Use Case 3 - Protect Physical Security on LEO Satellite and 5G
Focus
Focus

Use Case 3 - Protect Physical Security on LEO Satellite and 5G

Table of Contents

Use Case 3 - Protect Physical Security on LEO Satellite and 5G

Use case to protect physical security on LEO satellite and 5G.
Where Can I Use This?What Do I Need?
  • Prisma SD-WAN
  • Active Prisma SD-WAN license
In this scenario, the business has many locations in remote geographies where high speed wire line connectivity is unavailable. These locations have strict requirements for physical security including video and audio surveillance as well as access control. This traffic is tolerant to latency and jitter but loss can severely impact operations. Due to the bandwidth demands both primary connections must be used actively.
RTP-Base, RTP-Audio, RTSP, SIP, RTP-Video, and HID are configured with these path policy rules:
  • Active Paths:
    • Prisma SD-WAN VPN on LEO Satellite Internet.
    • Prisma SD-WAN VPN on Unmetered Public 5G.
  • Backup Paths: None
  • L3 Failure Paths: Prisma SD-WAN VPN on Internet ADSL.
Performance Policy Intent
  • Use both of the Active Paths as long as they are SLA compliant.
  • Use Link Quality Monitoring (LQM) information available from the Branch to Data Center VPNs to control Packet Duplication for any observed packet loss onto the active paths.
  • If neither of the Active Paths are SLA compliant then begin to duplicate packets onto each of the active paths.
  • If one of the two Active Paths is down and the other is degraded, perform single link packet duplication.
  • Use the Internet ADSL Path if all of the Active Paths are down (not degraded).
  • Generate an Incident to be forwarded to operations in case of non compliance with the SLA metrics.
Configure the Policy Rule
  1. Select the desired policy set from ManagePrisma SD-WANPoliciesPerformance.
  2. Select Add Rule and enter the Name as Protect Physical Security Traffic, Description (optional), and the Order Number (optional).
    More specific rules should be organized at the top of the Policy Set list, else a less specific policy rule may be matched first.
  3. In the Actions section, select Packet Duplication, Move Flows, and Create Incident.
  4. In the Match Criteria section, under App Filters, select the applications RTP-Base, RTP-Audio, RTSP, SIP, RTP-Video, and HID from the drop-down, select the category in Path Filters as LEO Satellite Internet and Unmetered Public 5G . Select the Path Type as Prisma SD-WAN VPN.
  5. In the Performance SLAs section, click Add New, and check the option Link Quality Metrics. Enter the SLA Name as Physical Security SLA .
  6. In Link Quality Metrics, enter the Jitter value as 50 ms.
    This will use the best (lowest) measured Jitter value between the branch and all data centers on a per branch circuit basis.
  7. Click the + sign to enter the Latency value as 200 ms and the Packet Loss value as 1%.
  8. Retain the Advanced Settings at their default values.
  9. Review the Summary of the policy settings for the desired policy intent and Save & Exit.
Summary: Implementing the Performance Policy rule for Physical Security ensures the delivery of the business critical traffic by mitigating consistent loss in the transport networks. The impact of the rule is easily monitored using the App Site Details, Link Quality Metrics, and Flow Browser.