For the applications and services, determine the path
health thresholds at which you consider a path to have degraded
enough in quality that you want the firewall to select a new path
(fail over). The quality characteristics are latency (range is 10
to 2,000 ms), jitter (range is 10 to 1,000 ms), and packet loss percentage.
These thresholds constitute a Path Quality profile, which you reference in an SD-WAN policy rule. When any single threshold (for packet
loss, jitter, or latency) is exceeded (and the remaining rule criteria
are met), the firewall chooses a new preferred path for the matching
traffic. For example, you can create Path Quality profile AAA with
latency/jitter/packet loss thresholds of 1000/800/10 to use in Rule 1
when FTP packets come from source zone XYZ, and create Path Quality
profile BBB (with thresholds of 50/200/5) to use in Rule 2 when FTP
packets come from source IP address 10.1.2.3. Best practice is to start
with high thresholds and test how the application tolerates them. If you
set the values too low, the application may switch paths too
frequently.
Consider whether the applications and services you are
using are especially sensitive to latency, jitter, or packet loss.
For example, a video application might have good buffering that
mitigates latency and jitter, but would be sensitive to packet loss,
which impacts the user experience. You can set the sensitivity of
the path quality parameters in the profile to high, medium or low.
If the sensitivity settings for latency, jitter, and packet loss
are the same, the firewall examines the parameters in the order
of packet loss, latency, jitter.
Decide if there are links among which to load share
new sessions for an application or service.
Plan the BGP configurations that Panorama will push to
branches and hubs to dynamically route traffic between them.
Plan BGP route information, including a
four-byte autonomous system number (ASN). Each firewall site is
in a separate AS and therefore must have a unique ASN. Each firewall
must also have a unique Router ID.
Before implementing
SD-WAN with BGP routing in an
environment where BGP is already in use, ensure that the BGP
configuration generated by the
SD-WAN plugin doesn’t
conflict with your existing BGP configuration. For example, you must use
the existing BGP AS number and router ID values for the corresponding
SD-WAN device values.
If you don’t want to use BGP dynamic routing, plan
to use Panorama’s network configuration features to push out other
routing configurations. You can do static routing between the branch
and hubs. Simply omit all of the BGP information in the Panorama
plugin and use normal virtual router static routes to perform static routing.
Consider the
capacities of firewall models for
virtual
SD-WAN interfaces,
SD-WAN policy rules,
log size, IPSec tunnels (including proxy IDs), IKE peers, BGP and static route
tables, BGP routing peers, and performance for your firewall mode (App-ID™,
threat, IPSec, decryption). Ensure the branch and hub firewall models you intend
to use support the capacities you require.