Deployment Profiles - SD-WAN Orchestrator Docs
Deployment Profiles - SD-WAN Orchestrator Docs
Deployment Profiles - SD-WAN Orchestrator Docs
Using SD-WAN Orchestrator / Configuration > Overlays & Security / Deployment Profiles
Home
Compliance
Deployment Profiles
Deployment Guides
Configuration > Overlays & Security > Deployment Profiles
Integration Guides Instead of configuring each appliance separately, you can create various Deployment Profiles and
Using SD-WAN Orchestrator provision a device by applying the profile you want. For example, you can create a standard format for
your branch.
What's New
Getting Started TIP: For a smoother workflow, complete the DHCP Server Defaults tab (Configuration >
Light or Dark Theme Networking > DHCP Server Defaults) before creating Deployment Profiles.
Menu Options
You can use Deployment Profiles to simplify provisioning, regardless of whether you choose to create
Monitoring and use Business Intent Overlays.
Monitoring > Summary
Monitoring > Performance NOTE: You cannot edit IP/Mask fields because they are appliance-specific.
Monitoring > Reporting
Monitoring > Bandwidth Map Labels to Interfaces
Monitoring > Tunnel Health • On the LAN side, labels are optional. They can be used as match criteria for Business Intent
Configuration Overlay ACLs, such as data, VoIP, or replication.
Configuration > Overlays &
Security • On the WAN side, labels identify the link type, such as MPLS or Internet. These labels are
Business Intent Overlays
mandatory. They are used by Orchestrator to build Business Intent Overlay policies.
• To create or manage a global pool of labels, either:
• Navigate to Configuration > Overlays & Security > Deployment Profiles, click the Edit icon
next to Label, and make the appropriate changes, or
• Navigate to Configuration > Overlays & Security > Interface Labels) and make the
appropriate changes.
• The change you make to a label propagates automatically. For example, it renames tunnels that
use that labeled interface.
DHCP/BOOTP Relay
Field Description
Destination IP address of the DHCP server assigning the IP addresses. This setting applies
DHCP/BOOTP Server to the local interface only.
When selected, inserts additional information into the packet header to identify
the clientʼs point of attachment. This setting applies to all LAN-side interfaces
Enable Option 82 on this appliance.
IMPORTANT: Changing this setting will modify Option 82 settings on all LAN-
side interfaces that are enabled as DHCP Relay.
Tells the relay what to do with the hex string it receives. The choices are
append, replace, forward, and discard. This setting applies to all LAN-side
Option 82 Policy interfaces on this appliance.
IMPORTANT: Changing this setting will modify Option 82 settings on all LAN-
side interfaces that are enabled as DHCP Relay.
WAN–side Configuration
Select the WAN-side label you want to apply to this deployment. Click the edit icon to add a new
interface or delete a previously configured interface.
Firewall Zone: Zone-based firewall policies are configured globally on the Orchestrator. A zone is
applied to an Interface. By default, traffic is allowed between interfaces labeled with the same zone.
Any traffic between interfaces with different zones is dropped. You can create exception rules
(Security Policies) to allow traffic between interfaces with different zones. The firewall zones you
have already configured will be in the list under FW Zone. Select the Firewall Zone you want to apply
to the WAN you are deploying.
Firewall Mode: Four options are available at each WAN interface:
• Allow All permits unrestricted communication. Use this option with extreme caution and only if
the interface is behind a WAN edge firewall.
• Stateful only allows communication from the LAN-side to the WAN-side.
Use this if the interface is behind a WAN edge router.
• Stateful with SNAT applies Source NAT to outgoing traffic.
Use this if the interface is directly connected to the Internet and you want to enable local internet
breakout.
• Harden
• For traffic inbound from the WAN, the appliance accepts only IPSec tunnel packets that
terminate on an EdgeConnect appliance.
• For traffic outbound to the WAN, the appliance only allows IPSec tunnel packets and
management traffic that terminate on an EdgeConnect appliance.
NAT Settings: To change the NAT setting, click the NAT-related link under the Next Hop field on the
WAN side. The NAT Settings dialog box opens.
Select one of the following options:
• If the appliance is behind a NAT-ed interface, select NAT.
• If the appliance is not behind a NAT-ed interface, select Not behind NAT.
• Enter an IP address to assign a destination IP for tunnels being built from the network to this WAN
interface.
Shaping: You can limit bandwidth selectively on each WAN interface.
• Total Outbound bandwidth is licensed by model. It is the same as max system bandwidth.
• To enter values for shaping inbound traffic (recommended), you must first select Shape Inbound
Traffic.
EdgeConnect Licensing: Only visible on EdgeConnect appliances.
• For additional bandwidth, you can purchase Plus, and then select it here for this profile.
• If you have purchased a pool of Boost for your network, you can allocate a portion of it in a
Deployment Profile. You can also direct allocations to specific types of traffic in the Business
Intent Overlays.
• To view how you have distributed Plus and Boost, navigate to the Configuration > Overlays &
Security > Licensing > Licenses tab.
• Select the appropriate licensing you have applied to your EdgeConnect appliance from the menu.
The licenses will only display depending on the licenses you have for that particular account. You
can select the following licensing options:
• Mini
• Base
• Base + Plus
• 50 Mbps
• 200 Mbps
• 500 Mbps
• 1 Gbps
• 2 Gbps
• Unlimited
NOTE: You must have the correct hardware to support the license selected.
BONDING
• EdgeConnect supports etherchannel bonding of multiple physical interfaces of the same media
type into a single virtual interface. For example, wan0 plus wan1 bond to form bwan0. This
increases throughput on a very high-end appliance and/or provides interface-level redundancy.
