<?xml version="1.0" encoding="utf-8"?>
<!-- generator="" -->
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>SASE &amp; SD-WAN</title>
		<description><![CDATA[Leading Network Security & Cyber Security site. Cisco Routing/Switching, VPN, Microsoft, SASE, SSE, F5, PaloAlto Firewalls, Protocol Analysis, Tips & more.]]></description>
		<link>https://www.firewall.cx/security/sase-and-sd-wan.html</link>
		<lastBuildDate>Sat, 11 Apr 2026 12:43:37 +1000</lastBuildDate>
		<generator></generator>
		<atom:link rel="self" type="application/rss+xml" href="https://www.firewall.cx/security/sase-and-sd-wan.feed?type=rss"/>
		<language>en-gb</language>
		<item>
			<title>The Need for a Converged SASE Platform. Converging Network &amp; Security Services with Catonetworks SASE Platform</title>
			<link>https://www.firewall.cx/security/sase-and-sd-wan/deep-dive-into-catonetworks-converged-sase-platform.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/sase-and-sd-wan/deep-dive-into-catonetworks-converged-sase-platform.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/sd-wan/the-need-for-a-converged-sase-platform/intro-image.jpg" alt="SASE Converged Network - Catonetworks" style="margin: 7px; float: left;" title="SASE Converged Network - Catonetworks" />The digital transformation is pushing applications to the cloud, the 2020-2022 pandemic shifted employees to work from home, and the number of resulting new use cases is sending IT leaders scrambling for answers. The number of solutions IT departments have had to adopt to ensure their network's performance and security has continuously grown for over a decade.</p>
<p style="text-align: justify;">The recent trends have greatly accelerated this process. When looking into ways to help mitigate this complexity, one of the leading conclusions is that enterprises should find ways to consolidate their separate, stand-alone, products into a unified solution which can be more easily managed and maintained, and which can provide them with a consistent and a holistic view of all traffic in their network.</p>
<p style="text-align: justify;"><strong>Gartner</strong> has gone a step further and designed a framework that facilitates this, which they named the <a href="https://www.firewall.cx/security/sase-and-sd-wan/secure-access-service-edge-and-sdwan.html" target="_blank" title="Secure Access Service Edge"><strong>Secure Access Service Edge</strong></a> (<strong>SASE</strong>). <strong>SASE</strong> is, in essence, an architecture that <strong>converges networking</strong> and <strong>security capabilities</strong> into a <strong>single solution</strong> and goes a long way in reducing <strong>network complexity</strong>.</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/the-need-for-a-converged-sase-platform/what-is-sase.png" alt="what is sase" style="display: block; margin-left: auto; margin-right: auto;" title="What is sase?" /></p>
<p style="text-align: justify;">Before we talk about the <strong>networking</strong> and <strong>security services</strong> that <strong>SASE converges</strong>, let's first look at the <strong>entities</strong> and <strong>traffic flows</strong> they need to serve.</p>
<p style="text-align: justify;">The journey starts at any of the <strong>enterprise's endpoints</strong> which need to access any of the <strong>enterprise's assets</strong> or <strong>external resources</strong>. The origin endpoints are typically <strong>users</strong> who can connect from any of the <strong>enterprise's physical locations</strong> or <strong>remotely</strong>. <strong>Physical locations</strong> are typically <strong>enterprise headquarters</strong> or <strong>branch offices</strong>, which connect between themselves or to other enterprise locations such as <strong>physical</strong> or <strong>cloud-based datacenters</strong>. <strong>Enterprises</strong> typically use an <strong>MPLS </strong>and/or <strong>SD-WAN</strong> product to connect their physical locations:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/sd-wan/the-need-for-a-converged-sase-platform/traditional-mpls-vpn-network.png" alt="Traditional MPLS VPN Network" title="Traditional MPLS VPN Network" /></p>
<p style="text-align: center;">Traditional MPLS VPN Network</p>
<p style="text-align: justify;"><strong>Mobile &amp; Remote users</strong> will use a remote access solution to connect to their networks. <strong>Cloud-based services</strong> such as AWS, Azure will require <strong>virtual connectors</strong>, or other <strong>secure tunnel solutions</strong> to connect to the enterprise network and remote offices use a private managed MPLS service to connect to the headquaters.</p>
<p style="text-align: left;">As we can see, a modern digital enterprise needs to connect various types of endpoints that are spread across multiple locations.</p>
<p style="text-align: left;">So how is it possible to <strong>converge network and security services</strong> for such a dispersed network topology?</p>
<p style="text-align: justify;">The only real option, as Gartner stated, is to use a cloud service to which all network endpoints can connect and which is <strong>capable of delivering all required services</strong>. This is precisely what <strong>Cato's SASE Cloud platform</strong> offers:</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/the-need-for-a-converged-sase-platform/sd-wan-sase-network-architecture.png" alt="SD-WAN SASE Network Architecture" style="display: block; margin-left: auto; margin-right: auto;" title="SD-WAN SASE Network Architecture" /></p>
<p style="text-align: center;">SASE Architecture Example</p>
]]></description>
			<category>SASE &amp; SD-WAN Networks</category>
			<pubDate>Mon, 17 Oct 2022 10:23:44 +1100</pubDate>
		</item>
		<item>
			<title>Key Features of a True Cloud-Native SASE Service. Setting the Right Expectations</title>
			<link>https://www.firewall.cx/security/sase-and-sd-wan/key-features-sase-cloud-providers-must-have.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/sase-and-sd-wan/key-features-sase-cloud-providers-must-have.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong><img src="https://www.firewall.cx/images/stories/sd-wan/key-features-cloud-sase-service/cloud-services-intro.png" alt="key features of true cloud SASE providers" style="margin: 7px; float: left;" title="Key features of true cloud SASE providers" />Secure Access Service Edge</strong> (<strong>SASE</strong>) is an architecture widely regarded as the future of enterprise networking and security. In previous articles we talked about the <a href="https://www.firewall.cx/security/sase-and-sd-wan/converged-sase-backbone-reduced-latency-jitter-packet-loss.html" target="_blank" title="Benefits of a converged, cloud-delivered, SASE service">benefits of a converged, cloud-delivered, SASE service</a> which can deliver necessary networking and security services to all enterprise edges. But what does "<strong>cloud delivered</strong>" mean exactly? And are all cloud services the same?</p>
<p>We’ll be covering the above and more in this article:</p>
<ul class="check">
<li>
<div><a href="https://www.firewall.cx/security/sase-and-sd-wan/key-features-sase-cloud-providers-must-have.html#defining-cloud-native-services" title="Defining Cloud-Native Services">Defining Cloud-Native Services</a></div>
</li>
<li>
<div><a href="https://www.firewall.cx/security/sase-and-sd-wan/key-features-sase-cloud-providers-must-have.html#single-pass-architecture" title="Cloud-Native – Single Pass Architecture">Cloud-Native – Single Pass Architecture</a></div>
</li>
<li>
<div><a href="https://www.firewall.cx/security/sase-and-sd-wan/key-features-sase-cloud-providers-must-have.html#scalable-cloud-native-services" title="Scalable Cloud-Native Services">Scalable Cloud-Native Services</a></div>
</li>
<li>
<div><a href="https://www.firewall.cx/security/sase-and-sd-wan/key-features-sase-cloud-providers-must-have.html#cloud-native-service-resiliency" title="Cloud-Native Service Resiliency">Cloud-Native Service Resiliency</a></div>
</li>
<li>
<div><a href="https://www.firewall.cx/security/sase-and-sd-wan/key-features-sase-cloud-providers-must-have.html#cloud-native-service-managed-service" title="Cloud-Native Service Managed Service">Cloud-Native Service Managed Service</a></div>
</li>
<li>
<div><a href="https://www.firewall.cx/security/sase-and-sd-wan/key-features-sase-cloud-providers-must-have.html#summary" title="Summary">Summary</a></div>
</li>
</ul>
<h2 style="text-align: left;">Related Articles:</h2>
<ul>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/sd-wan-networks-benefits-management-security-architecture.html" target="_blank" title="Complete Guide to SD-WAN. Technology Benefits, SD-WAN Security, Management, Mobility, VPNs, Architecture and more">Complete Guide to SD-WAN. Technology Benefits, SD-WAN Security, Management, Mobility, VPNs, Architecture and more</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/securing-your-sd-wan-options-security-management-web-filtering.html" target="_blank" title="How To Secure Your SD-WAN. Comparing DIY, Managed SD-WAN and SD-WAN Cloud Services">How To Secure Your SD-WAN. Comparing DIY, Managed SD-WAN and SD-WAN Cloud Services</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/comparing-sase-and-vpn-features-security-flexibility-vulnerabilities.html" target="_blank" title="SASE and VPNs: Reconsidering your Mobile Remote Access and Site-to-Site VPN strategy">SASE and VPNs: Reconsidering your Mobile Remote Access and Site-to-Site VPN strategy</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/converged-sase-backbone-reduced-latency-jitter-packet-loss.html" target="_blank" title="Converged SASE Backbone – How Leading SASE Provider, Cato Networks, Reduced Jitter/Latency and Packet Loss by a Factor of 13!">Converged SASE Backbone – How Leading SASE Provider, Cato Networks, Reduced Jitter/Latency and Packet Loss by a Factor of 13!</a></li>
</ul>
<h2 style="text-align: left;"><a name="defining-cloud-native-services">Defining Cloud-Native Services</a></h2>
<p style="text-align: justify;">While we all use cloud services daily for both work and personal benefit, we typically don't give much thought to what actually goes on in the elusive place we fondly call "the cloud". For most people, "the cloud" means they are just using someone else’s computer. For most cloud services, this definition is a good enough, as we don't need to know, nor care, about what they do behind the scenes.</p>
<p style="text-align: justify;">For cloud services delivering enterprise networking and security services, however, this matters a lot. The difference between a true cloud-native architecture and software simply deployed in a cloud environment, can have detrimental impact on the <strong>availability</strong>, <strong>stability</strong>, <strong>performance</strong>, and <strong>security</strong> of your enterprise.&nbsp;</p>
<p>Let's take a look at what <strong>cloud-native</strong> means, and the importance it plays in our network.</p>
]]></description>
			<category>SASE &amp; SD-WAN Networks</category>
			<pubDate>Thu, 18 Aug 2022 11:42:40 +1000</pubDate>
		</item>
		<item>
			<title>Converged SASE Backbone – How Leading SASE Provider, Cato Networks, Reduced Jitter/Latency and Packet Loss by a Factor of 13!</title>
			<link>https://www.firewall.cx/security/sase-and-sd-wan/converged-sase-backbone-reduced-latency-jitter-packet-loss.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/sase-and-sd-wan/converged-sase-backbone-reduced-latency-jitter-packet-loss.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/sd-wan/converged-sase-backbone/sase-intro.jpg" alt="sase intro" style="margin: 7px; float: left;" />Global connectivity is top of mind for many IT teams at organizations of all sizes. We are currently in the middle of a dramatic shift in business and technology practice, as users are becoming more <strong>mobile</strong> while applications are being <strong>transitioned to the cloud</strong>. &nbsp;This shift will only accelerate as companies will look to leverage the <strong>speed</strong> and <strong>agility of cloud services</strong> with the <strong>operational</strong>, <strong>cost</strong> and <strong>quality advantages</strong> of a geographically distributed work force. While Covid-19 has contributed to the acceleration of this shift, the change was always inevitable once technology was ready. <strong>Legacy connectivity</strong> and <strong>security products</strong> have long been a <strong>barrier to progress</strong>.</p>
<p style="text-align: left;"><strong>Key Topics</strong>:<strong><br /></strong></p>
<ul>
<li style="text-align: left;"><a href="https://www.firewall.cx/security/sase-and-sd-wan/converged-sase-backbone-reduced-latency-jitter-packet-loss.html#sase-is-the-answer" title="SASE is the Answer">SASE is the Answer</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/security/sase-and-sd-wan/converged-sase-backbone-reduced-latency-jitter-packet-loss.html#converged-private-backbone" title="A Converged Private Backbone is Essential">A Converged Private Backbone is Essential</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/security/sase-and-sd-wan/converged-sase-backbone-reduced-latency-jitter-packet-loss.html#proof-is-in-the-packets" title="The Proof is in the Packets – Testing a Converged SASE Solution">The Proof is in the Packets – Testing a Converged SASE Solution</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/security/sase-and-sd-wan/converged-sase-backbone-reduced-latency-jitter-packet-loss.html#summary" title="Summary">Summary</a></li>
</ul>
<h2 style="text-align: left;"><a name="sase-is-the-answer">SASE is the Answer</a></h2>
<p style="text-align: justify;">With uncanny timing, Gartner introduce the <strong>Secure Access Service Edge</strong> or <strong>SASE</strong> near the end of 2019, just before the Covid-19 virus started to gain global traction. SASE represents the shift away from castle &amp; moat security with resources siloed into just a few corporate datacenters. After all, if organizations are consuming collaboration and productivity tools from the cloud, why not security and connectivity too?</p>
<p style="text-align: justify;">While there is much buzz around SASE with security and networking vendors, and some debate over what products and services fit the SASE moniker, the intention is simple: <strong>leveraging economies of scale</strong>, organizations should purchase <strong>SASE</strong> as a <strong>cloud delivered service</strong> with <strong>global presence</strong> that brings <strong>security</strong> <strong>closer to the user</strong>. The <strong>user</strong> can be <strong>remote</strong>, <strong>mobile</strong> or in a <strong>corporate owned facility</strong>, regardless of physical location, the user’s access and security posture should remain consistent.</p>
<p style="text-align: center;"><a href="https://www.firewall.cx/images/stories/sd-wan/converged-sase-backbone/cato-sase-pop-map-large.png" class="jcepopup" title="CatoNetworks SASE Point-of-Presence locations" data-mediabox="1" data-mediabox-title="CatoNetworks SASE Point-of-Presence Locations"><img src="https://www.firewall.cx/images/stories/sd-wan/converged-sase-backbone/cato-sase-pop-map-small.png" alt="cato sase pop map" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" /></a>Figure 1: Cato PoP Map (click to enlarge)</p>
<p style="text-align: justify;">At Cato Networks we built the <strong>first SASE solution</strong>, starting way back in 2015. We’ve grown to <strong>70+ Point-of-Presence</strong> (PoPs) globally that <strong>fully converge networking </strong>and<strong> security </strong>into a <strong>single platform</strong>. With our experience we believe that a <strong>global private backbone</strong> is an <strong>essential component</strong> of a <strong>true SASE solution</strong>. If we consider that the goal is consistent access and security with <strong>reduced cost</strong> and <strong>complexity</strong>, we must recognize that the ability of a user to access resources applies not just to access controls and services, but also to the usability and reliability of that user’s access. Essentially –users must have predictable performance to be productive.</p>
<h2 style="text-align: left;"><a name="converged-private-backbone">A Converged Private Backbone is Essential</a></h2>
<p style="text-align: justify;"><strong>Reliability</strong> and <strong>predictability</strong> of connectivity isn’t a new concept or focus area for technical teams. Organizations have been using MPLS and other methods to achieve this for years. But <strong>MPLS</strong> is <strong>expensive</strong>, resulting in <strong>reliable</strong>, <strong>low bandwidth links</strong> to just a <strong>few places</strong>. Don’t forget that this approach completely neglected remote users who traditionally have had to <strong>VPN</strong> across the <strong>public Internet</strong> to reach <strong>datacenter security</strong> and <strong>resources</strong>.</p>
<p style="text-align: justify;">Fast forwarding to today, most SASE vendors position their services as a way to <strong>reduce</strong> or <strong>eliminate</strong><strong>MPLS</strong>, but <strong>completely ignore</strong> the <strong>unpredictability</strong> of the <strong>public Internet</strong>. Cato’s service was architected with this in mind, and we connected our <strong>PoPs</strong> with a <strong>global private backbone</strong> of <strong>multiple tier 1 providers</strong>. Our customer’s packets aren’t taking the cheapest possible route across tier 3 providers, instead taking the <strong>most efficient route</strong> to the <strong>destination</strong>. Combined with our <strong>WAN optimization capabilities</strong>, <strong>Cato</strong> ensures <strong>reliable</strong>, <strong>predictable performance</strong> for <strong>all users and locations</strong>.</p>
<p style="text-align: center;"><a href="https://www.firewall.cx/images/stories/sd-wan/converged-sase-backbone/catonetworks-network-rules-large.png" class="jcepopup" title="Cato Networks Network Rules" data-mediabox="1" data-mediabox-title="Cato Networks Network Rules"><img src="https://www.firewall.cx/images/stories/sd-wan/converged-sase-backbone/catonetworks-network-rules-small.png" alt="Cato Networks - Network Rules" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Cato Networks - Network Rules" /></a>Figure 2: Cato Network Rules (click to enlarge)</p>
<p style="text-align: justify;">The easiest way to see if a <strong>SASE vendor</strong> has a <strong>converged private backbone</strong> is to look at their <strong>management console</strong>. Your vendor should enable you to make <strong>granular Internet</strong> &amp; <strong>WAN rules</strong> to manage the handling and routing of your traffic. In addition to <strong>priority level</strong>, you should be able to control <strong>egress PoP location</strong>, even egressing your traffic from dedicated private IP addresses, and enabling things like <strong>TCP optimization</strong> and <strong>packet loss mitigation</strong>. &nbsp;</p>
<p style="text-align: center;"><a href="https://www.firewall.cx/images/stories/sd-wan/converged-sase-backbone/catonetworks-network-rule-criteria-large.png" class="jcepopup" title="Cato Networks - Network Rule Criteria" data-mediabox="1" data-mediabox-title="Cato Networks - Network Rule Criteria"><img src="https://www.firewall.cx/images/stories/sd-wan/converged-sase-backbone/catonetworks-network-rule-criteria-small.png" alt="Cato Networks - Network Rule Criteria" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Cato Networks - Network Rule Criteria" /></a>Figure 3: Network Rule Criteria (click to enlarge)</p>
<p>&nbsp;</p>
<p style="text-align: center;"><a href="https://www.firewall.cx/images/stories/sd-wan/converged-sase-backbone/catonetwork-network-rule-actions-large.png" class="jcepopup" title="Cato Networks -  Network rule actions" data-mediabox="1" data-mediabox-title="Cato Networks -  Network rule actions"><img src="https://www.firewall.cx/images/stories/sd-wan/converged-sase-backbone/catonetwork-network-rule-actions-small.png" alt="Cato Networks - Network Rule Actions" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Cato Networks - Network Rule Actions" /></a>Figure 4: Network Rule Actions (click to enlarge)</p>
<p style="text-align: justify;">Having the ability to configure these policies directly in the management interface demonstrates that the backbone is a <strong>converged component</strong> of the solution. <strong>You</strong> <strong>should not</strong> have to <strong>open tickets</strong> and wait for routing policies to be created on your behalf, instead you should have <strong>direct control</strong> with the ability to <strong>deploy</strong> or <strong>modify policies</strong> in <strong>real-time</strong>.</p>
<p style="text-align: justify;"><strong>Controlling egress location</strong> allows you to <strong>maximize</strong> your utilization of Cato’s global private backbone, <strong>egressing</strong> your traffic <strong>as close to the destination as possible</strong>. The ability to use <strong>dedicated private IP addresses</strong> mean that you can use <strong>source-IP anchoring policies</strong> for <strong>SaaS application</strong> <strong>security</strong>, without having to backhaul your traffic anywhere.</p>
<p style="text-align: justify;">The ability to <strong>create</strong> and <strong>manage</strong> your <strong>WAN</strong> and <strong>Internet traffic</strong> with <strong>policies</strong> is <strong>key</strong>, but also essential is understanding how these policies are impacting your traffic and <strong>real-time visibility into performance</strong>. <strong>Cato</strong> allows you <strong>real-time views</strong> into <strong>performance</strong>, <strong>priority level</strong> and <strong>application usage</strong>. These insights are <strong>invaluable</strong> in ensuring your policies are <strong>meeting your organization’s needs</strong> or evaluating potential changes that may be required.</p>
<p style="text-align: center;"><a href="https://www.firewall.cx/images/stories/sd-wan/converged-sase-backbone/catonetworks-traffic-priority-analyzer-large.png" class="jcepopup" title="Cato Networks - Traffic Priority Analyzer" data-mediabox="1" data-mediabox-title="Cato Networks - Traffic Priority Analyzer"><img src="https://www.firewall.cx/images/stories/sd-wan/converged-sase-backbone/catonetworks-traffic-priority-analyzer-small.png" alt="Cato Networks - Traffic Priority Analyzer" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Cato Networks - Traffic Priority Analyzer" /></a>Figure 5: Traffic Priority Analyzer (click to enlarge)</p>
<h2 style="text-align: left;"><a name="proof-is-in-the-packets">The Proof is in the Packets – Testing a Converged SASE Solution</a></h2>
<p style="text-align: justify;">To demonstrate the <strong>real-world implications</strong> of a <strong>converged SASE solution</strong> with a <strong>global private backbone</strong>, we ran <strong>PingPlotter</strong> to a server in China over a <strong>48-hour period</strong> using both the <strong>public Internet</strong> and <strong>Cato’s backbone</strong>. Connectivity into China is usually complex due to regulation and the great firewall, but <strong>Cato’ PoP network</strong> can <strong>easily enable</strong> organizations access <strong>into and out of China</strong> (Cato has 3 PoPs in China and a government approved link to Hong Kong).</p>
<p style="text-align: justify;">As you can see below, the results speak for themselves. When <strong>utilizing Cato’s backbone</strong>, we had <strong>only 20ms of Jitter</strong>, <strong>down</strong> from <strong>260ms</strong> on the <strong>public Internet</strong>. We also had much <strong>less packet loss</strong> with our connection being far more <strong>reliable</strong> and <strong>consistent</strong>. You can just imagine the difference in user experience when using file sharing, VOIP or collaboration tools:</p>
<p style="text-align: center;"><a href="https://www.firewall.cx/images/stories/sd-wan/converged-sase-backbone/catonetworks-sase-private-global-network-test-large.png" class="jcepopup" title="CatoNetworks - SASE Private Global Network China test" data-mediabox="1" data-mediabox-title="CatoNetworks - SASE Private Global Network China test"><img src="https://www.firewall.cx/images/stories/sd-wan/converged-sase-backbone/catonetworks-sase-private-global-network-test-small.png" alt="CatoNetworks - SASE Private Global Network China test" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="CatoNetworks - SASE Private Global Network China test" /></a>Figure 6: PingPlotter Tests&nbsp;(click to enlarge)</p>
