Uploaded by chicothelaanhluan

pan-os-sd-wan-auto-provisioning-primer

advertisement
PAN-OS SD-WAN
Auto Provisioning Primer
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2022 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of
our trademarks can be found at https://www.paloaltonetworks.com/company/trademarks.html. All other
marks mentioned herein may be trademarks of their respective companies.
Revision Date: March 28, 2022
Table of Contents
Simplifying Deployment Through Automation
SD-WAN Deployment Overview
3
3
SD-WAN Plugin Devices
5
SD-WAN Plugin VPN Clusters
7
SD-WAN Plugin Auto Configuration
9
Interface Management Profile
10
Monitor Profile
10
IKE Crypto Profile
11
IPSec Crypto Profile
11
IKE Gateways
12
IPSec VPN Tunnels
15
Security Zones
17
SD-WAN Interfaces
17
Virtual Router
20
Static Routes
21
BGP Dynamic Routing
23
Enabling BGP Protocol
24
Auto Configured BGP Peer Group and Members
26
Auto Configured BGP Export and Import Rules
29
Auto Configured BGP Redistribution Rules
33
Summary
PAN-OS SD-WAN Auto Provisioning Primer
2
37
© 2022 Palo Alto Networks, Inc.
Simplifying Deployment Through Automation
PAN-OS SD-WAN is a flexible software defined WAN solution that supports hub spoke, full mesh, and hybrid
SASE topologies. To help customers quickly roll out SD-WAN, Panorama’s SD-WAN plugin automates
firewall configuration and enables the necessary features to create a robust and redundant network
between SD-WAN locations.
This paper discusses the deployment steps involved with a new SD-WAN implementation, how the
SD-WAN plugin configures each firewall, and which features are automatically enabled.
SD-WAN Deployment Overview
The following configuration steps are required to onboard the firewalls and to get them ready for SD-WAN
deployment. The first six steps are prerequisites to rolling out SD-WAN and are fully covered in the SD-WAN
Administration Guide so they are not covered in this paper. Please reference those guides for additional
information if needed.
SD-WAN prerequisites include:
1.
2.
3.
4.
5.
6.
Plan your deployment
Register and license the new firewalls (excludes ZTP)
Add firewalls to Panorama
Create Panorama device groups (DG) and templates
Create the Link Tag(s)
Create the virtual routers (optional)
The SD-WAN configuration steps for a greenfield deployment include:
7.
8.
9.
10.
11.
12.
Enable SD-WAN on firewall interface(s)
Group interfaces to create Link Bundle (optional)
Add firewalls to SD-WAN device list
Create SD-WAN VPN cluster
Create SD-WAN profiles and policies
Set up security policies
Steps 9 and 10 are covered thoroughly in this paper as this is where the majority of the automated SD-WAN
configuration is performed. Panorama’s SD-WAN plugin is used to create the SD-WAN network topology
between all SD-WAN locations and to perform monitoring and reporting functions.
© 2022 Palo Alto Networks, Inc.
PAN-OS SD-WAN Auto Provisioning Primer
3
The four SD-WAN plugin components include:
1.
2.
3.
4.
Devices
VPN Clusters
Monitoring
Reporting
The configuration items that are automatically created by the SD-WAN plugin include the following items
and are discussed in detail in the subsequent sections.
●
●
●
●
SD-WAN related profiles
IKE gateways, IPSec VPN tunnels, pre-shared keys
Virtual router and SD-WAN interfaces
Static routes, BGP, and redistribution profiles
Throughout this document, the following hub spoke topology is used to demonstrate the SD-WAN plugin
activity. Two branches named us1-gcp and us2-gcp connect to a single hub named us3hub-gcp and each
site has two ISP circuits and one MPLS WAN connection.
PAN-OS SD-WAN Auto Provisioning Primer
4
© 2022 Palo Alto Networks, Inc.
SD-WAN Plugin Devices
The SD-WAN plugin’s Devices component is used to declare the role of the firewall and set up the routing
features. The firewall’s role can be either a Hub or a Branch and the configuration items automatically
created depend on the declaration.
Branch firewalls can connect to hub and/or branch firewalls and initiate the path health checks to the hub.
Hub firewalls are devices located at the headquarters or data center locations and act as centralized
termination points for branch VPN tunnels. Hub firewalls do not initiate the health checks to the branches.
The following illustration shows an example of the us3hub-gcp hub firewall and its device configuration.
Name - The name of the firewall to declare a Hub or Branch role. The name entered is used in device
lists to simplify onboarding and is displayed in various reports and troubleshooting screens.
Type - The Hub or Branch role to assign to the firewall. Depending on the type assigned, the
SD-WAN plugin creates the necessary IPsec tunnels, enables health check functions, configures BGP
routing, and places the virtual interfaces (VIFs) in the proper SD-WAN zones.
Virtual Router Name - The virtual router (VR) to assign to SD-WAN. All available VRs defined on the
device are displayed in the dropdown list and only one VR can be assigned to the SD-WAN overlay.
Site - A free form field used to provide a descriptive name for the site. A best practice is to provide a
descriptive name to help identify the site in the visualization screens and for simplifying
© 2022 Palo Alto Networks, Inc.
