DAST 9.2 Student Guide v1.5
DAST 9.2 Student Guide v1.5
Student Guide
version 9.2, revision 1.5
Student Guide Page 6
The information contained herein is subject to change without notice. The only warranties for HPE products and services
are set forth in the express warranty statements accompanying such products and services. Nothing herein should be
construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein.
This is an HPE copyrighted work that may not be reproduced without the written permission of Hewlett Packard
Enterprise. You may not use these materials to deliver training to any person outside of your organization without the
written permission of HPE.
Printed in the US
Contents
Introduction........................................................................................................................................................................................................................................................................................................... 8
EdgeConnect SD-WAN Ecosystem......................................................................................................................................................................................................................................... 10
EdgeConnect Terminology & Concepts ............................................................................................................................................................................................................................ 12
Orchestrator Setup & Initial Configuration ..................................................................................................................................................................................................................... 17
Orchestrator & Appliance Registration............................................................................................................................................................................................................................... 20
Configure Essential Orchestrator Features .................................................................................................................................................................................................................... 22
Deploy EdgeConnect Enterprise Appliances ............................................................................................................................................................................................................... 25
Deployment Profiles ................................................................................................................................................................................................................................................................................ 30
Data Path Route Selection & Forwarding ........................................................................................................................................................................................................................ 36
EdgeConnect SD-WAN Reference Architectures ................................................................................................................................................................................................... 40
Virtual Router Redundancy Protocol (VRRP)............................................................................................................................................................................................................. 43
EdgeConnect High Availability.................................................................................................................................................................................................................................................... 47
Automated Provisioning & Configuration........................................................................................................................................................................................................................ 51
Business Intent Overlays .................................................................................................................................................................................................................................................................... 56
SD-WAN Traffic Handling ................................................................................................................................................................................................................................................................. 62
Internet & Cloud Services Traffic Handling ................................................................................................................................................................................................................... 75
Back Up, Restore, & Image Management ......................................................................................................................................................................................................................... 79
Monitoring .......................................................................................................................................................................................................................................................................................................... 82
Logging .................................................................................................................................................................................................................................................................................................................. 88
Working with Technical Support ............................................................................................................................................................................................................................................... 90
Conclusion .......................................................................................................................................................................................................................................................................................................... 94
Student Guide Page 8
Introduction
Deploying Aruba SD-WAN Technologies
Welcome to the Deploying SD-WAN Technologies course. This course is based on Orchestrator 9.2 and ECOS 9.2. It
provides you with information about EdgeConnect SD-WAN concepts and features.
Each module in this student guide corresponds with the presentation slides for this course. You can note the title of the
slide the instructor presents, and then match it with the corresponding header. Each provides useful information. Some
have images for reference purposes, but not each one does.
Prerequisite Knowledge
This course is the first in our technical training series. We recommend that you complete the SD-WAN Essentials course
before which provides a detailed overview of important EdgeConnect SD-WAN concepts. If you began this course
without completing SD-WAN Essentials, we recommend that you complete it during a meal break or before the second
day of class.
Objectives
The following are the course objectives:
• Become familiar with Aruba Orchestrator management software and EdgeConnect appliances
• Understand the fundamentals of Aruba EdgeConnect Enterprise technologies
• Deploy an Orchestrator and EdgeConnect appliances
• Earn your Aruba Accredited SD-WAN Professional (AASP) accreditation
Passthrough Flows
Some flows aren’t between two EdgeConnect SD-WAN
appliances. In this example, you see traffic that is sent
from a branch office directly to the internet. Any flow that
isn’t encapsulated—not in a tunnel—is called a
passthrough flow. Essentially, the EdgeConnect SD-WAN
appliance behaves as a router that does not optimize the
passthrough flows.
Since cloud services, SaaS, and IaaS are extensions of an
organization’s network, it’s critical to reach these services
by the most efficient and highest-performing means. This
is called local internet breakout, and it’s a form of
passthrough traffic. Passthrough flows, standard IPsec
tunnels, and GRE tunnels may sometimes be referred to
as Passthrough Tunnels.
Student Guide Page 13
Orchestrator Versions
Most EdgeConnect SD-WAN deployments have one Orchestrator and SD-WAN fabric. Orchestrator is a virtual machine
that you can install on-premises or in a cloud environment, or you can subscribe to Aruba’s Orchestrator-as-a-Service
(OaaS) offering. Orchestrator as a Service has small, medium, and large tiers.
