<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-8638180278169190553</id><updated>2024-11-08T21:08:49.857+05:30</updated><category term="Can-SD-WAN-replace- MPLS?"/><category term="Cloud-Security"/><category term="Is-SD-WAN-Secured?"/><category term="Is-SD-WAN-going-to-replace- MPLS?"/><category term="MPLS vs SD-WAN"/><category term="MPLS vs SDWAN"/><category term="Multi-cloud-Security"/><category term="SASE"/><category term="SD-WAN"/><category term="SD-WAN Explained"/><category term="SD-WAN Myths"/><category term="SD-WAN vs MPLS"/><category term="SD-WAN-Security-architetcture."/><category term="SD-WAN-is the-replacement-for- MPLS"/><category term="SDWAN"/><category term="SDWAN vs MPLS"/><category term="Software Defined Wide Area Network"/><category term="What is SDWAN?"/><title type='text'>The Control Plane </title><subtitle type='html'>A single pane of glass for technical updates and discussions.... :)</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='https://thecontrolplane.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8638180278169190553/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='https://thecontrolplane.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Rahul @TCP</name><uri>http://www.blogger.com/profile/18444237920037526242</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>4</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8638180278169190553.post-2295279025106222205</id><published>2020-09-19T18:00:00.013+05:30</published><updated>2020-09-19T18:25:43.503+05:30</updated><title type='text'></title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNG9XXx5lM9wsRuWHGSB6cJeIP5W1oOhaHq4V8EfTTC4S9ypPN1Qdkv07HPVAl2h48CM3KbMaGg-gCOoaFJ2STtYZ2NGQAcoD4lS04a806PLzpZEra9tRg1hUxladQQuQuLSDjn7rG_Wk5/s1600-rw/SDWAN-large.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;600&quot; data-original-width=&quot;1102&quot; height=&quot;390&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNG9XXx5lM9wsRuWHGSB6cJeIP5W1oOhaHq4V8EfTTC4S9ypPN1Qdkv07HPVAl2h48CM3KbMaGg-gCOoaFJ2STtYZ2NGQAcoD4lS04a806PLzpZEra9tRg1hUxladQQuQuLSDjn7rG_Wk5/s1600-rw/SDWAN-large.jpg&quot; width=&quot;622&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&amp;nbsp;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://thecontrolplane.blogspot.com/feeds/2295279025106222205/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://thecontrolplane.blogspot.com/2020/09/thumbnail.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8638180278169190553/posts/default/2295279025106222205'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8638180278169190553/posts/default/2295279025106222205'/><link rel='alternate' type='text/html' href='https://thecontrolplane.blogspot.com/2020/09/thumbnail.html' title=''/><author><name>Rahul @TCP</name><uri>http://www.blogger.com/profile/18444237920037526242</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNG9XXx5lM9wsRuWHGSB6cJeIP5W1oOhaHq4V8EfTTC4S9ypPN1Qdkv07HPVAl2h48CM3KbMaGg-gCOoaFJ2STtYZ2NGQAcoD4lS04a806PLzpZEra9tRg1hUxladQQuQuLSDjn7rG_Wk5/s72-c-rw/SDWAN-large.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8638180278169190553.post-8312256786922372084</id><published>2020-09-18T16:31:00.018+05:30</published><updated>2020-09-19T02:39:51.255+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cloud-Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Is-SD-WAN-Secured?"/><category scheme="http://www.blogger.com/atom/ns#" term="Multi-cloud-Security"/><category scheme="http://www.blogger.com/atom/ns#" term="SASE"/><category scheme="http://www.blogger.com/atom/ns#" term="SD-WAN-Security-architetcture."/><title type='text'>Is SD-WAN Secured?</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #04ff00; font-family: &#39;Exo 2&#39;; font-weight: normal;&quot;&gt;Issues with traditional security:&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;Traditional security is discontiguous configured site by site manually. Which is complex and is not easy to manage.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;Current security model is designed as per traditional architectures like on-prem Data centres services and Office users.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;Enterprises are moving towards multi-cloud environment with current on-prem security has many gaps to secure SAAS/IAAS/PAAS cloud solutions.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;Now customers with mobile security should not be only tagged to his machine,location or port.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;Business is changing sometimes requires fast service and security rules for required couple of hours only.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;This traditional security can provide some sort of security with in enterprise however when users are mobile and accessing cloud , REST API&#39;s interactions over internet.It requires new intelligent security design.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;There is a need of security model with full stack intelligence,proactiveness,analytics,IPS,IDS,malware protection,Sandbox and DNS layer security.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;Zero trust security model is required. Zero Trust is basically change in the traditional security best practices where inside users were considers as trusted users.