PAN-OS SD-WAN Auto Provisioning Primer
5
troubleshooting. Avoid using spaces or special characters in site names as this may impact how the
data is displayed in the SD-WAN Monitoring functions.
Link Tag (Hub only) - The link tag that is assigned to a hub firewall and is used by DIA AnyPath to
failover branch internet traffic to a hub location.
Zone Selection - Provides a way for existing PAN-OS customers to map an existing zone to one of
the four predefined SD-WAN zones to allow the SD-WAN interfaces to be properly configured for
egress traffic. For new customers that do not have pre-existing security zones, this configuration
step can be omitted and they can use the predefined SD-WAN zones for both SD-WAN traffic
handling and security policies.
BGP - Provides BGP configuration information to the SD-WAN plugin to automatically configure
routing between all firewall devices belonging to the same VPN Cluster. The mandatory information
to configure BGP includes:
●
●
●
●
Router ID - The router ID specified in IPv4 format.
Loopback IP - The loopback IP address that is used for BGP peering between SD-WAN
firewalls. The router ID can be used as the loopback IP.
AS Number - A private BGP ASN from either a 2 byte or 4 byte range. A valid private ASN falls
into the following ranges: 2 byte (54512 - 65534), 4 byte (4200000000 - 4294967294).
Prefixes - IP prefixes (networks) that are redistributed from the firewall to all other locations.
For hub firewalls, prefixes are required. For branch firewalls, all connected routes are
PAN-OS SD-WAN Auto Provisioning Primer
6
© 2022 Palo Alto Networks, Inc.
automatically redistributed to all other locations. Additional non-connected prefixes can be
added to branch firewalls if needed using the Prefixes field.
The BGP configuration options provided in the SD-WAN plugin Devices screen are sufficient to
create the BGP routing between all locations. A separate Panorama template or device group is not
required to complete the BGP configuration.
Upstream NAT - Provides the upstream NAT IP address information (static IP or DDNS) for the
SD-WAN plugin to properly configure IKE and IPSec VPN tunnels between the SD-WAN sites. This is
optional and is only required for firewalls that have another device ahead of it performing NAT
address translation.
Prisma Access Onboarding (Branch) - Provides the ability to connect the branch firewall to a Prisma
Access hub (IPSec Termination Node) to create a hybrid SASE topology. Please reference the
“Onboard PAN-OS Firewalls to Prisma Access” for more information.
SD-WAN Plugin VPN Clusters
The SD-WAN plugin’s VPN Clusters component is used to create the SD-WAN network topology and HubSpoke, Mesh (branch-to-branch), and hybrid deployments are supported. The VPN Clusters component
makes it easy to roll out dozens to hundreds of SD-WAN sites through an intuitive user interface and
automates many network configuration items behind the scenes.
© 2022 Palo Alto Networks, Inc.
PAN-OS SD-WAN Auto Provisioning Primer
7
Name - The name of the VPN cluster. This is a free form field and spaces are not permitted. The best
practice is to give the VPN cluster a descriptive name to make it more intuitive when using the
visualization, reporting, and troubleshooting components. The SD-WAN plugin can create and
manage multiple VPN clusters for larger SD-WAN deployments.
Type - The network topology type declared for the VPN cluster. Either Hub-Spoke or full Mesh
(branch-to-branch) topologies are supported. Hubs are optional for the full mesh branch-to-branch
network topology and if added, the topology becomes a hybrid where the branches are connected
to both the hub locations as well as to every other branch.
Branches - Add “branch” firewall devices to the VPN cluster. When the firewalls were onboarded
with the SD-WAN plugin’s Devices component, they were given a device type - either branch or hub.
The plugin displays all the “branch” devices to simplify the VPN cluster creation. In the example
above, two branch locations connect to a single hub location in a hub spoke topology.
Hubs - Add “hub” firewall devices to the VPN cluster. All firewalls onboarded with the SD-WAN
plugin’s Devices component using a type of “hub” will be displayed in the list. A maximum of four
hubs are supported to provide a waterfall failover topology for the branch locations. Hubs can
belong to more than one VPN cluster.
HA Status - Shows the HA state of the HA Active/Passive firewall members. A location that
deploys two SD-WAN firewalls in an HA A/P pair must add both firewalls to the VPN cluster
using the plugin. You can optionally “Group HA Peers” to simplify the management and
display of the firewall pair.
Hub Failover Priority - Assigns a failover priority to the hub to provide a waterfall failover
capability for the branch locations. The hub failover is activated when multiple hubs are
advertising the same hub networks (prefixes) to the branches to provide redundancy. A
priority of “1” is the highest priority and the valid priority range is 1 to 4. The hub failover
priority instructs the plugin to modify the branch firewalls’ BGP import rule Local Preference
setting to control the failover order to each of the connected hubs. When the highest priority
hub is not available, the branch forwards its hub traffic through the second priority hub, and
so on down the list until the lowest priority firewall is reached.
