SDWAN FAQs – Self-provision / Configuration Synchronization 

FAQs

1. What is meant by self-provision?

2. What does configuration synchronization mean?

3. What licenses are required?

4. How is ensured that the self-provision is carried out at the specified location?

5. How can be restricted the use of a Branch Edge in an unsure access network (theft of equipment and subsequent installation in an unauthorized internet access?

1. What is meant by self-provision?

The process whereby a factory setting device (Branch Edge or Datacenter Edge), is able to receive and apply their settings automatically when is connected to the network, without any local action done on the device. This equipment contacts with CNM, identifies itself, and receives its configuration in a secure way.

2. What does configuration synchronization mean?

Configuration Synchronization is the process in which devices automatically download their configuration from CNM when anything has been changed in the data model. It could be said that the self-provision is a special case of it, since it is occurring the 1st time that the device is installed after leaving the factory.

3. Which protocols are used and which is the security level in the communications?

HTTPS (SSL/TLS) is used. CNM server is identified by a digital certificate to avoid spoofing and information is authenticated and encrypted in both directions. Optionally HTTP can be used if encryption is not desired or you cannot use port 443 (HTTP uses port 80).

4. How is ensured that the self-provision is carried out at the specified location?

In remote devices you need to enable Netflow on the WAN interface and configure the Netflow parameters of the server to which traffic is to be exported. Optionally, Access Control Lists associated with route-maps and labels in the Netflow protocol to label different traffic categories and enabling level-7 application detection when there is a DPI license. In the server, optional Dashboard generation to present information according to user preferences.

5. How can be restricted the use of a Branch Edge in an unsure access network (theft of equipment and subsequent installation in an unauthorized internet access)?

There are currently several mechanisms to avoid this case. One possibility is to detect if a remote point is disconnected more than certain time (which could mean that the remote device is being transferred to another place), and disable connectivity to the network; in case of false alarm, it could be activated by a manual intervention in CNM.

Read our latest Blog Posts

Advances in eSIM technology in the transport sector

Advances in eSIM technology in the transport sector

In our increasingly connected world, communications play a pivotal role in our everyday lives. Whether it’s staying in touch with friends and family, working remotely, or simply browsing the internet, having reliable connectivity is crucial. Within this context, eSIM...

ATM monitoring for visibility and security

ATM monitoring for visibility and security

Like every year, Teldat has been taking part as sponsor in the 5B digital Summit, sharing innovative connection ideas for bank ATMs servicing millions of people around the world. We have exchanged viewpoints with other companies that, just like us, are part of the ATM...