03-AASX 9.2 Study Guide v1.1
03-AASX 9.2 Study Guide v1.1
The information contained herein is subject to change without notice. The only warranties for HPE products and services
are set forth in the express warranty statements accompanying such products and services. Nothing herein should be
construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein.
This is an HPE copyrighted work that may not be reproduced without the written permission of Hewlett Packard
Enterprise. You may not use these materials to deliver training to any person outside of your organization without the
written permission of HPE.
Printed in the US
Contents
Introduction........................................................................................................................................................................................................................................................................................................... 4
Path & Route Selection............................................................................................................................................................................................................................................................................. 6
Policies .................................................................................................................................................................................................................................................................................................................... 12
Loopback Interfaces & Orchestration................................................................................................................................................................................................................................... 16
Packet Classification & Internet Breakout........................................................................................................................................................................................................................ 18
IP SLA ...................................................................................................................................................................................................................................................................................................................... 21
LACP: Link Aggregation Control Protocol ...................................................................................................................................................................................................................... 24
OSPF: Open Shortest Path First.................................................................................................................................................................................................................................................. 28
BGP: Border Gateway Protocol .................................................................................................................................................................................................................................................... 33
BFD: Bidirectional Forwarding Detection.......................................................................................................................................................................................................................... 39
Route Maps ....................................................................................................................................................................................................................................................................................................... 42
Regional Routing & Hub Behavior........................................................................................................................................................................................................................................... 47
Flow Redirection .......................................................................................................................................................................................................................................................................................... 53
Additional Security Features .......................................................................................................................................................................................................................................................... 56
Zone Based Firewall ................................................................................................................................................................................................................................................................................. 59
Routing Segmentation (VRF)........................................................................................................................................................................................................................................................ 68
QoS: Quality of Service .......................................................................................................................................................................................................................................................................... 73
Intrusion Detection & Prevention ............................................................................................................................................................................................................................................. 78
AASX Study Guide Page 4
Introduction
Advanced SD-WAN Deployments
Welcome to the Advanced Aruba SD-WAN Deployments course. This course is based on the 9.2 versions of
Orchestrator and ECOS. It provides information that builds upon the fundamentals you learned from the Deploying
Aruba SD-WAN Technologies course.
The modules in this student guide correspond with the course’s presentation slides. You can note the title of a slide
the instructor presents and then match it with the corresponding header. Some sections of this student guide
include images for reference purposes when appropriate.
Objectives
These are the objectives for this course:
• Understand how EdgeConnect SD-WAN appliances make data forwarding decisions.
• Explain the parts of BIO-created policies, how they are arranged in policy maps, and to consider manual
policies.
• Configure Flow Redirection on appliances to avoid asymmetry in Traditional HA environments.
• Explain the configuration of Link Aggregation Control Protocol (LACP), Bidirectional Forwarding Detection
(BFD), and IP SLAs.
• Work with hands-on labs for Loopback Orchestration, OSPF, BGP, Zone Based Firewall, Routing
Segmentation (VRF), and Regional Routing.
Built-in Help
When you work with a feature, you
can click the blue circle with a
question mark in the center to view built-in
help information that opens in a separate web
browser window.
Route Tags
The routes table of an EdgeConnect can apply routes
that affect which routes it uses:
• Any (No tag): It uses the route in either
direction.
• FROM_LAN: It only uses the route for traffic that
entered from a LAN interface.
• FROM_WAN: It only uses the route for traffic that
entered from a WAN interface.
Student Guide Page 8
Advertise-only Route
An EdgeConnect considers any static route you configure without a next-hop IP address to be an advertise-
only route. EdgeConnect doesn’t use this static route to forward traffic. It uses its other default routes, or more
specific routes, to make routing decisions. EdgeConnect advertises this advertise-only static route via subnet
sharing to EdgeConnect peers, or by redistributing it into BGP or OSPF advertisements to third-party peers, to
attract traffic. These remote peers use this advertised route for their own routing decisions.
