Orchestrator User Guide 9.0.x 2020 08 03
Orchestrator User Guide 9.0.x 2020 08 03
Orchestrator User Guide 9.0.x 2020 08 03
Orchestrator 9.0.x
Last updated on August 3, 2020
200095-003
Silver Peak Unity Orchestrator User Guide
Trademark Notification
Silver Peak, the Silver Peak logo, and all Silver Peak product names, logos, and brands are trademarks or registered
trademarks of Silver Peak Systems, Inc. In the United States and/or other countries. All other product names, logos,
and brands are property of their respective owners.
http://www.silver-peak.com/support
Support
For product and technical support, contact Silver Peak Systems at either of the following:
We’re dedicated to continually improving the usability of our products and documentation.
If you have suggestions or feedback for our documentation, send an e-mail to [email protected].
If you have comments or feedback about the interface, send an e-mail to [email protected].
Contents
Getting Started 13
Unity Overlays 16
Business Intent Overlays 17
Overview 17
SD-WAN traffic to internal subnets 17
Building SD-WAN using these interfaces 18
Service Level objective 18
Link Bonding Policy 18
QoS, Security, & Optimization 19
Breakout Traffic to Internet & Cloud Services 19
Hub versus branch breakout settings 19
Preferred Policy Order and Available Policies 20
Deployment Profiles 21
Mapping Labels to Interfaces 21
LAN–side Configuration: DHCP 21
WAN–side Configuration 22
Definitions 24
A More Comprehensive Guide to Basic Deployments 25
Bridge Mode 25
Router Mode 26
Server Mode 31
Deployment — EdgeConnect HA 32
Enabling EdgeConnect HA Mode 32
IPSec over UDP Tunnel Configuration 32
VRRP Configuration 33
LAN-Side Monitoring 33
Interface Labels 34
Firewall Zones 35
Apply Overlays 36
Internet Traffic 37
IPSec Pre-shared Key Rotation 38
Failure Handling and Orchestrator Reachability 38
Hubs 39
Discovered Appliances 40
Preconfigure Appliances 41
Appliance Configuration Wizard 43
Licenses 46
Cloud Portal 47
SSL Certificates Tab 48
SSL CA Certificates Tab 49
SSL for SaaS Tab 50
NAT Pools 113
Getting Started
Orchestrator enables you to globally monitor performance and manage Silver Peak appliances, whether you're
configuring a WAN Optimization network (NX, VX, or VRX appliances) or an SD-WAN network (EC or EC-V appliances).
WAN labels refer to the service or connection type, such as MPLS, internet, or Verizon.
Deployment Profiles configure the interfaces and map the labels to them, to characterize the appliance.
Business Intent Overlays use the Labels specified in Deployment Profiles to define how traffic is routed and
optimized between sites. These overlays can specify preferred paths and can link bonding policies based on
application, VLAN, or subnet, independent of the brand and physical routing attributes of the underlay.
Including a new appliance into the Unity fabric consists of two basic steps:
1. Registration and discovery. After you Accept the discovered appliance, the Configuration Wizard opens.
2. Provisioning. Since the wizard prompts you to select profiles, it’s easiest to create these ahead of time.
Unity Overlays
These topics describe the pages related to deploying a WAN optimization network or a software-defined Wide Area
Network (SD-WAN).
From a configuration standpoint, an SD-WAN uses Business Intent Overlays (BIOs), whereas a WANop network does
not.
The overlay summary table is used for easy comparison of values between your various configured overlays. You
can select any link in the table and the Overlay Configuration dialog launches. You can also temporarily save your
changes before officially applying those changes to your overlay. The pending configuration updates are indicated by
an orange box around the edited item. Select Save and Apply Changes to Overlays when you are ready to apply
the changes and select Cancel if you want to delete the changes.
Overview
Orchestrator matches traffic to an ACL, progressing down the ordered, priority list of overlays until it identifies the
first one that matches. The matched traffic is then analyzed against the overlay's Internet Traffic configuration, and
forwarded within the fabric, or broken out to the internet based on the preferred policy order. If the software
determines that the traffic is not destined for the internet, it refers to the WAN Links & Bonding Policy
configuration and forwards traffic accordingly within the overlay.
You can begin to configure or modify a default overlay in the Overlay column. You can also select any icon on the
Business Intent Overlay page and the selected editor or dialog opens.
1. Select the name of the overlay. The Overlay Configuration window opens. If you want to edit the default
overlay or create a new overlay, enter the new name of the overlay in the Name field.
2. Select the Match field and choose the match criteria from the menu.
3. Select the Edit icon next to the ACL field. To apply default ACL's or create your own, select Add Rule in the
Associate ACL window.
Region
To view your associated region within your overlay, select the Regions icon in the Region column in the overlay
summary table. You can modify, remove, or edit overlay settings for a selected region by expanding the list at the
right-top of the Overlay Configuration window . For more information regarding Regions, refer to the help in the
tab.
Topology
Select the type of topology you want to apply to your overlay and network. You can choose between the following
types of topology:
Hub & Spoke: Hubs are used to build tunnels in Hub & Spoke networks, and to route traffic between regions.
If you choose Hub & Spoke, any appliance set as a hub will serve as a hub in any overlay applied to it. Hubs in
different regions mesh with each other to support regional routing. To configure hubs, select the Hubs link at
the top of the page.
Regional Mesh and Regional Hub & Spoke: To streamline the number of tunnels created between groups
of appliances that are geographically dispersed, you can assign appliances to Regions and select Regional
Mesh or Regional Hub & Spoke.
2. You can add and remove a region or view the status of each overlay within a selected region.
Cross Connect allows you to define tunnels built between each interface label. Each appliance has a
maximum number of tunnels that it can support, and using Cross Connect increases the number of tunnels
created.
Add Backup if Primary Are: Specifies when the system should use the Backup interfaces.
NOTE Primary interfaces may still be used to support the overall Service Level Objective.
Field Definition
High Availability For critical services that cannot accept any interruption at all. For example, call
center voice or critical VDI traffic.
Field Definition
High Quality For typical real-time services, such as VoIP or video conferencing. For example,
WebEx or business-quality Skype, VDI traffic.
High Throughput For anything where maximum speed is more important than quality. For
example, data replication, NFS, file transfers, etc.
High Efficiency For everything else. This option sends load balance information on multiple
links, with no FEC or overhead.
Field Definition
FW Zone Select the firewall zone you want to restrict traffic to from an overlay.
Boost Select True or False if you want to apply any purchased Boost to your overlay.
Peer Unavailable Option Select the following options you want your traffic to go if a peer is unavailable:
Use MPLS, Use Internet, Use LTE, Use Best Route, Drop.
Traffic Class Channels traffic to the desired queue based on the applied service. Select Best
Route or Drop.
LAN DSCP Select the DSCP you want to apply as a filter to the LAN interface.
WAN DSCP Select the DSCP you want to apply as a filter to the WAN interface.
When you choose Break Out Locally, confirm that any selected interface that is directly connected to the
Internet has Stateful Firewall specified in the deployment profile.
You can add services (such as Zscaler, Fortigate, or Palo Alto). The service requires a corresponding Internet-
breakout (Passthrough) tunnel for each appliance traffic to that service. To add a service, select the Edit icon
next to Available Policies.
The Default policy you configure for internet breakout is pushed to all appliances that use the selected
Overlay. However, you might want to push different breakout rules to your hubs.
Deployment Profiles
Instead of configuring each appliance separately, you can create various Deployment Profiles and provision a
device by applying the profile you want. For example, you can create a standard format for your branch.
TIP For a smoother workflow, complete the Configuration > DHCP Server tab before creating Deployment
Profiles.
You can use Deployment Profiles to simplify provisioning, whether or not you choose to create and use Business
Intent Overlays.
NOTE You cannot edit IP/Mask fields because they are appliance-specific.
On the WAN side, labels identify the service, such as MPLS or Internet.
If you edit a label, that change propagates appropriately. For example, it renames tunnels that use that
labeled interface.
The global defaults are set in Configuration > DHCP Server and pre-populate this page. The other choices
are No DHCP and having the appliance act as a DHCP Relay.
Enter the LAN interface from the dropdown. Click +IP to add a specific IP address.
The firewall zones you have already configured will be in the list under FW Zone. Select the FW zone you want
to apply to the LAN you are deploying.
Select the configured segment you want to apply from the segment dropdown.
NOTE You can only change the segment being applied for the LAN interfaces.
WAN–side Configuration
Select the WAN-side label you want to apply to this deployment. Click the edit icon to add a new interface or
delete a previously configured interface.
Firewall Zone: Zone-based firewalls are created on the Orchestrator. A zone is applied to an Interface. By
default, traffic is allowed between interfaces labeled with the same zone. Any traffic between interfaces with
different zones is dropped. Users can create exception rules (Security Policies) to allow traffic between
interfaces with different zones. The firewall zones you have already configured will be in the list under
FW Zone. Select the FW zone you want to apply to the WAN you are deploying.
Harden
For traffic inbound from the WAN, the appliance accepts only IPSec tunnel packets that terminate on a
Silver Peak appliance.
For traffic outbound to the WAN, the appliance only allows IPSec tunnel packets and management
traffic that terminate on a Silver Peak appliance.
NAT Settings: When using NAT, use in-line Router mode to ensure that addressing works properly. That means you
configure paired single or dual WAN and LAN interfaces on the appliance. Select one of the following options:
If the appliance is not behind a NAT-ed interface, select Not behind NAT.
Enter an IP address to assign a destination IP for tunnels being built from the network to this WAN interface.
Total Outbound bandwidth is licensed by model. It's the same as max system bandwidth.
To enter values for shaping inbound traffic, which is optional, you must first select Shape Inbound Traffic.
For additional bandwidth, you can purchase Plus, and then select it here for this profile.
If you've purchased a reserve of Boost for your network, you can allocate a portion of it in a Deployment
Profile. You can also direct allocations to specific types of traffic in the Business Intent Overlays.
To view how you've distributed Plus and Boost, view the Configuration > Licenses tab.
Select the appropriate licensing you have applied to your EC appliance from the menu. The licenses will only
display depending on the licenses you have for that particular account. You can select the following licensing
options:
Mini
Base
Base + Plus
50 Mbps
200 Mbps
500 Mbps
1 Gbps
2 Gbps
Unlimited
NOTE You must have the correct hardware to support the license selected.
BONDING
When using an NX or EC appliance with four 1Gbps Ethernet ports, you can bond like pairs into a single 2Gbps
port with one IP address. For example, wan0 plus wan1 bond to form bwan0. This increases throughput on a
very high-end appliance and/or provides interface-level redundancy.
For bonding on a virtual appliance, you would need configure the host instead of the appliance. For example,
on a VMware ESXi host, you would configure NIC teaming to get the equivalent of etherchannel bonding.
Whether you use a physical or a virtual appliance, etherchannel must also be configured on the directly
connected switch/router. Refer to the Silver Peak user documentation.
Definitions
DHCP Server
Field Name Description
Default gateway When selected, indicates the default gateway is being used.
Default lease, Specify, in hours, how long an interface can keep a DHCP–
Maximum lease assigned IP address.
DNS server(s) Specifies the associated Domain Name System server(s).
Exclude first N addresses Specifies how many IP addresses are not available at the
beginning of the subnet's range.
Exclude last N addresses Specifies how many IP addresses are not available at the end of
the subnet's range.
NetBIOS name server(s) Used for Windows (SMB) type sharing and messaging. It resolves
the names when you are mapping a drive or connecting to a
printer.
NetBIOS node type The NetBIOS node type of a networked computer relates to how
it resolves NetBIOS names to IP addresses. There are four node
types:
B-node = 0x01 Broadcast
P-node = 0x02 Peer (WINS only)
M-node = 0x04 Mixed (broadcast, then WINS)
H-node = 0x08 Hybrid (WINS, then broadcast)
DHCP/BOOTP Relay
Field Name Description
Destination DHCP/BOOTP Server The IP address of the DHCP server assigning the IP addresses.
Enable Option 82 When selected, inserts additional information into the packet
header to identify the client's point of attachment.
Option 82 Policy Tells the relay what to do with the hex string it receives. The
choices are append, replace, forward, or discard.
It describes common scenarios, considerations when selecting a deployment, redirection concerns, and some
adaptations.
For detailed deployment examples, refer to the Silver Peak website for various deployment guides.
In Bridge Mode and in Router Mode, you can provide security on any WAN-side interface by hardening the
interface. This means:
For traffic inbound from the WAN, the appliance accepts only IPSec tunnel packets.
For traffic outbound to the WAN, the appliance only allows IPSec tunnel packets and management traffic.
Bridge Mode
Single WAN-side Router
In this deployment, the appliance is in-line between a single WAN router and a single LAN-side switch.
2 separate service providers or WAN services (MPLS, IPsec VPN, MetroEthernet, etc.)
A virtual appliance has no fail-to-wire, so you would need a redundant network path to maintain connectivity if
the appliance fails.
If your LAN destination is behind a router or L3 switch, you need to add a LAN-side route (a LAN next-hop).
If the appliance is on a VLAN trunk, then you need to configure VLANs on the Silver Peak so that the appliance
can tag traffic with the appropriate VLAN tag.
Router Mode
There are four options to consider:
For best performance, visibility, and control, Silver Peak recommends Options #1 and #2, which use separate
LAN and WAN interfaces. And when using NAT, use Options #1 or #2 to ensure that addressing works properly.
1. You can put Silver Peak in-path. In this case, if there is a failure, you need other redundant paths for high
availability.
2. You can put Silver Peak out-of-path. You can redirect LAN-side traffic and WAN-side traffic from a router or
L3 switch to the corresponding Silverpeak interface, using WCCP or PBR (Policy-Based Routing).
To use this deployment with a single router that has only one interface, you could use multiple VLANs.
This deployment redirects traffic from two LAN interfaces to two WAN interfaces on a single Silver Peak appliance.
2 separate service providers or WAN services (MPLS, IPsec VPN, MetroEthernet, etc.)
1. You can put Silverpeak in-path. In this case, if there is a failure, you need other redundant paths for high
availability.
2. You can put Silverpeak out-of-path. You can redirect LAN-side traffic and WAN-side traffic from a router or L3
switch to the corresponding Silverpeak interface, using WCCP or PBR (Policy-Based Routing).
This deployment redirects traffic from a single router (or L3 switch) to a single subnet on the Silver Peak appliance.
When using two Silver Peaks at the same site, this is also the most common deployment for high availability
(redundancy) and load balancing.
For better performance, control, and visibility, Silver Peak recommends Router mode Option #1 instead of
this option.
This deployment redirects traffic from two routers to two interfaces on a single Silver Peak appliance.
2 separate service providers or WAN services (MPLS, IPsec VPN, MetroEthernet, etc.)
For better performance, control, and visibility, Silver Peak recommends Router mode Option #2 instead of
this option.
Do you want your traffic to be in-path or out-of-path? This mode supports both deployments. In-path
deployment offers much simpler configuration.
Does your router support VRRP, WCCP, or PBR? If so, you may want to consider out-of-path Router mode
deployment. You can set up more complex configurations, which offer load balancing and high availability.
In the rare case when you need to send inbound WAN traffic to a router other than the WAN next-hop router,
use LAN-side routes.
Whenever you place an appliance out-of-path, you must redirect traffic from the client to the appliance.
There are three methods for redirecting outbound packets from the client to the appliance (known as LAN-side
redirection, or outbound redirection):
PBR (Policy-Based Routing) — configured on the router. No other special configuration required on the
appliance. This is also known as FBR (Filter-Based Forwarding).
If you want to deploy two Silver Peaks at the site, for redundancy or load balancing, then you also need to use
VRRP (Virtual Router Redundancy Protocol).
WCCP (Web Cache Communication Protocol) — configured on both the router and the Silver Peak appliance.
You can also use WCCP for redundancy and load balancing.
Host routing — the server/end station has a default or subnet-based static route that points to the Silver
Peak appliance as its next hop. Host routing is the preferred method when a virtual appliance is using a single
interface, mgmt0, for datapath traffic (also known as Server Mode).
To ensure end-to-end connectivity in case of appliance failure, consider using VRRP between the appliance
and a router, or the appliance and another redundant Silver Peak.
How you plan to optimize traffic also affects whether or not you also need inbound redirection from the WAN
router (known as WAN-side redirection):
If you use subnet sharing (which relies on advertising local subnets between Silver Peak appliances) or
route policies (which specify destination IP addresses), then you only need LAN-side redirection.
If, instead, you rely on TCP-based or IP-based auto-optimization (which relies on initial handshaking outside
a tunnel), then you must also set up inbound and outbound redirection on the WAN router.
For TCP flows to be optimized, both directions must travel through the same client and server appliances. If
the TCP flows are asymmetric, you need to configure flow redirection among local appliances.
A tunnel must exist before auto-optimization can proceed. There are three options for tunnel creation:
If you enable auto-tunnel, then the initial TCP-based or IP-based handshaking creates the tunnel. That
means that the appropriate LAN-side and WAN-side redirection must be in place.
You can let the Initial Configuration Wizard create the tunnel to the remote appliance.
Server Mode
This mode uses the mgmt0 interface for management and datapath traffic.
You can create additional data-plane Layer 3 interfaces, to use as tunnel endpoints.
Deployment — EdgeConnect HA
The EdgeConnect HA (High Availability) mode is a high availability cluster configuration that provides appliance
redundancy by pairing two EdgeConnect devices together.
When a deployment profile configures two EdgeConnect appliances in EdgeConnect HA mode the resilient cluster
acts as a single logical system. It extends the robust SD-WAN multipathing capabilities such as Business Intent
Overlays seamlessly across the two devices as if they were one entity.
With EdgeConnect HA mode a WAN uplink is physically plugged into a single one of the EdgeConnect appliances but
is available to both in the cluster. For WAN connections that perform NAT (for example, a consumer-grade
Broadband Internet connection), it means that only a single Public IP needs to be provisioned in order for both the
EdgeConnect devices in the EdgeConnect HA cluster to be able to build Business Intent Overlays using that transport
resource.
3. Configure the interfaces (LAN and WAN–side) on both EdgeConnect devices to reflect the WAN connections
that are plugged into each one of the respective appliances.
NOTE Both EdgeConnect devices will be able to leverage all WAN connections regardless of which chassis
they are physically plugged into. It is however important to match the deployment profile interface
configuration to the actual chassis the WAN connection is physically, directly connected to.
4. Select the physical ports on the respective EdgeConnect appliances that you will connect to each other using
an Ethernet cable (RJ-45 twisted pair or SR optical fiber)
NOTE You can choose any LAN or WAN port combination for this HA Link that is available on the respective
EdgeConnect chassis. You must match the media type and speed for both ends of the HA link (for example, 1
Gigabit-Ethernet RJ-45 to RJ-45 or 10 Gigabit-Ethernet multimode fiber LC-connector-to-LC-connector). Also
please note that you cannot use MGMT ports for the HA Link; only LAN or WAN ports.
Please see the Overlay Tunnel Settings in the Orchestrator, under the Orchestrator Overlay Manager and Tunnel
Settings menu.
NOTE If you are deploying a network with EdgeConnect appliances running VXOA 8.1.6 or higher and Orchestrator 8.2
or higher, the tunnel type is already set to IPSec over UDP mode by default.
VRRP Configuration
Typically, in a branch site deployment, you will choose to configure the cluster with a VRRP protocol and assign a VIP
(virtual IP) address to the cluster.
Set the VRRP priority of the preferred LAN-side Primary EdgeConnect to 128.
LAN-Side Monitoring
The IP SLA feature should be configured to monitor the LAN-side VRRP state in order to automatically disable subnet
sharing from that appliance in the case of a LAN link failure.
Interface Labels
Configuration > Overlays > Interface Labels
Use this page to create labels for the WAN and LAN interfaces.
You can also use interface labels to end a connection between tunnels.
Select the Edit icon and the Interface Label Configuration window pops up.
Enter the name of the interface label name of the tunnels to be avoided in a selected topology.
Firewall Zones
Configuration > Overlays > Firewall Zones
By default, traffic is allowed between interfaces labeled with the same zone.
Users can create exception rules (Security Policies) to allow or deny traffic between interfaces within the same or
different zones.
NOTE "Default" will always be the initial default zone. You cannot have another zone named "Default".
NOTE The name of your firewall cannot exceed 16 characters and cannot contain any special characters. It can only
contain alphanumeric characters and underscores only.
Apply Overlays
Use this page to add or remove overlays from appliances. If you select Edit Overlays, you will be redirected to the
Business Intent Overlay tab for further customization. You can also view the status of the overlays if you select
View Status.
Internet Traffic
Internet Traffic is defined as any traffic the does NOT match the internal subnets listed on this page.
1. Inactive appliances: When appliances are inactive, they exist in the Orchestrator, but don't have tunnels
configured to any active appliances.
2. Temporary unreachability: Temporary unreachability issues occur in cases where an EdgeConnect
appliance reboots or if there is a link or communication failure. In this case, Orchestrator won't activate the
new key material until all active appliances are reachable and have received the new key material. If the
appliance is unreachable for a period longer than the key rotation interval, it will be treated as an inactive
appliance.
Re-authorization: Inactive appliances that become active at a later point in time will be authorized to receive the
current key material. Only then will they be able to download configurations and build tunnels.
Hubs
Configuration > Overlays > Hubs
In this tab, you can add, remove, and associate hubs to a specified region within the Regional Mesh or Regional Hub-
and-Spoke topologies configured in the Business Intent Overlay tab.
1. Enter the name of the hub you want to add from the menu.
To delete a hub, select the X icon next to the hub you want to delete.
Discovered Appliances
This page lists each appliance that Orchestrator discovers.
To enable Orchestrator to manage an appliance after you verify its credentials, click Approve.
If the appliance doesn't belong in your network, click Deny. If you want to include it later, click Show Denied
Devices, locate it in the table, and click Approve.
As a security measure to prevent unauthorized management of your network, any Orchestrator with your
Account Name and Account Key must be approved by the originally deployed Orchestrator.
Preconfigure Appliances
You can use this page to prepopulate flat data files that are matched with appliances as you add them to your
network.
The information in the files is a combination of items found in the Appliance Configuration Wizard, along with site-
specific information (such as BGP, OSPF, IP SLA rules, VRRP, interfaces, and addressing).
You can create a new file or clone (and rename) an existing one. Make any changes with the built-in editor.
After the appliance is discovered and approved, software upgrade and configuration push are done automatically.
New or Clone
Field Definition
Use this wizard to set up a newly added appliance or to reconfigure an appliance that’s already in your network.
NOTE Orchestrator assumes that you'll be pushing many of the same configuration items to each appliance. To that
end, it surveys the templates and Overlay prerequisite items and displays the Recommended Configuration list,
showing what comprehensive items you have and have not yet configured.
Licenses
This page lists each appliance's make, model, license terms, and registered services. You can also revoke or regrant
a metered license to/from an appliance or change the EdgeConnect (EC) license settings and RMA your device.
Complete the following steps to configure or modify your EC license.
1. Select the Edit icon next to a selected appliance in the table. The Configure EdgeConnect License window
opens.
3. Select the following EC size options from the menu: Mini, Base, Base + Plus, 50 Mbps, 200 Mbps, 500
Mbps, 1 Gbps, 2 Gbps, and Unlimited.
4. Check Enable Boost if you want to enable the boost you have purchased with your license.
5. Enter the amount of boost you have applied to your EC.
Cloud Portal
Configuration> [Overlays > Licensing] Cloud Portal
Orchestrator > [Orchestrator Server > Licensing] Cloud Portal
The Cloud Portal is used to register cloud-based features and services, such as SaaS optimization and
EdgeConnect.
When you purchase one of these services, Silver Peak sends you an Account Name and instructions to
obtain your Account Key.You will use these to register your appliance(s).
The cloud portal populates the Contact field from information included in your purchase order.
Use of these services requires that your appliance(s) can access the cloud portal via the Internet.
This report summarizes the SSL certificates installed on appliances for decrypting non-SaaS traffic.
Silver Peak decrypts SSL data using the configured certificates and keys, optimizes the data, and transmits
data over an IPSec tunnel. The peer Silver Peak appliance uses configured SSL certificates to re-encrypt data
before transmitting.
Peers that exchange and optimize SSL traffic must use the same certificate and key.
For the SSL certificates to function, the following must also be true:
The tunnels are in IPsec or IPsec UDP mode for both directions of traffic.
In the Optimization Policy, TCP acceleration and SSL acceleration are enabled.
TIP For a historical matrix of Silver Peak security algorithms, click here.
If the enterprise certificate that you used for signing substitute certificates is subordinate to higher level Certificate
Authorities (CA), then you must add those CA certificates. If the browser can't validate up the chain to the root CA, it
will warn you that it can't trust the certificate.
TIP For a historical matrix of Silver Peak security algorithms, click here.
To fully compress SSL traffic for a SaaS service, the appliance must decrypt it and then re-encrypt it.
To do so, the appliance generates a substitute certificate that must then be signed by a Certificate Authority (CA).
There are two possible signers:
The appliance generates it locally, and each certificate is unique. This is an ideal option for Proof of Concept
(POC) and when compliance is not a big concern.
To avoid browser warnings, follow up by importing the certificate into the browser from the client-side
appliance.
If you already have a subordinate CA certificate (for example, an SSL proxy), you can upload it to Orchestrator
and push it out to the appliances. If you need a copy of it later, just download it from here.
If this substitute certificate is subordinate to a root CA certificate, then also install the higher-level SSL CA
certificates (into the SSL CA Certificates template) so that the browser can validate up the chain to the root
CA.
If you don't already have a subordinate CA certificate, you can access any appliance's Configuration > SaaS
Optimization page and generate a Certificate Signing Request (CSR).
TIP For a historical matrix of Silver Peak security algorithms, click here.
DHCP Failover
Configure the following settings to apply to your DHCP failover servers.
1. Check the DHCP Failover box to enable the DHCP Failover feature.
2. Select whether you are configuring the failover settings for either the Primary or Secondary server.
This tab displays the DHCP failover peer states of each server for troubleshooting purposes.
Regions
Use this page to add or remove regions from the SD-WAN fabric and configure regional routing. The regions within
your SD-WAN fabric can represent geographical regions, administrative regions, or a set of sites in the network that
have common business goals.
Regional Routing
Regional routing when enabled, allows you to manage your SD-WAN fabric by regions. It involves intra-region and
inter-region route distribution across the SD-WAN fabric. The regions within your network can represent
geographical regions, administrative regions, or a set of sites in the network that have common business goals. You
can provide different Business Intent Overlay for each region by enabling regional routing and customizing BIOs per
region. The following diagrams show examples of different regional network topologies you can build by enabling
regional routing.
You can enable regional routing within your Orchestrator UI. Navigate to the Regional Routing window and select the
Enable Regional Routing icon in the header and move the toggle.
View Status
Select View Status to view the status of the added or updated appliances to regions.
Edit Regions
Complete the following steps to add a region or edit existing regions that you want to add to your overlays.
3. Enter the name of your new region in the Region Configuration window.
1. Select the Edit icon next to the region you want to edit.
Navigate to the Business Intent Overlay tab to make further customizations to your regions and overlays.
Routing Segmentation
Use this tab to enable and disable Routing Segmentation across your network and apply unique configuration to your
segments. Routing Segmentation allows for the configuration of VRF (Virtual Routing and Forwarding) style layer-3
segmentation in your SD-WAN deployments. Please note the following prior to configuring routing segmentation in
Orchestrator.
You must upgrade all EdgeConnect appliances and Orchestrator to version 9.0.
If a new appliance has been added to your network or if an existing appliance has been replaced, you need to
upgrade the appliance software to the appropriate version running in the network.
After upgrading, segmentation is disabled by default; You will have to enable in this tab.
Regardless if segmentation is enabled or disabled, a Default segment is automatically created when you
upgrade to 9.0.
Once you have enabled routing segmentation, all existing configuration across your network is associated
with the Default segment.
Before adding a segment, you must enable segmentation by moving the toggle at the top of the page. If Routing
Segmentation is not enabled, you cannot make any modifications to the Default segment or add any new segments.
To add a new segment, click +Add Segment and enter a Segment Name. You can make further specifications by
clicking the edit icon or selecting the +Add icon in any of the columns in the table. Use the following to make further
specifications to your segments:
NOTE Inter-Segment Routing & DNAT and Inter-Segment Routing & SNAT are only applicable if you are using
different segments.