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;&amp;nbsp;But the problem is if any organisation has hosted everything on their backbone network like MPLS they will have all security appliances and policies in place.No one can access the inside network. However despite of having a&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;ll&amp;nbsp;security practices in place the network can still be compromised.What if, any of the inside user is compromised then entire security will be compromised.Most of these attacks happens from the inside.From outside it not so easy to crack the private network.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;As shown below in&amp;nbsp;&lt;i&gt;figure 1&amp;nbsp; &lt;/i&gt;the control plan corporation has user inside the office which are in traditional security designs considered as trusted user and users accessing the network from outside of office are untrusted&amp;nbsp;users.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;By chance, if internal security is compromised then&amp;nbsp;&amp;nbsp;it could be a disaster.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;To avoid such issues Zero trust model was invented by Forrester Research Inc.Anybody on network inside or outside everybody have to follow strict security policies and check lists to access network.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;&amp;nbsp;And to protect the end user security MFA multi-factor authentication came into picture.As all are using BYOD (Bring your own device) accessing internet/cloud hosted application or enterprise application from their personal mobile devices.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;In today&#39;s working environment, security is not restricted within the building,it is distributed&amp;nbsp;everywhere.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCXlWEdkzaoccw5nNwXUAs3oQB8gJXRVs42swGLWCTYSBcqc3ICXgqlU1-7s4Jx4Uv_Lc3M8UH5qwv1cvTf4UHqSGdHZamk1ZuEbMGajr5qBQA-Ft4XJCp4eB1uF-Y0NS7AV26694yp8Fw/s1600-rw/SDWAN-Zero-Trust.JPG&quot; rel=&quot;&quot; target=&quot;&quot;&gt;&lt;img alt=&quot;Is-SD-WAN-Secured?&quot; border=&quot;0&quot; data-original-height=&quot;408&quot; data-original-width=&quot;498&quot; height=&quot;370&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCXlWEdkzaoccw5nNwXUAs3oQB8gJXRVs42swGLWCTYSBcqc3ICXgqlU1-7s4Jx4Uv_Lc3M8UH5qwv1cvTf4UHqSGdHZamk1ZuEbMGajr5qBQA-Ft4XJCp4eB1uF-Y0NS7AV26694yp8Fw/s1600-rw/SDWAN-Zero-Trust.JPG&quot; title=&quot;Is-SD-WAN-Secured?&quot; width=&quot;445&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;i&gt;Figure-1-Zero-Trust&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;Let&#39;s take an example of traditional security Bob staying in the control plane society.He visit bank whenever he needs to check his balance or withdraw amount.This was because back in early 2000 there was no such strong remote security or core banking facilities exists.&amp;nbsp;Banks were only secure place for transaction and security was restricted to on-premises. Bob was wasting&amp;nbsp;most of the time&amp;nbsp; and money&amp;nbsp; going to bank.But in today&#39;s&amp;nbsp; fast moving world this model is outdated and slow.Time and security means revenue.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhke185mklQ9jNj1ZG1Rr6NACGNenaPseAajbp6wcAttrV_O4ixcH2NSluN8XzFXnpurMZiyyJWTUxA6ZPZnQQYbzmD4us3-yGciL-WItr6ks6XDx-dNg2quPqfdrBC73R5vYzzmWVKyjOf/s1600-rw/SDWAN-Traditional-Security.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Traditional-Security-vs-SDWAN-Security&quot; border=&quot;0&quot; data-original-height=&quot;352&quot; data-original-width=&quot;474&quot; height=&quot;301&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhke185mklQ9jNj1ZG1Rr6NACGNenaPseAajbp6wcAttrV_O4ixcH2NSluN8XzFXnpurMZiyyJWTUxA6ZPZnQQYbzmD4us3-yGciL-WItr6ks6XDx-dNg2quPqfdrBC73R5vYzzmWVKyjOf/s1600-rw/SDWAN-Traditional-Security.JPG&quot; title=&quot;Traditional-Security-vs-SDWAN-Security&quot; width=&quot;428&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;i&gt;Figure-3-Traditional-Security&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;Now application are changing from desktop websites to mobile phone websites to smartphone apps.Security requirement is also changing per application based.Most of the traffic we access now a days is SSL/TLS encrypted.All the websites with http&lt;b&gt;s &lt;/b&gt;where &#39;s&#39; is secure are SSL/TLS encrypted websites. NSS Labs predicts that around 75 percent of total enterprise traffic will be encrypted by next year.Traditional security model always trust&amp;nbsp;the SSL traffic assuming&amp;nbsp;its encrypted.It means half of the traffic will pass the security uninspected which is a threat.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;Below figure shows anyone is assessing&amp;nbsp;the banking or any cloud websites&amp;nbsp; from office or home are https and tradition security will always send SSL traffic uninspected.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;SSL security can be used for attacks like intruders can build their own SSL website and launch attack if SSL inspection is not in place.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;Attacker can hide the malicious&amp;nbsp;data the SSl enable sites any can launch attack by bypassing the security if uninspected.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjddbJehYDxLvUN5VktVxj_2H8hY48M-UfFaU98xJU5wIUhhaYu-fwP4-1FHStAlyW3Jg5K04ITMdtaNTsWaI1a_khXcayj3MXYSVvfFot3Vswymlz7IZWTQRyRRNQbs6zlCdk9ZErf3lNv/s1600-rw/SDWAN-Encryption.