TCP traffic will fail and get dropped by the SD-WAN edge when there is asymmetric routing/route change and stateful firewall is enabled.
Velocloud SDWAN, SDWAN, Stateful Firewall
There are two possible cases.
As described in the Firewall Overview doc, the stateful firewall checks for valid TCP sessions based on traffic traversing it. When traffic is routed asymmetrically, as in only one direction traverses the edge and the other direction of traffic does not, this can cause the edge to only see the first SYN in the TCP three-way handshake and will not see the SYN/ACK reply. Since it doesn't see the complete TCP handshake, it does not recognize subsequent packets for this flow to be part of a valid TCP session, dropping the traffic. The same would occur if the first SYN did not traverse the edge while the returning SYN/ACK does traverse the edge, it will get dropped for the same reason.
Additionally, If the TCP SYN packet traverses through Edge-1 and the corresponding SYN-ACK packet is returned through Edge-2, the packet drop may also occur on Edge-2
One way to confirm if this could be happening is to generate non-TCP traffic between the same two hosts, such as ping or UDP traffic, and confirm it gets through.
Even if traffic is not routed asymmetrically, there are multiple routes between the client and server across different VeloCloud SD-WAN Edges, existing TCP flows will be dropped if a route failover occurs.
For example, let's look at the following case.
*Of course, if a new TCP traffic will start via Edge-2, the Stateful Firewall can forward it.
If the stateful firewall is not required in this environment, disabling the stateful firewall will prevent traffic from being dropped.
If the stateful firewall is required, routing will need to be fixed so that both directions of the flow traverse the edge. However, as previously explained, the same issue arises when a route change occurs.
Reference KB "TCP traffic will go down after certificate renewal(386480)"