SD-WAN
Architecture
Using the web application
Spaces
Bonds
Aggregators
Nodes
Private WAN
Dynamic Routing
Policies
Users, groups, and permissions
Extending SD-WAN
Installing Elastic stack for IPFIX collection
Firewall management
Legacy DHCP server
Nagios integration
Network bridging on bonders
PXE provisioning server
SNMP integration
API
Hooks
Node configuration management with SaltStack
Administration
IPv6 Compatibility
Technical support
Software releases and upgrades
Application Notes
Release notes
Service bulletins
Appendices
SD-WAN
»
Extending SD-WAN
Extending SD-WAN
¶
SD-WAN can be extended and customized in a number of ways, including:
Installing Elastic stack for IPFIX collection
Installing the Elastic stack
Configuring Logstash to accept IPFIX data
Installing a frontend webserver
Configuring Kibana to index the data
Contents of the data
Creating visualizations
Creating dashboards
Firewall management
nftables (6.6 and above)
Iptables (6.5 and below)
Legacy DHCP server
Checking for manually installed DHCP servers
Removal
Scenario
Configure bond
Configure DHCP server
Test
Nagios integration
Examples
Network bridging on bonders
Limitations
Configuration
Test
PXE provisioning server
System requirements
Install packages
Configure services
Set up TFTP Directory
SNMP integration
Update list of trusted networks
Install SNMP agent and related packages
Configure SNMP agent
Restart and test
API
Access control and throttling
API examples
API versions and deprecation
Development resources
Filtering, pagination, ordering, and excluding fields
HTTP methods, status codes, and headers
URIs
What’s this for?
Browsing the API
Hooks
Addressing hooks
Bond hooks
Connected IP hooks
CPE NAT IP hooks
Interface hooks
Leg hooks
Private WAN router space hooks
Route hooks
Traffic shaping hooks
Tunnel device hooks
Hook locations, arguments, and environments
Timeouts
Node configuration management with SaltStack
Common Salt commands and states
Example Salt state – bonder DHCP server
Example Salt state – custom firewall for space
Salt core concepts
Default managed files
Customizing configuration management
Security considerations
Further information