As an example, the top appliance represents a hub site that advertises a default
route to the spoke Edge Connect in the center. The spoke EdgeConnect
advertises this default route to the LAN-side router at the bottom. If traffic from
the users at the bottom needs to reach the hub site or the internet, this default route
attracts traffic to the spoke EdgeConnect in the center. The spoke
EdgeConnect then forwards the traffic to the hub site which performs local
internet breakout. However, if all connections to the hub site go down, the
default route advertised by the hub would be lost. Local internet
breakout from the hub appliance would fail because the LAN-side
router would also lose this default route.
You can solve this problem by configuring an advertise-only static
route. The spoke EdgeConnect advertises it to attract traffic. The
spoke EdgeConnect could use any routes learned from a service
provider’s next-hop router for routing decisions. The spoke
EdgeConnect would
then perform local
internet breakout for
users at the local
site, even though
they lost
connectivity to the
hub site. However, if
you do this, you
Student Guide Page 9
should use a route map to prevent the spoke site from advertising the advertise-only default route into the
SD-WAN fabric.
Policies
Business Intent Overlays (BIOs) Create Four Types of Policies
Business Intent Overlays create four types of policies:
• Route policies: They determine how the EdgeConnect forwards
matching traffic to its destination using an overlay tunnel.
• Optimization policies: They determine whether EdgeConnect
applies Boost to matching traffic.
• QoS policies: They determine into which traffic close the
EdgeConnect puts matching traffic and what the LAN and WAN
DSCP markings are.
• Security policies: The EdgeConnect has two implicit security policies for intra-zone traffic and
interzone traffic. Intra-zone traffic is within the same firewall zone and is permitted by default.
Interzone traffic is between two different firewall zones and is denied by default.
An EdgeConnect organizes each type of policy into a logical group called a map. So, it has a route map, a QoS
map, an optimization map, and a security map. The route map is a logical container for route policies. It is not
the feature you use to control the redistribution of routes between routing protocols.
QoS Policies
QoS configuration
has two parts, QoS
policies and the
Shaper configuration.
QoS policies
determine into which
Shaper traffic class
an EdgeConnect puts
a packet for
processing. Just like
Business Intent
Overlay-created route and optimization policies, the QoS policy numbering is in the 20000 range and has the
same match criteria. QoS policies have three set actions: a traffic class, the LAN DSCP marking, and the WAN
DSCP marking. The LAN DSCP marking is in the original IP packet’s header. The WAN DSCP marking is in the
encapsulating IP packet’s header. The comments field tells you which Business Intent Overlay created a QoS
policy. The Shaper determines how an EdgeConnect prioritizes traffic and how likely it is to get bandwidth in
the event of congestion.
Security Policies
Security policies permit or deny communication between firewall zones. An EdgeConnect appliance has two
implicit policies. Intra-zone
communication within the same firewall
zone is always allowed. Interzone
communication between different
firewall zones is denied by default. You
must define specific security policies to
allow traffic initiated in one zone to flow
to the other zone and then back again.
This handy zone matrix display shows
you a quick summary of every firewall
zone. You click the field at the
intersection of a From zone and a To
zone to define the rules of a security
policy.
Built-in Policies
Each appliance has non-editable built-in policies in the
65500+ range that handle internal flows for communication
to the Orchestrator, the Cloud Portal, or for underlying
protocols like BGP or IPsec. You do not usually need to pay
attention to them, but you might occasionally need to look at
them to understand why an appliance handles a flow a
certain way. If you look at a flow detail, and it matched a
policy in the 65500+ range, it’s one of these built-in policies.
Loopback Orchestration
It’s possible to automate the creation and management of loopback
interfaces with /32 IP addresses directly from Orchestrator. As you will
see, with a few mouse clicks you can create these on all the devices in
your network. Orchestrator will assign IP addresses to the loopback
interfaces it creates, starting with the lowest available addresses. As we
will see on the next slide, only one pool of addresses can be used.
Configuring Orchestrator
You can only configure one
address pool from which the
Orchestrator can assign IP
addresses to appliances.
However, you can use different
loopback interface groups that
draw from same pool of IP
addresses. In this example, each
appliance you select in the
appliance tree gets two
loopback addresses. They
would each have different interface labels and be in different firewall zones. If you try to edit the pool of IP
addresses on one row, it changes them on every row because you can configure only one IP address pool. For
pre-existing interfaces, this also readdresses all the loopback interfaces the Orchestrator manages.