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;SDWAN-Ecrypted-Traffic-SSL-TLS&quot; border=&quot;0&quot; data-original-height=&quot;595&quot; data-original-width=&quot;1283&quot; height=&quot;299&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjddbJehYDxLvUN5VktVxj_2H8hY48M-UfFaU98xJU5wIUhhaYu-fwP4-1FHStAlyW3Jg5K04ITMdtaNTsWaI1a_khXcayj3MXYSVvfFot3Vswymlz7IZWTQRyRRNQbs6zlCdk9ZErf3lNv/s1600-rw/SDWAN-Encryption.JPG&quot; title=&quot;SDWAN-Ecrypted-Traffic-SSL-TLS&quot; width=&quot;513&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;i&gt;Figure-2-Encrypted-Traffic&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;You have got basic understanding now ,how traditional security and on prem-hardware security can not provide the complete security as per today&#39;s application and user requirement.As both are mobile not restricted to a single computer or location. SDWAN solution is application-aware and DPI (Deep packet inspection) which has list of well known ports to identify the application along with cloud SAAS application visibility&amp;nbsp;as well.This features were missing in traditional WAN or security designs.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;SDWAN provides in-built&amp;nbsp;security features like IPS,IDS,Firewall,Advanced Malware protection,private cloud security,public cloud security fro enterprises.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;In the diagram shown below you can see remote site is accessing&amp;nbsp;public cloud.And could functionality&amp;nbsp;extend&amp;nbsp; till SDWA edges.Making easy choice for enterprises who are already using Multi-cloud functionality.Its make easy to connect IAAS,SAAS cloud applications.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;Let&#39;s first take an example if traditional WAN and security were in place.When remote site will access&amp;nbsp; public cloud if primary link is MPLS traffic will either back hauled to data center for accessing cloud where generally cloud&amp;nbsp;peering will be establish and there will be set of high end security appliances.You need set of WAN optimization devices to optimise&amp;nbsp;the MPLS traffic so that like is not over utilized. Or Cloud traffic like SAAS is allowed over backup internet link where additional security is required.Last traditional scenario is using DMVPN tunnels over internet to back haul&amp;nbsp;to datacenter. This will degrade the WAN&amp;nbsp; performance as those tunnels will not have QoS.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;Now take SDWAN example if remote site wants to access public cloud it can use both transports.All above gaps will be overcame by SDWAN solution as both transports MPLS and internet can be used on intent basis. As now a days internet links are also improved enterprise grade. SDWAN has in-built security.For internet transport&amp;nbsp;security cloud can be integrated along with baked-in SDWAN security .&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;There is no requirement of WAN optimizers. As traffic will be optimised&amp;nbsp;on many other factors auch as quality of link, jitter,packet&amp;nbsp;loss,application&amp;nbsp;criticality.And even MPLS usage will be offloaded and shared among multiple internet link transports.Making SDWAN more flexible,intelligent and secure as compare to traditional&amp;nbsp;networks.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;div&gt;&lt;span style=&quot;font-family: Exo 2;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Exo 2;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Exo 2;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_oWYSzFyajwfOE9KAPiKztJOheWkegXiLytIXLwqc_C1INpAwOLF9z_vWz8tzQlIFKiBK03aXpPjlEhAEUqjznvk96WKUJkI1zNZP8DCmTeX1narOGCvFOIC8j4nK7HtDEOvZ0BnJSy58/s1600-rw/SDWAN-Cloud-on-ramp.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;SDWAN-Cloud-on-Ramp&quot; border=&quot;0&quot; data-original-height=&quot;548&quot; data-original-width=&quot;1486&quot; height=&quot;272&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_oWYSzFyajwfOE9KAPiKztJOheWkegXiLytIXLwqc_C1INpAwOLF9z_vWz8tzQlIFKiBK03aXpPjlEhAEUqjznvk96WKUJkI1zNZP8DCmTeX1narOGCvFOIC8j4nK7HtDEOvZ0BnJSy58/s1600-rw/SDWAN-Cloud-on-ramp.JPG&quot; title=&quot;SDWAN-Cloud-on-Ramp&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;Figure-4-SDWAN-Cloud-on-Ramp&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;span&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;SDWAN offers cloud exchange security as well where there is a cloud stack exchange deployed for multi-cloud&amp;nbsp; security. Shown in &lt;i&gt;figure 5.&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;It is a&amp;nbsp; cloud VNF&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;which is a cloud&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;exchange providing&amp;nbsp;the security with NFV appliance&amp;nbsp;which are virtual&amp;nbsp;instanced hosted in cloud.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzCrEhgIt6r912qGIREj5xN0oN99Q4WnyCIve9tN1r6eMoVTk4huabGVgVozl7-JTKDnZ4WaT9Le_TKD3C4AwzywVI3GkzZVlhVjW3s5icdh2_zGYVvS3hxW4HMZ21ygFqvfDU66jkP2Jy/s1600-rw/SDWAN-VNF.