- Products
- Learn
- Local User Groups
- Partners
- More
The State of Ransomware Q1 2026
Key Trends and Their Impact
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Quantum SD-WAN is often introduced as “dynamic WAN link selection.” Technically, it’s closer to a policy-controlled, measurement-driven path selection engine that influences per-connection egress and VPN transport—without requiring dynamic routing for the decision itself.
Below is a more technical walkthrough: what is computed, what is installed, what is enforced, and why “policy looks right” can still produce unexpected paths.
Quantum SD-WAN enables a Security Gateway / Cluster to select an egress ISP interface or VPN transport per connection based on:
Classification (source/destination/identity + service/application)
Measured link quality (latency/jitter/loss, optionally utilization)
Rule steering intent (prioritization / link aggregation / breakout vs overlay/backhaul)
What it is not: a replacement for routing protocols. Routing still provides reachability; SD-WAN provides path selection logic layered on top of reachability.
Operational implication: you don’t “route to ISP1/ISP2”; you steer sessions to a link/transport chosen by the SD-WAN engine.
A useful separation:
SD-WAN policy definition (Infinity Portal)
WAN link objects, thresholds, measurement targets
SD-WAN steering computation (probes → eligibility → selection)
Installation of steering state for enforcement (tables/state on the gateway)
Telemetry/event publication (iNext/Nano + cpview)
Connection setup and forwarding decisions
NAT, access control, IPS/Threat Prevention enforcement
VPN encapsulation and transport selection for overlay/backhaul
Failover behavior at runtime (within allowed/preferred sets)
Key rule: SD-WAN steering decisions are only applied after Security Policy allows the traffic. SD-WAN cannot “force” a denied flow to go out a different ISP.
Two ISPs at a branch:
Zoom → ISP #1
Microsoft 365 → ISP #2
What’s happening under the hood is not “PBR in the classical sense,” but:
session classification (app/service/identity)
link health evaluation against thresholds
selection of eligible ISP(s)
installation of that choice so the connection setup pipeline uses the correct egress interface
If a failover happens and your policy uses aggregation, per-flow path choice can change due to hashing, even with the same rule.
Goal: choose the best ISP interface for direct Internet traffic.
Enforcement point: firewall connection handling chooses a WAN interface based on steering state.
Common failure pattern: app classification ambiguity → wrong rule match → wrong ISP.
Goal: for each VPN peer pair, select the best VPN transport (underlay link/interface) to carry encrypted traffic.
Enforcement point: VPN subsystem chooses the transport for the tunnel/session based on steering state.
Common failure pattern: peers/transport eligibility not installed correctly → VPN uses a default or “last known good” path.
Composite pipeline:
Branch → HQ: overlay transport selection (VPN)
HQ → Internet: breakout selection (ISP egress)
Troubleshooting must split both legs. People often debug only one side.
An SD-WAN policy is an ordered rulebase. Each connection is evaluated against:
IP address / network objects
Identity (User / Computer Identity)
Destination objects (including Updatable Objects)
Service ports (HTTPS, FTP, etc.)
Application signatures (e.g., Zoom/Teams categories, depending on what is supported and enabled)
A critical nuance: application identification on the first packet is not always deterministic.
Examples:
multiple SaaS apps behind the same IP/CDN
TLS where SNI is missing/obfuscated early
traffic patterns that require more packets for confident classification
Why this matters: steering is ideally decided at/near connection setup; if classification matures later, you can see:
initial steering based on coarse match (destination/service)
then “it looks like the app is X” but the session is already pinned to an ISP/transport
Best practice (technical reasoning): use Updatable Objects in Destination whenever possible. This increases the chance that the rule matches accurately early (even when application classification is ambiguous).
A steering rule is not just “send app X to ISP Y.” It defines:
Measurement targets
What is probed to represent “Internet quality” or “reachability” per link.
Quality criteria + thresholds
Latency, jitter, loss (and potentially utilization) thresholds that determine link eligibility.
Selection method
Prioritization: pick the best/priority candidate among eligible links/transports
Link aggregation: mark multiple candidates as eligible; per-flow selection may be done by hashing/aggregation method
Important: eligibility comes first. If all links fail thresholds, the result can be “no eligible ISP/transport,” which is often misread as “SD-WAN is broken” when it is behaving correctly.
Typically measured via active probing (quality check) to one or more targets.
Decision is per rule: different apps can have different thresholds.
Adds a capacity dimension: a link could be “healthy” but saturated, so it becomes less preferred.
This is often where teams need to align with business intent: latency-sensitive apps vs bulk traffic.
Even with a perfect policy, poor probing design causes bad decisions:
probing targets not representative (e.g., a single target that’s sometimes rate-limited)
too infrequent probing → slow reaction
too aggressive probing → noise/false degradation
thresholds that don’t match realistic ISP behavior
To have deterministic steering, you need consistency across four planes:
SD-WAN interfaces configured consistently on all members
correct WAN link binding (interface mapping)
Nano Agent + SD-WAN services healthy (where applicable)
consistent reachability (routing) for probe targets and peer endpoints
Access Control must allow the traffic that you expect SD-WAN to steer
NAT rules must not accidentally “force” an egress path (e.g., implicit NAT assumptions)
VPN domain/topology must align with overlay/backhaul design
objects exist and are synchronized correctly (depending on architecture)
WAN links, thresholds, measurement targets
SD-WAN Policy ordering and steering objects
consistent gateway membership / profile assignment
Takeaway: “policy is correct” is meaningless unless:
the gateway installed it
probing data exists
steering state is installed and consumed by enforcement
When you get “wrong ISP / wrong overlay path,” validate in this order:
Traffic classification
What rule is actually matching (source/dest/service/app/identity)?
Is first-packet ambiguity likely?
Probing and thresholds
Do you have current probe results for the relevant decision?
Are links eligible under the rule thresholds?
Selection mode
Prioritization vs link aggregation changes expectations.
With aggregation, per-flow hash choice can look “random” to operators.
Enforcement pipeline alignment
Breakout: FW chooses ISP from steering state
Overlay/backhaul: VPN chooses transport from steering state
State/telemetry consistency
Portal events (iNext/Nano) should align with gateway telemetry (cpview) and observed behavior.
Thresholds too strict → all links disallowed → fallback behavior or failure
Single probe target bias → false positives/negatives on link health
Rule ordering mistakes → coarse rule matches before specific one
Application detection timing → session pinned before app becomes known
Aggregation misunderstanding → multiple links eligible, hash decides per-flow
Backhaul confusion → people troubleshoot HQ egress while the problem is branch→HQ overlay (or vice-versa)
Fontes: Quantum SD-WAN - Technical | eLearning https://checkpointpartners.litmoseu.com/course/1588097 ,
Admin Guide: https://support.checkpoint.com/results/sk/sk180605
Demo Point: SD-WAN https://usercenter.checkpoint.com/ucapps/techpoint/demo-point
Excellent post, I got a great overview of the subject! I had already studied other SD-WAN solutions and was just looking for a summary to make a comparison!
Thank you, Murilo I’m glad I could help with your SD-WAN studies. I’ll be publishing an implementation guide soon as well.
Man, wow...AMAZING job!
Thank you, Andy
Keep 'em coming.
I'll definitely do that.
I see new MVP member in near tuture...just saying 😉
Amen, we are working on it.
Excellent for studying, provides clear and objective examples, very good, keep providing us with quality materials.
Well done, @WiliRGasparetto!
Well done, @WiliRGasparetto!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 1 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceTue 19 May 2026 @ 06:00 PM (IDT)
AI Security Masters E8 - Claude Mythos: New Era in Cyber SecurityAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY