How to Troubleshoot SD-WAN Latency, Jitter, and Packet Loss

How to Troubleshoot SD-WAN Latency, Jitter, and Packet Loss

39232
Created On 01/20/23 00:01 AM - Last Modified 12/10/25 01:04 AM


Objective


The PAN-OS firewall SD-WAN feature monitors SD-WAN Virtual Interfaces (which contain both physical ISP interfaces and/or VPN Tunnel interfaces) using SD-WAN Probes. If these probes are experiencing an amount of Latency(ms), Jitter(ms), or Packet Loss(%) which is above the Thresholds configured in the Path Quality Profile, then that metric(s) will be marked as unhealthy, and as a result, traffic could be changed to a different path.

This document gives you the network troubleshooting steps to narrow down, verify, and resolve the root cause of this latency, jitter, or packet loss being detected in your network over the affected link(s).

Tip: The SD-WAN feature measures the Latency, Jitter, and Packet Loss of the link by measuring the ICMP probe packets, not the Latency, Jitter, or Packet Loss of actual traffic packets

It is important to keep in mind that the firewall does not check if the actual traffic is experiencing Latency, Jitter or Packet Loss. Instead, the firewall checks if the SD-WAN probe packets are experiencing Latency, Jitter, or Packet Loss over that link (which the actual traffic also does go). Then, the firewall simply checks if those values are above or below your configured thresholds in the Path Quality Profile for that application or not.



Environment


  • PAN-OS
  • SD-WAN


Procedure


  1. Investigate which SD-WAN link is experiencing Latency, Jitter, or Packet Loss and identify which Application traversing that link is exceeding the configured Path Quality Profile threshold(s) due to that using Web UI and CLI
When deploying SD-WAN Policy Rules, users must configure Path Quality Profiles. This is where the user sets their preferred thresholds for Latency, Jitter, and Packet Loss:

Panorama > Objects > SD-WAN Link Management > Path Quality Profile
Configuration of Path Quality Profile
The firewall measures the SD-WAN Probes for Latency, Jitter, or Packet Loss. If those probe packets experience any Latency, Jitter, or Packet Loss values which are above the thresholds configured in the Path Quality Profile for that Application in the SD-WAN Policy Rule that traffic is hitting, then that Application will be marked as unhealthy. To view the status of these applications' and whether they are meeting or exceeding your configured thresholds, use the below methods:
 
Panorama > SD-WAN > Monitoring
Monitoring Latency Packet Loss and Jitter from Panorama

CLI Commands
> show sdwan path-monitor stats vif sdwan.1

===slot1 dp0 health_ver:(High sensitive) 15 (Medium sensitive) 11 (Low sensitive) 2 ===
----------------------------------------------------------------
ethernet1/1 idx: 16 Probing: Enabled  Monitor-mode: Aggressive
----------------------------------------------------------------
  probe-req-send:30920  State: up
probe-reply-recv:30919

         packet loss :  real-time  crt-use   change
         per 1000 pkt:  0          0         0

                       latency   jitter    pkt_loss  health_ver
         3000ms average
            real time: 16        1         0
          current use: 0         0         0         2

         10000ms average
            real time: 16        1         0
          current use: 0         1         0         8

         25000ms average
            real time: 16        1         0
          current use: 0         0         0         2
 
  1. Identify the path (and ISP) that the traffic experiencing the Latency, Jitter, or Packet Loss is taking to reach its destination
Navigate to Monitor > Traffic Logs and use filters to determine the Source IP address, Destination IP address, and Egress Interface of this application's traffic over that path, and verify which path and link it is taking to get to its destination
 
  1. Call your ISP and have them resolve the Latency, Jitter, or Packet Loss
If there are not other devices besides the ISP between the Branch and Hub firewall, then please pursue this latency, jitter, or packet loss issue with your ISP. Note: If the ISP claims there is no latency, jitter, or packet loss on the path, ask them to provide documented evidence, especially since the firewall's SD-WAN ICMP probes (which traverse over that ISP/VPN Tunnel) are experiencing latency, jitter, or packet loss).