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;SDWAN-Cloud-Security-Stack&quot; border=&quot;0&quot; data-original-height=&quot;549&quot; data-original-width=&quot;1565&quot; height=&quot;285&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzCrEhgIt6r912qGIREj5xN0oN99Q4WnyCIve9tN1r6eMoVTk4huabGVgVozl7-JTKDnZ4WaT9Le_TKD3C4AwzywVI3GkzZVlhVjW3s5icdh2_zGYVvS3hxW4HMZ21ygFqvfDU66jkP2Jy/s1600-rw/SDWAN-VNF.JPG&quot; title=&quot;SDWAN-Cloud-Security-Stack&quot; width=&quot;630&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;i&gt;Figure-5-SDWAN-Cloud-Security-Stack&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;span&gt;&lt;!--more--&gt;&lt;/span&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;With SDWAN solution we are getting all the required&amp;nbsp; features on a single platform rather than working on single bits and pieces on multiple vendors for multiple technologies.Which will have separate management.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;VNF are virtual network functions (VNFs) that handle specific network functions like firewalls or load balancing.and Secure access service edge (SASE)services which are more focused on end.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;SDWAN SASE integration will add more value to SDWAN solutoin.SASE converges the functions of network and security point solutions into a unified, global cloud-native service.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;A SASE solution combines the capabilities of a WAN with comprehensive security functions, such as secure web gateway (SWG), cloud access security broker (CASB), firewall as a service (FWaaS), and Zero Trust network access (ZTNA) to facilitate secure network access in cloud and mobile environments.&lt;i&gt;(see In picture 6)&lt;/i&gt;.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;These all&amp;nbsp; feature will be integrated in a single SDWAN solution with more insight.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXD0IfWDTIymBC7n3OzYHvfYJx2RDB6scO4hyzyV5n5JRu7kRR1rAn7FEUqBYn1Ta7eYuLOH6jjV_bUnNUHeRgT7FryN88Nm-Xaf6T9CHCTbWRpg7_J-iqDrUlBHMTb6fKwdNv6smMixmp/s1600-rw/SDWAN-SASE.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;SDWAN-SASE&quot; border=&quot;0&quot; data-original-height=&quot;506&quot; data-original-width=&quot;751&quot; height=&quot;432&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXD0IfWDTIymBC7n3OzYHvfYJx2RDB6scO4hyzyV5n5JRu7kRR1rAn7FEUqBYn1Ta7eYuLOH6jjV_bUnNUHeRgT7FryN88Nm-Xaf6T9CHCTbWRpg7_J-iqDrUlBHMTb6fKwdNv6smMixmp/s1600-rw/SDWAN-SASE.JPG&quot; title=&quot;SDWAN-SASE&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;i&gt;Figure-6-SDWAN-SASE&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;span&gt;&lt;!--more--&gt;&lt;/span&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;In above &lt;i&gt;figure-6&lt;/i&gt; you can see all the network services like SDWAN(software Defined Wide Area Network),Carrier, WAN optimization,Bandwidth aggeration,Network vendors,Network as a service , CDN ( content delivery network, or content distribution network)&amp;nbsp;and security services like DNS(Domain Name System).&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: medium;&quot;&gt;SASE with SDWAN will solve all the security&amp;nbsp;and network gaps in traditional networking and security&amp;nbsp;model which was actually designed for on premises solutions&amp;nbsp;only.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://thecontrolplane.blogspot.com/feeds/8312256786922372084/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://thecontrolplane.blogspot.com/2020/09/is-sd-wan-secured_18.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8638180278169190553/posts/default/8312256786922372084'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8638180278169190553/posts/default/8312256786922372084'/><link rel='alternate' type='text/html' href='https://thecontrolplane.blogspot.com/2020/09/is-sd-wan-secured_18.html' title='Is SD-WAN Secured?'/><author><name>Rahul @TCP</name><uri>http://www.blogger.com/profile/18444237920037526242</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCXlWEdkzaoccw5nNwXUAs3oQB8gJXRVs42swGLWCTYSBcqc3ICXgqlU1-7s4Jx4Uv_Lc3M8UH5qwv1cvTf4UHqSGdHZamk1ZuEbMGajr5qBQA-Ft4XJCp4eB1uF-Y0NS7AV26694yp8Fw/s72-c-rw/SDWAN-Zero-Trust.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8638180278169190553.post-5777374560704516925</id><published>2020-09-09T18:41:00.035+05:30</published><updated>2020-09-18T18:06:55.668+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Can-SD-WAN-replace- MPLS?"/><category scheme="http://www.blogger.com/atom/ns#" term="Is-SD-WAN-going-to-replace- MPLS?"/><category scheme="http://www.blogger.com/atom/ns#" term="SD-WAN Myths"/><category scheme="http://www.blogger.com/atom/ns#" term="SD-WAN-is the-replacement-for- MPLS"/><title type='text'>Will SD-WAN replace MPLS?</title><content type='html'>&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;color: #00dc1d; font-family: &#39;Exo 2&#39;;&quot;&gt;SDWAN -Software Define Wide Area Network.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: #00dc1d;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;MPLS&amp;nbsp; - Multi-Protocol&amp;nbsp; Label Switching.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;As you know that there are a lot of digital transformations happening in recent years and the things have been changing with rapid pace.Starting from the desktop&amp;nbsp;websites to mobile websites and then from mobile apps to cloud apps, OTT media services.But the problem was with the network, its was designed on the basis of hops,device,source&amp;nbsp;and destination based with no visibility to applications.The network was not application centric.