SDWAN FAQs – Branch Edge
FAQs
1. What is the general functionality and main components of Teldat’s solution?
2. What are the possible choices for “Branch Edge”?
3. Is it possible to select the LAN IP address range of each branch office manually?
4. How are assigned the IP addresses in the LAN in each remote office?
1. What is and which is the role of the “Branch Edge” Element?
It is the element in the remote point making the nexus between the customer’s LAN network and the SDWAN network. The main functions are: connection with the LAN network(s), connection with the WAN network(s), setup the overlay through the Datacenter Edge, generate the probes and measure SLA, identify services/applications, apply QoS and decide SLA-based on routing policies.
2. What are the possible choices for “Branch Edge”?
The following Teldat routers: Teldat-V, Teldat-M1, Teldat-iM8, Atlas-60, Atlas-i70, Teldat-H2Auto, H2Auto-Teldat + and Teldat-H2Rail.
3. Is it possible to select the LAN IP address range of each branch office manually?
Yes, the user can define from a big IP address range, the group of IP addresses that are assigned to a specific branch office.
4. How are assigned the IP addresses in the LAN in each remote office?
In the remote office template, the user defines which LAN profiles are assigned. A LAN profile is a configuration for the LAN that sets the maximum number of IP addresses that can be assigned to a specific ‘User Group’ (for example 16 IP addresses for phones and 8 IP addresses for Guest users), if VLANs are used from the router to the LAN and how are the IP address assigned.
CNM allows three different methods to assign the IP addresses to the user devices:
- Manually: there is not DHCP configured in the device.
- By DHCP:
-
- DHCP Server: the DHCP server is in the same network as the devices
- DHCP Relay: the DHCP server is not in the same network. In this case, to provide the DHCP server IP address is required.
-
Read our latest Blog Posts
Dead Reckoning on how to improve road transport navigation
Dead Reckoning is the process of calculating the current position of an object based on estimates. Despite its origins in seafaring, it can have a significant impact on road transport. In a world dominated by GNSS technologies, understanding the implications of Dead...
Cybersecurity vulnerabilities are affecting to suppliers and customers
In addition to being a data protection tool, cybersecurity software is the first line of defense against external threats or cybersecurity vulnerabilities. So, what happens if the software itself is vulnerable? In the last few years, we’ve seen how attackers exploit...
Developing a Robust Disaster Recovery Plan in the Cloud
In an increasingly digital world, businesses depend on cloud-based systems for everything from data storage to critical applications. While the cloud offers significant benefits—such as scalability, flexibility, and cost efficiency—it also presents new challenges in...