This is an old revision of the document!
SD-WAN
TL;DR: SD-WAN maps applications to links based on performance and security requirements.
IPSec tunnels secure traffic over public internet links but are a supporting feature, not the primary focus of SD-WAN.
viptela
Fortigate
Palo Alto-prisma
Juniper-Mist-A
HP-Aruba-SilverPeak
NSX/VMware (Broadcom)
SD-WAN Overview
At its core, SD-WAN manages traffic across different WAN connections (like multiple ISPs or MPLS circuits) to optimize performance, security, and cost. The key idea is application-aware routing—you can define which applications use which connections based on policies you set.
For example:
ISP-1 for critical apps like video conferencing,
ISP-2 for regular web browsing,
ISP-3 for backup or non-critical traffic.
Normally, SD-WAN requires two 'edge' devices. The SD-WAN device (either physical or virtual) at each site monitors the quality of each link (latency, jitter, packet loss, etc.) and dynamically switches traffic between them based on real-time performance or failover scenarios. So, yes, you can map applications to paths based on your example.
How IPSec Tunnels Help in SD-WAN
IPSec tunnels in SD-WAN secure traffic over public internet links through encryption and authentication. While IPSec was used in older technologies like DMVPN, SD-WAN offers dynamic path selection, rerouting traffic based on real-time link conditions.
SD-WAN also supports:
Application-aware routing using DPI,
Centralized management via a controller for simplified configuration,
Flexible overlay management over multiple transport links,
Real-time performance monitoring to adjust traffic dynamically based on link quality.
Other SD-WAN Modes
-
Active/Standby Mode: One link is primary, another is backup. The backup link only takes over if the primary fails.
Failover Mode: Traffic switches to a backup link if the primary fails, without load balancing.
SD-WAN also supports:
Traffic Shaping and QoS: Ensures important applications (e.g., VoIP) get necessary bandwidth and low latency.
Zero Touch Provisioning (ZTP): New SD-WAN devices can be deployed and configured remotely, without manual setup.
How SD-WAN Relates to SASE and ZTNA
Key Takeaways
SD-WAN uses IPSec tunnels like DMVPN but manages them dynamically, making smarter routing decisions based on real-time performance and application needs. It also integrates centralized control and application awareness.
IPSec tunnels in SD-WAN offer security, but they’re part of a broader system where dynamic path selection, application-based routing, and centralized policy management take precedence.
DMVPN provided static or semi-dynamic IPSec VPNs, while SD-WAN turns those tunnels into an intelligent, software-defined overlay that adapts to network conditions and application requirements.
SASE adds cloud-based security services on top of SD-WAN, while ZTNA enforces strict user access controls within that framework.