Netify have released our 2024 SD-WAN comparison blog article

12 SD-WAN Architecture Points for IT Decision Makers

12 SD-WAN Architecture Points for IT Decision Makers

How our Compare the Market Quiz can help you find the best fit SD-WAN Vendors

  • Answer 10 questions to find out which SD-WAN solution fits your business
  • Learn why each solution is a match for your business
  • Used by companies including CDC, Permira, Square Enix, British Legion and more
  • Totally free to use without commitment

Compare the SD-WAN Market

Netify.com content has been written and fact checked by one of our SD-WAN or SASE Security writers. Netify.com only uses AI tools for researching content, analysing data and creating tables. We never publish any AI written content without human intervention. By reading Netify content, you can be assured the data points provided are accurate.

In 2024, we're all aware that SD-WAN has transformed WAN architecture. SD-WAN vendors are now viewed as a necessity for any organisation requiring secure public Cloud access  across any combination of transport services, including leased lines, 4G/5G LTE, and broadband Internet connections. By decoupling the network hardware from the control mechanism, SD-WAN is capable of improving productivity and reducing costs compared to legacy WAN solutions.

The architecture of SD-WAN is designed to simplify management, and drive digital transformation initiatives by optimising application performance and enhancing user experience across SaaS and public cloud services. Although SD-WAN is often researched in isolation, the technology is actually a component of  Service Edge (SASE) architecture. SASE combines network security functions with SD-WAN capabilities to support networking and security requirements across most Enterprise businesses.

In short, SD-WAN architecture serves as an enabler for enterprise agility, cost reduction, and improved cloud application performance.

1. Centralised Cloud Management

The adoption of a centralised cloud management approach signified the biggest evolution across SD-WAN managed services. IT teams no longer had to wait days for simple change requests to be actioned by service providers, moves or changes are now performed in real-time.

With SD-WAN, centralised cloud management is typically delivered via a unified control interface, enabling administrators to understand network performance and trends, patch hardware as required, view security threats and make changes on a real-time basis.

Centralised management functions via a dedicated controller, which standardises network configurations and policies across branch-office locations and remote users. This approach ensures that changes in network behaviour or adjustments to policy are deployed across all users and locations instantaneously.

The primary benefits include:

Feature Description
Simplified Administrative Procedures Centralised management removes the need for manual configuration at each branch, resulting in reduced operational complexity and the potential for human error.
Enhanced Application Performance Real-time traffic steering, enabled by centralised management, optimises application delivery and ensures consistent performance even in diverse network conditions.
Augmented Network Security Centralised cloud management can implement uniform security protocols quickly, improving the overall posture against cyber threats.
Orchestration of WAN Edge Devices Centralised controllers can orchestrate edge devices to cater to dynamic traffic demands and cloud resource access, leading to optimisations in network agility and application accessibility.

The above strategic benefits are fundamental to businesses looking to harness the agility of cloud resources while maintaining control over their network infrastructure. The capability added by centralised SD-WAN management systems ensurer networks remain resilient and responsive to rapidly evolving requirements.Centralised Cloud Management Mind Map

2. SD-WAN Underlay and Overlay

SD-WAN Underlay is the IP network reachability across branch-office and remote user locations, i.e. the connectivity. SD-WAN architecture is capable of supporting multiple WAN transport methods such as 4G, 5G, LTE, Broadband (Fibre to the Premises or FTTP), and leased lines. The underlay layer is vital as it forms the foundation upon which the SD-WAN architecture is structured.

In contrast, SD-WAN overlay refers to the SD-WAN network intelligence that is deployed and managed across the underlay network. The underlay is characterised by IPsec tunnels that connect sites together, enabling the encryption and delivery of data packets over the underlay infrastructure. This abstraction is key to understand - it demonstrates how SD-WAN architecture orchestrates a more efficient network through dynamic path selection that optimally routes traffic and services.

Aspect Underlay Overlay
Technology Routers, switches and other physical devices Virtual IPsec tunnels forming the SD-WAN Fabric
Function Provides the basic infrastructure and IP reachability Manages routing and optimises traffic across the underlay
Connectivity 4G, 5G, LTE, Broadband (FTTP), leased lines, etc. IP connections routed over the physical infrastructure
Relevance Foundational layer for SD-WAN Enables SD-WAN capabilities and dynamic, efficient routing

The routing within the overlay enhances network performance and reliability through capability to solve the constraints presented by traditional WAN architectures. The overlay's ability to optimise transport for services extends to varying forms of internet connections, and MPLS, VPLS or private circuits.SD-WAN Underlay and Overlay Mind Map

3. SD-WAN Edge

The SD-WAN Edge defines the devices placed at the periphery of a network to handle the ingress and egress of traffic between the LAN and WAN.