&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family: Exo 2;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;In order to meet the current business requirement enterprise network need to be more intelligent,cost-effective and with fast WAN deployments.That&#39;s why SDWAN solution came into picture to fill-up this gap.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; font-size: x-small; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;; text-align: center;&quot;&gt;Let&#39;s take an example, In&amp;nbsp;&lt;i&gt;picture &lt;/i&gt;shown below you can see a car dashboard. It was late 80&#39;s or 90&#39;s design which had basic information to reach from Point A to B.You can relate this to&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Exo 2&amp;quot;; text-align: center;&quot;&gt;MPLS without SDWAN. MPLS will still be there for backbone connectivity.But this design will not meet today&#39;s business requirement.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: x-small; text-align: center;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&amp;nbsp;&lt;span style=&quot;font-size: x-small; text-align: center;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6QfWgGRY1ILvPGV7vpeNQUoRfSfQGXt70dSs-De5XIGE5J9jNdaAcYco_yvOwd_hJf0jEkIiXnclBhtpyevb3UqCEFiFGbr4tip_jGyTQRUBhzZaI2WG0qJVLV7ifsLpz6QcAXf3pchUY/s1600-rw/Car-old.JPG&quot; style=&quot;font-size: small; margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;/a&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6QfWgGRY1ILvPGV7vpeNQUoRfSfQGXt70dSs-De5XIGE5J9jNdaAcYco_yvOwd_hJf0jEkIiXnclBhtpyevb3UqCEFiFGbr4tip_jGyTQRUBhzZaI2WG0qJVLV7ifsLpz6QcAXf3pchUY/s1600-rw/Car-old.JPG&quot; style=&quot;font-size: small; margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6QfWgGRY1ILvPGV7vpeNQUoRfSfQGXt70dSs-De5XIGE5J9jNdaAcYco_yvOwd_hJf0jEkIiXnclBhtpyevb3UqCEFiFGbr4tip_jGyTQRUBhzZaI2WG0qJVLV7ifsLpz6QcAXf3pchUY/s1600-rw/Car-old.JPG&quot; style=&quot;font-size: small; margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img alt=&quot;Will-SD-WAN-replace-MPLS?&quot; border=&quot;0&quot; data-original-height=&quot;442&quot; data-original-width=&quot;730&quot; height=&quot;380&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6QfWgGRY1ILvPGV7vpeNQUoRfSfQGXt70dSs-De5XIGE5J9jNdaAcYco_yvOwd_hJf0jEkIiXnclBhtpyevb3UqCEFiFGbr4tip_jGyTQRUBhzZaI2WG0qJVLV7ifsLpz6QcAXf3pchUY/s1600-rw/Car-old.JPG&quot; title=&quot;Will-SD-WAN-replace-MPLS?&quot; width=&quot;625&quot; /&gt;&lt;/a&gt;&lt;/blockquote&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;i&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Picture-1&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;span&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Exo 2&amp;quot;; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Exo 2&amp;quot;; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Exo 2&amp;quot;; text-align: center;&quot;&gt;Now let&#39;s take an example of below &lt;i&gt;picture-2&lt;/i&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Exo 2&amp;quot;; text-align: center;&quot;&gt;here you have all features more visibility and you have apps to show which route is best to reach from point A to point B or it can do the re-routing of path based on the path scenario using analytics with AI machine learning driven models. Different&amp;nbsp; driving modes in city and off road. You can relate this with MPLS with SDWAN. At enterprise level for remote site,data center connectivity using overlay SDWAN solution will be more in demand.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size: x-small; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size: x-small; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size: x-small; text-align: center;&quot;&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: x-small; text-align: center;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhML-FDzarKwzyGCroNv30Lr8KbZAbNaYNyRDuWrrf4d1nKN1ZMARnMD1_P16jkOAJmqfHjCdF6SpYonVG526s8Z0gzKELKHhGuyC4P6OHSTqOKzaJFtNoiH6mR-Oy5ZykjTOyNPTnHVAdB/s1600-rw/New-car.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Will SD-WAN replace MPLS?&quot; border=&quot;0&quot; data-original-height=&quot;583&quot; data-original-width=&quot;939&quot; height=&quot;389&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhML-FDzarKwzyGCroNv30Lr8KbZAbNaYNyRDuWrrf4d1nKN1ZMARnMD1_P16jkOAJmqfHjCdF6SpYonVG526s8Z0gzKELKHhGuyC4P6OHSTqOKzaJFtNoiH6mR-Oy5ZykjTOyNPTnHVAdB/s1600-rw/New-car.JPG&quot; title=&quot;Will SD-WAN replace MPLS?&quot; width=&quot;625&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Exo 2&amp;quot;; font-size: small; text-align: justify;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;i&gt;Picture -2&lt;/i&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;span&gt;&lt;!--more--&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Hope this visual comparison given you the basic idea about SDWAN and MPLS. MPLS is your engine, transmission and tyres on which your car is able to drive. So,its not MPLS vs SDWAN it is MPLS with SDWAN. MPLS provide the underlay network connectivity and SDWAN is a overlay technology &lt;i&gt;(in picture 3)&lt;/i&gt; that runs over underlay and&amp;nbsp; SDWAN will add more intelligence to MPLS or tradition WAN or even internet/4G/5G. We should understand the technology first rather than following the commercial hype between vendors to promote the things.Its a expansions and bringing intelligence to your network.