Allow DIA VPN - Controls the ability to permit or deny the branch firewalls’ ability to fail its
DIA traffic (internet) over to hub location. Enabling the checkbox permits the branches to
send their internet traffic through the hub to get a better Internet user experience if their
local ISP circuits are congested or down.
Tip: If the hub locations have plenty of bandwidth and can be used as an alternate DIA
path, enabling this option provides the best redundancy for the branches. For hub locations
PAN-OS SD-WAN Auto Provisioning Primer
8
© 2022 Palo Alto Networks, Inc.
that do not have sufficient bandwidth, disable this option as the additional branch traffic can
negatively impact the hub’s internet circuits.
When the firewall devices have been added and the VPN clusters configured, Panorama creates the
configuration for the branch and hub firewalls automatically. To bring the SD-WAN topology up, perform a
Panorama commit and push the configuration to the firewall devices in the cluster.
SD-WAN Plugin Auto Configuration
The Panorama SD-WAN plugin greatly reduces the time and configuration complexity that is involved in
deploying a redundant and highly reliable SD-WAN network across many locations. The items that are
automatically configured by the SD-WAN plugin include the following:
●
●
●
●
●
●
●
●
●
●
●
Interface Management Profile
Monitor Profile
IKE Crypto Profile
IPSec Crypto Profile
IKE Gateways
IPSec VPN Tunnels
Security Zones
SD-WAN Interfaces
Virtual Router
Static Routes
BGP Dynamic Routing
Administrators can verify the auto created items on their SD-WAN enabled firewalls by changing the device
context within Panorama and drilling down on each firewall’s SD-WAN configuration. The illustration below
shows how to select the firewall in the VPN cluster to view.
© 2022 Palo Alto Networks, Inc.
PAN-OS SD-WAN Auto Provisioning Primer
9
Interface Management Profile
A new Interface Management Profile named “check_ping” is automatically created on the firewall and
enabled with the new “Ping” network service. This profile is applied to all SD-WAN VPN tunnels configured
on the firewall and allows the virtual interface to participate in the SD-WAN ICMP health checks.
Monitor Profile
A new Monitor Profile named “sdwan default” is created on the firewall and enabled with the Wait Recover
action and the default values for a 3 second interval and threshold of 5 are applied. The monitor profile is
applied to all SD-WAN VPN tunnels to control the tunnel monitoring activity to detect tunnel failures.
PAN-OS SD-WAN Auto Provisioning Primer
10
© 2022 Palo Alto Networks, Inc.
IKE Crypto Profile
A new IKE Crypto Profile named “sdwan default” is created on the firewall and enabled for strong security
with DH Group 20, AES-256-CBC encryption, and SHA384 authentication. The pre-shared key lifetime is set
to renew every 8 hours and all IKE gateway peering between the SD-WAN locations use this profile.
IPSec Crypto Profile
A new IPSec Crypto Profile named “sdwan default” is created on the firewall and enabled for strong security
with AES-256-GCM encryption, DH Group 20 with a 1 hour lifetime, and SHA256 authentication. All SD-WAN
IPSec tunnels use this profile to secure communications between SD-WAN locations.
© 2022 Palo Alto Networks, Inc.
PAN-OS SD-WAN Auto Provisioning Primer
11
IKE Gateways
The Panorama SD-WAN plugin automatically configures an IKE Gateway on all firewall interfaces that are
enabled for SD-WAN and assigned an SD-WAN interface profile. The interface profile’s link type can provide
additional input to determine the IKE gateway creation. For example, an IKE gateway is created between all
public link types on the hub and branch firewalls in a hub spoke topology or between all branch firewalls in
a mesh topology. IKE gateways are also created between private WAN link types such as MPLS to MPLS and
satellite to satellite circuits.
The illustration below shows an example of the IKE Gateway created on the us3hub-gcp hub firewall. In
addition, the SD-WAN plugin adds a comment to show where the IKE gateway is applied. In this example,
this IKE gateway is used for the us2-gcp branch 2 connection and the firewall belongs in the Cluster-US VPN
cluster.
PAN-OS SD-WAN Auto Provisioning Primer
12
© 2022 Palo Alto Networks, Inc.
The SD-WAN plugin uses the following naming convention for IKE gateways:
gw_0101_007058044445587_0104
gw - Identifies the gateway as an SD-WAN provisioned gateway.
0101 - The local firewall’s source interface participating in the SD-WAN IKE peering - 0101 is Eth1/1.
007058044445587 - The serial number of the peer firewall participating in the IKE relationship.
0104 - The peer firewall’s local interface used in the SD-WAN IKE peering activity - 0104 is Eth1/4.
SD-WAN IKE Gateway peering is performed with the following default configuration:
Version - Configured for “IKEv2 only mode” to support strong security and efficient peering.
Address type - Configured for the IPv4 address family.
© 2022 Palo Alto Networks, Inc.
PAN-OS SD-WAN Auto Provisioning Primer
13
Interface - Auto populated by the SD-WAN plugin for interfaces that have SD-WAN enabled.
Local IP Address - Auto populated by the SD-WAN plugin and the IP address is extracted from the
SD-WAN interface.