Segment Configuration
You can uniquely configure your segments by specifying the following on this page:
Inter-Segment SNAT
Loopback
The overlays are arranged by priority defined in the Match field in the Overlay in the BIO page. You can specify if
you want to include or skip the segment for each overlay by clicking Include or Skip icon in the table cell. By default,
all overlays are included for all configured segments.
If you want to skip an overlay, click the enabled Include icon and Skip appears grayed-out. The segment will not be
applied to the specified overlay. Click Skip again to include the segment and it will turn back to green. If an overlay is
set to Skip, traffic will not match that overlay and moves to the next prioritized BIO. Additionally, if no BIOs match,
traffic is dropped.
TIP If overlay is set to Skip, Flow Details in the Flows tab displays the list of skipped overlays.
Firewall Zones
Use this tab to enable and associate firewall zones to your segments. With segmentation enabled, firewall zone
security policies are orchestrated and there is no need for Firewall Security Templates.
Before you begin Firewall Zone configuration, please note the following:
Create a new security templates group with the new firewall zoning policies that only includes zones
associated with LAN and WAN interfaces
Delete all rules in your previous security policy template in the Apply Template Group tab
Ensure you have selected the Replace option in the previous security policy template
Save the previously used security policy template. This deletes the security policy rules on your appliances
Complete the following steps to set a rule or policy to your firewall zones within your segment.
1. Select the cell of the segment you want to update in the Matrix View. The From Zone To Zone window
opens.
NOTE If you are already in Table View, click Add Rule.
2. Enter the Source Segment in the Source Segment field. This is the segment that the firewall is starting from.
3. Enter the Destination Segment in the Destination Segment field. This is the segment where the firewall is
going to.
Field Description
Match Click the edit icon in this column to modify and create the match criteria for the zones.
Criteria
Action Select Allow or Deny to determine if this zone will apply the selected segment.
Logging Determines the filter for the zone-based firewall drop logging levels. You can select one of the
following levels to apply: None, Emergency, Alert, Critical, Error, Warning, Notice, Info, or
Debug.
NOTE Firewall zones are unique to each segment. For example, the default zone in Segment X will not be the same
default zone in Segment Y.
Field Description
Matches Destination The IP address that matches the destination segment IP address.
IP
Send to Segment The name of the segment the packets are translated to from the matched destination IP
address.
Translated The IP address of the DNAT IP address when the segment is translated.
Destination
NOTE The default setting for SNAT is enabled for Inter-Segment traffic.
Field Description
Source The name of the segment that the SNAT is starting from.
Loopback
Click +Add and you are redirected to the Loopback Orchestration tab. Select the segment you want to apply a
loopback interface from the table and then click +Add Loopback Interface.
Appliances
This column represents the amount of appliances the selected segment is enabled on.
Deleting a Segment
WARNING Segmentation involves drastic changes to your physical network. Deleting segments can be service
affecting. Please read this section carefully prior to deleting any of your segments.
Deleting a segment removes all the segmentation configuration from all the appliances within your network. When
you delete a segment, Orchestrator automatically deletes the following:
The following configuration is disassociated from the segment and you need to manually delete the following:
To delete a segment, click the X in the last column in the table. A Delete Routing Segment warning appears. Click
Delete or Cancel.
Disabling a Segment
To disable routing segmentation across the network, you need to delete all the segments in the network except
default segment (which cannot be deleted). Refer to the section above. After all the segments are deleted, navigate
to this tab and move the toggle at the top of the page to disable.
Management Services
In this tab, Management services can be configured irrespective if routing segmentation is enabled or disabled.
When routing segmentation is disabled, all the interfaces are available for configuration. When routing segmentation
is enabled, based on the selected interface, management service is functional in the associated segment.
NOTE Management Services will still function if Routing Segmentation is not enabled on your Orchestrator. If this is
the case, you will only be able to use the default configuration: Any interface with the Default segment.
Field Description
Source IP The IP address of the interface being used by the selected management service.
Address
Segment The name of the associated segment that is applied to the management service when your
source IP address is selected.
Click the Any field in the Source IP Address column and a dropdown list displays all the interfaces configured on
your appliance. Once a source IP address is selected, the Segment column automatically updates and provides the
associated segment.
Refer to the table below for the management service and its associated behavior.
Service Behavior
HTTP(S) These services use the selected interface’s Interface for the
Cloud Portal Source IP Address as the source address to establish
Orchestrator reachability and WebSocket connections to the Cloud Portal
SaaS Opt and Orchestrator. HTTP/HTTPS uses the Interface for the
Source IP Address for connection as well.
If routing segmentation is enabled, SaaS Opt packets are
sent from the Interface for the Source IP Address
segment interface.
NTP Each of these management services uses Interface for the Source IP
NetFlow Address as the source IP address. The source interface configured from
SNMP the management route table is ignored if the Interface for Source IP
Address is not “Any”.
SSH
Syslog
Field Description
Appliance The name of the appliance that the DNAT exception is being applied to.
Name
Matches The IP address that matches the destination segment IP address, prior to DNAT. The IP address
Destination IP is included in the defined policy match criteria.
Send to The name of the segment the packets are translated to from the matched destination IP address.
Segment This is in included in the set criteria.
Translated The IP address of the DNAT IP address when the segment is translated.
Destination
INFO This tab only pushes the inter-segment DNAT exceptions to one appliance, selected in the left toolbar.
NOTE The default setting for SNAT is enabled for Inter-Segment traffic.
Field Description
Source The name of the segment that the SNAT is starting from.
Destination The name of the segment that SNAT is translated and going to.
BGP Tab
In this tab, you can configure BGP (Border Gateway Protocol) for appliances and add their BGP peers (also known
as BGP "neighbors"). You can also add and modify peer-based advertisement and redistribution rules. Silver Peak
has the following behaviors relative to communities:
Although Silver Peak does not configure BGP communities, it propagates existing communities.
Appliances advertise communities to remote peers, if learned from Silver Peak peers.
All BGP-learned subnets also appear in the appliance Routes table, displayed on the Routes configuration
page. In addition, any AS Path or BGP Community information learned with a particular subnet will also be
displayed with that subnet entry in the table.
BGP route updates are not refreshed unless the peer specifically asks for it. To update the BGP routes, go to
the Peers table and select Soft Reset in the desired row.
Field Description
Field Description
Local Preference The local preference is the first attribute a Cisco router looks at
to determine which route towards a certain destination is the
“best” one. This value is not exchanged between external BGP
routers. Local preference is a discretionary BGP attribute.
Default value is 100. The path with the highest local preference
is preferred.
MED Multi Exit Discriminator. When BGP chooses the best route to
reach a certain destination, it first looks at the local preference
and AS path attributes. When the local preference and AS path
length are the same for two or more routes towards a certain
prefix, the Multi Exit Discriminator (MED) attribute is chosen.
With MED, the lowest value is preferred.
Field Description
To edit a BGP, select the edit icon in the right column of the table.
Use this window to enable BGP for your appliances and to configure BGP peers. Complete the following steps to start
BGP configuration.
Field Description
Autonomous System Number (ASN) Configure this number as needed for your network.
Router ID This router identifier is the IPv4 address by which the remote peer can
identify this appliance for purposes of BGP.
Graceful Restart Enable receiver-side graceful restart capability. Silver Peak retains
routes learned from the peer and continues to use it for
forwarding (if possible) if/when a BGP peer goes down. The
retained routes are considered stale routes and will be deleted
and replaced with newly received routes.
Max Restart Time Specifies the maximum
time (in seconds) to
wait for a Graceful
Restart capable peer to
come back after a peer
restart or peer session
failure.
Stale Path Specifies maximum
time (in seconds)
following a peer restart
that SP waits before
removing stale routes
associated with that
peer.
AS Path Propagate Check to enable. This will provide the learned path from an external
prepend between a remote BGP site to local BGP peers.
To add a BGP peer, select Add. The Add Peer window opens.
Add Peer
Complete the following fields to add a BGP peer.
Field Definition
Field Definition
Outbound Route Map The route map for outbound traffic. Select the edit icon to load or
configure your outbound route maps.
Keep Alive Timer This specifies the interval, in seconds, between keep alive signals to a
peer.
Hold Timer The specified time how to wait before dropping the session when the
reachability to a peer is lost.
Enable MD5 Password Select the Enable MD5 Password to add a password to authenticate
the TCP session with the peer.
The number of BGP route maps and rules per route map is specified below:
Use this window to apply your route maps. Route maps can be redistributed between various dynamic routing
protocols.
You can also Add a Map, Delete a Map, Rename a Map, or Clone Map.
You can specify the following fields for each inbound or outbound route map:
Inbound
Source Protocol
Outbound
Match Criteria
BGP Prefix
BGP Communities
OSPF Prefix
OSPF Tag
SD-WAN (BGP) Prefix
BGP Communities
SD-WAN (OSPF) Prefix
OSPF Tag
Set Actions
ASN Prepend Count The original route path that was used.
The following table describes the redistribution commands supported in the BGP routing protocol.
VTI
Complete the following steps to configure a VTI with an associated tunnel in Orchestrator.
2. The Add Interface window appears. Complete the following fields with the appropriate information.
Field Definition
Boost
This page shows you various details regarding your boost. You can purchase additional boost for the traffic within
your network. You can also search for the boost used per appliance by the hour or specify a time frame within the
Range field at the top of the page.
The following table shows the fields and definitions regarding your boost.
Field Definition
Appliance The name of the appliance you are applying boost to.
% Time Insufficient Boost The percent of time the appliance did not have enough boost configured to
boost the traffic.
Minutes Insufficient Boost The amount of time (in minutes) the appliance did not have enough boost
configured to boost the traffic.
Configured Boost (Kbps) The amount of boost configured on the appliance.
Average Boost Bytes The average boost in bytes.
Trends A graph displaying the trends of your boost.
1. Select the appliance you want to add more or less boost to from the table in the Boost tab.
3. If you select Set to this Value, enter the exact amount in the field.
Deployment Tab
This page summarizes the appliance Deployment settings in either Summary or Details view.
Summary View
Field Definition
InLine Router Uses separate LAN and WAN interfaces to route data traffic.
Bridge Uses a virtual interface, bvi, created by binding the WAN and
LAN interfaces.
Server Both management and data traffic use the mgmt0 interface.
Interfaces Tab
The Interfaces tab lists the appliance interfaces.
Please refer to the following table for the Interfaces field descriptions.
Speed/Duplex should never display as half duplex after auto-negotiation. If it does, the appliance will
experience performance issues and dropped connections. To resolve, check the cabling on the appliance and
the ports on the adjacent switch/router.
To directly change interface parameters for a particular appliance, select Edit. It takes you to the Appliance
Manager's Configuration > Interfaces page.
To change the IP address for a lan or wan interface, either use the Appliance Manager's Configuration >
Deployment page or the CLI (Command Line Interface).
To change the IP address for mgmt0, either use the Appliance Manager's Administration > Management
IP/Hostname page or the CLI.
Terminology
Interface Description
Routes Tab
Each appliance builds a routes table from one of the three following ways: entries added automatically by the
system, added manually by a user, or learned from a routing protocol: BGP (Border Gateway Protocol) or OSPF
(Open Shortest Path First). When two appliances are connected by a tunnel, they exchange this information and use
it to route traffic.
Route Maps
Orchestrator supports the ability to apply route maps to various routing protocols. This provides more control to
import and export routes to and from the SD-WAN fabric. You can configure your route maps to modify information
of a route through ACLs and applying tags by using commands. Each route map has a match command and set
command. The match command verifies the attributes of the original route the protocol supports and the set
command modifies information that is redistributed into the target protocol. Silver Peak supports route mapping for
the following protocols and the direction of those protocols:
The following table lists the routing protocols and the associated commands supported.
You can filter the type of route by selecting All, Local / Static, SD-WAN Fabric, BGP, and OSPF routes. You can also
import or export subnets to a .csv file.
Filter by Subnet
Filter by subnet is a filtering tool that can be used to filter all existing routes and the results are populated in the
Routes tab.
A Very Large Query Response pop-up will display if the number of the routes filtered exceeds 500,000. You can
filter by subnet, cancel, or continue waiting to help mitigate this issue.
NOTE If the number of the routes filtered is greater than 500,000 the following pop-up will display.
You can filter by subnet, cancel, or continue waiting to help mitigate the above issue.
Segment
The segments you have configured in the Routing Segmentation tab are listed in the Segment field. Once you specify
the segment, the Routes table displays only the routes belonging to that segment.
Field Definition
Field Definition
Each Route table has a lookup criteria that is used in the following order:
Route Table admin distance of the source protocol (lower the better)
If there are two or more routes that match all the above criteria, then use multiple routes.
You can configure the admin distance by using the Admin Distance template in the Templates tab. The default
settings in this template determine the most reliable route with the use of admin distance. See the table below for
the various default admin distances per route type.
Local 1
SD-WAN Fabric - OSPF 15
eBGP 20
OSPF 110
iBGP 200
Navigate to the BGP and OSPF tabs for more information to apply or configure your route maps.
Import
Import allows you to import a CSV file (Comma Separate Values) into a pair of appliances used at the same
site. Before you import, you must remove the header row and save the files on your computer. Complete the
following steps to begin your import.
1. Select the appliance you want to upload the routes to.
The following table is an example of what the CSV file will look like before you import a file.
Subnet Mask Metric Is Adv to SP Adv to BGP Next Adv to OSPF Interface
Length Local Peers Peers Hop Neighbors
Name
10.1.0.0 16 50 TRUE TRUE FALSE 10.1.0.1 FALSE lan0
NOTE You can limit the file to only the Subnet, Mask Length, and Metric columns. Orchestrator then uses
the default values for the six unlisted columns.
This tab manages OSPF (Open Shortest Path First) on LAN and WAN interfaces.
OSPF learns routes from routing peers, and then subnet shares them with Silver Peak peers and/or BGP neighbors.
A route tag is applied to a route to better identify the source of the network it originated from. It is primarily used to
filter routes from being redistributed in a routing loop.
Field Definition
Select the edit icon in the OSPF table to edit and enable OSPF.
Use this page to manage OSPF (Open Shortest Path First) on LAN and WAN interfaces.
This protocol learns routes from routing peers, and then subnet shares them with Silver Peak peers and/or BGP
neighbors.
Field Definition
Enable OSPF When enabled, the appliance has access to use the OSPF protocol.
Router ID The IPv4 address of the router that the remote peer uses to identify the
appliance for purposes of OSPF.
Redistribute routes to OSPF Redistributing routes into OSPF from other routing protocols or from static
will cause these routes to become OSPF external routes. Select the edit icon
to the left of this field and select the OSPF route redistribution maps you
would like to select.
To configure or modify an OSPF route map, select the edit icon next to the Redistribute route to OSPF field.
Add Interface
Complete the following fields to add an interface to OSPF.
Field Definition
Field Definition
Admin Status Indicates whether the interface is set to admin UP or
DOWN.
Hello Interval Specifies the length of time, in seconds, between the hello
packets that a router sends on an OSPF interface.
Dead Interval Number of seconds that a router's Hello packets have not
been seen before its neighbors declare the OSPF router
down.
Transmit Delay Number of seconds required to transmit a link state update
packet. Valid values are 1 to 65535.
Retransmit Interval The amount of time (in seconds) the router will wait to send
retransmissions if the router receives no acknowledgment.
Authentication None: No authentication
Text: Simple password authentication allows a password
(key) to be configured per area.
MD5: Message Digest authentication is a cryptographic
authentication. A key (password) and key-id are
configured on each router. The router uses an algorithm
based on the OSPF packet, the key, and the key-id to
generate a "message digest" that gets appended to the
packet.
Comment Any information you want to include for your own use.
These policies have match and set criterias. A route map is applied to the routes during the route redistribution
between routing protocols and allows for filtering routes or modifying route attributes.
The number of OSPF route maps and rules per route map is specified below:
You can Add a Map, Delete a Map, Rename a Map, or Clone Map.
You can also add various rules to your route map to further specify your routing protocols by selecting Add Rule.
You can deny or permit or match and filter your routes.
You can specify the rules using the following fields for each OSPF route map:
Local/Static Prefix
BGP Prefix
BGP Communities
Multicast
Orchestrator supports multicast routing, a method of sending data from a single IP address to a larger group of
recipients. This is only supported in Inline Router mode. There are three different ways you can display the status of
multicast: Interfaces, Neighbors, and Routes.
Interfaces
1. Select the Interface field and select the desired interface from the list.
Field Definition
Neighbors
Field Definition
Appliance Name The name of the appliance you are using for multicast.
Interface The name of the interfaces you want to connect.
Neighbor DR Priority The designated router priority of the neighbor.
Neighbor IP The IP address of the neighbor.
Routes
Field Definition
Field Definition
You can also export an excel file of the multicast report, as well as refresh the page and the information from each
appliance.
Loopback
Configuration > Routing > Loopback
The loopback features enhances reliability and security by allowing you to access your network using one, static,
IP address. If one interface goes down, You can access all interfaces through the one, static IP address. To add a
loopback interface to your network, do the following:
4. Enter the appropriate information for your loopback interface in the Add Interface window.
Loopback Orchestration
You can create a pool of loopback addresses for Orchestrator to automatically create one or more loopback
interfaces. You can also assign IP addresses from the pool to each appliance in the network. Complete the following
steps to create the range for your loopback interfaces.
1. Select +Add Loopback Interface. The Loopback Interface window opens.
2. Specify the Label from the dropdown menu. This is optional and if no label is selected, "None" is assigned.
Additionally, Label only displays the LAN side interface labels configured in the Interface Labels tab.
3. Specify the firewall zone if you want the loopback interface to be part of a specific firewall zone.
4. Check the management box if you want the interface to be used by management applications running on the
appliance.
NOTE You can only select one loopback interface as management if you configure multiple loopbacks.
Allocated / Total The number of loopback IP addresses allocated from the pool out of
the total number of IP addresses in the pool.
If a Peer Priority is not configured, then the appliance randomly distributes flows among multiple peers.
This table shows the values associated with various types of Admin Distance.
Admin Distance (AD) is the route preference value assigned to dynamic routes, static routes, and directly connected
routes. When the appliance's Routes table has multiple routes to the same destination, the appliance uses the route
with the lowest administrative distance.
Field Description
Local A manually configured route, or one learned from locally connected subnets.
BGP Branch A type of dynamic route learned from a local BGP branch peer.
BGP PE A type of dynamic route learned from a local BGP PE (Provider Edge) router.
BGP Remote A route learned from a BGP peer.
BGP Transit A type of dynamic route learned from a local BGP branch-transit peer.
OSPF A route learned from an OSPF (Open Shortest Path First) neighbor.
Subnet Shared A route learned from a Silver Peak peer.
Management routes specify the default gateways and local IP subnets for the management interfaces.
In a Dual-Homed Router Mode configuration, you may need to add a static management route for flow
redirection between appliances paired for redundancy at the same site.
The management routes table shows the configured static routes and any dynamically created routes. If you
use DHCP, then the appliance automatically creates appropriate dynamic routes. A user cannot delete or add
dynamic routes.
If the Source IP is listed as 0.0.0.0, then packets sent using this route use the Interface's IP address as the
Source IP address. If the Source IP lists a specific IP address, then that IP address is used instead.
VRRP Tab
This tab summarizes the configuration and state for appliances deployed with Virtual Router Redundancy
Protocol (VRRP).
In an out-of-path deployment, one method for redirecting traffic to the Silver Peak appliance is to configure VRRP on
a common virtual interface. The possible scenarios are:
When no spare router port is available, a single appliance uses VRRP to peer with a router (or Layer 3 switch).
This is appropriate for an out-of-path deployment where no redundancy is needed.
A pair of active, redundant appliances use VRRP to share a common, virtual IP address at their site. This
deployment assigns one appliance a higher priority than the other, thereby making it the Master appliance,
and the other, the Backup.
Virtual IP The IP address of the VRRP instance. VRRP instances may run between two or more
appliances, or an appliance and a router.
Virtual MAC address MAC Address that the VRRP instance is using. On an NX Appliance, this is in 00-00-
5E-00-01-{VRID} format. On virtual appliances, the VRRP instance uses the
interface's assigned MAC Address (for example, the MAC address that the
hypervisor assigned to wan0).
WCCP Tab
Configuration > [Networking] WCCP
Use this page to view, edit, and delete WCCP Service Groups.
Web Cache Communications Protocol (WCCP) supports the redirection of any TCP or UDP connections to appliances
participating in WCCP Service Groups. The appliance intercepts only those packets that have been redirected to it.
The appliance optimizes traffic flows that the Route Policy tunnelizes. The appliance forwards all other traffic as
pass-through or pass-through-unshaped, as per the Route Policy.
For the Service Groups to be active, you must select Enable WCCP. Otherwise, the service groups are
configured, but not in service.
The appliance should always be connected to an interface/VLAN that does not have redirection enabled --
preferably a separate interface/VLAN would be provided for the appliance.
If the appliance uses auto-optimization, then WCCP redirection must also be applied on the uplinks of the
router or L3 switch to the core/WAN.
INFO Refer to the Silver Peak Network Deployment Guide and the SD-WAN Deployment Guide for examples, best
practices, and deployment tips.
WCCP Settings
Field Name Definition
Admin Values are up and down. The default is up.
Advanced Settings You can only configure these options directly on the appliance. For more
information, and best practices, refer to the Silver Peak Network Deployment
Guide.
Protocol Although many more protocols are supported, generally TCP and UDP are the
focus. For troubleshooting, you may consider adding a group for ICMP as well.
Router IP is the IP address of the WCCP router. For Layer 2 redirection, use
the physical IP address of the interface that is directly connected to
the appliance. For Layer 3 redirection, consider using a loopback IP.
It is not recommended to use VRRP or HSRP IPs as router IPs.
This ensures that a connection will go through the same appliance in both
inbound and outbound directions and avoid asymmetry.
custom provides granular control of the distribution of flows. Contact Silver
Peak Technical Support for assistance.
Assignment Method Determines how redirected packets are distributed between the devices in a
Service Group, effectively providing load balancing among the devices. The options
are:
either, which lets the appliance and router negotiate the best method for
assignment. This is preferred. If the router offers both hash and mask
methods, then the appliance will select the mask assignment method.
hash, for hash table assignment
mask, for mask/value sets assignment
Force L2 Return Generally is not selected. Normally, all Layer-3 redirected traffic
that isn't optimized (that is, it's pass-through) is returned back to
the WCCP router as GRE (L3 return). Processing returned GRE traffic
may create additional CPU overhead on the WCCP router. Force L2
Return may be used to override default behavior and route pass-
through traffic back to the appliance's next-hop router, which may
or may not be the WCCP router. Use caution, as this may create a
Layer 3 loop, if L2 returned traffic gets redirected back to the
appliance by the WCCP router.
Password This field is optional.
Priority The lowest priority is 0, and the default value is 128. Only change this setting from
the default if an interface has multiple WCCP service groups defined for the same
protocol (for example, TCP) and you wish to specify which service group to use.
Weight The default value is 100. You may use this to influence WCCP hash/mask
assignments for individual appliances when more than one appliance is in a cluster.
For Active/Backup appliance configuration, use a Weight of 0 on the backup
appliance.
The Hash and Mask areas are only accessible when you select custom in the Assignment Detail field.
PPPoE Tab
Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating PPP frames inside Ethernet
frames. It is used mainly with DSL services where individual users connect to a DSL modem over Ethernet.
Field Definition
Ethernet Device Specifies which physical interface to use for sending the protocol. Generally, this is
a WAN-side interface.
Password This is set up with your Internet Service Provider (ISP).
PPPoE Name The name is ppp, followed by a numerical suffix from 0 to 9.
User Name This is set up with your Internet Service Provider (ISP).
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 100
Silver Peak Unity Orchestrator User Guide
Generally, this is all the configuration required. If your ISP is fine-tuning the access, you may be asked to configure
some of the Optional Fields, below.
Field Definition
LCP Failure Link Control Protocol Failure. Specifies the number of times the keep-alive can fail
before the link goes down. The default value is 3.
LCP Interval The default value for this keep-alive interval is 20 seconds.
Service Name Provided by ISP.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 101
Silver Peak Unity Orchestrator User Guide
These defaults apply to the LAN interfaces in Deployment Profiles that specify Router mode.
No DHCP
The Silver Peak appliance acts as a DHCP Relay between a DHCP server at a data center and clients
needing an IP address.
On the Configuration > Deployment Profiles tab, the selected default displays consistently under each
LAN–side IP/Mask field.
For any LAN–side interface, you can override the global default by clicking the Edit icon to the right of the label
and changing the values or selection.
Changes you save to the global default only apply to new configurations.
DHCP Settings
DHCP Server Fields
Field Name Description
Default gateway When selected, indicates the default gateway is being used.
Default lease, Specify, in hours, how long an interface can keep a DHCP–
Maximum lease assigned IP address.
DNS server(s) Specifies the associated Domain Name System server(s).
Exclude first N addresses Specifies how many IP addresses are not available at the
beginning of the subnet's range.
Exclude last N addresses Specifies how many IP addresses are not available at the end of
the subnet's range.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 102
Silver Peak Unity Orchestrator User Guide
NetBIOS name server(s) Used for Windows (SMB) type sharing and messaging. It resolves
the names when you are mapping a drive or connecting to a
printer.
NetBIOS node type The NetBIOS node type of a networked computer relates to how
it resolves NetBIOS names to IP addresses. There are four node
types:
B-node = 0x01 Broadcast
P-node = 0x02 Peer (WINS only)
M-node = 0x04 Mixed (broadcast, then WINS)
H-node = 0x08 Hybrid (WINS, then broadcast)
Global - All LAN Interfaces on this Appliance: If enabled and Enable Option 82 is selected, the
DHCP settings will be applied to every appliance. The choices are append, replace, forward, or discard.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 103
Silver Peak Unity Orchestrator User Guide
DHCP Leases
This page lists which IP addresses are currently being leased from the DHCP pool.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 104
Silver Peak Unity Orchestrator User Guide
Tunnels Tab
Use this page to view, edit, add, or delete tunnels. This tab has separate tables for Overlay, Underlay, and
Passthrough tunnels.
If you've deployed an SD-WAN network, then Business Intent Overlays (BIOs) govern tunnel creation and
properties.
If you're not using Overlays, then use the Tunnels configuration template to assign tunnel properties. In
general, accepting the defaults is sufficient and appropriate.
. Status: You can also filter by the following statuses: All, Up, or Down.
Add a Tunnel
Field Definition
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 105
Silver Peak Unity Orchestrator User Guide
Field Definition
Down - The two appliances are configured with the same System ID
Misconfigured (see show system)
Up - Active The tunnel is up and active. Traffic destined for this tunnel
will be forwarded to the remote appliance.
Up - Active - The tunnel is up and active but hasn't had recent activity in
Idle the past five minutes, and has slowed the rate of issuing
keep-alive packets.
Up - Reduced The tunnel is up and active, but the two endpoint appliances
Functionality are running mismatched software releases that give no
performance benefit.
MTU Maximum Transmission Unit. The largest possible unit of data that can be sent
on a given physical medium. Silver Peak provides support for MTUs up to 9000
bytes. Auto allows the tunnel MTU to be discovered automatically, and it
overrides the MTU setting.
Uptime How long since the tunnel has been up.
Underlay Tunnels The designated underlay tunnel.
Live View A live view of the status of your selected tunnel. You can view by bandwidth,
loss, jitter, latency, MOS, chart, traceroute, inbound or outbound, and lock the
scale.
Historical Charts A display of the historical charts for the selected appliance.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 106
Silver Peak Unity Orchestrator User Guide
Troubleshooting
1. Have you created and applied the Overlay to all the appliances on which you're expecting tunnels to be built?
2. Are the appliances on which you're expecting the Overlays to be built using Release 8.0 or later?
3. Do you have at least one WAN Label selected as a Primary port in the Overlay Policy?
Verify this in the Business Intent Overlay tab, in the WAN Links & Bonding Policy section.
4. Are the same WAN labels selected in the Overlay assigned to the WAN interfaces on the appliances?
Verify that at least one of the Primary Labels selected in the Business Intent Overlay is identical to a Label
assigned on the appliance's Deployment page. Tunnels are built between matching Labels on all appliances
participating in the overlay.
5. Do any two (or more) appliances have the same Site Name?
We only assign the same Site Name if we don't want those appliances to connect directly. To view the list of
Site Names, go to the Configuration > Tunnels tab and click Sites at the top.
This requires building secure, compatible third-party IPsec tunnels from Silver Peak devices to non-
Silver Peak devices in the data center or cloud.
When you create the tunnel, the Service Name in the Business Intent Overlay's Internet Traffic
Policies must exactly match the Peer/Service specified in the Passthrough tunnel configuration.
