You can add an on-premise spoke site in CSO by provisioning a CPE and a switch behind the CPE to provide SD-WAN and LAN capabilities to the site. See Switch Behind a CPE or Next Generation Firewall Overview for details.
To add a site with SD-WAN and LAN capabilities:
The Sites page appears.
The Add Site for Tenant-Name page appears.
Note Fields marked with an asterisk (*) are mandatory.
(Optional) click the Edit links within the summary to go directly to a specific page of the wizard and modify the configured settings.
The site activation job is initiated and the Site Activation: Site-Name page appears displaying the progress of the steps executed for activating the CPE and the switch. The CPE is activated first and then the process to activate the switch is initiated.
If the Zero Touch Provisioning (ZTP) toggle button is enabled (default), CSO pushes the stage-1 and stage-2 configurations and provisions the switch.
This process occurs immediately after the activation process, for which you entered the activation code or selected auto-activation.
Note Stage-1 configuration is the initial configuration that allows basic connectivity to a device, which is pushed to the device.
The configuration that is pushed to the device after it has connected to CSO is called stage-2 configuration.
If you disabled the Zero Touch Provisioning (ZTP) toggle button, you must manually configure the stage-1 configuration (as provided by CSO) on the switch.
To manually configure the stage-1 configuration:
The stage-1 configuration page appears displaying the stage-1 configuration to be copied to the EX Series device.
After the stage-1 configuration is committed, the switch has the outbound SSH configuration to connect with CSO.
CSO then provisions the switch.
Table 57: Fields on the Add Site for Tenant-Name Page(SD-WAN and LAN Capabilities)
Field | Description |
---|---|
General | |
Site Information | |
Site Name | Enter a unique name for the site. You can use alphanumeric characters and hyphen (-); the maximum length is 10 characters. |
Site Group | Select a site group to which you want to assign the site. |
Site Capabilities | |
WAN Capabilities | Select SD-WAN to include SD-WAN capabilities in the spoke site. |
LAN Capabilities | Select LAN to include SD-LAN capability in the spoke site. |
Configuration | |
Primary Provider Hub | Select the hub site (or primary hub site in case of multihoming) to which the spoke site must connect. |
Secondary Provider Hub | Select the secondary hub site to which this site must connect. This site connects to the secondary data hub site when the primary data hub is down. |
Primary Enterprise Hub | Select the primary enterprise hub with which you want to connect the spoke site. If you specify a enterprise hub, then the initial site-to-site traffic as well as the central breakout (backhaul) traffic (if applicable) is sent through the enterprise hub instead of the hub site. |
Secondary Enterprise Hub | Select the secondary enterprise hub for this spoke site. The spoke site connects with secondary enterprise hub when the primary enterprise hub is down. |
On-Demand Mesh Threshold | |
Threshold for Tunnel Creation | Specify the threshold for the number of sessions (flows) closed (in a two-minute duration) between the on-premise spoke site and a destination site. When the number of sessions closed exceeds the specified threshold, a tunnel is created between the on-premise spoke site and the destination site. The default value is 5. For example, if you specify the number of sessions as 5, dynamic mesh tunnels are created if the number of sessions closed between two spoke sites in 2 minutes exceeds 5. |
Threshold for Tunnel Deletion | Specify the threshold for the number of sessions closed (in a 15-minute duration) between the on-premise spoke site and a destination site. When the number of sessions closed is lower than the specified threshold, the tunnel between the on-premise spoke site and destination site is deleted. The default value is 2. For example, if you specify the number of sessions closed as 2, dynamic mesh tunnels are deleted if the number of sessions closed is lesser than or equal to 2. |
Address and Contact Information | |
Street Address | Enter the street address of the site. |
City | Enter the city where the site is located. |
State/Province | Select the state or province where the site is located. |
ZIP/Postal Code | Enter the postal code for the site. |
Country | Select the country where the site is located. Click the Validate button to verify the address.
