Guidelines for Planning and Configuring SD-WAN

Before you configure your Security Gateway for SD-WAN, review the planning and configuration guidelines below.

In addition, refer to SD-WAN Best Practices.

Public IP addresses that are not part of the Internet, but should be routed internally

Do you have traffic going to destinations with public IP addresses that are not part of the Internet, but should be routed internally (examples: DMZ, LAN, VoIP, Inbound NAT Pools, networks on a remote site behind MPLS or VPN)?

Inbound Non-Encrypted Traffic to Internal Servers

Do you have inbound non-encrypted traffic from the Internet to published resources behind the Security Gateway?

Outbound Hide NAT

Do you have Hide NAT configuration behind a specific IP address for outbound traffic from your internal networks?

Do you have Manual Hide NAT rules that hide traffic from internal networks behind the Security Gateway object?

Overlay - VPN

Note - This section applies only to Security Gateways in a Site to Site VPN configuration with each other.

Do you have any public IP address used in your VPN Encryption Domain?

Does the Security Gateway use a Dynamic IP address (either private or public) for an IPsec VPN Overlay tunnel?

Do you have private WAN lines?

Do you need to use Dynamic Routing / Route-Based VPN (VTI) between Security Gateways?

Do you have multiple Data Centers that work as Primary/Backup and have an overlapping VPN Encryption Domain?

VPN Community Settings

Routes in Gaia / Gaia Embedded

SD-WAN Interfaces in Gaia / Gaia Embedded

Additional Considerations

Do you need to use SD-WAN in a Cloud environment?

Do you need SD-WAN for a Maestro Security Group or a VSX Gateway?

Does your Security Gateway have to use a next hop device that does not respond to ICMP Probing (common in cloud environments)?

Do you have ISP Redundancy enabled in the Security Gateway object in SmartConsole?

Do you have Policy Based Routing (PBR) rules configured on the Security Gateway?