<h2 style="text-align: left;"><a name="summary">Summary</a></h2>
<p style="text-align: justify;">The promise of <strong>SASE</strong> is to bring <strong>security</strong> and <strong>connectivity</strong> to <strong>all edges</strong> with <strong>less cost and complexity</strong>. To do this effectively, a SASE vendor must have a <strong>global private backbone</strong>. At <strong>Cato</strong>, we built our <strong>SASE cloud</strong> from the <strong>ground up</strong>, <strong>fully converging networking</strong> and <strong>security</strong> into a <strong>single platform</strong> delivered from <strong>70+ global PoPs</strong> that are connected by a <strong>private backbone</strong> composed of <strong>multiple Tier 1 providers</strong>. <strong>Cato</strong> allows you to <strong>quickly connect</strong> and <strong>secure users </strong>and <strong>locations</strong> at <strong>global scale</strong> with ease.</p>
<p style="text-align: justify;">More information on <strong>SD-WAN</strong> and <strong>SASE</strong> can be found in our <a href="https://www.firewall.cx/security/sase-and-sd-wan.html" title="dedicated SASE and SD-WAN section">dedicated SASE and SD-WAN section</a>.</p>]]></description>
			<category>SASE &amp; SD-WAN Networks</category>
			<pubDate>Wed, 23 Feb 2022 12:34:18 +1100</pubDate>
		</item>
		<item>
			<title>Configuring A SASE Unified Network: Data centers, Remote Sites, VPN Users, and more</title>
			<link>https://www.firewall.cx/security/sase-and-sd-wan/configuring-a-sase-unified-network.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/sase-and-sd-wan/configuring-a-sase-unified-network.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/sd-wan/configuring-sase-unified-network/sase-introduction.jpg" alt="sase introduction" style="margin: 7px; float: left;" title="sase introduction" />This article explores the need for <strong>Secure Access Service Edge</strong> (<strong>SASE</strong>) in today’s organizations. We show how one of the<strong> most advanced SASE platforms</strong> available, combines <a href="https://www.firewall.cx/security/sase-and-sd-wan/comparing-sase-and-vpn-features-security-flexibility-vulnerabilities.html" target="_blank" title="VPN and SD-WAN capabilities"><strong>VPN</strong> and <strong>VPN and SD-WAN capabilities</strong></a> with <strong>cloud-native&nbsp;security&nbsp;functions</strong> to <strong>quickly</strong> and <strong>securely</strong> connect <strong>On-premises data centers</strong>, <strong>cloud data centers</strong>, <strong>branch offices,</strong> and <strong>remote users</strong>.</p>
<p>Before we dive any further, let’s take a look at what’s covered:</p>
<ul>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/configuring-a-sase-unified-network.html#sas-architecture-secure-cloud" title="SASE: The Architecture for a Secure Cloud and Mobile World">SASE: The Architecture for a Secure Cloud and Mobile World</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/configuring-a-sase-unified-network.html#defining-sase" title="Defining SASE">Defining SASE</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/configuring-a-sase-unified-network.html#four-pillars-of-sase" title="The Four Pillars of SASE Architecture">The Four Pillars of SASE Architecture</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/configuring-a-sase-unified-network.html#sase-showcase" title="SASE Showcase: Connecting &amp; Managing All Locations Together">SASE Showcase: Connecting &amp; Managing All Locations Together</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/configuring-a-sase-unified-network.html#the-sase-unified-network" title="The SASE Unified Network">The SASE Unified Network</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/configuring-a-sase-unified-network.html#summary" title="Summary">Summary</a></li>
</ul>
<h2>Related Articles</h2>
<ul>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/sd-wan-networks-benefits-management-security-architecture.html" target="_blank" title="Complete Guide to SD-WAN. Technology Benefits">Complete Guide to SD-WAN. Technology Benefits, SD-WAN Security, Management, Mobility, VPNs, Architecture &amp; Comparison with Traditional WANs. SD-WAN Providers Feature Checklist</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/sd-wan-evolving-solution-for-branch-offices.html" target="_blank" title="SD-WAN is the Emerging, Evolving Solution for the Branch Office">SD-WAN is the Emerging, Evolving Solution for the Branch Office</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/secure-access-service-edge-and-sdwan.html" target="_blank" title="Understanding Secure Access Service Edge (SASE) and how it integrates with SD-WAN">Understanding Secure Access Service Edge (SASE) and how it integrates with SD-WAN</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/comparing-sase-and-vpn-features-security-flexibility-vulnerabilities.html" target="_blank" title="SASE and VPNs: Reconsidering your Mobile Remote Access and Site-to-Site VPN strategy">SASE and VPNs: Reconsidering your Mobile Remote Access and Site-to-Site VPN strategy</a></li>
</ul>
<h2 style="text-align: left;"><a name="sas-architecture-secure-cloud">SASE: The Architecture for a Secure Cloud and Mobile World</a></h2>
<p style="text-align: justify;"><strong>IT</strong> and <strong>security managers</strong> are constantly concerned by the different entities which connect to their networks. Keeping track of <strong>who is connecting</strong>, using which <strong>edge device type</strong>, what they’re connecting to, and which permissions they should have can be a messy and dangerous business.&nbsp;&nbsp;</p>
<p style="text-align: justify;">An <strong>enterprise’s network</strong> is composed of several types of <strong>edges</strong>. An <strong>edge</strong> can be any <strong>location</strong> or <strong>endpoint</strong> which needs to connect to any other <strong>resource</strong> or <strong>service</strong> available inside or outside the network. This includes the enterprise’s <strong>on-premises headquarters</strong>, <strong>branch offices</strong>, <strong>data centers</strong>, <strong>mobile users</strong> connecting <strong>remotely</strong> (e.g. their home), <strong>public cloud data centers</strong> (e.g. AWS and Azure), <strong>3<sup>rd</sup> party SaaS applications</strong> (e.g. Office365 and Salesforce), and virtually any website across the WWW.</p>
<p style="text-align: justify;">To <strong>enable connectivity</strong> and <strong>secure access</strong> for <strong>all edges</strong>, enterprises are forced to adopt <strong>different solutions</strong> to manage <strong>different edge types</strong>. For example VPN for remote users, on-prem <strong>Next Generation Firewalls</strong> (NGFWs) for the physical locations, <strong>cloud-based NGFW</strong> for cloud-based applications, <strong>Cloud Access Security Brokers</strong> (CASB) for <strong>SaaS</strong> and <strong>Secure Web Gateways</strong> (SWG) for web access. &nbsp;This large number of different products introduced unwanted complexity, inefficiency, and potential security loopholes to enterprises. But perhaps there is a better way to enable secure access to any service from any edge? In fact, there is, and it’s called, surprisingly enough, Secure Access Service Edge (SASE).</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/configuring-sase-unified-network/catonetworks-sase-sdwan-network-traffic-graph.png" alt="catonetworks sase sdwan network traffic graph" style="display: block; margin-left: auto; margin-right: auto;" title="catonetworks sase sdwan network traffic graph" /></p>
<p style="text-align: center;">Cloud-based SASE Traffic Analysis Dashboard</p>
<h2 style="text-align: left;"><a name="defining-sase">Defining SASE</a></h2>
<p style="text-align: justify;"><strong>SASE</strong> is a new architecture that converges <strong>networking and security</strong> into a holistic, <strong>unified cloud service</strong>. It is a concept defined by <strong>Gartner</strong> in late 2019 to <strong>simplify enterprise networking and security</strong>. At the heart of the SASE premise lays the understanding that network and security cannot be addressed separately, using different products and services. The inter-dependency between the two is <strong>fundamental</strong>, and their convergence is critical for addressing the needs of the <strong>modern digital enterprise</strong>.</p>
<p class="box-hint"><a href="https://www.firewall.cx/security/sase-and-sd-wan/secure-access-service-edge-and-sdwan.html" target="_blank" title="Learn about SASE and how it differs from SD-WAN">Click here</a> to learn more about <strong>SASE</strong> and how it differs from SD-WAN.</p>
<h2 style="text-align: left;"><a name="four-pillars-of-sase">The Four Pillars of SASE Architecture:</a></h2>
<p>&nbsp;<strong>Four main principles</strong> lay at the heart of the <strong>SASE architecture</strong>:</p>
<ol>
<li><strong>All edges</strong>. A <strong>true SASE solution</strong> should be able to service all enterprise edge types.</li>
<li style="text-align: justify;"><strong>Converged</strong>. SASE’s networking and security services should be delivered from <strong>one software stack</strong>, not discrete appliances integrated together, and all must be managed via a <strong>single pane of glass</strong>.</li>
<li><strong>Cloud-native</strong>. A SASE solution should be built using <strong>cloud-native technologies</strong> and should support <strong>elasticity</strong>, <strong>auto-scaling</strong> and <strong>high-availability</strong>.</li>
<li><strong>Global</strong>. An effective SASE solution should have an extensive global footprint of <strong>Points of Presence</strong> (<strong>PoPs</strong>) covering all major locations worldwide.</li>
</ol>
<h2 style="text-align: left;"><a name="sase-showcase">SASE Showcase: Connecting &amp; Managing All Locations Together</a></h2>
<p style="text-align: justify;">One of <strong>SASE’s main goals</strong> is to <strong>simplify </strong><strong>connectivity</strong>, <strong>access, and management</strong> of the enterprise. This is achieved by unifying all the required functionality into a <strong>single solution</strong>.</p>
<p style="text-align: justify;">For example, in <strong>Cato Network’s SASE Cloud platform</strong>, all edges connect to the <strong>closest Cato PoP</strong> and are managed from <strong>Cato’s management console</strong>. All traffic to and from these edges undergo the <strong>same networking optimizations and security inspections</strong> to detect and mitigate threats in <strong>real-time</strong>.</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/configuring-sase-unified-network/catonetworks-sase-platform.png" alt="catonetworks sase sd-wan platform" style="display: block; margin-left: auto; margin-right: auto;" title="catonetworks sase sd-wan platform" /></p>
<p style="text-align: center;">The Cato Network SASE platform provides complete connectivity &amp; management of all endpoints</p>
<p style="text-align: justify;">Connecting physical locations such as the <strong>headquarters</strong>, <strong>branch offices,</strong> and <strong>data centers</strong>, is the simplest scenario. They are controlled by the enterprise and enable an easy deployment of an <strong>SD-WAN appliance</strong> such as the <strong>X1500</strong> (left) and <strong>X1700</strong> (right) <strong>Cato Socket models</strong> shown below:&nbsp;</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/configuring-sase-unified-network/catonetwork-x1500-x1700-sase-appliances.png" alt="catonetwork x1500 x1700 sase appliances" style="display: block; margin-left: auto; margin-right: auto;" title="catonetwork x1500 x1700 sase appliances" /></p>
<p style="text-align: justify;">The <strong>Cato Socket</strong> can manage <strong>multiple connections</strong>, preferably from <strong>multiple ISPs</strong>, in <strong>active/active mode</strong> and continuously monitors them to determine the best performing link to send traffic over:</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/configuring-sase-unified-network/catonetwork-edge-sdwan-device.png" alt="catonetwork edge sdwan device" style="display: block; margin-left: auto; margin-right: auto;" title="catonetwork edge sdwan device" /></p>
<p style="text-align: center;">On-Premises Edge</p>
<p>Furthermore, the Cato Socket can make <strong>user- and application-aware decisions</strong> for implementing the defined <strong>QoS policies</strong>.</p>
<p style="text-align: left;">In addition to connecting the enterprise’s on-premises data centers, we also need to connect cloud-based applications at public clouds (<strong>AWS</strong> and <strong>Azure</strong>). For these environments, we will use <strong>Cato’s virtual socket</strong> (<strong>vSocket</strong>) as shown below:</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/configuring-sase-unified-network/catonetwork-virtual-socket.png" alt="catonetwork virtual socket" style="display: block; margin-left: auto; margin-right: auto;" title="catonetwork virtual socket" /></p>
<p style="text-align: justify;">Defining network connectivity to any of these locations is done <strong>quickly</strong> and <strong>easily</strong> via <strong>Cato’s Management console</strong>. By <strong>clicking</strong> the <strong>Configuration</strong> drop-down menu and selecting <strong>Sites</strong> you are taken to the <strong>site configuration screen</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/configuring-sase-unified-network/catonetwork-sdwan-sase-site-configuration.png" alt="catonetwork sdwan sase site configuration" style="display: block; margin-left: auto; margin-right: auto;" title="catonetwork sdwan sase site configuration" /></p>
<p style="text-align: center;">Site Configuration</p>
<p>Then by opening the <strong>Add site</strong> dialog screen, we can configure a new site. We start by naming the new site e.g <strong>Best Site Ever</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/configuring-sase-unified-network/catonetwork-sdwan-sase-site-parameters.png" alt="catonetwork sdwan sase site parameters" style="display: block; margin-left: auto; margin-right: auto;" title="catonetwork sdwan sase site parameters" /></p>
<p style="text-align: center;">New Site Configuration</p>
<p style="text-align: justify;"><br /> We then open the site <strong>Type</strong> drop-down menu and select the <strong>site type.</strong> Available options include <strong>Branch</strong>, <strong>Headquarters</strong>, <strong>Cloud Data Center</strong> or <strong>Data Center</strong> (on-premises):</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/configuring-sase-unified-network/catonetwork-sdwan-sase-site-type-parameter.png" alt="catonetwork sdwan sase site type parameter" style="display: block; margin-left: auto; margin-right: auto;" title="catonetwork sdwan sase site type parameter" /></p>
<p>Next, we open the “<strong>Connection Type</strong>” drop-down menu (see figure below) and select the type of <strong>Cato Socket connector</strong> we wish to use for our site:</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/configuring-sase-unified-network/catonetwork-sdwan-sase-site-connection-type.png" alt="catonetwork sdwan sase site connection type" style="display: block; margin-left: auto; margin-right: auto;" title="catonetwork sdwan sase site connection type" /></p>
<p style="text-align: center;">Socket Type Selection</p>
<p style="text-align: justify;"><strong>Physical</strong> locations typically use the <strong>X1500</strong> or <strong>X1700 Cato Sockets</strong>, while cloud data center locations typically use one of the <strong>Cato virtual sockets</strong> (vSocket), depending on the cloud being accessed. As can be seen from the list of connections types, there is also an option to connect both physical and cloud sites using an <strong>IPsec tunnel</strong>.</p>
<p style="text-align: justify;">The additional configurations are pretty straightforward. In addition to <strong>country</strong> and <strong>time zone</strong>, we need to define the <strong>uplink/downlink bandwidth limitations</strong> for the site and the local subnet used to allocate IP addresses to local hosts. And that’s it. Our site is ready go.</p>
<p>Adding remote users is also a breeze. In the configuration section below, select <strong>VPN Users</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/configuring-sase-unified-network/catonetwork-sdwan-sase-vpn-users.png" alt="catonetwork sdwan sase vpn users" style="display: block; margin-left: auto; margin-right: auto;" title="catonetwork sdwan sase vpn users" /></p>
<p>We then <strong>click</strong> on the “<strong>+</strong>” icon and the <strong>new user dialog</strong> is shown:</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/configuring-sase-unified-network/catonetwork-sdwan-sase-vpn-user-details.png" alt="catonetwork sdwan sase vpn user details" style="display: block; margin-left: auto; margin-right: auto;" title="catonetwork sdwan sase vpn user details" /></p>
<p style="text-align: center;">New User Configuration</p>
<p style="text-align: justify;">We fill in the <strong>user’s full name</strong> and <strong>email address</strong>, and the new user is defined. We then add the user’s phone number and a link for <strong>downloading</strong> and <strong>configuring</strong> the <strong>Cato client</strong>.</p>
<p style="text-align: justify;">Once the <strong>Cato Client</strong> is installed and launched on the user’s device, it will automatically search for the <strong>nearest PoP</strong> and establish a secure connection with it:</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/configuring-sase-unified-network/catonetworks-sase-sdwan-vpn-client.png" alt="catonetworks sase sdwan vpn client" style="display: block; margin-left: auto; margin-right: auto;" title="catonetworks sase sdwan vpn client" /></p>
<p style="text-align: center;">The Cato SDP VPN Client</p>
<p style="text-align: justify;">All traffic sent to and from the device is encrypted. The <strong>Cato SDP client</strong> provides a wide range of statistics, including <strong>traffic usage</strong>, <strong>PoP information</strong>, and more.</p>
<h2 style="text-align: left;"><a name="the-sase-unified-network">The SASE Unified Network</a></h2>
<p style="text-align: justify;">Once we’re done configuring all our different edges, we can easily view our entire network topology by selecting <strong>My Network &gt; Topology</strong>:&nbsp;</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/configuring-sase-unified-network/catonetworks-sase-sdwan-network-diagram.png" alt="catonetworks sase sdwan network diagram" style="display: block; margin-left: auto; margin-right: auto;" title="catonetworks sase sdwan network diagram" /></p>
<p style="text-align: center;">Network Topology</p>
<p style="text-align: justify;">We can see all the edges we have defined: <strong>On-premises data centers</strong>, <strong>cloud data centers</strong>, <strong>HQ/branch offices,</strong> and <strong>remote users</strong>. We can see its status for each defined edge and take a deeper dive to view <strong>extensive analytics</strong> covering <strong>networking</strong>, <strong>security</strong>, and <strong>access metrics</strong>.</p>
<p style="text-align: justify;">A <strong>true SASE solution</strong> should <strong>enable access</strong> and <strong>optimize</strong> and <strong>secure traffic</strong> for <strong>all network edges</strong>. It should make <strong>adding new sites</strong> and <strong>users</strong> <strong>easy and fast</strong>, and it should provide a <strong>unified view</strong> of your <strong>entire network topology</strong>.</p>
<h2 style="text-align: left;"><a name="summary">Summary</a></h2>
<p style="text-align: justify;">In this article, we briefly covered the <strong>purpose of SASE</strong> and showed how a <strong>SASE solution</strong> could be used to <strong>connect all edge points</strong> within an organization, regardless of their location or size. <strong>Catonetwork’s SASE platform</strong> was used as an example to show how easily a <strong>SASE</strong> solution can be deployed to provide fast and secure access to users and offices around the world. We examined the <strong>four pillars of SASE architecture</strong> and saw what a <strong>SASE unified network</strong> looks like.</p>
<p style="text-align: left;">More information on <strong>SD-WAN</strong> and <strong>SASE</strong> can be found in our <a href="https://www.firewall.cx/security/sase-and-sd-wan.html" title="dedicated SASE and SD-WAN section">dedicated SASE and SD-WAN section</a>.</p>]]></description>
			<category>SASE &amp; SD-WAN Networks</category>
			<pubDate>Thu, 04 Nov 2021 11:18:38 +1100</pubDate>
		</item>
		<item>
			<title>SASE and VPNs: Reconsidering your Mobile Remote Access and Site-to-Site VPN strategy</title>
			<link>https://www.firewall.cx/security/sase-and-sd-wan/comparing-sase-and-vpn-features-security-flexibility-vulnerabilities.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/sase-and-sd-wan/comparing-sase-and-vpn-features-security-flexibility-vulnerabilities.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/sd-wan/sase-vs-vpn-remote-access/sase-vs-vpn.jpg" alt="sase vs vpn remote access" style="margin: 7px; float: left;" title="sase vs vpn remote access" />The <strong>Virtual Private Network</strong> (<strong>VPN</strong>) has become the go to security solution for keeping communications between <strong>networks</strong> and <strong>endpoints secure</strong>. After all, <strong>VPNs</strong> offer a straightforward, secure method for connecting sites (a <a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-site-to-site-ipsec-vpn.html" target="_blank" title="site-to-site VPN">site-to-site VPN</a>) that couldn’t justify a high-end, <a href="https://www.firewall.cx/security/sase-and-sd-wan/mpls-vs-sdwan-vs-internet-vs-cloud-network.html" target="_blank" title="MPLS vs SD-WAN or SASE"><strong>MPLS service</strong></a>, and they enable mobile users to get secure connectivity from anywhere (mobile VPN). Deployment is quick, availability is high, only requiring Internet access, and network costs relatively low given the use of affordable Internet capacity.</p>
<p style="text-align: justify;">Yet, for all that praise, VPNs are far from perfect. They require IT to purchase and deploy separate VPN appliances, increasing capital costs and complicating maintenance. Most VPN solutions require frequent patching, user policy settings, reconfiguration, and oversite. All of which adds to the burden of attempting to maintain security. What’s more, VPNs can introduce latency into mobile connections, as well as require additional login steps, often confusing end users and adding to the burden of the help desk.</p>
<p style="text-align: left;">All of which issues beg the question: <strong>Is it time to drop your VPN and find a better solution for site-to-site and mobile access?</strong></p>
<p style="text-align: left;">Before we answer the question, let’s take a look at the <strong>key topics</strong> covered here:</p>
<ul>
<li style="text-align: left;"><a href="https://www.firewall.cx/security/sase-and-sd-wan/comparing-sase-and-vpn-features-security-flexibility-vulnerabilities.html#sase-or-vpn" title="SASE or VPN: What's the Difference?">SASE or VPN: What’s the Difference?</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/security/sase-and-sd-wan/comparing-sase-and-vpn-features-security-flexibility-vulnerabilities.html#sase-benefits" title="SASE Benefits vs VPN">SASE Brings VPN Benefits without VPN’s Networking Weaknesses</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/security/sase-and-sd-wan/comparing-sase-and-vpn-features-security-flexibility-vulnerabilities.html#sase-security" title="SASE Security">SASE Makes Security Much Easier</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/security/sase-and-sd-wan/comparing-sase-and-vpn-features-security-flexibility-vulnerabilities.html#sase-vpn-questions" title="SASE Answers the VPN Questions">SASE Answers the VPN Questions</a></li>
</ul>
<p style="text-align: justify;">Until recently, the answer to our question above would have been “<strong>no</strong>.” There wasn’t a better answer out there. However, as networking technology has evolved, an answer to the VPN conundrum may be found in Secure Access Service Edge (SASE), the successor to SD-WAN and, quite possibly, VPNs. Here’s why.&nbsp;</p>
<h2 style="text-align: left;"><a name="sase-or-vpn">SASE or VPN: What’s the Difference?</a></h2>