To load balance, create two or more passthrough IPsec tunnels and, in the Business Intent Overlay,
ensure that they all specify the same Service Name in the Internet Traffic Policies.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 107
Silver Peak Unity Orchestrator User Guide
A Tunnel Group consists of a set of appliances, paired with a configuration that defines how to build tunnels among
them.
Tunnel groups are self-healing. If a change is made to an IP address (as with DHCP) or to a Label, those
changes propagate appropriately through the tunnel groups.
To add and remove appliances from Tunnel Groups, click Manage Appliances and Tunnel Groups.
To pause Orchestrator's tunnel management while you troubleshoot, click Settings and deselect Enable.
Topology
You can choose either a Mesh or a Hub & Spoke topology.
If choosing Hub & Spoke, choose the hubs you need from the Select Hubs area. If one you need isn't displayed,
click +Add, as needed.
Orchestrator builds the topology when you apply a Business Intent Overlay to appliances that have already been
assigned a Deployment Profile.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 108
Silver Peak Unity Orchestrator User Guide
Interfaces
Connect all Available Interfaces refers to WAN ports only. If an appliance is in Server mode, its WAN port is the
mgmt0 interface.
Only Connect These Labels is an option when the appliance is at Release 8.0 or later, and you have used
Orchestrator to assign labels to interfaces. Generally, WAN interfaces are named according to the service or service
provider.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 109
Silver Peak Unity Orchestrator User Guide
Tunnel Exception
Orchestrator includes a tunnel exception feature that allows you to specify tunnel transactions between overlays.
There are two ways you can enable this feature in Orchestrator.
You can configure tunnel exceptions through the Tunnel Exception tab.
1. Select the two appliances that you do not want to connect to via a tunnel.
The interface label can be any type of connection, such as any, MPLS, Internet, or LTE. Specifying the label
excludes appliances within a given network to communicate with that particular appliance.
Note: The description field allows you to add a comment if you want to list why you are adding an exception.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 110
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 111
Silver Peak Unity Orchestrator User Guide
NAT
NAT allows for multiple sites with overlapping IP addresses to connect to a single SD-WAN fabric. You can configure
S-NAT (Source Network Address Translation), D-NAT (Destination Network Address Translation), destination TCP,
and UDP port translation rules to LAN to SD-WAN fabric traffic in the ingress and egress direction. The following
address translation options are supported:
You can view both NAT Rules and NAT Pools within your network by selecting NAT Rule or NAT Pools at the top of
the page. You can also export a CSV file of your branch NAT traffic. Select the Edit icon to add rules to your NAT and
NAT Pools.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 112
Silver Peak Unity Orchestrator User Guide
NOTE You must disable advertisements of local, static routes on the LAN side at the site so the routes are
completely unique. Additionally, you must configure static routes for NAT pools and advertise them to the SD-WAN
fabric by enabling Advertise to Silver Peak Peers.
2. Complete the following values in the table by selecting any of the columns.
Field Definition
Priority The order in which the rules are executed: the lower the priority, the
higher the chance your NAT rule will be applied.
LAN Interface The name of the LAN interface the NAT rule is using. This is configurable
for an outbound NAT rule only.
Segment The name of the segment being used.
Direction Select the direction the traffic is going:
Outbound (LAN to Fabric)
Inbound (Fabric to LAN)
NAT Pools
You also have the option to configure a NAT pool. Complete the following steps to create a NAT pool:
1. Select the Edit icon in the NAT tab. The NAT window opens.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 113
Silver Peak Unity Orchestrator User Guide
4. Select the columns in the table, starting with Name, to enter information regarding your Pool.
Field Definition
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 114
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 115
Silver Peak Unity Orchestrator User Guide
The DNS (Domain Name Server) Proxy stores public IP addresses with their associated domain name. Server A is
primarily used as a private DNS to backhaul traffic and Server B is used to match all other domains that are not
included under Server A. Server B is also used for public (cloud services) to breakout traffic. See the table below for
the field descriptions in this tab.
Field Definition
NOTE This feature is only configurable if you have loopback interfaces configured.
2. Select the name of the loopback interface or the LAN-side label associated with your DNS proxy.
3. Enter the IP addresses for Server A in the Server A Addresses field.
4. Choose if you want Caching to be ON or OFF. If selected, the domain name to the IP address mapping is
cached. By default, caching is ON.
5. Enter the domain names of the Server A for the above IP addresses.
6. Enter Server B IP addresses in the Server B Addresses field. Server B will be used if there are no matches to
the Server A domains.
NOTE You can Clear DNS Cache. This will erase the domain name to the IP address mapping you had cached for
both Server A and B.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 116
Silver Peak Unity Orchestrator User Guide
This includes the appliance-based defaults, entries applied manually (via the Appliance Manager or CLI), and entries
that result from applying an Orchestrator Route Policies template, or applying Business Intent Overlays (if you're
deploying an SD-WAN).
Each appliance's default behavior is to auto-optimize all IP traffic, automatically directing flows to the appropriate
tunnel. Auto-optimization strategies reduce the need to create explicit route map entries for optimization. The
three strategies that Silver Peak uses are TCP-based auto-opt, IP-based auto-opt, and subnet sharing. By default,
all three are enabled on the Templates tab, under System.
The Route Policy only requires entries for flows that are to be:
dropped
You may also want to create a Route Policy entry when multiple tunnels exist to the remote peer, and you want the
appliance to dynamically select the best path based on one of these criteria:
load balancing
lowest loss
lowest latency
specified tunnel
Manage these instances on the Templates tab, or select the Edit icon to manage Routing policies directly for a
particular appliance.
If you're deploying an SD-WAN network and setting up Internet breakout from the branch, you must create manual
route policy entries for sanctioned SaaS applications or Guest WiFi.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 117
Silver Peak Unity Orchestrator User Guide
Priority
You can create rules with any priority between 1 and 65534.
If you are using Orchestrator templates to add route map entries, Orchestrator will delete all entries
from 1000 – 9999, inclusive, before applying its policies.
You can create rules from 1 – 999, which have higher priority than Orchestrator template rules.
Similarly, you can create rules from 10000 – 65534 which have lower priority than Orchestrator
template rules.
Adding a rule increments the last Priority by 10. This leaves room for you to insert a rule in between rules
without having to renumber subsequent priorities. Likewise, you can just edit the number.
Match Criteria
These are universal across all policy maps — Route, QoS, Optimization, NAT (Network Address
Translation), and Security.
If you expect to use the same match criteria in different maps, you can create an ACL (Access Control List),
which is a named, reusable set of rules. For efficiency, create them in Configuration > Templates > Access
Lists, and apply them across appliances.
The available parameters are Application, Address Map (for sorting by country, IP address owner, or SaaS
application), Domain, Geo Location, Interface, Protocol, DSCP, IP/Subnet, Port, and Traffic Behavior.
To specify different criteria for inbound versus outbound traffic, select the Source:Dest checkbox.
Source or Destination
An IP address can specify a subnet - for example: 10.10.10.0/24 (IPv4) or fe80::204:23ff:fed8:4ba2/64 (IPv6).
Ports are available only for the protocols tcp, udp, and tcp/udp.
Range and Wildcard can both be used in the same address, but an octet can only contain one or the other. For
example, 10.136-137.*.64-95.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 118
Silver Peak Unity Orchestrator User Guide
A wildcard can only be used to define an entire octet. For example, 10.13*.*.64-95 is not supported. The
correct way to specify this range is 10.130-139.*.64-94.
CIDR notation and (Range or Wildcard) are mutually exclusive in the same address. For example, use either
192.168.0.0/24 or 192.168.0.1-127.
These prefix-matching rules only apply to the following policies: Router, QoS, Optimization, NAT, Security, and
ACLs.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 119
Silver Peak Unity Orchestrator User Guide
The QoS Policies tab displays the QoS policy entries that exist on the appliances. This includes the appliance-based
defaults, entries applied manually (via the Appliance Manager or CLI), and entries that result from applying an
Orchestrator QoS Policy template or Business Intent Overlay.
Use the Templates tab to create and manage QoS policies for multiple appliances, or click the Edit icon to manage
QoS Policies directly for a particular appliance.
whether to trust incoming DSCP markings for LAN QoS and WAN QoS, or to remark them as they leave for the
WAN
The default values for LAN QoS and WAN QoS are trust-lan.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 120
Silver Peak Unity Orchestrator User Guide
LAN QoS – the DSCP marking applied to the IP header before encapsulation
WAN QoS – the DSCP marking in the encapsulating outer IP header. The remote appliance removes the
outer IP header.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 121
Silver Peak Unity Orchestrator User Guide
The specified WAN QoS marking replaces the packet's existing LAN QoS DSCP marking.
When the packet reaches the remote appliance, it retains the modified QoS setting as it travels to its
destination.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 122
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 123
Silver Peak Unity Orchestrator User Guide
Priority
You can create rules with any priority between 1 and 65534.
If you are using Orchestrator templates to add route map entries, Orchestrator will delete all entries
from 1000 – 9999, inclusive, before applying its policies.
You can create rules from 1 – 999, which have higher priority than Orchestrator template rules.
Similarly, you can create rules from 10000 – 65534 which have lower priority than Orchestrator
template rules.
Adding a rule increments the last Priority by 10. This leaves room for you to insert a rule in between rules
without having to renumber subsequent priorities. Likewise, you can just edit the number.
Match Criteria
These are universal across all policy maps — Route, QoS, Optimization, NAT (Network Address
Translation), and Security.
If you expect to use the same match criteria in different maps, you can create an ACL (Access Control List),
which is a named, reusable set of rules. For efficiency, create them in Configuration > Templates > Access
Lists, and apply them across appliances.
The available parameters are Application, Address Map (for sorting by country, IP address owner, or SaaS
application), Domain, Geo Location, Interface, Protocol, DSCP, IP/Subnet, Port, and Traffic Behavior.
To specify different criteria for inbound versus outbound traffic, select the Source:Dest checkbox.
Source or Destination
An IP address can specify a subnet - for example: 10.10.10.0/24 (IPv4) or fe80::204:23ff:fed8:4ba2/64 (IPv6).
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 124
Silver Peak Unity Orchestrator User Guide
Ports are available only for the protocols tcp, udp, and tcp/udp.
Range and Wildcard can both be used in the same address, but an octet can only contain one or the other. For
example, 10.136-137.*.64-95.
A wildcard can only be used to define an entire octet. For example, 10.13*.*.64-95 is not supported. The
correct way to specify this range is 10.130-139.*.64-94.
CIDR notation and (Range or Wildcard) are mutually exclusive in the same address. For example, use either
192.168.0.0/24 or 192.168.0.1-127.
These prefix-matching rules only apply to the following policies: Router, QoS, Optimization, NAT, Security, and
ACLs.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 125
Silver Peak Unity Orchestrator User Guide
You can schedule appliances to apply different QoS maps at different times.
The desired Template Group has the QoS maps you need.
You’ve applied the Template Group to the appliances that you want to schedule.
TIP To specify the timezone for scheduled jobs and reports, go to Orchestrator > [Software & Setup > Setup]
Timezone for Scheduled Jobs.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 126
Silver Peak Unity Orchestrator User Guide
Use the Templates tab to create and manage Optimization policies, or click the Edit icon to manage Optimization
policies directly for a particular appliance.
Priority
You can create rules with any priority between 1 and 65534.
If you are using Orchestrator templates to add route map entries, Orchestrator will delete all entries
from 1000 – 9999, inclusive, before applying its policies.
You can create rules from 1 – 999, which have higher priority than Orchestrator template rules.
Similarly, you can create rules from 10000 – 65534 which have lower priority than Orchestrator
template rules.
Adding a rule increments the last Priority by 10. This leaves room for you to insert a rule in between rules
without having to renumber subsequent priorities. Likewise, you can just edit the number.
Match Criteria
These are universal across all policy maps — Route, QoS, Optimization, NAT (Network Address
Translation), and Security.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 127
Silver Peak Unity Orchestrator User Guide
If you expect to use the same match criteria in different maps, you can create an ACL (Access Control List),
which is a named, reusable set of rules. For efficiency, create them in Configuration > Templates > Access
Lists, and apply them across appliances.
The available parameters are Application, Address Map (for sorting by country, IP address owner, or SaaS
application), Domain, Geo Location, Interface, Protocol, DSCP, IP/Subnet, Port, and Traffic Behavior.
To specify different criteria for inbound versus outbound traffic, select the Source:Dest checkbox.
Source or Destination
An IP address can specify a subnet - for example: 10.10.10.0/24 (IPv4) or fe80::204:23ff:fed8:4ba2/64 (IPv6).
Ports are available only for the protocols tcp, udp, and tcp/udp.
Range and Wildcard can both be used in the same address, but an octet can only contain one or the other. For
example, 10.136-137.*.64-95.
A wildcard can only be used to define an entire octet. For example, 10.13*.*.64-95 is not supported. The
correct way to specify this range is 10.130-139.*.64-94.
CIDR notation and (Range or Wildcard) are mutually exclusive in the same address. For example, use either
192.168.0.0/24 or 192.168.0.1-127.
These prefix-matching rules only apply to the following policies: Router, QoS, Optimization, NAT, Security, and
ACLs.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 128
Silver Peak Unity Orchestrator User Guide
Set Actions
Set Action Definition
Network Memory Addresses limited bandwidth. This technology uses advanced fingerprinting
algorithms to examine all incoming and outgoing WAN traffic. Network Memory
localizes information and transmits only modifications between locations.
Maximize Reduction Optimizes for maximum data reduction at the potential
cost of slightly lower throughput and/or some increase
in latency. It is appropriate for bulk data transfers such
as file transfers and FTP, where bandwidth savings are
the primary concern.
IP Header Compression The process of compressing excess protocol headers before transmitting them on a
link and uncompressing them to their original state at the other end. It's possible to
compress the protocol headers due to the redundancy in header fields of the same
packet, as well as in consecutive packets of a packet stream.
Payload Compression Uses algorithms to identify relatively short byte sequences that are repeated
frequently. These are then replaced with shorter segments of code to reduce the size
of transmitted data. Simple algorithms can find repeated bytes within a single packet;
more sophisticated algorithms can find duplication across packets and even across
flows.
TCP Acceleration Uses techniques such as selective acknowledgments, window scaling, and maximum
segment size adjustment to mitigate poor performance on high-latency links.
INFO The slow LAN alert goes off when the loss has fallen below 80% of the
specified value configured in the TCP Accel Options window.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 129
Silver Peak Unity Orchestrator User Guide
CAUTION Because changing these settings can affect service, Silver Peak recommends that you do not modify
these without direction from Customer Support.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 130
Silver Peak Unity Orchestrator User Guide
Option Description
Adjust MSS to Tunnel MTU Limits the TCP MSS (Maximum Segment Size) advertised by the end hosts in the
SYN segment to a value derived from the Tunnel MTU (Maximum Transmission
Unit). This is TCP MSS = Tunnel MTU – Tunnel Packet Overhead.
This feature is enabled by default so that the maximum value of the end host
MSS is always coupled to the Tunnel MSS. If the end host MSS is smaller than
the tunnel MSS, then the end host MSS is used instead.
A use case for disabling this feature is when the end host uses Jumbo frames.
Auto Reset Flows NOTE: Whether this feature is enabled or not, the default behavior when a
tunnel goes Down is to automatically reset the flows.
If enabled, it resets all TCP flows that aren't accelerated but should be (based on
policy and on internal criteria like a Tunnel Up event).
The internal criteria can also include:
Resetting all TCP accelerated flows on a Tunnel Down event.
Resetting
TCP acceleration is enabled
SYN packet was not seen (so this flow was either part of WCCP
redirection, or it already existed when the appliance was inserted in the
data path).
Enable Silver Peak TCP SYN Controls whether or not Silver Peak forwards its proprietary TCP SYN option on
option exchange the LAN side. Enabled by default, this feature detects if there are more than two
Silver Peak appliances in the flow's data path, and optimizes accordingly.
Disable this feature if there's a LAN-side firewall or a third-party appliance that
would drop a SYN packet when it encounters an unfamiliar TCP option.
End to End FIN Handling This feature helps to fine tune TCP behavior during a connection’s graceful
shutdown event. When this feature is ON (Default), TCP on the local appliance
synchronizes this graceful shutdown of the local LAN side with the remote Silver
Peak’s LAN side. When this feature is OFF (Default TCP), no such
synchronization happens and the two LAN segments at the ends gracefully
shutdown, independently.
IP Black Listing If selected and if the appliance doesn’t receive a TCP SYN-ACK from the remote
end within 5 seconds, the flow proceeds without acceleration and the
destination IP address is blacklisted for one minute.
Keep Alive Timer Allows us to change the Keep Alive timer for the TCP connections.
Probe Interval - Time interval in seconds between two consecutive Keep
Alive Probes
Probe Count - Maximum number of Keep Alive probes to send
First Timeout (Idle) - Time interval until the first Keep Alive timeout
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 131
Silver Peak Unity Orchestrator User Guide
Option Description
LAN Side Window Scale This setting allows the appliance to present an artificially lowered Window Scale
Factor Clamp Factor (WSF) to the end host. This reduces the need for memory in scenarios
where there are a lot of out-of-order packets being received from the LAN side.
These out-of-order packets cause a lot of buffer utilization and maintenance.
Per-Flow Buffer (Max LAN to WAN Buffer and Max WAN to LAN Buffer)
This setting clamps the maximum buffer space that can be allocated to a flow, in
each direction.
Persist timer Timeout Allows the TCP to terminate connections that are in Persist timeout stage after
the configured number of seconds.
Preserve Packet Boundaries Preserves the packet boundaries end to end. If this feature is disabled, then the
appliances in the path can coalesce consecutive packets of a flow to use
bandwidth more efficiently.
It's enabled by default so that applications that require packet boundaries to
match don't fail.
Route Policy Override Tries to override asymmetric route policy settings. It emulates auto-opt
behavior by using the same tunnel for the returning SYN+ACK as it did for the
original SYN packet.
Disable this feature if the asymmetric route policy setting is necessary to
correctly route packets. In that case, you may need to configure flow redirection
to ensure optimization of TCP flows.
Slow LAN Defense Resets all flows that consume a disproportionate amount of buffer and have a
very slow throughput on the LAN side. Owing to a few slower end hosts or a
lossy LAN, these flows affect the performance of all other flows such that no
flows see the customary throughput improvement gained through TCP
acceleration.
This feature is enabled by default. The number relates indirectly to the amount
of time the system waits before resetting such slow flows.
Slow LAN Window Penalty This setting (OFF by default) penalizes flows that are slow to send data on the
LAN side by artificially reducing their TCP receive window. This causes less data
to be received and helps to reach a balance with the data sending rate on the
LAN side.
WAN Congestion Control Selects the internal Congestion Control parameter:
Optimized - This is the default setting. This mode offers optimized
performance in almost all scenarios.
Standard - In some unique cases it may be necessary to downgrade to
Standard performance to better interoperate with other flows on the WAN
link.
Aggressive - Provides aggressive performance and should be used with
caution. Recommended mostly for Data Replication scenarios.
WAN Window Scale This is the WAN-side TCP Window scale factor that Silver Peak uses internally
for its WAN-side traffic. This is independent of the WAN-side factor advertised
by the end hosts.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 132
Silver Peak Unity Orchestrator User Guide
1. The Basic view shows whether NAT is enabled on all Inbound and Outbound.
2. The Advanced view displays all the NAT map rules.
1. Inbound NAT. The appliance automatically creates a source NAT (Network Address Translation) map when
retrieving subnet information from the Silver Peak Cloud portal. This ensures that traffic destined to SaaS
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 133
Silver Peak Unity Orchestrator User Guide
servers has a return path to the appliance from which that traffic originated.
2. Outbound NAT. The appliance and server are in the cloud, and the server accesses the internet. As in the
example below, a Citrix thin client accesses its cloud-based server, and the server accesses the internet.
For deployments in the cloud, best practice is to NAT all traffic — either inbound (WAN-to-LAN) or outbound (LAN-
to-WAN), depending on the direction of initiating request. This avoids black-holing that can result from cloud-specific
IP addressing requirements.
Enabling NAT all applies NAT policies to pass-through traffic as well as optimized traffic, ensuring that black-
holing doesn't occur. NAT all on outbound only applies pass-through traffic.
If Fallback is enabled, the appliance moves to the next IP (if available) when ports are exhausted on the
current NAT IP.
In general, when applying NAT policies, configure separate WAN and LAN interfaces to ensure that NAT works
properly. You can do this by deploying the appliance in Router mode in-path with two (or four) interfaces.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 134
Silver Peak Unity Orchestrator User Guide
Advanced Settings
The appliance can perform source network address translation (Source NAT or SNAT) on inbound or outbound
traffic.
Dynamic – created automatically by the system for inbound NAT when the SaaS Optimization feature is
enabled and SaaS service(s) are selected for optimization. The appliance polls the Silver Peak Unity Cloud
Intelligence service for a directory of SaaS services, and NAT policies are created for each of the subnets
associated with selected SaaS service(s), ensuring that traffic destined for servers in use by those SaaS
services has a return path to the appliance.
Manual – created by the administrator for specific IP addresses / ranges or subnets. When assigning priority
numbers to individual policies within a NAT map, first view dynamic policies to ensure that the manual
numbering scheme doesn't interfere with dynamic policy numbering (that is, the manually assigned priority
numbers cannot be in the range: 4000-5000). The default (no-NAT) policy is numbered 65535.
The NAT policy map has the following criteria and Set Actions:
Match Critera
These are universal across all policy maps — Route, QoS, Optimization, NAT (Network Address
Translation), and Security.
If you expect to use the same match criteria in different maps, you can create an ACL (Access Control List),
which is a named, reusable set of rules. For efficiency, create them in Configuration > Templates > Access
Lists, and apply them across appliances.
The available parameters are Application, Address Map (for sorting by country, IP address owner, or SaaS
application), Domain, Geo Location, Interface, Protocol, DSCP, IP/Subnet, Port, and Traffic Behavior.
To specify different criteria for inbound versus outbound traffic, select the Source:Dest checkbox.
Source or Destination
An IP address can specify a subnet - for example: 10.10.10.0/24 (IPv4) or fe80::204:23ff:fed8:4ba2/64 (IPv6).
Ports are available only for the protocols tcp, udp, and tcp/udp.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 135
Silver Peak Unity Orchestrator User Guide
Range and Wildcard can both be used in the same address, but an octet can only contain one or the other. For
example, 10.136-137.*.64-95.
A wildcard can only be used to define an entire octet. For example, 10.13*.*.64-95 is not supported. The
correct way to specify this range is 10.130-139.*.64-94.
CIDR notation and (Range or Wildcard) are mutually exclusive in the same address. For example, use either
192.168.0.0/24 or 192.168.0.1-127.
These prefix-matching rules only apply to the following policies: Router, QoS, Optimization, NAT, Security, and
ACLs.
Set Actions
Set Action Option Definition
When you select a specific IP, then ensure that the routing is in place for NAT-ted return traffic.
Merge / Replace
At the top of the page, choose
Merge to use the values in the template, but keep any values set on the appliance as is (producing a mix of template
and appliance rules),
-OR-
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 136
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 137
Silver Peak Unity Orchestrator User Guide
Inbound Port forwarding is available in two modes when you add or edit a rule, depending if the translate mode is
enabled or disabled.
The first operating mode for inbound port forwarding is when translate mode is disabled with inbound port
forwarding. The LAN-side subnet with private IP addresses is allowed access through an inbound port forwarding
rule (defined by you in the following steps) and exposes any external services. This requires LAN side private
addresses to be routed on the WAN side. This represents the process of DMZ (Demilitarized Zone).
NOTE This mode it not common unless the port forwarding source is directly connected to the EdgeConnect, or if
the LAN side device address is routed from the WAN side. Additionally, inbound port forwarding does not support
TFTP servers.
Field Definition
Source IP/Subnet The source of the WAN device managing the LAN device(s) specified in the
destination.
Destination IP/Subnet The address of the LAN device(s) managed remotely.
The second mode is when translate mode is enabled. When enabled, the EdgeConnect WAN interface performs
destination NAT to reach LAN side device(s) from an external network.
Complete the following steps to enable the translate mode. This represents the process of DNAT (Destination
Network Translation).
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 138
Silver Peak Unity Orchestrator User Guide
Field Definition
Source IP/Subnet The source of the WAN device managing the LAN device(s) specified in the
destination.
Destination IP/Subnet The address of the WAN interface IP.
Destination Port/Range The port/range of the LAN device(s) that are managed remotely.
Protocol Select the protocol you want to apply: UDP, TCP, ICMP, Any. If you select Any,
the Destination and Translated Ports have a default value that need to be
between 0-100. If the value exceeds, 100 a warning appears.
Translated IP The IP address of the LAN device accessed inside your network.
Translated Port/Range The port/range of the LAN device accessed inside your network.
Source Interface The source interface name.
Segment The name of the segment being used.
Comment Any additional details.
Additional Information
Interface Modes
Port forwarding is only used when you have 'stateful' or 'stateful+snat' configured on interfaces. It does not
apply when you have 'Allow All' or 'Harden' configured.
Security Policies
*If 'security policies' are configured, make sure they allow the traffic specified in the port forwarding rules.
You can also reorder the appliances associated with inbound port forwarding by selecting Reorder when
adding a rule.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 139
Silver Peak Unity Orchestrator User Guide
By default, traffic is allowed between interfaces labeled with the same zone. Any traffic between interfaces
with different zones is dropped. Users can create exception rules (Security Policies) to allow traffic between
interfaces with different zones.
Define your Security Policies by creating templates. You can then apply templates to Interfaces and/or
Overlays.
Selecting the Edit icon opens the Security Policy that has been applied. Any changes made here are local to
that appliance.
Selecting Manage Security Policies with Templates will allow you to define policies on all appliances within
your network. You can use the matrix and table view to further specify your policies.
Logging: In table view, you can specify the log level when adding and editing a rule. Select the appropriate
level from the options in the list.
Range and Wildcard can both be used in the same address, but an octet can only contain one or the other. For
example, 10.136-137.*.64-95.
A wildcard can only be used to define an entire octet. For example, 10.13*.*.64-95 is not supported. The
correct way to specify this range is 10.130-139.*.64-94.
CIDR notation and (Range or Wildcard) are mutually exclusive in the same address. For example, use either
192.168.0.0/24 or 192.168.0.1-127.
These prefix-matching rules only apply to the following policies: Router, QoS, Optimization, NAT, Security, and
ACLs.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 140
Silver Peak Unity Orchestrator User Guide
An Access Control List (ACL) consists of one or more ordered access control rules.
Deny prevents further processing of the flow by that ACL, specifically. The appliance continues to the next
entry in the policy.
Permit allows the matching traffic flow to proceed on to the policy entry's associated SET action(s).
Match Criteria
These are universal across all policy maps — Route, QoS, Optimization, NAT (Network Address
Translation), and Security.
If you expect to use the same match criteria in different maps, you can create an ACL (Access Control List),
which is a named, reusable set of rules. For efficiency, create them in Configuration > Templates > Access
Lists, and apply them across appliances.
The available parameters are Application, Address Map (for sorting by country, IP address owner, or SaaS
application), Domain, Geo Location, Interface, Protocol, DSCP, IP/Subnet, Port, and Traffic Behavior.
To specify different criteria for inbound versus outbound traffic, select the Source:Dest checkbox.
Range and Wildcard can both be used in the same address, but an octet can only contain one or the other. For
example, 10.136-137.*.64-95.
A wildcard can only be used to define an entire octet. For example, 10.13*.*.64-95 is not supported. The
correct way to specify this range is 10.130-139.*.64-94.
CIDR notation and (Range or Wildcard) are mutually exclusive in the same address. For example, use either
192.168.0.0/24 or 192.168.0.1-127.
These prefix-matching rules only apply to the following policies: Router, QoS, Optimization, NAT, Security, and
ACLs.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 141
Silver Peak Unity Orchestrator User Guide
Shaper Tab
This report provides a view of the Shaper settings.
The Shaper provides a simplified way to globally configure QoS (Quality of Service) on the appliances.
The Shaper's parameters are organized into ten traffic classes. Four traffic classes are preconfigured and
named --- real-time, interactive, default, and best effort.
The system applies these QoS settings globally after compressing (deduplicating) all the outbound tunnelized
and pass-through-shaped traffic --- shaping it as it exits to the WAN.
To manage Shaper settings for an appliance's system-level WAN Shaper, access the Shaper template.