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Yes definitely it will be cost effective&amp;nbsp; as in traditional network if site has two link usually primary&amp;nbsp;link will be active and second link will be standby.The network need to be designed accordingly.With SDWAN organisation will have flexibility to use both links with application centric routing.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOmrY1lbjjm4FJF6DgyWY3MDKvp2uWlcx6CG7ZrOmjTigD3XpAzGaHEkOafndXUr3WcJbjl7LztxlAj3BJ3Owg_IBDq_8SQCPjEbOKdj5arNu_MjlRg8M4-tyUTN9xrncwV_8zEOg648Fl/s1600-rw/SDWAN-OVERLAY.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Will SD-WAN replace MPLS?&quot; border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1210&quot; height=&quot;498&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOmrY1lbjjm4FJF6DgyWY3MDKvp2uWlcx6CG7ZrOmjTigD3XpAzGaHEkOafndXUr3WcJbjl7LztxlAj3BJ3Owg_IBDq_8SQCPjEbOKdj5arNu_MjlRg8M4-tyUTN9xrncwV_8zEOg648Fl/s1600-rw/SDWAN-OVERLAY.JPG&quot; title=&quot;Will SD-WAN replace MPLS?&quot; width=&quot;781&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;i&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Picture-3&lt;/i&gt;&lt;/div&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;div&gt;&lt;span&gt;&lt;!--more--&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;This certainly decrease the utilization&amp;nbsp; and bandwidth requirement on MPLS link and traffic can be offloaded to secondary internet/4G/5G links. Enterprises have to spend less on MPLS bandwidth upgrades for critical sites and on WAN optimization appliances.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Earlier enterprises does not have choice so they have to spend on MPLS circuit&amp;nbsp; as secondary link as well and they need to keep the same bandwidth as primary and that link will be on standby.And this will be the flat calculation like if site utilization is&amp;nbsp; 50 Mbps then they have to go for 100 Mbps or have to choose the plan provided by service provider.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;In above &lt;i&gt;picture-3&amp;nbsp; &lt;/i&gt;there are two available transports MPLS and Internet.Considering the traditional network , primary&amp;nbsp; link will be MPLS as this has QoS with more secured private backbone connectivity to enterprise data centres. Secondary link will be internet which will be used as backup.With SDWAN we are adding intelligence to our network.With SDWAN both transport MPLS and Internet will be used to carry the traffic based on the intend or policy based application aware routing.By doing so internet overlay is also secured&amp;nbsp; and have more features like QoS ,security and tcp optimization.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Now enterprises have choice to use internet link as secondary link even they can combine two internet links and create a policy based application aware routing.Keep critical sensitive or back bone traffic on MPLS link.Some of enterprises security policies will be very strict like banking or insurance sector and they do not trust on public clouds.So it depends what is enterprise requirement as well.This is not true that it will slash the cost to 90% which usually SDWAN advertisements claims.But yes cost will definitely decrease by some percentage and network will be ready to work with today&#39;s business requirements.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Over all SDWAN is still evolving day by day will have more features in future and will be in more demand. Enterprises need to determine the business case for application type,application workload and choose the right tool to fit in their requirement.Stay connected to know more about SDWAN by keeping things simple by excluding the commercial and sales things which you will find a lot everywhere.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;span&gt;&lt;!--more--&gt;&lt;/span&gt;&lt;span&gt;&lt;!--more--&gt;&lt;/span&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://thecontrolplane.blogspot.com/feeds/5777374560704516925/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://thecontrolplane.blogspot.com/2020/09/will-sd-wan-replace-mpls.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8638180278169190553/posts/default/5777374560704516925'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8638180278169190553/posts/default/5777374560704516925'/><link rel='alternate' type='text/html' href='https://thecontrolplane.blogspot.com/2020/09/will-sd-wan-replace-mpls.html' title='Will SD-WAN replace MPLS?'/><author><name>Rahul @TCP</name><uri>http://www.blogger.com/profile/18444237920037526242</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6QfWgGRY1ILvPGV7vpeNQUoRfSfQGXt70dSs-De5XIGE5J9jNdaAcYco_yvOwd_hJf0jEkIiXnclBhtpyevb3UqCEFiFGbr4tip_jGyTQRUBhzZaI2WG0qJVLV7ifsLpz6QcAXf3pchUY/s72-c-rw/Car-old.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8638180278169190553.post-7932700382591111012</id><published>2020-09-07T13:33:00.026+05:30</published><updated>2020-09-19T01:10:21.870+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="MPLS vs SD-WAN"/><category scheme="http://www.blogger.com/atom/ns#" term="MPLS vs SDWAN"/><category scheme="http://www.blogger.com/atom/ns#" term="SD-WAN"/><category scheme="http://www.blogger.com/atom/ns#" term="SD-WAN Explained"/><category scheme="http://www.blogger.com/atom/ns#" term="SD-WAN vs MPLS"/><category scheme="http://www.blogger.com/atom/ns#" term="SDWAN"/><category scheme="http://www.blogger.com/atom/ns#" term="SDWAN vs MPLS"/><category scheme="http://www.blogger.com/atom/ns#" term="Software Defined Wide Area Network"/><category scheme="http://www.blogger.com/atom/ns#" term="What is SDWAN?"