<p style="text-align: justify;"><strong>SASE</strong> originates from a proposal by research giant Gartner, which defined SASE as a <strong>cloud architecture model</strong> combining the functions of different network and security solutions into a <strong>unified, cloud security platform</strong>.</p>
<p style="text-align: justify;">SASE, as envisioned by Gartner, operates as a <strong>cloud-naive service</strong> connecting all of an organization’s “<strong>edges</strong>” – including <strong>sites</strong>, <strong>mobile users</strong>, <strong>IoT devices</strong>, and <strong>cloud resources</strong> -- into a <strong>single</strong>, <strong>global secure network</strong>.&nbsp; It’s cloud-native meaning that the software has all of the <strong>scalability</strong>, <strong>elasticity</strong>, and <strong>repaid deployment benefits</strong> of the cloud.</p>
<p style="text-align: justify;">And the network is secure. We don’t just mean secure as an encrypted network, like <a href="https://www.firewall.cx/security/sase-and-sd-wan/sd-wan-networks-benefits-management-security-architecture.html" target="_blank" title="SD-WAN">SD-WAN</a>. We mean one that also has a complete, embedded security stack protecting against Internet-borne threats.&nbsp; More specifically <a href="https://www.firewall.cx/security/palo-alto-networks.html" target="_blank" title="Next-Generation Firewalls">Next-Generation Firewall</a> (NGFW), CASB, SWG, ZTNA, RBI, and DNS are all part of the SASE platform.</p>
<p style="text-align: justify;">Devices of different sorts establish encrypted tunnels to the <strong>SASE point of presence</strong> (<strong>PoP</strong>). The software in the <strong>SASE PoP</strong> authenticates connecting user and grants access to defined resources based on user identity and real-time conditions, such as the user’s location or device.</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/sase-vs-vpn-remote-access/sase-point-of-presence.png" alt="sase point of presence" width="650" height="239" style="display: block; margin-left: auto; margin-right: auto;" title="SASE Point-of-Presence PoP" /></p>
<p style="text-align: justify;">Incoming traffic is inspected in a <strong>single-pass</strong> with SASE applying the complete range of security functions, optimized, and forwarded along the optimum path to its destination. As such, edges gain the best possible network experience anywhere in the world, at least that’s the theory.&nbsp;</p>
<h2 style="text-align: left;"><a name="sase-benefits">SASE Brings VPN Benefits without VPN’s Networking Weaknesses</a></h2>
<p style="text-align: justify;">Like a <strong>VPN</strong>, <strong>SASE</strong> can operate securely over the Internet making it affordable and available everywhere. But <strong>SASE</strong> goes a few steps further than any contemporary VPN solution, bringing the kinds of performance and ease of use that previously were only afforded to sites. In short, SASE makes sites, mobile users, IoT devices and cloud resources “equal citizens” of the new WAN.</p>
<p style="text-align: justify;">SASE simplifies deployment and maintenance by eliminating additional, specialized VPN hardware and concentrators. Instead, sites and mobile users connect directly to the <strong>SASE PoP</strong>. Sites via SASE’s global SD-WAN service; mobile users connect via <strong>client</strong> or <strong>clientless access</strong>.</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/sase-vs-vpn-remote-access/sase-infrastructure.jpg" alt="sase infrastructure" width="600" height="376" style="display: block; margin-left: auto; margin-right: auto;" title="SASE infrastructure" /></p>
<p style="text-align: justify;">And by establishing tunnels to the nearest <strong>PoP</strong> and not to one another, SASE avoids the deployment and recovery problems of full mesh, <strong><a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-site-to-site-ipsec-vpn.html" target="_blank" title="site-to-site VPNs">site-to-site VPNs</a></strong>. In those networks, where sites maintain direct tunnels with every other location in the network, significant time is spent first by IT personnel configuring the tunnels and then by the VPN device re-establishing tunnels after a network failure. With <strong>SASE</strong>, sites only establish <strong>one or two tunnels to the local PoP</strong>. This is done automatically, making initial deployment very easy, and with so few tunnels, recovering from a network failure can be in a fraction of the time even for what was a very large, meshed network.</p>
<p style="text-align: justify;"><strong>SASE</strong> also addresses the <strong>performance problem</strong> faced by <strong>VPNs</strong>. The <a href="https://www.firewall.cx/security/sase-and-sd-wan/wan-optimization-vs-sd-wan-networks.html" target="_blank" title="WAN optimization">WAN optimization</a> and route optimization built into <strong>SASE</strong> improves traffic performance for all edges. With VPNs, those technologies either weren’t possible (in the case of mobile users) or would have required additional investment (in the case of site-to-site VPNs).</p>
<p style="text-align: justify;">What’s more by SASE eliminates the backhaul that undermines mobile VPN performance. Instead of bring Internet and cloud traffic back to a central inspection point, as is the case with VPNs, SASE brings security inspection to the <strong>local PoP</strong>. Traffic hits the <strong>nearest PoP</strong>, gets inspected, and is forwarded directly onto its destination.</p>
<h2 style="text-align: left;"><a name="sase-security">SASE Makes Security Much Easier</a></h2>
<p style="text-align: justify;">Not only does SASE address <strong>VPN’s networking limitations</strong> but having a <strong>single security engine</strong> for traffic from any edge significantly <strong>simplifies security policy management and enforcement</strong>.</p>
<p style="text-align: justify;"><strong>Access control</strong> is much tighter. Rather than giving remote users access to the entire networks, SASE uses cloud-based <strong>Software Defined Perimeter (SDP) or zero trust network access (ZTNA)</strong>, which restricts network access to authorized resources. Users only see the network resources, be they applications or hosts, permitted by their policy. There’s no opportunity for them to “PING” or use other IP tools to investigate the network and uncover unprotected resources. <strong>SDP</strong> uses strong authentication on access and continuous traffic inspection, helping to further secure endpoints.</p>
<p style="text-align: justify;"><strong>Security management</strong> is also much easier particularly when combining <strong>VPNs with SD-WANs</strong>. Rather than maintaining separate security policies for the mobile users connected by VPN and office users sitting behind the SD-WAN device, SASE creates a <strong>single set of security policies</strong> for all users and resources.</p>
<h2 style="text-align: left;"><a name="sase-vpn-questions">SASE Answers the VPN Questions</a></h2>
<p style="text-align: justify;"><strong>SASE</strong> with <strong>cloud-based SDP</strong> proves to be faster, more secure, and easier to manage than legacy VPN systems. It’s the obvious choice for those looking for a modern VPN or to benefit from the combination of VPNs and SD-WAN.</p>]]></description>
			<category>SASE &amp; SD-WAN Networks</category>
			<pubDate>Sun, 30 May 2021 10:02:26 +1000</pubDate>
		</item>
		<item>
			<title>Understanding Secure Access Service Edge (SASE) and how it integrates with SD-WAN</title>
			<link>https://www.firewall.cx/security/sase-and-sd-wan/secure-access-service-edge-and-sdwan.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/sase-and-sd-wan/secure-access-service-edge-and-sdwan.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/sd-wan/sase-and-sdwan/sase-and-sdwan-intro.png" alt="sase and sd-wan intro" style="margin: 7px; float: left;" title="sase and sd-wan intro" />Software Defined Wide Area Networking (SD-WAN) is changing the way that businesses connect to the cloud. With <strong>SD-WAN</strong>, organizations can move away from closed, proprietary hardware solutions, bringing flexibility and potential cost savings to their operations.&nbsp;</p>
<p style="text-align: justify;">And yet, while SD-WAN technology seems like a solution to many of the problems that businesses are having connecting to the cloud, there are still some concerns around <strong>security</strong> and that is where <strong>Secure Access Service Edge</strong> (<strong>SASE</strong>) comes into the picture.</p>
<p>Before we dive any deeper, let's take a quick look at what we've got covered:</p>
<ul>
<li><a href="https://www.firewall.cx/#what-is-sdwan" title="What is SD-WAN">What is SD-WAN?</a></li>
<li><a href="https://www.firewall.cx/#how-is-sase-different-from-sdwan" title="How is SASE Different from SD-WAN?">How is SASE Different from SD-WAN?</a></li>
<li><a href="https://www.firewall.cx/#sase-in-the-real-world" title="SASE in the Real World">SASE in the Real World</a></li>
<li><a href="https://www.firewall.cx/#the-benefits-of-sase" title="The Benefits of SASE">The Benefits of SASE</a></li>
<li><a href="https://www.firewall.cx/#who-are-the-sase-players" title="Who are the SASE Players">Who are the SASE Players</a></li>
</ul>
<h2 style="text-align: left;"><a name="what-is-sdwan">What is SD-WAN?</a></h2>
<p style="text-align: justify;"><strong>Software Defined Wide Area Networking</strong> (<strong>SD-WAN</strong>) is a seismic shift from traditional WAN technology, where proprietary hardware and software are replaced with virtualization technology that can abstract networking from hardware. The “Software Defined” part of an SD-WAN uses <strong>virtualization</strong> to create a WAN architecture that allows enterprises to leverage any combination of transport services, including MPLS, LTE and broadband internet services, and create a fabric of connectivity that connects users to applications. SD-WANs use a <strong>centralized control plane</strong> to intelligently direct traffic across the WAN, increasing application performance, resulting in enhanced user experience, increased business productivity and reduced costs for IT.</p>
<p class="box-info">Access popular articles covering SD-WAN topics by visiting our <a href="https://www.firewall.cx/security/sase-and-sd-wan.html" target="_blank" title="SD-WAN Network Section">SD-WAN Network</a> section</p>
<h2 style="text-align: left;"><a name="how-is-sase-different-from-sdwan">How is SASE Different from SD-WAN?</a></h2>
<p style="text-align: justify;">The <strong>Secure Access Service Edge</strong>, better known as <strong>SASE</strong>, is a technology proposed by Research Giant Gartner. The research house defines <strong>SASE</strong> as a cloud architecture that converges various network and security functions into a single, cloud security and networking platform. <strong>SASE</strong> goes beyond what an SD-WAN can offer by incorporating security protocols and increases the reach of the network with support for mobile devices, IoT devices, and other devices that may not have a persistent connection to the network. What’s more, <strong>SASE</strong> can securely bridge cloud services into the SD-WAN, allowing branch offices and remote users to access services from most any locations. <strong>SASE</strong> is delivered as a service, minimizing or eliminating the need for specialized hardware or security appliances.</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/sase-and-sdwan/what-is-sase.png" alt="Understanding SASE and SD-WAN" style="display: block; margin-left: auto; margin-right: auto;" title="Understanding SASE and SD-WAN" /></p>
<p>The <strong>SASE model</strong> allows IT teams to easily connect and secure all of their organization’s networks and users in an agile, cost-effective and scalable way.</p>
<p>What’s more,</p>
<h2 style="text-align: left;"><a name="sase-in-the-real-world">SASE in the Real World:</a></h2>
<p style="text-align: justify;">You can’t have SASE <strong>without</strong> SD-WAN, the two technologies have a symbiotic relationship that actually flattens the networking and security stack into a single connectivity stack. SASE, as envisioned by Gartner, operates as a platform, which provides organizations with the ability to connect to a single secure network, which then grants secure access to physical and cloud resources, regardless of location. Or, more simply put, SASE brings <strong>security to SD-WANs</strong> by introducing <strong>four primary characteristics</strong>:</p>
<ul>
<li style="text-align: left;"><strong>Identity Driven:</strong> Organizations will be able to control interactions with resources using a least-privileged strategy combined with strictly enforced access control. Attributes used by that control element include application access policy, user and group identity and the sensitivity of the data being accessed.</li>
<li style="text-align: left;"><strong>Cloud Native Architecture:</strong> The SASE model architecture requires the implementation of several different cloud capabilities into a platform. That platform will offer agility, be adaptive, self updating, and will give organizations a holistic and very flexible approach to connect, regardless of location.</li>
<li style="text-align: left;"><strong>Support for All Edges:</strong> SASE creates a single network for allof an organization's resources. Data centers, branch offices, cloud resources, and endpoints. A common interpretation of that deployment may include SD-WAN appliances for the physical edges and software clients for endpoints or browser based clientless connectors.</li>
<li style="text-align: left;"><strong>Globally Distributed:</strong> SASE platforms must be globally distributed to organizations, meaning that SASE service providers must be able to deliver low latency services to enterprise edges and offer low latency connections into cloud service providers.</li>
</ul>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/sase-and-sdwan/catonetworks-first-sase-platform.png" alt="catonetworks first sase platform" style="display: block; margin-left: auto; margin-right: auto;" title="catonetworks first sase platform" /></p>
<p>A proper SASE solution delivers a connectivity platform as a service which brings forth <strong>unified cloud management</strong>, with <strong>zero trust capabilities</strong>, incorporated into a <strong>single networking stack</strong>.</p>
<h2 style="text-align: left;"><a name="the-benefits-of-sase">The Benefits of SASE:</a></h2>
<p><strong>SASE</strong> brings agility and a holistic approach to both networking and security. Ultimately, <strong>SASE</strong> proves both <strong>innovative</strong> and <strong>disruptive</strong>, and will potentially transform the way network security is consumed over traditional products and cloud services. The most notable benefits of SASE include:</p>
<ul class="check">
<li><strong>Lowered Costs</strong>: SASE can reduce the number of components and vendors required to provide edge connectivity into the cloud, while also lowering operational overhead.</li>
<li><strong>Improved Network Performance</strong>: SASE is built upon a global SD-WAN service, which may leverage a private backbone and incorporates automatic traffic optimization and continuity.</li>
<li><strong>Vastly Improved Security</strong>: All traffic flow is inspected at the source and the endpoint, creating the opportunity for fully encompassing policies, which can be based upon identity, resources, or other defined elements.</li>
<li><strong>Reduced Overhead:</strong> With SASE providers operating and maintaining the security stack, IT staffers will not have to worry about updating, patching, or scaling edge connectivity products.</li>
</ul>
<p>The other benefits from SASE come from the adoption of an SD-WAN platform, where connections can be consolidated, and then managed from a single pane of glass. Additional benefits can be found in an SD-WAN’s core capabilities of reducing proprietary hardware needs and bringing much needed simplicity to cloud connectivity.</p>
<h2 style="text-align: left;"><a name="who-are-the-sase-players">Who are the SASE Players:</a></h2>
<p>Numerous vendors are investing in the SASE model and are bringing services online. <a href="https://www.gartner.com/doc/reprints?id=1-1OG9EZYB&amp;ct=190903&amp;st=sb" target="_blank" rel="nofollow noopener" title="Gartner has identified">Gartner has identified </a>more than a dozen vendors that are developing SASE offerings, with notable players, such as Cato Networks, Cisco, FortiNet, Zscaler, all building SASE offerings for the market.</p>]]></description>
			<category>SASE &amp; SD-WAN Networks</category>
			<pubDate>Wed, 26 Feb 2020 10:18:20 +1100</pubDate>
		</item>
		<item>
			<title>WAN Optimization vs SD WAN Networks. Today’s Challenges &amp; Difficulties for WAN Optimization</title>
			<link>https://www.firewall.cx/security/sase-and-sd-wan/wan-optimization-vs-sd-wan-networks.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/sase-and-sd-wan/wan-optimization-vs-sd-wan-networks.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/sd-wan/wan-optimization-vs-sd-wan-networks/sd-wan-vs-wan-acceleration.png" alt="sd wan vs wan acceleration" style="margin: 7px; float: left;" title="SD WAN vs WAN Acceleration" />Enterprises have been successfully running WAN optimization appliances at their many distributed sites for years. The devices have done a good job of helping businesses squeeze as much capacity as possible out of their <strong>WAN links</strong> and <strong>to improve performance across low-bandwidth, long-distance network circuits.</strong></p>
<p style="text-align: justify;"><strong>WAN optimizers</strong> were a boon to telecom budgets when network bandwidth was particularly pricey. Businesses also have used the devices to<strong> prioritize applications</strong> that are <strong>sensitive</strong> to <strong>delay</strong> and <strong>packet loss</strong>--particularly when traffic is shuttled among <strong>corporate-controlled sites.</strong></p>
<p style="text-align: justify;">However, changes in <strong>network traffic patterns</strong> and <strong>application protocols,</strong> the tendency to <strong>encrypt data in transit</strong>, the emergence of <strong>software-defined WAN</strong> (<strong>SD-WAN</strong>) and other factors are all challenging the need for <strong>WAN optimization</strong> in the <strong>edge appliance</strong> form factor that IT shops have traditionally deployed.</p>
<h2 style="text-align: justify;">Shifting Network Landscape</h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/sd-wan/wan-optimization-vs-sd-wan-networks/wan-optimization-vs-sd-wan.jpg" alt="wan optimization vs sd wan" style="margin: 7px; float: left;" title="WAN Opitmization vs SD WAN" />While historically most application requests were directed inward, toward corporate data centers, most are now outbound, toward cloud and Internet locations. As the <strong>software as a service (SaaS)</strong> computing model continues to gain steam, these trends will only get stronger.</p>
<p style="text-align: justify;">With much of <strong>corporate traffic</strong> headed toward the <strong>cloud</strong>, enterprises have little or no control over the far-end site. As a result, it becomes difficult to support a network topology requiring <strong>optimization appliances</strong> at both ends of the <strong>WAN link</strong>. Ever try asking Salesforce.com if you could install your own, specially configured <strong>WAN optimization</strong> <strong>appliance</strong> in their network? Good luck.</p>
<p style="text-align: justify;">In addition, today’s security schemes can throw a wrench into <strong>traditional WAN optimization setups</strong>. Nearly all <strong>cloud-bound traffic</strong> is <strong>SSL/TLS-encrypted</strong> from the workstation to the cloud using keys that aren’t readily accessible. <strong>WAN optimizers can’t see that traffic</strong> to shape or treat it, unless the device is brought into the certification path for <strong>decryption</strong> and <strong>re-encryption</strong> before delivery. Adding that step introduces a processing burden to the optimization appliance that can impede scalability.</p>
<p style="text-align: justify;">Another change factor is that <strong>Internet bandwidth</strong> is more <strong>plentiful</strong> than it was when <strong>WAN optimizers</strong> came to market, and it’s far more affordable than <strong>MPLS capacity</strong>. So the requirement to compress data and deduplicate packets to conserve <strong>expensive bandwidth,</strong> which <strong>traditional WAN optimizers</strong> are good at, has become less stringent.</p>
<h2 style="text-align: justify;">Duplication Of Effort</h2>
<p style="text-align: justify;">There are also other ways to get some of the <strong>traditional WAN optimizer’s benefits</strong> baked right into services. <strong>Some cloud service providers</strong>, such as Amazon with its <strong>AWS Global Accelerator service</strong>, for example, help improve connections to their services, encroaching a bit on the traditional WAN optimization appliance’s turf.</p>
<p style="text-align: justify;">Today, those <strong>WAN links</strong> are carrying predominantly <strong>HTTP</strong> and <strong>TCP traffic</strong>. That means that the need to accelerate various other <strong>application-specific protocols</strong> is disappearing. The acceleration capabilities for <strong>IP-based traffic</strong> offered by <strong>cloud providers</strong> such as <strong>Amazon</strong> are now more in demand than the <strong>multiprotocol</strong> <strong>acceleration</strong> <strong>function</strong> of <strong>traditional</strong> <strong>WAN</strong> <strong>optimizers</strong>.</p>
<p style="text-align: justify;">The <strong>deduplication</strong> and <strong>compression</strong> <strong>capabilities</strong> of <strong>WAN</strong> <strong>optimization</strong> <strong>appliances</strong> remain beneficial. However, there is less of a need for them because of greater availability of network capacity. And cloud computing is bringing data closer to users to decrease distance-based latency.</p>
<h2 style="text-align: justify;">Emergence Of SD-WANs</h2>
<p style="text-align: justify;">Amid all these WAN changes, <strong>SD-WANs</strong> have taken the industry by storm, affording the opportunity to <strong>offload</strong> <strong>traffic</strong> from <strong>pricey</strong> <strong>MPLS</strong> <strong>circuits</strong> onto <strong>lower-cost</strong> <strong>links</strong>. By incorporating <strong>dynamic</strong> <strong>path</strong> <strong>selection</strong>--the ability to route traffic across the <strong>best-performing</strong> <strong>WAN</strong> <strong>link</strong> available at the moment of transmission--the SD-WAN is subsuming a portion of the WAN optimization role. <strong>SD-WANs</strong> are still in hockey-stick growth mode, with IDC predicting a<strong> 40% compound annual growth rate</strong> through 2022.</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/sd-wan/wan-optimization-vs-sd-wan-networks/sd-wan-vs-mpls-acceleration.png" alt="Catonetworks sd-wan vs mpls acceleration" style="margin: 7px auto; display: block;" title="Catonetworks SD-WAN vs MPLS acceleration" /></p>
<p style="text-align: center;">The SD-WAN cloud is clearly the future of WAN Networking</p>
<p style="text-align: justify;"><strong>SD-WANs</strong>, depending on the vendor, incorporate other optimization capabilities, too, such as <strong>packet-loss</strong> <strong>correction technology</strong>, <strong>TCP</strong> <strong>proxies</strong> to compensate for <strong>network</strong> <strong>latency</strong>, <strong>traffic</strong> <strong>shaping</strong>, and <strong>quality of</strong> <strong>service (QoS) priority marking.</strong></p>
<p style="text-align: justify;"><strong>Managed SD-WAN services</strong>, or <strong>cloud-based SD-WAN</strong>, are particularly appealing for the performance improvements they yield. In this setup, your <strong>SD-WAN service provider</strong> generally runs a <strong>private</strong> <strong>IP</strong> <strong>network</strong>, which it controls end to end. That puts the provider back in the seat of controlling both ends of your connection by linking your sites to its own backbone points of presence all over the world. That means your traffic is <strong>no</strong> <strong>longer subjected</strong> to the <strong>“best effort”</strong> nature of the public Internet, where it traverses circuits managed by multiple providers.</p>
