: SD-WAN Source Tab
Focus
Focus

SD-WAN Source Tab

Table of Contents
End-of-Life (EoL)

SD-WAN Source Tab

Source tab in the SD-WAN policy rule configuration window.
  • PoliciesSD-WANSource
Select the Source tab to define the source zones, source addresses, and source users that define the incoming packets to which the SD-WAN policy applies.
Field
Description
Source Zone
To specify a source zone, select Add and select one or more zones, or select Any zone.
Specifying multiple zones can simplify management. For example, if you have three branches in different zones and you want the remaining match criteria and path selection to be the same for the three branches, you can create one SD-WAN rule and specify the three source zones to cover the three branches.
Only Layer 3 type zones are supported for SD-WAN policy rules.
Source Address
To specify source addresses, Add source addresses or external dynamic lists (EDL), select from the drop-down, or select Address and create a new address object. Alternatively, select Any source address (default).
Source User
To specify certain users, select Add (the type then indicates select) and enter a user, list of users, or groups of users. Alternatively, select a type of user:
  • any—(default) Include any user, regardless of user data.
  • pre-logon—Include remote users who are connected to the network using GlobalProtect™, but are not logged into their system. When the Pre-logon option is configured on the Portal for GlobalProtect apps, any user who is not currently logged into their machine will be identified with the username pre-logon. You can then create policies for pre-logon users and although the user is not logged in directly, their machines are authenticated on the domain as if they were fully logged in.
  • known-user—Includes all authenticated users, which means any IP address with user data mapped. This option is equivalent to the “domain users” group on a domain.
  • unknown—Includes all unauthenticated users, which means IP addresses that are not mapped to a user. For example, you could select unknown for guest-level access to something because they will have an IP address on your network, but will not be authenticated to the domain and will not have IP address-to-user mapping information on the firewall.
If the firewall collects user information from a RADIUS, TACACS+, or SAML identity provider server and not from the User-ID™ agent, the list of users does not display; you must enter user information manually.