Peer IP Address Type - Configured according to the firewall’s SD-WAN device type. Hubs are set
with a Dynamic peer type and allow the branch to initiate the VPN Phase 1 activity. Branches are set
with the hub’s IP address or another branch’s IP address information (mesh topology).
Authentication - Configured for “Pre-shared Key”.
Pre-shared Key - Automatically populated with a random 32 character key generated by a complex
algorithm. The key is stored in a secured area of the operating system that is not accessible and key
lifetimes are set relatively short to ensure keys are rotated regularly. Administrators can manually
refresh IKE keys at any time using the “Refresh Ike Key” function in the VPN Clusters plugin option.
Local and Peer Identification - Configured to use KEYID authentication, which is generated from
the device serial number in binary format.
Comment - Auto populated with the name and serial number of the remote firewall the IKE gateway
is terminated on. The VPN cluster information is also shown.
The SD-WAN plugin also configures IKE Gateway options in the Advanced Options tab as follows:
PAN-OS SD-WAN Auto Provisioning Primer
14
© 2022 Palo Alto Networks, Inc.
Common Options - Items configured depend on the SD-WAN device type.
●
●
Hub devices have both “Enable Passive Mode” and “Enable NAT Traversal” enabled.
Branch devices have “Enable NAT Traversal” enabled. The “Enable Passive Mode” is never
selected for a branch firewall as it has to initiate the IKE Phase 1 activity to the peer.
IKEv2 IKE Crypto Profile - The ”sdwan-default” profile is automatically selected for the SD-WAN IKE
gateway and the “Strict Cookie Validation” checkbox is disabled.
IKEv2 Liveness Check - Configured with a 5 second interval.
IPSec VPN Tunnels
The SD-WAN plugin automatically configures the IPSec VPN tunnels based on the IKE gateways
provisioned. The plugin also creates the required number of IPSec tunnels to create a mesh between the
ISP circuits defined on both firewalls. In this paper’s hub spoke example, the us1-gcp branch firewall had
two ISP circuits and the us3hub-gcp hub firewall had two ISP circuits, so a total of four VPN tunnels would
be created between the two SD-WAN firewalls’ ISP interfaces.
© 2022 Palo Alto Networks, Inc.
PAN-OS SD-WAN Auto Provisioning Primer
15
The SD-WAN plugin uses the following naming convention for SD-WAN IPSec tunnels:
tl_0101_007058044445578_0104
tl - Identifies the virtual interface as an SD-WAN provisioned IPSec tunnel.
0101 - The local firewall’s source interface that originated the IPSec tunnel - 0101 is Eth1/1.
007058044445578 - The serial number of the peer firewall the IPSec tunnel terminates to.
0104 - The peer firewall’s local interface used to terminate the IPSec tunnel - 0104 is Eth1/4.
SD-WAN IPSec VPN tunnel is created with the following default configuration:
Tunnel Interface - The tunnel interface is automatically provisioned by the SD-WAN plugin starting
with “tunnel.900” and increases upward for each new tunnel added.
TIP: If there are existing IPSec tunnels that are numbered above 900, they need to be
renumbered below 900 before enabling PAN-OS SD-WAN on the firewall.
Type - Configured for “Auto Key”.
Address Type - Configured for the IPv4 address family.
IKE Gateway - Automatically populated with the IKE gateway the SD-WAN plugin created. See the
IKE Gateways section for more details.
IPSec Crypto Profile - Automatically configured with the “sdwan-default” IPSec crypto profile the
SD-WAN plugin created. The “Show Advanced Options” and “Enable Replay Protection” options are
enabled with an Anti Replay WIndow size of 1024.
Tunnel Monitor - Automatically enabled and the “Destination IP” is populated with an IP address
from the “VPN Address Pool'' defined in the SD-WAN Plugin’s VPN Cluster configuration.
PAN-OS SD-WAN Auto Provisioning Primer
16
© 2022 Palo Alto Networks, Inc.
The Monitoring Profile is automatically configured to use the “sdwan-default” monitoring profile
created by the SD-WAN plugin.
Comment - Auto populated with the name and serial number of the remote firewall the IPSec
tunnel is terminated on. The VPN cluster information is also shown.
Security Zones
The SD-WAN plugin automatically creates the necessary security zones it needs to deploy SD-WAN. The
zones created include:
zone-internal - Used by the loopback interface specified in the Devices configuration when the
SD-WAN firewall was on-boarded to Panorama. The loopback interface is used to set up BGP
peering between the VPN cluster’s SD-WAN firewalls.
zone-to-branch - Used by the SD-WAN virtual interfaces (VIFs) defined on the hub or branch firewall
that are destined to go to a branch location. When this zone is created on the hub firewall, all VIFs
going to branch locations are placed in this zone. When this zone is created on the branch firewall,
all VIFs going to another branch location in a branch-to-branch mesh topology are placed in this
zone.
zone-to hub - Used by the SD-WAN virtual interfaces (VIFs) defined on the branch firewall that are
destined to go to a hub location.
zone-to-internet - Used by interfaces that go to the public internet. By default, this zone doesn’t
have any interfaces.
zone-to-pa-hub - Used by branch firewalls that are connected to a Prisma Access Hub (IPSec
Termination Node). The VIF that connects to the Prisma Access Hub is placed into this zone.