If you check the Management checkbox when creating a new group, the Orchestrator assigns those loopback
interfaces to manage appliances. So, if you do this, you need to disable the mgmt0 interface to avoid conflicts
with the management loopback interface.
When you remove an EdgeConnect from the Orchestrator, you also remove its assigned loopback interface IP
address. This prevents confusion by network management systems. You can reclaim these IP address to return
them to the global IP address pool for loopback interfaces.
Student Guide Page 17
DNS lookup snooping is another techniques used by EdgeConnect to automatically identify traffic destinations
that might not already be in the database. If an EdgeConnect is in the lookup path, it can snoop DNS traffic,
dynamically identify any unknown addresses associated with a domain, and then add them to its database.
Since many applications in the cloud spin up additional servers on demand around the globe, new addresses
can appear for a given application at any time. This allows an EdgeConnect to correctly classify traffic
connecting to ephemeral IP addresses.
IP SLA
IP SLA
An IP SLA allows you to initiate triggered actions based on a change in network conditions. There are currently
four IP SLA monitor types available:
• Interface
• Ping
• HTTP/HTTPS
Each IP SLA allows you to configure one action, although it’s easy to initiate multiple actions by simply creating
more than one IP SLA that monitors the same condition. Additionally, you can configure an SLA to only raise
an alarm to notify you. This can be useful if you do not want to make any changes to the network when a
monitored condition changes but want to know it occurred.
Interface Monitor
The interface monitor checks
whether an interface is up or
down every configured interval.
You can monitor the same
interface with multiple instances
with each one configured to
perform a different up or down
action.
Ping Monitor
The ping monitor pings one or more domains or IP addresses for reachability. Enter them in the address list
separated by commas. If any one of the addresses or domains is reachable, then the SLA is marked up and no
action is performed. Only when every address or domain fails to respond to a ping will the IP SLA be marked
down, and the down action performed.
Student Guide Page 22
The available up and down actions for the ping monitor are shown here. They include actions like enabling or
disabling tunnels, disabling subnet advertising, modifying the subnet sharing metric, changing the VRRP
priority, and raising or clearing an alarm.
You can set the ping interval,
which controls how often the
destinations are pinged.
Sampling window is the size of
the rolling window in which
metrics for reachability, loss,
and latency are averaged. For
Reachability, you configure
how many successful or failed
pings are required to mark a
destination up or down. For
loss and latency, thresholds
are configurable. If loss or
latency values are set to 0,
that metric is ignored.
Averaging is done every
second by the IPSLA monitor.
Any action taken, however, is
determined by the Monitor
Sampling Interval.
The Monitor Sampling Interval
determines how quickly higher-level processes like the Business Intent Overlays check whether the IP SLA
condition has changed. A large value results in a delay in responding to a condition change, and a value set too
low can cause unnecessary churn. It’s usually best to set it the same or slightly larger than the Mark Down
value.
HTTP/HTTPS Monitor
The HTTP/HTTPS
monitor uses HTTP
connections on port 80 or
HTTPS connections on
port 443 to test
reachability every
configured interval. This
monitor is useful for sites
that block or limit ICMP
requests.
Student Guide Page 23
VRRP Monitor
The VRRP monitor is useful
with two EdgeConnect
appliances in a high-
availability configuration. It
checks to see if the appliance
is the master or backup of
the VRRP group. If it’s the
master, the IP SLA is marked
up and the up action is
performed. If the appliance is
the backup, the SLA is
marked down, and the down
action is performed.
Depending on your topology,
if a VRRP master is marked
down, it might indicate its
WAN-side destinations are
no longer available, or no
longer the best route to a
destination. This is a way to
dynamically affect network routing preferences.
LACP Operation
You can configure up to four link aggregation groups (LAGs), or channel groups, that can each have up to four
interfaces. In the Orchestrator Interfaces tab also has an LACP status column that’s intended to be a quick
visual reference you know that the physical interface is up, and the LACP layer is up.
