SDWAN FAQs – Branch Edge

FAQs

1. What is the general functionality and main components of Teldat’s solution?

2. What are the possible choices for “Branch Edge”?

3. Is it possible to select the LAN IP address range of each branch office manually?

4. How are assigned the IP addresses in the LAN in each remote office?

1. What is and which is the role of the “Branch Edge” Element?

It is the element in the remote point making the nexus between the customer’s LAN network and the SDWAN network. The main functions are: connection with the LAN network(s), connection with the WAN network(s), setup the overlay through the Datacenter Edge, generate the probes and measure SLA, identify services/applications, apply QoS and decide SLA-based on routing policies.

2. What are the possible choices for “Branch Edge”?

The following Teldat routers: Teldat-V, Teldat-M1, Teldat-iM8, Atlas-60, Atlas-i70, Teldat-H2Auto, H2Auto-Teldat + and Teldat-H2Rail.

3. Is it possible to select the LAN IP address range of each branch office manually?

Yes, the user can define from a big IP address range, the group of IP addresses that are assigned to a specific branch office.

4. How are assigned the IP addresses in the LAN in each remote office?

In the remote office template, the user defines which LAN profiles are assigned. A LAN profile is a configuration for the LAN that sets the maximum number of IP addresses that can be assigned to a specific ‘User Group’ (for example 16 IP addresses for phones and 8 IP addresses for Guest users), if VLANs are used from the router to the LAN and how are the IP address assigned.

CNM allows three different methods to assign the IP addresses to the user devices:

  • Manually: there is not DHCP configured in the device.
  • By DHCP:
      • DHCP Server: the DHCP server is in the same network as the devices
      • DHCP Relay: the DHCP server is not in the same network. In this case, to provide the DHCP server IP address is required.

Read our latest Blog Posts

Quadruple Extortion in Ransomware: The Evolution of Cybercrime

Quadruple Extortion in Ransomware: The Evolution of Cybercrime

The advance of the Internet and new technologies has led to major developments in companies and organizations, but it has also led to a large number of threats in the field of cybersecurity. The Evolution of Ransomware to Quadruple Extortion Ransomware has emerged as...

The Importance of Cybersecurity in the Healthcare Sector

The Importance of Cybersecurity in the Healthcare Sector

In recent decades, the healthcare sector has undergone a profound digital transformation, enhancing efficiency in patient care and information management. However, this shift has also made healthcare organizations more vulnerable to cyberattacks. The systems handle...