Table of Contents

About SD-WAN

Palo Alto Networks supports an SD-WAN overlay that provides dynamic, intelligent path selection based on applications, services, and link conditions.
Software-Defined Wide Area Network (SD-WAN) is a technology that allows you to use multiple internet and private services to create an intelligent and dynamic WAN, which helps lower costs and maximize application quality and usability. Beginning with PAN-OS
9.1, Palo Alto Networks
offers strong security with an SD-WAN overlay in a single management system. Instead of using costly and time-consuming MPLS with components such as routers, firewalls, WAN path controllers, and WAN optimizers to connect your WAN to the internet, SD-WAN on a Palo Alto Networks firewall allows you to use less expensive internet services and fewer pieces of equipment. You don’t need to purchase and maintain other WAN components.

PAN-OS Security with SD-WAN Functionality

The SD-WAN plugin is integrated with PAN-OS, so that you get the security features of a PAN-OS firewall and SD-WAN functionality from a single vendor. The SD-WAN overlay supports dynamic, intelligent path selection based on applications and services and the conditions of links that each application or service is allowed to use. The path health monitoring for each link includes latency, jitter, and packet loss. Granular application and service controls allow you to prioritize applications based on whether the application is mission-critical, latency-sensitive, or meets certain health criteria, for example. Dynamic path selection avoids brownout and node failure problems because sessions fail over to a better performing path in less than one second.
The SD-WAN overlay works with all PAN-OS security features, such as User-ID™ and App-ID™, to provide complete security control to branch offices. The full suite of App-ID capabilities (App-ID decoder, App-ID cache, and source/destination external dynamic list [EDL] IP address lists) identifies applications for application-based control of SD-WAN traffic. You can deploy the firewall with Zero Trust segmentation of traffic. You can configure and manage SD-WAN centrally from the Panorama web interface or the Panorama REST API.
You may have cloud-based services and instead of having your internet traffic flow from branches to the hub to the cloud, you want the internet traffic to flow directly from branches to the cloud using a directly connected ISP. Such access from a branch to the internet is Direct Internet Access (DIA). You don’t need to spend your hub bandwidth and money on internet traffic. The branch firewall is already doing security, so you don’t need the hub firewall to enforce security on internet traffic. Use DIA on branches for SaaS, web browsing, or heavy-bandwidth applications that shouldn’t be backhauled to a hub. The following figure illustrates a DIA virtual interface consisting of three links from the branch to the cloud. The figure also illustrates a VPN tunnel virtual interface consisting of four links that connect the branch to the hub at the headquarters.

SD-WAN Link and Firewall Support

Link bundling allows you to group multiple physical links (that different ISPs use to communicate with the same destination) into a virtual SD-WAN interface. On the basis of applications and services, the firewall chooses from the links (path selection) for session load sharing and to provide failover protection in the event of a brownout or blackout. Thus you are providing the application with the best quality performance. The firewall automatically performs session load sharing over the links in a virtual SD-WAN interface to use available bandwidth advantageously. An SD-WAN interface must have all of the same type of connection (either DIA or VPN). VPN links support the hub-and-spoke topology.
SD-WAN supports the following types of WAN connections: ADSL/DSL, cable modem, Ethernet, fiber, LTE/3G/4G/5G, MPLS, microwave/radio, satellite, WiFi, and anything that terminates as Ethernet to the firewall’s interface. You decide the appropriate strategy for how to use the links. You could use inexpensive broadband connections before expensive MPLS or LTE connections. Alternatively, you could use specific VPN tunnels to reach specific hubs in a region.
See the system requirements for SD-WAN for a full list of firewall models that support SD-WAN software capabilities.
If you are a new customer purchasing a Palo Alto Networks next-generation firewall, you will use the default virtual router for SD-WAN. If you are an existing customer, you can choose to either let PAN-OS overwrite any existing virtual routers or use a new virtual router and new zones for SD-WAN to keep SD-WAN content separate from your pre-existing configuration.

Prisma Access
Hub Support

With SD-WAN plugin 2.2 and later releases, PAN-OS Secure SD-WAN provides you with
Prisma Access
hub support to give you full control of how and where applications are secured.
Prisma Access
Hub support allows PAN-OS firewalls to connect to
Prisma Access
compute nodes (CNs) to achieve cloud-based security in an SD-WAN hub-and-spoke topology. This support enables a seamless link failover from on-premises security to
Prisma Access
and the ability to mix both to meet your security needs.
In a mixed topology with both SD-WAN firewalls and
Prisma Access
hubs, the SD-WAN hubs are
Prisma Access
CNs (IPSec Termination Nodes) and the SD-WAN branches are PAN-OS firewalls. SD-WAN automatically creates IKE and IPSec tunnels that connect the branch to the hub. Using Traffic Distribution profiles, you can create SD-WAN policies to match specific internet applications and redirect them to a PAN-OS firewall or
Prisma Access
deployment of your choice. With
Prisma Access
hub support, on-premises and cloud security platforms work together to provide a complete solution with consistent security policies managed by Panorama.
See the system requirements for SD-WAN for the minimum PAN-OS and SD-WAN plugin versions required for
Prisma Access
Hub support.
Prisma Access
hub support has the following limitations:
  • Importing and exporting an SD-WAN configuration related to
    Prisma Access
    are not supported.
  • Load, Partial Load, Revert, and Partial Revert for the
    Prisma Access
    configuration are not supported.
  • Onboarding to an existing
    Prisma Access
    Remote Network Security Proccessing Node (RN-SPN) is not supported. For an existing branch that is connected to
    Prisma Access
    , you need to delete the branch and then onboard it again.
  • No SD-WAN CLI commands are available on
    Prisma Access
  • On a CN, there is no path selection for traffic that originates on the CN.
  • Prisma Access
    statistics are not provided in SD-WAN reporting and statistics.

Centralized Management

Panorama™ provides the means to configure and manage SD-WAN, which makes configuring multiple options on many geographically-dispersed firewalls much faster and easier than configuring firewalls individually. You can change network configurations from a single location rather than configuring each firewall individually. Auto VPN configuration allows Panorama to configure branches and hubs with secure IKE/IPSec connections. A VPN cluster defines the hubs and branches that communicate with each other in a geographic region. The firewall uses VPN tunnels for path health monitoring between a branch and a hub to provide subsecond detection of brownout conditions.
The Panorama dashboard provides visibility into your SD-WAN links and performance so that you can adjust path quality thresholds and other aspects of SD-WAN to improve its performance. Centralized statistics and reporting include application and link performance statistics, path health measurements and trend analysis, and focused views of application and link issues.
Begin by understanding your SD-WAN use case, then review the SD-WAN configuration elements, traffic distribution methods, and plan your SD-WAN configuration. To greatly accelerate the configuration, the best practice is for you to export an empty SD-WAN device CSV and enter information such as branch office IP address, the virtual router to use, the firewall site name, zones to which the firewall belongs, and BGP route information. Panorama uses the CSV file to configure the SD-WAN hubs and branches and to automatically provision VPN tunnels between hubs and branches. SD-WAN supports dynamic routing through eBGP and is configured using Panorama’s SD-WAN plugin to allow all branches to communicate with the hub only or with the hub and other branches.
If Panorama is managing a multi-vsys firewall, all SD-WAN enabled interfaces and configurations must be configured on vsys1.
SD-WAN does not support an SD-WAN configuration across multiple virtual systems of a multi-VSYS firewall.
SD-WAN interfaces must be configured in the same virtual router; they cannot be split among virtual routers.

Recommended For You