• LACP rate: slow | fast: This affects the timeout and the rate at which we request the LACP partner to
send LACPDU packets. It is
either slow, one packet per
30 seconds and timeout
after 90 seconds, or fast,
one packet per second and
timeout after 3 seconds.
Slow is the default setting.
OSPF Configuration
OSPF Summary
The OSPF tab in the Orchestrator has three different displays:
Summary, Interfaces and Neighbors, selected by the button at the
top of the tab. The summary shows whether OSPF is enabled for
each appliance, and some high-level details regarding redistribution.
Click the details icon for a given appliance to see information about
timer configuration, whether the machine is advertising and learning
routes, and if so, how many.
OSPF Interfaces
The interfaces display shows information about each interface on each
appliance that’s configured to participate in OSPF, and the state of the
appliance on that interface. In the example shown here, ECV-2 and
ECV-3 are DRs on each of their participating interfaces, but it could be
different on each interface. On any interface, an appliance could be a
BDR, or backup designated router, or simply a neighbor, called a
DROther.
Click the details icon for any interface to see additional information
about timers, the number of neighbors, and the DR and BDR for an
interface.
OSPF Neighbors
The neighbors display shows a list of neighbors for each appliance, and the state of their adjacency. The Full
state indicates that appliances are fully adjacent and can exchange LSAs. .
Student Guide Page 31
Click the details icon to see details about each neighbor, but
most of this information is already displayed in the row for a
neighbor.
OSPF Routes
On the Routes tab is a filter button to only display routes learned via OSPF. The origin of the route and which
appliance it was learned from is in the Type field.
Routes that were learned directly from an OSPF neighbor router by an EdgeConnect running OSPF display a
route metric computed by adding the associated link costs together. These routes have an administrative
distance of 110, the default for routes learned from OSPF.
A route that originated in OSPF as the Type field shows, but has a metric of 51, which has been determined by
the metric set in a route map for OSPF routes redistributed into subnet sharing. We know it was learned via
subnet sharing because the Type field says SP (i.e. Silver Peak) and the administrative distance is 15.
We see some routes that were advertised by two EdgeConnect appliances that are OSPF neighbors. These
routes were redistributed into OSPF from subnet sharing. Because they were learned via OSPF, they carry an
administrative distance of 110. The metrics vary because they originated in different protocols, although the
source protocol information is lost because OSPF doesn’t have a way to propagate it like subnet sharing does.
Student Guide Page 32
Autonomous Systems
Each group of BGP routers is organized in an autonomous system,
and each system has an autonomous system number, or AS number.
The AS number is how the different AS’s identify themselves to each
other. AS numbers used on the public internet are assigned by a
central authority. Just like with IP addresses, there’s also a set of
private AS numbers you can use internally without restriction on your
network, but these numbers should never be used on an internet
facing connection. We’ll use numbers in that range in this class.
BGP is primarily concerned with the flow of routing information between autonomous systems. Often, within an
AS, another protocol like OSPF or ISIS is used to optimize routing.
Student Guide Page 34
You can configure BGP for the necessary EdgeConnect appliances from the BGP tab of the Orchestrator. This
is where you configure the local ASN and the router ID after you enable BGP. You will probably want to enable
Student Guide Page 35
the AS Path Propagate option. It allows the appliance to send the full AS Path to EdgeConnect peers via subnet
sharing for route prefixes associated with other routers and appliances to avoid routing loops.
default route map for the correct peer type, branch or PE router. The route maps for Branch Routers end with
“br” while those for PE routers end with “pe.” You cannot see the end of the route map labels until you click the
drop-down arrows to display the list of available route maps. The edit icon let you edit the selected route map.
The Keep Alive Timer indicates how often the appliance should send keep alive messages to the peer and
expect to receive them from it.
The Hold Timer indicates the time during which if the appliances doesn’t receive a keep alive message that the
peer is marked down, and all routes learned from it are discarded. The Hold Timer is set to three times the
Keep Alive Timer by default.