For minimum and maximum bandwidth, you can configure traffic class values as a percentage of total
available system bandwidth and as an absolute value. The appliance always provides the larger of the
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 142
Silver Peak Unity Orchestrator User Guide
minimum values, and limits bandwidth to the lower of the maximum values.
If you set Min Bandwidth to a value greater than Max Bandwidth, then Max overrides Min.
Excess Weighting If there is bandwidth left over after satisfying the minimum
bandwidth percentages, then the excess is distributed among the
traffic classes, in proportion to the weightings specified in the
Excess Weighting column. Values range from 1 to 10,000.
Interface Shaper Enables a separate shaper for a specific WAN interface.
For WAN optimization, the interface shaper can be used but is
not recommended.
For SD-WAN, it should never be used because overlay traffic
isn't directed to an interface shaper; traffic is always shaped by
the default WAN shaper.
Max Bandwidth % This limits the maximum bandwidth that a traffic class can use to a
percentage of total available system bandwidth.
Max Bandwidth Absolute (kbps) This limits the maximum bandwidth that a traffic class can use to
an absolute value (kbps). You can specify a maximum absolute
value to cap the bandwidth for downloads and streaming.
Max Wait Time Any packets waiting longer than the specified Max Wait Time are
dropped.
Min Bandwidth % Refers to the percentage of bandwidth guaranteed to each traffic
class, allocated by priority. However, if the sum of the percentages
is greater than 100%, then lower-priority traffic classes might not
receive their guaranteed bandwidth if it's all consumed by higher-
priority traffic.
If you set Min Bandwidth to a value greater than Max Bandwidth,
then Max overrides Min.
Min Bandwidth Absolute (kbps) This guarantees a specific level of service when total system
bandwidth declines. This is useful for maintaining the quality of
VoIP, for example.
Priority Determines the order in which to allocate each class's minimum
bandwidth - 1 is first, 10 is last.
Rate Limit (kbps) You can set per-flow rate limit that a traffic class uses by
specifying a number in the Rate Limit column. For no limit, use 0
(zero).
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 143
Silver Peak Unity Orchestrator User Guide
Recalc on IF State Changes When an interface state changes to UP or DOWN, selecting this
recalculates the total bandwidth based on the configured
bandwidth of all UP interfaces. For example, when wan0 goes
down, wan0 bandwidth is removed from the total bandwidth when
recalculating.
Traffic ID The number assigned to the traffic class.
Traffic Name The name assigned to a traffic class, either prescriptively or by the
user.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 144
Silver Peak Unity Orchestrator User Guide
Configuration Tab
To directly access an appliance and configure the SaaS applications/services you want to optimize, select the desired
row and click the edit icon. The SaaS Optimization window opens.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 145
Silver Peak Unity Orchestrator User Guide
Application Definitions
This tab provides application visibility and control. You can search to see if Silver Peak has a definition for a specific
application and, if so, how it's defined.
Orchestrator uses these eight dimensions for identifying and defining applications:
IP Protocol
UDP Port
TCP Port
Domain Name
Address Map – (formerly known as IP Intelligence). Given a range of IP addresses, the Address Map
reveals what organization owns the segment, along with the country of origin.
DPI (Deep Packet Inspection). An expanded list of Orchestrator's legacy built-in applications.
SaaS – Created by user. If any components of the definition change, the user must manually update
the definition.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 146
Silver Peak Unity Orchestrator User Guide
You are not allowed to change the group name for groups provided by Silver Peak. You are allowed to add or
delete applications within those groups.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 147
Silver Peak Unity Orchestrator User Guide
They alarm on both rising and falling threshold crossing events (i.e., floor and ceiling levels). For both levels, one
value raises the alarm, while another value clears it.
When you configure appliance and tunnel TCAs with an Orchestrator template, all alerts apply globally, so all
of an appliance's tunnels have the same alerts.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 148
Silver Peak Unity Orchestrator User Guide
To create a tunnel-specific alert, go to Configuration > Tunnels, select the tunnel, click the Edit icon to
access the tunnel directly, and then click the icon in the Alert Options column. Make your changes and click
OK.
Times to Trigger - A value of 1 triggers an alarm on the first threshold crossing instance.
ON by default:
Appliance Capacity - triggers when an appliance reaches 95% of its total flow capacity. It is not configurable
and can only be cleared by an operator.
File-system utilization - percent of non-Network Memory disk space filled by the appliance. This TCA cannot
be disabled.
Tunnel latency - measured in milliseconds, the maximum latency of a one-second sample within a 60-
second span
OFF by default:
LAN-side receive throughput - based on a one-minute average, the LAN-side receive TOTAL for all
interfaces
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 149
Silver Peak Unity Orchestrator User Guide
WAN-side transmit throughput - based on a one-minute average, the WAN-side transmit TOTAL for all
interfaces
Tunnel reduction
This table lists the defaults of each type of threshold crossing alert:
Appliance Level
Tunnel Level
aCannot be disabled.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 150
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 151
Silver Peak Unity Orchestrator User Guide
IP SLA Tab
Using a polling process, IP SLA (Internet Protocol Service Level Agreement) tracking provides the ability to generate
specific actions in the network that are completely dependent on the state of an IP interface or tunnel. The goal is to
prevent black-holed traffic. For example, associated IP subnets could be removed from the subnet table, and also
from subnet sharing, if the LAN-side interfaces on an appliance go down.
Based on the Monitor chosen, the Web UI displays the appropriate fields and options.
Remove Auto Subnet Remove from the subnet table an auto subnet for a port (including all VLAN &
subinterface subnets).
Increase VRRP Priority Increase the configured VRRP router priority by a delta amount.
Decrease VRRP Priority Decrease the configured VRRP router priority by a delta amount.
Enable Tunnel Enable a passthrough (internet breakout) tunnel Up for IP Tracking (SLA)
purposes.
Disable Tunnel Disable a passthrough (internet breakout) tunnel Up for IP Tracking (SLA)
purposes. The tunnel can no longer be used for load balancing purposes (when
load balancing traffic between multiple passthrough tunnels), although it can
still be used as a last resort for traffic forwarding.
Disable Subnet Sharing Disable subnet sharing of subnets to other Silver Peak peers on the appliance.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 152
Silver Peak Unity Orchestrator User Guide
Modify Subnet Metric Add a metric delta to the metric of all subnets shared with Silver Peak peers.
Advertise Subnets Advertise subnets to Silver Peak peers.
Default Subnet Action This reverts whatever was the Down Action back to the normal state. For example:
If Down Action = Disable Subnet Sharing, the Up Action is re-enable Subnet
Sharing.
If Down Action = Remove Auto Subnets, the Up Action re-adds the auto
subnet.
If Down Action = Modify Subnet Metric, the Up Action restores subnet
metrics to their original value.
VRRP Default Reverts the VRRP priority back to the configured value.
Two passthrough tunnels configured for Internet breakout and High Availability.
If the Primary passthrough tunnel goes down, traffic goes to Backup tunnel.
The IP SLA Rule would look like this, with the same tunnel specified for the Down and Up Actions.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 153
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 154
Silver Peak Unity Orchestrator User Guide
Two passthrough tunnels configured for Internet breakout and High Availability.
If the Primary passthrough tunnel goes down, traffic goes to Backup tunnel.
The IP SLA Rule would look like this, with the same tunnel specified for the Down and Up Actions.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 155
Silver Peak Unity Orchestrator User Guide
In the URL(s) field, the protocol identifier is only required when specifying HTTPS, as in
https://www.google.com.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 156
Silver Peak Unity Orchestrator User Guide
Its IP SLA Rule would look like this, with the Default Subnet Action being to resume advertising subnets.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 157
Silver Peak Unity Orchestrator User Guide
If WAN0 goes down on the VRRP Master, we want to decrease its Priority so that traffic goes to the VRRP
Backup.
Its IP SLA Rule would look like this, with the Default Subnet Action being to revert to the original Priority.
NOTE: In this instance, the WAN0 interface was given the label, MPLS, to match the service to which it
connected.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 158
Silver Peak Unity Orchestrator User Guide
To monitor the VRRP router state, use VRRP Monitor and specify the interface on which the VRRP instance is
configured.
Here, we're looking at an instance where the VRRP role changes, but priority doesn't, for whatever reason.
Its IP SLA Rule would look like this, with the Default Subnet Action being to revert to the original Priority.
NOTE: In this instance, the WAN0 interface was given the label, MPLS, to match the service to which it
connected.
Another option would be to specify Down Action = Modify Subnet Metric. The Web UI automatically
produces another field where you can add a positive value to the current subnet metric. Up Action = Default
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 159
Silver Peak Unity Orchestrator User Guide
Subnet Action would return the subnet metric to its original value.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 160
Silver Peak Unity Orchestrator User Guide
Configuration Templates
This section describes the templates used for assigning common Configuration parameters across appliances.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 161
Silver Peak Unity Orchestrator User Guide
IMPORTANT: Templates will REPLACE all settings on the appliance with the template settings. Some
templates support a MERGE option; refer to the Help on those templates.
To edit a template, drag (or double-click) it from the Available Templates column to the Active Templates
column.
To apply templates, click Apply Template Groups at the bottom of the page. This will bring you to the Apply
Templates tab where you can permanently associate appliances with specific template groups.
Associating an appliance with a template group makes Orchestrator automatically keep the templates in sync
with the appliance.
When returning to the Templates page, the Template Group field defaults to showing the last template group
viewed.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 162
Silver Peak Unity Orchestrator User Guide
System Template
Use this page to configure system-level features.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 163
Silver Peak Unity Orchestrator User Guide
Subnet Sharing Use shared subnet information Enables Silver Peak appliances to use the
shared subnet information to route traffic to
the appropriate tunnel. Subnet sharing
eliminates the need to set up route maps in
order to optimize traffic.
Automatically include local LAN Adds the local LAN subnet(s) to the appliance
subnets subnet information.
Automatically include local WAN Adds the local WAN subnet(s) to the appliance
subnets subnet information.
Metric for local subnets Specifies a weight that is used for subnets of
local interfaces. When a peer has more than
one tunnel with a matching subnet, it chooses
the tunnel with the greater numerical value.
Redistribute learned BGP routes to SP Enables subnet sharing of routes (subnets)
peers learned from BGP peers.
Allow WAN to WAN routing Redirects inbound LAN traffic back to the WAN.
Network Memory Encrypt data on disk Enables encryption of all the cached data on
the disks. Disabling this option is not
recommended.
Excess Flow Excess flow policy Specifies what happens to flows when the
Handling appliance reaches its maximum capacity for
optimizing flows. The default is to bypass
flows. Or, you can choose to drop the packets.
NextHop Health Enable Health check Activates pinging of the next-hop router.
Check Retry count Specifies the number of ICMP echoes to send,
without receiving a reply, before declaring that
the link to the WAN next-hop router is down.
Interval Specifies the number of seconds between each
ICMP echo sent.
Hold down count If the link has been declared down, this
specifies how many successful ICMP echoes
are required before declaring that the link to
the next-hop router is up.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 164
Silver Peak Unity Orchestrator User Guide
Miscellaneous SSL optimization for non-IPSec Specifies if the appliance should perform SSL
tunnels optimization when the outbound tunnel for SSL
packets is not encrypted (for example, a GRE or
UDP tunnel). To enable Network Memory for
encrypted SSL-based applications, you must
provision server certificates via the Unity
Orchestrator. This activity can apply to the
entire distributed network of Silver Peak
appliances, or just to a specified group of
appliances.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 165
Silver Peak Unity Orchestrator User Guide
Bridge Loop Test Only valid for virtual appliances. When enabled,
the appliance can detect bridge loops. If it does
detect a loop, the appliance stops forwarding
traffic and raises an alarm. Appliance alarms
include recommended actions.
Always send pass-through traffic to If the tunnel goes down when using WCCP and
original sender PBR, traffic that was intended for the tunnel is
sent back the way it came.
Enable default DNS lookup Allows the appliance to snoop the DNS requests
to map domains to IP addresses. This mapping
can then be used in ACLs for traffic matching.
Enable HTTP/HTTPS snooping Enables a more granular application
classification of HTTP/HTTPS traffic, by
inspection of the HTTP/HTTPS header, Host.
This is enabled by default.
Quiescent tunnel keep alive time Specifies the rate at which to send keep alive
packets after a tunnel has become idle
(quiescent mode). The default is 60 seconds.
UDP flow timeout Specifies how long to keep the UDP session
open after traffic stops flowing. The default is
120 seconds (2 minutes).
Non-accelerated TCP Flow Timeout Specifies how long to keep the TCP session
open after traffic stops flowing. The default is
1800 seconds (30 minutes).
Maximum TCP MSS (Maximum Segment Size). The default value is
9000 bytes. This ensures that packets are not
dropped for being too large. You can adjust the
value (500 to 9000) to lower a packet's MSS.
NAT-T keep alive time If a device is behind a NAT, this specifies the
rate at which to send keep alive packets
between hosts, in order to keep the mappings in
the NAT device intact.
Tunnel Alarm Aggregation Threshold Set the amount of alarms you want before the
tunnel alarm is alerted.
Maintain end-to-end Overlay Mapping Enforces the same overlay to be used end-to-
end when traffic is forwarded on multiple
nodes.
IP Directed Broadcast Allows an entire network to receive data that
only the target subnet initially receives.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 166
Silver Peak Unity Orchestrator User Guide
Auth/Radius/TACACS+ Template
Silver Peak appliances support user authentication and authorization as a condition of providing access rights.
Authentication is the process of validating that the end user, or a device, is who they claim to be.
Authorization is the action of determining what a user is allowed to do. Generally, authentication precedes
authorization.
Map order refers to the order in which the authorization servers are queried.
The configuration specified for authentication and authorization applies globally to all users accessing that
appliance.
If a logged-in user is inactive for an interval that exceeds the inactivity time-out, the appliance logs them out
and returns them to the login page. You can change that value, as well as the maximum number of sessions,
in the Session Management template.
can be linked to a TACACS+ (Terminal Access Controller Access Control System) server.
The two user groups are admin and monitor. You must associate each user name with one or the other.
Neither group can be modified or deleted.
The monitor group supports reading and monitoring of all data, in addition to performing all actions. This is
equivalent to the Command Line Interface's (CLI) enable mode privileges.
The admin group supports full privileges, along with permission to add, modify, and delete. This is equivalent
to the Command Line Interface's (CLI) configuration mode privileges.
RADIUS
RADIUS uses UDP as its transport.
With RADIUS, the authentication and authorization functions are coupled together.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 167
Silver Peak Unity Orchestrator User Guide
RADIUS authentication requests must be accompanied by a shared secret. The shared secret must be the
same as defined in the RADIUS setup. Please see your RADIUS documentation for details.
Important: Configure your RADIUS server's priv levels within the following ranges:
admin = 7 - 15
monitor = 1 - 6
TACACS+
TACACS+ uses TCP as its transport.
Transactions between the TACACS+ client and TACACS+ servers are also authenticated through the use of a
shared secret. Please see your TACACS+ documentation for details.
Third = None
When using RADIUS or TACACS+ to authenticate users, configure Authorization Information as follows:
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 168
Silver Peak Unity Orchestrator User Guide
SNMP Template
The Silver Peak appliance supports the Management Information Base (MIB) II, as described in RFC 1213, for cold
start traps and warm start traps, as well as Silver Peak proprietary MIBs. The appliance issues an SNMP trap during
reset when loading a new image, recovering from a crash, or rebooting.
It sends a trap every time an alarm is raised or cleared and traps contain additional information about the alarm,
including severity, sequence number, a text-based description of the alarm, and the time the alarm was created. For
additional information, see SILVERPEAK-MGMT-MIB.TXT in the MIBS directory.
Use this page to configure the appliance's SNMP agent, trap receiver(s), and forward appliance alarms as SNMP
traps to the receivers.
1. Check Enable SNMP. The SNMP v1/v2 and v3 appears, as well as the Trap Receivers box.
2. If you check Enable SNMP Traps, the SNMP agent (in the appliance) sends traps to the configured receiver(s).
3. Enter the Default Trap Community. This is the string the trap receiver uses to accept the traps being sent
to it. The default value is public.
Field Description
Enable SNMP Allows the SNMP application to poll this Silver Peak appliance.
Enable Allows the SNMP agent (in the appliance) to send traps to the receiver(s).
SNMP Traps
Read-Only he SNMP application needs to presents this text string (secret) to poll this appliance's SNMP
Community agent. The default value is public.
Default Trap This string the trap receiver uses to accept the traps being sent to it. The default value is
Community public, but you can change it.
For additional security when the SNMP application polls the appliance, you can select Enable Admin User for
SNMP v3, instead of using v1 or v2c. This provides a way to authenticate without using clear text:
To configure SNMP v3 admin privileges, you must be logged in as admin in Appliance Manager.
For SNMP v3, authentication between the user and the server acting as the SNMP agent is bilateral and
required. You can use either the MD5 or SHA-1 hash algorithm.
Using DES or AES-128 to encrypt for privacy is optional. If you don't specify a password, the appliance uses
the default privacy algorithm (AES-128) and the same password you specified for authentication.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 169
Silver Peak Unity Orchestrator User Guide
Community = The trap receiver needs to receive a specific string in order to accept the traps being sent to it.
By default, this field is blank because it uses the Default Trap Community string, which has the value, public.
If the trap receiver you're adding has a different Community string, enter the community string that's
configured on the trap receiver.
Version = Select either v1 (RFC 1157) or v2c (RFC 1901) standards. For both, authentication is based on a
community string that represents an unencrypted password.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 170
Silver Peak Unity Orchestrator User Guide
The appliance exports flows against two virtual interfaces — sp_lan and sp_wan — that accumulate the total
of LAN–side and WAN–side traffic, regardless of physical interface.
These interfaces appear in SNMP and are therefore "discoverable" by NetFlow and IPFIX collectors.
Enable Flow Exporting allows the appliance to export the data to collectors (and makes the configuration
fields accessible).
The Collector's IP Address is the IP address of the device to which you're exporting the NetFlow/IPFIX
statistics. The default Collector Port is 2055.
In Traffic Type, you can select as many of the traffic types as you wish. The default is WAN TX.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 171
Silver Peak Unity Orchestrator User Guide
If you select ON, Complete the following steps to configure and define your DNS Proxy policies.
NOTE This feature is only configurable if you have loopback interfaces configured.
2. Select the name of the loopback interface or LAN-side label associated with your DNS proxy.
3. Enter the IP addresses for Server A in the Server A Addresses field.
4. Choose if you want Caching to be ON or OFF. If selected, the domain name to the IP address mapping is
cached. By default, caching is ON.
5. Enter the domain names of the Server A for the above IP addresses.
6. Enter Server B IP addresses in the Server B Addresses field. Server B will be used if there are no matches to
the Server A domains.
NOTE You can Clear DNS Cache. This will erase the domain name to the IP address mapping you had cached for
both Server A and B.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 172
Silver Peak Unity Orchestrator User Guide
DNS Template
A Domain Name Server (DNS) stores the IP addresses with their associated domain names. It allows you to
reference locations by domain name, such as mycompany.com, instead of using the routable IP address.
Under Domain Names, add the network domains to which your appliances belong.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 173
Silver Peak Unity Orchestrator User Guide
Logging Template
Use this template to configure local and remote logging parameters.
Each requires that you specify the minimum severity level of event to log.
Set up remote logging by using the Log Facilities Configuration and Remote Log Receivers sections.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 174
Silver Peak Unity Orchestrator User Guide
WARNING A warning condition. Indicates an error will occur if action is not taken.
NOTICE A normal, but significant, condition. No immediate action required.
INFORMATIONAL Informational. Used by Silver Peak for debugging.
DEBUG Used by Silver Peak for debugging
NONE If you select NONE, then no events are logged.
The bolded part of the name is what displays in Silver Peak's logs.
If you select NOTICE (the default), then the log records any event with a severity of NOTICE, WARNING,
ERROR, CRITICAL, ALERT, and EMERGENCY.
These are purely related to event logging levels, not alarm severities, even though some naming conventions
overlap. Events and alarms have different sources. Alarms, once they clear, list as the ALERT level in the
Event Log.
A syslog server is independently configured for the minimum severity level that it will accept. Without
reconfiguring, it may not accept as low a severity level as you are forwarding to it.
In the Log Facilities Configuration section, assign each message/event type (System / Audit / Flow) to a
syslog facility level (local0 to local7).
For each remote syslog server that you add to receive the events, specify the receiver's IP address, along with
the messages' minimum severity level and facility level.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 175
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 176
Silver Peak Unity Orchestrator User Guide
1. Consult with your IT security team to generate a certificate signing request (CSR), and submit it to your
organization's chosen SSL Certificate Authority (CA).
Examples of Certificate Authorities include GoDaddy, Verisign, Comodo, Symantec, Microsoft Entrust,
GeoTrust, etc.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 177
Silver Peak Unity Orchestrator User Guide
For a list of what Silver Peak supports, see Silver Peak Security Algorithms.
If your IT security team advises the use of an Intermediate CA, then use an Intermediate Certificate
File. Otherwise, skip this file.
Upload the Private Key File that was generated as part of the CSR.
3. To associate the CA verified certificate for use with Orchestrator, click Add.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 178
Silver Peak Unity Orchestrator User Guide
You can, however, assign a new password for either one, and apply it to any appliances you wish.
When you first log into a Silver Peak appliance via a console port, you are in User EXEC Mode. This provides
access to commands for many non-configuration tasks, such as checking the appliance status.
To access the next level, Privileged EXEC Mode, you would enter the enable command. With this template,
you can choose to associate and enforce a password with the enable command.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 179
Silver Peak Unity Orchestrator User Guide
Date/Time Setting
Configure an appliance's date and time manually, or complete the following steps to configure it to use an NTP
(Network Time Protocol) server.
1. From the Time Zone list, select the appliance's geographical location.
If you select Manual, the appliance is matched to your web client system when the template is applied.
This eliminates the delay between configuring time manually and applying the template.
To use an NTP server, select NTP Time Synchronization and complete the following steps.
NOTE The server is selected in the order listed when you list more than one NTP server.
Data Collection
Orchestrator collects and puts all stats in its own database in Coordinated Universal Time (UTC).
When a user views stats, the appliance (or Orchestrator server) returning the stats always presents the
information relative to the browser time zone.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 180
Silver Peak Unity Orchestrator User Guide
NOTE To decrypt SSL for SaaS (cloud-based) services, use the SSL for SaaS template.
By supporting the use of SSL certificates and keys, Silver Peak provides deduplication for Secure Socket Layer (SSL)
encrypted WAN traffic:
Silver Peak decrypts SSL data using the configured certificates and keys, optimizes the data, and transmits
data over an IPSec tunnel. The peer Silver Peak appliance uses configured SSL certificates to re-encrypt data
before transmitting.
Peers that exchange and optimize SSL traffic must use the same certificate and key.
Use this template to provision a certificate and its associated key across multiple appliances.
You can add either a PFX certificate (generally, for Microsoft servers) or a PEM certificate.
If the key file has an encrypted key, enter the passphrase needed to decrypt it.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 181
Silver Peak Unity Orchestrator User Guide
If you choose to be able to decrypt the flow, optimize it, and send it in the clear between appliances, then
access the System template and select SSL optimization for non-IPsec tunnels.
TIP For a historical matrix of Silver Peak security algorithms, click here.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 182
Silver Peak Unity Orchestrator User Guide
TIP For a historical matrix of Silver Peak security algorithms, click here.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 183
Silver Peak Unity Orchestrator User Guide
To do so, the appliance generates a substitute certificate that must then be signed by a Certificate Authority (CA).
The appliance generates it locally, and each certificate is unique. This is an ideal option for Proof of
Concept (POC) and when compliance is not a big concern.
To avoid browser warnings, follow up by importing the certificate into the browser from the client-side
appliance.
If you already have a subordinate CA certificate (for example, an SSL proxy), you can upload it to
Orchestrator and push it out to the appliances. If you need a copy of it later, just download it from
here.
If this substitute certificate is subordinate to a root CA certificate, then also install the higher-level SSL
CA certificates (into the SSL CA Certificates template) so that the browser can validate up the chain
to the root CA.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 184
Silver Peak Unity Orchestrator User Guide
If you don't already have a subordinate CA certificate, you can access any appliance's Configuration
> SaaS Optimization page and generate a Certificate Signing Request (CSR).
TIP For a historical matrix of Silver Peak security algorithms, click here.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 185
Silver Peak Unity Orchestrator User Guide
Tunnels Template
NOTE If you're deploying an SD-WAN network, the Business Intent Overlays (BIOs) govern tunnel properties. In that
case, you don't need this template.
If you're not creating overlays, then use this template to assign and manage tunnel properties.
Tunnel templates can be applied to any appliances (with or without tunnels). However, only existing tunnels
can accept the template settings. To enable an appliance to apply these same settings to future tunnels,
select Make these the Defaults for New Tunnels.
Applying tunnel templates does not create new tunnels. To create tunnels, use the Tunnel Groups tab.
To view, edit, and delete tunnels, use the Tunnels tab. The Mode selected determines which tabs display.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 186
Silver Peak Unity Orchestrator User Guide
Thresholds for Latency, Loss, or Jitter are checked once every second.
Receiving 3 successive measurements in a row that exceed the
threshold puts the tunnel into a brownout situation and flows will
attempt to fail over to another tunnel within the next 100mS.
Receiving 3 successive measurements in a row that drop below the
threshold will drop the tunnel out of brownout.
FEC (Forward Error Correction) can be set to enable, disable, and auto.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 187
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 188
Silver Peak Unity Orchestrator User Guide
VRRP Template
Use this template to distribute common parameters for appliances deployed with Virtual Router Redundancy
Protocol (VRRP).
In an out-of-path deployment, one method for redirecting traffic to the Silver Peak appliance is to configure VRRP on
a common virtual interface. The possible scenarios are:
When no spare router port is available, a single appliance uses VRRP to peer with a router (or Layer 3 switch).
This is appropriate for an out-of-path deployment where no redundancy is needed.
A pair of active, redundant appliances use VRRP to share a common, virtual IP address at their site. This
deployment assigns one appliance a higher priority than the other, thereby making it the Master appliance,
and the other, the Backup.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 189
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 190
Silver Peak Unity Orchestrator User Guide
If a Peer Priority is not configured, then the appliance randomly distributes flows among multiple peers.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 191
Silver Peak Unity Orchestrator User Guide
Field Description
Local A manually configured route, or one learned from locally connected subnets.
Subnet Shared - Static A route learned from a Silver Peak peer.
Routes
Subnet Shared - BGP A route shared from a Silver Peak peer from an external network
Remote
Subnet Shared - A route shared from a Silver Peak peer within the same network.
OSPF Remote
BGP Branch (pre-8.1.9.4) A type of dynamic route learned from a local BGP branch peer prior to version
8.1.9.4.
BGP Transit (pre-8.1.9.4) A type of dynamic route learned from a local BGP branch-transit peer prior to
version 8.1.9.4.
EBGP (post-8.1.9.4) External BGP: exchanging routing information with a router outside the company-
wide network after version 8.1.9.4.
BGP PE (pre-8.1.9.4) A type of dynamic route learned from a local BGP PE (Provider Edge) router prior
to version 8.1.9.4.
OSPF A route learned from an OSPF (Open Shortest Path First) neighbor.
IBGP (post-8.1.9.4) Internal BGP: exchanging routing information with a router inside the company-
wide network after version 8.1.9.4.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 192
Silver Peak Unity Orchestrator User Guide
Shaper Template
The Shaper template is a simplified way of globally configuring QoS (Quality of Service) on the appliances:
The Shaper shapes traffic by allocating bandwidth as a percentage of the system bandwidth.
The Shaper's parameters are organized into ten traffic classes. Four traffic classes are preconfigured and
named --- real-time, interactive, default, and best effort.
The system applies these QoS settings globally after compressing (deduplicating) all the outbound tunnelized
and pass-through-shaped traffic --- shaping it as it exits to the WAN.
Applying the template to an appliance updates its system-level wan Shaper. If the appliance has any added,
interface-specific Shapers, they are preserved.
For minimum and maximum bandwidth, you can configure traffic class values as a percentage of total
available system bandwidth and as an absolute value. The appliance always provides the larger of the
minimum values, and limits bandwidth to the lower of the maximum values.
To view any applied configurations, access the Configuration > Shaper page.
Auto BW negotiates the link between a pair of appliances. In this example, the appliances negotiate each link down
to the lower value, 100 Mbps.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 193
Silver Peak Unity Orchestrator User Guide
However, if A and B transmit at the same time, Hub could easily be overrun.