<h2 style="text-align: justify;">Different Approaches</h2>
<p style="text-align: justify;">Enterprises will always want their WAN traffic treated as efficiently as possible with the best possible <strong>application</strong> <strong>performance</strong> and <strong>response</strong> <strong>times</strong>. But where <strong>WAN</strong> <strong>optimization</strong> <strong>appliances</strong> (or WAN optimization built into edge routers) were once the sole source of application acceleration, the changing WAN landscape means that optimization is being handled in different ways. These include acceleration techniques offered by cloud vendors and, most notably, by <a href="https://www.topsdwanvendors.com/" target="_blank" rel="nofollow noopener" title="popular SD-WAN offerings">popular SD-WAN offerings</a>.</p>
<p style="text-align: justify;">Where WAN optimization takes place will depend on whether you <strong>deploy</strong> <strong>SD-WAN</strong> and, if you do, which <strong>SD-WAN</strong> <strong>deployment model</strong> you choose:<strong> on-premises</strong> or <strong>as a managed, cloud-based service</strong>. One way or another, enterprises should address <strong>WAN</strong> <strong>performance</strong> so that their long-haul, particularly global, transmissions don’t sputter and choke response times of their critical applications.</p>]]></description>
			<category>SASE &amp; SD-WAN Networks</category>
			<pubDate>Sat, 20 Jul 2019 13:01:06 +1000</pubDate>
		</item>
		<item>
			<title>How To Secure Your SD-WAN. Comparing DIY, Managed SD-WAN and  SD-WAN Cloud Services</title>
			<link>https://www.firewall.cx/security/sase-and-sd-wan/securing-your-sd-wan-options-security-management-web-filtering.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/sase-and-sd-wan/securing-your-sd-wan-options-security-management-web-filtering.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/sd-wan/3-way-to-secure-sd-wan/how-to-secure-your-sd-wan.png" alt="how to secure your sd-wan" style="margin: 7px; float: left;" title="how to secure your sd-wan" />With so much <strong>enterprise network traffic</strong> now destined for the cloud, backhauling traffic across an expensive <strong>MPLS</strong> connection to a data center to apply security policy no longer makes sense. <strong>Software-defined WANs</strong> (SD-WAN) promise <strong>lower transport costs</strong> with direct, <strong>higher-performing connections</strong> to <strong>cloud</strong> and <strong>Internet resources</strong>. But what are the <strong>security implications</strong> of <strong>moving traffic off of private MPLS VPNs</strong> and onto <strong>public broadband links</strong>?</p>
<p style="text-align: justify;">This article tackles the above and many more questions around <strong>enterprise WAN network connectivity</strong> <strong>options</strong> and the <strong>different type</strong> of <strong>SD-WAN network implementations</strong> along with their advantages and disadvantages.</p>
<p style="text-align: justify;"><strong>Key Topics</strong>:</p>
<ul style="text-align: justify;">
<li style="text-align: left;"><a href="https://www.firewall.cx/#sd-wan-deployment-options" title="SD-WAN Deployment Options">SD-WAN Deployment Options</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/#deploying-security-at-each-site" title="Deploying Security at Each Site">Do-It-Yourself (DIY) – Deploying Security at Each Site</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/#telco-managed-sd-wan-services" title="Telco Managed SD-WAN Services">Telco Managed SD-WAN Services</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/#sd-wan-as-a-service" title="SD-WAN as a Service">SD-WAN as a Service</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/#summary" title="Summary">Summary</a></li>
</ul>
<p style="text-align: justify;"><strong>Directly connecting branch offices</strong> to the cloud increases your <strong>exposure</strong> to <strong>malware</strong> and <strong>Internet-borne attacks</strong>, expanding your attack surface across many sites. If not adequately addressed, these risks could outweigh the cost and <strong>performance benefits</strong> of <strong>SD-WAN</strong>. Let’s take a look at the SD-WAN options for <strong>securing your sites</strong>.</p>
<h2>Related Articles</h2>
<ul>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/sd-wan-networks-benefits-management-security-architecture.html" target="_blank" title="Complete Guide to SD-WAN. Technology Benefits">Complete Guide to SD-WAN. Technology Benefits, SD-WAN Security, Management, Mobility, VPNs, Architecture &amp; Comparison with Traditional WANs. SD-WAN Providers Feature Checklist</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/sd-wan-evolving-solution-for-branch-offices.html" target="_blank" title="SD-WAN is the Emerging, Evolving Solution for the Branch Office">SD-WAN is the Emerging, Evolving Solution for the Branch Office</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/mpls-vs-sdwan-vs-internet-vs-cloud-network.html" target="_blank" title="MPLS vs. SD-WAN vs. Internet vs. Cloud Network">MPLS vs. SD-WAN vs. Internet vs. Cloud Network. Connectivity, Optimization and Security Options for the ‘Next Generation WAN’</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/most-common-worst-networking-practices-and-how-to-fix-them.html" target="_blank" title="The Most Common Worst Networking Practices and How To Fix Them">The Most Common Worst Networking Practices and How To Fix Them</a></li>
</ul>
<h2><a name="sd-wan-deployment-options">SD-WAN Deployment Options</a></h2>
<p style="text-align: justify;">There are a few SD-WAN options available. Each requires a different approach to branch security:</p>
<ul style="text-align: justify;">
<li><strong>Do it yourself (DIY): </strong>It’s possible to build and manage your own SD-WAN by deploying <strong>firewalling</strong> and <strong>unified threat management</strong> (<strong>UTM</strong>) capabilities yourself at each branch site. You can install separate physical appliances for each type of security you need or run the security tasks as <strong>virtual network functions</strong> (<strong>VNFs</strong>) in software. <strong>VNFs</strong> usually run in a special <strong>CPE appliance</strong>, but it may also be possible to run the <strong>VNFs</strong> in your <strong>branch router</strong>, depending on which router vendor you use.</li>
</ul>
<ul style="text-align: justify;">
<li><strong>Telco </strong><strong>managed SD-WAN services</strong><strong>:</strong> This option mirrors the DIY approach above; however, a telco resells the needed SD-WAN appliances and software to you and manages the installation on your behalf. The SD-WAN setup is the same but lightens the load on your IT staff and reduces the need for specialized SD-WAN skill sets in-house.</li>
</ul>
<ul style="text-align: justify;">
<li><strong>SD-WAN as a cloud service (“SD-WANaaS”) from a software-defined carrier (SDC):</strong> With this option, most <strong>SD-WAN functions</strong> run as a <strong>distributed</strong>, <strong>multi-tenant software stack</strong> in a <strong>global</strong>, <strong>private cloud</strong> maintained by your <strong>SDC</strong>. The provider <strong>integrates multiple levels of security</strong> into the network in the cloud, and your traffic traverses the <strong>SDC provider’s own IP backbone</strong>, avoiding the risk and <strong>best-effort performance</strong> challenges of the <strong>public Internet</strong>.</li>
</ul>
<p style="text-align: justify;">Let’s take a closer look at each approach.</p>
<h1><a name="deploying-security-at-each-site">DIY: Deploying Security at Each Site</a></h1>
<p style="text-align: justify;">SD-WAN solutions <strong>encrypt branch traffic</strong> in <strong>transit</strong>, but they <strong>don’t protect against Internet-borne threats</strong>, such as <strong>malware</strong>.&nbsp; To tackle those risks, you’ll require an array of security functions, these include <strong>next-generation firewalling</strong>, <strong>intrusion detection</strong> and <strong>prevention</strong> (<strong>IDS</strong>/<strong>IPS</strong>), <strong>quarantining</strong> or otherwise <strong>deflecting detected malware</strong>, and <strong>web filtering</strong>.</p>
<p style="text-align: justify;">Those security functions can be deployed as standalone appliances, <strong>VNFs</strong> running on a <strong>vCPE</strong>, or a <strong>secure web gateway</strong> (<strong>SWG</strong>) service. Regardless, your deployment becomes <strong>more complex</strong> and your capital costs <strong>far more</strong> than simply your SD-WAN appliance costs. Also, keep in mind that as traffic volumes grow, appliances and VNFs will require <strong>more processing power to keep pace with increased traffic loads</strong>, requiring appliance hardware upgrades. And while SWG will inspect Internet traffic, they don’t inspect site-to-site traffic, opening the way for <strong>malware</strong> to move laterally once entering the enterprise.</p>
<h1><a name="telco-managed-sd-wan-services">Telco Managed SD-WAN Services</a></h1>
<p style="text-align: justify;">By turning to a telco to <strong>install and manage your SD-WAN equipment</strong>, you alleviate the need for special SD-WAN skillsets in-house. The telco maintains the <strong>security edge devices</strong> and <strong>services</strong>; there’s <strong>no software patching</strong>, <strong>updating</strong>, and <strong>upgrading</strong> to worry about.</p>
<p style="text-align: justify;">But at the same time, you’re left dependent on the telco. The telco is responsible for making network upgrades and changes and will often take far longer than if you had made those changes yourself. You’ll also be <strong>paying more each month</strong> for all of that support and integration work offloaded onto the telco.</p>
<p style="text-align: justify;">And you’re still left with the same technical limitations of an appliance-based approach. This means that with the telco <strong>must reflect all of the costs of the design and maintenance of the security and networking infrastructure in their price to you</strong>. And as with a DIY approach, you’ll still be left with periodically scaling your appliance as traffic loads grow, further disrupting your IT processes and increasing costs.</p>
<h1><a name="sd-wan-as-a-service">SD-WAN as a Service</a></h1>
<p style="text-align: justify;"><strong>Integrating SD-WAN</strong> with <strong>UTM</strong> by using a <strong>Software-Defined Carrier (SDC)</strong> is the <strong>simplest solution</strong> to deploy and manage and quite possibly the most secure.</p>
<p style="text-align: justify;">Here’s why: When you use an <strong>SD-WAN-as-a-service</strong>, security is converged into the network and delivered from the cloud. You don’t have to concern yourself with scaling network security as your implementation grows. Your cloud provider has infinite, elastic resources at its disposal, far more than what a small appliance on your premises can handle.</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/3-way-to-secure-sd-wan/complete-sd-wan-network-example.png" alt="sd-wan network security offerings" style="display: block; margin-left: auto; margin-right: auto;" title="sd-wan network security offerings" /></p>
<p style="text-align: center;">Services offered by a complete fully-managed SD-WAN network provider</p>
<p style="text-align: justify;"><strong>SDC services</strong> usually involve integrating the <strong>software for SD-WAN</strong>, <strong>IPsec</strong>, <strong>firewalling</strong>, and <strong>UTM</strong> into a <strong>single, software stack</strong>. By collapsing multiple security solutions into a cloud service, the provider can enforce your <strong>unified policy across all your corporate locations</strong>, <strong>users</strong>, and <strong>data</strong>.</p>
<p style="text-align: justify;">In addition, you will be running your traffic over a <strong>higher-grade IP network</strong> than the <strong>best-effort Internet</strong>. <strong>SDCs</strong> run their <strong>own Tier-1 IP backbones</strong> with <strong>service-level agreements</strong> (<strong>SLAs</strong>) attached to them. There are both <strong>security</strong> and <strong>performance benefits</strong> inherent in using the <strong>SDC’s network infrastructure</strong> compared to the Internet.</p>
<h2><a name="summary">Summary</a></h2>
<p style="text-align: justify;">If you’re short on <strong>SD-WAN</strong> or in your organization<strong> security expertise</strong>, DIY might introduce cracks into your WAN and <strong>leave you vulnerable</strong>. <strong>Complexity</strong> usually <strong>increases</strong> the potential for human error, which contributes to risk. If you subscribe to that philosophy, you’re better suited to the <strong>managed service</strong> or <strong>as-a-service cloud</strong> approach.</p>
<p style="text-align: justify;">If you’re anticipating growth, both in the number of sites and per-site volume, the <strong>cloud service</strong> is a better fit to your needs. It brings the <strong>scalability benefits</strong> to the table and <strong>provides extra security</strong> by transporting your traffic on a <strong>private IP backbone</strong>, which also provides a <strong>performance benefit</strong> compared to public Internet links.</p>
<p style="text-align: justify;">The benefits of a secure SD-WAN, however you choose to achieve it, are many. You’ll <strong>reduce infrastructure</strong> and <strong>circuit costs</strong> while <strong>improving performance</strong> with <strong>direct-connected links</strong> to cloud and Internet resources. You just need to be sure the t’s are crossed and the i’s are dotted on security so you can enjoy SD-WAN’s many advantages with a clean conscience.</p>]]></description>
			<category>SASE &amp; SD-WAN Networks</category>
			<pubDate>Mon, 22 Apr 2019 13:53:19 +1000</pubDate>
		</item>
		<item>
			<title>The Most Common Worst Networking Practices and How To Fix Them</title>
			<link>https://www.firewall.cx/security/sase-and-sd-wan/most-common-worst-networking-practices-and-how-to-fix-them.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/sase-and-sd-wan/most-common-worst-networking-practices-and-how-to-fix-them.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><a href="https://try.catonetworks.com/gartner-report?utm_source=firewallcx" target="_blank" rel="nofollow noopener" title="The Most Common Worst Networking Practices and How To Fix Them"><img src="https://www.firewall.cx/images/stories/sd-wan/most-common-worst-network-problems/gartner-report-worst-networking-practices.png" alt="gartner report worst networking practices" style="margin: 7px; float: left;" title="gartner report worst networking practices and how to fix them" /></a>In the rush to keep pace with the many challenges facing today’s organizations, all too often networking teams end up adopting practices and processes that are, shall we say, less than perfect. You probably have seen a few yourself in your own organization.</p>
<p style="text-align: justify;">Management refusing to consider new vendors because, well, they’re new. Engineers wanting to do everything manually when automation would save them a ton of time. Overspending on capacity when there are more affordable alternatives. You get the picture.</p>
<p style="text-align: justify;">Some practices are well known, others are less obvious. A great starting point for identifying the worst of the worst in your organization was a recent list compiled by <strong>Gartner</strong>. The list culls insight from several thousand client interactions.&nbsp; While the Gartner report requires payment,&nbsp; a <a href="https://try.catonetworks.com/gartner-report?utm_source=firewallcx" target="_blank" rel="nofollow noopener" title="The Most Common Worst Networking Practices and How To Fix Them">free eBook from Cato Networks</a> explains each networking practice and how they can be addressed with a <strong>cloud-based SD-WAN</strong>.</p>
<p style="text-align: justify;">The practices fall into three categories — cultural, design and operational, and financial:</p>
<ul class="check" style="text-align: justify;">
<li><strong>Cultural practices </strong>describe how IT teams relate to collaboration, and more broadly, innovation. Excessive risk avoidance is one example of a “worst” cultural practice. Adherence to manually configuring networking device and the silo-ism that often crops up among IT teams are other examples.</li>
<li><strong>Design and operational practices </strong>are those practices that restrict the agility, increase the costs, and complicate the troubleshooting of the enterprise network. These practices often stem from having amassed legacy technologies, forcing less than ideal practices. Other practices include the lack of a business-centric network strategy, spending too much for WAN bandwidth, and restricted visibility into the network.</li>
<li><strong>Financial </strong>“bad” practices stem from the dependencies IT organizations have on their legacy vendor relationships. All too often, busy IT professionals cut corners by leaning on their vendors for technology advice. This particularly the case in newer technologies where an IT professional may lack sufficient background to conduct an assessment. Vendors and their partners have a commercial interest in furthering their own aims, of course. As such, companies end up being locked into vendors or following questionable advice.</li>
</ul>
<p style="text-align: justify;">Often, worst practices grow out of the best intentions, evolving incrementally over time. Risk avoidance isn’t inherently bad, for example. It stems from the healthy desire to limit network outages. But excessive risk avoidance stems from organizational cultures where teams are locked into dysfunctional postmortems, blaming one another.&nbsp;</p>
<p style="text-align: justify;">Adopting technologies that encourage transparency can help address the problem. With a common portal used by all offsite networking teams — security, WAN, and mobile — problem resolution is faster, collaboration easier, and finger pointing is eliminated. How do you do that? To learn more, check <a href="https://try.catonetworks.com/gartner-report?utm_source=firewallcx" target="_blank" rel="nofollow noopener" title="The Most Common Worst Networking Practices and How To Fix Them">out the eBook here</a>.</p>]]></description>
			<category>SASE &amp; SD-WAN Networks</category>
			<pubDate>Fri, 13 Jul 2018 11:26:46 +1000</pubDate>
		</item>
		<item>
			<title>SD-WAN is the Emerging, Evolving Solution for the Branch Office</title>
			<link>https://www.firewall.cx/security/sase-and-sd-wan/sd-wan-evolving-solution-for-branch-offices.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/sase-and-sd-wan/sd-wan-evolving-solution-for-branch-offices.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/sd-wan/sd-wan-evolution-for-branch-office/sd-wan-the-evolving-solution-for-branch-offices-1.jpg" alt="sd-wan the evolving solution for branch offices" style="margin: 7px; float: left;" title="sd-wan the evolving solution for branch offices" />A lot has changed in how people work during the past twenty years. Co-working spaces, mobility, and the cloud now are common. Businesses are spread out and branch offices are empowered.</p>
<p style="text-align: justify;">This new functionality is a good thing, of course. But, at the same time, it raises a big challenge: <strong>Multiprotocol Label Switching</strong> (<strong>MPLS</strong>), the way in which most branch offices network today, is a poor match for this new environment. It is an expensive and rigid one-size-fits-all approach to an environment that prizes fluidity and flexibility.</p>
<p style="text-align: justify;">The answer is <strong>Software Defined-Wide Area Networking</strong> (SD-WAN). It matches the network to branch offices’ needs and provides a superior user experience. It also the potential to reduce costs.</p>
<p class="box-info" style="text-align: justify;">Our <a href="https://www.firewall.cx/security/sase-and-sd-wan/sd-wan-networks-benefits-management-security-architecture.html" target="_blank" title="Complete Guide to SD-WAN Technology">Complete Guide to SD-WAN Technology</a> article provides an in-depth coverage on SD-WAN Security, Management, Mobility, VPNs, Architecture and more.</p>
<p style="text-align: justify;">SD-WAN is still a work in progress, no doubt, but the technology is positioned to be the next wave in branch office connectivity -- here's why.</p>
<ul style="text-align: justify;">
<li><a href="https://www.firewall.cx/#welcome-to-the-new-branch" title="Welcome to the New Branch">Welcome to the New Branch</a></li>
<li><a href="https://www.firewall.cx/#mpls-problems-hurt-the-new-branch" title="MPLS Problems Hurt the New Branch">MPLS Problems Hurt the New Branch</a></li>
<li><a href="https://www.firewall.cx/#mpls-no-support-for-mobile-users" title="No Support for Mobile Users">No Support for Mobile Users</a></li>
<li><a href="https://www.firewall.cx/#sd-wan-is-the-answer" title="SD-WAN is the Answer">SD-WAN is the Answer</a></li>
<li><a href="https://www.firewall.cx/#different-worlds-of-mpls-and-sd-wan" title="The Different Worlds of MPLS and SD-WAN">The Different Worlds of MPLS and SD-WAN</a></li>
<li><a href="https://www.firewall.cx/#is-sd-wan-mature" title="SD-WAN Maturity">Is SD-WAN Totally Mature? No…</a></li>
<li><a href="https://www.firewall.cx/#sd-wan-v3" title="SD-WAN 3.0: How SD-WAN Services Help">SD-WAN 3.0: How SD-WAN Services Help</a></li>
<li><a href="https://www.firewall.cx/#at-the-branch-think-sdwaas" title="At the Branch, Think SDWaaS. Not MPLS">At the Branch, Think SDWaaS. Not MPLS</a></li>
</ul>
<h2 style="text-align: justify;"><a name="welcome-to-the-new-branch">Welcome to the New Branch</a></h2>
<p style="text-align: justify;">Enterprises generally conﬁgure WANs in a classic hub-and-spoke manner. Branches are the ends of the spokes and resources are in the hub, typically the headquarters or datacenters. Internet trafﬁc is backhauled across the MPLS-based WAN to the hub for delivery through a secured, Internet access connection.&nbsp;&nbsp;</p>
<p style="text-align: justify;">That’s a solid, bulletproof approach. However, branch operations have changed radically since MPLS was introduced in the early 1990s. Back then, branch offices were comfortable with a T1 or two. Today's offices need 5x that amount. Back then, most applications and services terminated at MPLS-attached datacenters, not the Internet. Today, most traffic goes out to the Internet. Back then most work was done in offices. Today, work is done, well, everywhere.</p>
<h2 style="text-align: justify;"><a name="mpls-problems-hurt-the-new-branch">MPLS Problems Hurt the New Branch</a></h2>
<p style="text-align: justify;">MPLS-based architectures are a poor fit for the new branch. Bandwidth is far more costly than Internet access (exact amounts will vary between regions and packages). Installation can take months, especially if the provider doesn’t have any available circuits; bandwidth upgrades weeks. This, needless to say, is too slow for today’s environment. International deployments only add to the problems.</p>
<p style="text-align: justify;">The <strong>cost</strong> and <strong>inflexibility</strong> of <strong>MPLS</strong> leads many organizations to skimp on branch office bandwidth and, often, skip on redundancy. Instead, the sites instead are linked by non-redundant cable, DSL or wireless services and therefore are <strong>vulnerable to circuit failures</strong> and <strong>downtime</strong>. The use of separate networks makes creating a fully meshed architecture, where every office has a direct connection to every other office, far more difficult, impacting <strong>Active Directory</strong> and <strong>VoIP design</strong>. Those connected to MPLS face delays when more bandwidth is needed, such as for branch expansions and seasonal traffic spikes.&nbsp;&nbsp;</p>
<p style="text-align: justify;">The same antiquated approach extends to contracts. Branch offices often are temporary. One may start in somebody’s home. That worker may quickly be grouped with other workers at a larger branch across town. The three-year contracts offered by MPLS providers is simply inappropriate for such small- or transient-branch offices.</p>
