Use Case 3 - Protect Physical Security on LEO Satellite and 5G
Table of Contents
Expand All
|
Collapse All
Prisma SD-WAN Docs
-
-
-
-
- AWS Transit Gateway
- Azure vWAN
- Azure vWAN with vION
- ChatBot for MS Teams
- ChatBot for Slack
- CloudBlades Integration with Prisma Access
- GCP NCC
- Service Now
- Zoom QSS
- Zscaler Internet Access
-
-
- ION 5.2
- ION 5.3
- ION 5.4
- ION 5.5
- ION 5.6
- ION 6.0
- ION 6.1
- ION 6.2
- ION 6.3
- ION 6.4
- New Features Guide
- On-Premises Controller
- Prisma Access CloudBlade Cloud Managed
- Prisma Access CloudBlade Panorama Managed
- Prisma SD-WAN CloudBlades
Use Case 3 - Protect Physical Security on LEO Satellite and 5G
Use case to protect physical security on LEO satellite and 5G.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
In this scenario, the business has many locations in remote geographies
where high speed wire line connectivity is unavailable. These locations have strict
requirements for physical security including video and audio surveillance as well as
access control. This traffic is tolerant to latency and jitter but loss can severely
impact operations. Due to the bandwidth demands both primary connections must be
used actively.
RTP-Base, RTP-Audio, RTSP, SIP, RTP-Video, and HID are configured with these path
policy rules:
- Active Paths:
- Prisma SD-WAN VPN on LEO Satellite Internet.
- Prisma SD-WAN VPN on Unmetered Public 5G.
- Backup Paths: None
- L3 Failure Paths: Prisma SD-WAN VPN on Internet ADSL.
- Use both of the Active Paths as long as they are SLA compliant.
- Use Link Quality Monitoring (LQM) information available from the Branch to Data Center VPNs to control Packet Duplication for any observed packet loss onto the active paths.
- If neither of the Active Paths are SLA compliant then begin to duplicate packets onto each of the active paths.
- If one of the two Active Paths is down and the other is degraded, perform single link packet duplication.
- Use the Internet ADSL Path if all of the Active Paths are down (not degraded).
- Generate an Incident to be forwarded to operations in case of non compliance with the SLA metrics.
- Select the desired policy set from ManagePrisma SD-WANPoliciesPerformance.Select Add Rule and enter the Name as Protect Physical Security Traffic, Description (optional), and the Order Number (optional).More specific rules should be organized at the top of the Policy Set list, else a less specific policy rule may be matched first.In the Actions section, select Packet Duplication, Move Flows, and Create Incident.In the Match Criteria section, under App Filters, select the applications RTP-Base, RTP-Audio, RTSP, SIP, RTP-Video, and HID from the drop-down, select the category in Path Filters as LEO Satellite Internet and Unmetered Public 5G . Select the Path Type as Prisma SD-WAN VPN.In the Performance SLAs section, click Add New, and check the option Link Quality Metrics. Enter the SLA Name as Physical Security SLA .In Link Quality Metrics, enter the Jitter value as 50 ms.This will use the best (lowest) measured Jitter value between the branch and all data centers on a per branch circuit basis.Click the + sign to enter the Latency value as 200 ms and the Packet Loss value as 1%.Retain the Advanced Settings at their default values.Review the Summary of the policy settings for the desired policy intent and Save & Exit.
Summary: Implementing the Performance Policy rule for Physical Security ensures the delivery of the business critical traffic by mitigating consistent loss in the transport networks. The impact of the rule is easily monitored using the App Site Details, Link Quality Metrics, and Flow Browser.