Select Enable Dynamic Rate Control. That allows Hub to regulate the tunnel traffic by lowering each
remote appliance's Tunnel Max Bandwidth. The smallest possible value is that appliance's Tunnel Min
(imum) Bandwidth.
Inbound BW Limit caps how much bandwidth the appliance can receive.
Shaper Settings
Field Name Description
Add Interface Shaper Adds an interface-specific shaper for outbound or inbound traffic.
Enable Interface Shaper Enables a separate shaper for a specific WAN interface.
For WAN optimization, the interface shaper can be used but is
not recommended.
For SD-WAN, it should never be used because overlay traffic
isn't directed to an interface shaper; traffic is always shaped by
the default WAN shaper.
Excess Weighting If there is bandwidth left over after satisfying the minimum
bandwidth percentages, then the excess is distributed among the
traffic classes, in proportion to the weightings specified in the
Excess Weighting column. Values range from 1 to 10,000.
Interface Shaper The interface which is being shaped.
Max Bandwidth % This limits the maximum bandwidth that a traffic class can use to a
percentage of total available system bandwidth.
Max Bandwidth Absolute (kbps) This limits the maximum bandwidth that a traffic class can use to
an absolute value (kbps). You can specify a maximum absolute
value to cap the bandwidth for downloads and streaming.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 194
Silver Peak Unity Orchestrator User Guide
Max Wait Time Any packets waiting longer than the specified Max Wait Time are
dropped.
Min Bandwidth % Refers to the percentage of bandwidth guaranteed to each traffic
class, allocated by priority. However, if the sum of the percentages
is greater than 100%, then lower-priority traffic classes might not
receive their guaranteed bandwidth if it's all consumed by higher-
priority traffic.
If you set Min Bandwidth to a value greater than Max Bandwidth,
then Max overrides Min.
Min Bandwidth Absolute (kbps) This guarantees a specific level of service when total system
bandwidth declines. This is useful for maintaining the quality of
VoIP, for example.
Priority Determines the order in which to allocate each class's minimum
bandwidth - 1 is first, 10 is last.
Rate Limit (kbps) You can set per-flow rate limit that a traffic class uses by
specifying a number in the Rate Limit column. For no limit, use 0
(zero).
Recalc on IF State Changes When an interface state changes to UP or DOWN, selecting this
recalculates the total bandwidth based on the configured
bandwidth of all UP interfaces. For example, when wan0 goes
down, wan0 bandwidth is removed from the total bandwidth when
recalculating.
Traffic Name The name assigned to a traffic class, either prescriptively or by the
user.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 195
Silver Peak Unity Orchestrator User Guide
whether to trust incoming DSCP markings for LAN QoS and WAN QoS, or to remark them as they leave for the
WAN
Priority
With this template, you can create rules with priority from 1000 – 9999, inclusive. When you apply the
template to an appliance, Orchestrator deletes all appliance entries in that range before applying its policies.
If you access an appliance directly (via the WebUI or the command line interface), you can create rules with
higher priority than Orchestrator rules (1 – 999) and rules with lower priority (10000 – 65534).
Adding a rule increments the last Priority by 10. This leaves room for you to insert a rule in between rules
without having to renumber subsequent priorities. Likewise, you can just edit the number.
Match Criteria
These are universal across all policy maps — Route, QoS, Optimization, NAT (Network Address
Translation), and Security.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 196
Silver Peak Unity Orchestrator User Guide
If you expect to use the same match criteria in different maps, you can create an ACL (Access Control List),
which is a named, reusable set of rules. For efficiency, create them in Configuration > Templates > Access
Lists, and apply them across appliances.
The available parameters are Application, Address Map (for sorting by country, IP address owner, or SaaS
application), Domain, Geo Location, Interface, Protocol, DSCP, IP/Subnet, Port, and Traffic Behavior.
To specify different criteria for inbound versus outbound traffic, select the Source:Dest checkbox.
Source or Destination
An IP address can specify a subnet - for example: 10.10.10.0/24 (IPv4) or fe80::204:23ff:fed8:4ba2/64 (IPv6).
Ports are available only for the protocols tcp, udp, and tcp/udp.
Range and Wildcard can both be used in the same address, but an octet can only contain one or the other. For
example, 10.136-137.*.64-95.
A wildcard can only be used to define an entire octet. For example, 10.13*.*.64-95 is not supported. The
correct way to specify this range is 10.130-139.*.64-94.
CIDR notation and (Range or Wildcard) are mutually exclusive in the same address. For example, use either
192.168.0.0/24 or 192.168.0.1-127.
These prefix-matching rules only apply to the following policies: Router, QoS, Optimization, NAT, Security, and
ACLs.
The default values for LAN QoS and WAN QoS are trust-lan.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 197
Silver Peak Unity Orchestrator User Guide
LAN QoS – the DSCP marking applied to the IP header before encapsulation
WAN QoS – the DSCP marking in the encapsulating outer IP header. The remote appliance removes the
outer IP header.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 198
Silver Peak Unity Orchestrator User Guide
The specified WAN QoS marking replaces the packet's existing LAN QoS DSCP marking.
When the packet reaches the remote appliance, it retains the modified QoS setting as it travels to its
destination.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 199
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 200
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 201
Silver Peak Unity Orchestrator User Guide
Routes Template
Check the following boxes if you want to globally apply them to your routes in Orchestrator.
Automatically advertise to local LAN subnets: Enable if you want the system created LAN subnets of your
appliance advertised to your peers.
Automatically advertised local WAN subnets: Enable if you want the system created local WAN subnets of
your appliance advertised to your peers.
Redistribute learned BGP routes to Silver Peak Peers: Advertises BGP routes that your appliance has
learned to Silver Peak peers.
Route Map name to The name of the route map being redistributed to the SD-WAN.
Redistribute route to SD-WAN
Fabric
INFO If Don't Apply is selected, that field is ignored when applying the template to appliances.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 202
Silver Peak Unity Orchestrator User Guide
Priority
With this template, you can create rules with priority from 1000 – 9999, inclusive. When you apply the
template to an appliance, Orchestrator deletes all appliance entries in that range before applying its policies.
If you access an appliance directly (via the WebUI or the command line interface), you can create rules with
higher priority than Orchestrator rules (1 – 999) and rules with lower priority (10000 – 65534).
Adding a rule increments the last Priority by 10. This leaves room for you to insert a rule in between rules
without having to renumber subsequent priorities. Likewise, you can just edit the number.
Match Criteria
These are universal across all policy maps — Route, QoS, Optimization, NAT (Network Address
Translation), and Security.
If you expect to use the same match criteria in different maps, you can create an ACL (Access Control List),
which is a named, reusable set of rules. For efficiency, create them in Configuration > Templates > Access
Lists, and apply them across appliances.
The available parameters are Application, Address Map (for sorting by country, IP address owner, or SaaS
application), Domain, Geo Location, Interface, Protocol, DSCP, IP/Subnet, Port, and Traffic Behavior.
To specify different criteria for inbound versus outbound traffic, select the Source:Dest checkbox.
Source or Destination
An IP address can specify a subnet - for example: 10.10.10.0/24 (IPv4) or fe80::204:23ff:fed8:4ba2/64 (IPv6).
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 203
Silver Peak Unity Orchestrator User Guide
Ports are available only for the protocols tcp, udp, and tcp/udp.
Range and Wildcard can both be used in the same address, but an octet can only contain one or the other. For
example, 10.136-137.*.64-95.
A wildcard can only be used to define an entire octet. For example, 10.13*.*.64-95 is not supported. The
correct way to specify this range is 10.130-139.*.64-94.
CIDR notation and (Range or Wildcard) are mutually exclusive in the same address. For example, use either
192.168.0.0/24 or 192.168.0.1-127.
These prefix-matching rules only apply to the following policies: Router, QoS, Optimization, NAT, Security, and
ACLs.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 204
Silver Peak Unity Orchestrator User Guide
Network Memory Addresses limited bandwidth. This technology uses advanced fingerprinting
algorithms to examine all incoming and outgoing WAN traffic. Network Memory
localizes information and transmits only modifications between locations.
Maximize Reduction Optimizes for maximum data reduction at the potential
cost of slightly lower throughput and/or some increase
in latency. It is appropriate for bulk data transfers such
as file transfers and FTP, where bandwidth savings are
the primary concern.
IP Header Compression The process of compressing excess protocol headers before transmitting them on a
link and uncompressing them to their original state at the other end. It's possible to
compress the protocol headers due to the redundancy in header fields of the same
packet, as well as in consecutive packets of a packet stream.
Payload Compression Uses algorithms to identify relatively short byte sequences that are repeated
frequently. These are then replaced with shorter segments of code to reduce the size
of transmitted data. Simple algorithms can find repeated bytes within a single packet;
more sophisticated algorithms can find duplication across packets and even across
flows.
TCP Acceleration Uses techniques such as selective acknowledgments, window scaling, and maximum
segment size adjustment to mitigate poor performance on high-latency links.
INFO Slow LAN alert goes off when the loss has fallen below 80% of the specified
value configured in the TCP Accel Options window.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 205
Silver Peak Unity Orchestrator User Guide
INFO If you've deployed an SD-WAN network by using Business Intent Overlays (BIO), then Orchestrator uses BIOs
to automatically create the necessary Route Policies.
If you're creating a conventional WAN optimization network, then there may be occasions when you need to directly
configure Route Policies. Then, the following applies.
Only use the Route Policy template to create (and apply) rules for flows that are to be:
dropped
routed based on application, ports, VLAN, DSCP, or ACL (Access Control List)
You may also want to create a Route Policy entry when multiple tunnels exist to the remote peer, and you want the
appliance to dynamically select the best path based on one of these criteria:
load balancing
lowest loss
lowest latency
a preferred interface
a specific tunnel
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 206
Silver Peak Unity Orchestrator User Guide
Why?
Each appliance's default routing behavior is to auto-optimize all IP traffic, automatically directing flows to the
appropriate tunnel. Auto-optimization strategies reduce the need to create explicit route map entries for
optimization. The three strategies that Silver Peak uses are TCP-based auto-opt, IP-based auto-opt, and subnet
sharing. By default, all three are enabled on the System template.
Priority
With this template, you can create rules with priority from 1000 – 9999, inclusive. When you apply the
template to an appliance, Orchestrator deletes all appliance entries in that range before applying its policies.
If you access an appliance directly (via the WebUI or the command line interface), you can create rules with
higher priority than Orchestrator rules (1 – 999) and rules with lower priority (10000 – 65534).
Adding a rule increments the last Priority by 10. This leaves room for you to insert a rule in between rules
without having to renumber subsequent priorities. Likewise, you can just edit the number.
Match Criteria
These are universal across all policy maps — Route, QoS, Optimization, NAT (Network Address
Translation), and Security.
If you expect to use the same match criteria in different maps, you can create an ACL (Access Control List),
which is a named, reusable set of rules. For efficiency, create them in Configuration > Templates > Access
Lists, and apply them across appliances.
The available parameters are Application, Address Map (for sorting by country, IP address owner, or SaaS
application), Domain, Geo Location, Interface, Protocol, DSCP, IP/Subnet, Port, and Traffic Behavior.
To specify different criteria for inbound versus outbound traffic, select the Source:Dest checkbox.
Source or Destination
An IP address can specify a subnet - for example: 10.10.10.0/24 (IPv4) or fe80::204:23ff:fed8:4ba2/64 (IPv6).
Ports are available only for the protocols tcp, udp, and tcp/udp.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 207
Silver Peak Unity Orchestrator User Guide
Range and Wildcard can both be used in the same address, but an octet can only contain one or the other. For
example, 10.136-137.*.64-95.
A wildcard can only be used to define an entire octet. For example, 10.13*.*.64-95 is not supported. The
correct way to specify this range is 10.130-139.*.64-94.
CIDR notation and (Range or Wildcard) are mutually exclusive in the same address. For example, use either
192.168.0.0/24 or 192.168.0.1-127.
These prefix-matching rules only apply to the following policies: Router, QoS, Optimization, NAT, Security, and
ACLs.
In the Destination field, you specify how to characterize the flow. The options are a specific overlay, auto-
optimized, pass-through [shaped], pass-through-unshaped, or dropped.
When auto-optimized, a flow is directed to the appropriate tunnel. If you choose, you can specify that the
appliance use metrics to dynamically select the best path based on one of these criteria:
load balancing
lowest loss
lowest latency
When configuring the Route Policy for an individual appliance when multiple tunnels exist to the remote
peer, you can also select the path based on a preferred interface or a specific tunnel. For further information,
see the Appliance Manager Operator’s Guide.
When configuring the Route Policy for an individual appliance, the continue option is available if a specific
tunnel is named in the Destination column. That option enables the appliance to read subsequent entries in
the individual Route Policy in the event that the tunnel used in a previous entry goes down. For further
information, see the Appliance Manager Operator’s Guide.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 208
Silver Peak Unity Orchestrator User Guide
When to NAT
Two use cases illustrate the need for NAT:
1. Inbound NAT. The appliance automatically creates a source NAT (Network Address Translation) map when
retrieving subnet information from the Silver Peak Cloud portal. This ensures that traffic destined to SaaS
servers has a return path to the appliance from which that traffic originated.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 209
Silver Peak Unity Orchestrator User Guide
2. Outbound NAT. The appliance and server are in the cloud, and the server accesses the internet. As in the
example below, a Citrix thin client accesses its cloud-based server, and the server accesses the internet.
For deployments in the cloud, best practice is to NAT all traffic — either inbound (WAN-to-LAN) or outbound (LAN-
to-WAN), depending on the direction of initiating request. This avoids black-holing that can result from cloud-specific
IP addressing requirements.
Enabling NAT all applies NAT policies to pass-through traffic as well as optimized traffic, ensuring that black-
holing doesn't occur. NAT all on outbound only applies pass-through traffic.
If Fallback is enabled, the appliance moves to the next IP (if available) when ports are exhausted on the
current NAT IP.
In general, when applying NAT policies, configure separate WAN and LAN interfaces to ensure that NAT works
properly. You can do this by deploying the appliance in Router mode in-path with two (or four) interfaces.
Advanced Settings
The appliance can perform source network address translation (Source NAT or SNAT) on inbound or outbound
traffic.
Dynamic – created automatically by the system for inbound NAT when the SaaS Optimization feature is
enabled and SaaS service(s) are selected for optimization. The appliance polls the Silver Peak Unity Cloud
Intelligence service for a directory of SaaS services, and NAT policies are created for each of the subnets
associated with selected SaaS service(s), ensuring that traffic destined for servers in use by those SaaS
services has a return path to the appliance.
Manual – created by the administrator for specific IP addresses / ranges or subnets. When assigning priority
numbers to individual policies within a NAT map, first view dynamic policies to ensure that the manual
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 210
Silver Peak Unity Orchestrator User Guide
numbering scheme doesn't interfere with dynamic policy numbering (that is, the manually assigned priority
numbers cannot be in the range: 4000-5000). The default (no-NAT) policy is numbered 65535.
The NAT policy map has the following criteria and Set Actions:
Match Critera
These are universal across all policy maps — Route, QoS, Optimization, NAT (Network Address
Translation), and Security.
If you expect to use the same match criteria in different maps, you can create an ACL (Access Control List),
which is a named, reusable set of rules. For efficiency, create them in Configuration > Templates > Access
Lists, and apply them across appliances.
The available parameters are Application, Address Map (for sorting by country, IP address owner, or SaaS
application), Domain, Geo Location, Interface, Protocol, DSCP, IP/Subnet, Port, and Traffic Behavior.
To specify different criteria for inbound versus outbound traffic, select the Source:Dest checkbox.
Source or Destination
An IP address can specify a subnet - for example: 10.10.10.0/24 (IPv4) or fe80::204:23ff:fed8:4ba2/64 (IPv6).
Ports are available only for the protocols tcp, udp, and tcp/udp.
Range and Wildcard can both be used in the same address, but an octet can only contain one or the other. For
example, 10.136-137.*.64-95.
A wildcard can only be used to define an entire octet. For example, 10.13*.*.64-95 is not supported. The
correct way to specify this range is 10.130-139.*.64-94.
CIDR notation and (Range or Wildcard) are mutually exclusive in the same address. For example, use either
192.168.0.0/24 or 192.168.0.1-127.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 211
Silver Peak Unity Orchestrator User Guide
These prefix-matching rules only apply to the following policies: Router, QoS, Optimization, NAT, Security, and
ACLs.
Set Actions
Set Action Option Definition
When you select a specific IP, then ensure that the routing is in place for NAT-ted return traffic.
Merge / Replace
At the top of the page, choose
Merge to use the values in the template, but keep any values set on the appliance as is (producing a mix of template
and appliance rules),
-OR-
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 212
Silver Peak Unity Orchestrator User Guide
They alarm on both rising and falling threshold crossing events (i.e., floor and ceiling levels). For both levels, one
value raises the alarm, while another value clears it.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 213
Silver Peak Unity Orchestrator User Guide
ON by default:
Appliance Capacity - triggers when an appliance reaches 95% of its total flow capacity. It is not configurable
and can only be cleared by an operator.
File-system utilization - percent of non-Network Memory disk space filled by the appliance. This TCA cannot
be disabled.
Tunnel latency - measured in milliseconds, the maximum latency of a one-second sample within a 60-
second span
OFF by default:
LAN-side receive throughput - based on a one-minute average, the LAN-side receive TOTAL for all
interfaces
WAN-side transmit throughput - based on a one-minute average, the WAN-side transmit TOTAL for all
interfaces
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 214
Silver Peak Unity Orchestrator User Guide
Tunnel reduction
TCA Metrics
Times to Trigger — A value of 1 triggers an alarm on the first threshold crossing instance. The default sampling
granularity (or rate or interval) is one minute.
This table lists the metrics of each type of threshold crossing alert:
Appliance Level
Tunnel Level
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 215
Silver Peak Unity Orchestrator User Guide
To use this template, your Silver Peak appliance must be registered with an Account Name and Account Key for
the SaaS optimization feature.
SaaS optimization requires three things to work in tandem: SSL (Secure Socket Layer), subnet sharing, and
Source NAT (Network Address Translation).
Enable SaaS optimization enables the appliance to contact Silver Peak's Unity Cloud Intelligence Service and
download information about SaaS services.
If Advertise is selected for a service (for example, SFDC), the appliance will:
Add subnet sharing entries locally for subnets within RTT threshold
Advertise subnets and their metric (within threshold) via subnet sharing to client-side
appliances
Upon seeing an SFDC flow, generate a substitute certificate for an SFDC SSL domain (one substitute
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 216
Silver Peak Unity Orchestrator User Guide
Auto-generate dynamic NAT rules for SFDC (but not for unchecked services)
When Optimize is selected for a service (for example, SFDC), the appliance will:
Does not advertise metric via subnet sharing (unless Advertise is also selected)
If its own RTT is lower, then the packet is sent pass-through (direct to the SaaS server).
Generate a substitute certificate for an SFDC SSL domain (one sub cert per domain)
When Optimize is not selected for a service (for example, SFDC), the appliance:
Receives subnet sharing advertisements for SFDC but doesn't use them
The RTT Calculation Interval specifies how frequently Orchestrator recalculates the Round Trip Time for the
enabled Cloud applications.
The RTT Ping Interface specifies which interface to use to ping the enabled SaaS subnets for Round Trip Times. The
default interface is wan0.
TIPS
Initially, you may want to set a higher RTT Threshold value so that you can see a broader scope of reachable
data centers/servers for any given SaaS application/service.
If the Monitoring page shows no results at 50 ms, you may want to reposition your SaaS gateway
(advertising appliance) closer to the service.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 217
Silver Peak Unity Orchestrator User Guide
By default, traffic is allowed between interfaces labeled with the same zone. Any traffic between interfaces with
different zones is dropped. Users can create exception rules (Security Policies) to allow traffic between interfaces
with different zones.
If you create a new zone and assign that to an interface, all traffic between that interface and rest of the interfaces
(which are still in the Default zone) are dropped. This implies that zone creation and assignment to interfaces
should be performed during a planned network maintenance.
You can also assign a zone label to an Overlay. On a brand new system, all overlays are assigned the Default zone.
Traffic between an Interface and an Overlay follows the same rules as traffic between Interfaces or two Overlays;
traffic is allowed between zones with the same label, and any traffic between different zones is dropped. Users can
create Security Policies to allow traffic between different zones.
Select one of the following levels for the Implicit Drop Logging from the list: None, Emergency, Alert, Critical, Error,
Warning, Notice, Info, or Debug.
Template
Complete the following steps to create a Security Policies Template:
1. Create zone names in Configuration > Overlays > Firewall Zones.
To edit or add a rule, select the desired square in the matrix, and when the Edit Rules pop-up appears, make
the desired changes.
3. Select the edit icon in the Match Criteria column and the Match Criteria pop-up appears. Make the desired
changes.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 218
Silver Peak Unity Orchestrator User Guide
You can select More Options to customize your rules. Check the box next to the specific match criteria and select
your desired changes from the list.
Range and Wildcard can both be used in the same address, but an octet can only contain one or the other. For
example, 10.136-137.*.64-95.
A wildcard can only be used to define an entire octet. For example, 10.13*.*.64-95 is not supported. The
correct way to specify this range is 10.130-139.*.64-94.
CIDR notation and (Range or Wildcard) are mutually exclusive in the same address. For example, use either
192.168.0.0/24 or 192.168.0.1-127.
These prefix-matching rules only apply to the following policies: Router, QoS, Optimization, NAT, Security, and
ACLs.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 219
Silver Peak Unity Orchestrator User Guide
CLI Template
Use this template to enter any sequence of Command Line Interface (CLI) commands.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 220
Silver Peak Unity Orchestrator User Guide
Auto Logout ends your web session after the specified minutes of inactivity.
If the number of Max Sessions is exceeded, there are two possible consequences:
You'll get a message that the browser can't access the appliance.
Since Orchestrator must create a session to communicate with the appliance, it won't be able to
access the appliance.
Although Web Protocol defaults to Both for legacy reasons, Silver Peak recommends that you select HTTPS
for maximum security.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 221
Silver Peak Unity Orchestrator User Guide
If multiple template groups are applied to an appliance, the order in which they're applied determines which
template 'wins'. Templates applied later (lower on the apply order list) will overwrite any conflicting templates
applied earlier.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 222
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 223
Silver Peak Unity Orchestrator User Guide
If you select Merge, new maps are added to the existing maps. If the map is already existing, the new map will match
appliance rules in the orchestrator range. If the configured rules do not match, the new map's rules are appended to
the existing rules. Replace will take the new maps and replace all esiting maps and not include the rules that match
outside of the configured range.
1. Select the direction of traffic you want to redistribute your routes to: SD-WAN Fabric, BGP Inbound and
Outbound, and OSPF.
In this window, you define the rules applied to your route map, which includes the Match Criteria and the Set
Actions. Each route map has a match command and set command. The match command verifies the
attributes of the original route the protocol supports and the set command modifies information that is
redistributed into the target protocol.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 224
Silver Peak Unity Orchestrator User Guide
Cloud Services
This section includes the various cloud services Silver Peak offers.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 225
Silver Peak Unity Orchestrator User Guide
Before you begin Microsoft Azure Virtual WAN configuration in Orchestrator, you need to use the Azure Virtual WAN
portal to authenticate and authorize Orchestrator in Azure. You need to create the service principal, which focuses
on single-tenant application to run within only one organization. Select the following link to get started:
https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal.
Azure Prerequisites
1. Create an Application in Azure and get the following Subscription details from the Azure Active Directory:
Subscription ID
Tenant (Directory) ID
Application (Client) ID
4. Create Azure Virtual WANs with Hubs from your resource groups
Orchestrator Prerequisites
Complete the following tasks in Orchestrator:
NOTE This is a unique address across the network. VTI interfaces created for Azure integration will
be selected from this pool.
INFO Azure VTI interface zone is set to WAN interface zone. Any change in deployment for the
WAN interface zone is applied to Azure VTI as well.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 226
Silver Peak Unity Orchestrator User Guide
WARNING Any change in the VTI pool once configured is networking affecting. This operation should
be performed during a maintenance window as it can take several hours for some Cloud services to
complete.
Orchestrator Configuration
Once the above configuration is complete, navigate to the Microsoft Azure Virtual WAN tab in Orchestrator. There
are four icons at the top of the table that complete the Azure and Orchestrator integration: Subscription, Interface
Labels, Appliance to Virtual WAN Associate, and Tunnel Settings.
Subscription
1. Enter the information in the Subscription fields that reflect your Azure portal account.
2. Select Save once you have completed entering the information in the table below. The Azure field should
reflect Connected.
The following table represents the values in the Subscription window from the Azure portal.
Field Definition
Azure Reachability This field displays the connection status of your account with Azure.
Subscription ID The ID of your subscription.
Tenant ID The name of your Azure AD tenant.
Client ID The client ID of your Azure application.
Client Secret Key The secret key of your Azure application.
Storage Account Name The name of your storage account.
Storage Account Key The storage account key.
Storage URL The storage account URL.*
Configuration Polling Interval The amount of time set that Azure data is updated. This is defaulted every one
minute.
*Storage URL
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 227
Silver Peak Unity Orchestrator User Guide
The Storage URL is present in the Storage Accounts tab in your Azure portal. Complete the following steps to obtain
your storage account URL.
1. Once your storage account is created in Azure, create a blob container.
3. Suffix the URL with a slash and add a file name in the Storage URL field.
NOTE Append the URL with a slash for the file name. Do not end the URL with a slash.
Interface Labels
1. Select the Interface Labels tab. The Build Tunnels Using These Interfaces displays.
2. Drag the Interface labels you want to use into the Preferred Interface Label Order column.
Each appliance is associated with one virtual WAN. Use this tab to add or remove specific sites to your virtual WANs.
3. Check the box to Add or Remove the appliance to your virtual WAN in Azure.
Tunnel Settings
The Tunnel Settings tab defines the tunnels associated with Azure and Orchestrator. The tunnel settings are set
using the default VPN configuration parameters received from virtual WAN APIs located in your Azure portal
account.
In your Azure Portal Account, navigate to the Azure Configuration table. This table displays the VPN site created for
Orchestrator appliances associated to Azure virtual WANs. Additionally, manually associate sites to your hubs in
Azure.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 228
Silver Peak Unity Orchestrator User Guide
Verification
The Tunnel page displays that Azure and Orchestrator have an established connection with Azure by displaying a
tunnel status of up - active.
For more information regarding Azure configuration, visit the following link: https://docs.microsoft.com/en-
us/azure/virtual-wan/virtual-wan-site-to-site-portal
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 229
Silver Peak Unity Orchestrator User Guide
Use Cases
Single WAN circuit
NOTE However, Skype for Business, SharePoint Online, and Office 365 Exchange must break out locally.
Default For everything Any policy order except "Drop" Matches Microsoft
Office 365 Default
categories
Office365Common
applications
For more information regarding Works with Office 365 applications, navigate to
https://techcommunity.microsoft.com and search for the Office 365 blog.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 230
Silver Peak Unity Orchestrator User Guide
Field Definition
Appliance The name of the appliance you want to connect with Zscaler.
Interface Label The name of the interfaces you want to connect with Zscaler.
VPN Credentials and Location The VPN credentials and location status of your subscription with Zscaler.
Status
Gateway Options The optional add-on that allows you to configure sub-locations and various
rules for your sub-locations.
Zscaler ZENS Zscaler Enforcement Nodes: the Zscaler endpoints where the tunnels connect.
The discovered ZENs in this column are populated based on the appliance's
geographical location.
Before you begin Zscaler configuration, you need to create a Zscaler account and ensure you have an established
connection with Zscaler.
NOTE This section represents automated configuration of IPsec, IKE, and GRE tunnels from EdgeConnect to the
Zscaler cloud. Refer to the Zscaler-Silver Peak IPsec Integration Guide: Manual Mode and the Zscaler-Silver Peak
GRE Integration Guide: Manual Mode if you want to manually configure the tunnels with the Zscaler cloud.
Subscription
1. Go to https://help.zscaler.com/zia/sd-wan-api-integration.
2. Once you have completed the steps in the above URL to configure your Zscaler account, navigate to the
Zscaler Internet Access tab in Orchestrator.
4. Enter the information in the Subscription fields that reflect your Zscaler account.
5. Select Save once you have completed entering the information in the table below. The Zscaler field should
reflect Connected.
Field Definition
Zscaler This field displays if you are connected or not connected to your Zscaler
account.
Zscaler Cloud The Zscaler cloud URL. Ex: admin.zscalerthree.net
Partner Username The partner administrator user name you created when configuring Zscaler.
