SD-WAN Configuration for DAIP Security Gateways

This section describes SD-WAN "Overlay - VPN" configuration for Security Gateways with a Dynamically Assigned IP Address (DAIP).

For frequently asked questions about DAIP, see sk167473.

SD-WAN Requirements for DAIP Security Gateways

SD-WAN Security Gateway

Supported Versions

Security Gateways that run Gaia OS

R81.20 Jumbo Hotfix Accumulator, Take 43 and higher.

Quantum Spark Appliances

R81.10.10 and higher.

SD-WAN Support for DAIP Security Gateways

  • SD-WAN supports DAIP Security Gateways in a Star VPN Community or a Mesh VPN Community:

    • Supports a VPN tunnel when one VPN peer is a Security Gateway with a Dynamically Assigned IP Address (DAIP) and another VPN peer is a Security Gateway with a Static IP address.

    • Supports a VPN tunnel when all VPN peers are Security Gateways with a Dynamically Assigned IP Address (DAIP).

      SD-WAN supports this configuration only if the corresponding SD-WAN interfaces on all VPN peers receive their IP addresses dynamically and connect to the Internet directly (not through a NAT device).

  • SD-WAN supports Security Gateways with different IP configuration on their SD-WAN interfaces - an SD-WAN interface with a Dynamically Assigned IP Address (DAIP), and other SD-WAN interfaces with a Static IP address.

    • Quantum Spark appliances can have one or more DAIP SD-WAN interfaces.

  • SD-WAN supports automatic renewal of VPN tunnels on DAIP SD-WAN interfaces:

    • A VPN tunnel recovers automatically after an IP address changes on a DAIP interface that participates in this VPN tunnel:

      [Security Gateway] (DAIP SD-WAN interface) --- [VPN Tunnel]

    • A VPN tunnel recovers automatically after an IP address changes on an IP NAT device in front of an SD-WAN interface that participates in this VPN tunnel:

      [Security Gateway] (SD-WAN interface) (Dynamic IP NAT Device) --- [VPN Tunnel]

SD-WAN Known Limitations for DAIP Security Gateways

  • Security Gateway object in SmartConsole must be configured as "Dynamic address" (on the General Properties page).

    Note - It is not supported to change this setting in an existing Security Gateway object.

    You must delete it and create a new object.

  • IKE negotiation:

    • If each DAIP Security Gateway in a VPN Community uses a DAIP SD-WAN interface without a dynamic IP NAT device in front of it, then each VPN peer can initiate the IKE negotiation.

      [Security Gateway 1] (DAIP SD-WAN interface 1) <===> [VPN Tunnel] <===> (DAIP SD-WAN interface 2) [Security Gateway 2]

    • If a Security Gateway in a VPN Community has a dynamic IP NAT device in front it, then this DAIP Security Gateway can only be the IKE-initiator for this VPN tunnel (cannot be the IKE-responder).

      [Security Gateway 1] (SD-WAN interface 1) (Dynamic IP NAT Device) ===> [VPN Tunnel] ===> (SD-WAN interface 2) [Security Gateway 2]

  • Configuration where a dynamic IP NAT device is connected in front of each SD-WAN Security Gateway is not supported (CGNAT-to-CGNAT):

    [Security Gateway 1] (SD-WAN interface 1) (Dynamic IP NAT Device 1) <===>

    <===> [VPN Tunnel] <===>

    <===> (Dynamic IP NAT Device 2) (SD-WAN interface 2) [Security Gateway 2]

  • After an IP address changes on an IP NAT device in front of an SD-WAN interface that participates in a VPN tunnel, it takes approximately 5 minutes for the VPN tunnel to negotiate again:

    [Security Gateway] (SD-WAN interface) (Dynamic IP NAT Device) <===> [VPN Tunnel] <===>

  • DNS resolving is not supported for DAIP Security Gateways.

  • For a Branch Security Gateway that is configured as a DAIP Security Gateway and performs "Backhaul" through the Center Security Gateway (see Routing Preference "Backhaul Only"):

    You must make sure that the Branch Security Gateway has a direct Internet access. When the IP address changes on the Branch Security Gateway, and its VPN tunnels go down, the Center Security Gateway and other VPN peers must be able to get the new IP address of the Branch Security Gateway.

    You must configure the SD-WAN Policy to match connections that the Branch Security Gateway creates (local connections) to a Steering Behavior configured as "Local Breakout Only" (see Routing Preference "Local Breakout Only") or "Prioritize Local Breakout" (see Routing Preference "Prioritize Local Breakout").

SD-WAN Configuration for DAIP Security Gateways

Important - Schedule a maintenance window.

Part 1 - On a Security Gateway, configure the DAIP settings

Follow the applicable procedure.

Part 2 - In SmartConsole, configure the Security Gateway Object

Follow the applicable procedure.

Note - If you already configured a Security Gateway object in SmartConsole, then you must reset SIC in this object, delete it, and then create a new object.

Part 3 - In SmartConsole, configure the Access Control Policy

Part 4 - In Infinity Portal, configure the SD-WAN Policy

SD-WAN Troubleshooting for DAIP Security Gateways