SD-WAN Interfaces
The SD-WAN plugin automatically creates the interface types it needs to fully activate SD-WAN on the
branch and hub firewalls. The three different interfaces types created include:
loopback.901 - A loopback interface created for BGP peering between the firewalls belonging to the
same VPN cluster. This loopback interface is added to zone-internal automatically and only one
loopback interface is required per firewall.
© 2022 Palo Alto Networks, Inc.
PAN-OS SD-WAN Auto Provisioning Primer
17
tunnel.9xx - The IPSec tunnel interfaces created to connect the SD-WAN firewalls together. The
number of tunnels created by the SD-WAN plugin depends on the VPN cluster type (Hub-Spoke or
Mesh), the number of branches and hubs in the VPN cluster, and the number of SD-WAN enabled
interfaces (ISP circuits) at each location. The tunnel numbering starts from tunnel.900 and increases
upward for each tunnel added and the numbering doesn’t have to be sequential. The illustration
below shows the us2-gcp branch firewall’s VPN tunnels that were automatically created by the
SD-WAN plugin. The comment field contains important information showing where the VPN tunnel
is terminating and in this example, it’s the us3hub-gcp hub firewall.
sd-wan.9xx - The SD-WAN virtual interfaces (VIFs) created to group IPSec tunnels or DIA Ethernet
interfaces together. All IPSec tunnels going to the same destination are grouped together in the
same VIF interface.
PAN-OS SD-WAN Auto Provisioning Primer
18
© 2022 Palo Alto Networks, Inc.
TIP: By default, the DIA interfaces are always grouped into the sdwan.901 interface while IPSec
tunnels are grouped into sdwan.902 or higher VIF interfaces.
To illustrate this concept, the example below shows the us1-gcp branch firewall’s sdwan.904 VIF
grouping five IPSec tunnels together. The VPN tunnels range from tunnel.901 - tunnel.905 and they
all go to the us3hub-gcp hub firewall. The us1-gcp branch firewall also groups three Ethernet
interfaces, ranging from Ethernet1/1 - Ethernet1/3, together into the sdwan-901 VIF to service DIA
internet traffic.
In this example, the branch firewall is configured with DIA AnyPath to allow the branch office to
redirect its internet traffic to the hub location to obtain a better path if its ISP circuits degrade or go
down. To support DIA AnyPath, the sdwan-904 VIF is also placed in the DIA VIF and the path
selection order is controlled by the Traffic Distribution Profile.
© 2022 Palo Alto Networks, Inc.
PAN-OS SD-WAN Auto Provisioning Primer
19
Virtual Router
PAN-OS SD-WAN supports one virtual router (VR) for SD-WAN routing and both static routes and BGP are
used to forward traffic to the internet and to the other SD-WAN locations. The option to disable the BGP
configuration and use only static routes to customize routing for special use cases is also supported, but this
paper concentrates on the BGP routing option that is configured by the SD-WAN plugin.
Panorama templates are used to configure and push the SD-WAN virtual router and its Ethernet interfaces
to each firewall defined in the VPN cluster. Afterwards, the SD-WAN plugin is used to add the SD-WAN
virtual interfaces to the VR to complete the SD-WAN configuration.
The illustrations below show two views of the same SD-WAN VR called “DemoRouter” and how the SD-WAN
plugin automatically configures and adds the necessary SD-WAN virtual interfaces to the VR.
●
The first illustration is from the Panorama template and shows how the VR is configured with the
physical Ethernet interfaces used by each firewall.
●
The second illustration is from the local firewall and shows how the VR is configured with the
SD-WAN virtual interfaces and the physical Ethernet interfaces.
The Panorama template configures each firewall’s SD-WAN VR to include the physical Ethernet interfaces
the firewall uses for SD-WAN. You can also use the VR to support other interfaces that you don't use for
SD-WAN. The following illustration shows an example of the “DemoRouter” VR used in each of the firewalls
showcased in this paper. The SD-WAN interfaces are Ethernet1/1 - Ethernet1/3 and the remaining interfaces
are used for other purposes.
PAN-OS SD-WAN Auto Provisioning Primer
20
© 2022 Palo Alto Networks, Inc.
The next illustration shows the branch firewall’s VR configuration after Panorama pushed the SD-WAN
configuration to each firewall. When viewed from the local firewall’s perspective, the VR shows all SD-WAN
interfaces, both physical and virtual, as well as any other interfaces required to support the local functions
that are assigned to the “DemoRouter” VR.
Static Routes
The SD-WAN plugin creates static routes to enable the SD-WAN network and the number of static routes depends on the
VPN cluster type (Hub-Spoke or Mesh) and the number of SD-WAN firewalls added to the VPN cluster.