<p style="text-align: justify;">And none of this says anything about two shifts in enterprise networking -- the cloud and mobility. Backhauling Internet traffic adds too much latency, disrupting with the user experience. Often traffic is backhauled only to be sent back across the Internet to a site near the edge. This back and forth -- aptly called the “trombone effect” -- causes significant latency problems and consumes expensive MPLS bandwidth, particularly when the central portal and branch office are far from each other.</p>
<h2 style="text-align: justify;"><a name="mpls-no-support-for-mobile-users">No Support for Mobile Users</a></h2>
<p style="text-align: justify;">WANs are all about physical locations. Mobile users, who were not that big a deal “back in the day,” are not supported by MPLS-based WANs.</p>
<p style="text-align: justify;">Typically, mobile employees connect through VPNs to on-premises firewalls or concentrators. Data is sent either to a local access point or a centralized and secure access point on the WAN. In such scenarios, applications and other resources generally are located in different places. This leads to split tunnels and management complexity, which is the enemy of efficient, low latency and inexpensive operations.</p>
<p style="text-align: justify;">One option is site-to-site connectivity via firewall-based VPNs. It’s a bad option, however, it necessitates convoluted Internet routing. The resulting jitter, latency and packet loss impacts voice, video and other sensitive applications. It is a workaround that causes as many problems as it solves.</p>
<h2 style="text-align: justify;"><a name="sd-wan-is-the-answer">SD-WAN is the Answer</a></h2>
<p style="text-align: justify;">SD-WANs answer these challenges -- and more. As the name implies, SD-WANs are a subset of the software-defined networking concept, which separates the data being transported from the routing and provisioning information directing the journey, increasing flexibility by orders of magnitude.</p>
<p style="text-align: justify;">The initial versions of SD-WAN focused on bandwidth provisioning and last mile link bonding. That was a great advance. The arrival of SD-WAN 2.0 was even more exciting envisioning the entire network -- the branches, the headquarters, the datacenter and so forth -- as a single unified entity. It adds four elements that enable the selection of the path with the desired attributes through this network to be found:</p>
<ul style="text-align: justify;">
<li>Controllers create traffic policies and send them to virtual and/or physical appliances at each location.</li>
<li>Virtualized data services normalize Internet services, such as xDSL, cable, and 4G/LTE, as well as MPLS into a single network.</li>
<li>Virtual overlays are secure tunnels that enable underlying data services to be temporarily and fluidly cobbled together -- virtualized -- to create an optimal path and its service characteristics.</li>
<li>Application-aware routing is the process of choosing the path with the desired end-to-end performance characteristics. The variables include application requirements, business policies, and real-time network conditions.</li>
</ul>
<p style="text-align: justify;">Branches become part of this holistic network through an SD-WAN node, which usually is an appliance connected to the LAN on the branch side and MPLS and an Internet service such as cable or DSL on the network side.</p>
<p style="text-align: justify;">When they are installed, the SD-WAN nodes, using zero-touch provisioning, point to a predetermined IP address that links it to the controller. Policies are uploaded to the device. These generally include port configuration, business policies (such as priority and thresholds for failover) and application requirements. This information is combined with real time data to determine the best network path. Latency-intolerant VoIP sessions, for instance, may be provisioned with MPLS and bandwidth-intensive FTP transfers via broadband.</p>
<h2 style="text-align: justify;"><a name="different-worlds-of-mpls-and-sd-wan">The Different Worlds of MPLS and SD-WAN</a></h2>
<p style="text-align: justify;">Once SD-WANs are accepted as a possible alternative to MPLS-based WANs for branch offices, the focus turns to cost comparisons. The answer is complex. Bandwidth costs go down in an SD-WAN environment because cheaper broadband is a viable alternative for much traffic. On the other hand, security costs rise because branches with direct Internet access (DIA) require next-generation ﬁrewalls (NGFWs), IDS/IPS, sandboxing and other security elements. These systems also must be patched and upgraded as necessary, which adds to opex.</p>
<p style="text-align: justify;">Another change is in vendor relationships. MPLS implementations generally are by a single vendor (the famous “one throat to choke”). SD-WAN deployments usually rely on multiple suppliers. This adds complexity to elements such as inventory and payment management. This complexity impacts costs. On a deeper level, the SD-WAN enables changes to be implemented much faster than MPLS. The cost ramifications of adding bandwidth to meet an unexpected sales spike immediately (in the case of SD-WAN) compared to next month (MPLS) is fluid. There is no doubt, however, that adding the bandwidth quickly is a benefit.</p>
<p style="text-align: justify;">Our article <a href="https://www.firewall.cx/security/sase-and-sd-wan/mpls-vs-sdwan-vs-internet-vs-cloud-network.html" target="_blank" title="MPLS vs SD-WAN">MPLS vs SD-WAN</a> provides addition considerations between the two for organizations around the world.</p>
<h2 style="text-align: justify;"><a name="is-sd-wan-mature">Is SD-WAN Totally Mature? No...</a></h2>
<p style="text-align: justify;">SD-WAN is a young technology that still is evolving in fundamental ways. Organizations considering the technology should be aware of the shortcomings of SD-WAN 2.0.</p>
<p style="text-align: justify;">A key obstacle is related to the need for hardware. In SD-WAN 2.0, DIA is hardware-based. Placing an appliance at each branch office is expensive, as noted above, and requires capacity planning, configuration and maintenance including updates, patches and, perhaps, upgrades that can require hardware changeouts. Security is handled as it is at more substantial corporate locations.</p>
<p style="text-align: justify;">A second shortcoming is that an SD-WAN doesn’t eliminate MPLS (or an equivalent SLA-backed service). Broadband still is an iffy proposition for latency- and loss-sensitive applications. Thus, an SLA-based service remains part of the picture. That makes sense, but it’s odd to go to great trouble to wean the organization off a particular technology -- and retain it.</p>
<p style="text-align: justify;">A third challenge is that today’s SD-WANs don’t do a good job of supporting mobile users and the cloud. Mobile support requires additional hardware and software. SD-WANs only support clouds in a one-off proprietary manner. These approaches add complexity and aren’t a long term solution.</p>
<h2 style="text-align: justify;"><a name="sd-wan-v3">SD-WAN 3.0: How SD-WAN Services Help</a></h2>
<p style="text-align: justify;"><strong>T</strong>he next version of SD-WAN confronts these challenges. <strong>SD-WAN 3.0</strong> -- which also is known as <strong>SD-WAN as a Service</strong> (<strong>SDWaaS</strong>) -- is fully inclusive. It provides branch office and mobile users with secure end-to-end connectivity to the cloud and data centers.</p>
<p style="text-align: justify;">This brings the cloud “as-a-service” vision to the SD-WAN sector. Servers, storage, network infrastructure, software and security no longer are the enterprises’ problem. Software is distributed across geographically dispersed points-of-presence, each of which is fully-redundant and connected by multiple paths to every other PoP. The organization instantiates, conﬁgures and manages their SD-WANs as if they are running on their own dedicated equipment -- but they aren’t.</p>
<p style="text-align: justify;"><strong>SDWaaS</strong> uses a “thin-edge” architecture to do this. This is a zero-touch appliance at the branch that simply moves packets across secure tunnels into the SD-WAN cloud, MPLS or other transport. The thin-edge performs only the tasks that must be done locally. These include optimal PoP selection, bandwidth management, packet loss elimination and dual transport management. This means that the edge can run in many different devices and services, such as a software client for mobile devices or an IPsec tunnel from third-party ﬁrewalls or cloud services.</p>
<p style="text-align: justify;">But beyond the SD-WAN, most edge functions needed to support the branch perimeter are built into <strong>SDWaaS</strong>. A complete, converged security stack includes NGFW, IPS, and SGW. SD-WAN and network optimization also run in the cloud including routing, optimal path selection and execute throughput maximization algorithms. And by moving these functions into the cloud, they're available to secure and improve the experience of users in all SD-WAN nodes -- headquarters, remote branch offices, homeworkers, and, yes, mobile users.</p>
<h2 style="text-align: justify;"><a name="at-the-branch-think-sdwaas">At the Branch, Think SDWaaS, Not MPLS</a></h2>
<p style="text-align: justify;">Simplifying infrastructure is a key to thriving in our data-intensive, cloud-based and highly mobile world. A single network with a single framework for all users and applications makes IT leaner, more agile. It will include all branch offices, large and small, a big change from their traditional second-class status.</p>
<p style="text-align: justify;">Converging networking and security is essential to the story of WAN transformation. And while SD-WAN is a valuable evolution of today’s WAN, <strong>SDWaaS</strong> goes further and brings a new vision for networking and security to today’s branch offices.</p>]]></description>
			<category>SASE &amp; SD-WAN Networks</category>
			<pubDate>Tue, 10 Apr 2018 10:57:49 +1000</pubDate>
		</item>
		<item>
			<title>Check Point Software and Cato Networks Co-Founder Shlomo Kramer Shares His Journey: From ‘Firewall-1’ Software to Today’s Firewall as a Service</title>
			<link>https://www.firewall.cx/security/sase-and-sd-wan/shlomo-kramer-check-point-firewall-1-to-cato-networks-cloud-based-security.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/sase-and-sd-wan/shlomo-kramer-check-point-firewall-1-to-cato-networks-cloud-based-security.html</guid>
			<description><![CDATA[<p><img src="https://www.firewall.cx/images/stories/sd-wan/shlomo-kramer-catonetworks/shlomo-kramer-cato-networks-founder.png" alt="shlomo kramer cato networks founder" style="margin: 7px; border: 1px solid #000000; float: left;" />By: <strong>Shlomo Kramer, Check Point Software &amp; Cato Networks Co-Founder</strong></p>
<p style="text-align: justify;">As one of the founders of Check Point Software and more recently Cato Networks, I’m often asked for my opinion on the future of IT in general, and security and networking in particular. Invariably the conversation will shift towards a new networking technology or the response to the latest security threat. In truth, I think the future of firewall lays in solving an issue we started to address in the past.</p>
<p style="text-align: justify;"><strong>FireWall-1</strong>, the name of Check Point’s flagship firewall, is a curious name for a product. The product that’s become synonymous with firewalls wasn’t the first firewall. The category already existed when I invented the name and saved that first project file (A <strong>Yacc grammar</strong> file for the stateful inspection compiler, if you must know.) In fact, one of the first things Gil did when we started our market research for <strong>Check Point</strong> in 1992 was to subscribe to a newly formed firewall-mailing-list for, well, firewall administrators.</p>
<p style="text-align: justify;">But <strong>FireWall-1</strong> <em>was </em>the first firewall to make network security simple. It’s the stroke of simplicity that made <strong>FireWall-1</strong>. From software to appliances, firewall evolution has largely been catalyzed by simplicity. It’s this same dynamic that three years ago propelled <strong>Gur Shatz</strong> and me to start <strong>Cato Network </strong>and capitalize on the next firewall age, the shift to the cloud.</p>
<p style="text-align: justify;">To better understand why simplicity is so instrumental, join me on a personal 25-year journey of the firewall. You’ll learn some little-known security trivia and develop a better picture of where the firewall, and your security infrastructure, is headed.</p>
<h2>The Software Age &amp; Simplicity Revolution</h2>
<p style="text-align: justify;">When we started developing <strong>FireWall-1</strong>, the existing firewalls were complicated beasts. Solutions, such as <strong>Raptor Firewall</strong> or <strong>Trusted Information Systems Firewall Toolkit</strong> (<strong>FWTK</strong>) relied on heavy professional services. Both came out of corporate America (If I remember correctly <strong>Raptor</strong> from <strong>DuPont</strong> and <strong>FWTK</strong> from <strong>Digital</strong>).</p>
<p style="text-align: justify;">The products required on going attention. Using new internet applications could mean installing a new proxy server on the firewall. Upgrading an existing application could require simultaneously upgrading the existing proxy servers, or risk breaking the application. No surprise, the solutions were sold to large organizations willing to pay for the extensive customization and professional services required to implement and maintain them.</p>
<p style="text-align: justify;">They say “necessity is the mother of invention” and that was certainly the case for <strong>Gil</strong>, <strong>Marius</strong>, and <strong>I</strong>. We were anything but corporate America. Extensive on-site support, custom implementations, professional services — the normative models wouldn’t work for us sitting in my grandmother’s apartment 10,000 miles away from the market, suffering the sweltering Israeli summer with no air conditioning and only $300,000 in the company bank account.</p>
<p style="text-align: justify;">We needed a different strategy. What we needed was a solution that would be:</p>
<ul class="check">
<li>Simple to use without customer support,</li>
<li>Simple to deploy without professional services,</li>
<li>Simple to buy from a far, and, above all,</li>
<li>Simple enough for three capable developers to build before running out of budget (about 12 months).</li>
</ul>
<p>To make the firewall <strong>simple to use</strong>, two elements were key:</p>
<ul class="checkbox">
<li style="text-align: justify;">A <strong>stateful</strong> and <strong>universal inspection machine</strong> that could handle <strong><span style="text-decoration: underline;">any</span></strong> application given the right, light-weight configuration file. No longer was there a need to deploy and update custom proxy servers for each application. In the coming years, when Internet traffic patterns changed to include an ever growing number of applications, <strong>stateful inspection</strong> became <strong>critical</strong>.</li>
<li style="text-align: justify;">An <strong>intuitive graphical user interface</strong> that any sys admin could understand and use almost immediately.</li>
</ul>
<p style="text-align: justify;">Actually, we didn’t get the UI right the first time around. After a few months of development, we ran a "focus group” with friends that luckily were PC developers. During those days, PC developers were much more advanced UI folk than us Sun Workstation guys. Our focus group hated the UI, which led us to start all over, and develop a PC-like interface that looked like this:</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/sd-wan/shlomo-kramer-catonetworks/checkpoint-firewall-1-rule-base-editor.png" alt="checkpoint firewall 1 rule base editor" title="checkpoint firewall 1 rule base editor" /></p>
<p style="text-align: center;"><em>Caption: A screenshot of FireWall-1’s early interface. </em></p>
<p style="text-align: justify;"><em>&nbsp;</em>I still think it’s pretty great. By the way, you might notice a host called “<strong>Monk</strong>” in the rule base. It was one of the two Sun workstations we owned (actually borrowed as a favor from the Israeli distributor of Sun), and named <strong>Monk</strong> after <strong>Thelonious Monk</strong>, the American jazz pianist and composer. The other machine was named <strong>Dylan</strong>. And all of those cool Icons? They were drawn by <strong>Marius</strong> who doubled as our graphic artist. He worked on a PC.</p>
<p style="text-align: justify;">To make the product <strong>simple to deploy, </strong>we made a special effort to compress the entire distribution into a single diskette with the install manual printed on the diskette’s label:</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/sd-wan/shlomo-kramer-catonetworks/checkpoint-firewall-1-solaris-fdd.png" alt="checkpoint firewall-1 solaris fdd" title="checkpoint firewall-1 solaris fdd" /></p>
<p style="text-align: center;"><em>Caption: An early FireWall-1 disk. Note the installation instructions on the label.</em></p>
<p style="text-align: justify;">The last critical point was making the product <strong>simple to buy</strong>. In a world where the competition sold direct and made a considerable part of their revenues off of professional services, we decided to become a pure channel company and sell exclusively through partners.</p>
<p style="text-align: justify;">We were very lucky to sign up early on with <strong>SunSoft</strong>, the software arm of the then leading computer manufacturer, Sun Microsystems, and become part of their popular Solstice suite. Sun's distribution know-how and capabilities were critical in the early days. In the pull market that followed, the fact that buying <strong>FW-1</strong> through our partners was simple became critical.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/sd-wan/shlomo-kramer-catonetworks/checkpoint-firewall-1-solstice.png" alt="checkpoint firewall-1 solstice" title="checkpoint firewall-1 solstice" /></p>
<p style="text-align: center;"><em>Caption: An early FireWall-1 disk packaged as part of Sun’s Solstice suite</em></p>
<h2>The Appliance Age: Simplicity At Scale</h2>
<p style="text-align: justify;">As ﬁrewalls became increasingly popular, the workstation form factor became increasingly difficult to maintain. The basic premises of our business — simple to buy, simple to deploy simple to use — were eroding because of how customers were using the product. It's one thing when you have a single Internet control point running on a repurposed workstation, but now organizations had distributed hundreds of these ﬁrewalls running on all sorts of machines and operating systems. You can imagine the mess.</p>
<p style="text-align: justify;">Moving from shrink-wrapped software to prepackaged appliances seemed like, well, a simple, logical next step. The transition was anything but simple.</p>
<p style="text-align: justify;">There was an existing, perimeter appliance already in the market — the <strong>router</strong>. It made perfect sense to embed the ﬁrewall in that appliance, at least that's what I thought when I signed an OEM agreement with <strong>Wellfleet Communications</strong>, the then number two router company (after Cisco, of course). We even had a customer with an amazing 300-node purchase (a large Fl in NY). One of our leading engineers, <strong>Nir Zuk</strong>, relocated to Boston to work at the Wellfleet office and support that project.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/sd-wan/shlomo-kramer-catonetworks/checkpoint-firewall-1-welfleet-router.png" alt="Embedding check point firewall-1 in a Welfleet router " title="Embedding check point firewall-1 in a Welfleet router " /></p>
<p style="text-align: center;"><em>Caption: Embedding the firewall in a Welfleet router was good in concept but the remained crippled by limitations of the underlying router.</em></p>
<p style="text-align: justify;">I remember the day I visited <strong>Nir</strong>. He wasn't happy at all, spitting and cursing as only <strong>Nir</strong> can. The hardware and operating system underlying the Wellfleet router were not <strong>strong enough</strong> nor <strong>dynamic enough</strong> to address the needs of a sophisticated firewall. It was a far cry from developing for the Solaris-based workstation. Work progressed slowly and, in the end, <strong>Nir</strong> was talented enough to get something basic working, enabling us to implement the <strong>300 router- ﬁrewall nodes</strong> purchased by the customer. But the product remained crippled by the underlying platform. Overall, the product wasn't a success.</p>
<p style="text-align: justify;">It became clear that there was a need for a dedicated appliance, and so we started looking around for a platform flexible enough to run a firewall. One of the early platforms we targeted was an appliance from a company called <strong>Armon</strong>, who ran a network monitoring solution based on the RMON standard.</p>
<p style="text-align: justify;">Since the appliance was built to run sophisticated software we believed it will be a good match for <strong>FW-1</strong>. The <strong>Armon</strong> CEO, <strong>Yigal Yaakobi</strong>, was a big enthusiast of the OEM model, and licensed the box to us to build a <strong>dedicated firewall appliance</strong>. But <strong>Armon</strong> was just bought by <strong>SynOptics Communications</strong>, the then leading wiring hub manufacturer, who merged with <strong>Wellfleet</strong> to form <strong>Bay Networks</strong>. We needed <strong>Bay Networks</strong> management buy-in, which meant meeting with <strong>Jim Goetz</strong>, later the famed investor with <strong>Sequoia</strong>.</p>
<p style="text-align: justify;"><strong>Yigal</strong> and I dressed up in our best, and in my case the only, suit and met <strong>Jim</strong> at a café shop in <strong>Vegas</strong> across from the Interop show. The meeting was not a success. Apparently, <strong>Jim</strong> did not appreciate my style in clothing and spent most of the meeting scolding it. And so the future of the firewall suffered a minor setback due to my lack of fashion sense. But the idea apparently stuck, because we will soon meet <strong>Jim</strong> in a more fortunate circumstance.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/sd-wan/shlomo-kramer-catonetworks/checkpoint-firewall-1-nokia-ip1220.png" alt="Embedding the firewall-1 in Nokia appliances nokia ip1220" title="Embedding the firewall-1 in Nokia appliances nokia ip1220" />&nbsp;</p>
<p style="text-align: center;"><em>Caption: Embedding the firewall in Nokia appliances (pictured is a Nokia IP1220) proved successful.</em></p>
<p style="text-align: justify;">Anyway, I did not give up. I hired <strong>Asheem Chandna</strong> (later the famed investor with Greylock) as the <strong>vice president of business development and product management</strong>, and relocated <strong>Nir Zuk</strong> to the <strong>Bay Area</strong>. The two started, among other things, the OEM program for <strong>Check Point</strong> that yielded the very successful <strong>Nokia</strong> relationship, which for many years was the basis of <strong>Check Point’s</strong> line of appliances.</p>
<p style="text-align: justify;">As an epilog, <strong>Nir</strong>, <strong>Jim</strong> and <strong>Asheem</strong> started a company few years later called <a href="https://www.firewall.cx/security/palo-alto-networks.html" target="_blank" title="Palo Alto Networks - Firewalls"><strong>Palo Alto Networks</strong></a> that redefined the network security market, introducing the first modern unified threat protection appliance. And, yes, it was simple to buy, deploy and use, and wonderfully addressed the challenges of the changing traffic patterns it needed to protect.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/sd-wan/shlomo-kramer-catonetworks/palo-alto-networks-pa-7000.png" alt="Palo Alto redefined the network security market with unified threat protection appliances  pa-7000" title="Palo Alto redefined the network security market with unified threat protection appliances  pa-7000" /></p>
<p style="text-align: center;"><em>Caption: Palo Alto redefined the network security market with unified threat protection appliances (shown here is a PA-7000 series appliance)</em></p>
<h2>The Cloud Service: Simplicity For Today’s Business</h2>