You can learn more about Orchestrator from these resources:
• Aruba Orchestrator website:
https://www.arubanetworks.com/products/sd-wan/edgeconnect/orchestrator/
• Aruba Orchestrator data sheet:
https://www.arubanetworks.com/assets/ds/DS_Orchestrator.pdf
•Aruba Orchestrator-as-a-Service data sheet:
https://www.arubanetworks.com/resource/enterprise-aruba-orchestrator-as-a-service-data-sheet/
Aruba also has two additional Orchestrator offerings:
• Aruba Orchestrator-GE (Global Enterprise)
– Cloud-based Orchestrator for organizations with multiple EdgeConnect SD-WAN fabrics
– Orchestrator-GE data sheet:
https://www.arubanetworks.com/assets/ds/DS_OrchestratorGE.pdf
• Aruba Orchestrator-SP (Service Provider)
– Cloud-based Orchestrator for service providers that provide EdgeConnect SD-WAN service to customer
organizations
– Orchestrator-GE data sheet (includes Orchestrator-SP):
https://www.arubanetworks.com/assets/ds/DS_OrchestratorGE.pdf
Student Guide Page 15
Order of Operations
This is an overview of the order in which you need to perform EdgeConnect SD-WAN installation tasks:
1. Design & prepare: Always know your network and the network you are trying to create. Ensure you have
topology diagrams, link speed information, and other information so you can correctly configure and install the
appliances.
2. Orchestrator setup & initial configuration: The first
part of the actual installation is to install the
Orchestrator before any EdgeConnect SD-WAN
appliances. You can’t deploy any appliances until you
install and register the Orchestrator.
3. Configure Orchestrator: Once you have registered
the Orchestrator with the Cloud Portal, you need to
do some pre-configuration to prepare for appliance
installation. This includes creating Interface Labels,
Deployment Profiles, and Business Intent Overlays.
4. Install EdgeConnect SD-WAN appliances: When
you have configured these features in Orchestrator,
you’re ready to start installing appliances. This
process goes quickly because it’s mostly applying
templates and filling in a few blanks, like the IP
addresses of the interfaces.
5. Benefit from SD-WAN automation: When you’re
done with the configuration, and the Orchestrator has
pushed these settings to the appliances, they
establish their tunnels with peer appliances and start
forwarding traffic between them.
Student Guide Page 17
Step 2: Email
On the wizard’s second page, you configure
settings for an email server. Orchestrator
will use this to send alarm-related emails
and scheduled reports. After you click the
Test button, you want to see a success
message that indicates the email settings
work for the Orchestrator.
Student Guide Page 19
Step 3: Backups
On the wizard’s third page, you
configure settings for a backup
server. You schedule backups to
these types of servers:
• FTP
• HTTP
• HTTPS
• SCP
• SFTP
Licensing Notes
These are a few items that you should remember about licensing for the Orchestrator and appliances:
• The Orchestrator and EC-V virtual appliances use the same account name and account key.
• Each appliance license is granted for a moving 30-day
window, and it attempts to connect to the Cloud Portal
each day to renew its license. If it can connect, the license
continues to be valid. However, after 30 days of not being
able to connect to the Cloud portal, the appliance’s license
expires.
• If an appliance’s license expires it drops all traffic until it is
licensed again. Ensure that you resolve any reachability
issues before the appliance is in production.
• The Orchestrator and appliances use Google public DNS
(8.8.8.8) to resolve the Cloud Portal address unless you
configure a different DNS server.
Student Guide Page 22
Interface Labels
You can associate interface labels with the LAN or WAN interfaces of your EdgeConnect SD-WAN appliances. LAN
interface labels can also apply to an untagged interface or VLAN-tagged subinterface.
Template Groups
It’s important that you understand the
difference between a template and a template
group:
• Template: This is a collection of settings
for a specific feature.
• Template group: A collection of active
templates. You activate a template by
dragging it from Available Templates
into the Active Templates field.
You can apply a template group to a single
appliance, a group of appliances, or all the
EdgeConnect SD-WAN appliances. If you click
the built-in help question mark icon, it
provides information about a template’s
settings.
Student Guide Page 24
Applying Templates
To apply any changes to EdgeConnect SD-WAN
appliances, select one or more appliances in the
Orchestrator appliance tree, ensure you have
selected the correct template group, and then click
Apply Templates. If you modify a template group
after you have applied it to appliances, click Save to
apply the changes. When you make changes, some
templates give you the option to replace or merge
the changes. Replace overwrites the existing
settings. Merge inserts the change to combine it
with the existing settings. You can apply more than
one template group to an appliance.