Partner Password The partner administrator password you created when configuring Zscaler.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 231
Silver Peak Unity Orchestrator User Guide
Field Definition
Partner Key The partner key you created when configuring your Zscaler account. Select
Silver Peak from the list of partners.
Domain The domain provisioned in Zscaler for your enterprise.
Tunnel Settings
The Tunnel Settings tab helps you define the tunnels associated with Zscaler and Silver Peak EdgeConnect. Use the
Zscaler defaults for Tunnel Settings defined by the system.
NOTE You can configure General, IKE, and IPsec tunnel settings. The settings are automatically generated;
however, you can edit if you want to do so.
Interface Labels
Select the Primary label you want your traffic to go to. Backup labels will be used as the second option if the
primary is unreachable.
1. Select the Interface Labels tab. The Build Tunnels Using These Interfaces displays.
2. Drag the Interface labels you want to use into the Preferred Interface Label Order column.
WARNING This is service affecting. Any changes to the interface selection may cause previously tunnels to be
deleted and rebuilt.
ZEN Override
You can use the ZEN Override if you want to override the automatically selected ZEN pair for specific sites. You
have the option to add this exception to one or more sites within your network.
2. Enter the appliance name, the interface label, and the Primary and Secondary IP addresses. Orchestrator will
build tunnels to those ZENS.
Field Definition
Gateway Options
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 232
Silver Peak Unity Orchestrator User Guide
Use this tab to configure gateway options and rules for Zscaler sublocations. Orchestrator uses location and sub-
locations to better define a branch site in the Zscaler cloud. Sub-locations are LAN-side segments within each branch
and can be identified by LAN interfaces, zones, or a collection of LAN subnets. Click Gateway Options to begin
configuration, if you choose to enable this add-on.
WARNING If two rules have the same sub-location name or IP address, Orchestrator picks the first match
and considers the order of the rules.
3. Enter a location by entering an appliance name, region, or group in the Appliances field.
2. Enter the subnet address (LAN label, Firewall Zone, or subnet) in the Subnets field.
NOTE Sub-locations can be applied to all WAN links chosen under Zscaler Internet Access > Interface setting.
Check Show Sub-Locations and the sub-locations configured in the Gateway options appear in the Zscaler table.
Enabling Zscaler
Lastly, you need to enable the Zscaler service.
3. Drag Zscaler Cloud from the Policies column to the Preferred Policy Order column.
Verification
You can first verify Zscaler has been deployed in the BIO (Business Intent Overlay) tab. Once the Zscaler Internet
Access is configured and the Zscaler policy is applied successfully in the BIO, deployment will begin automatically. Go
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 233
Silver Peak Unity Orchestrator User Guide
You can also verify your Zscaler tunnels have been successfully deployed in the Tunnels tab. Zscaler tunnels should
be listed in the Passthrough Tunnel column with a green status of up - active.
Zscaler is applied to all your EdgeConnect appliance's associated overlays that have the Zscaler policy
enabled.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 234
Silver Peak Unity Orchestrator User Guide
Before you begin the AWS Transit Gateway Network Manager configuration in Orchestrator, you need to create an
AWS account to authenticate and authorize Orchestrator in the AWS application. After, complete the following
prerequisites for the AWS Transit Gateway Network Manager.
Navigate to the Identity and Access Management (IAM) under Services to create a user profile with
permissions for Orchestrator
Navigate to the Virtual Private Cloud (VPC) Dashboard and configure your Transit Gateways for desired
regions
Navigate to Network Manager from the VPC Dashboard under Transit Gateways to create a Global
Network
1. Sign in to AWS and navigate to the Identity and Access Management (IAM) service (Services > Security,
Identiity, & Compliance > IAM).
5. Choose the Access Type: Either Programmatic Access or AWS Management Console Access.
NOTE For seamless integration with Orchestrator, you will need to choose Programmatic Access to obtain
the Access Key ID and the Secret Access Key.
7. Set the Permissions for your user in this page. You can do this in one of three ways:
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 235
Silver Peak Unity Orchestrator User Guide
Adding a user to your group: The user will inherit the permissions assigned to the group.
Copying permissions from an existing user: Copy permissions from an existing user in AWS and
assign to the user you want.
Attaching existing policies directly: attach a file containing the permissions and assign to the user.
8. Assign optional tags for your user. If you choose to add a tag, complete the steps:
b. Enter a value: Enter text that you want the key/tag to represent.
INFO Tags allow you to provide additional information regarding your user or group for tracking and
organizational purposes. You can have a total of 50 tags.
9. Select Next: Review. This page displays the review of the profile you just created for a user. The User
Details, Permissions Summary, and additional information such as tag, are shown.
10. Select Create User .The page should now show the following success message, along with Access Key ID
and the Secret Access Key associated with your configured user.
1. Navigate to the Virtual Private Cloud (VPC) Dashboard (Services > Networking & Content Delivery).
2. Click Transit Gateways, under Transit Gateways in the left menu.
3. Click Create Transit Gateways. You will create transit gateways and apply them to the various regions in
AWS.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 236
Silver Peak Unity Orchestrator User Guide
Field Description
Description Enter a description to help identify your transit gateway. This is the description for the
above Name Tag.
Amazon side The Autonoums System Number that represents your transit gateways in AWS. You can use
ASN an existing ASN assigned to your global network or a private ASN. See the range limitations
in AWS.
DNS Support Check this box if you want to enable Domain Name System support for your VPC within your
Transit Gateways.
VPN ECMP Check this box if you want to enable Equal Cost Multi-Path routing support in your Transit
support Gateways. This will allow for traffic with the same source and destination to be sent across
the same multiple paths.
Default Route Check this box if you want to automatically associate other Transit Gateways to the route
Table table that this one is using.
Association
Default Route Check this box if you want to automatically create other Transit Gateways with this same
Propagation route table.
Auto-accept Check this box if you want your transit gateways to automatically accept attachments
shared associated with different accounts.
attachments
5. Click Create Transit Gateway and a success message should display along with your Transit Gateway ID.
Orchestrator Configuration
When you have completed the AWS Prerequisites, navigate to the AWS Transit Gateway Network Manager tab in
Orchestrator. There are five icons at the top of the table that are used to complete the AWS and Orchestrator
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 237
Silver Peak Unity Orchestrator User Guide
integration: Subscription, Interface Labels, Appliance to Virtual WAN Associate, Tunnel Settings, and VTI
Subnet.
Subscription
1. Enter the Access Key ID and the Secret Access Key that reflect your AWS User..
2. Select Save once you have completed entering the information in the table below. The AWS Reachability
field should reflect Connected.
Field Description
Access Key ID The Access Key given to you in AWS to log in to the AWS console.
Secret Access The Secret Access Key given to in AWS to log in to the AWS console.
Key
Polling Interval Tells hows often Orchestrator to check for configuration changes in the AWS transit
gateways or Network Manager. The default polling interval is ten minutes.
You now should have an established connection with Orchestrator to your AWS VPC.
Interface Labels
Select the Interface Labels icon to open the dialog to choose interface to build your tunnels to AWS.
1. Select the Interface Labels button. The Build Tunnels Using These Interfaces displays.
2. Drag the interface labels you want to apply from the column on the right into the Primary columns.
In this window, you can choose which appliances you want to connect or disconnect to the AWS Gateway Network
Manager. The appliances already in association with the Transit Network Manager appear on the right under
Transit Gateway.
1. Check or un-check the checkbox next to the appliance you want to connect to the Network Manager.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 238
Silver Peak Unity Orchestrator User Guide
Field Description
Hostname The host name of the appliance you want to connect or disconnect from the
Network Manager.
Transit Gateways Lists the gateways in association with the Network Manager and Orchestrator.
Present
Transit Gateways Displays if the gateway has been added or removed from the Network Manager.
Changes
Tunnel Settings
The Tunnel Settings window defines the tunnels delivering traffic between AWS and Orchestrator. The tunnel
settings are set using the default VPN configuration parameters received from virtual WAN APIs located in AWS.
Use the default settings for General, IKE, and IPsec tunnels and click Save to apply. Please visit the following link for
more support tunnel options: https://docs.aws.amazon.com/vpn/latest/s2svpn/VPNTunnels.html
AWS VTI Subnet Pool
In this window, set the Subnet IP address and the mask for the AWS subnet pool. Enter the subnet IP address and the
mask ID in the designated fields.
NOTE This is an AWS specific subnet pool, therefore every subnet IP address must start with 169.254 to be included
in this pool.
Verification
You can verify the stability and connectivity of your tunnels to the AWS Network Manager using the Connection
Status column in the AWS Network Manager Tab. This column shows the BGP Peer status. Additional details can be
found in the Tunnels, VTI, and BGP tabs.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 239
Silver Peak Unity Orchestrator User Guide
Also helpful in monitoring, and the Threshold Crossing Alerts Tab are addressed in other chapters.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 240
Silver Peak Unity Orchestrator User Guide
Dashboard
The Dashboard is a customizable collection of widgets for monitoring your network. Customizations persist for each
user account. See below for the various functionalities.
To filter on various widgets, select Src or Dest, Overlay or Underlay, or Inbound or Outbound. The filter
varies depending on the widget you are selecting.
You can choose and change the grouping variable for Overlay-Transport and Overlay-Interface by clicking
Flip.
The Appliance Summary displays an inventory count by appliance model. It also displays license type,
availability, and usage.
The Health Map widget reflects the selections and settings configured on the Health Map tab.
To search for appliances in the tree, enter an appliance name and the tag will be displayed above the tree.
To filter collections of appliances, select Show Tags and select from among the tag options.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 241
Silver Peak Unity Orchestrator User Guide
When configuring a software-defined WAN (SD-WAN), you can view All Overlays, individual Business Intent
Overlays (BIOs), or the single and bonded Underlay tunnels that support them.
You can access it under Monitoring in the menu bar, or by clicking the widget title on the Dashboard tab.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 242
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 243
Silver Peak Unity Orchestrator User Guide
The Topology map can dynamically geolocate an appliance when you enter a location [City, State, Country] in
an appliance Configuration Wizard, or when you modify the appliance by right-clicking to access its contextual
menu.
The map tile renders to support variable detail at different zoom levels.
You can use icon grouping to visually consolidate adjacent appliances. The status bubbles up, and you can
configure relative grouping distance in the map's legend. The grouping is also a function of how far you zoom
in or out.
When the icon is encircled by a ring, indicating an alarm, those also display.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 244
Silver Peak Unity Orchestrator User Guide
Live View
From the table, you can access the link's Live View graph.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 245
Silver Peak Unity Orchestrator User Guide
In real-time, LiveView shows how Silver Peak creates synergy to maintain coverage. The real-time chart shows the
SD-WAN overlay at the top and the underlay networks at the bottom. The overlay is green and delivering consistent
application performance while both underlays are in persistent brown-out state.
Historical Charts
These charts let you selectively view the tunnel's components and behavior.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 246
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 247
Silver Peak Unity Orchestrator User Guide
Health Map
Monitoring > Summary > Health Map
The Health Map provides a high-level view of your network's health, based on real-time measurements of network
conditions between appliances.
View filters are available for alarms, packet loss, latency, jitter, MOS (mean opinion score), and Business
Intent Overlay.
The health map can be sorted by weekly, daily, hourly health, or tree (by group, and then alphabetical by
hostname).
Each block represents one hour and uses color coding to display the most severe event among the selected
filters. Color codes correspond to alarm severity and thresholds.
Red = critical – steps must be taken immediately in order to restore the affected service.
Orange = major – steps must be taken as soon as possible because the affected service has degraded
drastically.
Yellow = minor – a problem that does not yet affect service, but may do so if the problem is not
corrected.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 248
Silver Peak Unity Orchestrator User Guide
Clicking a color block displays a pop-up with specifics about that event, what value triggered it, and any
additional threshold breach for that appliance during the same hour.
While filter and sort order customizations persist for each user account, threshold settings apply globally.
Threshold settings are not retroactive – setting new thresholds does not redisplay historical data based on
newly edited values.
If you remove an individual overlay, its data is not recoverable. However, its historical data remains
included in All Overlays.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 249
Silver Peak Unity Orchestrator User Guide
Alarms Tab
This tab provides various details for appliance alarms in Orchestrator.
Time: 1h, 4hr, 1d, 7d, or Custom. Custom allows you to select specified dates in the Range field.
Alarm Emails ON and Alarm Emails Paused: You can enable or disable if you want to receive an email if
there is an alarm that is on or paused.
Alarm Email Recipients: Each configured recipient can receive emails regarding either Appliance alarms or
Orchestrator alarms. Select Add Recipient in the Alarm Recipients window. Select the alarm type and
check the boxes that you want to receive emails for. Select Save or Reload.
Wait to Send Emails: You can customize the amount of time you want the system to wait to send you an
email notifying you of an alarm. Select this icon and enter the amount of minutes you want the system to wait
in the Wait to Send Emails window.
Disable Alarms
You can specify which alarms you want to disable by selecting Customize / Disable Alarms.
To disable alarms:
2. Enter the name of the appliance that has the alarms you want disabled.
Customize Alarms
Complete the following steps to customize a pre-existing alarm.
1. Select the Edit icon next to the selected appliance in the Alarm Information window.
3. If selecting, Enable, specify the Custom Severity by choosing from the list: None, CRITICAL, MAJOR,
MINOR, WARNING.
If selecting Disable, the following message will display: *You are about to disable this alarm. Select Save.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 250
Silver Peak Unity Orchestrator User Guide
Additional Filters:
Active - all uncleared alarms. Acknowledged alarms go to the bottom of this list.
Alarm Severity
Alarms have one of four severity levels: None, Critical, Major, Minor, or Warning. Only Critical and Major alarms
are service-affecting.
Critical alarms require immediate attention, and reflect conditions that affect an appliance or the loss of a
broad category of service.
Major alarms reflect conditions which should be addressed in the next 24 hours -- for example, an
unexpected traffic class error.
Minor alarms can be addressed at your convenience -- for example, a degraded disk.
Warnings inform you of conditions that may become problems over time -- for example, the network
interface is admin down.
Alarm Recipients
Complete the following to add alarm recipients to receive an email notifying you of an alarm within your network.
The Hostname is Orchestrator for Orchestrator alarms, and <Appliance hostname> for appliance-
generated alarms.
Groups display in a drop-down list, based on the groups configured in the navigation pane.
By default, alarms are HTML formatted. However, you can choose Plain Text or Both.
Plain Text alarms are emailed as pipe-separated data. Users can create a script to parse the email and read
the fields.
Example:
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 251
Silver Peak Unity Orchestrator User Guide
Hostname|Alarm_Status|Time|Alarm_ID|Type_ID|Source|Severity|Description|Recommended_action
Appliances are color-coded to indicate their severest alarms in the Topology tab and in the navigation pane.
Threshold crossing alerts are related to alarms. They are preemptive, user-configurable thresholds that
declare a Major alarm when crossed. For more information about their configuration and use, see Threshold
Crossing Alerts Template and Threshold Crossing Alerts Tab.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 252
Silver Peak Unity Orchestrator User Guide
Global Report - By default, Orchestrator emails this preconfigured subset of charts every day. Clicking on a
chart's image opens the associated tab in the browser.
To access all reports residing on the Orchestrator server, click View Reports.
Email Recipients: enter the email address you want to send the report to.
To send a test email and/or to configure another SMTP server instead, go to Orchestrator > [Setup]
SMTP Server Settings.
Default range of reports: Daily = 14 days, Hourly = 24 hours. Increasing the scope uses additional memory.
Appliances in Report: Fill in the box or click Use Tree Selection to display appliances
Traffic Type
Check the boxes next to the following charts to be included in the report:
Application Charts
Tunnel Charts
Appliance Charts
Lock Scales for Local Trends: auto scales graphs for specified scheduled reports
TIP To specify the timezone for scheduled jobs and reports, go to Orchestrator > Timezone for Scheduled Jobs.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 253
Silver Peak Unity Orchestrator User Guide
View Reports
Use this page to view and download reports in PDF form. Reports can be filtered by keywords or sorted by name,
size, or date last modified. These reports can also be emailed depending on the configuration set in the Schedule
& Run Reports tab.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 254
Silver Peak Unity Orchestrator User Guide
Sample Report
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 255
Silver Peak Unity Orchestrator User Guide
It provides a central location for viewing and deleting scheduled jobs, such as appliance backup and any
custom reports configured for distribution.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 256
Silver Peak Unity Orchestrator User Guide
Appliance Bandwidth
The Appliance Bandwidth chart lists the top appliances based on the total volume of inbound and outbound traffic
before reduction. It shows how many bytes the Silver Peak appliance saved when transferring data, aggregated over
a selectable time period.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 257
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 258
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 259
Silver Peak Unity Orchestrator User Guide
For each Business Intent Overlay, the Link Bonding Policy specified determines the bandwidth efficiency. To
guarantee service quality levels, High Availability requires the most overhead, and High Efficiency requires the least.
Charts display the total bandwidth used. The Payload option shows how much raw data is transmitted. At the same
time, it exposes the Peaks option, which enables the viewing of peak transmissions.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 260
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 261
Silver Peak Unity Orchestrator User Guide
Application Bandwidth
The Application Bandwidth chart shows which applications have sent the most bytes.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 262
Silver Peak Unity Orchestrator User Guide
Mousing over the charts and the legends reveals additional information.
The WAN charts identify what percentage of the bandwidth the Silver Peak appliance saved by optimizing the
traffic.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 263
Silver Peak Unity Orchestrator User Guide
Application Trends
This tab shows application trends over time.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 264
Silver Peak Unity Orchestrator User Guide
Firewall Drops
You can use the Firewall Drops tab to see the statistics on various flows, packets, and bytes dropped or allowed by a
zone-based firewall for a given time range.
You can select a range of time (in hours and days) to view the firewall drops. You can also select if you want to
view in Matrix or Table view.
In this pop-up, you can see packets, and bytes dropped or allowed by a zone-based firewall for a given
time range.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 265
Silver Peak Unity Orchestrator User Guide
Top Talkers
This tab lists the IP addresses that use the most bandwidth.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 266
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 267
Silver Peak Unity Orchestrator User Guide
Domains
This tab lists the domains that use the most bandwidth.
The number of Subdomains selected determines how the table aggregates subdomains for display. An asterisk (*)
indicates that more subdomains would be displayed if a higher number were selected. This is not a filter, but rather a
grouping convenience.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 268
Silver Peak Unity Orchestrator User Guide
Countries
This tab lists the countries that use the most bandwidth.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 269
Silver Peak Unity Orchestrator User Guide
Ports
This tab lists the ports that use the most bandwidth.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 270
Silver Peak Unity Orchestrator User Guide
Traffic Behavior
The Traffic Behavior report identifies and categorizes traffic based on low-level characteristics of the data streams.
The behavior types are:
Voice
Video Conferencing
Video Streaming
Interactive
Undetermined
You can also specify these categories as match criteria when creating policies or ACLs (Access Control Lists).
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 271
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 272
Silver Peak Unity Orchestrator User Guide
Overlay-Interface-Transport
These charts display the distribution of traffic across three dimensions—overlays, interfaces, and transport. You can
view each option individually, or in relation to another.
For instance, for a given interface, you can see how the overlay traffic is distributed.
You can also view how much traffic is transported from one Silver Peak appliance to another on the SD-WAN fabric
(Overlays), versus how much is broken out locally, direct to the internet. The Underlay legend displays non-overlay
traffic.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 273
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 274
Silver Peak Unity Orchestrator User Guide
Interface Summary
This tab shows interface summary stats, including inbound and outbound Packets or Bytes per interface, as well as
Firewall Denies (Drops). The stats are summarized for the selected time period.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 275
Silver Peak Unity Orchestrator User Guide
Tunnels Bandwidth
The Tunnel Bandwidth chart shows which tunnels are sending the most bytes — that is, the tunnels that are the
most active.
Show Underlays
Underlays are actual IPsec tunnels and physical paths taken (such as MPLS).
Overlays are logical tunnels created for different traffic types and policies (such as VoIP).
Traceroute
This shows trace route information between the tunnel source and destination IP addresses. It shows intermediate
hops, their IP addresses, and the latency between each hop.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 276
Silver Peak Unity Orchestrator User Guide
Live View
Live View shows the live bandwidth, loss, latency, and jitter on all the tunnels. For an overlay, it also shows live tunnel
states — Up, Browned Out, or Down.
In real-time, LiveView shows how Silver Peak creates synergy to maintain coverage. The real-time chart shows the
SD-WAN overlay at the top and the underlay networks at the bottom. The overlay is green and delivering consistent
application performance while both underlays are in persistent brown-out state.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 277
Silver Peak Unity Orchestrator User Guide
Mousing over the charts and the legends reveals additional information.
The WAN charts identify what percentage of the bandwidth the appliance saved by optimizing the traffic.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 278
Silver Peak Unity Orchestrator User Guide
For each Business Intent Overlay, the Link Bonding Policy specified determines the bandwidth efficiency.
To guarantee service quality levels, High Availability requires the most overhead, and High Efficiency requires
the least.
The Payload option shows how much raw data is transmitted. At the same time, it exposes the Peaks option,
which enables the viewing of peak transmissions.
NOTE Underlay tunnels are a shared resource among overlays. Therefore, underlay charts display aggregated
data.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 279
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 280
Silver Peak Unity Orchestrator User Guide
Dynamic Rate Control allows the Hub to regulate the tunnel traffic by lowering each remote appliance's Tunnel Max
Bandwidth. The smallest possible value is that appliance's Tunnel Min(imum) Bandwidth.
Auto BW negotiates the link between a pair of appliances. In this example, the appliances negotiate each link down
to the lower value, 100 Mbps.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 281
Silver Peak Unity Orchestrator User Guide
However, if A and B transmit at the same time, Hub could easily be overrun.
Enable Dynamic Rate Control. That allows the Hub to regulate the tunnel traffic by lowering each remote
appliance's Tunnel Max Bandwidth. The smallest possible value is that appliance's Tunnel Min(imum)
Bandwidth.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 282
Silver Peak Unity Orchestrator User Guide
Field Definition
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 283
Silver Peak Unity Orchestrator User Guide
Field Definition
Include Built-In Includes the built-in policy flows. If not selected, they are excluded (default). If
selected, they will be included.
Active/Ended You can select if you want to apply an active or ended flow to as a filter. If
selected, you can designate the started or ended time of the flow in the drop
down. If Custom is selected from the date widgets will be enabled to specify an
exact time frame.
Slow Devices For debugging. A slow device is one that cannot receive data quickly
enough from the Silver Peak appliance. This causes the appliance to
expend too many resources for this device, at the expense of accelerating
other devices. To counteract this, disable TCP acceleration for the slow
devices in the Optimization Policy.
Duration Shows flows that have lasted through a specific time frame. You can select <
(less than) or > (greater than), and enter a specific duration (in minutes).
Bytes You can specify whether you want to filter flows that have transferred their total
bytes or within the last five minutes.
Filter This list has all the saved filters. When selected, the filter configurations are
loaded. See more information below regarding the Filter option.
Filter
You can configure specific filters in this field. Select the drop-down menu to see a list of default filters you can apply
to your flows. Once configured, you can add, edit, or delete filters if you select the edit icon.
1. Select the Edit icon next to the Filter drop down.
You can also select the history tab with the two arrows next to the Filter field if you want to go back to a previously
applied filter. A maximum of 20 previously applied filters can be saved.
Reclassifying the flow is not service-affecting. If a policy change makes a flow stale or inconsistent,
then reclassifying makes a best effort attempt to conform the flow to the change. If the flow can't be
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 284
Silver Peak Unity Orchestrator User Guide
successfully "diverted" to this new policy, then an Alert asks if you want to reset.
Selected flows are individually selected; All Returned results from filtering (up to the max number of
returnable flows); and All refers to all flows, visible or not.
Reduction (%) for Outbound traffic = 100(Received from LAN – Transmitted to WAN)/Received from
LAN
Reduction (%) for Inbound traffic = 100(Transmitted to LAN – Received from WAN)/Transmitted to
LAN
Flow Details are primarily to assist Silver Peak in troubleshooting and debugging.
To set the column visibility, right-click any header in the Flows table. This will allow you to hide or unhide any
selected fields.
You can also select, drag, and drop any of the columns in the table to the order you want.
Field Definition
Host Name Host name of the flow.
Detail Pop-up that gives more detail regarding the selected flow.
Chart Displays a real-time flow bandwidth chart with outbound/inbound traffic.
Uptime The amount of time the flow existed.
Overlay Name of the overlay to which the flow belongs.
Application Includes built-in applications, custom applications, and user-created
application groups.
Protocol For selecting an individual or All protocols.
IP1 The IP1 address.
Port 1 The Port 1 address.
IP2 The IP2 address.
Port 2 The Port 2 address.
Inbound Bytes Traffic received from the WAN.
Outbound Bytes Traffic received from the LAN.
Inbound Tunnel The name of the tunnel receiving traffic from the WAN.
Outbound Tunnel The name of the tunnel receiving traffic from the LAN.
From Zone The zone configured by the flow’s source endpoint.
To Zone The zone configured by the flow's destination endpoint.
DSCP LAN RX The DSCP marking traffic received from the LAN.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 285
Silver Peak Unity Orchestrator User Guide
When you filter on All Traffic, the Created and Deleted columns display the number of new and ended flows for
that same time period. The Max column value is from a one-minute window within the time range.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 286
Silver Peak Unity Orchestrator User Guide
The Appliance Flow Trends charts shows the number of flows, packets, and bits/second through the appliance,
over time. It also differentiates among TCP (accelerated and unaccelerated) flows and non-TCP flows.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 287
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 288
Silver Peak Unity Orchestrator User Guide
DSCP Bandwidth
The DSCP Bandwidth chart shows which DSCP classes are sending the most data.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 289
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 290
Silver Peak Unity Orchestrator User Guide
DSCP Trends
This tab shows DSCP usage over time.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 291
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 292
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 293
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 294
Silver Peak Unity Orchestrator User Guide
Use Cases
Single WAN circuit
NOTE However, Skype for Business, SharePoint Online, and Office 365 Exchange must break out locally.
Default For everything Any policy order except "Drop" Matches Microsoft
Office 365 Default
categories
Office365Common
applications
For more information regarding Works with Office 365 applications, navigate to
https://techcommunity.microsoft.com and search for the Office 365 blog.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 295
Silver Peak Unity Orchestrator User Guide
Live View
Live View shows the live bandwidth, loss, latency, and jitter on all the tunnels. For an overlay, it also shows live tunnel
states — Up, Browned Out, or Down.
In real-time, LiveView shows how Silver Peak creates synergy to maintain coverage. The real-time chart shows the
SD-WAN overlay at the top and the underlay networks at the bottom. The overlay is green and delivering consistent
application performance while both underlays are in persistent brown-out state.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 296
Silver Peak Unity Orchestrator User Guide
Loss
The Loss chart shows which tunnels have the most dropped packets.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 297
Silver Peak Unity Orchestrator User Guide
Loss Trends
The Loss Trends chart shows tunnel packet loss over time, before and after Forward Error Correction (FEC).
NOTE Underlay tunnels are a shared resource among overlays. Therefore, underlay charts display aggregated
data.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 298
Silver Peak Unity Orchestrator User Guide
Jitter Summary
The Jitter chart shows which tunnels have the most Jitter. Jitter can be caused by congestion in the LAN, firewall
routers, bottleneck access links, load sharing, route flapping, routing table updates, and timing drifts.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 299
Silver Peak Unity Orchestrator User Guide
Jitter Trends
This tab shows tunnel jitter time.
NOTE Underlay tunnels are a shared resource among overlays. Therefore, underlay charts display aggregated
data.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 300
Silver Peak Unity Orchestrator User Guide
Latency
The Latency chart shows which tunnels have the most transmission delay, generally as a result of congestion.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 301
Silver Peak Unity Orchestrator User Guide
Latency Trends
The Latency Trends chart shows tunnel latency over time.
NOTE Underlay tunnels are a shared resource among overlays. Therefore, underlay charts display aggregated
data.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 302
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 303
Silver Peak Unity Orchestrator User Guide
NOTE Underlay tunnels are a shared resource among overlays. Therefore, underlay charts display aggregated
data.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 304
Silver Peak Unity Orchestrator User Guide
The value can be affected by loss, latency, and jitter. In practice, a value of 4.4 is considered an excellent quality
target.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 305
Silver Peak Unity Orchestrator User Guide
The value can be affected by loss, latency, and jitter. In practice, a value of 4.4 is considered an excellent
quality target.