If there are other devices (routers, switches, etc.) in the path of these SD-WAN Probes aside from the ISP, proceed with the steps below.
  1. Identify which device or interface (or if the ISP) in the path of the traffic is causing the latency
    1. Review any third-party traffic or network monitoring tools to identify the point at which the latency is occurring in the path of that traffic flow
    2. Identify if there have been any configuration changes or new devices introduced into your network in the path of this traffic that may have caused this latency, jitter, or packet loss
    3. Login to and check the devices in the path of the traffic to see if they show any sign of issues processing traffic. Start with any device(s) you suspect to be most-probable to cause this type of slowness being experienced or any new devices introduced since the traffic was working as expected. Tip: Use that vendor's built-in traffic diagnostic tools (packet-trace, packet capture, performance logs, traffic logs, etc.) to diagnose why that traffic flow (by Source IP and Destination IP) is traversing through that device slowly
    4. Take Packet Captures at various points in the network along the path of this traffic flow. Compare the timestamps in the packet captures at various points in the network side-by-side to identify at which capture point (i.e. device) the packet takes a longer time to arrive at or ingress/egress. Doing so until you can narrow down to a single device or link of the network directly causing the latency will allow you to then troubleshoot, resolve, or make the needed configuration changes on that device.
    5. Check with the ISP and ask them to provide proof/evidence that there is no latency, packet loss, or jitter on the path that traffic takes

 

  1. Identify and reduce or eliminate any heavy load, utilization, or congestion on any devices or links in the path
Check the statistics/health of each link and device in the path of the traffic for any drops, errors, floods, or packet processing issues. These types of symptoms can cause packets to take longer than normal to ingress/egress a device, which in turn will cause end users to report slowness in the application's functionality.

Common culprits include:
  • Any device under a DDoS attack/traffic flood of any kind
  • Any device which redirects or proxies that traffic flow
  • Any device that heavily inspects (decryption devices) that traffic unnecessarily
  • Any device experiencing high resource issues such as high CPU, memory, buffers, etc.
  1. Configure QoS on whichever device(s) necessary to prioritize that traffic's packets along the traffic path
Configure QoS on any appropriate devices in the path of this traffic flow. As a result, this specific traffic flow will be prioritized above other traffic and is processed by devices in this path as quickly as possible. Consult the respective device's vendor documentation on how to configure QoS on their device.
  1. Optimize routing and the path
Make sure that traffic takes the shortest, most direct, and fastest routes and links to reach its destination. Verify that the traffic is not unnecessarily redirected or proxied by any security device(s) along the path. Temporarily stop the redirection or proxy to determine if that is the issue. If the traffic is unintentionally redirected or proxied, reconfigure the device doing the redirection or proxy to not do so on that flow of traffic. Then, check to see if the issue is resolved or traffic performance (latency, jitter, or packet loss) is improved.

Common culprits of this include:
  • Firewalls doing heavy inspections
  • Decryption devices
  • Proxy devices
  • Unnecessary / sub-optimal VPN tunnel routing
  1. (Optional) Lower application settings or use a lighter, faster protocol / technology to transmit that traffic
Examples:
  • Limiting video quality (from 4k to 1080p)
  • Limiting audio quality codec (from G.722 to G.711 or G.729)
  • Assess if there is a lighter version or implementation of the protocol/application you are using that has lower bandwidth requirements if needed
  1. Create a Path Quality Profile with less strict requirements for Packet Loss, Latency, or Jitter

If you or your ISP are unable to get the application/path to perform to the threshold levels you specified in its current Path Quality Profile, you may need to edit the Packet Loss, Latency, or Jitter thresholds in the Path Quality Profile to a lower levels

 

  1. If you are seeing the "NGFW SD-WAN Link Performance" Alert in Strata Cloud Manager, the conditions for that alert are:
  1. SD-WAN Link Jitter
  • Critical alert will be triggered if the jitter value is greater than 30 for 50% of datapoints persistent for atleast 2 hours
  • Warning alert will be triggered if the jitter value is greater than 2 for 50% of datapoints persistent for atleast 2 hours
  • Alert will be cleared if all the datapoints are below the warning threshold for atleast 2 hours
  1. SD-WAN Link Packet Loss
  • Critical alert will be triggered if the loss value is greater than 9 for 50% of datapoints persistent for atleast 2 hours
  • Warning alert will be triggered if the jitter value is greater than 1 for 50% of datapoints persistent for atleast 2 hours
  • Alert will be cleared if all the datapoints are below the warning threshold for atleast 2 hours
  1. SD-WAN Link Latency
  • Critical alert will be triggered if the latency value is greater than 300 for 75% of datapoints persistent for atleast 80 mins
  • Warning alert will be triggered if the latency value is greater than 20 for 75% of datapoints persistent for atleast 80 hours
  • Alert will be cleared if all the datapoints are below the warning threshold for atleast 2 hours


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000saXJCAY&lang=en_US&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language