Student Guide Page 25
EdgeConnect Licenses
EdgeConnect SD-WAN appliances require an SD-WAN license and can also use optional Boost and Advanced Security
licenses. The appliance uses an SD-WAN license that matches its total outbound and inbound WAN bandwidth. You can
Student Guide Page 26
view your appliances’ licenses from the Orchestrator under Configuration > Overlays & Security > Licensing >
Licenses. The SD-WAN license enforces this bandwidth limit outbound and inbound and provides these features:
• Traffic forwarding, firewall, routing, QoS, and automated provisioning
• Path Conditioning (Forward Error Correction, Packet Order Correction)
• Dynamic Path Control
• EdgeConnect HA
The Boost license enables WAN optimization via TCP Acceleration and Network Memory for the appliance. You purchase
blocks of Boost in 100 Mbps or 1 Gbps increments. You can view the total available pool of Boost bandwidth the
EdgeConnect appliances share from the Orchestrator under Configuration > Overlays & Security > Licensing >
Licenses.
You can also apply an Advanced Security license to appliances on which you want to enable intrusion detection and
intrusion prevention.
• Data center appliances: two unlimited licenses (total WAN bandwidth is greater than 2 Gbps)
Licensing Notes
After you register the Orchestrator with the Cloud Portal, it polls the Cloud Portal once each minute. So, depending on
when in this cycle an appliance registers, it can take a few minutes for it to appear on the Discovered Appliances tab of
Orchestrator.
Each appliance license is granted for a moving 30-day window, and it
attempts to connect to the Cloud Portal each day to renew its license. If it
can connect, the license continues to be valid. However, after 30 days of not
being able to connect to the Cloud portal, the appliance’s license expires. If
an appliance’s license expires it drops all traffic until it is licensed again.
Ensure that you resolve any reachability issues before the appliance is in
production.
The Orchestrator and appliances use Google public DNS (8.8.8.8) to resolve
the Cloud Portal address unless you configure a different DNS server.
Deployment Profiles
Deployment Profiles
After you configure interface labels, you can configure deployment profiles for use while installing appliances. A
deployment profile has settings for the deployment mode, interface settings, total WAN bandwidth settings, license type,
and amount of Boost. The Orchestrator pushes these settings to a new appliance to accurately configure them. If you
manually approve a new appliance from the Orchestrator, you can choose which deployment profile to apply to it from
the Appliance Wizard.
Though deployment profiles and deployment pages look similar, they have important differences:
• Deployment Profile
Orchestrator pushes settings from a deployment profile to a new EdgeConnect SD-WAN appliance.
Student Guide Page 31
• Deployment page
You can access it from the
Deployment page from
Orchestrator or Appliance
Manager web interfaces.
You can review or modify
deployment settings from
this page.
All fields are available
including the IP address and
next-hop fields.
VLAN Configuration
You configure VLANs from a Deployment Profile or the Deployment page. Fill in the VLAN field if you want to add the
interface to a tagged VLAN, or leave it blank for the untagged, native VLAN. When you add a VLAN tag to an interface,
the interface's name includes a VLAN number suffix. For example, a wan0 interface with a VLAN tag of 12 has the name
wan0.12.
If you need to add a subinterface and VLAN to an interface, click the +IP link below the interface. You can then enter an
IP address for the new subinterface and a VLAN number for the subinterface.
Student Guide Page 32
NAT Flag
NOTE
The EC-V appliances in the ReadyTech lab environment use the Not Behind NAT setting for all their WAN
interfaces because they connect to the WAN emulator virtual machines, not the internet.
Network Address Translation (NAT) is commonly used to map private, RFC 1918 IP addresses to a unique public IP
address that is valid on the internet. Each interface of a Deployment Profile or Deployment page has a NAT flag which
can be enabled or disabled. When your appliances are behind a NAT device, and it is necessary to build tunnels across
the internet, this flag can help Orchestrator build tunnels to the correct address.
You can also enter the public IP address that Orchestrator should use to build tunnels to this site for a given interface
label. This might be necessary if the NAT on the network path to the Cloud Portal is different from the NAT between
EdgeConnect appliances. If there are multiple service providers, you might have different paths through firewalls. If you’re
using NAT with EdgeConnect SD-WAN appliances, we recommend that you use 1:1 address mapping on at least one
end of a tunnel to avoid IPsec negotiation issues.
Student Guide Page 33
Allow All
Each WAN interface has an FW Mode or stateful firewall setting. The Allow All setting
means that the stateful firewall is disabled for that WAN interface, and it allows all inbound
and outbound traffic. You usually only use Allow All with WAN interfaces that connect to
private networks—like MPLS—or where upstream firewalls provide security. You shouldn’t
use this setting with internet-connected interfaces due to security risks.
Harden
WAN hardening protects your sites against connections that are not secure. When you
enable this setting for a WAN interface, it only allows inbound and outbound IPsec traffic.
You can’t use local internet breakout with a hardened interface. However, an EdgeConnect
SD-WAN appliance can still communicate with the Cloud Portal through a hardened
interface, and it also permits DHCP requests and responses and DNS queries and
responses.
