How to Configure SD-WAN via Omada Controller v6.2

Knowledgebase
Configuration Guide
04-02-2026
473

Contents

Introduction

Requirements

Configuration

NAT Rule Configuration for Gateway Adoption (Optional)

SD-WAN Configuration

Verification

Conclusion

QA

Introduction

Software-Defined Wide Area Network (SD-WAN) revolutionizes traditional WAN architectures by leveraging centralized control and automation to dynamically route traffic across multiple connections (e.g., MPLS, broadband, LTE). SD-WAN enhances the hub-and-spoke model by integrating intelligent traffic steering and simplified cross-site management. Key benefit is centralized Policy Management, which defines and enforces network rules across all sites from a single Controller.

A topology of SD-WAN with three spokes and one hub.

Note:

  • The WAN participating in the networking cannot enable the DMZ function.
  • All the spokes need to connect to the hub first.

This article provides a comprehensive walkthrough for configuring the SD-WAN function on the Omada Controller, enabling enterprises to centralize network management, optimize traffic routing, and establish secure hub-spoke connectivity across distributed sites in one Controller. The guide covers prerequisites, gateway adoption, IP range allocation, and post-configuration verification to ensure reliable WAN performance.

Requirements

  • Omada Gateway with firmware fully adapted to Omada Controller V6.2 and above
  • Omada Controller V6.2 and above

Configuration

In the following section, we will introduce how to configure SD-WAN using three gateways as an example. The three gateways are adopted in three sites: SD-WAN 1/2/3 on the same controller and the gateways are named as Gateway A/B/C.

NAT Rule Configuration for Gateway Adoption (Optional)

When using On-Premises controller, the gateways are usually adopted remotely, which requires the configuration of port forwarding to finish the adoption.

Step 1. The controller should be located at the LAN side of a gateway, after adopting this gateway, go to Network Config > NAT. Show the process of entering NAT configuration page.

Step 2. In Port Forwarding page, click Create New Rule.

Show the port forwarding configuration page.

Step 3. Name the rule, choose to Any IP address or Limited IP Address able to use this port forwarding rule, then choose the correct WAN port as Interface. After that, configure the Source Port, Destination IP, Destination Port and Protocol. Finally, click Create.

For adopting an Omada device, the following ports need to be enabled: UDP29810, TCP29811-29817 and TCP8043. The following screenshot is an example of configuring port forwarding rule for UDP29810.

Show the port forwardingn rule configuration of UDP29810.

Step 4. After creating the port forwarding rule, configure the WAN IP address of this gateway as the Inform URL on other gateways to finish the adoption. Please note that the WAN IP address must be directly reachable from other gateways, otherwise you may need to configure more port forwarding rules in the uplink devices.

SD-WAN Configuration

If you have finished adopting all the gateways on the same controller, the SD-WAN configuration process starts here.

Step 1. Go to Global View > SD-WAN.

Show the process of entering SD-WAN configuration panel.

Step 2. Click Create SD-WAN Group.

Show the create SD-WAN group button page.

Step 3. Edit the Group Name and Description if needed.

The Subnet Conflicts Solution is newly supported in Omada Controller V6.2, it maps the conflict network segments of SD-WAN gateways to a virtual segment to solve the problem that conflict network segments could not join the same SD-WAN group, this option is enabled by default.

Starting from Omada Controller V6.2, there’s no need to manually configure the virtual SD-WAN IP pool for the gateways in the SD-WAN group, it will be automatically generated and assigned.

Show the SD-WAN group configuration page.

Step 4. Click the Select button to select Hub Device and Spoke Device. Please note that only the device with public IP address could act as Hub Device. Tick to select the device and click Save. Show the choose hub device page.

Step 5. After finished selecting the Hub and Spoke devices, click Next to proceed. Show the SD-WAN group configuration page.

Step 6. In the Set Network Topology page, you could preview the tunnels created among the gateways. By default, only the Hub-Spoke tunnel will be created, all the traffic between spokes needs to be forwarded by the hub, you could also choose to establish the tunnels between spokes to connect them directly and reduce the pressure on the hub device, it could be configured by clicking Manage Spoke-Spoke Connection. Please note that to form a spoke-spoke connection, it’s required that at least one of the spokes have public IP address. Show the SD-WAN network topology configuration page.

In Manage Spoke-Spoke Connection page, tick to select the connection and click Save.

Show the SD-WAN spoke-spoke connection configuration page.

After enabling spoke-spoke connection, the topology preview changes accordingly.

Show the SD-WAN network topology after enabling spoke-spoke connection.

Click Next on the lower right to proceed.

Step 7. In the Select WAN & Network page, click to select the WAN port participating in this SD-WAN group for each gateway, or click Auto Select WAN Port on the upper right, it will automatically choose the most suitable WAN, usually the ones with public IP.