For hub spoke topologies, the SD-WAN plugin creates a minimum of two static routes. In our hub spoke example with one
hub and two branch locations, the SD-WAN plugin creates three static routes on the hub firewall and two static routes on
each of the branch firewalls. The types of static routes that are automatically created include:
●
●
A default route used to process local DIA traffic and DIA AnyPath failover traffic (if configured)
One or more static routes used to establish BGP peering with other SD-WAN firewalls (hub or branches)
© 2022 Palo Alto Networks, Inc.
PAN-OS SD-WAN Auto Provisioning Primer
21
The following two illustrations show the static routes that were automatically created on the us3hub-gcp hub firewall and
one of the branch firewalls.
Hub Firewall - The hub firewall has three static routes with the first one assigned to the default route (0.0.0.0/0)
using the sdwan.901 interface and a metric of 5. The second and third static routes are created for each of the
connected branches using the corresponding sdwan.904 and sdwan.905 VIF interfaces, and the destination network
is the branch’s loopback address that is used for BGP peering. A metric of 10 is assigned to the branch static routes.
Branch Firewall - The branch firewall has two static routes with the first one assigned to the default route (0.0.0.0/0)
using the sdwan.901 interface and a metric of 5. The second static route is assigned to the hub and points to the
hub’s loopback address as the destination. The hub static route uses the sdwan.904 VIF interface and it is assigned a
metric of 10.
PAN-OS SD-WAN Auto Provisioning Primer
22
© 2022 Palo Alto Networks, Inc.
BGP Dynamic Routing
The SD-WAN plugin automatically configures BGP routing on each firewall that belongs to the same VPN
cluster. When the firewall is on-boarded to Panorama and added as an SD-WAN device, the option to
enable and configure the BGP parameters is provided. When Panorama creates the SD-WAN configuration,
the BGP parameters entered for each firewall are used to configure the firewall’s virtual router and to ensure
BGP peering, routing, and filtering is configured automatically.
This greatly reduces the time and resources needed to deploy PAN-OS SD-WAN, but it also hides a lot of the
routing and SD-WAN configuration - which can make the deployment harder to understand or
troubleshoot if you do not know where the automatic configurations were made..
Warning: The hub spoke network topology introduced in the SD-WAN Deployment Overview
section is referenced frequently in this section. Please familiarize yourself with the topology
beforehand.
The following illustration recaps the firewalls used to form the hub spoke topology referenced in all example
configurations. All three devices (one hub and two branches) are members of the “Cluster-US” VPN cluster.
Hub - The hub firewall is named us3hub-gcp and is configured to allow DIA AnyPath to failover
internet traffic from the branch firewalls to the hub. As there is only one hub defined in the VPN
cluster, the Hub Failover Priority doesn’t come into play, so setting any priority level is fine.
Branches - The branch firewalls are named us1-gcp and us2-gcp and connect to the hub named
us3hub-gcp.
© 2022 Palo Alto Networks, Inc.
PAN-OS SD-WAN Auto Provisioning Primer
23
The following illustration shows the SD-WAN Devices summary screen which lists the hub and both
branches along with their routing and zone information and it’s a fast way to validate the BGP peering
information for the VPN cluster’s firewalls.
As shown in the previous sections, the SD-WAN plugin also configures the static routes and creates the
SD-WAN VIFs to support the DIA traffic and the connections between the hub and two branches.
To set up the VPN cluster’s BGP routing protocol, the SD-WAN plugin automatically configures the
following BGP components.
●
●
●
●
Enables BGP routing protocol
Configures BGP peer group and members
Configures BGP export and import rules
Configures BGP redistribution rules
The PAN-OS SD-WAN plugin uses many of the BGP protocol’s default settings and this document points
out the important BGP settings that are required for a successful PAN-OS SD-WAN deployment. If there is
no mention of a BGP parameter, the default value is used.
Enabling BGP Protocol
For each firewall in the VPN cluster, the SD-WAN plugin enables and configures BGP automatically and no
additional Panorama templates are required to get basic routing set up for SD-WAN. For advanced
networks and routing requirements, additional Panorama templates can be used to add more functionality.
Warning: Templates that contain overlapping BGP routing objects are overwritten by the
SD-WAN plugin’s BGP configuration. For example, if a non-SD-WAN template was used to assign
the ASN to the BGP router and it is a different value from the ASN defined on the SD-WAN plugin’s
Devices setting, it is overwritten when a Panorama push is performed.
PAN-OS SD-WAN Auto Provisioning Primer
24
© 2022 Palo Alto Networks, Inc.
General Tab: The SD-WAN plugin configures the BGP General Tab with the following settings:
BGP Feature
Hub Firewall
Branch Firewall
BGP
Enabled
Enabled
Router ID
Retrieved from Devices
Retrieved from Devices
AS Number
Retrieved from Devices
Retrieved from Devices
Install Route
Enabled
Enabled
Reject Default Route
Enabled
Enabled
Aggregate MED
Enabled
Enabled
Deterministic MED Comparison
Enabled
Enabled
The following illustration shows the branch firewall’s BGP General configuration and the options that are
enabled.
© 2022 Palo Alto Networks, Inc.
PAN-OS SD-WAN Auto Provisioning Primer
25
TIP: For existing PAN-OS networks where BGP is already configured, care must be taken
when enabling SD-WAN. The same Router ID and AS Numbers that you’re already using should be
used for SD-WAN when configuring the firewall in the SD-WAN plugin’s Devices component.
