This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| network_stuff:sd-wan [2020/11/07 21:39] – jotasandoku | network_stuff:sd-wan [2025/01/22 17:38] (current) – jotasandoku | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | **SD-WAN**\\ | + | **SD-WAN** |
| - | * Viptela | + | \\ |
| - | * Silver Peak (Arube) | + | |
| - | * NSX (VMware) | + | TL;DR: SD-WAN **maps applications to links based on performance and security requirements**.\\ |
| + | IPSec tunnels secure traffic over public internet links but are a supporting feature, not the primary focus of SD-WAN. | ||
| + | |||
| + | viptela | ||
| + | * Fortigate | ||
| + | * Palo Alto-prisma | ||
| + | * Juniper-Mist-A | ||
| + | * HP-Aruba-SilverPeak | ||
| + | * NSX/ | ||
| + | |||
| + | ===== SD-WAN Overview ===== | ||
| + | At its core, SD-WAN | ||
| + | |||
| + | For example: | ||
| + | * ISP-1 for critical apps like video conferencing, | ||
| + | * ISP-2 for regular web browsing, | ||
| + | * ISP-3 for backup or non-critical traffic. | ||
| + | |||
| + | Normally, SD-WAN requires two ' | ||
| + | |||
| + | ===== How IPSec Tunnels Help in SD-WAN ===== | ||
| + | IPSec tunnels in SD-WAN secure traffic over public internet links through encryption and authentication. While IPSec was used in older technologies like DMVPN, SD-WAN offers dynamic path selection, rerouting traffic based on real-time link conditions. | ||
| + | |||
| + | SD-WAN also supports: | ||
| + | * **Application-aware routing** using DPI, | ||
| + | * **Centralized management** via a controller for simplified configuration, | ||
| + | * **Flexible overlay management** over multiple transport links, | ||
| + | * **Real-time performance monitoring** to adjust traffic dynamically based on link quality. | ||
| + | |||
| + | |||
| + | ===== Other SD-WAN Modes ===== | ||
| + | * **Active/ | ||
| + | * **Active/ | ||
| + | * **Failover Mode**: Traffic switches to a backup link if the primary fails, without load balancing. | ||
| + | |||
| + | SD-WAN also supports: | ||
| + | * **Traffic Shaping and QoS**: Ensures important applications | ||
| + | * **Zero Touch Provisioning (ZTP)**: New SD-WAN devices can be deployed and configured remotely, without manual setup. | ||
| + | |||
| + | ===== How SD-WAN Relates to SASE and ZTNA ===== | ||
| + | * **SASE (Secure Access Service Edge)**: | ||
| + | - SASE integrates SD-WAN with cloud-based security services like firewalls, secure web gateways, CASB (Cloud Access Security Broker), etc. SD-WAN handles intelligent traffic routing, while SASE adds security in the cloud. | ||
| + | - SD-WAN is the network foundation of SASE, which embeds security directly into the network at all edges (on-prem or in the cloud). | ||
| + | |||
| + | * **ZTNA (Zero Trust Network Access)**: | ||
| + | - ZTNA verifies users every time they access a resource, enforcing strict identity checks, even inside the network. It treats all requests as untrusted, ensuring each interaction is authenticated and authorized. | ||
| + | - In a SASE framework, ZTNA works alongside SD-WAN to ensure appropriate access controls, so no implicit trust is given based on network location. | ||
| + | - Real-Life Example of ZTNA in SD-WAN: | ||
| + | - A company uses SD-WAN for branch offices to access cloud applications. With **ZTNA**, when an employee tries to access a sensitive application, | ||
| + | |||
| + | |||
| + | ===== Key Takeaways ===== | ||
| + | * SD-WAN uses IPSec tunnels like DMVPN but manages them dynamically, | ||
| + | * IPSec tunnels in SD-WAN offer security, but they’re part of a broader system where **dynamic path selection**, | ||
| + | * DMVPN provided static or semi-dynamic IPSec VPNs, while SD-WAN turns those tunnels into an intelligent, | ||
| + | * SASE adds cloud-based security services on top of SD-WAN, while ZTNA enforces strict user access controls within that framework. | ||
| + | |||
| + | |||
| + | ---- | ||
| + | === CISCO SD-WAN - LAB NOTES === | ||
| + | Three elements. Only one of them needs high resources for the lab: | ||
| + | * sd-wan manager (vmanage, centralized dashboard): ~20GB RAN | ||
| + | * controllers (vsmart, policy engines): router with ' | ||
| + | * edge nodes (vedge): these are just the dumb switches | ||
| + | * vbond (CA) | ||
| + | |||
| + | No need for smart account. Just a button with **pay as you go** license. **this is in the vmanage itself, we need to have last version. (20.6.3 (Jul 2022)) | ||
| + | All air gapped, you need to do your your Wan edge certificates yourself and your controller certificates.So you need to know how to generate open SSL root CA and then sign certs from that CA.\\ | ||
| + | basically the first step in onboarding a router like ACSR 1000V or a Catalyst 8000V virtual router is to take the CA certificate and install it. put it on the boot flash of the router and then you import it into the router' | ||