BGP Monitoring
The BGP tab in the Orchestrator shows a summary of the configuration and the operational status for each of
the appliances you select in the appliance tree. The refresh button retrieves the status from each of the
appliances. If you click the edit icon next to the name of an appliance, you can configure BGP for it. The
Summary screen shows configuration details associated with the local appliance like it’s local ASN and router
ID. Clicking the BGP State Details shows a summary of how many routes have been learned and advertised via
BGP by this appliance. The Peers button shows you information about all configured peers for the appliances
selected in the appliance tree. A peer state of Established indicates that a TCP session has formed, and routes
can be advertised to and learned from that peer. Peer Details brings up a tabbed dialog box that displays the
status of the connection of each peer configured for an individual appliance.
BGP Communities
BGP communities are supported and can be set or filtered per BGP peer
using route maps. They are often used in conjunction with the local
preference attribute to affect route preferences. Inbound and outbound
filtering and setting are separate and per BGP peer.
Student Guide Page 38
BFD Configuration
BFD can detect BGP and
OSPF failures within one
second. You can configure
BFD from Orchestrator,
the Appliance Manager, a
template, appliance
preconfiguration, or the
REST API.
This BFD mechanism here
will allow you to detect
OSPF and BGP failures
within about one second.
You can configure these
BFD settings for
EdgeConnect:
• Min Tx Interval:
Configure a value
from 300 to 5000
ms. The default
setting is 300 ms.
• Min Rx Interval: Configure a value from 300 to 5000 ms. The default setting is 300 ms.
• Detection Multiplier: Minimum transmit interval in milliseconds (ms). Specify a value from 300 to
5000. The default setting is 300.
Monitoring BFD
These images show examples of BFD monitoring features.
Route Maps
What Are Route Maps?
In addition to sharing routes with other appliances over the SD-WAN fabric using subnet sharing, EdgeConnect
appliances can also peer to external third-party devices using OSPF and BGP. Route maps control how routes
learned via one protocol are readvertised into other routing protocols. For example, how routes learned via
subnet sharing are advertised into BGP, and how the metrics are set when the routes are advertised to a BGP
peer. Likewise, if routes are learned from an OSPF neighbor, how are the metrics set when the routes are
advertised to other appliances via subnet sharing. In the case where the appliance is running both BGP and
OSPF, route maps can control how routes are redistributed between those two protocols.
It should be noted that there are inbound and outbound route maps. Inbound controls what is distributed into
the SD-WAN fabric and subnet shared between EdgeConnect appliances. Inbound route maps are found on
the Routes pages for each appliance. Outbound controls what is redistributed by an appliance into another
routing protocol, like OSPF or BGP, and is found on the configuration page for those protocols. BGP is slightly
different from OSPF in that it contains inbound and outbound route maps per peer.
At a high level, just like ACLs, each route map has a set of rules. Each rule has match criteria, which include the
source protocol from which the route was originally learned and more.
Each rule can permit or deny the redistribution of routes that match the
rules. Finally, for routes that are permitted, it’s possible to modify
attributes of the advertised prefixes, by doing things like setting the
metric.
When you are creating a route map rule, 0.0.0.0/0 matches all prefixes,
it doesn’t match just match default routes. So, for example, if you want
to deny advertising default routes into a particular protocol, but allow
other local or static routes, you must permit the more specific routes
first.
and protocol-specific set actions the appliance can perform in addition to permitting or denying a route.
appliance that allow you to set the metric for permitted routes.
• BGP routes that allow you to match various characteristics including the route prefix and communities.
• OSPF routes that allow you to match on OSPF tags.
subnet sharing, advertising the SD-WAN fabric routes to a PE peer has a higher risk of creating a routing loop.
So, it’s not a good idea to advertise SD-WAN routes to PE routers, and the default rules deny subnet shared
routes outbound to PE peers.
Regional Topologies
A mesh topology connects all your EdgeConnect appliances to one
another. Spoke appliances only connect to hubs, and not to other
appliances in the network. The hub appliances for an overlay are selected
from the appliance tree that the Orchestrator manages. A hub is a hub in
every overlay it’s a part of. The interconnection between hub sites in
different regions is a full mesh for all the hubs in the overlay, even if you
select a hub and spoke configuration for the different regions. If you do
not want to build tunnels between certain hub sites, you can give them
the same site name. Hub sites in different regions that are part of the
same BIO connect to hubs in other regions.