The Min MOS value reports the worst score within a minute.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 306
Silver Peak Unity Orchestrator User Guide
Tunnels Summary
This tab summarizes tunnel statistics, including reduction, throughput, latency, and packet loss.
For each Business Intent Overlay, the Link Bonding Policy specified determines the bandwidth efficiency. To
guarantee service quality levels, High Availability requires the most overhead, and High Efficiency requires the least.
The table shows the total bandwidth used. The Payload filter removes overhead from the displayed values.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 307
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 308
Silver Peak Unity Orchestrator User Guide
The Silver Peak appliance's built-in user database supports user names, groups, and passwords.
Each appliance has two default users, admin and monitor, who cannot be deleted.
Each User Name belongs to one of two user groups -- admin or monitor.
The monitor group supports reading and monitoring of all data, in addition to performing all actions.
This is equivalent to the Command Line Interface’s (CLI) enable mode privileges.
The admin group supports full privileges, along with permission to add, modify, and delete. This is
equivalent to the CLI’s configuration mode privileges.
Named user accounts can be added via Appliance Manager or the Command Line Interface (CLI).
The table lists all users known to the appliances, whether or not their accounts are enabled.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 309
Silver Peak Unity Orchestrator User Guide
Auth/RADIUS/TACACS+ Tab
This tab displays the configured settings for authentication and authorization.
If the appliance relies on either a RADIUS or TACACS+ server for those services, then those settings are also
reported.
All settings are initially applied via the Auth/RADIUS/TACACS+ configuration template.
Authentication The process of validating that the end user, or a device, is who they
claim to be.
Authorization The action of determining what a user is allowed to do. Generally,
authentication precedes authorization.
Authentication Order When it's possible to validate against more than one database (local,
RADIUS server, TACACS+ server), Authentication Order specifies
which method to try in what sequence.
Map Order The default—and recommended—value is remote-first.
Default Role The default—and recommended—value is admin.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 310
Silver Peak Unity Orchestrator User Guide
Date/Time Tab
This tab highlights significant time discrepancies among the devices recording statistics.
If the date and time of an appliance, the Orchestrator server, and your browser aren't all synchronized, then charts
(and stats) will inevitably have different timestamps for the same data, depending on which device you use to view
the reports.
Recommendation: For consistent results, configure the appliance, the Orchestrator server, and your PC to use an
NTP (Network Time Protocol) server.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 311
Silver Peak Unity Orchestrator User Guide
A Domain Name Server (DNS) uses a table to map domain names to IP addresses. So, you can reference locations
by a domain name, such as mycompany.com, instead of using the IP address.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 312
Silver Peak Unity Orchestrator User Guide
SNMP Tab
This tab summarizes what SNMP capabilities are enabled and which hosts can receive SNMP traps.
The Silver Peak appliance supports the Management Information Base (MIB) II, as described in RFC 1213, for
cold start traps and warm start traps, as well as Silver Peak proprietary MIBs.
The appliance issues an SNMP trap during reset--that is, when loading a new image, recovering from a crash,
or rebooting.
The appliance sends a trap every time an alarm is raised or cleared. Traps contain additional information
about the alarm, including severity, sequence number, a text-based description of the alarm, and the time the
alarm was created.
SNMP Settings
Field Name Description
Enable SNMP Allows the SNMP applicaton to poll this Silver Peak appliance. (For SNMP v1 and
SNMP v2c)
Enable SNMP Traps Allows the SNMP agent (in the appliance) to send traps to the receiver(s). (For
SNMP v1 and SNMP v2c)
Enable V3 User For additional security when the SNMP application polls the appliance, you can
use SNMP v3, instead of using v1 or v2c. This provides a way to authenticate
without using clear text.
Trap Receiver IP address of a host configured to receive SNMP traps
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 313
Silver Peak Unity Orchestrator User Guide
Field Definition
Enable Flow Exporting Move the toggle to enable or disable flow exporting.
Active Flow Timeout The amount of time an active flow has been timed out (in minutes).
IPFIX Template Timeout The resending of templates based on a timeout.
Traffic Type Check as many of the traffic types as you want. The default is WAN TX.
Information Elements Check Firewall Zones, Application Performance, or both.
Orchestrator generates data based specifically on the zone-based firewalls associated with the
specified flow.
For example: Host Name, From Zone, To Zone, Tag, Action, Direction, etc.
Orchestrator generates data based specifically on the application performance associated with each
flow.
These interfaces appear in SNMP and are therefore "discoverable" by NetFlow and IPFIX collectors.
The Collector's IP Address is the IP address of the device to which you're exporting the NetFlow/IPFIX
statistics. The default Collector Port is 2055.
For more information regarding the IPFIX and the associated Custom IE's, please see the Silver Peak Custom
Information Elements section in the Orchestrator User Guide.
Field
Enterprise
Custom IE Name and Implementation Description Semantics Units Length
ID
(bytes)
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 314
Silver Peak Unity Orchestrator User Guide
clientIPv4Address: default 4 1
serverIPv4Address default 4 2
connectionInitiator default 4 7
connectionNumberOfConnections totalCounter 1 9
connectionServerResponsesCount totalCounter 1 10
Currently 1
connectionTransactionCompleteCount totalCounter 1 21
Currently 1
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 315
Silver Peak Unity Orchestrator User Guide
connectionServerResponseDelay MS 4 11
connectionNetworkToServerDelay MS 4 12
connectionNetworkToClientDelay MS 4 13
connectionClientPacketRetransmissionCount totalCounter 4 14
Currently 1
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 316
Silver Peak Unity Orchestrator User Guide
connectionClientToServerNetworkDelay MS 4 15
connectionApplicationDelay MS 4 16
connectionClientToServerResponseDelay MS 4 17
connectionTransactionDuration MS 4 18
The flow displays the time difference between the first and
last packet.
connectionTransactionDurationMin MS 4 19
The flow displays the time difference between the first and
last packet.
connectionTransactionDurationMax MS 4 20
The flow displays the time difference between the first and
last packet.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 317
Silver Peak Unity Orchestrator User Guide
to-zone variable 23
length
(destination zone) name for the flow when ZBF is configured
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 318
Silver Peak Unity Orchestrator User Guide
Logging Tab
This tab summarizes the configured logging parameters:
Severity Levels
In order of decreasing severity, the levels are as follows:
The bolded part of the name is what displays in Silver Peak's logs.
These are purely related to event logging levels, not alarm severities, even though some naming conventions
overlap. Events and alarms have different sources. Alarms, once they clear, list as the ALERT level in the
Event Log.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 319
Silver Peak Unity Orchestrator User Guide
Remote Logging
You can configure the appliance to forward all events, at and above a specified severity, to a remote syslog
server.
A syslog server is independently configured for the minimum severity level that it will accept. Without
reconfiguring, it may not accept as low a severity level as you are forwarding to it.
Each message/event type (System / Audit / Flow) is assigned to a syslog facility level (local0 to local7).
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 320
Silver Peak Unity Orchestrator User Guide
Banners Tab
This tab lists the banner messages on each appliance.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 321
Silver Peak Unity Orchestrator User Guide
You also have the option to install your own custom certificate, acquired from a CA certificate authority.
1. Consult with your IT security team to generate a certificate signing request (CSR), and submit it to your
organization's chosen SSL Certificate Authority (CA).
Examples of Certificate Authorities include GoDaddy, Verisign, Comodo, Symantec, Microsoft Entrust,
GeoTrust, etc.
For a list of what Silver Peak supports, see Silver Peak Security Algorithms.
If your IT security team advises the use of an Intermediate CA, then use an Intermediate Certificate
File. Otherwise, skip this file.
Click the Edit icon next to the target appliance, and Upload the Certificate File from the CA.
Upload the Private Key File that was generated as part of the CSR.
3. To associate the CA verified certificate for use with Orchestrator, click Add.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 322
Silver Peak Unity Orchestrator User Guide
You can specify how each appliance connects to Orchestrator by designating one of its interface Labels.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 323
Silver Peak Unity Orchestrator User Guide
System Information
Manage system information with templates, with the exception of the following appliance-specific parameters:
When you click in the Edit column for a specific appliance, these two screens are available.
System Summary
System Settings
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 324
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 325
Silver Peak Unity Orchestrator User Guide
Enable default DNS lookup Allows the appliance to snoop the DNS requests to map domains to IP
addresses. This mapping can then be used in ACLs for traffic matching.
Enable Health check Activates pinging of the next-hop router.
Enable HTTP/HTTPS Snooping Enables a more granular application classification of HTTP/HTTPS
traffic, by inspection of the HTTP/HTTPS header, Host. This is enabled
by default.
Enable IGMP Snooping IGMP snooping is a common Layer-2 LAN optimization that filters the
transmit of multicast frames only to ports where multicast streams
have been detected. Disabling this feature floods multicast packets to
all ports. IGMP snooping is recommended and enabled by default.
Enable SaaS optimization Enables the appliance to determine what SaaS applications/services it
can optimize. It does this by contacting Silver Peak's portal and
downloading SaaS IP address and subnet information.
Encrypt data on disk Enables encryption of all the cached data on the disks. Disabling this
option is not recommended.
Excess flow policy Specifies what happens to flows when the appliance reaches its
maximum capacity for optimizing flows. The default is to bypass flows.
Or, you can choose to drop the packets.
Flows and tunnel failure If there are parallel tunnels and one fails, then Dynamic Path Control
determines where to send the flows. There are three options:
fail-stick – When the failed tunnel comes back up, the flows don't
return to the original tunnel. They stay where they are.
fail-back – When the failed tunnel comes back up, the flows return
to the original tunnel.
disable – When the original tunnel fails, the flows aren't routed to
another tunnel.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 326
Silver Peak Unity Orchestrator User Guide
Hold down count If the link has been declared down, this specifies how many successful
ICMP echoes are required before declaring that the link to the next-hop
router is up.
Hub Site Specifies whether the appliance has been assigned the role, Hub, in
Orchestrator. Options are true or false.
Interval Specifies the number of seconds between each ICMP echo sent.
IP Id auto optimization Enables any IP flow to automatically identify the outbound tunnel and
gain optimization benefits. Enabling this option reduces the number of
required static routing rules (route map policies).
IPSec UDP Port Specifies the port that Orchestrator uses to build IPSec UDP tunnels. If
the field is blank, Orchestrator uses the default.
Location Appliance location, optionally specified during appliance setup.
Maximum TCP MSS (Maximum Segment Size). The default value is 9000 bytes. This ensures
that packets are not dropped for being too large. You can adjust the
value (500 to 9000) to lower a packet's MSS.
Media Type Displays the actual media being used.
Metric for local subnets A weight that is used for subnets of local interfaces. When a peer has
more than one tunnel with a matching subnet, it chooses the tunnel with
the greater numerical value.
Mode Specifies the appliance's deployment mode: Server, Router, or Bridge.
Model The specific EC, EC-V, NX, VX, or VRX model.
NAT-T keep alive time If a device is behind a NAT, this specifies the rate at which to send keep
alive packets between hosts, in order to keep the mappings in the NAT
device intact.
Quiescent tunnel keep alive time Specifies the rate at which to send keep alive packets after a tunnel has
become idle (quiescent mode). The default is 60 seconds.
Region A user-assigned name created for segmenting topologies and
streamlining the number of tunnels created. When regions contain at
least one hub, you can choose to connect Regions through hubs only.
Retry count Specifies the number of ICMP echoes to send, without receiving a reply,
before declaring that the link to the WAN next-hop router is down.
Serial Number Serial number of the appliance
Site / Site Name Orchestrator won't build tunnels between appliances with the same
user-assigned site name.
SSL optimization for non-IPSec Specifies if the appliance should perform SSL optimization when the
tunnels outbound tunnel for SSL packets is not encrypted (for example, a GRE or
UDP tunnel). To enable Network Memory for encrypted SSL-based
applications, you must provision server certificates via the Silver Peak
GMS. This activity can apply to the entire distributed network of Silver
Peak appliances, or just to a specified group of appliances.
System Bandwidth The appliance's total outbound bandwidth, determined by appliance
model or license.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 327
Silver Peak Unity Orchestrator User Guide
TCP auto optimization Enables any TCP flow to automatically identify the outbound tunnel and
gain optimization benefits. Enabling this option reduces the number of
required static routing rules (route map policies).
UDP flow timeout Specifies how long to keep the UDP session open after traffic stops
flowing. The default is 120 seconds (2 minutes).
Uptime The time elapsed since the appliance became operational and
available.
Use shared subnet information Enables Silver Peak appliances to use the shared subnet information to
route traffic to the appropriate tunnel. Subnet sharing eliminates the
need to set up route maps in order to optimize traffic.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 328
Silver Peak Unity Orchestrator User Guide
Software Versions
This report lists the software versions on each appliance.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 329
Silver Peak Unity Orchestrator User Guide
You can download and store new appliance software from your network or computer to the Orchestrator server,
staging it for installation to the appliance(s).
Use the Upgrade Appliances page to upload appliance software to Orchestrator and to install appliance software
from the Orchestrator server into the appliance’s inactive partition.
Install and reboot installs the image into the appliance’s inactive partition and then reboots the appliance to
begin using the new software.
Install and set next boot partition installs the image into the appliance’s inactive partition and then points
to that partition for the next reboot.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 330
Silver Peak Unity Orchestrator User Guide
Orchestrator automatically creates a weekly backup of each appliance’s configuration to the Orchestrator server.
Additionally, you can create an immediate backup on demand.
After selecting the appliance(s) in the navigation tree, go to Administration > Backup Now and click Backup.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 331
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 332
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 333
Silver Peak Unity Orchestrator User Guide
You can restore an appliance configuration backup from Orchestrator to any other Silver Peak appliance(s) in your
network.
However, be careful to consider any potential conflicts when the backup specifies a static mgmt0 IP address, as
opposed to specifying DHCP.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 334
Silver Peak Unity Orchestrator User Guide
Removing an appliance with this action returns the appliance to the Discovered Appliances list.
Additionally,
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 335
Silver Peak Unity Orchestrator User Guide
Removing an appliance with this action places the appliance in the Denied Devices list, which is located as a link in
the Configuration - Discovered Appliances menu.
Additionally,
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 336
Silver Peak Unity Orchestrator User Guide
Orchestrator keeps its database synchronized with the appliances’ running configurations.
When you use Orchestrator to make a configuration change to an appliances’ running configuration, the
appliance responds by sending an event back to the Orchestrator server to log, thereby keeping
Orchestrator and the appliance in sync.
Whenever an appliance starts or reboots, Orchestrator automatically inventories the appliances to resync.
When an appliance is in an OutOfSync management state, the Orchestrator server resyncs with it as it
comes back online.
If your overall network experiences problems, then you can use this page to manually resync to ensure that
Orchestrator has an appliance’s current running configuration.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 337
Silver Peak Unity Orchestrator User Guide
System Bypass mode is only available for certain models of Silver Peak physical appliances. Virtual appliances don't
support bypass mode.
In system bypass mode, the fail-to-wire (or fail-to-glass) card DOES NOT receive or process packets.
Fail-to-wire network interfaces mechanically isolate the appliances from the network in the event of a hardware,
software, or power failure. This ensures that all traffic bypasses the failed appliance and maximizes uptime.
In an in-line deployment (Bridge mode), the LAN interface is physically connected to the WAN interface.
In Server mode and any Router mode, the appliance is in an open-port state.
When the appliance is in Bypass mode, a message displays in red text at the upper right corner of the user interface.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 338
Silver Peak Unity Orchestrator User Guide
You can simultaneously apply CLI (Command Line Interface) commands to multiple, selected appliances.
The window automatically provides you the highest user privilege level.
INFO For more information, see the Silver Peak Command Line Interface Reference Guide.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 339
Silver Peak Unity Orchestrator User Guide
These tests run on the two selected appliances, using user-specified parameters for bandwidth, duration,
DSCP marking, and type of traffic (tunnelized / pass-through-shaped / pass-through-unshaped).
Orchestrator runs the selected test twice -- once passing traffic from Appliance A to Appliance B, and the
second run passing traffic from Appliance B to Appliance A.
Custom Parameters are available for tcpperf and should be used cautiously, by advanced users.
-h help
-s server: Run tcpperf in server mode (not applicable for file generation). Listens on TCP port 2153 by
default.
[server_port [server_port [server_port]..]]
-sr server range: <server_port_start:server_port_end>
-c client server_IP: TCPperf Server's IP address (not applicable for file generation).
[server_port [server_port [server_port]..]]
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 340
Silver Peak Unity Orchestrator User Guide
Option Description
Notes:
3. The next even-numbered server ports will also be assigned automatically.
4. These even numbers are reserved for double connection testing (see -I, interface IP).
5. Generate mode generates a local file per flow with the same content that the client would have generated
with the specified parameters.
6. SG write mode is like generate mode except that it writes to an SG device.
General Parameters
Option Description
-6 ip6. Forces tcpperf to use IPv6 addresses only. Default is IPv4 addresses.
-I interface IP: Specify source interface IP address. Default is any.
-o outname: Output filename. Default is stdout.
-u update <secs>: Frequency of printed updates in seconds. Default is 1.
-d duration <secs>: Set maximum test duration in seconds. Default is infinite.
-w wait <secs>: Wait until <secs> since 1970 before transmitting data.
-z realtime: Elevate to realtime priority. Requires root privilege.
-cm cpu mask: Specify CPU affinity. Requires root privilege.
-q quiet <level>: Suppresses detail based on level:
0 - None. Print results when test is complete.
1 - Default. Periodic packet/byte statistics.
2 - Verbose. Adds connection state changes.
3 - Debug. Prints everything.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 341
Silver Peak Unity Orchestrator User Guide
TCP Parameters
Option Description
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 342
Silver Peak Unity Orchestrator User Guide
Option Description
mutate Ensures all flows and data repeats are unique. Preserves short range
patterns within flow. Destroys cross flow similarity. Destroys original byte
code distribution.
shuffle Ensures all flows and data repeats are unique. Preserves short range
patterns within flow. Preserves cross flow similarity. Preserves original byte
code distribution.
fast Ensures all flows and data repeats are unique. Does not preserve short
range patterns. Destroys cross flow similarity. Destroys original byte code
distribution. Uses less CPU than mutate or shuffle.
bidir Bidirectional, client and server independently send data on the same TCP
connection.
bidir2 Bidirectional, client and server independently send data on secondary TCP
connections.
loop Bidirectional, server loops data back to client on the same TCP connection.
bidir2 Bidirectional, transmists one transaction at a time. Client waits for previous
transaction to be echoed. Emulates transactionals data.
NOTES:
1. Content source for traffic originating at the server is determined by the server (not
client) command line.
2. loop2 and bidir2 modes 2 x <n> TCP connections and requires that the server has
even-numbered ports available.
-r rate <bps>: Limits aggregate transmission rate to <bps>. Default is no rate limit.
-t trans <min> [max]: Sets size of each socket transaction. Default is 64000.
If <min> and <max> are specified, client generates transactions with random sizes between
<min> and <max>. This feature is often used with -l and -r. Set the minimum transaction size
to 100000 to improve single-flow performance.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 343
Silver Peak Unity Orchestrator User Guide
Option Description
global Single global hash per flow. Fast, but cannot isolate an errored block.
literal Literal comparison of data upon reception. Fast, can isolate errors to the
byte level. Requires that server has same content as client. Use random
data gen or same -f file at server.
embedded Embedded hashes every 4096 bytes. Slower, can isolate errors to 4096
byte block.
-p repeat <n>: Repeat each content byte n times. Default is 1 (no repeats).
Works for both random data and file content.
-k corrupt <n> <m> <s> [<%change>[<%insert>[<%delete>]]] : Corrupt 0 to n bytes of data every m
bytes using seed s. Delta bytes will require 0.5*n/m percent overhead. Each corrupt may be a
change, insert or delete with the probability of each being specifiable. The default is 33.3%
changes, 33.3% inserts, and 33/3% deletes.
-x excerpts <b> <e> <l> [s]: Send random excerpts of average <l> length bytes from content
between <b>egin and <e>nd bytes. The -b and -e options still specify total bytes to send. Uses
random seed s.
-y defred <s% > <m%> <l%> <sb> <smin> <smax> <mb> <mmin> <mmax> <lb> <lmin lmax> :
Generate content based on defined reduction model.
Content is drawn from three data sets: s, m, and l:
s% Specifies fraction [50%] of s-type content (short term reducible).
Short term content comes from data set of sb Mbytes [100MB] with excerpts uniformly
distributed between smin and smax bytes [10K-1M].
Medium term content comes from data set of mb Mbytes [100GB] with excerpts uniformly
distributed between lmin and lmax bytes [10K-1M].
Long term content comes from data set of lb Mbytes [100TB] with excerpts uniformly
distributed between smin and smax bytes [10K-1M].
The -b and -e options still specify total bytes to send.
Performance is best if -b is 0.
Uses random seed s.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 344
Silver Peak Unity Orchestrator User Guide
Option Description
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 345
Silver Peak Unity Orchestrator User Guide
Disk Management
The Disk Management tab lists information about physical and virtual appliance disks.
If a row shows that a disk has failed, click Edit to access the appliance, and follow directions in the local help
for replacing the failed disk.
You can view the SMART [Self-Monitoring Analysis and Reporting Technology] data from physical appliance
disks.
2. Complete the wizard, using the serial number of the appliance (not the disk).
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 346
Silver Peak Unity Orchestrator User Guide
3. After you receive the new disk, access Appliance Manager by clicking any Edit icon that belongs to the
appliance in question.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 347
Silver Peak Unity Orchestrator User Guide
No reboot required.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 348
Silver Peak Unity Orchestrator User Guide
Reboot. Reboots the appliance gracefully. This is your typical "vanilla" restart.
Use case: You're changing the deployment mode or other configuration parameters that require a reboot.
Erase Network Memory and Reboot. Erases the Network Memory cache and reboots the appliance.
Use case: You need to restart the appliance with an empty Network Memory cache.
Shutdown. Shuts down the appliance and turns the power off. To restart, go to the appliance and physically
turn the power on with the Power switch.
Use case:
Unless a virtual appliance is configured for a high availability deployment, all flows are discontinued during reboot.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 349
Silver Peak Unity Orchestrator User Guide
Reboot. Reboots the appliance gracefully. This is your typical "vanilla" restart.
Use case: You're changing the deployment mode or other configuration parameters that require a reboot.
Erase Network Memory and Reboot. Erases the Network Memory cache and reboots the appliance.
Use case: You need to restart the appliance with an empty Network Memory cache.
Shutdown. Shuts down the appliance and turns the power off. To restart, go to the appliance and physically
turn the power on with the Power switch.
Use case:
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 350
Silver Peak Unity Orchestrator User Guide
Unless a virtual appliance is configured for a high availability deployment, all flows are discontinued during
reboot.
INFO To specify the timezone for scheduled jobs and reports, go to Orchestrator > [Software & Setup > Setup]
Timezone for Scheduled Jobs.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 351
Silver Peak Unity Orchestrator User Guide
Admin Username is the username that an Orchestrator server uses to log into an appliance.
An Orchestrator can use the web protocols, HTTP, HTTPS, or Both to communicate with an appliance.
Although Both exists for legacy reasons, Silver Peak recommends using HTTPS for maximum security.
Unknown is a transitional state that appears when first adding an appliance to the network.
Unreachable indicates a problem in your network. Check your ports, firewalls, and deployment
configuration.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 352
Silver Peak Unity Orchestrator User Guide
These tables display which users are logged in to Orchestrator and which appliances Orchestrator is managing.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 353
Silver Peak Unity Orchestrator User Guide
Orchestrator Administration
This section describes items related to managing Orchestrator itself. These activities do not relate to managing
appliances.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 354
Silver Peak Unity Orchestrator User Guide
The Role Based Access Control allows for a more specified experience of your Orchestrator UI. You can assign roles
and customize appliance access to a user, as well as specify the menu per user in the Orchestrator UI tree.
1. In the Role Based Access Control tab, select Assign Roles & Appliance Access.
2. Select the User field and enter a name for the user.
3. Select the Appliance field and select the name of the reference to the group's appliance that you created in
the Appliance Access tab.
The following table defines each default role you can select in step 4.
Field Definition
ConfigAdmin You can backup and restore appliance configuration and view the
configuration history.
OrchestratorAdmin Allows you to only perform Orchestrator operations, such as
settings, tools, user management, and Orchestrator upgrades.
Appliance operations are not allowed.
OverlayAdmin A global role for managing SD-WAN overlays.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 355
Silver Peak Unity Orchestrator User Guide
Field Definition
Roles
There is a set of default roles you can use. You can also create your own role or modify an existing one.
Field Definition
Role The name of the default role or the role you created.
Permission The permission you selected for a given user. Read-Write or Read-Only.
Features The accessible features for a given user.
To add a role:
2. Select Add or the Edit icon from the Roles window.
4. Select a category you want to assign to your user from the following tabs: Monitoring, Configuration,
Administration, Orchestrator, Support, or Miscellaneous.
5. Assign an access level to any of the categories: Select Read Only or Read & Write.
6. Check any of the boxes you want to apply to your role within the designated categories.
Appliance Access
You can also add specific versions of appliances to a user. Complete the following steps to customize appliance
access.
1. Select Create Appliance Access Groups in the Role Based Access Control tab. The Appliance Access
Group window opens.
2. Select Add or the Edit icon to modify or create an existing appliance rule.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 356
Silver Peak Unity Orchestrator User Guide
3. Select the name field and enter the name of the appliance.
4. Select whether you want to Select By Groups or Select By Region. You can add all groups or regions or just
select a few.
WARNING If you are an RBAC user with appliance access only (i.e. without any assigned roles, you will have access
to the Appliance Manager, CLI Session, and Broadcast CLI. If you are an RBAC user with any role assigned, access to
the Appliance Manager, CLI Session, and Broadcast CLI will be denied.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 357
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 358
Silver Peak Unity Orchestrator User Guide
Reboot Orchestrator Server is a more thorough restart, accomplished by rebooting the Orchestrator server.
Shutdown Orchestrator Server results in the server being unreachable. You will have to manually power on
the server to restart.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 359
Silver Peak Unity Orchestrator User Guide
The User Management page allows you to manage who has Read-Write or Read-Only access to Orchestrator.
Adding a User
Users can have either Read-Write or Read-Only privileges. These provide prescribed access to Orchestrator
menus.
To further limit the what users can see, you can assign them to customized menu groups in Orchestrator >
User Menu Access.
You cannot modify a Username. You must delete it and create a new user.
Multi-Factor Authentication
Silver Peak Orchestrators support Multi-Factor Authentication (MFA). This is available on all platforms of the Silver
Peak Orchestrator, including on-premise and cloud versions.
The first step in authentication is always username/password. For added security, users can choose between
Application or Email based authentication, as described below.
NOTE Currently, only admin users can only configure Multi-Factor Authentication, and only for themselves.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 360
Silver Peak Unity Orchestrator User Guide
1. To enable Multi-Factor Authentication, go to Orchestrator > User Management and click on your username.
2. For Two Factor, click Application. Orchestrator generates a time-limited QR code.
3. With the Google Authenticator app, use the Scan barcode function to read the QR code. You will also be
prompted to enter your Orchestrator username and password.
Here you can see Google Authenticator with the new admin account added for the Orchestrator, silverpeak-
gxv.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 361
Silver Peak Unity Orchestrator User Guide
2. For Two Factor, click Email and enter your email address.
If an invalid email address is entered, the account could be locked out and would require password reset
procedures.
3. After you click Add at the bottom of the dialog, Orchestrator sends you a time-limited authentication code via
email. To verify your email address, click that link.
Orchestrator then opens a browser window telling you that your email address has been verified.
Use the current token from the Google Authenticator (or other) app.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 362
Silver Peak Unity Orchestrator User Guide
Modify User
First Name, Last Name, and Phone Number are optional information.
This is a second step in the login process, where an authentication code is required.
Using an Authentication Application that generates time based authentication codes. If this is
activated a Barcode will be generated that can be scanned to set up an authentication app like Google
Authenticator for your mobile device.
Using your Email to receive authentication codes every time you log in. This requires access to your
email every time you log in.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 363
Silver Peak Unity Orchestrator User Guide
Use the User Menu Access page to create groups that have customized menu access privileges. Use these when
you want to limit which menus users can see.
For each group you create, select which menus will be visible to assigned users.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 364
Silver Peak Unity Orchestrator User Guide
To assign a group to a specific user, click Add User. The following popup appears.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 365
Silver Peak Unity Orchestrator User Guide
Remote Authentication
Orchestrator > Orchestrator Server > Users & Authentication > Authentication
The Remote Authentication page lets you manage different remote authentication methods for Orchestrator
users.
