Guidelines for Planning and Configuring SD-WAN
Before you configure your Security Gateway for SD-WAN, review the planning and configuration guidelines below.
In addition, refer to SD-WAN Best Practices.
Public IP addresses that are not part of the Internet, but should be routed internally
Do you have traffic going to destinations with public IP addresses that are not part of the Internet, but should be routed internally (examples: DMZ, LAN, VoIP, Inbound NAT Pools, networks on a remote site behind MPLS or VPN)?

Example topology:
A DMZ network behind the Security Gateway must use a public IP address.
If yes, then follow the applicable scenario.

If all these conditions occur:
-
Your Security Gateway runs:
-
R82 and higher
-
R81.20 Jumbo Hotfix Accumulator Take 79 and higher
-
-
You use public IP addresses in your internal networks.
-
These "internal" public IP addresses are:
-
Part of the VPN Domain, or
-
Part of the local networks that are connected directly to the Security Gateway.
-
Then it is not necessary to configure a bypass rule anymore in the SD-WAN Policy.
Use these Dynamic Objects in your SD-WAN Policy:
-
My VPN Domain - in the " " rules
-
Peer VPN Domain - in the " " rules
-
SD-WAN Internet - in the "Local Breakout" rules
Explanations:
-
The Dynamic Objects My VPN Domain and Peer VPN Domain will include public subnets inside the VPN Encryption Domain for overlay rules.
-
The Dynamic Object SD-WAN Internet will exclude public IP addresses that are part of the VPN Encryption Domain, or belong to the Security Gateway interfaces.
Currently, the Dynamic Object SD-WAN Internet does not exclude public subnets that are routed to a different next hop on the Security Gateway and are not connected directly to the Security Gateway.
-
For more information about these Dynamic Objects, see Dynamic Objects in SD-WAN Policy.

If all these conditions occur:
-
Your Security Gateway runs:
-
R82 and higher
-
R81.20 Jumbo Hotfix Accumulator Take 79 and higher
-
-
You use public IP addresses in your internal networks.
-
These "internal" public IP addresses are not part of the VPN Domain.
-
These "internal" public IP addresses are not part of the local networks that are connected directly to the Security Gateway.
Then:
-
In SmartConsole, create a simple Network Group object that contains all such "internal" public IP addresses (for example, call it "Public_IPs_Group") and install the Access Control policy.
-
In Infinity Portal, configure this bypass rule at the top of the SD-WAN Policy (see Configuring SD-WAN Policy):

If your Security Gateway runs:
Then:
-
In SmartConsole, create a simple Network Group object that contains all such "internal" public IP addresses (for example, call it "Public_IPs_Group") and install the Access Control policy.
-
In Infinity Portal, configure this bypass rule at the top of the SD-WAN Policy (see Configuring SD-WAN Policy):
Inbound Non-Encrypted Traffic to Internal Servers
Do you have inbound non-encrypted traffic from the Internet to published resources behind the Security Gateway?

|
Note - If the destination IP address of the inbound traffic is a public IP address, then follow the guidelines in Public IP addresses that are not part of the Internet, but should be routed internally. |
If yes, then do you have an internal / DMZ server that has to be accessible from the Internet over multiple ISP links?
-
If yes, then:
-
If the server has to be accessible only through one ISP link at a time (ISP links that provide an Active / Backup access):
These are the possible workarounds:
-
Configure your default routes with probing, with the desired priority, in this way:
-
The inbound traffic has to arrive to the internal server at its public IP address that belongs to the main ISP link (best priority).
-
If the inbound connection through the main ISP link fails, then the inbound traffic has to arrive to the internal server at its public IP address that belongs to the next ISP link (next in priority). See an example configuration of static routes in sk156812.
-
-
Use Policy Based Routing (PBR) for the internal server only, with the above default routes with probing.
The lower the route priority number, the higher the route precedence.
-
-
If the server has to be accessible over different ISP links that provide a parallel access:
-
The Security Gateway must run:
-
R82 and higher
-
R81.20 Jumbo Hotfix Accumulator Take 79 and higher
-
-
Configure the Symmetric Packet Return as described in SD-WAN Symmetric Packet Return.
-
-
-
If no, then:
As a possible workaround, use Policy Based Routing (PBR) rules on the Security Gateway that configure a different next hop to Internet for each internal server. For outbound redundancy, you can configure multiple next hops with probing.
-
In the PBR rules, in the Action section, select the option Table (Gaia Portal shows the value Main Table).
-
Use the PBR rule priority lower than 100, so it takes precedence over SD-WAN rules.
-
These are the possible workarounds for inbound traffic to the Security Gateway itself (Remote Access VPN, Mobile Access, and so on):
-
Use the workarounds from the sub-section If the server has to be accessible only through one ISP link at a time (ISP links that provide an Active / Backup access): with different default route priorities.
-
Wait for the symmetric return feature to support connections to the Local Security Gateway.
Outbound Hide NAT
Do you have Hide NAT configuration behind a specific IP address for outbound traffic from your internal networks?

|
Important - Currently, SD-WAN does not support ISP Link Redundancy for outbound traffic from internal networks in these cases:
|
If yes, then:
Do you need redundancy for this outbound NAT traffic between your ISP links?
-
If yes, then:
Can you change the outbound Hide NAT configuration to "Hide behind the gateway"?
-
If yes, then:
In SmartConsole do these steps:
-
In the applicable objects change your Hide NAT configuration to "Hide behind the gateway".
-
In the NAT policy, delete the Manual NAT rules.
-
Install the Access Control policy.
-
-
If no, then:
-
-
If no, then:
In Infinity Portal, create this rule at the top of the SD-WAN Policy (see Configuring SD-WAN Policy):
Do you have Manual Hide NAT rules that hide traffic from internal networks behind the Security Gateway object?