Show the SD-WAN gateway WAN port selection page.

Click to choose the LAN networks on each gateway which you wish to participate in the SD-WAN group. Please note that only the LAN with subnet mask no lower than /20 could be selected, as an example, the LAN 2 on Gateway B has a mask of /16, it is grayed out and cannot be selected. Also, the overlapped subnets could be selected, it will then be mapped to a virtual subnet without conflict. Click Save on the lower right to continue.

Show the SD-WAN gateway LAN subnet selection page.

Step 8. As the overlapped subnets across gateways are selected and the Subnet Conflicts Solution is enabled, the Virtual Network Segment Mapping page will pop out to confirm the virtual mapping for overlapped subnets. By default, the virtual mapping range will be the private IP addresses, 10.0.0.0/8, 172.16.0.0/12 and 192.168.0.0/16, you could also choose to add Custom option and click Add to set the mapping range you want.

Show the virtual network segment mapping page.

The mapping result will be generated automatically, if you would like to change, click the Edit button and change to the subnet you want. Show the virtual network segment mapping page.

The subnet mask of the mapping subnet is same as the original subnet and could not be changed, this could ensure the original IP addresses within the range could be mapped one by one without conflict. For example, the subnet 192.168.254.1/24 is mapped to 10.1.0.0/24, the clients with IP 192.168.254.1 and 192.168.254.100 will be mapped to 10.1.0.1 and 10.1.0.100 accordingly.

The sequence of Mapping Network Segment Range could be changed, as an example in the screenshot, the sequence is 10.0.0.0/8 > 172.16.0.0/12 > 192.168.0.0/16 > Custom. The first priority is 10.0.0.0/8, as a result, the virtual mapping segments generated are within this range, you could move any segment to the front to prioritize it as the generated virtual mapping range.

After confirming the virtual mapping configuration, click Save to proceed.

Show the virtual network segment mapping page.

Step 9. After finish configuring the virtual mapping, the mapped subnets will be displayed under each subnet in the Select WAN & Network page. If there’s no problem, click Save to proceed. Show the SD-WAN gateway LAN subnet selection page.

Step 10. The SD-WAN group configuration is finished, and you will return to the overall SD-WAN page, the status of SD-WAN group created will be displayed here. The two views could be changed by clicking the view button on the upper right.

Show the SD-WAN overview page.

Show the SD-WAN overview page.

As shown in the example screenshot, the two Hub-Spoke tunnel is established but the Spoke-Spoke tunnel is not yet established.

Step 11. By clicking the Manage button on the upper right, you could choose to Edit Group, Delete Group or Manage Virtual Network.

By clicking Edit Group, you will go back to the SD-WAN group detailed configuration page.

By clicking Delete Group, the whole SD-WAN group will be deleted after confirmation.

By clicking Manage Virtual Network, you could check the status or edit the virtual mapping for overlapped network segments.

If you wish to change the network segment and mask of LAN participating in the SD-WAN group, it’s recommended to remove this LAN from SD-WAN group first, after finished changing the LAN settings, add it back to the SD-WAN group again, you also need to remap the conflict subnets afterwards.

Show the virtual network segment mapping page.

Step 12. By clicking the Map button on the upper right, users are able to see the locations of sites on the map according to the longitude and latitude set for the site, or manually place it if there’s no longitude and latitude information. In the example screenshot, the longitude and latitude are not set, so the sites are unplaced and listed on the left panel, drag to manually place them on the map. Show the SD-WAN location map page.

After placing the sites, click the Lock icon on each site icon to confirm the location, the tunnel status will then be visualized. Right click on the site icons to Edit Location or Remove.

Show the SD-WAN location map page.

Show the SD-WAN tunnel visualization on the map page.

Move the cursor on the tunnels or site icons to check the status.

Show the SD-WAN tunnel visualization on the map page.

Verification

The SD-WAN group status could be checked in the SD-WAN page, including the gateways participated and tunnel status.

Show the SD-WAN overview page.

Go to one of the site and check the routing table of gateway, there will be route entries formed by SD-WAN.

Ping tools could also be used to verify the connectivity, please note that mapped virtual IPs need to be used for overlapped subnets.

Conclusion

In this article, we have introduced how to configure SD-WAN on Omada Controller V6.2 and above, there are some new features added for SD-WAN on this version.

Get to know more details of each function and configuration please go to Download Center to download the manual of your product.

QA

Q1: What should I do if I downgrade devices in existed SD-WAN group with virtual NAT configured to the version not supporting virtual NAT?

A1: After the downgrade, the virtual NAT cannot take effect anymore, the original SD-WAN group will be removed and needs to be configured again manually.

Avalie este documento

Documentos Relacionados