<p style="text-align: justify;">Firewalls were always in the business of defining the perimeter, but originally we had ambitions to go after the business of the WAN. At <strong>Check Point</strong> we developed <strong>VPN-1</strong> immediately after releasing <strong>FireWall-1</strong> (and then merged them into one product suite), the <strong>first</strong> <strong>IPsec-based VPN</strong> between gateways and later a client VPN version as well for remote users. The idea was to replace Frame Relay and ATM, the predecessors of MPLS.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/sd-wan/shlomo-kramer-catonetworks/checkpoint-vpn-1-nokia-fdd.png" alt="VPN-1 disk for running on a Nokia appliance" title="VPN-1 disk for running on a Nokia appliance" /></p>
<p style="text-align: center;"><em>Caption: An early VPN-1 disk for running on a Nokia appliance</em></p>
<p style="text-align: justify;">Then we developed <strong>FloodGate-1</strong> to provide <strong>WAN optimization</strong> and <strong>QOS</strong> for the <strong>IP VPN network</strong>. The goal was to create a platform for a high-quality, Internet-based WAN that did not require dedicated, expensive, Frame Relay, or ATM connections and would extend beyond physical locations to any type of nomadic (if we use the ‘90s term) user.</p>
<p style="text-align: justify;">It failed. MPLS won. People wanted SLA-backed networks to run their mission-critical apps. The Internet was too unpredictable. That was my exit project at <strong>Check Point</strong>. After I left, the <strong>FloodGate-1</strong> effort was sidelined.</p>
<p style="text-align: justify;">I also put this problem aside and started working on bringing firewalls deep into the datacenter of organizations. That took about <strong>12 years</strong> and yielded other companies called <strong>Imperva</strong> and then <strong>Incapsula</strong>, founded by <strong>Gur Shatz</strong>, who soon emerged as a true cloud innovator.</p>
<p style="text-align: justify;">In <strong>Incapsula</strong>, for the first time, the appliance form factor came under attack. The datacenter was by now mostly hosted on a cloud service or even just a good, old, plain hoster. Physical appliances made little sense when you could use a third-party cloud service<strong>. Incapsula</strong> was a great success (still is) because it took application delivery and security, and matched the cloud challenge with a cloud toolset.</p>
<p style="text-align: justify;">While we were busy with the datacenter firewall it became increasingly clear that the perimeter was dissolving. In a world where most of my apps are third-party <strong>Software as a Service</strong> (<strong>SaaS</strong>), most of my data resides on third-party, public clouds, and most of my work is done on mobile devices out of the office, of what use are physical appliances when they’re guarding my now largely empty office?</p>
<p style="text-align: justify;">Organizations had to buy increasing number of products for protecting their <strong>SaaS</strong> applications, <strong>Infrastructure as a Service</strong> (<strong>IaaS</strong>) cloud datacenters, and mobile users on top of their ongoing firewall spend. To make things worse, lots of branch locations and small offices that never had a direct breakout to the Internet but just backhaul over MPLS to company center where the firewall resided could not do that anymore. The Internet became a utility. You needed it anywhere, anytime, lots of it and in a secure way. So, all sort of patches like MPLS augmentation and secure web gateways emerged to increase Internet availability to all elements of the organization. Things were very messy at this stage. A far cry from the simple to buy, deploy, and use idea of the past.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/sd-wan/shlomo-kramer-catonetworks/catonetworks-cato-cloud-services.png" alt="With cloud, you can create one network with one set of security policies for all locations, resources, and users" title="With cloud, you can create one network with one set of security policies for all locations, resources, and users" /></p>
<p style="text-align: center;"><em>Caption: With cloud, you can create one network with one set of security policies for all locations, resources, and users</em></p>
<p style="text-align: justify;">When <strong>Gur</strong> (yep, that guy from <strong>Incapsula</strong> fame) and I started <strong>Cato Networks</strong> almost three years ago we realized the problem of WAN and perimeter are interlocked and require a new architecture that will make secure Internet and WAN available everywhere, anytime to any part of the organization – a branch office, a data center, a cloud segment, a mobile user. It was like going back 17 years in time to the days of <strong>VPN-1</strong> and <strong>Floodgate-1</strong> and taking a round two at that problem, but this time in a completely different world driven by cloud and mobility. The key remained the same: bring simplicity to an increasingly complex world.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/sd-wan/shlomo-kramer-catonetworks/catonetworks-cloud-services-use-cases.png" alt="Cato networks offer a diverse range of SD-WAN use cases" title="Cato networks offer a diverse range of SD-WAN use cases" /></p>
<p style="text-align: center;"><em>Caption: Cato addresses a diverse range of use cases. </em></p>
<p style="text-align: justify;">Following the <strong>Incapsula</strong> playbook we built a cloud network able to deliver anytime anywhere networking and security services. Think <strong>AWS</strong> for networking and network security. I believe this is the architecture that 10 years from now will dominate the enterprise WAN.</p>
<p style="text-align: justify;">But it’s not just my belief. After 18 months in the market, hundreds of customers with thousands of branch locations across all verticals now rely on <strong>Cato Cloud</strong> to connect and secure their corporate networks. They agree with us: <strong>Cato is the future of networking</strong>.</p>]]></description>
			<category>SASE &amp; SD-WAN Networks</category>
			<pubDate>Wed, 31 Jan 2018 19:35:33 +1100</pubDate>
		</item>
		<item>
			<title>MPLS vs. SD-WAN vs. Internet vs. Cloud Network. Connectivity, Optimization and Security Options for the ‘Next Generation WAN’</title>
			<link>https://www.firewall.cx/security/sase-and-sd-wan/mpls-vs-sdwan-vs-internet-vs-cloud-network.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/sase-and-sd-wan/mpls-vs-sdwan-vs-internet-vs-cloud-network.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/sd-wan/mpls-vs-sdwan-vs-internet/sd-wan-networks.jpg" alt="sdwan networks" style="margin: 7px; float: left;" title="sdwan networks" />The <strong>Wide Area Network</strong> (<strong>WAN</strong>) is the <strong>backbone of the business</strong>. It ties together the remote locations, headquarters and data centers into an integrated network. Yet, the role of the WAN has evolved in recent years. Beyond physical locations, we now need to provide optimized and secure access to <strong>Cloud-based resources</strong> for a <strong>global and mobile workforce</strong>. The existing <strong>WAN optimization</strong> and <strong>security solutions</strong>, designed for physical locations and <strong>point-to-point architectures</strong>, are stretched to support this transformation.</p>
<p style="text-align: justify;">This article discusses the different <strong>connectivity</strong>, <strong>optimization</strong> and <strong>security options</strong> for the ‘<strong>Next Generation WAN</strong>’ (NG-WAN). The <strong>NG-WAN</strong> calls for a <strong>new architecture</strong> to extend the WAN to incorporate the <strong>dynamics</strong> of <strong>cloud and mobility</strong>, where the traditional network perimeter is all but gone.</p>
<p style="text-align: justify;">The <strong>Wide Area Network</strong> (<strong>WAN</strong>) connects all business locations into a <strong>single operating network</strong>. Traditionally, WAN design had to consider the secure connectivity of remote offices to a headquarters or a data center which hosted the enterprise applications and databases.</p>
<p>Without further delay, let's take a look at the topics cover in this article:</p>
<ul>
<li><a href="https://www.firewall.cx/#first-generation-legacy-wan-connectivity" title="First-generation: Legacy WAN Connectivity">First-generation: Legacy WAN Connectivity</a></li>
<li><a href="https://www.firewall.cx/#mpls-sla-backed-service" title="MPLS - SLA Backed Service at Premium Price">1: MPLS - SLA Backed Service at Premium Price</a></li>
<li><a href="https://www.firewall.cx/#internet-best-effort-service" title="Internet - Best-Effort Service at Discounted Price">2: Internet - Best-Effort Service at Discounted Price</a></li>
<li><a href="https://www.firewall.cx/#second-generation-appliance-based-sd-wan" title="Second Generation: Appliance-based SD-WAN">Second Generation: Appliance-based SD-WAN</a></li>
<li><a href="https://www.firewall.cx/#sd-wan-augmenting-mpls-with-internet-links" title="SD-WAN Augmenting MPLS with Internet Links">SD-WAN Augmenting MPLS with Internet Links</a></li>
<li><a href="https://www.firewall.cx/#third-generation-a-cloud-based-secure-sd-wan" title="Third Generation: A Cloud-based, Secure SD-WAN">Third Generation: A Cloud-based, Secure SD-WAN</a></li>
<li><a href="https://www.firewall.cx/#summary" title="Summary">Summary</a></li>
</ul>
<p>Let’s look at evolution of the WAN.</p>
<h2><a name="first-generation-legacy-wan-connectivity">First Generation: Legacy WAN Connectivity</a></h2>
<p>Currently, there are <strong>2 WAN connectivity options</strong> which offer a basic tradeoff between cost, availability and latency:</p>
<h2><a name="mpls-sla-backed-service">Option 1: MPLS - SLA-Backed Service at Premium Price</a></h2>
<p style="text-align: justify;">With MPLS, a telecommunication provider provisions two or more business locations with a managed connection and routes traffic between these locations over their private backbone. In theory, since the traffic does not traverse the internet, encryption is optional. Because the connection is managed by the telco, end to end, it can commit to availability and latency SLAs. This commitment is expensive and is priced by bandwidth. Enterprises choose MPLS if they need to support applications with stringent up-time requirements and minimal quality of service (such as Voice over IP (VOIP).</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/mpls-vs-sdwan-vs-internet/hq-connection-to-remote-office-via-mpls.png" alt="hq connection to remote office via mpls" style="display: block; margin-left: auto; margin-right: auto;" title="hq connection to remote office via mpls" /></p>
<p style="text-align: center;">Headquarters connecting to remote offices via MPLS Premium service</p>
<p style="text-align: justify;">To maximize the usage of MPLS links, WAN optimization equipment is deployed at each end of the line, to prioritize and reduce different types of application traffic. The effectiveness of such optimizations is protocol and application specific (for example, compressed streams benefit less from WAN optimization).</p>
<p><strong>Positives:</strong></p>
<ul class="check">
<li>Latency: Low</li>
<li>Availability: High</li>
</ul>
<p><strong>Concerns:</strong></p>
<ul>
<li>Price: High</li>
</ul>
<h2><a name="internet-best-effort-service">Option 2: Internet - Best Effort Service at a Discounted Price</a></h2>
<p style="text-align: justify;">Internet connection procured from the ISP, typically offers nearly unlimited last mile capacity for a low monthly price. An unmanaged internet connection doesn’t have the high availability and low-latency benefits of MPLS but it is inexpensive and quick to deploy. IT establishes an encrypted VPN tunnel between the branch office firewall and the headquarters/data center firewall. The connection itself is going through the internet, with no guarantee of service levels because it is not possible to control the number of carriers or the number of hops a packet has to cross. This can cause unpredictable application behavior due to increased latency and packet loss.</p>
<p>Internet-based connectivity forces customers to deploy and manage branch office security equipment.</p>
<p><strong>Positives:</strong></p>
<ul class="check">
<li>Price: Low</li>
</ul>
<p><strong>Concerns:</strong></p>
<p>Latency: Unknown</p>
<p>Availability: Low</p>
<h2><a name="second-generation-appliance-based-sd-wan">Second Generation: Appliance-Based SD-WAN</a></h2>
<p style="text-align: justify;">The cost/performance tradeoff between internet and MPLS, gave rise to SD-WAN. SD-WAN is using both MPLS and internet links to handle WAN traffic. Latency sensitive apps are using the MPLS links, while the rest of the traffic is using the internet link. The challenge customers face is to dynamically assign application traffic to the appropriate link.</p>
<p>Readers interested in SD-WANs should read our <a href="https://www.firewall.cx/security/sase-and-sd-wan/sd-wan-networks-benefits-management-security-architecture.html" target="_blank" title="Complete Guide to SD-WAN">Complete Guide to SD-WAN</a> article.</p>
<p style="text-align: left;"><strong>Related articles:</strong></p>
<ul>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/sd-wan-networks-benefits-management-security-architecture.html" target="_blank" title="Complete Guide to SD-WAN. Technology Benefits, SD-WAN Security, Management, Mobility, VPNs, Architecture and more">Complete Guide to SD-WAN. Technology Benefits, SD-WAN Security, Management, Mobility, VPNs, Architecture and more</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/deep-dive-into-catonetworks-converged-sase-platform.html" target="_blank" title="The Need for a Converged SASE Platform. Converging Network &amp; Security Services with Catonetworks SASE Platform">The Need for a Converged SASE Platform. Converging Network &amp; Security Services with Catonetworks SASE Platform</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/sd-wan-networks-benefits-management-security-architecture.html" target="_blank" title="How To Secure Your SD-WAN. Comparing DIY, Managed SD-WAN and SD-WAN Cloud Services">How To Secure Your SD-WAN. Comparing DIY, Managed SD-WAN and SD-WAN Cloud Services</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/comparing-sase-and-vpn-features-security-flexibility-vulnerabilities.html" target="_blank" title="SASE and VPNs: Reconsidering your Mobile Remote Access and Site-to-Site VPN strategy">SASE and VPNs: Reconsidering your Mobile Remote Access and Site-to-Site VPN strategy</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/converged-sase-backbone-reduced-latency-jitter-packet-loss.html" target="_blank" title="Converged SASE Backbone – How Leading SASE Provider, Cato Networks, Reduced Jitter/Latency and Packet Loss by a Factor of 13!">Converged SASE Backbone – How Leading SASE Provider, Cato Networks, Reduced Jitter/Latency and Packet Loss by a Factor of 13!</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/key-features-sase-cloud-providers-must-have.html" target="_blank" title="Key Features of a True Cloud-Native SASE Service. Setting the Right Expectations">Key Features of a True Cloud-Native SASE Service. Setting the Right Expectations</a></li>
</ul>
<h2><a name="sd-wan-augmenting-mpls-with-internet-links">SD-WAN: Augmenting MPLS with Internet Links</a></h2>
<p style="text-align: justify;">SD-WAN solutions offer the management capabilities to direct the relevant traffic according to its required class of service, offloading MPLS links and delaying the need to upgrade capacity.</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/mpls-vs-sdwan-vs-internet/sdwan-combining-mpls-with-internet-links.png" alt="sdwan combining mpls with internet links" style="display: block; margin-left: auto; margin-right: auto;" title="sdwan combining mpls with internet links" /></p>
<p style="text-align: justify;">SD-WAN solutions, however, are limited in a few key aspects:</p>
<h3>SD-WAN Footprint</h3>
<p>Similar to WAN optimization equipment, SD-WAN solutions must have a box deployed at each side of the link.</p>
<h3>Connectivity</h3>
<p style="text-align: justify;">SD-WAN can’t replace the MPLS link because its internet “leg” is exposed to the unpredictable nature of an unmanaged internet connection (namely, its unpredictable latency, packet drops and availability).</p>
<h3>Deployment</h3>
<p style="text-align: justify;">SD-WAN, like the other WAN connectivity options, is agnostic to the increased role of internet, Cloud and mobility within the enterprise network. It focuses, for the most part on optimizing the legacy, physical WAN.</p>
<h2><a name="third-generation-a-cloud-based-secure-sd-wan">Third Generation: A Cloud-based, Secure SD-WAN</a></h2>
<p style="text-align: justify;">With the rapid migration to <strong>Cloud applications</strong> (e.g., Office 365), <strong>Cloud infrastructure</strong> (e.g. Amazon AWS) and a <strong>mobile workforce</strong>, the classic WAN architecture is <strong>severely challenged</strong>. It is no longer sufficient to think in terms of physical locations being the heart of the business, and a new cloud-based SD-WAN solution was born. Here is why:</p>
<h3>Limited end to end link control for the Cloud</h3>
<p style="text-align: justify;">With public cloud applications outside the control of IT, organizations can’t rely on optimizations that require a box at both ends of each link. In addition, Cloud infrastructure (servers and storage), introduces a new production environment that has its own connectivity and security requirements. Existing WAN and Security solutions don’t naturally extend to the new Cloud-based environments.</p>
<h3>Limited service and control to mobile users</h3>
<p style="text-align: justify;">Securely accessing corporate resources requires, mobile users to connect to a branch or HQ firewall VPN which could be very far from their location. This causes user experience issues, and encourages compliance violations (for example, direct access to Cloud services that bypasses corporate security policy). Ultimately, the mobile workforce is not effectively covered by the WAN.</p>
<p style="text-align: left;">The <strong>Cloud-based</strong>, <strong>Secure SD-WAN</strong> is aiming to address these challenges. It is based on the following principles:</p>
<h2>The Perimeter Moves to the Cloud</h2>
<p>The notorious dissolving perimeter is re-established in the Cloud. The Cloud delivers a managed WAN backbone with reduced latency and optimal routing. This ensures the required quality of service for both internal and Cloud-based applications.</p>
<h2>The Cloud-Βased WAN is “Democratic” and All-Inclusive</h2>
<p style="text-align: justify;">All network elements plug into the Cloud WAN with secure tunnels including physical locations, Cloud resources and mobile users. This ensures all business elements are integral part of the network instead of being bolted on top of a legacy architecture.</p>
<h2>Security is Ιntegrated into the Νetwork</h2>
<p style="text-align: justify;">Beyond securing the backbone itself, it is possible to directly secure all traffic (WAN and internet) that crosses the perimeter - without deploying distributed firewalls.</p>
<p><img src="https://www.firewall.cx/images/stories/sd-wan/mpls-vs-sdwan-vs-internet/sdwan-protects-businesses-from-internet-attacks.png" alt="sdwan protects businesses from internet attacks" style="display: block; margin-left: auto; margin-right: auto;" title="sdwan protects businesses from internet attacks" /></p>
<p style="text-align: justify;">As shown in the example above, the SD-WAN provider acts as a gateway to the internet for the business. Any attempts to gain access to the business network or attacks must pass through the SD-WAN provider's secure network. This not only provides increased levels of security but also off-loads attacks directly to the SD-WAN provider, saving the business considerable bandwidth and resources needed to repel attacks.</p>
<h2><a name="summary">Summary</a></h2>
<p style="text-align: justify;">This article <strong>compared</strong> <strong>SD-WAN solutions</strong> with <strong>Service Provider MPLS,</strong> <strong>Internet</strong> and <strong>Cloud Networks</strong>. We examined the positive and negative offerings of <strong>MPLS services</strong> (guaranteed SLAs), <strong>Internet-based WAN solutions</strong> (best-effort service), augmenting MPLS with Internet links and Cloud networks.&nbsp; For more information on SD-WAN, refer to our <a href="https://www.firewall.cx/security/sase-and-sd-wan/sd-wan-networks-benefits-management-security-architecture.html" title="Complete Guide to SD-WAN networks">Complete Guide to SD-WAN networks</a>.</p>]]></description>
			<category>SASE &amp; SD-WAN Networks</category>
			<pubDate>Mon, 04 Dec 2017 21:37:50 +1100</pubDate>
		</item>
		<item>
			<title>Complete Guide to SD-WAN. Technology Benefits, SD-WAN Security, Management, Mobility, VPNs, Architecture &amp; Comparison with Traditional WANs. SD-WAN Providers Feature Checklist.</title>
			<link>https://www.firewall.cx/security/sase-and-sd-wan/sd-wan-networks-benefits-management-security-architecture.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/sase-and-sd-wan/sd-wan-networks-benefits-management-security-architecture.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong><img src="https://www.firewall.cx/images/stories/sd-wan/sdwan-global-network.jpg" alt="SDWAN Global Secure Network" style="margin: 7px; float: left;" title="SDWAN Global Secure Network" />SD-WAN</strong> is the answer for <strong>enterprises</strong> and <strong>organizations</strong> seeking to <strong>consolidate network functions</strong> and <strong>services</strong> while at the same time <strong>simplify their WAN infrastructure</strong> and its <strong>management</strong>.</p>
<p style="text-align: justify;"><strong>SD-WANs</strong> are <strong>suitable</strong> for <strong>any organization</strong> regardless of their size and location(s). Forget about <strong>managing routers, firewalls or proxies</strong>, <strong>upgrading internet lines</strong>, <strong>high-cost WAN links</strong>, <strong>leased lines</strong> (<strong>MPLS</strong>), <strong>filtering incoming traffic</strong>, public-facing infrastructure, <strong>VPNs</strong> and <strong>mobile clients. SD-WANs provide all the above </strong>and allow<strong> managers, administrators </strong>and<strong> IT staff </strong>to<strong> manage their WAN infrastructure </strong>via an <strong>intuitive</strong>, easy-to-use GUI interface, <strong>lowering </strong>equipment and service contract costs but also minimize the need for continuous upgrades and other expensive and time-consuming exercises.</p>
<p style="text-align: left;"><strong>Related articles:</strong></p>
<ul>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/deep-dive-into-catonetworks-converged-sase-platform.html" target="_blank" title="The Need for a Converged SASE Platform. Converging Network &amp; Security Services with Catonetworks SASE Platform">The Need for a Converged SASE Platform. Converging Network &amp; Security Services with Catonetworks SASE Platform</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/sd-wan-networks-benefits-management-security-architecture.html" target="_blank" title="How To Secure Your SD-WAN. Comparing DIY, Managed SD-WAN and SD-WAN Cloud Services">How To Secure Your SD-WAN. Comparing DIY, Managed SD-WAN and SD-WAN Cloud Services</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/comparing-sase-and-vpn-features-security-flexibility-vulnerabilities.html" target="_blank" title="SASE and VPNs: Reconsidering your Mobile Remote Access and Site-to-Site VPN strategy">SASE and VPNs: Reconsidering your Mobile Remote Access and Site-to-Site VPN strategy</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/converged-sase-backbone-reduced-latency-jitter-packet-loss.html" target="_blank" title="Converged SASE Backbone – How Leading SASE Provider, Cato Networks, Reduced Jitter/Latency and Packet Loss by a Factor of 13!">Converged SASE Backbone – How Leading SASE Provider, Cato Networks, Reduced Jitter/Latency and Packet Loss by a Factor of 13!</a></li>
<li><a href="https://www.firewall.cx/security/sase-and-sd-wan/key-features-sase-cloud-providers-must-have.html" target="_blank" title="Key Features of a True Cloud-Native SASE Service. Setting the Right Expectations">Key Features of a True Cloud-Native SASE Service. Setting the Right Expectations</a></li>
</ul>
<p style="text-align: justify;">The diagram below clearly shows a few of the network and security services <strong>leading global SD-WAN providers</strong> such as&nbsp; CATO Networks provide to businesses no matter where they are geographically located around the world.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/sd-wan/sdwan-network-services.png" alt="sdwan network services" title="SD-WAN Networks advanced network security services" /></p>