|
Contact Name | Enter the name of the contact person for the site. |
Enter the e-mail address of the contact person for the site. | |
Phone | Enter the phone number of the contact person for the site. |
Advanced Configuration | |
Name Server IP List | Specify one or more IPv4 addresses of the DNS server. To enter more than one DNS server address, type the address, press Enter, and then type the next address, and so on.. DNS servers are used to resolve hostnames into IP addresses. |
NTP Server | Specify the fully qualified domain names (FQDNs) or IP addresses of one or more NTP servers. Example: ntp.example.net The site must have DNS reachability to resolve the FQDN during site configuration. |
Select Timezone | Select the time zone of the site. |
WAN | |
Device Template | |
Device Series | Select the device series to which the CPE belongs—SRX, NFX 150, and NFX 250. Based on the device series that you select, the supported device templates (containing information for configuring devices) are listed. Select a device template for the selected device series. |
Device Information | |
Serial Number | Enter the serial number of the CPE device. |
Auto Activate | Click the toggle button to enable or disable automatic activation of the CPE device. When you enable this field, zero-touch provisioning (ZTP) of the CPE device is automatically triggered after the site is added to CSO. The device template that you select determines whether this option is enabled or disabled by default. |
Activation Code | If you disable the Auto Activate field, enter the activation code for the CPE or firewall device. For information about activating a CPE or firewall device, see Activating a CPE Device. |
Boot Image | Select the boot image from the drop-down list if you want to upgrade the image for the CPE device. The boot image is the latest build image uploaded to the image management system. The boot image is used to upgrade the device when the CSO starts the ZTP process. If the boot image is not provided, then the device skips the procedure to upgrade the device image. The boot image is populated based on the device template that you have selected while creating a site. See Uploading a Device Image. |
WAN Links | |
WAN_0 WAN-Interface-Name | This field is enabled by default. Enter parameters related to WAN_0. Fields marked with an asterisk (*) must be configured to proceed. |
Link Type | Select whether the link would be an MPLS link or Internet link. |
Access Type (NFX150, NFX250, and SRX300 line of Services Gateways) | If you select Internet as the link type, select the access type for the underlay link—Ethernet, LTE, ADSL, or VDSL. You can select the LTE, ADSL, or VDSL access type only for one WAN link. Note:
|
Egress Bandwidth | Enter the maximum bandwidth (in Mbps) that the CPE or firewall allows over the WAN link. Range: 1 through 10,000. |
Address Assignment | Select the method of assigning an IP address to the WAN link—DHCP or STATIC.
|
Static IP Prefix | If you configured the address assignment method as STATIC, enter the IP address prefix of the WAN link. |
Gateway IP Address | If you configured the address assignment method as STATIC, enter the IP address of the gateway of the WAN service provider. |
Advanced Settings | |
Provider | Enter the name of the service provider who is responsible for providing the WAN link. |
Cost/Month | Enter the cost per month (in a specified currency) for the WAN link. Specify the currency from the adjacent drop-down list. Range: 1 through 10,000. In bandwidth-optimized SD-WAN, CSO uses this information to identify the least-expensive link to route traffic when multiple WAN links meet SLA profile parameters. |
Enable Local Breakout | Click the toggle button to enable local breakout on the WAN link. By default, local breakout is disabled. Note:
|
Breakout Options | Select whether you want to use the WAN link for both breakout and WAN traffic (default) or only for breakout traffic. |
Autocreate Source NAT Rule | Click the toggle button to enable or disable the automatic creation of source NAT rules. By default, this field is enabled when local breakout is enabled on the WAN link. Table 58 explains how source NAT rules are automatically created on the WAN link. The automatically-created source NAT rules are implicitly defined and applied to the site and is not visible on the NAT Policies page. Note: You can manually override automatically created NAT rules, by creating a NAT rule within a particular rule-set. For example, to use a source NAT pool instead of an interface for translation, create a NAT rule within this particular rule-set, that includes the relevant department zone and WAN interface as the source and destination. For example: Dept-Zone1 --> W1 : Translation=Pool-2 The manually created NAT rule is placed at a higher priority than the corresponding automatically created NAT rule. You can also add other fields (such as addresses, ports, protocols, and so on) as part of the source or destination endpoints. For example: Dept-Zone1, Port 56578 --> W1: Translation=Pool-2 |
Translation | Select the type of NAT to use for the traffic on the WAN link:
|
IP Addresses | For pool-based NAT, enter one or more IP addresses, subnets, or an IP address range. Separate multiple IP addresses by using commas and use a hyphen to denote a range; for example, 192.0.2.1-192.0.2.50. |
Preferred Breakout Link | Click the toggle button to enable the WAN link as the preferred breakout link. If you disable this option, then the breakout link is chosen using ECMP from the available breakout links. |
BGP Underlay Options | Note: This setting can be configured only if the address assignment is static and local breakout is enabled. Click the toggle button to enable BGP underlay routing. When you enable BGP underlay routing, route advertisements to the primary PE node and, if configured, the secondary PE node occur as follows:
Note: If underlay BGP is enabled for a WAN link, then the routes learnt from BGP are installed for local breakout; CSO does not generate the static default route. |
Primary Neighbor | Displays the IP address that you entered for the gateway for the WAN link. |
Secondary Neighbor | If you want to provide PE resiliency, you can configure a secondary PE node. Enter the IP address of the secondary PE node. Note: If the primary PE node goes down, then the secondary PE is used as the next hop. When the primary PE comes back up, the route next hops are changed to the primary PE. |
eBGP Peer-AS-Number | Enter the autonomous system (AS) number for the external (EBGP) peer. Note: If the peer AS number is not configured or the peer AS number that is configured is the same as that of the CPE site, then the BGP type is assumed to be internal BGP (IBGP). |
Authentication | Select the BGP route authentication method to be used:
|
Auth Key | If you specified that MD5 should be used for authentication, specify an MD5 authentication key (password), which is used to verify the authenticity of BGP packets. |
Advertise Public LAN Prefixes | Click the toggle button to enable the advertisement of public LAN prefixes. This field is disabled by default. If the tenant has a public IP address pool configured and you enable the advertisement of public LAN prefixes, then for LAN segments that are created with a subnet that falls under the tenant public IP address pool, CSO advertises the LAN subnet to the BGP underlay. Note: When public LAN advertisement is enabled for the WAN link, public LAN prefixes are advertised through the BGP underlay towards MPLS or the Internet. If a site has two versions of the route installed for the same LAN prefix in the overlay and underlay, the overlay routes are always preferred over underlay. |
Use For Fullmesh | Click the toggle button to specify whether the WAN link can be a part of a full mesh topology. A site can have a maximum of three links enabled for meshing. |
Mesh Overlay Link Type | When Use for Fullmesh field is enabled, select the type of mesh overlay link—GRE and GRE_IPSEC:
|
Mesh Tag | When the Use for Fullmesh field is enabled, enter the tag to be associated with the WAN link for creating tunnels. You can assign only one tag to the link. Matching mesh tags is one of the criteria used to form tunnels between sites that support meshing. For more information about mesh tags, see Mesh Tags Overview. |
Connects to Hubs | Click the toggle button to specify that the WAN link of the site connects to a hub. Note:
|
Use for OAM Traffic | If you have specified that the WAN link is connected to a hub, click the toggle button to enable sending the OAM traffic over the WAN link. This WAN link is then used to establish the OAM tunnel. |
Overlay Tunnel Type | Select the mesh overlay tunnel type—GRE and GRE_IPSEC. MPLS links can have both GRE and GRE_IPSEC as the overlay link type where as Internet links can have only GRE_IPSEC as the overlay link type. |
Overlay Peer Device | Displays the peer hub device to which the site is connected. |
Overlay Peer Interface | Select the interface name of the hub device to which the WAN link of the site is connected. |
Backup Link | Select a backup link through which traffic can be routed when the primary (other) links are unavailable. You can select any link other than the default links or links that are configured exclusively for local breakout traffic. When a primary link comes back online, CSO monitors the performance on the primary link and when the primary link meets the SLA requirements, the traffic is switched back to the primary link. However, SLA data is not monitored for the backup link. |
Default Link | Select one or more links that will be used for routing traffic in the absence of matching SD-WAN policy intents. A site can have multiple default links to the hub site. Default links are used primarily for overlay traffic but can also be used for local breakout traffic. However, a default link cannot be used exclusively for local breakout traffic. If you do not specify a default link, then equal-cost multipath (ECMP) is used to choose the link on which to route traffic. |
Data VLAN ID | Enter a VLAN ID for the WAN link. Range: 2 through 4093. Note:
|
WAN_1 WAN-Interface-Name | Click the toggle button to enable or disable the WAN link. When you enable the WAN link, fields related to the WAN link appear. Fields marked with an asterisk (*) must be configured to proceed. Refer to the fields described for WAN_0 WAN-Interface-Name for an explanation of the fields |
WAN_2 WAN-Interface-Name | Click the toggle button to enable or disable the WAN link. When you enable the WAN link, fields related to the WAN link appear. Fields marked with an asterisk (*) must be configured to proceed. Refer to the fields described for WAN_0 WAN-Interface-Name for an explanation of the fields |
WAN_3 WAN-Interface-Name | Click the toggle button to enable or disable the WAN link. When you enable the WAN link, fields related to the WAN link appear. Fields marked with an asterisk (*) must be configured to proceed. Refer to the fields described for WAN_0 WAN-Interface-Name for an explanation of the fields |
Management Connectivity | |
IP Prefix | Enter an IPv4 address prefix for the loopback interface on the CPE device. The IP address prefix must be a /32 IP address prefix and must be unique across the entire management network. If you do not specify an IPv4 address prefix, CSO automatically assigns the IP prefix from the reserved pool 100.124.0.0/14. |
LAN | |
Device Profile | |
Device Name | Enter a name for the switch. You can use alphanumeric characters and hyphen (-). The maximum length allowed is 15 characters. |
Device Type | Select the type of switch—EX2300, EX3400, EX4300, EX4600, and EX4650. |