If yes, then:
Replace all these Manual Hide NAT rules with the Automatic NAT configuration:
-
Edit the corresponding Network objects > click the NAT page > select "Hide behind the gateway" > click OK.
-
In the NAT policy, delete these Manual Hide NAT rules.
-
Install the Access Control policy.
By design, Manual NAT rules with the Security Gateway object selected in the "Translated source" column, use only the main IP address of the Security Gateway object for Hide NAT and do not use the corresponding Security Gateway's outgoing interface.
|
Note - This section applies only to Security Gateways in a Site to Site VPN configuration with each other. |
Do you have any public IP address used in your VPN Encryption Domain?

If yes, then:
-
If your Security Gateway runs:
-
R82 and higher
-
R81.20 Jumbo Hotfix Accumulator Take 79 and higher
Then make sure to add the applicable Dynamic Object My VPN Domain or Peer VPN Domain to the SD-WAN Policy rules that use the Steering Behavior of type " ".
The Dynamic Objects My VPN Domain and Peer VPN Domain will include public subnets inside the VPN Encryption Domain for overlay rules.
For more information about these Dynamic Objects, see Dynamic Objects in SD-WAN Policy.
Alternatively, make sure to add the public subnets to the SD-WAN Policy rules that use the Steering Behavior of type " ".
-
-
If your Security Gateway runs:
Then make sure to add the public subnets to the SD-WAN Policy rules that use the Steering Behavior of type " ".
Does the Security Gateway use a Dynamic IP address (either private or public) for an IPsec VPN Overlay tunnel?

If yes, then:
You must configure the Security Gateway object as an object with "Dynamic Address" (DAIP).
The DAIP configuration has limitations.
Do you have private WAN lines?

If yes, then:
-
Is your MPLS router connected directly to your core switch, and not directly to the Security Gateway?
To use MPLS connection as an SD-WAN interface, the MPLS router / line has to be connected directly to the Check Point Security Gateway at a Layer 3 level.
-
Do you have Point-to-Point / Layer 2 connectivity between some peer VPN Gateways?
Roadmap - Support for Point-to-Point / Layer 2 connectivity is on the roadmap.
Workaround: Connect a separate Layer 3 device between the VPN Peers and use it as the next hop for the peer VPN Gateways.
-
Do you need to send the SD-WAN Overlay traffic over a private line as non-encrypted (clear text)?
This feature is not supported.
Do you need to use Dynamic Routing / Route-Based VPN (VTI) between Security Gateways?

If yes, then:
Support for Route-Based VPN with Dynamic Routing is available in.
-
R82 and higher
-
R81.20 Jumbo Hotfix Accumulator Take 79 and higher
Workaround:
For peer VPN Gateways that must use Route-Based VPN, enable SD-WAN only on one of the two peer VPN Gateways.
For additional information, see SD-WAN and Route-Based VPN.
Do you have multiple Data Centers that work as Primary/Backup and have an overlapping VPN Encryption Domain?

If yes, then:
|
Roadmap - Support for Explicit MEP feature is on the roadmap. |
Workarounds:
-
Use Implicit MEP with Source NAT.
See the Site to Site VPN Administration Guide for your version.
-
Separate your subnets between the Data Centers, so there are no overlaps.
-
User Route-Based VPN with Dynamic Routing.
Available in:
-
R82 and higher
-
R81.20 Jumbo Hotfix Accumulator Take 79 and higher
-
VPN Community Settings

If yes, then:
-
Edit the VPN Community object.
-
In a VPN Community of type Star:
-
In the left panel, click MEP.
-
Clear the checkbox Enable center gateways as MEP.
SD-WAN does not support Explicit MEP (Known Limitation PMTR-104985).
-
If this VPN Community contains two or more Center Gateways,
then either all or none of the Center Gateways must have SD-WAN enabled
if on the VPN Routing page, you selected one of these options:
-
To center and to other satellites through center
-
To center, or through the center to other satellites, to internet and other VPN targets
-
-
-
In a VPN Community of type Star or Mesh:
-
In the left panel, click Tunnel Management.
-
If you selected Set Permanent Tunnels, and SD-WAN is enabled on the Security Gateways, then clear the checkbox Enable Route Injection Mechanism (RIM).
SD-WAN does not support RIM (Known Limitation PMTR-104984).
-
-
Click OK.
-
Install the Access Control policy.
|
Important - After you enable and configure SD-WAN on all Security Gateways in the VPN Community of type Star or Mesh:
|
Routes in Gaia /

-
For each ISP link, configure a default route with the required next hop. These default routes must have different priorities.
-
Configure static routes for remote site networks to use the MPLS next hop, if it exists.
SD-WAN Interfaces in Gaia /

To configure each SD-WAN interface, get the required information:
-
IP address and subnet mask for the SD-WAN interface.
-
IP address of the next hop.
-
NAT IP address, if the SD-WAN interface connects to the Internet through a NAT device.
Additional Considerations
Do you need to use SD-WAN in a Cloud environment?