<p style="text-align: center;">SD-WAN Networks offer <strong>zero-touch deployment</strong> with <strong>advanced network security services</strong></p>
<p>Let’s kick-off this guide by taking a look at the <strong>SD-WAN topics</strong> covered:</p>
<ul>
<li><a href="https://www.firewall.cx/#what-is-sd-wan" title="What is SD-WAN">What is SD-WAN?</a></li>
<li><a href="https://www.firewall.cx/#the-problem-with-traditional-wans" title="The Problem with Traditional WANs">The Problem with Traditional WANs</a></li>
<li><a href="https://www.firewall.cx/#how-does-sd-wan-work" title="How Does SD-WAN Work?">How Does SD-WAN Work?</a></li>
<li><a href="https://www.firewall.cx/#sd-wan-benefits" title="SD-WAN Benefits">SD-WAN Benefits</a>
<ul>
<li><a href="https://www.firewall.cx/#sd-wan-app-performance" title="SD-WAN Application Performance">SD-WAN Application Performance</a></li>
<li><a href="https://www.firewall.cx/#sd-wan-cost-savings-avoidance" title="SD-WAN Cost Savings and Avoidance">SD-WAN Cost Savings and Avoidance</a></li>
<li><a href="https://www.firewall.cx/#sd-wan-availability" title="SD-WAN Availability">SD-WAN Availability</a></li>
<li><a href="https://www.firewall.cx/#agility-deploy-new-sites" title="Agility: Deploying new Sites, Reconfiguring the WAN">Agility: Deploying new Sites, Reconfiguring the WAN</a></li>
</ul>
</li>
<li><a href="https://www.firewall.cx/#sd-wan-architecture" title="SD-WAN Architecture">SD-WAN Architecture</a></li>
<li><a href="https://www.firewall.cx/#sd-wan-architecture-edge-appliances" title="SD-WAN Architecture - Edge Appliances">SD-WAN Architecture - Edge Appliances</a></li>
<li><a href="https://www.firewall.cx/#sd-wan-architecture-cloud-based-sd-wan" title="SD-WAN Architecture - Cloud-Based SD-WAN">SD-WAN Architecture - Cloud-Based SD-WAN</a></li>
<li><a href="https://www.firewall.cx/#sd-wan-deployment-methods" title="SD-WAN Deployment Methods">SD-WAN Deployment Methods</a></li>
<li><a href="https://www.firewall.cx/#sd-wan-must-have-features" title="SD-WAN Must-have Features">SD-WAN Must-Have Features</a></li>
<li><a href="https://www.firewall.cx/#sd-wan-security-vpn-features" title="Recommended SD-WAN Security &amp; VPN Features">Recommended SD-WAN Security &amp; VPN Features</a><br />
<ul>
<li><a href="https://www.firewall.cx/#sd-wan-ngfw" title="Next-Generation Firewall (NGFW)">Next-Generation Firewall (NGFW)</a></li>
<li><a href="https://www.firewall.cx/#secure-web-gateway" title="Secure Web Gateway">Secure Web Gateway (SWG)</a></li>
<li><a href="https://www.firewall.cx/#adv-threat-prevention" title="Advanced Threat Prevention">Advanced Threat Prevention</a></li>
<li><a href="https://www.firewall.cx/#local-security-appliances" title="Local Security Appliances">Local Security Appliances</a></li>
<li><a href="https://www.firewall.cx/#virtual-network-function" title="Virtual Network Function">Virtual Network Function (VNF)</a></li>
<li><a href="https://www.firewall.cx/#firewall-as-a-service" title="Firewall as a Service (FWaaS)">Firewall as a Service (FWaaS)</a></li>
</ul>
</li>
<li><a href="https://www.firewall.cx/#recommended-sd-wan-mobiity-features" title="Recommended SD-WAN Mobility Features">Recommended SD-WAN Mobility Features</a></li>
<li><a href="https://www.firewall.cx/#recommended-sd-wan-management-features" title="Recommended SD-WAN Management Features">Recommended SD-WAN Management Features</a></li>
<li><a href="https://www.firewall.cx/#summary" title="SD-WAN Summary">Summary</a></li>
</ul>
<h2 style="text-align: left;"><a name="what-is-sd-wan">What is SD-WAN?</a></h2>
<p style="text-align: justify;"><strong>Software-Defined Wide Area Network</strong> (SD-WAN) is a new architectural approach to building <strong>Wide Area Networks</strong> (WANs) whereby applications and the <strong>network configuration are isolated</strong> from the underlying networking services (various types of Internet access or private data services sold by network service providers). As a result, the <strong>networking services</strong> can be <strong>reconfigured</strong>, <strong>added</strong>, or <strong>removed</strong> <strong>without impacting the network</strong>. The benefits to such an approach address long-standing concerns with traditional WANs around the <strong>cost</strong> of bandwidth, <strong>time</strong> to deploy and reconfigure the WAN and more.</p>
<h2 style="text-align: left;"><a name="the-problem-with-traditional-wans">The Problem with Traditional WANs</a></h2>
<p style="text-align: justify;">For years, organizations connected their locations with <strong>private data services</strong>, namely <strong>MultiProtocol Label Switching</strong> (<strong>MPLS</strong>) services. Companies contract with their network service provider to place MPLS routers at each location. Those routers connect with one another or a designated site across the MPLS service. MPLS services are seen as being:</p>
<ul>
<li><strong>Private</strong> because all customer traffic is separated from one another.</li>
<li><strong>Predictable</strong> as the MPLS network is engineered to have very low packet loss</li>
<li><strong>Reliable</strong> as the carrier stands behind the MPLS with service and support, backing it up contractually with uptime (and reliability) guarantees.</li>
</ul>
<p>&nbsp;<img src="https://www.firewall.cx/images/stories/sd-wan/traditional-high-cost-mpls-wan-network.png" alt="Traditional High-Cost MPLS VPN Networks" style="display: block; margin-left: auto; margin-right: auto;" title="SD-WAN vs Traditional High-Cost MPLS VPN Networks" /></p>
<p style="text-align: center;">Traditional High-Cost MPLS VPN Networks</p>
<p style="text-align: justify;">As such, MPLS services are <strong>expensive</strong> (relative to Internet connectivity), in some cases costing <strong>90 percent more than Internet bandwidth</strong>. And with bandwidth being so expensive, companies have to be very judicious in their bandwidth usage. Sites are often connected by <strong>single MPLS line</strong>, creating a potential <strong>single point of failure</strong>. Delays from line upgrades are a problem, as lines often lack the necessary excess capacity to accommodate traffic changes or new applications. Finally, new deployments take <strong>significantly longer</strong> than Internet lines — weeks in some cases, months at the extreme — whereas Internet access can be deployed in days if not minutes (with 4G/LTE).</p>
<p style="text-align: justify;">Organizations accepted MPLS limitations for years for numerous reasons. For too long, the Internet was far too erratic to provide the consistent performance needed by enterprise applications. That’s <strong>changed significantly</strong> within Internet regions over the past few years. A decade ago, most enterprise traffic stayed on the MPLS network, terminating at a headquarters or datacenter housing the company’s applications. Today, Internet and cloud traffic are the norm not the exception, often constituting half of the traffic on and MPLS backbone. The net result is that <strong>data transmission costs</strong> end up consuming a <strong>significant portion</strong> of an IT Department’s <strong>annual expenditure</strong> on its WAN with Internet- and cloud-traffic being a major cause.</p>
<h2 style="text-align: left;"><a name="how-does-sd-wan-work">How Does SD-WAN Work?</a></h2>
<p style="text-align: justify;"><strong>Enter SD-WAN</strong>. SD-WAN leverages ubiquitous, <strong>inexpensive Internet connections</strong> to replace MPLS for much of an organization’s traffic. At a high-level, the <strong>SD-WAN separates</strong> the <strong>applications from the underlying network services</strong>. Policies, intelligent routing algorithms, and other technologies in the SD-WAN adapt the network to the application. Depending on implementation, the locations, cloud datacenters, SaaS applications, and mobile users can all be connected into the SD-WAN.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/sd-wan/sdwan-low-cost-highly-redundant-wan-internet.png" alt="High-Speed Low-Cost SD-WAN with Global SLA Contracts (CATONetworks)" title="High-Speed Low-Cost SD-WAN with Global SLA Contracts (CATONetworks)" /></p>
<p style="text-align: center;">High-Speed Low-Cost SD-WAN with Global SLA Contracts</p>
<p style="text-align: justify;">More specifically, the SD-WAN router sits at the edge of a location’s local network and connects to the network services. Best practices call for at least two connections per location. Hybrid WAN configurations will use an MPLS line and an Internet service, such as fiber, xDSL, cable or 4G/LTE. All-Internet configurations will use two or more Internet service. The SD-WAN routers connect with one another, forming a mesh of encrypted tunnels (the “virtual overlay”) across the underlying network services (the “underlay”), such as cable, xDSL, or 4G/LTE.</p>
<p style="text-align: justify;">Unlike traditional WANs, all lines in an SD-WAN are typically active. The SD-WAN uses <strong>Policy-Based Routing</strong> (<strong>PBR</strong>) algorithms and preconfigured application policies to dynamically select the optimum tunnel based on application requirements, business priorities, and real-time network conditions. The SD-WAN is responsible for <strong>balancing traffic</strong> across the site’s connections. Should there be an outage (a “blackout”) or degradation in the line (a “brownout”), the SD-WAN moves traffic to <strong>alternate paths</strong> and restores them to initial paths also based on configured policies.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/sd-wan/sdwan-line-redundancy-policy-based-routing.png" alt="sdwan line redundancy policy based routing" title="SD-WAN providing alternative redundant connectivity paths during critical line failures" /></p>
<p style="text-align: center;">SD-WAN providing alternative connectivity paths during critical line failures</p>
<p style="text-align: justify;">As a result, <strong>SD-WAN helps us align our WANs to our business priorities</strong>. We can provide <strong>every location</strong>, <strong>user</strong>, or <strong>resource</strong> with just the right available connectivity configured with the just the right amount of <strong>resiliency</strong>. <strong>Business-critical locations</strong>, such as a Data Center, can be connected by <strong>MPLS</strong> and <strong>two active</strong>, <strong>dual-homed connections</strong>. Small offices where MPLS may not be available can be connected with one line. Disaster response teams, and other ad-hoc groups, can use 4G/LTE.</p>
<p style="text-align: justify;">Yet despite the configuration, all sites continue to be managed by the same set of security policies and routing rules with the same orchestration engine and from the same management console. In short, we extract maximum value from the underlying WAN resource for <strong>optimum Return On Investment</strong> (<strong>ROI</strong>).</p>
<h2 style="text-align: left;"><a name="sd-wan-benefits">SD-WAN Benefits</a></h2>
<p>More specifically, SD-WAN brings benefits to the organization in terms of performance, cost savings, agility, and availability.</p>
<h3><a name="sd-wan-app-performance">SD-WAN Application Performance</a></h3>
<p style="text-align: justify;"><strong>Applications</strong> have very different networking requirements when it comes to the <strong>WAN</strong>. <strong>Voice</strong> is susceptible to <strong>jitter</strong> and <strong>packet loss</strong>; bulk data transfers require lots of bandwidth (throughput, actually). Internet routing doesn’t respect those differences. <strong>Route selection</strong> reflect <strong>economic realities</strong> between ISPs <strong>not application requirements</strong>. Internet providers will dump packets on peered networks or keep packets on their own network even though there are “better” routes available.</p>
<p style="text-align: justify;"><strong>SD-WAN</strong> lets organizations be <strong>smarter</strong> in how they <strong>route traffic</strong>. Policies describe the <strong>latency</strong>, <strong>loss</strong> and <strong>jitter tolerances</strong> of various applications. The <strong>SD-WAN routers</strong> <strong>monitor latency</strong>, and <strong>loss metrics</strong> of their connections. They then use that information and the preconfigured policies to select the <strong>optimum path for each application</strong>.</p>
<h3><a name="sd-wan-cost-savings-avoidance">SD-WAN Cost Savings and Avoidance</a></h3>
<p style="text-align: justify;"><strong>Software-Defined Networking</strong> (<strong>SDN</strong>) benefits may still need to be realized in the Data Centers, but they’re very apparent when SDN is applied to the WAN. The ROI of SD-WAN can be dramatic. Internet bandwidth can cost <strong>70 percent less than MPLS bandwidth</strong> depending on region and location.</p>
<p style="text-align: justify;"><strong>Operational costs are also reduced</strong>. Traditional WANs require advanced engineering and mastering of arcane protocols. SD-WANs do not completely eliminate for that experience by any means. But they do help maximize engineering resources by simplifying deployment and management of branch offices. <strong>Policy-driven configuration</strong> minimizes the amount of “configuration-drift” between branch offices, complicating WAN support. Adding new application services across the WAN without adversely existing services becomes much far easier. Availability requirements can be more readily met.</p>
<p style="text-align: justify;"><strong>SD-WAN architectures</strong> that include <strong>advanced security</strong> further improve savings. They <strong>eliminate security appliances</strong>, <strong>saving</strong> on the <strong>costs</strong> related to the <strong>upgrading</strong>, <strong>patching</strong>, and <strong>maintenance</strong> of those appliances.</p>
<h3><a name="sd-wan-availability">SD-WAN Availability</a></h3>
<p style="text-align: justify;">The availability of traditional WAN was more often than not determined by the uptime of the <strong>last mile</strong>. Within the core of the network, service provider have plenty of redundancy. It’s in the connection to the <strong>remote site</strong> where <strong>redundancy is more limited</strong>.</p>
<p style="text-align: justify;">Many locations will <strong>not have redundant connections</strong>. Even if there are redundant connection there’s <strong>no guarantee</strong> that the <strong>physical cabling</strong> is <strong>fully redundant</strong>. The different services may still share some common ducting and cabling, opening the way for a discontinuation of service due to a backhoe severing a line or some other physical plant failure. Running two active connections complicates network engineering. And in the event of a <strong>blackout</strong> on one connection, <strong>failover</strong> is <strong>rarely fast enough</strong> to <strong>sustain</strong> a <strong>session</strong> or <strong>voice call</strong>, for example.</p>
<p style="text-align: justify;"><strong>SD-WANs</strong> natively <strong>improve</strong> the <strong>availability of locations</strong>. Their use of <strong>active/active connections</strong> builds <strong>redundancy</strong> into the <strong>WAN</strong>. By mixing different types of WANs, such as <strong>4G/LTE</strong> and <strong>fiber</strong>, <strong>diverse routing</strong> becomes easier to <strong>guarantee</strong>. Should there be a blackout or a brownout, the SD-WAN router <strong>automatically</strong> <strong>switches traffic</strong> to the <strong>second connection</strong>. Depending on implementation, failover can be fast enough to sustain a session; <strong>users never realize there’s been a networking issue or link failure</strong>.</p>
<h3><a name="agility-deploy-new-sites">Agility: Deploying new Sites, Reconfiguring the WAN</a></h3>
<p style="text-align: justify;">SD-WAN allows organizations to respond faster to business conditions. This gets expressed in different ways. Businesses often need to start operations at remote sites quickly or, at least, without extensive delays. Enterprise IT is challenged with <strong>deploying networking services</strong> and <strong>configuring security</strong> at remote locations. SD-WAN addresses these problems on several fronts:</p>
<p style="text-align: justify;"><strong><span style="text-decoration: underline;">Deploying new sites</span></strong>: While <strong>provisioning MPLS circuits</strong> alone can take up to <strong>90 days</strong>, more for high-speed circuits, the Internet circuits used by SD-WAN can be deployed in days, less when considering <strong>4G/LTE</strong> connections. While <strong>MPLS</strong> often required on-site expertise to configure networking equipment, <strong>SD-WAN</strong> <strong>avoids</strong> those <strong>delays</strong> with <strong>zero-touch provisioning</strong>.</p>
<p style="text-align: justify;"><strong><span style="text-decoration: underline;">Reconfiguring the WAN</span></strong>: Traditional WAN architectures required the network service provider to change the network, which introduced further delays. If more bandwidth was required at a new location, the service provider had to re-provision the line all of which led to more delay. No wonder Gartner found enterprises to be “...<a href="https://blogs.gartner.com/andrew-lerner/2017/02/23/help-i-hate-my-traditional-network-carrier/" target="_blank" rel="nofollow noopener" title="Gartner Report on SD-WAN Providers">dissatisfied with large incumbent network service providers</a>.” <strong>SD-WAN</strong> puts the <strong>enterprises</strong> in <strong>control of network provisioning</strong>. The use of “fatter” Internet pipes means line provisioning is generally not required.</p>
<h2><a name="sd-wan-architecture">SD-WAN Architecture</a></h2>
<p style="text-align: justify;">There are <strong>two basic SD-WAN architectures</strong>, <strong>edge appliances</strong> and <strong>cloud-based SD-WAN</strong>. Both <strong>edge appliances</strong> and <strong>cloud-based SD-WAN</strong> involve a controller function for pushing out policies and distributing routing information and a management console for dashboard, reporting and policy configuration. Where they differ is in the location of the virtual overlay and how they provide advanced services.</p>
<h3><a name="sd-wan-architecture-edge-appliances">SD-WAN Architecture - Edge Appliances</a></h3>
<p style="text-align: justify;">With <strong>edge appliances</strong>, the SD-WAN virtual overlay stretches from location to location. <strong>Appliances</strong> are installed at each site and, once connected to the Internet, retrieve configuration profiles from the <strong>SD-WAN controller</strong>. The SD-WAN devices configure themselves and joining or construct a virtual overlay with other devices. Each device runs the <strong>policy-based routing algorithms</strong> needed to steer traffic to the most appropriate link based on application requirements and underlying link quality.</p>
<p style="text-align: justify;"><strong>Edge appliance architectures</strong> are very familiar to network engineers. It’s been the approach used for years by router vendors, WAN optimization vendors, and more. The approach brings certain known benefits namely:</p>
<ul>
<li style="text-align: justify;"><strong>Incremental WAN evolution </strong>— SD-WAN edge appliances integrate with existing enterprise networking and security infrastructure while making the WAN more agile.</li>
<li style="text-align: justify;"><strong>Transport independence</strong> — Edge appliance architectures give customers maximum freedom in choosing network service providers.</li>
</ul>
<p style="text-align: justify;">At the same time, <strong>edge appliance architectures</strong> introduce several constraints into the SD-WAN such as:</p>
<ul>
<li style="text-align: justify;"><strong>Limited ability to improve Internet performance</strong> — SD-WAN edge <strong>appliances cannot control</strong> the end-to-end routing across the Internet. As such, they remain <strong>dependent</strong> on MPLS to deliver latency- and loss-sensitive applications, particularly across global connections.</li>
<li style="text-align: justify;"><strong>Unable to evolve WAN functionality </strong>— The limited capacity of the SD-WAN edge appliance restricts the overlay's capabilities. Advanced security functions, such as decrypting traffic or running extensive rule sets, consume significant resources. Taking full advantage of these features forces an unexpected hardware upgrade. It's the same problem that had long limited the use of unified threat management (UTM) appliances.</li>
<li style="text-align: justify;"><strong>Overly site focused — Appliances</strong> are well suited for connecting locations, but they do not naturally extend to support cloud datacenters, SaaS applications, and mobile users. There’s no easy way to place an SD-WAN appliance in the cloud. Mobile users are rarely happy with the poor performance that results when having to connect back to an appliance that could be very far away, particularly when traveling.</li>
</ul>
<h3 style="text-align: left;"><a name="sd-wan-architecture-cloud-based-sd-wan">SD-WAN Architecture - Cloud-Based SD-WAN</a></h3>
<p style="text-align: justify;">With <strong>Cloud-based SD-WAN</strong>, the virtual overlay is formed between the points of presence (PoPs) of the <strong>Cloud SD-WAN</strong> service. The PoPs connect to each other across a privately managed backbone. There are appliances at each location, but in contrast to edge architecture, <strong>Cloud-based SD-WAN appliance</strong> run “just enough” functionality to send traffic to the nearest PoP. Software in the PoP applies the necessary security and network optimizations before forwarding the traffic along the optimum path to its destination.</p>
<p style="text-align: justify;"><strong>Cloud-based SD-WAN</strong> is a new approach to networking, but very familiar one to any IT person. It's the same approach used by <strong>AWS</strong>, <strong>Azure</strong> and countless other cloud providers. The architectural benefits include:</p>
<ul>
<li style="text-align: justify;"><strong>Thin edge flexibility </strong>— Since the edge appliance needs minimal functionality, the software can be implemented across a wider range of endpoints. Client software, for example, can connect mobile devices into the SD-WAN. The same is true for cloud applications and cloud datacenters.</li>
<li style="text-align: justify;"><strong>Enhanced functionality — </strong>By leveraging the resources of the cloud, cloud-based SD-WAN can deliver a broad range of advanced functionality without facing scaling constraints. Network throughput is also be improved by carrying traffic over a private, cloud backbone and not the public internet.</li>
</ul>
<p>At the same time, cloud-based SD-WAN architectures face several constraints including:</p>
<ul>
<li style="text-align: justify;"><strong>Education </strong>— Converging networking, security, and mobility into the cloud represents a radical transformation in networking. It may require some training for IT professionals to grasp the full implications of the evolution.</li>
<li style="text-align: justify;"><strong>Service Delivery</strong> — Cloud-based SD-WAN should be manageable by the customer to avoid the delays and per-task-pricing associated with managed service offerings from carriers and traditional network service providers.</li>
<li style="text-align: justify;"><strong>Geographic Footprint — </strong>The effectiveness of Cloud-based SD-WAN services rides on the reach of its network. Without a global network, a Cloud-based SD-WAN service cannot fix the Internet’s consistency, latency and packet loss problems, problems that are particularly prevalent between Internet regions.</li>
</ul>
<p><strong>Cloud-based SD-WAN</strong> is fundamentally different from two other similar sounding solutions (see table):</p>
<ul>
<li style="text-align: justify;"><em>Cloud-managed services</em> host the management/orchestration engine in the cloud. The SD-WAN fabric is still constructed from an edge appliance architecture.</li>
<li style="text-align: justify;"><em>Cloud-hosted services (also called “cloud-delivered”) </em>move some SD-WAN functionality to the cloud. In addition to running the management/orchestration engine in the cloud, some shared infrastructure among customers, such as gateways to cloud services, will run in the cloud. The SD-WAN fabric continues to be constructed edge-to-edge by edge appliances (and gateways).</li>