/><title type='text'>SD-WAN</title><content type='html'>&lt;div class=&quot;separator&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;&lt;span style=&quot;font-family: Exo;&quot;&gt;&lt;span style=&quot;color: #44c002; font-size: large;&quot;&gt;&lt;b&gt;What is SDWAN? SDWAN vs traditional WAN?&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: Exo;&quot;&gt;&lt;b&gt;SDWAN&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;SDWAN is most advanced technology&amp;nbsp;in WAN.Today there are multiple SDWAN vendors exists. However this discussion will not be vendor specific.It will be a&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Exo 2&amp;quot;;&quot;&gt;general&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Exo 2&amp;quot;;&quot;&gt;high level overview about SDWAN solution.&lt;/span&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;SDWAN stands for Software Defined Wide Area Network.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;In SDWAN&amp;nbsp; control plane ,data plane and management planes are segregated.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;In addition to this we have new term in SDWAN which is orchestration plane.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;Orchestration plane is policy&amp;nbsp;driven segment of SD-WAN where we can push any action on sites using policies.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;This action can be traffic flow,routing changes,transport change etc.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;SDWAN has application aware routing functionality.Which means it can identify the applications.So,accordingly critical applications traffic engineering can be done.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;SDWAN solution is transport independent.It&#39;s does&#39;t matter if you have MPLS, private cloud or Internet link.Just need reachability till controllers.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;SDWAN has controllers which can be hosted on public cloud or on customer&amp;nbsp;on premises&amp;nbsp; data centres.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;These controllers serve Management ,Orchestration and Control plane services.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;The data plane reside inside the another SDWAN customer edge router device which will be installed on remote sites or Data Center.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;The remote site or customer data center&amp;nbsp;should have underlay reachability till controllers.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;The term underlay and overlay is frequently used in SDWAN environment.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;Underlay is physical&amp;nbsp;connectivity and reachability&amp;nbsp; of site A to site B or site A to any DC or Site A to internet.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;Overlay is a logical connectivity which is build over underlay using IPSec in case of SDWAN.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;All the Customer Edges SDWAN routers&amp;nbsp; will connect to controllers using secured encrypted tunnels.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;All the SDWAN controllers will have to exchange the encrypted keys before establishing the secure connection.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;For control plane traffic there will be direct tunnels towards SDWAN which will be established after whitelisting and key exchange mechanism.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;All the SDWAN edges devices will have serial number tagged to a particular organisation.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;Once the control connection between controllers and SDWAN edges&amp;nbsp;is established, All SDWAN edges devices will receive&amp;nbsp;the information about the destination from controllers.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;After getting the the destination information the SDWAN edges will establish the dynamic IPSec full mesh tunnels with all site for data plane connectivity.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;These IPSec tunnel connection is more faster ,dynamic and different from tradition IPSec.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;Advantage of SDWAN is if site has two WAN links either MPLS-Internet,MPLS-MPLS,Internet-Internet.Both can be utilized using policy driven routing.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;Customer SDWAN edges have plug and play feature no manual intervention required.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;Inbuilt&amp;nbsp; traffic inspection and detection, no separate hardware required.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;SDWAN will monitor the all possible underlay end to end hop connections as well.So,&amp;nbsp; any issues can be reported proactively.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;As SD-WAN controllers are hosted in cloud, this solution&amp;nbsp;has capability&amp;nbsp;of Cloud integration.