Managing Regions
Regions are managed from the Regions tab. Click Edit Regions to add new region names or edit existing ones.
These are just labels, so you can call them anything that makes sense to you. Once you have created regions,
you can add or remove appliances from a region by selecting the EdgeConnect appliances in the appliance tree
and using the add and remove check boxes. If Regional Routing is off, hubs do not readvertise routes learned
from spokes. To enable route redistribution by hubs, you need to enable Regional Routing.
Managing Hubs
The Hubs tab manages which appliances are
classified as hubs. This is reachable from the
Configuration menu, or from the link on the
Business Intent Overlays tab. Remember, a
hub is a hub for every overlay it’s a part of. If
you create a hub and want to later remove it
from the hub role, you must first remove the
Business Intent Overlays from it. After you’ve
removed the appliance from the hub role, you
can reapply the necessary Business Intent
Overlays.
Student Guide Page 52
Default Region
The Default region is the one that all appliances are in until
you assign them to a user-created region. You can see here,
ECV-1 is not in a region as shown on the Regions tab. If we
look at the System Settings for ECV-1, we can see that it
shows its region as Default.
Overlay Regions
Each Business Intent Overlay can have a different configuration for each Region it’s a part of. For example, the
RealTime Business Intent Overlay
can have different configurations
globally or in regions 1, 2, or 3. One
implication of this is that you
effectively have more Business
Intent Overlays than in older
versions of software, since each
overlay can have multiple
configurations. Any appliances
assigned to a region use the
overlay configuration for that
region. Any appliances not
assigned to a region use the
Business Intent Overlay’s global
configuration.
Flow Redirection
Active/Active & Asymmetry
Here we have an
example of an
active/active deployment
in a Traditional HA
environment. This might
be at a data center where
there was more traffic
than a single
EdgeConnect could
handle. If the
transmission path between two conversation endpoints goes through the EdgeConnect appliances in one
direction, but in the reverse direction, the traffic returns along a path that doesn’t go through the same pair of
EdgeConnect appliances, then TCP Acceleration cannot be performed. This is because an EdgeConnect cannot
track the sequence numbers in a flow for missing packets and act as a TCP proxy that performs local
acknowledgments.
In the active/active diagram here, packets from the LAN on the left might be sent to either EdgeConnect A or B
because they are load sharing, and each advertises a route to the destination at an equal cost. This means
traffic between the LAN device on the left and the server on the right is subject to asymmetry. We generally
see active/active configurations in large data centers and in cloud deployments utilizing large workloads, such
as you might find in AWS or Azure, for example. When an active/active deployment with asymmetric routing is
unavoidable, Flow Redirection can help restore symmetry to make TCP Acceleration possible.
appliances. WAN and LAN interfaces have a FW zone field. The firewall zones’ names are in a drop-down list.
Unless you change it, each interface or VLAN is in the Default zone. An interface can belong to only one firewall
zone. However, a
firewall zone can
include multiple
interfaces that are all
associated with it. The
firewall zone fields for
each interface will not
appear as configuration
options on the
Deployment page until
you create firewall
zones to put them into.
Only the zone named
Default exists by
default.
Order of Operations
While you set up a new network or add a new appliance, you generally will not need to worry about disruption.
But when implementing Zone Based Firewalls in an existing network, you need to think about the order in
which you do things.
1. Start by configuring your zone labels. This must be done first, since if there are no firewall zones, you
cannot do any filtering.
2. Next configure your security profiles and apply them to the appliances. Remember by default, all
interfaces are in the Default firewall zone. Since traffic between devices within a zone is always
permitted, there’s no impact until you start adding firewall zones.
3. You need to configure the appliance to use the firewall zones.
4. Since you cannot change everything at once to match the security profiles you set up, as you move
interfaces out of the Default firewall zone, some network disruption will occur, so you should schedule a
maintenance window to do this.
Student Guide Page 62
Table View
If you prefer, you can choose a table view of the
security policies instead of the matrix view.