</ul>
<p style="text-align: justify;">By contrast, <strong><em>Cloud-based SD-WAN services</em></strong> move the management/orchestration engine, <span style="text-decoration: underline;">and</span> the <strong>SD-WAN fabric</strong> into the cloud. Edge appliances (or mobile client software) only implement the critical edge functions to connect to the SD-WAN fabric in the cloud. As such, the shared infrastructure includes not only the gateways on a cloud-hosted service but also full SD-WAN software and the middle-mile transport connecting the POPs.</p>
<center>
<table border="1" class="MsoTableMediumShading2Accent2" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext 2.25pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0cm 5.4pt 0cm 5.4pt; mso-border-insideh: 2.25pt solid windowtext; mso-border-insidev: 2.25pt solid windowtext;" cellspacing="0" cellpadding="0">
<tbody>
<tr style="mso-yfti-irow: -1; mso-yfti-firstrow: yes; mso-yfti-lastfirstrow: yes;">
<td colspan="4" style="border: 2.25pt solid windowtext; background: #0070c0 none repeat scroll 0% 0%; padding: 0cm 5.4pt;" align="center" valign="top"><span style="color: #ffffff; font-size: 14pt;"><strong>CLOUD SD-WAN SERVICES COMPARED</strong></span></td>
</tr>
<tr style="mso-yfti-irow: -1; mso-yfti-firstrow: yes; mso-yfti-lastfirstrow: yes;">
<td style="border: solid windowtext 2.25pt; background: #0070C0; padding: 0cm 5.4pt 0cm 5.4pt;" valign="top">
<p class="MsoBodyText" style="text-align: center; line-height: normal; mso-yfti-cnfc: 517;" align="center"><span style="color: #ffffff;"><strong>&nbsp;</strong></span></p>
</td>
<td style="border: solid windowtext 2.25pt; border-left: none; mso-border-left-alt: solid windowtext 2.25pt; background: #0070C0; padding: 0cm 5.4pt 0cm 5.4pt;" valign="top">
<p class="MsoBodyText" style="text-align: center; line-height: normal; mso-yfti-cnfc: 1;" align="center"><span style="color: #ffffff;"><strong>Location of Management /</strong></span></p>
<p class="MsoBodyText" style="text-align: center; line-height: normal; mso-yfti-cnfc: 1;" align="center"><span style="color: #ffffff;"><strong>Orchestration Engine<br /></strong></span></p>
</td>
<td style="border: solid windowtext 2.25pt; border-left: none; mso-border-left-alt: solid windowtext 2.25pt; background: #0070C0; padding: 0cm 5.4pt 0cm 5.4pt;" valign="top">
<p class="MsoBodyText" style="text-align: center; line-height: normal; mso-yfti-cnfc: 1;" align="center"><span style="color: #ffffff;"><strong>Location of Virtual Overlay<br /></strong></span></p>
</td>
<td style="border: solid windowtext 2.25pt; border-left: none; mso-border-left-alt: solid windowtext 2.25pt; background: #0070C0; padding: 0cm 5.4pt 0cm 5.4pt;" valign="top">
<p><span style="color: #ffffff;"><strong>Use of Shared</strong></span></p>
<p><span style="color: #ffffff;"><strong>Infrastructure</strong></span></p>
</td>
</tr>
<tr style="mso-yfti-irow: 0;">
<td style="border: solid windowtext 2.25pt; border-top: none; background: #548DD4; mso-background-themecolor: text2; mso-background-themetint: 153; padding: 0cm 5.4pt 0cm 5.4pt;" valign="top">
<p class="MsoBodyText" style="text-align: center; line-height: normal; mso-yfti-cnfc: 68;" align="center"><strong><span style="color: #ffffff;">Cloud-Managed Services<br /></span></strong></p>
</td>
<td style="border-top: none; border-left: none; border-bottom: solid windowtext 2.25pt; border-right: solid windowtext 2.25pt; mso-border-top-alt: solid windowtext 2.25pt; mso-border-left-alt: solid windowtext 2.25pt; background: #D8D8D8; mso-background-themecolor: background1; mso-background-themeshade: 216; padding: 0cm 5.4pt 0cm 5.4pt;" valign="top">
<p class="MsoBodyText" style="text-align: center; line-height: normal; mso-yfti-cnfc: 64;" align="center"><span style="color: #000000;">Cloud</span></p>
</td>
<td style="border-top: none; border-left: none; border-bottom: solid windowtext 2.25pt; border-right: solid windowtext 2.25pt; mso-border-top-alt: solid windowtext 2.25pt; mso-border-left-alt: solid windowtext 2.25pt; background: #D8D8D8; mso-background-themecolor: background1; mso-background-themeshade: 216; padding: 0cm 5.4pt 0cm 5.4pt;" valign="top">
<p class="MsoBodyText" style="text-align: center; line-height: normal; mso-yfti-cnfc: 64;" align="center"><span style="color: #000000;">Appliances</span></p>
</td>
<td style="border-top: none; border-left: none; border-bottom: solid windowtext 2.25pt; border-right: solid windowtext 2.25pt; mso-border-top-alt: solid windowtext 2.25pt; mso-border-left-alt: solid windowtext 2.25pt; background: #D8D8D8; mso-background-themecolor: background1; mso-background-themeshade: 216; padding: 0cm 5.4pt 0cm 5.4pt;" valign="top">
<p style="text-align: center;">&nbsp;None</p>
</td>
</tr>
<tr style="mso-yfti-irow: 1;">
<td style="border: solid windowtext 2.25pt; border-top: none; background: #548DD4; mso-background-themecolor: text2; mso-background-themetint: 153; padding: 0cm 5.4pt 0cm 5.4pt;" valign="top">
<p class="MsoBodyText" style="text-align: center; line-height: normal; mso-yfti-cnfc: 4;" align="center"><strong><span style="color: #ffffff;">Cloud-Hosted Services<br /></span></strong></p>
</td>
<td style="border-top: none; border-left: none; border-bottom: solid windowtext 2.25pt; border-right: solid windowtext 2.25pt; mso-border-top-alt: solid windowtext 2.25pt; mso-border-left-alt: solid windowtext 2.25pt; padding: 0cm 5.4pt 0cm 5.4pt;" valign="top">
<p class="MsoBodyText" style="text-align: center; line-height: normal;" align="center"><span style="color: #000000;">Cloud</span></p>
</td>
<td style="border-top: none; border-left: none; border-bottom: solid windowtext 2.25pt; border-right: solid windowtext 2.25pt; mso-border-top-alt: solid windowtext 2.25pt; mso-border-left-alt: solid windowtext 2.25pt; padding: 0cm 5.4pt 0cm 5.4pt;" valign="top">
<p class="MsoBodyText" style="text-align: center; line-height: normal;" align="center"><span style="color: #000000;">Appliances</span></p>
</td>
<td style="border-top: none; border-left: none; border-bottom: solid windowtext 2.25pt; border-right: solid windowtext 2.25pt; mso-border-top-alt: solid windowtext 2.25pt; mso-border-left-alt: solid windowtext 2.25pt; padding: 0cm 5.4pt 0cm 5.4pt;" valign="top">
<p style="text-align: center;">&nbsp;Partial</p>
</td>
</tr>
<tr style="mso-yfti-irow: 2;">
<td style="border: solid windowtext 2.25pt; border-top: none; background: #548DD4; mso-background-themecolor: text2; mso-background-themetint: 153; padding: 0cm 5.4pt 0cm 5.4pt;" valign="top">
<p class="MsoBodyText" style="text-align: center; line-height: normal; mso-yfti-cnfc: 68;" align="center"><strong><span style="color: #ffffff;">Cloud-based Services<br /></span></strong></p>
</td>
<td style="border-top: none; border-left: none; border-bottom: solid windowtext 2.25pt; border-right: solid windowtext 2.25pt; mso-border-top-alt: solid windowtext 2.25pt; mso-border-left-alt: solid windowtext 2.25pt; background: #D8D8D8; mso-background-themecolor: background1; mso-background-themeshade: 216; padding: 0cm 5.4pt 0cm 5.4pt;" valign="top">
<p class="MsoBodyText" style="text-align: center; line-height: normal; mso-yfti-cnfc: 64;" align="center"><span style="color: #000000;">Cloud</span></p>
</td>
<td style="border-top: none; border-left: none; border-bottom: solid windowtext 2.25pt; border-right: solid windowtext 2.25pt; mso-border-top-alt: solid windowtext 2.25pt; mso-border-left-alt: solid windowtext 2.25pt; background: #D8D8D8; mso-background-themecolor: background1; mso-background-themeshade: 216; padding: 0cm 5.4pt 0cm 5.4pt;" valign="top">
<p class="MsoBodyText" style="text-align: center; line-height: normal; mso-yfti-cnfc: 64;" align="center"><span style="color: #000000;">Cloud</span></p>
</td>
<td style="border-top: none; border-left: none; border-bottom: solid windowtext 2.25pt; border-right: solid windowtext 2.25pt; mso-border-top-alt: solid windowtext 2.25pt; mso-border-left-alt: solid windowtext 2.25pt; background: #D8D8D8; mso-background-themecolor: background1; mso-background-themeshade: 216; padding: 0cm 5.4pt 0cm 5.4pt;" valign="top">
<p style="text-align: center;">&nbsp;Full</p>
</td>
</tr>
</tbody>
</table>
</center>
<h2 style="text-align: left;"><a name="sd-wan-deployment-methods">SD-WAN Deployment Methods</a></h2>
<p style="text-align: justify;">As we’ve seen, organizations can deploy SD-WANs themselves using SD-WAN edge appliances, in what’s sometimes referred to as “Do It Yourself” (DIY) deployments, and cloud-based SD-WANs</p>
<p style="text-align: justify;">In addition to the <strong>two primary SD-WAN architectures</strong>, service providers offer managed SD-WAN services. As with any managed IT services, managed SD-WAN services repackage vendor’s SD-WAN technology (typically an SD-WAN edge appliance, but not necessarily), with the service providers implementation expertise.</p>
<p style="text-align: justify;">With managed SD-WAN services, organizations rely on the service provider to maintain and run the SD-WAN. As such, there are several service-specific features to consider including:</p>
<p style="text-align: justify;"><strong>Service Level Agreements (SLAs) governing all aspects of the service. </strong>SLAs should include a detailed description, specify the time needed to make any moves, adds, or changes (MACs) to the SD-WAN. Penalties should be specified as well.</p>
<p style="text-align: justify;"><strong>Service and Support - </strong>A detailed description of support levels should be provided including escalation procedures and any agreements around time to repair.</p>
<p style="text-align: justify;"><strong>Delivery Timeline - </strong>A clear project and delivery timeline should be specified with the SD-WAN roll out.</p>
<h2 style="text-align: left;"><a name="sd-wan-must-have-features">SD-WAN Must-Have Features</a></h2>
<p style="text-align: justify;">There are many features to consider when selecting an SD-WAN edge appliance or cloud-based SD-WAN architecture. The following are the <em>minimum </em>criteria for an SD-WAN:</p>
<p style="text-align: justify;"><strong>Endpoints </strong>— The SD-WAN solution must connect locations to the SD-WAN with a hardware appliance or software, such as a virtual appliance or a VNF. The SD-WAN solution should also connect other types of resources, namely cloud datacenters (IaaS), cloud applications (SaaS), and mobile users.</p>
<p style="text-align: justify;"><strong>Encrypted overlay</strong> —-The SD-WAN must establish a secure, virtual overlay across network services. All traffic across that overlay must be encrypted. The overlay must be policy-driven.</p>
<p style="text-align: justify;"><strong>Data service independence</strong> —- The SD-WAN must connect locations with major types of Internet data services, such as fiber, xDSL, cable, and 4G/LTE, and MPLS, for hybrid deployments.</p>
<p style="text-align: justify;"><strong>Application policies </strong>— The SD-WAN must provide configurable policies describing application characteristics, such as failover options and the minimum and maximum thresholds for latency, loss, and jitter.</p>
<p style="text-align: justify;"><strong>Real-time line monitoring </strong>— The SD-WAN appliances must able to gather real-time latency and packet loss statistics of the attached lines.</p>
<p style="text-align: justify;"><strong>Policy-based routing</strong> — The SD-WAN must implement algorithms that can select the optimum route for a given application based on configured application policies and real-time line statistics.</p>
<h2 style="text-align: left;"><a name="sd-wan-security-vpn-features">Recommended SD-WAN Security &amp; VPN Features</a></h2>
<p style="text-align: justify;">While it’s not a definitional requirement, the SD-WAN solution should include <strong>advanced security services</strong>. All SD-WAN providers claim to deliver a “secure SD-WAN” but that only refers to traffic protection. Organizations still need to protect against data exfiltration, malware infection, and other advanced security threats, which requires advanced security technologies such as N<strong>ext-Generation Firewall</strong> (<strong>NGFW</strong>), <strong>Secure Web Gateway</strong> (<strong>SWG</strong>), and <strong>advanced threat protection</strong>.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/sd-wan/internet-attacks-to-wan-infrastructure.png" alt="internet attacks to wan infrastructure" title="internet attacks to wan infrastructure" /></p>
<p style="text-align: center;">Companies are forced to deal with internet &amp; malware attacks to their infrastructure</p>
<p style="text-align: justify;">Ideally, the SD-WAN will be converged with the advanced security services. With security and networking converged together, deployment becomes much simpler, capital costs drop, and operationally, the SD-WAN and security infrastructure are easier to maintain than with separate security and networking devices. But if converged security is not possible, at the very least the SD-WAN provider should offer service chaining/insertion to integrate with external third-party security services.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/sd-wan/sdwan-provider-blocks-internet-attacks.png" alt="sd-wan provider blocks internet attacks" title="SD-WAN provider CATONetworks block all malicious traffic/attacks at the Cloud level" /></p>
<p style="text-align: center;">SD-WAN providers block all malicious traffic/attacks at the Cloud level</p>
<p style="text-align: justify;">Deployment costs will be higher and operations more complex than with a converged SD-WAN, but that’s necessary. Much of performance and cost benefits of an SD-WAN come from <strong>replacing MPLS access</strong> with <strong>direct Internet access</strong> at the <strong>branch office</strong>. By exiting <strong>Internet traffic locally</strong>, the SD-WAN avoids the backhaul and <strong>performance problems</strong> of traditional WAN configurations. Without advanced security at the branch office, users can’t take advantage of local Internet and remain immune to the range of Internet-borne threats.</p>
<p style="text-align: justify;">Specific <strong>advanced security features</strong> to consider from an <strong>SD-WAN provider</strong> include:</p>
<h3><a name="sd-wan-ngfw">Next-Generation Firewall (NGFW)</a></h3>
<p>The NGFW should offer:</p>
<ul>
<li style="text-align: justify;"><span style="text-decoration: underline;">High performance and elasticity</span> — Inspect <em>all </em>application traffic, regardless of volume or use of encryption, without forced capacity upgrades.</li>
<li style="text-align: justify;"><span style="text-decoration: underline;">Application awareness</span> — Identify access to on-premise or cloud applications regardless of the port or protocol being used, or if the application is SSL encrypted.</li>
<li style="text-align: justify;"><span style="text-decoration: underline;">User awareness</span> — Identify users, groups, and locations regardless of IP address</li>
<li style="text-align: justify;"><span style="text-decoration: underline;">Unified, granular security policy</span> — Control access to applications, servers and network resources</li>
</ul>
<h3 style="text-align: left;"><a name="secure-web-gateway">Secure Web Gateway (SWG)</a></h3>
<p>The SWG should offer:</p>
<ul>
<li style="text-align: justify;"><span style="text-decoration: underline;">Dynamic site classification</span> — The SWG capabilities should Include a URL database with many site category classifications including phishing, malware delivery, botnets and other malicious sites.</li>
<li style="text-align: justify;"><span style="text-decoration: underline;">Block, prompt or track user access</span> — The Reduce legal or security exposure from risky web usage</li>
<li style="text-align: justify;"><span style="text-decoration: underline;">Web access policy enforcement</span> — Restrict website access in accordance with a corporate policy</li>
</ul>
<h3 style="text-align: left;"><a name="adv-threat-prevention">Advanced Threat Prevention</a></h3>
<p style="text-align: justify;">The advanced threat protection capabilities should include:</p>
<ul style="text-align: justify;">
<li><span style="text-decoration: underline;">Anti-malware</span> — Scan HTTP <span style="text-decoration: underline;">and</span> HTTPS traffic for malicious files and stop endpoint infections.</li>
<li><span style="text-decoration: underline;">IPS / IDS</span> — Applies context-aware protection to traffic based on domain / IP reputation, geolocation, known vulnerabilities, DNS, as well as application- and user-awareness.</li>
</ul>
<p style="text-align: justify;"><strong>SD-WAN</strong> offers <strong>three options</strong> for delivering <strong>advanced security functions</strong> at the <strong>branch</strong> - <strong>local security appliances</strong>, v<strong>irtual network function</strong>, or <strong>firewall as a service (FWaaS)</strong>:</p>
<h3 style="text-align: left;"><a name="local-security-appliances">Local Security Appliances</a></h3>
<p style="text-align: justify;"><strong>Local Security Appliances </strong>such as firewall or UTM appliances, are the typical way companies protect branches. Appliances notorious for introducing operational complexity and increasing costs. There’s significant overhead incurred from configuring, patching and maintaining security appliances at each location. And, as mentioned above, using advanced security functions (or continuing to operate effectively when traffic levels spike), requires the use of significant hardware resources from the appliance. Often security professionals end up choosing between disabling advanced features, compromising organizational security, or being forced into a hardware upgrade.</p>
<h3 style="text-align: left;"><a name="virtual-network-function">Virtual Network Function (VNF)</a></h3>
<p style="text-align: justify;"><strong>VNF </strong>is a virtual network security stack deployed into a physical SD-WAN appliance or third-party applianced called a vCPE. As such, VNFs reduce the physical challenges of running separate physical boxes at the branch office — the HVAC issue, calculating power, and the rest of the wiring closet issues. However, VNFs are still discrete entities, requiring management of their software and upgrades, and facing the same scaling issues as any local security appliance.</p>
<h3 style="text-align: left;"><a name="firewall-as-a-service">Firewall as a Service (FWaaS)</a></h3>
<p style="text-align: justify;"><strong>Firewall as a Service (FWaaS) </strong>faces none of the scaling and maintenance challenges of local security appliance or VNFs. The infrastructure was built from the ground up as a cloud service, eliminating the management challenges and scaling issues of security appliances. They do require the service provider to offer a fully multitenant, easy-to-use, and powerful security engine that can be run fully by the customer.</p>
<h2 style="text-align: left;"><a name="recommended-sd-wan-mobiity-features">Recommended SD-WAN Mobility Features</a></h2>
<p style="text-align: justify;">The SD-WAN was classically seen as a replacement to the WAN and, as such, did not focus on connecting mobility. But with data and applications shifting to the cloud, <strong>any SD-WAN</strong> should <strong>connect mobile</strong> and <strong>stationary users</strong> to those resources.</p>
<p style="text-align: justify;">To do so, the SD-WAN should equip mobile users with <strong>client software</strong> for <strong>securely connecting into the SD-WAN</strong>. Once connected to the SD-WAN, the mobile user should be supported with the <strong>same optimized routing</strong>, <strong>security policies</strong> and <strong>management controls</strong> as users located within the office. Specific features should include:</p>
<p style="text-align: justify;"><strong>Automatic optimum path selection — </strong>The SD-WAN mobile client should should dynamically select the optimum path to the closest SD-WAN node (closest PoP).</p>
<p style="text-align: justify;"><strong>Access control — </strong>Once connected to the SD-WAN, fine-grained access controls should restrict mobile user access by application, active directory groups or specific user identity. Organizations should be able to determine the precise resources that can be seen and accessed by the mobile user.</p>
<p style="text-align: justify;"><strong>Advanced security — </strong>Mobile users should be fully protected by any advanced security services provided by the SD-WAN, such as NGFW, IPS, and SWG.</p>
<h2 style="text-align: left;"><a name="recommended-sd-wan-management-features">Recommended SD-WAN Management Features</a></h2>
<p style="text-align: justify;">The management and administration console is the view into the SD-WAN. As such, usability and design are obviously critical.</p>
<p style="text-align: justify;">In the example below, the CATO Networks SD-WAN management interface provides an intuitive interface from where we can monitor, configure policies and manage the entire WAN network without worrying about service providers, VPNs or network equipment!</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/sd-wan/sdwan-management-console.png" alt="sd-wan management console" title="SD-WAN Management Console" /></p>
<p style="text-align: center;">Managing a global 27 multi-location SD-WAN Network via CATO Networks</p>
<p>&nbsp;</p>
<p style="text-align: justify;">Other features to investigate for a future SD-WAN include:</p>
<p style="text-align: justify;"><strong>SD-WAN configuration — </strong>The SD-WAN should allow for rapid site addition/removal; LDAP integration for quick addition of existing users into the SD-WAN; brief, well-documented integration process or automatic tools for cloud resource integration.</p>
<p style="text-align: justify;"><strong>Converged configuration and reporting — </strong>Networking and security (if offered) should be tightly integrated together. A single, centralized view of all network and security events should be provided. Access-control definitions, security policies, networking policy configuration — all should be converged together. Reporting should be per site, VPN, and application.</p>
<p style="text-align: justify;"><strong>Complete real-time visibility — </strong>The management console should provide complete visibility in realt-time into the core functioning of the SD-WAN, including the topology, connected devices, network usage statistics, as well as advanced security services.</p>
<p style="text-align: justify;"><strong>Detailed usage metrics — </strong>Visibility into network usage should be granular, allowing IT professionals drill down into usage by VPN, location, device, user, and application. Monitoring and alerting should be provided on all networking and security events with full audit trail of all changes to system configuration and policies.</p>
<p style="text-align: justify;"><strong>Application policy definition — </strong>The SD-WAN should allow for the creation of application policies including the specifying of the application’s importance (priority) and any relevant failover parameters.</p>
<p style="text-align: justify;"><strong>Analytics engine and integration — </strong>An analytics engine should be provided by the product or easily integrated into the product.</p>
<p style="text-align: justify;"><strong>Management protocols and APIs </strong>— The SD-WAN vendor should specify all northbound APIs for event correlation and user applications, and management protocols (e.g, SNMP, HTTP, XML) available for in-house integration.</p>
<h2 style="text-align: left;"><a name="summary">Summary</a></h2>
<p style="text-align: justify;">This article explained what SD-WANs are and how <strong>enterprises</strong> and <strong>organizations</strong> of <strong>every size</strong> are moving towards these <strong>WAN solutions</strong>. We analyzed the <strong>problems</strong> with <strong>traditional WANs</strong>, saw the <strong>benefits of SD-WANs</strong>, <strong>SD-WAN architecture design</strong> and implementations, talked about <strong>SD-WAN deployment methods</strong> and touched heavily on <strong>SD-WAN Security</strong>, <strong>VPN</strong>, <strong>Advanced Threat Prevention</strong>, <strong>Firewall services</strong>, <strong>Mobility</strong> and <strong>Management</strong> offered by <strong>leading SD-WAN providers</strong>.</p>]]></description>
			<category>SASE &amp; SD-WAN Networks</category>
			<pubDate>Fri, 27 Oct 2017 20:33:24 +1100</pubDate>
		</item>
	</channel>
</rss>