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;Deployment&amp;nbsp;time is very less.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-family: Exo 2;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv7ZSDfKsC9VyKF6NqUcGfJGQhq9-zHXRh_NPwhTm7EcoYzqZ0RVAHefM8El2o3goPA5mIhJNiKX4g7EamBPEpZW7pwc7yLQV_zJYb5Lrm11rqSYIc1_JLWhCjak60u7RMJwDbWE099D-c/&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;SD-WAN&quot; data-original-height=&quot;691&quot; data-original-width=&quot;902&quot; height=&quot;469&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv7ZSDfKsC9VyKF6NqUcGfJGQhq9-zHXRh_NPwhTm7EcoYzqZ0RVAHefM8El2o3goPA5mIhJNiKX4g7EamBPEpZW7pwc7yLQV_zJYb5Lrm11rqSYIc1_JLWhCjak60u7RMJwDbWE099D-c/s1600-rw/image.png&quot; title=&quot;SD-WAN&quot; width=&quot;625&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;br style=&quot;font-family: &amp;quot;exo 2&amp;quot;; text-align: center;&quot; /&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;Traditional WAN:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;In tradition WAN there is no application visibility.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;For each site CPE need manual intervention and Provider dependency for routing and peering setup.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;Does not have flexibility and fast enough to do application aware routing.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;In traditional&amp;nbsp;WAN there is a DMVPN solution to use internet as underlay however that is not much scalable and have limitations&lt;/span&gt;.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;Control Plane lies on same CPE so have to login to each CPE for any changes.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;For WAN&amp;nbsp; Traffic optimization,inspection and detection separate hardware required.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;Required more bandwidth and both WAN links will not be utilized optimally.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;It has legacy way for cloud integration.When enterprise use multi-cloud, its difficult to manage and troubleshoot.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;If any of the WAN link is highly utilized it require a manual intervention to offload the traffic to backup link.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;The manual offloading is expensive if both links are MPLS as enterprise need to opt for active/active load sharing&amp;nbsp;WAN connection which will increase the operational cost.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;If backup link is DMVPN it has limitation voice and video traffic performance will be degraded.There is no dynamic tunnel tracking.Sometimes required a manual bounce to refresh the tunnel.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;Some of the service providers use 3G/4G backup links on which performance will be very poor with unoptimized traffic flow.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;Enterprises will have very less visibility at provider end.For any issue enterprises need to log a case with service provider where getting response and resolution on time is challenging.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;For each WAN changes enterprise need to engage provider engineer and have to careful about prefix limits.Requires downtime and sometime failover will also not work due to many issues.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;It&#39;s very expensive and time consuming.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFbk0nk4lmY303skV1546X3eRdlJWpeVMyPftgbNNYdUEFrQWUoJqovTfiKghLpbELcBlxWTLnnypNFb0NTp5tKygZmveirUTvBvvfQb2K1v51IfYHco5wxNQpo8yRjQLHWGj2AudmSrzh/&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;SD-WAN&quot; data-original-height=&quot;571&quot; data-original-width=&quot;876&quot; height=&quot;469&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFbk0nk4lmY303skV1546X3eRdlJWpeVMyPftgbNNYdUEFrQWUoJqovTfiKghLpbELcBlxWTLnnypNFb0NTp5tKygZmveirUTvBvvfQb2K1v51IfYHco5wxNQpo8yRjQLHWGj2AudmSrzh/s1600-rw/image.png&quot; title=&quot;SDWAN&quot; width=&quot;625&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: &#39;Exo 2&#39;;&quot;&gt;Overall because of these advantages most of the organisations are moving towards SDWAN solutions.It is single fabric to manage all the WAN devices.Can SD-WAN replace MPLS? Follow us for upcoming blogs to know more.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://thecontrolplane.blogspot.com/feeds/7932700382591111012/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://thecontrolplane.blogspot.com/2020/09/what-is-sdwan-sdwan-vs-traditional-wan.html#comment-form' title='17 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8638180278169190553/posts/default/7932700382591111012'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8638180278169190553/posts/default/7932700382591111012'/><link rel='alternate' type='text/html' href='https://thecontrolplane.blogspot.com/2020/09/what-is-sdwan-sdwan-vs-traditional-wan.html' title='SD-WAN'/><author><name>Rahul @TCP</name><uri>http://www.blogger.com/profile/18444237920037526242</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv7ZSDfKsC9VyKF6NqUcGfJGQhq9-zHXRh_NPwhTm7EcoYzqZ0RVAHefM8El2o3goPA5mIhJNiKX4g7EamBPEpZW7pwc7yLQV_zJYb5Lrm11rqSYIc1_JLWhCjak60u7RMJwDbWE099D-c/s72-c-rw/image.png" height="72" width="72"/><thr:total>17</thr:total></entry></feed>