• For bonding on a virtual appliance, you would need to configure the host instead of the appliance.
For example, on a VMware ESXi host, you would configure NIC teaming to get the equivalent of
etherchannel bonding.
• Whether you use a physical or a virtual appliance, etherchannel must also be configured on the
directly connected switch/router. Refer to Aruba SD-WAN user documentation.
Bridge Mode
Single WAN-side Router
In this deployment, the appliance is in-line between a single WAN router and a single LAN-side
switch.
Router Mode
There are four options to consider:
1 Single LAN interface & single WAN interface
2 Dual LAN interfaces & dual WAN interfaces
3 Single WAN interface sharing LAN and WAN traffic
4 Dual WAN interfaces sharing LAN and WAN traffic
For best performance, visibility, and control, Options #1 and #2 are recommended because
they use separate LAN and WAN interfaces. And when using NAT, use Options #1 or #2 to ensure
that addressing works properly.
#1 - Single LAN Interface & Single WAN Interface
This deployment redirects traffic from two LAN interfaces to two WAN interfaces on a single
EdgeConnect appliance.
• 2 WAN next-hops / 2 subnets / 1 appliance
• 2 separate service providers or WAN services (MPLS, IPSec VPN, MetroEthernet, and so forth)
Out-of-path dual LAN and dual WAN interfaces
This deployment redirects traffic from a single router (or L3 switch) to a single subnet on the
EdgeConnect appliance.
• This mode only supports out-of-path.
• When using two EdgeConnects at the same site, this is also the most common deployment for
high availability (redundancy) and load balancing.
• For better performance, control, and visibility, Router mode Option #1 is recommended instead of
this option.
#4 - Dual WAN Interfaces Sharing LAN and WAN traffic
This deployment redirects traffic from two routers to two interfaces on a single EdgeConnect
appliance.
This is also known as Dual-Homed Router Mode.
• 2 WAN next-hops / 2 subnets / 1 appliance.
• 2 separate service providers or WAN services (MPLS, IPSec VPN, MetroEthernet, and so forth).
• This mode only supports out-of-path.
• For better performance, control, and visibility, Router mode Option #2 is recommended instead of
this option.
Considerations for Router Mode Deployments
• Do you want your traffic to be in-path or out-of-path? This mode supports both deployments. In-
path deployment offers much simpler configuration.
• Does your router support VRRP, WCCP, or PBR? If so, you might want to consider out-of-path
Router mode deployment. You can set up more complex configurations, which offer load
balancing and high availability.
• Are you planning to use host routes on the server/end station?
• In the rare case when you need to send inbound WAN traffic to a router other than the WAN next
hop router, use LAN-side routes.
Examine the Need for Traffic Redirection
Whenever you place an appliance out-of-path, you must redirect traffic from the client to the
appliance.
There are three methods for redirecting outbound packets from the client to the appliance
(known as LAN-side redirection, or outbound redirection):
• PBR (Policy-Based Routing) – Configured on the router. No other special configuration required
on the appliance. This is also known as FBR (Filter-Based Forwarding).
If you want to deploy two EdgeConnects at the site for redundancy or load balancing, you also
need to use VRRP (Virtual Router Redundancy Protocol).
• WCCP (Web Cache Communication Protocol) – Configured on both the router and the
EdgeConnect appliance. You can also use WCCP for redundancy and load balancing.
• Host routing – The server/end station has a default or subnet-based static route that points to
the EdgeConnect appliance as its next hop. Host routing is the preferred method when a virtual
appliance is using a single interface, mgmt0, for datapath traffic (also known as Server Mode).
To ensure end-to-end connectivity in case of appliance failure, consider using VRRP between the
appliance and a router, or the appliance and another redundant EdgeConnect.
How you plan to optimize traffic also affects whether you also need inbound redirection from the
WAN router (known as WAN-side redirection):
• If you use subnet sharing (which relies on advertising local subnets between EdgeConnect
appliances) or route policies (which specify destination IP addresses), you only need LAN-side
redirection.
• If, instead, you rely on TCP-based or IP-based auto-optimization (which relies on initial
handshaking outside a tunnel), you must also set up inbound and outbound redirection on the
WAN router.
• For TCP flows to be optimized, both directions must travel through the same client and server
appliances. If the TCP flows are asymmetric, you need to configure flow redirection among local
appliances.
A tunnel must exist before auto-optimization can proceed. There are three options for tunnel creation:
• If you enable auto-tunnel, the initial TCP-based or IP-based handshaking creates the tunnel.
This means that the appropriate LAN-side and WAN-side redirection must be in place.
• You can allow the Initial Configuration Wizard to create the tunnel to the remote appliance.
• You can create a tunnel manually on the Configuration > Networking > Tunnels > Tunnels page.
Server Mode
This mode uses the mgmt0 interface for management and datapath traffic.
Back to top
© Copyright 2024 Hewlett Packard Enterprise Development LP.
To view the end-user software agreement, go to HPE Aruba Networking EULA.
Open Source Code:
This product includes code licensed under certain open source licenses which require source compliance. The corresponding
source for these components is available upon request. This offer is valid to anyone in receipt of this information and shall expire
three years following the date of the final distribution of this product version by Hewlett Packard Enterprise Company. To obtain
such source code, please check if the code is available in the HPE Software Center at https://myenterpriselicense.hpe.com/cwp-
ui/software but, if not, send a written request for specific software version and product for which you want the open source code.
Along with the request, please send a check or money order in the amount of US $10.00 to:
Hewlett Packard Enterprise Company
Attn: General Counsel
WW Corporate Headquarters
1701 E Mossy Oaks Rd Spring, TX 77389
United States of America
Cookie Preferences