Stateful
You can enable the stateful firewall FW Mode for a WAN interface. An EdgeConnect appliance applies this security to
passthrough traffic, not overlay tunnel traffic. The stateful firewall provides basic layer-3 and layer-4 functionality that
might be suitable for branch offices’ local internet breakout traffic. If a device on the local LAN originates a connection to
an outside device, the EdgeConnect SD-WAN appliance permits the session through this
WAN interface. However, devices can’t initiate inbound sessions through EdgeConnect
from the outside. The stateful firewall isn’t a substitute for the application-aware
Zone-based Firewall or IDS / IPS. The stateful firewall only looks at the connection state,
not the content, so it doesn’t protect against malware or viruses that could be hidden in
content from insecure online sources that users access.
Subnet Sharing
Subnet sharing is a proprietary routing protocol that EdgeConnect SD-WAN appliances with their peer EdgeConnect
appliances. Each appliance can advertise its local subnets to its peers via an overlay tunnel between them. When a
packet enters an appliance on the LAN side, the appliance looks up its destination network in its routes table and then
puts the packet into an overlay to that destination. If there is no overlay between two appliances, they remove any routes
they learned from subnet sharing from their routes tables. When they establish an overlay between them again, the
appliances resume advertising and learning routes via subnet sharing.
4. Lowest Peer Priority: An appliance prefers a route to an EdgeConnect peer with the lowest Peer Priority. This is a
proprietary setting you can configure to determine which of multiple EdgeConnect peers at another site is the
preferred path.
5. Random selection: If all the routes have matching criteria, the appliance randomly chooses one.
Management Routes
If you’re using the mgmt0 interface of an EdgeConnect SD-WAN appliance, it uses a management routes table for
self-originated traffic. If you add
any static routes that are not
default routes to the management
routes table, the appliance also
adds the route to the data-path
routes table. If an appliance uses a
data-path interface or a loopback
interface for management
purposes, it uses the data-path
routes table instead of the
management routes table. Self-
originated traffic includes these
types of traffic:
• Cloud Portal: HTTPS and
WebSocket traffic from the
appliance to the Cloud Portal.
• Orchestrator: HTTPS and
WebSocket traffic from the
appliance to the Orchestrator.
• Management services:
DHCP Relay, NetFlow/IPFIX,
NTP, SNMP, and Syslog traffic.
Student Guide Page 39
Branch Office
The Branch Office reference architecture uses
one EdgeConnect SD-WAN appliance
deployed in In-line Router Mode. You deploy
the appliance in the data path, so all packets
go through the appliance. The image only
shows Internet and MPLS, but you could use
any combination of WAN transports. The
appliance can learn routes from any local
network inside the branch via BGP or OSPF.
You can also configure the appliance as a DHCP server. This configuration allows you to replace a router or layer-3
device at a branch site. This architecture eliminates most causes of asymmetric flows where traffic goes through an
overlay in one direction but doesn’t return through the same tunnel. Finally, the appliance’s WAN interfaces can use the
Stateful Firewall FW mode, perform source NAT, and use all its interfaces with Zone-based Firewall.
Cloud Hub
The Cloud Hub reference architecture can
speed up your connections to the internet and
other resources. If your local internet
connection has an issue like packet loss, you
can backhaul your traffic from that site to a
Cloud Hub. The Cloud Hub then forwards that
traffic to another site or performs local internet
breakout. This provides you with much better
performance through your cloud provider’s
infrastructure.
When you set up cloud provider environment resources to deploy an EdgeConnect SD-WAN appliance, it can be time-
consuming. However, the Cloud Hub feature offers a utility to streamline this process which requires just a few minutes
to complete. Currently, this feature supports three cloud providers: AWS, Microsoft Azure, and Google Cloud Platform.
You can configure a cloud hub from Configuration > Cloud Services > IaaS in Orchestrator. Each cloud provider has
certain prerequisites and limitations. After you deploy a cloud hub, it has the same discovery and approval processes as
any other appliance. You can find deployment documentation for these providers at this website:
https://www.arubanetworks.com/techdocs/sdwan/docs/orch/configuration/cloud/cloud-hubs/
Student Guide Page 41
address to connect to each WAN transport. You typically use this reference architecture with larger branch offices or
regional offices that benefit from redundancy, but don’t support the higher costs of Traditional HA.
RFC 3768 defines VRRP as a layer-2 redundant gateway protocol that operates within a single subnet. Let’s review what
VRRP does.
1. End devices, like those on the left have a default gateway to which they forward IP packets with destinations outside
the local subnet. In our example, the end devices are in the 10.10.10.0 subnet and have a default gateway of
10.10.10.254.
2. Even though there is a redundant router in our diagram, without VRRP you would need to reconfigure the end
devices with a different default gateway or would need to learn the new default gateway via a different mechanism.
This causes downtime while the network reconverges.