Device Model | Select the model for the switch you specified in the Device Type. The models vary in the number and type of ports the switch contains. For example, If you selected EX3400, select a model such as EX3400-24P, EX3400-48P, EX3400-24T among others. |
CPE Settings | |
Trunk Ports | Select at least two trunk ports on the CPE device to connect with the switch, which are used for the following:
Note: The ae0 LAG interface of the SRX Series devices is used as the trunk port for communication with the switch. |
Switch Management Subnet | Specify the subnet that the DHCP server can use to assign IP addresses. The DHCP server runs on the following ports:
|
Switch Details | |
Serial Number | Specify the serial number of the switch. |
Auto Activate | Click the toggle button to enable or disable automatic activation of the switch when the switch is detected by CSO (that is, management status of the device is Device_Detected). When you enable this field, zero-touch provisioning (ZTP) of the switch is automatically triggered when the device communicates with CSO. By default, auto activation for the switch is enabled, if it is enabled for the CPE and vice-versa. Note: You must physically connect the switch to the CPE and power it on for the switch to be automatically activated when you enable this option. |
Activation code | When the Auto activate field is disabled, enter the activation code to be used for manually activating the switch. For information, see Manually Activating a Switch. |
Zero Touch Provisioning | Click the toggle button to enable or disable zero-touch provisioning (ZTP) of the switch through ZTP. If you disable ZTP, you must manually copy and paste the Stage-1 configuration on the switch during site activation. See Step Step-by-Step Procedure for details. Note:
|
LAN Segment | Displays the LAN segment that you configure on the switch. To add a LAN segment, click the + icon on the top, right corner of the LAN table. The Add LAN Segment page appears. See Table 59. |
Table 58: Automatic Creation of Source NAT Rules
Autocreate Source NAT Rule | Translation | NAT Rules Creation |
---|---|---|
Disabled | Not applicable (No NAT) | None. |
Enabled | Interface-Based (Default)—CSO creates interface-based NAT rules. | Source NAT rules are automatically created, with each rule from a department zone to the WAN interface, with a translation of type interface. Each pair of [zone - interface] represents a rule-set. For example, the following department zone to (WAN link) W1 interface rule-set might be created: Dept-Zone1 --> W1: Translation=Interface Dept-Zone2 --> W1: Translation=Interface Dept-Zone3 --> W1: Translation=Interface |
Enabled | Pool-Based—CSO automatically creates pool-based NAT rules | NAT source rules are automatically created, with each rule from a department zone to the WAN NAT pool with a translation of type pool. For example, a source NAT rule from department zone to NAT pool might be created: Dept-Zone1 --> W1 : Translation=Pool-1 Dept-Zone2 --> W1 : Translation=Pool-1 |
Table 59: Fields on the Add LAN Segment Page when Adding a Switch along with CPE
Field | Description |
---|---|
Add LAN Segment | |
Name | Enter a name for the LAN segment. The name for a LAN segment should be a unique string of alphanumeric characters and some special characters (. -). No spaces are allowed and the maximum length is 15 characters. |
VLAN ID | Enter the VLAN ID for the LAN segment. Range: 2 through 4093. |
Department | Select a department to which the LAN segment is to be assigned. Alternatively, click the Create Department link to create a new department and assign the LAN segment to it. See Adding a Department for details. You group LAN segments as departments for ease of management and for applying policies at the department-level. |
Gateway Address/Mask | Enter a valid gateway IP address and mask for the LAN segment; for example, 192.0.2.8/24. |
DHCP | For directly connected LAN segments, click the toggle button to enable DHCP. DHCP is disabled by default. You enable DHCP if you want to assign IP addresses by using a DHCP sever. You disable DHCP if you want to assign a static IP address to the LAN segment. Note: If you enable DHCP, fields related to DHCP-related parameters appear and must be configured. |
[DHCP-Related Fields] | |
Address Range Low | Enter the starting IP address in the range of IP addresses that can be allocated by the DHCP server to the LAN segment. |
Address Range High | Enter the ending IP address in the range of IP addresses that can be allocated by the DHCP server to the LAN segment. |
Maximum Lease Time | Specify the maximum duration (in seconds) for which a client can request for and hold a lease on a DHCP server. Range: 0 through 4,294,967,295. |
Name Server | Specify or select one or more IPv4 addresses of the DNS server. To enter more than one DNS server address, type the address, press Enter, and then type the next address, and so on. DNS servers are used to resolve hostnames into IP addresses. |
CPE Ports | Click the toggle button to include or exclude the CPE in the LAN segment. When you include the CPE in the LAN segment:
If you exclude the CPE from the LAN segment, you must specify the switch ports that connect with the LAN in the Switch Ports field. CSO automatically assigns LAN ports on the CPE device and creates the same LAN segment on the CPE device. Note: You can select only one port if the CPE is an SRX Series device. |
Switch Ports | If you disable the CPE ports field, select ports on the switch that will be part of the LAN segment. Select the ports from the Available column and click the right-arrow to move the ports to the Selected column. |
Adding and Provisioning Switches to Provide LAN Capability to a Site Overview
Add a Switch to an Existing SD-WAN Site Or Next-Generation Firewall Site