAddand create an IKE cryptographic profile with settings that match the settings you made for the ClassicVPN tunnel in SCM.These settings are for the Phase 1 tunnel establishment.The encryption, authentication, and timer policies do not need to be identical between the IPSec and IKE crypto policies; however, whatever policies you configure must be identical on the SteelConnect gateways and Prisma Access. If the IKE Profile uses AES-128-CBC on the gateway, then you must configure the IKE Crypto profile in Prisma Access to match. If the IPSec settings on the gateway are set to use AES-256, then you must configure the IPSec Crypto Profile in Prisma Access to match.
Configure Internet Breakout from a Single Site to Prisma
Access
This workflow configures SCM to backhaul internet
traffic from the NY office over the RouteVPN and then send it to
the internet over the ClassicVPN by way of Prisma Access, as shown
in the following figure.

Complete
the following to set up a backhauled internet configuration.
- Create a traffic rule that forces traffic between sites to use RouteVPN tunnels.
- Edit the traffic rule so that the tunnel the NY-LAN2 and HQ-LAN1 uses the MPLS tunnel by default.This configuration ensures that traffic from the NY site to the internet is first backhauled to HQ using the MPLS connection.
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.