To view or modify the settings for an existing remote authentication method, click the edit icon for in the row
of the existing method.
RADIUS
TACACS+
OAuth
JWT
SAML
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 366
Silver Peak Unity Orchestrator User Guide
Field Description
Read-Write RADIUS only: The lowest value at which a user has Read-Write privileges. This value must
Privilege be the same as the value configured in the RADIUS server.
Read-Only RADIUS only:The lowest value at which a user has Read-Only privileges. This value must be
Privilege the same as the value configured in the RADIUS server.
Authentication Select the authentication type that matches what is configured on the RADIUS or TACACS+
Type server.
Primary/Secondary For each server in use, enter the IP address or hostname, port, and secret key of the
Server RADIUS or TACACS+ server.
Prerequisites
The OAuth server must support OAuth 2.0 authorization codes, ID tokens, and optionally refresh tokens.
The ID token is used to get username, RBAC roles, and RBAC appliance access groups.
The refresh token can be checked periodically to ensure the user is still authorized/valid.
Depending on the OAuth server configuration, refresh tokens may be permanent or they may expire. If a
token is revoked or expires, the user will be forced to authenticate again.
Before adding an OAuth server in Orchestrator, register a new app on your OAuth server for Orchestrator. You will
need to provide the following details when registering the app:
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 367
Silver Peak Unity Orchestrator User Guide
When adding a new OAuth server or modifying an existing server, you will need to configure the following fields in
the Remote Authentication Server dialog:
Field Description
Name A name to identify the server. This name will be displayed in a button on the Orchestrator login
page as an alternative method of authentication.
Client ID The client ID for the Orchestrator application that you created in your OAuth provider.
Client Secret The client secret for the Orchestrator application that you created in your OAuth provider.
Scopes OAuth 2.0 uses scope values, as defined in RFC6749, to specify which access privileges are
being requested for in Access Tokens. The default scopes for Orchestrator are openid, offline_
access, and email.
Authentication This is the Issuer Identifier URL with the authentication request path appended. For example:
URL https://<your-oauth-domain>/oauth2/v1/authorize
Token URL This is the Issuer Identifier URL with the token path appended. For example: https://<your-oauth-
domain>/oauth2/v1/token
Username key This is the OAuth attribute to be sent as the username. Use email if username is an email
address. If any other key is used, ensure that it is mapped to the correct scope in the oauth
server.
Roles key This field can be left with the default value, sp-roles, or you can enter a new key name, but the
(optional) 1 key name must match what is configured in your OAuth provider.
This is a user claim sent in the ID token that maps to Silver Peak Orchestrator roles defined in
Role Based Access Control (RBAC). For example, the OAuth server attribute userType maps to
sp-roles, and the OAuth user in Orchestrator has userType = OverlayAdmin.
Appliance This field can be left with the default value, sp-aag, or you can enter a new key name, but the key
Access Group name must match what is configured in your OAuth provider.
key (optional) This is a user claim sent in the ID token that maps to Silver Peak Orchestrator Appliance Access
1 Groups defined in Role Based Access Control (RBAC). For example, the OAuth server attribute
department maps to sp-aag, and the OAuth user in Orchestrator has department = Asia-Admin.
1 If roles and appliance access group keys are not provided, Orchestrator inspects its own
configuration to determine the role and appliance access group for the user. If it does not find
that information, the user is not allowed to log in.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 368
Silver Peak Unity Orchestrator User Guide
2. Under Servers, enter the information for a Primary server of that type.
Entering a Secondary server is optional.
Field Description
Authentication Order Whether to use the remote map or the local map first. The
default is Remote first.
Primary/Secondary Server The IP address or hostname of the RADIUS or TACACS+
server.
Secret Key The string defined as the shared secret on the server.
Read-Write Privilege The lowest value at which a user has Read-Write privileges.
This value must be the same as the value configured in the
RADIUS server.
Read-Only Privilege The lowest value at which a user has Read-Only privileges.
This value must be the same as the value configured in the
RADIUS server.
Authentication Type When configuring to use the TACACS+ server, select the
type from the drop-down list that matches what's
configured on the TACACS+ server.
Configuring a JWT Server
If you are adding JWT to Orchestrator through an SSO service (for example, through Okta) you will need to complete
the following:
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 369
Silver Peak Unity Orchestrator User Guide
Issuer 'iss'
Auditor 'aud'
expiration 'exp
signature
2. Click +Add New Server. The Remote Authentication Server window opens.
3. Select JWT from the Type drop-down menu and complete the following fields.
Field Description
Validation The maximum amount of time in minutes that the expiration is found for the id_token,
Window before a new id_token is created.
Username This attribute is sent as the username. Use email if username is an email address. If any
Key other key is used, ensure that it is mapped to the correct scope in the oauth server.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 370
Silver Peak Unity Orchestrator User Guide
Roles Key1 This field can be left with the default value, sp-roles, or you can enter a
new key name, but the key name must match what is configured in your
JWT provider.
This is a user claim sent in the ID token that maps to Silver Peak
Orchestrator roles defined in Role Based Access Control (RBAC). For
example, the OAuth server attribute userType maps to sp-roles, and the
OAuth user in Orchestrator has userType = OverlayAdmin.
Appliance This field can be left with the default value, sp-aag, or you can enter a new
Access
key name, but the key name must match what is configured in your
Group Key2
JWT provider.
This is a user claim sent in the ID token that maps to Silver Peak
Orchestrator Appliance Access Groups defined in Role Based Access
Control (RBAC). For example, the JWT server attribute department maps to
sp-aag, and the JWT user in Orchestrator has department = Asia-Admin.
JWT token This is the URL of Orchestrator that remains the same.
consuming
URL
Configuring a SAML Server
Orchestrator supports SAML 2.0 integration, providing authentication and authorization of your credentials through
an IdP (Identity Provider), SP (Service Provider), and a Principal. Refer to the list below for the represented meanings:
IdP: Okta
SP: Orchestrator
It is recommended to have Orchestrator open next to your Okta window while completing
these instructions.
1 If roles and appliance access group keys are not provided, Orchestrator inspects its own
configuration to determine the role and appliance access group for the user. If it does not find
that information, the user is not allowed to log in.
2 If roles and appliance access group keys are not provided, Orchestrator inspects its own
configuration to determine the role and appliance access group for the user. If it does not find
that information, the user is not allowed to log in.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 371
Silver Peak Unity Orchestrator User Guide
4. Sign in to Orchestrator and navigate to the Authentication tab (Orchestrator > Users & Authentication >
Authentication).
7. In Orchestrator, copy the ACS URL and the SP SLO Endpoint by clicking the icon next to the fields.
9. Enter the copied URLs in the following fields in the Step 2: Configure SAML section:
a. Paste the ACS URL in the Single Sign On URL and Audience URL (SP Entity ID) fields.
10. Specify the attributes and their corresponding values in the SAML Settings page. These are configured and
assigned in the RBAC tab in Orchestrator.
13. Click the View Setup Instructions box on the completed SAML Application Settings page and enter the
following URLs in the corresponding Orchestrator fields:
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 372
Silver Peak Unity Orchestrator User Guide
Refer to the table below for more details regarding the fields in Orchestrator.
Field Description
Name Any text value for your SAML account for identification purposes.
Username This attribute is used to retrieve the username from the SAML XML response.
Attribute
Issuer URL The unique identifier of the issuer (for example: Okta, OneLogin).
SSO Endpoint The unique endpoint for the SAML application created on the IdP server.
IdPX.509 cert A certificate issued by IdP to verify and validate the response received
from the IdP (Okta) server.
ACS URL The Orchestrator endpoint needed for configuration on the IdP server. This is provided
as a redirect URL once you are authenticated on the IdP server.
SP This endpoint is used by IdP to initiate the logout request from Orchestrator to the IdP
SLO Endpoint server.
(Optional)
IdP SLO This endpoint is used by IdP to initiate the logout request from
Endpoint
Orchestrator to the IdP server.
(Optional)
The endpoint used by Orchestrator (Silver Peak) to initiate the logout
request to IdP.
SP X.509 Cert A certificate used by IdP to verify the Single Logout request initiated by Orchestrator to
SLO (Optional) logout the IdP.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 373
Silver Peak Unity Orchestrator User Guide
Cloud Portal
Configuration> [Overlays > Licensing] Cloud Portal
Orchestrator > [Orchestrator Server > Licensing] Cloud Portal
The Cloud Portal is used to register cloud-based features and services, such as SaaS optimization and
EdgeConnect.
When you purchase one of these services, Silver Peak sends you an Account Name and instructions to
obtain your Account Key.You will use these to register your appliance(s).
The cloud portal populates the Contact field from information included in your purchase order.
Use of these services requires that your appliance(s) can access the cloud portal via the Internet.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 374
Silver Peak Unity Orchestrator User Guide
Orchestration Settings
The Orchestration Settings manage Business Intent Overlays (BIOs) and the properties used to control them. It
builds new tunnels and fixes existing ones.
Field Definition
Apply Overlays When selected, updates all associated appliances when overlay
changes are saved.
Reset All Flows When selected, Orchestrator will automatically reset all flows
whenever you edit overlays or change policies or priorities. When
deselected, the flows can only be reset manually.
Auto Save Appliance Selected by default, this automatically saves any changes made to an
appliance. If you need a time delay for troubleshooting or testing, you
can deselect this option to suspend automatic saving of configuration
changes.
Apply Templates When selected, updates all associated appliances when template
changes are saved.
Idle Time The amount of time Orchestrator sleeps or is idle between checking
for any configuration changes. For normal size networks, the
recommended idle time is 60 seconds. For smaller networks, 30
seconds is the recommended idle time.
Auto Flow Re-Classify Specifies how the Overlay Manager waits before surveying the
network when configuration changes are not being made.
Default Port By default, Business Intent Overlays create IPSec UDP tunnels.
Default Port is 10002. If necessary, you can configure this for an
individual appliance on its System Information page, under System
Settings. This is accessible from the appliance's context-sensitive
menu in Orchestrator's navigation pane.
Increment Port By Referenced when configuring an Edge HA (High Availability) pair.
When the value is 1000, the second appliance's default port would
become 11002.
Audit Logs
The Audit Logs tab list actions from a user or the system itself, initiated by Orchestrator.
You can select Completed, In Progress, or Queued filters to determine which actions you want to display in
the table.
You can select the following different log levels: Debug, Info, Error to apply to your filter.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 375
Silver Peak Unity Orchestrator User Guide
You can choose either Auto Refresh or Pause to refresh or pause the table. By default, the table refreshes
automatically.
You can enter in the Record Count. This limits the filtering criteria. The default value is 500 and 10,000 is the
maximum amount you can filter.
You can choose the name of the Appliance from the lists to apply as a filter.
You can also search a wild card character (*) as a user name and all user logs will display. If you enter any
value in the user field, there will be no filter applied to the search. The following are true for audit log wild
cards:
Field Definition
Username You can filter/search for an audit log by the user name of the appliance.
IP Address The IP address of the selected appliance.
Host Name The host name of the appliance the audit log is coming from.
Action What you want the audit log to do.
Task Status The status of the audit log task.
Results The results of the audit log being searched.
Start Time The time the search of the audit log started.
End Time The time the search of the audit log ended.
Queued Time The time the process/task was requested or scheduled in the queue.
Percent Completed The percent completed of the audit log task.
Completion Status Whether the task has been completed.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 376
Silver Peak Unity Orchestrator User Guide
When troubleshooting, you can pause Orchestration for the appliances in question.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 377
Silver Peak Unity Orchestrator User Guide
General
Mode Indicates whether the tunnel protocol is ipsec, ipsec_udp, udp, or gre.
If you select IPSec, you can specify the IKE version in the IKE tab.
Auto Max BW Enabled Allows the appliances to auto-negotiate the maximum tunnel bandwidth.
Auto Discover MTU Enabled Allows the appliances to auto-negotiate the maximum tunnel bandwidth.
MTU (Maximum Transmission Unit) is the largest possible unit of data that can be
sent on a given physical medium. For example, the MTU of Ethernet is 1500
bytes. Silver Peak provides support for MTUs up to 9000 bytes. Auto allows
the tunnel MTU to be discovered automatically, and it overrides the MTU
setting.
Packet
Reorder Wait The maximum time the appliance holds an out-of-order packet when
attempting to reorder. The packets can come from either the same or
different path, or from the FEC correction engine. 100ms is the default value
and should be adequate for most situations. If the reorder wait time exceeds
100ms (or the set value), the packet will be delivered out of order.
FEC (Forward Error Correction) can be set to enable, disable, and auto.
FEC Ratio When FEC is set to auto, this specifies the maximum ratio. The options are 1:2,
1:5, 1:10, or 1:20.
Tunnel Health
Retry Count Number of failed keep-alive messages that are allowed before the appliance
brings the tunnel down.
DSCP Determines which DSCP marking the keep-alive messages should use.
Fastfail Thresholds
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 378
Silver Peak Unity Orchestrator User Guide
Fastfail Thresholds Fastfail thresholds determine how quickly to disqualify a tunnel from carrying
data when multiple tunnels are carrying data between two appliances.
The Fastfail connectivity detection algorithm for the wait time from receipt of
last packet before declaring a brownout is:
Twait = Base + N * RTTavg
where Base is a value in milliseconds, and N is the multiplier of the average
Round Trip Time over the past minute.
For example, if:
Base = 200mS
N = 2
Then,
RTTavg = 50mS
The appliance declares a tunnel to be in brownout if it doesn’t see a reply
packet from the remote end within 300mS of receiving the most recent packet.
In the Tunnel Advanced Options, Base is expressed as Fastfail Wait-time
Base Offset (ms), and N is expressed as Fastfail RTT Multiplication Factor.
Fastfail Enabled – This option is triggered when a tunnel's keep-alive
signal doesn't receive a reply. The options are disable, enable, and
continuous. If the disqualified tunnel subsequently receives a keep-alive
reply, its recovery is instantaneous.
If set to disable, keep-alives are sent every second, and 30 seconds
elapse before failover. In that time, all transmitted data is lost.
If set to enable, keep-alives are sent every second, and a missed reply
increases the rate at which keep-alives are sent from 1 per second to
10 per second. Failover occurs after 1 second.
When set to continuous, keep-alives are continuously sent at 10 per
second. Therefore, failover occurs after one tenth of a second.
Thresholds for Latency, Loss, or Jitter are checked once every second.
Receiving 3 successive measurements in a row that exceed the
threshold puts the tunnel into a brownout situation and flows will
attempt to fail over to another tunnel within the next 100mS.
Receiving 3 successive measurements in a row that drop below the
threshold will drop the tunnel out of brownout.
IPsec Encryption Algorithm For encrypting tunnel data. Choose from auto, AES-256, or AES-128.
Latency The amount of latency measure in MS.
Loss The amount of data lost measured in percent.
Jitter The amount of jitter measured in MS.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 379
Silver Peak Unity Orchestrator User Guide
FastFail Wait-Time Base The base time used when you calculate the fastfail timeout.
Offset
FastFail RTT Multiplication The multiplier in the formula used to calculate the fastfail timeout.
Factor
IKE
Authentication Algorithm This is for setting tunnel authentication. Choose from SHA-1,
SHA2-256, SHA2-384, or SHA2-512.
Encryption Algorithm Specifies the encryption algorithm used for the Phase 1
negotiation. Choose from AES-256, AES-128, or auto.
Diffie-Hellman Group The Diffie-Hellman group used for IKE SA negotiation.
Lifetime The lifetime of IKE SA.
Dead Peer Detection Delay time: the amount of time, in seconds, to wait for traffic
from the destination IKE peer.
Retry Count: the number of times to retry the connection before
determining that the connection is dead.
IPSec
Authentication Algorithm The authentication algorithm used by IPSec SA.
Choose from SHA-1, SHA2-256, SHA2-384, or
SHA2-512.
Encryption Algorithm Specifies the encryption algorithm used for the
Phase 1 negotiation. Choose from AES-256, AES-
128, or auto.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 380
Silver Peak Unity Orchestrator User Guide
Enable IPsec Anti-replay Window Select if you want to enable the IPSec anti-replay
window. If selected, protection is provided against
an attacker duplicating encrypted packets by
assigning a unique sequence number to each
encrypted packet. The default window size is 64
packets.
Lifetime The lifetime of IKE SA.
Perfect Forward Secrecy Group Specifies the Diffie Hellman Group exponeniations
used for IPSec SA negotiation.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 381
Silver Peak Unity Orchestrator User Guide
Use this page to create and export a configuration that Orchestrator-SP can use as a template for other
Orchestrators.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 382
Silver Peak Unity Orchestrator User Guide
Brand Customization
Orchestrator > [Orchestrator Server > Tools] Brand Customization
Use this menu to customize the branding elements of Orchestrator's user interface.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 383
Silver Peak Unity Orchestrator User Guide
Maintenance Mode
You can put one or more appliances in maintenance mode by selecting the specific appliance in the tree. Upon
approval, the appliances are added to the maintenance list. You can also put an appliance in maintenance mode by
searching "Maintenance Mode" in the search bar or by right-clicking on any appliance and selecting Maintenance
Mode. Complete the following steps to add an appliance to maintenance mode.
4. Check Suppress Alarms if you want to suppress alarms associated with this appliance while in maintenance
mode.
NOTE The appliance goes into maintenance mode if you pause orchestration and/or suppress all alarms.
Field Definition
Host Name The host name of the appliance you are adding to maintenance mode.
Alarms Whether you chose to suppress or not suppress your alarms while the
appliance is in maintenance mode.
Orchestration If paused, all orchestration is paused on the selected appliance, except IPSec
UDP Tunnel Key material.
IP The IP address of the appliance in maintenance mode.
Version The current version of the appliance.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 384
Silver Peak Unity Orchestrator User Guide
WARNING An upgrade that fails can put Orchestrator into a corrupt state. Be sure to back up Orchestrator before
you start the upgrade process.
su - root
4. Enter the root password when prompted. Contact Silver Peak TAC if you don't know your root password.
cd /home
Depending on your environment, you can upgrade Orchestrator in one of two ways:
If you have an HTTP URL to the Orchestrator installation file, enter the following in the existing SSH console to run the
install script and point it to the hosted installation file:
Upgrade via SCP
If you don't have an HTTP server, copy the installation file to Orchestrator via using SCP, then run the install script
and point it to the local installation file:
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 385
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 386
Silver Peak Unity Orchestrator User Guide
These pages show what appliance and Orchestrator server software is available for download.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 387
Silver Peak Unity Orchestrator User Guide
Backing Up on Demand
Orchestrator > [Software & Setup > Backup] Backup Now
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 388
Silver Peak Unity Orchestrator User Guide
TIP To specify the timezone for scheduled jobs and reports, go to Orchestrator > [Software & Setup > Setup]
Timezone for Scheduled Jobs.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 389
Silver Peak Unity Orchestrator User Guide
For permanent, private email delivery, change the SMTP (Simple Mail Transfer Protocol) server and settings to your
company’s SMTP settings.
After configuring the SMTP settings, you can specify email recipients for:
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 390
Silver Peak Unity Orchestrator User Guide
Proxy Configuration
Orchestrator > [Software & Setup > Setup] Proxy Configuration
If necessary (for example, because of firewall issues), you can configure a proxy for reaching the Silver Peak portal.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 391
Silver Peak Unity Orchestrator User Guide
Orchestrator includes a self-signed certificate that secures the communication between the user's browser and
Orchestrator. You also have the option to install your own custom certificate, acquired from a CA authority.
1. Consult with your IT security team to generate a certificate signing request (CSR), and submit it to your
organization's chosen SSL Certificate Authority (CA).
Examples of Certificate Authorities include GoDaddy, Verisign, Comodo, Symantec, Microsoft Entrust,
GeoTrust, etc.
For a list of what Silver Peak supports, see Silver Peak Security Algorithms.
If your IT security team advises the use of an Intermediate CA, then use an Intermediate Certificate
File. Otherwise, skip this file.
Upload the Private Key File that was generated as part of the CSR.
3. To associate the CA verified certificate for use with Orchestrator, click Upload.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 392
Silver Peak Unity Orchestrator User Guide
Use this page to set the timezone for scheduled jobs and reports.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 393
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 394
Silver Peak Unity Orchestrator User Guide
IMPORTANT: Changing the default values of these settings is not recommended without consulting Silver Peak.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 395
Silver Peak Unity Orchestrator User Guide
IMPORTANT: Changing the default values of these settings is not recommended without consulting Silver Peak.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 396
Silver Peak Unity Orchestrator User Guide
Use this form to change what level of server-side Orchestrator logs are retained.
The default is INFO.
Level Definition
The bolded part of the name is what displays in Silver Peak's logs.
If you select INFO (the default), then the log records any event with a severity of INFO, WARNING, and ERROR.
These are purely related to event logging levels, not alarm severities, even though some naming conventions
overlap. Events and alarms have different sources. Alarms, once they clear, list as the ALERT level in the
Event Log.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 397
Silver Peak Unity Orchestrator User Guide
IP Whitelist
Orchestrator > [Software & Setup > Setup] IP Whitelist
IP Whitelist is a feature that restricts access to Orchestrator to a specified list of source subnets.
If a source IP address changes (for example, with NAT IP), then users can get locked out Orchestrator.
To view a list of traffic that's been dropped because of these restrictions, click IP Whitelist Drops.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 398
Silver Peak Unity Orchestrator User Guide
When you first install Orchestrator and use a web browser to access the IP address you’ve assigned it, Orchestrator's
Getting Started Wizard appears.
EdgeConnect registration is required for Cloud-based features and products, including CPX and SaaS.
The associated Account Name and Account Key enable Orchestrator to discover EdgeConnect
appliances via the Silver Peak Cloud Portal, as they’re added to your network.
If you have NX, VX, and VRX appliances, you will also have an Orchestrator License.
Date/Time
Silver Peak strongly recommends using an NTP server so that data across Orchestrator and the
appliances is synchronized.
Change the default settings to your Company’s SMTP server, and then test.
Separate fields are provides for Global Report recipients and Alarm recipients.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 399
Silver Peak Unity Orchestrator User Guide
Add Appliances
[Optional] You can use this now to add NX, VX, and VRX appliances that are already up and running in
your network. Or you can add them later.
Backup
Specifies the database backup destination, transfer protocol, and backup schedule.
If you don’t Apply the configuration after you complete the last page, Orchestrator’s wizard reappears at your next
login.
To access the Orchestrator wizard again after initial configuration, go to Orchestrator Administration > Getting
Started Wizard.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 400
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 401
Silver Peak Unity Orchestrator User Guide
You can filter between the five different file types: All, Logs, Sys Dump, Snapshot, and TCP Dump. The table in this tab
displays the following:
Field Description
Appliance Name The name of the appliance that the logs are coming from
File type The type of file.
File Name The name of the file.
Last Modified The date the file was modified last.
File Size The size of the file.
Download to Orchestrator
Complete the following steps if you want to download selected files to your local Orchestrator server.
The Monitor Transfer Progress window openss that provides a status of the file downloads. You can also cancel a
download at any time by selecting Cancel.
Field Definition
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 402
Silver Peak Unity Orchestrator User Guide
1. Select a file you want to download to your local under File Type in the table.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 403
Silver Peak Unity Orchestrator User Guide
When you have a Silver Peak account and need technical assistance or customer support, select Support > Tech
Support. The following page opens in a separate browser tab.
You can also access this page directly by going Silver Peak’s web page and selecting Support > Customer Login
from the menu bar.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 404
Silver Peak Unity Orchestrator User Guide
Monitoring Uploads
Support > [Technical Assistance] Monitor Uploads
This table displays the current status of any files being uploaded to Support.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 405
Silver Peak Unity Orchestrator User Guide
Packet Capture
Support > [Technical Assistance] Packet Capture
When requested by Support, use this screen to capture packets from one to five appliances, selected in the
navigation pane.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 406
Silver Peak Unity Orchestrator User Guide
Use this dialog to upload files related to your Support case from your computer.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 407
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 408
Silver Peak Unity Orchestrator User Guide
Remote Access
When working with Silver Peak Support to troubleshoot, you may be asked to allow access to you EdgeConnect
devices during the online support session.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 409
Silver Peak Unity Orchestrator User Guide
Partition Management
You can use this table to regain Orchestrator disk space by selectively eliminating stats you no longer need.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 410
Silver Peak Unity Orchestrator User Guide
2. Select the type of receiver you want to use from the list.
3. Depending on which receiver you choose, a settings pop-up will appear. Enter the appropriate information for
each receiver. See the following tables below for each receiver's settings.
HTTP Receiver Settings
Field Definition
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 411
Silver Peak Unity Orchestrator User Guide
SYSLOG Receiver Settings
Field Definition
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 412
Silver Peak Unity Orchestrator User Guide
WEBSOCKET Receiver Settings
Field Definition
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 413
Silver Peak Unity Orchestrator User Guide
The Routing Peer Table page can be used to track the communication between multiple peers within a network and
for troubleshooting purposes. This page also reflects the details of the subnet information being shared between
each set of peers.
The following table describes the values for the Routing Peers table.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 414
Silver Peak Unity Orchestrator User Guide
RMA Wizard
Support > [Technical Assistance] RMA
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 415
Silver Peak Unity Orchestrator User Guide
RMA Wizard
The RMA (Return Merchandise Authorization) Wizard automates the RMA process for an exchange or replacement
of your appliance, if needed. It includes appliance discovery, the version of the appliance, and a backup selection.
Upgrade or downgrade the new appliance to the same software version before shipping to the site. This will
save time.
When Orchestrator discovers the new device, do not approve it. Start the following RMA process to move the
license to the new EdgeConnect.
2. Select the appliance you want to replace from the menu.
NOTE The IP address, appliance model, hostname, serial number and software version will auto-populate
once you select the appliance.
3. Select the incoming discovered appliance you are going to use to replace the previous appliance.
NOTE The IP address, appliance model, hostname, serial number and software version will auto-populate
once you select the appliance.
6. The Applying Configuration page will open if you This page lists the status of the upgrading appliance and
restore configuration.
If you choose to add a backup appliance from the table, complete the following steps.
2. Select the version you want the backup appliance to have from the drop down menu.
NOTE If your selection results in a software downgrade, a backup must be provided.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 416
Silver Peak Unity Orchestrator User Guide
If the software version you selected for your backup appliance is lower than that of the discovered appliance, you will
need to do the following:
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 417
Silver Peak Unity Orchestrator User Guide
Built-in Policies
This table displays read-only built-in policies, which are executed before any other policies.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 418
Silver Peak Unity Orchestrator User Guide
Realtime Charts
As an aid to troubleshooting, Realtime Charts are useful for monitoring the performance of individual appliances.
You can save sets of charts as dashboards.
2. To save as a dashboard, click Save As, then enter a name for your dashboard. Don't include spaces in your
name. Click Save.
If successful, a green Success bar appears and the dashboard name shows up in the Dashboard field.
To retrieve it later, go to this page and choose the dashboard from the drop down list.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 419
Silver Peak Unity Orchestrator User Guide
Historical Charts
As an aid to troubleshooting, Historical Charts are useful for reviewing the performance of individual appliances.
You can save sets of charts as dashboards.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 420
Silver Peak Unity Orchestrator User Guide
Appliance Charts
Support > [Reporting] Appliance Charts
Use this screen to access an individual appliance's realtime and historical charts.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 421
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 422
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 423
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 424
Silver Peak Unity Orchestrator User Guide
System Performance
This tab shows Orchestrator metrics.
Orchestrators located in the cloud cannot display useful information about host memory, file descriptors, sockets, or
pipes.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 425
Silver Peak Unity Orchestrator User Guide
This report lists appliance crashes, which you can forward to Silver Peak.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 426
Silver Peak Unity Orchestrator User Guide
Orchestrator Debug
Support > [Reporting] Orchestrator Debug
This screen contains the various debugging tools available to Support for troubleshooting and debugging issues with
Orchestrator.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 427
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 428
Silver Peak Unity Orchestrator User Guide
Unverified Emails
Support > [Reporting] Unverified Emails
When you add an email address to either the Alarms or the Reports distribution, Orchestrator sends the recipient an
email containing a link, asking them to click to provide verification.
If Orchestrator doesn't receive a verification, then either the recipient hasn't responded or the email address is
invalid.
You can only correct an email address in the Alarm or Reports email distribution list.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 429
Silver Peak Unity Orchestrator User Guide
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 430
Silver Peak Unity Orchestrator User Guide
There should be at least one lower case letter and one upper case letter.
Copyright © 2020 Silver Peak Systems, Inc. All rights reserved 431