Student Guide Page 63
zone name as something different than the local LAN firewall zones. Configure a security policy that permits
passthrough or breakout traffic. Only passthrough or internet breakout traffic flows from a LAN firewall zone to
a WAN firewall zone. Overlay tunnel traffic flows from a local LAN firewall zone to a remote LAN firewall zone.
Monitoring Drops
If you want to see what is being dropped in real
time, you can go to the flow table, which is
always your best friend. In the flow table, you can
see that dropped flows are shown in red, like the
one displayed here. A count of dropped flows is
shown in the flow count summary and you have
a built-in filter to display only those flows which
were dropped by the firewall functions.
5. The Zone Based Firewall is stateful, so the appliances permit the return-path traffic from TG-02 to
TG-03.
Troubleshooting Notes
A Zone Based Firewall permit or deny is based on First Packet iQ application identification. That happens when
the flow is first established. When you make a security policy change, a flow reset—not reclassify—is necessary
for application identification to happen again. Otherwise, the existing flows become stale flows, meaning they
continue to handle traffic according to the previous security policies when the flows were first established.
There is a background process called auto-reclassify that periodically inspects existing flows to attempt to
conform them to current rules. However, auto-reclassify doesn’t reset the flow to avoid disrupting traffic, so it
cannot perform a new First Packet iQ lookup on established flows. Auto-reclassify could result in flows being
dropped, however, if a routing change caused a zone to change. In this case, when you examine a flow detail,
the security policy Deny Reason would say routing. A manual flow reset or other action that caused the session
to be reestablished would be necessary to apply the new security policy based on First Packet iQ.
Traffic that doesn’t create a flow in the flow table (e.g. bypass or some passthrough unshaped) is not subject to
security policy. So if, for example, you have manual route policies that send traffic PTU, that traffic would not be
subject to security policies. However, If that same traffic was sent passthrough unshaped because of the Peer
Unavailable Option of a Business Intent Overlay, it would be subject to security policies. So, you would be able
to see this in its flow details.
The stateful firewall is a simple way to control passthrough LAN-to-WAN flows. If the connection originates on
the LAN side, the state is stored, and return traffic is permitted. Inbound connections originating from the WAN
side, arriving outside of a tunnel are dropped.
The Zone Based Firewall is much more powerful. Each interface is a member of a zone, and rules can be set to
permit or deny traffic between any two firewall zones. Control can be very granular, because configurable
security policies can be created using standard access lists to permit or deny different kinds of traffic, instead of
the simple global control of the WAN-side stateful firewall. Like the stateful firewall, the Zone Based Firewall
stores the session’s state which allows you to permit connections initiated in one direction between two firewall
zones, but deny connections initiated in the reverse direction.
Intersegment Routing
Traffic that originates in a segment is restricted to destinations in that same segment by default. The routing
tables in each segment are separate from those for other segments, and there is no intersegment route
advertising or route leaking. Traffic between destinations in different segments is only possible if you explicitly
permit it . Three things are necessary for this to happen:
• Intersegment routing policies must be configured to permit intersegment connections.
• Zone Based Firewall security policies must also permit it
• A route to the destination in the other segments must also be known.
Student Guide Page 69
Segmentation Configuration
Add Segments
After you have enabled
Routing Segmentation, the
+Add Segment link becomes
active. Then you can add
new segments and name
them. In this example two
additional segments, SegA
and SegB, have been added.
Just adding segments
doesn’t change anything.
Until you change the
configuration, all appliances,
interfaces and routes remain
in the default segment.
Student Guide Page 70
reach when they want to connect to TG-03 on the right. TG-01 will send a SYN packet to this proxy address of
10.110.112.111.
To make sure it can reach its intended destination, we have configured an intersegment routing rule with
DNAT. The rule applies to traffic coming from segment SegA, where TG-01 is located, that matches the
destination address of 10.110.112.111, which is the proxy address we chose for TG-03 in SegA.
Then we need to translate the destination address of 10.110.112.111 to the actual destination address of
TG-03 which is 10.110.10.111,
but in segment SegB. This way,
when the SYN gets forwarded
from ECV-1 to ECV-3, the
destination IP address is
changed to 10.110.10.111, and
it’s forwarded to segment SegB,
so it can be sent to the
destination. When ECV-3
forwards it to its destination,
source NAT automatically
translates the source IP address
ECV-3’s LAN address. This is
part of the Auto Source NAT
feature enabled for this segment.