Otherwise, the SD-WAN plugin’s BGP settings override the existing BGP information on the firewall.
For the BGP Advanced tab, the PAN-OS BGP protocol’s default values are used.
Auto Configured BGP Peer Group and Members
The SD-WAN plugin generates the peer group and adds the necessary peers to the configuration based on
the SD-WAN topology selected and the number of SD-WAN devices in the VPN cluster. The SD-WAN plugin
automatically names the peer group using the serial number of the firewall and any pre-existing BGP peers
are placed in order after the SD-WAN peers. The following syntax is used in the auto configured peer
groups.
branch_”serial-number-of-peer-device”
TIP: Automatically generated names have a maximum length. If the combined name of
“branch_name + serial_number” exceeds the maximum characters, the SD-WAN plugin truncates
the serial number and only uses the last 4 digits.
The illustration below shows an example of the peer groups created on the us3hub-gcp hub firewall and
there are two branch peer groups configured - one for each branch the hub is connected to.
PAN-OS SD-WAN Auto Provisioning Primer
26
© 2022 Palo Alto Networks, Inc.
Within each peer group, the SD-WAN plugin adds the peer for the firewall to exchange BGP information
with. The peer name uses the BGP peer’s serial number and the syntax is shown below..
branch_”serial-number-of-peer-device”
Peer Group/Peer Tab: The SD-WAN plugin configures the BGP Peer Group and its BGP Peer with the
following settings:
BGP Feature
Hub Firewall
Branch Firewall
Peer Group Name
Auto generated
Auto generated
Peer Group
Enabled
Enabled
Remove Private AS
Enabled
Enabled
Peer Name
Auto generated
Auto generated
Peer
Enabled
Enabled
Peer AS
Retrieved from Devices
Retrieved from Devices
Address Family
IPv4/Unicast
IPv4/Unicast
Local Address Interface
SD-WAN loopback.901
SD-WAN loopback.901
Peer Address (IP)
Retrieved from Devices
Retrieved from Devices
Multi Hop
64
64
The illustrations below show an example of the hub’s peer group and peer created on the us3hub-gcp hub
firewall to connect to the “us2-gcp” branch firewall.
© 2022 Palo Alto Networks, Inc.
PAN-OS SD-WAN Auto Provisioning Primer
27
As mentioned, the SD-WAN plugin reuses many of the BGP protocol’s default settings to simplify
deployment. The Multi Hop setting is increased to 64 to account for longer paths with additional hops.
TIP: As a reference, the SD-WAN Interfaces summary screen also provides a list of the SD-WAN VIFs
going to each destination and verifies the destination firewall in the comment column. In the illustration
below, we can see the two branch firewalls the hub is connected to and the corresponding SD-WAN VIF
interfaces and its VPN tunnel VIFs used.
PAN-OS SD-WAN Auto Provisioning Primer
28
© 2022 Palo Alto Networks, Inc.
Auto Configured BGP Export and Import Rules
To provide the proper exchange of network information from each firewall to its BGP peer, the SD-WAN
plugin automatically creates export and/or import rules on each firewall depending on its role. Hub firewalls
are configured with an export rule and branch firewalls are configured with an import and export rule.
Hub Export Rule
The export rule created on the hub firewall is named “default” and includes all branch devices from the VPN
cluster that the hub belongs to. The illustration below shows the export rule created for the us3hub-gcp
hub firewall in our SD-WAN example topology.
© 2022 Palo Alto Networks, Inc.
PAN-OS SD-WAN Auto Provisioning Primer
29
The export rule configures a match requirement that matches on a specific community string to correctly
propagate the BGP routes to its SD-WAN peers. Each SD-WAN peer is assigned a unique community string
which is created from the loopback.901 interface’s IP address, and the action is configured to “Allow” the
export.
Creating Community Strings
The SD-WAN plugin creates each firewall’s community string from its 32bit IPv4 loopback IP address and it
is displayed as two 16 bit numbers, commonly known as “new format”.
PAN-OS SD-WAN Auto Provisioning Primer
30
© 2022 Palo Alto Networks, Inc.
(0 - 65535):(0-65535)
For example, if the loopback IP address is 1.2.3.4, the SD-WAN plugin performs the following translation to
create the community string in decimal representation form.
IPv4 loopback address:
1.2.3.4
is translated to Hex
Hex representation:
0x0102:0x0304
is translated to Decimal
Decimal representation:
258:772
Branch Import and Export Rules
Branch firewalls are configured with both an import and an export rule to control failover and how its routes
are propagated to its peers. The import rule controls how the branch fails over between the multiple hubs
defined in the VPN cluster. A maximum of four hubs can be defined and the Hub Failover Priority creates a
waterfall failover capability between the hubs. Reference the VPN Cluster section for more information.
The SD-WAN plugin converts the Hub Failover Priority into a BGP local preference value and configures the
branch firewall’s BGP settings accordingly. When routes are imported from the hubs, the corresponding
local preference is applied to ensure proper failover priority, and the firewall with the highest BGP local
preference value is the preferred hub.