3. VRRP allows end devices to have a single default gateway IP address that never goes down because it’s virtual. In
the diagram, the two routers share a virtual IP address (VIP) and virtual MAC address that the hosts use as their
default gateway.
4. Only one of the routers processes traffic addressed to the VIP at a time. This device is the VRRP master. Router A
sends VRRP messages so that router B knows that it’s the VRRP master.
Student Guide Page 44
5. If the VRRP master goes down, the backup fails to receive advertisements, a timer expires, and the VRRP backup
becomes the master.
6. The new VRRP master broadcasts a gratuitous ARP to the downstream switch to update its forwarding table, and to
the hosts on the same VLAN to update each one’s ARP cache. The switch then forwards traffic addressed to the
virtual IP address from its correct port to the new VRRP master.
To configure VRRP on an EdgeConnect, open the VRRP tab of Orchestrator, and then click on the edit icon for an
appliance.
1. Click Add VRRP.
Student Guide Page 46
Configuring EdgeHA
You must configure Edge HA, or EdgeConnect HA, from an appliance’s Deployment page in Orchestrator. It’s not
possible to configure EdgeConnect HA from an appliance. Each appliance must use Inline Router Mode. First, you must
check the box on the Deployment page to enable EdgeConnect HA. Then you must choose an HA peer from the
drop-down list of available devices.
Student Guide Page 48
Configuring EdgeConnect HA
The Deployment page lists two appliances with an HA link before them. You need to choose the interfaces that
interconnect the HA peers. This must be a data path interface because an appliance can’t use its management interfaces
for the HA link. You can optionally configure the IP address range you want the Orchestrator to use when it configures
the link. If you don’t configure this range, the Orchestrator uses the 169.254.1.0/24 subnet by default. With EC-V virtual
appliances, the Orchestrator uses multiple dynamic VLANs to connect the appliances over the HA link. You must
configure the hypervisor’s port group to allow all VLAN tags.
Appliance Preconfiguration
The Appliance Preconfiguration feature allows you to specify configuration parameters in Orchestrator for a specific
EdgeConnect SD-WAN appliance in a preconfiguration file. You can’t use this feature directly on the appliance. You can
prepare these configuration
settings in Orchestrator. You
can also copy the default
preconfiguration content
into your favorite text editor,
and then save it to a text file.
This allows you to copy it
into the Appliance
Preconfiguration field in the
Orchestrator later. If you
have a preconfiguration file,
you can clone it, modify its
content, and then save it
with a new name and
appliance-specific discovery
criteria. The files use the
YAML language for markup.
Student Guide Page 53
Built-in Help
When you click New to create a preconfiguration
file, all the help content is built into the file and is
shown as green text following the # comment
symbols. There’s a help section before each
section of the preconfiguration file. This content
describes each setting, its valid values, whether it’s
required or optional, and its default value.
Appliance Preconfiguration
You specify a file name
for each preconfiguration
file. It’s a good idea to
add a comment to
remind others or yourself
about information related
to the file. If you select
the Auto Approve when
Discovered checkbox,
Orchestrator will
automate this process for
a newly discovered
appliance. Otherwise, you
must manually click the
Approve button on the
Discovered Appliances tab in Orchestrator. The type of appliance determines the Discovery Criteria the Orchestrator
uses as a unique identifier that links an appliance to its preconfiguration file:
• Physical appliance: Serial number
• EC-V virtual appliance: Appliance Tag
The next concepts are Underlay Tunnels, Overlay Tunnels and Business Intent Overlays (BIOs). This is a high-level
discussion to help visualize the concepts and differences between these key features in an Aruba SD-WAN. Let's use a
familiar concept to introduce these concepts. We'll discuss technical details on the following slides.
A GPS Analogy - Here we see a representation of an SD-WAN. Many networking devices are connected via various
WAN transports like broadband internet, MPLS, and LTE. From an EdgeConnect SD-WAN point of view, the concept of
an underlay refers to an IPsec UDP tunnel over the WAN transports to which the EdgeConnect SD-WAN appliances
connect. Using a GPS maps app as an analogy, an underlay is like the available roads on which you can drive.
Since many paths or routes exist over the internet, an overlay is a logical concept that is essentially the forwarding path
EdgeConnect SD-WAN appliances use. It's like the highlighted path your GPS app selects for you to drive to reach your
destination.
A GPS app has the ability for users to select how it calculates the path. For example, you might choose settings to avoid
toll roads, use the fastest route versus the shortest route, or avoid highways. If you’re driving to work, you might want to
take the shortest path to save fuel and avoid toll roads. If you’re driving your kids to school, you might want to take
toll-roads since it’s faster and free with three or more people in your vehicle. If you took turns driving with another
person every other day, you would have to reconfigure the GPS app’s settings each time you drove.