Skipping Overlays
It’s possible to configure each Business Intent
Overlay to use or skip each segment. The
default is for each Business Intent Overlay to
use every segment. However. if you want to
disable a Business Intent Overlay for a
segment, click in the Overlays & Breakout
column, and then click to toggle the setting
for that overlay and segment.
in different
segments, so they
are treated as
different firewall
zones. Traffic flow
between these
firewall zones will
be denied by
default unless a
rule specifically
allows some or all
traffic between
them.
Student Guide Page 73
Max Bandwidth
As a best practice, you should
total up the speeds of the WAN
links on the WAN routers and
configure that as the MAX WAN
Bandwidth. Make sure the
appliance has enough bandwidth
on its WAN interfaces to fill a link
that size. One thing to remember
is that the total inbound and
outbound system bandwidth is
defined in the deployment profile.
These configured values appear
in the Shaper configuration.
When configuring the Max Bandwidth, you need to consider the speed of the appliance WAN interfaces and
the speeds of the WAN links on the routers that are fed by that appliance WAN interfaces.
If you set the MAX WAN Bandwidth too low, you will not be able to fill your link and some of them might be
under-utilized. If you set it too high, you may overrun the appliance WAN links, or cause congestion and drops
on the WAN-side routers.
When allocating BW, the appliance will first satisfy the Min Bandwidth for each traffic class in use. You configure
this as a percentage of Max Bandwidth.
If there is any BW left after satisfying the minimum BWs for each traffic class, then the ratio of Excess Weights
are used to allocate any remaining bandwidth.
Max Bandwidth for each traffic class is next and is generally always left at 100% of Max Bandwidth.
When a packet is considered for transmission, if it has been in the queue for a length of time exceeding the
Max Wait Time, it is dropped.
It is possible to rate limit individual flows in each traffic class to keep large flows from dominating the traffic
class by setting absolute value on the transmission bandwidth available to each flow. If you leave it set to 0, no
rate limiting is imposed on flows in that traffic class.
Finally, it’s important to remember
this rule: To avoid starving any
traffic class, the sum of the Min
Bandwidth percentages for traffic
classes being used should not
exceed 100% of the Max
Bandwidth. For example, if you are
using three traffic classes, you
could give 33% to two of them and
34% to the other. If the sum of
your Min BW values exceeds
100%, when the appliance
becomes congested, then the
lowest priority classes might not
be serviced.
The Excess Weighting for all the five traffic classes in use add up to 100. This makes it easy to incorrectly think
of the Excess Weighting values
as percentages. However, in
this example, the only two
traffic classes with data in them
are Guest and Default, with
equal weights of 10. As a result,
these queues will be serviced,
using weighted round robin.
Because the weights are equal,
both classes will end up
sending 50M of data in this
time interval, at which point we
have used 100% of Max
Bandwidth.
are using all 10 traffic classes, each will be guaranteed no more than 10% of the bandwidth. At any point in
time, our Excess Weighting will divide up the rest of the bandwidth if there is any left.
Now imagine we add a new site with a 1 Mbps link. Since the Min BW for each traffic class is 1 Mbps, equal to
the full BW of the new tunnel, this means that assuming that there is sufficient traffic queued, any one of the
traffic classes, starting with the one with the highest priority, can completely fill the links, not providing service
to lower priority traffic classes.
The solution is to set the priorities
for all traffic classes to 1 and the Min
BW for each traffic class to 0.
Because all the Min BW settings—at
0—are always satisfied, only the ratio
of Excess Weighting will be used to
allocate bandwidth. When you do
this, each of the traffic classes gets
an amount of bandwidth in each
tunnel that is proportional to the
weights. This keeps one traffic class
preventing the others from being
processed.
IDS/IPS Allow-Listing
You can add signatures that relate to threats
that do not apply to your network.
EdgeConnect appliances do not check these
signatures during IDS/IPS processing.
Student Guide Page 80