Adding Cloud Breakout Settings
You use the Add Cloud Breakout Settings page to add cloud breakout settings that you can then apply to sites.
To add cloud breakout settings:
Sites with SD-WAN Essentials service do not support cloud breakout profiles.
Field |
Description |
---|---|
Name |
Enter a unique name for the cloud breakout settings. You can use alphanumeric characters and hyphens (-); the maximum length is 15 characters. |
Tunnel Type |
Select the type of overlay tunnel (IPSEC or GRE) used to break out the traffic to the cloud breakout node. |
IPsec Configuration Parameters | |
Domain Name |
Displays the domain name that is used to generate the fully qualified domain name (FQDN) for SD-WAN policies. The FQDN is used by the cloud security providers to identify the IPsec tunnels. The domain name is populated based on the customer domain name that you provided while onboarding the tenant (Administration Portal > Tenants > Add Tenant > Tenant Properties > Cloud Breakout Settings). Though the domain name is populated automatically, you can modify the domain name. |
Phase 1 |
In Phase 1, the SD-WAN branch site and the cloud breakout node establish a secure tunnel to negotiate the IPsec security associations (SAs). |
Encryption Type |
Select an encryption type for IPsec proposals:
|
Authentication Type |
Select an IPsec authentication algorithm for security association:
|
DH Group |
Specify the Diffie-Hellman (DH) group to match the IPsec encryption algorithm:
|
Phase 2 |
In Phase 2, the SD-WAN spoke site and the cloud breakout node negotiate the IPsec SAs for encrypting and authenticating the exchange of data. |
Encryption Type |
Select an encryption type for IPsec proposals.
|
Authentication Type |
Select an IPsec authentication algorithm for security association.
|
Protocol |
Displays the protocol as ESP (default). Encapsulating Security Payload (ESP) protocol provides a means to ensure privacy (encryption), source authentication and content integrity (authentication). Note:
You cannot edit the protocol. |
Primary Gateway | Configuration for the primary cloud breakout node. |
Link Type |
Select the preferred type of WAN link (MPLS or Internet) to be used for breaking out the traffic to the primary cloud breakout node. If a WAN link type that matches the preferred path is enabled for breakout, then that WAN link type is used for breakout traffic. |
IP Address/Hostname |
Enter the IPv4 address or host name of the primary cloud breakout node. Currently, Zscaler is the only cloud-based security platform supported. The IP address or hostname, is validated. If the IP address or host name is not reachable, the Host Unreachable message is displayed. |
Preshared Key |
Enter the preshared key used for IKE authentication with the primary cloud breakout node. The preshared key is provided by the Zscaler. The key that you enter is masked. |
Confirm Preshared Key |
Reenter the preshared key for confirmation. |
Secondary Gateway | Configuration for the secondary cloud breakout node. |
Link Type |
Select the preferred type of WAN link (MPLS or Internet) to be used for breaking out the traffic to the secondary cloud breakout node. If a WAN link type that matches the preferred path is enabled for breakout, then that WAN link type is used for breakout traffic. |
IP Address/Hostname |
Enter the IPv4 address or host name of the secondary cloud breakout node. Currently, Zscaler is the only cloud-based security platform supported. The IP address or hostname, is validated. If the IP address or host name is not reachable, the Host Unreachable message is displayed. |
Preshared Key |
Enter the preshared key used for IKE authentication with the secondary cloud breakout node. The preshared key is provided by the Zscaler. The key that you enter is masked. |
Confirm Preshared Key |
Reenter the preshared key for confirmation. |