Student Guide Page 57
If a GPS app could configure different profile settings depending on why or where you’re driving, that would be like a
Business Intent Overlay, or BIO. In our analogy, a Business Intent Overlay is like a GPS Profile. It determines the
characteristics of how my "highlighted path” is decided upon based on the "intent" of my drive.
Note that the overlay might not always be the same for the same types of traffic, just like a GPS app might sometimes
have you drive different streets to your destination because of an accident or road closure. So, BIOs are used to
determine overlay usage in real-time.
To reiterate, this GPS analogy is just a way to visualize these concepts. The overlay, which is the best path to follow, is
determined in real-time by the Business Intent Overlay based on current underlay conditions when an EdgeConnect
appliance forwards matching traffic. It’s not a separate VPN. Just like we don’t build new streets each time we drive
somewhere, our “highlighted path” is a logical path that utilizes existing streets.
• Business Intent Overlay Determines Overlay Tunnel GPS Profile
• Overlay Selected Underlay tunnels Streets to Drive
• Underlay
• Broadband Internet
• MPLS
• LTE
Student Guide Page 58
Now let’s bring it all together and look at an entire Aruba SD-WAN. At the bottom-right of this diagram is the underlay
network, consisting of the WAN transports like MPLS, internet, and LTE. Above it are three overlay networks, each with
logical tunnels that EdgeConnect SD-WAN appliances establish between sites over the underlay tunnels. EdgeConnect
optimizes each overlay tunnel to support the types of traffic it transports.
The RealTime Business Intent Overlay is for real-time traffic like VoIP and video. The goal for this type of traffic is
maximum reliability. So, we want to utilize a pair of connections, perhaps one MPLS link and one broadband internet link,
from two different service providers, and an LTE backup link. Also, we specify a full-mesh topology to establish direct
point-to-point connections with minimal latency for the fastest connections between EdgeConnect SD-WAN peers.
Finally, we want to locally break out any internet traffic.
The CriticalApps Business Intent Overlay is for enterprise applications data like SaaS offerings or local peer-to-peer file
sharing. The goal is to provide the best-quality connection by using MPLS and less expensive broadband internet
connections to transport data over a dual-hub and spoke topology. Likewise, since enterprise apps comprise most
network traffic, you can apply Aruba Boost WAN optimization. We want each site to connect to a pair of data center sites
as hubs, and each appliance breaks out internet traffic to the Zscaler cloud security service.
The DefaultOverlay Business Intent Overlay matches all other traffic, including guest Wi-Fi. Since guest Wi-Fi is just a
service to provide web connectivity, we use only inexpensive broadband internet connections, with all traffic backhauled
to one hub site that breaks it out to the Check Point CloudGuard cloud-security service.
These are just a few examples of the Business Intent Overlays you can configure using the same underlay tunnels over
the available WAN transports.
Overlay tunnel: Each Business Intent Overlays uses a link bonding policy to determine how each EdgeConnect combines
its underlay tunnels as a logical tunnel. This setting differs based on the type of traffic that matches it.
building between them. After tunnels are up, you can open the Topology tab, and then hover your mouse pointer on any
line and double-click it to open a Tunnels page. This page shows overlay tunnels and their underlay tunnels.
Tunnels Tab
The Orchestrator Tunnels tab lists information, including status information, for all the overlay and underlay tunnels you
select in the Orchestrator appliance tree. Overlay tunnel names contain the name of the Business Intent Overlay.
Underlay tunnels contain the names of the local and remote WAN interface labels. Finally, the tab lists passthrough
tunnels. These aren’t IPsec UDP tunnels. They’re a mechanism for routing passthrough traffic out of a particular
interface. The appliance uses them to send local internet breakout traffic from an interface to a destination like a SaaS
provider. Passthrough tunnel names also include the label of the WAN interface from which they forward traffic.
When you look at tunnels on the topology map of the
Orchestrator, you can choose to view all overlays, a specific
overlay, or underlays with the drop-down menu, and you
see these color-coded lines:
o Red: The tunnel is down.
o Blue: This only applies to underlay tunnels that are in
the process of coming up.
o Orange: The tunnel is impaired.
o Green: The tunnel is up.
Student Guide Page 61
You can learn more about Regional Routing in the Advanced SD-WAN Deployments (ASD) course.
Cross-Connect Groups
Cross-connect groups for primary
interfaces allow you to select the WAN
interface labels that are included in a
group. Orchestrator only attempts to
build cross-connect tunnels between
WAN interfaces with interface labels in
the same group. This is configurable on
a per-overlay basis, so they don’t all
have to be the same. Cross-connect
groups provide additional redundant
underlays via two different internet
service provider networks. This allows
for some redundancy between WAN
interfaces with different interface labels.