If yes, then:
You can configure SD-WAN only on CloudGuard Network Security Gateways (CGNS) in cloud environments.
|
Roadmap - Support for SD-WAN in Geo Cluster / Cross AZ Cluster is on the roadmap. |
Do you need SD-WAN for a Maestro Security Group or a VSX Gateway?

If yes, then:
|
Roadmap - Support for SD-WAN in a Maestro Security Group and a VSX Gateway is on the roadmap. |
Workaround:
Put a dedicated supported Security Gateway between the Maestro Security Group and VSX Gateway and the Internet and configure SD-WAN on that dedicated Security Gateway.
Does your Security Gateway have to use a next hop device that does not respond to ICMP Probing (common in cloud environments)?

If yes, then:
-
If your Security Gateway runs:
-
R82 and higher
-
R81.20 Jumbo Hotfix Accumulator Take 79 and higher
Then the ARP Next-Hop Prober feature (enabled by default) should resolve this issue. By default, the Security Gateway performs the nexthop probing using the ARP prober. If the ARP prober fails or does not get a response, then the Security Gateway falls back to using the ICMP Probing.
If the issue continues, then configure the parameter "
sdw_nexthop_probe_enabled = 0
" as described in SD-WAN Next Hop Probing on CloudGuard Network Security Gateways. -
-
If your Security Gateway runs:
-
R81.20 Jumbo Hotfix Accumulator Take 76 and lower
Then configure the parameter "
sdw_nexthop_probe_enabled = 0
" as described in SD-WAN Next Hop Probing on CloudGuard Network Security Gateways. -
For additional information, see sk181147: Quantum SD-WAN - Troubleshooting.
Do you have ISP Redundancy enabled in the Security Gateway object in SmartConsole?

If yes, then:
You must disable ISP Redundancy in the Security Gateway object in SmartConsole (section Other > page ISP Redundancy) and install the Access Control policy.
SD-WAN cannot work with ISP Redundancy enabled.
Migration from ISP Redundancy to SD-WAN:
-
Do you use ISP Redundancy for inbound traffic?
If yes, then:
-
If the connections should be symmetric (request and reply arrive on the same ISP link), then follow Inbound Non-Encrypted Traffic to Internal Servers.
-
If you have Manual Proxy ARP configured on the Security Gateway (sk30197), then before you disable ISP Redundancy:
-
In SmartConsole, click > Global properties.
-
In the left panel, click NAT.
-
Select Merge manual proxy ARP configuration.
-
Click OK.
-
Roadmap - Support for DNS Proxy in SD-WAN is on the roadmap
-
-
Do you use ISP Redundancy for outbound traffic?
If yes, then:
-
If you use ISP Redundancy in the Primary/Backup mode, then in the applicable SD-WAN Policy rule, you can use the Steering Behavior object that is configured with "Manual order of WAN Links".
-
If you use ISP Redundancy in the Load Sharing mode, then in the applicable SD-WAN Policy rule, you can use the Steering Behavior object that is configured with "Link Aggregation".
Note - SD-WAN does not support ISP Weight for Load Sharing.
-
-
Do you use ISP Redundancy for VPN traffic?
If yes, then after you disable ISP Redundancy:
-
Edit the Security Gateway object.
-
In the left panel, click IPsec VPN > click Link Selection.
-
Configure the applicable settings.
If a peer VPN Gateway does not have SD-WAN enabled, then select Use probing. Link redundancy mode and select the applicable mode.
If you do not use link redundancy, then configure a single link.
Refer to the Site to Site VPN Administration Guide for your version.
-
Click OK.
-
Install the Access Control policy.
Note - If all peer VPN Gateways have SD-WAN enabled, then the settings on the Link Selection page do not apply.
-
Do you have Policy Based Routing (PBR) rules configured on the Security Gateway?

If yes, then:
-
For PBR rules that match traffic based on the Access Control rules:
-
Delete these PBR rules on the Security Gateway.
-
Configure the applicable rules in SD-WAN Policy.
-
-
For PBR rules that match traffic based on the Source IP address, Destination IP address, Port number, and so on:
-
If possible, delete these PBR rules on the Security Gateway and configure the applicable rules in SD-WAN Policy.
-
If it is not possible to delete the PBR rules, then make sure these PBR rules do not conflict with SD-WAN Policy rules.
Notes:
-
PBR rules with priority lower than 100 take precedence over SD-WAN Policy rules.
-
SD-WAN Policy rules that use the Steering Behavior object of type "Local Breakout" take precedence over PBR rule with priority greater than 100.
-