View and Edit Tenant Settings
Users with a tenant administrator role can view and modify the tenant settings that are configured on the Administration Portal, while users with tenant operator role can only view the tenant settings.
You cannot add or remove services (configured in Administration Portal) for the tenant.
To modify the settings configured for a tenant:
Field |
Description |
Tenant Capabilities (Services) |
---|---|---|
Services |
Displays the services supported for the tenant You cannot modify this setting. |
SD-WAN (Advanced or Essential) Security Services (Next Gen Firewall) |
Password Policy |
SD-WAN Next Gen Firewall |
|
Password Expiration Days |
Specify the duration (in days) after which the password expires and must be changed. Range: 1 through 365. Default: 180 days. Note:
The modifications are applicable to new and existing users. |
SD-WAN Next Gen Firewall |
SSL Settings |
Note:
You can modify this setting only if you have not added any SD-WAN sites for the tenant. |
SD-WAN |
Default SSL Proxy Profile |
Click the toggle button to enable or disable a default SSL proxy profile for the tenant. If you enable this option, the following items are created:
Note:
You use this option to create a tenant-wide default profile; enabling or disabling this option does not mean that SSL is enabled or disabled. If you enable this option, you must add a root certificate. |
SD-WAN |
Root Certificate |
Note:
This field is displayed only if you enabled the default SSL proxy profile. You can add a root certificate (X.509 ASCII format) by importing the certificate content from a file or by pasting the certificate content:
After the tenant is successfully added, a default root certificate, a default SSL proxy profile, and a default SSL proxy profile intent are created. Note:
|
SD-WAN |
VPN Authentication |
SD-WAN |
|
Authentication Type |
Note:
Select the VPN authentication method to establish a secure IPsec tunnel:
|
SD-WAN |
Overlay Tunnel Encryption |
Note:
You can modify this setting only if you have not added any SD-WAN sites for the tenant. |
SD-WAN |
Encryption Type |
For security reasons, all data that passes through the VPN tunnel must be encrypted. Select the encryption type:
The default encryption type is AES-256-GCM. |
SD-WAN |
Network Segmentation |
Note:
You can modify this setting only if you have not added any SD-WAN sites for the tenant. |
SD-WAN |
Network Segmentation |
Click the toggle button to disable network segmentation on the tenant. |
SD-WAN |
Dynamic Mesh |
Note:
|
SD-WAN |
Threshold for Creating a Tunnel |
Not applicable to sites with SD-WAN Essentials service. |
SD-WAN |
Number of Sessions |
Specify the maximum number of sessions closed (for a time duration of 2 minutes) between two branch sites. The dynamic mesh tunnel is created between two branch sites if the number of sessions closed (for a time duration of 2 minutes) is greater than or equal to the value that you specified. The default threshold value (the number of sessions for 2 minutes) is 5. |
SD-WAN |
Threshold for Deleting a Tunnel |
Not applicable to sites with SD-WAN Essentials service. |
SD-WAN |
Number of Sessions |
Specify the minimum number of sessions closed (for a time duration of 15 minutes) between two branch sites. The dynamic mesh tunnel is deleted between two branch sites if the number of sessions closed (for a time duration of 15 minutes) is lesser than or equal to the value that you specified. The default threshold value (the number of sessions for 15 minutes) is 2. |
SD-WAN |
Max Dynamic Mesh Tunnels |
SD-WAN |
|
Max tunnels per CSO |
Displays the maximum number of dynamic mesh tunnels that can be created in CSO. The total number of dynamic mesh tunnels that can be created by all tenants in CSO is limited to 125000. You cannot modify this field. |
SD-WAN |
Max tunnels per tenant |
Specify the maximum number of dynamic mesh tunnels that the tenant can create. Range: 1 through 50,000. |
SD-WAN |
Dynamic Mesh |
Click the toggle button to disable or enable dynamic meshing between sites in the tenant. |
SD-WAN |
Cloud Breakout Settings |
Note:
You can modify these settings even after you add sites for the tenant. |
SD-WAN |
Customer Domain Name |
Enter the domain name of the tenant. The domain name is used in cloud breakout profiles to generate the fully qualified domain name (FQDN). The cloud security providers use the FQDN to identify the IPsec tunnels. |
SD-WAN |
Advanced Settings (Optional) |
SD-WAN Next Gen Firewall |
|
Primary/Secondary Hub Affinity |
By default, hub affinity is enabled. Enable the toggle button to configure the CPEs to prefer the user-selected primary and secondary hubs over other paths for the SD-WAN overlay traffic. Disable the toggle button to configure the CPEs to prefer the shortest routes over the user-selected primary and secondary hubs for the SD-WAN overlay traffic. For more details, see Understanding Specific Route-based Routing Within the SD-WAN Overlay. |
SD-WAN Next Gen Firewall |
Tenant-Owned Public IP Pool |
You can modify (add, edit or delete) the public IPv4 subnets that are part of the tenant’s pool of public IPv4 addresses. The tenant IP pool addresses are assumed to be public IP addresses and represent public LAN subnets in SD-WAN branch sites. To add an IPv4 subnet:
You can enter more IPv4 subnets by following the preceding procedure. To modify a subnet that you entered, select the subnet and click the edit (pencil) icon. To delete a subnet, select the subnet and click the delete icon. If you update the IP address pool of a tenant, CSO runs a job to automatically update and reprovision the tenant sites. |
SD-WAN Next Gen Firewall |
Tenant-Specific Attributes |
Note:
You can modify these settings even after you add sites for a tenant. If you have set up a third-party provider edge (PE) device by using software other than CSO, then configure settings on that router by specifying custom parameters and its corresponding values. You can modify existing attributes or add attributes.
|
SD-WAN Next Gen Firewall |