The following translation is applied between the Hub Failover Priority and the BGP local preference value.
Hub Failover Priority
BGP Local Preference
1
250
2
200
3
150
4
100
TIP: The import rule only applies if the same route(s) are advertised from multiple hub
locations, as “more specific” routes alway win regardless of the local preference applied.
For example, the routes for 10.10.100.0/24 - 10.10.150.0/24 are advertised from two different hub
locations as the hubs are designed to back each other up. The hub firewall assigned with the Hub
© 2022 Palo Alto Networks, Inc.
PAN-OS SD-WAN Auto Provisioning Primer
31
Failover Priority of “1” and local preference of “250” becomes the preferred hub location over the hub
firewall assigned with a Hub Failover Priority of “2” and a local preference of “200”.
The SD-WAN plugin names the import rule using the following syntax:
LPREF_”serial-number-of-hub-device”
The following illustration shows the us2-gcp branch firewall’s BGP import rule and the match is performed
on the “us3hub-gcp” hub firewall to apply its corresponding BGP local preference value of “250”.
PAN-OS SD-WAN Auto Provisioning Primer
32
© 2022 Palo Alto Networks, Inc.
The SD-WAN plugin also creates a BGP export rule on the branch firewall that controls the networks
advertised to its peers. Like the hub’s export rule, the branch’s export rule is also named “default” and it
matches on a specific community string for the peer firewall and the “Allow” action enables BGP to export
the networks. The number of export rules created for the branch firewall depends on the VPN cluster
topology and the number of hub and branch members.
Auto Configured BGP Redistribution Rules
The SD-WAN plugin automatically creates BGP redistribution rules on the hub and branch firewalls to
control the exchange of route information between the VPN cluster firewalls. The number of redistribution
rules created depends on the SD-WAN firewall role - either a hub or a branch.
Hub Redistribution Rule
The hub firewall is configured with a BGP redistribution rule that includes all networks defined on the hub’s
Devices “Prefix(es) to Redistribute” configuration. The illustration below shows the network prefixes that are
redistributed from the hub to the branches.
The SD-WAN plugin also appends the unique community string to the redistribution rule that matches the
export rule and this completes the configuration to allow the firewall to propagate its network prefixes to
the corresponding peer firewalls. The illustration below shows the us3hub-gcp hub firewall’s BGP
redistribution rule and it also highlights the “Allow Redistribute Default Route” checkbox’s disabled setting,
which gives the SD-WAN plugin control to configure the default route using the sdwan-901 VIF.
© 2022 Palo Alto Networks, Inc.
PAN-OS SD-WAN Auto Provisioning Primer
33
The illustration below show the us3hub-gcp hub firewall’s 192.168.0.0/16 redistribution rule in greater detail
and the auto generated community string that matches the hub’s BGP export rule.
Branch Redistribution Rules
The branch firewalls are configured with two BGP redistribution rules. The first rule is designed to advertise
the branch firewall’s connected routes to all other peer locations. The following illustration shows the
PAN-OS SD-WAN Auto Provisioning Primer
34
© 2022 Palo Alto Networks, Inc.
us2-gcp branch firewall’s “connected” redistribution profile created by the SD-WAN plugin. A default priority
of “10” is assigned.
The next two illustrations show how the SD-WAN plugin applies the redistribution profile to the branch
firewall’s BGP Redistribution Rule tab and how the auto generated community strings are matched with
the export rule.
© 2022 Palo Alto Networks, Inc.
PAN-OS SD-WAN Auto Provisioning Primer
35
The second redistribution rule, named “rd_bgp_block”, is designed to exclude the branch firewall’s SD-WAN
interfaces from being advertised to the other sites. The SD-WAN plugin assigns this rule a priority of “1” to
give it priority over the previous redistribution rule and ensure it’s evaluated first.
The illustration below shows rd_bgp_block redistribution profile with the “No Redist” option selected to
block the redistribution. All Ethernet interfaces that are enabled with SD-WAN are added to the profile
automatically by the SD-WAN plugin.
PAN-OS SD-WAN Auto Provisioning Primer
36
© 2022 Palo Alto Networks, Inc.
The SD-WAN plugin adds the rd_bgp_block redistribution profile to the branch firewall’s BGP redistribution
rules to complete the configuration.
TIP: If changes are made to the SD-WAN plugin’s Devices or VPN Clusters components,
Panorama performs a template commit to all firewall members in the VPN cluster.
Summary
This paper shows the power of the Panorama SD-WAN plugin and how it greatly simplifies the
configuration of many SD-WAN components on both the hub and branch firewalls. By auto configuring
many tedious and complex settings, the plugin helps to eliminate configuration error and makes easy work
of rolling out a new SD-WAN topology.
For more information on SD-WAN concepts, administration guides, and technical papers, please visit the
following links:
●
●
●
PAN-OS Administration Guide
PAN-OS SD-WAN TechDocs
Panorama TechDocs
© 2022 Palo Alto Networks, Inc.
PAN-OS SD-WAN Auto Provisioning Primer
37
Download