You can configure up to nine cross-
connect groups for an overlay.
Normally you would only build underlay tunnels between interfaces with the same WAN interface label. For example, if
you were to lose a connection from INET1 to INET1 between Site A and Site B, you could still reach Site B from Site A
with a cross-connect link between INET1 and INET2. You put those WAN interface labels into a cross-connect group
that allows the appliance to maintain connectivity using a different underlay tunnel and keep the overlay operational.
You should only add interface labels to a cross-connect group that has connections through the internet. Cross-connect
underlays between the private address space of an MPLS network and the public address space of a broadband internet
link are likely to fail.
Student Guide Page 67
Secondary Interfaces
In addition to primary and backup links, you have the option to configure
overlays to use secondary links for an additional level of failover
redundancy. If you use secondary links for a Business Intent Overlay, failover
uses the same mechanisms as with primary to backup failovers. When you
configure primary, secondary, and backup links for a Business Intent
Overlay, primary interfaces can fail over to secondary links which fail over to
backup interfaces.
Path Conditioning
This SD-WAN feature has two components that help to ensure packets reach their destination:
• Forward Error Correction (FEC): The appliance transmits parity packets in addition to data packets. The remote
appliance that receives the packets uses the parity packets to reconstruct any packets that were lost during
transmission. The amount of FEC packets each EdgeConnect transmits depends on the link bonding policy of the
Business Intent Overlay the traffic matches.
• Packet Order Correction (POC): When an appliance transmits packets, those packets can take different paths to
the remote appliance. Those packets are transmitted in order, but they might arrive out of order. The remote
appliance can put the packets back in their correct order. This prevents retransmissions for TCP traffic and ensures
apps can use UDP packets in their correct order.
• High Availability: This link bonding policy is meant for use with real-time traffic like voice, video, or certain
conferencing apps that is time-sensitive. It transmits one FEC packet for each data packet. This is called 1:1 FEC.
This ensures delivery in the event of packet loss so the protocol or app can function without impairment.
• High Quality: This link bonding policy uses the best quality path for data packets and the next best path for FEC
packets. It uses Adaptive FEC. It supports The traffic often relates to user-productivity apps. This means the
appliance increases the amount of FEC packets—up to one FEC packet for every five packets—when it detects
packet loss.
• High Throughput: This link bonding policy load balances traffic across the underlays of an overlay for maximum
data transfer speeds. It also uses Adaptive FEC. These types of flows often occur in the background.
• High Efficiency: This link bonding policy does not use Path Conditioning. You might use this link bonding policy if
your WAN links are congested, so you don’t want Path Conditioning to add additional FEC packets.
• Custom: We recommend that you only use this option under the direction of your Aruba account team or the
Aruba support team. If you use this option, be sure to thoroughly test it to verify your SD-WAN won’t suffer from
unintended consequences.
much less WAN bandwidth. The remote appliance uses the byte fingerprint to look up the original data in its cache. It
then retrieves the original data from its cache and forwards it to its destination.
It’s important to note that an EdgeConnect SD-WAN appliance can’t deduplicate data that is encrypted with SSL/TLS
unless you install the necessary certificates on the appliance. This is because the EdgeConnect can’t investigate an
encrypted data stream to perform disk caching, fingerprint creation, or matching. Contact your Aruba account team for
additional information if you need to implement this feature. It is outside the scope of this course.
Also, each appliance needs a Boost license for this to work.
Allocating Licenses
Let’s now consider how much Boost is required assuming 50% of traffic receives Boost and all underlays are active.
We have a total bandwidth used by small
branches of 300 Mbps—ten appliances
times 30 Mbps. 150 Mbps is 50% of the
bandwidth. How much total bandwidth is
used by the medium branches? Ten
appliances times 80 Mbps for a total of 800
Mbps. 400 Mbps is 50% of the bandwidth.
And at the Data Center? Two EdgeConnect
appliances at 6 Gbps each for a total of
12,000 Mbps at 50% is 6 Gbps. If you add
them together, the total bandwidth of all
appliances equals 13,100 Mbps. 6,550
Mbps is 50% of the bandwidth.
How much Boost is needed? Remember,
you can purchase Boost in 100 Mbps and 10 Gbps blocks. For this example, let’s calculate this based on 100 Mbps
blocks. 6,550 divided by 100 equals 65.5. You round this up for a total of 66 blocks of Boost.
At any time, you can check the box to revert the hub to use the branch settings by checking the box that says Use
Branch Settings. In the example shown here, branches backhaul all traffic, but the ECV‐4 hub can break out traffic locally.
ECV‐4 would probably advertise a default route to the branches to attract traffic that needs to be broken out to the
internet.
Orchestrator Restore
If you need to restore Orchestrator, review the
Orchestrator release notes for the correct procedure for
that version of software.
