: Use Case 3 - Protect Physical Security on LEO Satellite and 5G
Focus
Focus

Use Case 3 - Protect Physical Security on LEO Satellite and 5G

Table of Contents

Use Case 3 - Protect Physical Security on LEO Satellite and 5G

Use case to protect physical security on LEO satellite and 5G.
Where Can I Use This?
What Do I Need?
  • Prisma SD-WAN
  • Active
    Prisma SD-WAN
    license
In this scenario, the business has many locations in remote geographies where high speed wire line connectivity is unavailable. These locations have strict requirements for physical security including video and audio surveillance as well as access control. This traffic is tolerant to latency and jitter but loss can severely impact operations. Due to the bandwidth demands both primary connections must be used actively.
RTP-Base, RTP-Audio, RTSP, SIP, RTP-Video, and HID are configured with these path policy rules:
  • Active Paths:
    • Prisma SD-WAN VPN on LEO Satellite Internet.
    • Prisma SD-WAN VPN on Unmetered Public 5G.
  • Backup Paths: None
  • L3 Failure Paths: Prisma SD-WAN VPN on Internet ADSL.
Performance Policy Intent
  • Use both of the Active Paths as long as they are SLA compliant.
  • Use Link Quality Monitoring (LQM) information available from the Branch to Data Center VPNs to control Packet Duplication for any observed packet loss onto the active paths.
  • If neither of the Active Paths are SLA compliant then begin to duplicate packets onto each of the active paths.
  • If one of the two Active Paths is down and the other is degraded, perform single link packet duplication.
  • Use the Internet ADSL Path if all of the Active Paths are down (not degraded).
  • Generate an Incident to be forwarded to operations in case of non compliance with the SLA metrics.
Configure the Policy Rule
  1. Select the desired policy set from
    Manage
    Prisma SD-WAN
    Policies
    Performance
    .
  2. Select
    Add Rule
    and enter the
    Name
    as
    Protect Physical Security Traffic
    ,
    Description
    (optional), and the
    Order Number
    (optional).
    More specific rules should be organized at the top of the Policy Set list, else a less specific policy rule may be matched first.
  3. In the
    Actions
    section, select
    Packet Duplication
    ,
    Move Flows
    , and
    Create Incident
    .
  4. In the
    Match Criteria
    section, under
    App Filters
    , select the applications
    RTP-Base
    ,
    RTP-Audio
    ,
    RTSP
    ,
    SIP
    ,
    RTP-Video
    , and
    HID
    from the drop-down, select the category in
    Path Filters
    as
    LEO Satellite Internet
    and
    Unmetered Public 5G
    . Select the
    Path Type
    as
    Prisma SD-WAN VPN
    .
  5. In the
    Performance SLAs
    section, click
    Add New
    , and check the option
    Link Quality Metrics
    . Enter the
    SLA Name
    as
    Physical Security SLA
    .
  6. In
    Link Quality Metrics
    , enter the
    Jitter
    value as 50 ms.
    This will use the best (lowest) measured Jitter value between the branch and all data centers on a per branch circuit basis.
  7. Click the
    +
    sign to enter the
    Latency
    value as 200 ms and the
    Packet Loss
    value as 1%.
  8. Retain the
    Advanced Settings
    at their default values.
  9. Review the
    Summary
    of the policy settings for the desired policy intent and
    Save & Exit
    .
Summary
: Implementing the Performance Policy rule for Physical Security ensures the delivery of the business critical traffic by mitigating consistent loss in the transport networks. The impact of the rule is easily monitored using the App Site Details, Link Quality Metrics, and Flow Browser.

Recommended For You