It must be done via the CLI.
Appliance Restore
You restore an EdgeConnect SD-WAN appliance from the Orchestrator
web interface. When you start to restore an EdgeConnect, Orchestrator
only lists the relevant backups from the appliance you selected in the
Orchestrator appliance tree. Although Orchestrator can back up multiple
appliances simultaneously, it can only restore one appliance at a time.
Select the backup image that you want and click Restore.
Student Guide Page 80
If you need to perform an RMA for an appliance, a wizard is available to automate the process for you. You need to install
the replacement appliance into the network. When the Orchestrator discovers the replacement appliance, you can select
the EdgeConnect to be replaced in the appliance tree, and then run the RMA wizard. The RMA wizard is available in the
Support tab. It walks you through the replacement process. You’re prompted to select a previous backup from the failed
EdgeConnect to use as a starting configuration for the replacement appliance.
Monitoring
Traffic Directionality: Inbound vs. Outbound
Unlike a traditional router, an EdgeConnect SD-WAN appliance has a very defined set of interface sides—a LAN side and
a WAN side. LAN traffic relates to all the devices of your Local Area Network. WAN is traffic on that side. The WAN side
also includes your other SD-WAN sites. EdgeConnect appliance traffic has distinct inbound and outbound traffic
directionality. Inbound traffic always goes from the WAN to the LAN. Outbound traffic always goes from the LAN to the
WAN. Many times graphs, charts, and tables refer to flows’ inbound and outbound traffic.
Here is a useful summary:
Flow Monitoring
You can monitor traffic from the Active & Recent Flows feature, or Flows tab. The Flows tab helps you to understand
traffic flows, especially if you need to troubleshoot an issue. You can view flows for one or more appliances. You can click
a flow’s Chart icon to see a real-time flow bandwidth chart. If you click the Detail icon, it displays detailed information
about a specific flow.
Flow Details
A flow details page contains critical information that helps you to diagnose problems. These are the main parts of a flow
details page:
• General tab
Route section: It provides information
about the flow, including the route policy
the flow matched. Route policies
determine the destination of a flow. If your
flow isn’t going to the correct destination,
then this section helps you determine the
reason.
Stats section: It provides detailed
numeric information about the flow.
QoS section: It provides the QoS policy
that put the flow into a traffic class. If your
traffic isn’t being prioritized properly and
has been subject to drops or delays, you
can look here to determine the reason.
Security section: It provides how the zone-based firewall applies security policies to a flow.
Segments section: It provides information about routing segmentation (VRF) if you’re using it.
• Optimization tab: It provides the matching optimization policy and related Boost information.
• NAT tab: It provides source and/or destination network address translation information.
Student Guide Page 84
Health Map
The Health Map provides a color-coded hourly status for each selected appliance. If you click any of the hourly status
cells, it shows the alarms and configured threshold settings of that appliance.
The Loss tab can show you the amount of packet loss a receiving appliance reports, and how well FEC corrects that loss.
The green bar shows the actual pre-FEC packet loss for received packets. The orange bar shows the effective post‐FEC
loss—the remaining loss after the appliance applies FEC.
Student Guide Page 86
Logging
Logging Overview: Orchestrator
Orchestrator’s Audit Logs and the Orchestrator Debug can be useful while working with Aruba EdgeConnect SD-WAN
support.
• Audit Logs: An aggregate of appliance logs shown in Orchestrator. You can set a filter for an appliance, a date
range, or a user account.
• Orchestrator Debug: A pop-up window with many tabs. Though you might understand some of the entries of
these features, especially the Audit Logs, we mostly want you to understand how to access these features in case
you need to work with the support team.
Alarm Alerting
You can configure Orchestrator to send alarm-generated emails to recipients. You control the severity level of the alarms
that generate emails. You can also select alarms to acknowledge and clear them. You cannot clear some types of alarms.
Documentation
Always consult the Aruba EdgeConnect Enterprise documentation. All documentation is available online without the
need to log in. Aruba EdgeConnect SD-WAN documentation is available at the following website:
https://www.arubanetworks.com/techdocs/sdwan/
Student Guide Page 93
Conclusion
AASP Assessment Overview
As a reminder, this course supports the Aruba Accredited SD-WAN Professional (AASP) accreditation assessment. You
can enroll in the assessment at this URL:
https://inter.viewcentral.com/events/cust/cust_tracks.aspx?company_login_id=aruba&pid=1&track_id=43
Note this information about the AASP assessment:
• 1-hour time limit
• Open-book assessment
• 40 multiple-choice questions
• Minimum passing score of 70%
• If you do not pass the assessment twice, you must wait 1
week before your next attempt
Thank You
Thank you for choosing EdgeConnect SD-WAN for your organization. We hope the information from this course serves
you well.