Functionality
SD-WAN Edge Control The SD-WAN edge enables secure and intelligent pathway control, which supports application performance and rapid provisioning.
Dynamic Routing The SD-WAN Edge utilises dynamic routing protocols to select the optimal path, considering current network conditions to maintain performance and reduce latency.
Provisioning Options The SD-WAN Edge can be provisioned as either a physical appliance or virtual instance.
Key Components
Routing Directs data across the network, choosing the best path based on the current conditions.
Security Protects data integrity and confidentiality across the network.
Application-aware Policies Allows the network to make decisions based on the type of application traffic.
WAN Optimisation Improves data transfer efficiencies across wide area networks.

The MEF Forum has outlined the SD-WAN Edge's role in ensuring that consumer-grade broadband and other transport mechanisms provide service quality similar to that of a private circuit. In short, the MEF modular framework promotes performance even in the presence of multiple underlying transport links, such as MPLS, 4G/5G cellular, or broadband services.

Below is the typical WAN-Edge functions:

Function Description
Traffic Shaping Prioritises critical applications and manages bandwidth.
Security Integrates features - i.e. firewall and threat prevention.
Path Selection Dynamically selects the best path for each application flow.
Zero-Touch Provisioning Streamlines device deployment with minimal manual intervention.

SD-WAN Edge Mind Map

4. SD-WAN Orchestrator

The Orchestrator plays a role in the management of SD-WAN, serving as a virtualised manager that oversees network traffic and the enforcement of policy and protocols determined by network administrators. The controller is used to enable centralised control over the network's configuration and real-time monitoring.

Core Functions:

Aspect Description
Centralised Management The orchestrator serves as the central point for configuring network devices and services, reducing the complexity involved in managing an extensive network.
Real-time Monitoring It continuously monitors the network, allowing for prompt responses to changing conditions.
Data Flow Orchestration Traffic is directed optimally across the network, balancing loads and prioritising applications as necessary.
Security Maintenance Enforces security policies throughout the network, ensuring data protection and compliance with regulatory standards.

The orchestrator works in collaboration with the SD-WAN Controller by enabling dynamic handling of network traffic. The dynamic management adjusts bandwidth demands and application requirements to ensure that user applications are perming across latency and jitter.

In SD-WAN deployments, the orchestrator analyses the priority level of applications, directing traffic effectively to maintain service levels and optimise the user experience. This includes routing decisions that can be made based on application, network congestion, or other custom-defined policies.

For a detailed description of how the SD-WAN Orchestrator facilitates enterprise-wide network management, you may wish to read the VMware SD-WAN Orchestrator guide.SD-WAN Orchestrator Mind Map

5. SD-WAN Controller

The SD-WAN Controller serves as the central management hub SD-WAN architecture, providing networking functions that underscore deployment speed and network performance. The controller operates by offering administrators a single software interface to manage and 'control' operation of the network.

In particular, one of the main roles of the SD-WAN Controller is to orchestrate network traffic to learn about real-time network conditions and to direct traffic accordingly. Listed below are key functions of the SD-WAN Controller:

Aspect Description
Centralised Management Simplifying the complexity of managing large-scale networks by allowing a singular point of control.
Policy Administration Enabling operators to define and manage network policies that align with business priorities.
Performance Monitoring Collecting and analysing network performance data to facilitate informed decision-making.
Dynamic Routing Adjusting traffic paths in response to network status and link performance to uphold service levels.

The controller's ability to execute policies and prioritise traffic is not just reactive but also predictive, taking into account various application requirements and network conditions. For enterprises, this capability translates into enhanced application performance and a more efficient utilisation of network resources.

The SD-WAN Controller integrates security protocols within the network. Good implementation ensures that not only is the network performance optimised, but the security posture is also implemented across all SASE elements.

The Cisco Catalyst SD-WAN Solution Overview highlights the process of ongoing network management. This level of automation and centralisation is part of modern enterprises that rely on flexible network infrastructures.SD-WAN Controller Mind Map

6. Virtual or Physical Nodes

SD-WAN architecture is typically designed with either virtual or physical components classified as edge devices (see point 3).

The following table details the types of virtual or physical CPE which is used with SD-WAN:

Type Description
Physical SD-WAN Appliances They are on-premises hardware units responsible for routing traffic between different network endpoints. The known advantage of dedicated hardware is that they are often built for network functions, potentially providing better performance and reliability for certain applications. (Fortinet is a good example)
Virtual SD-WAN Appliances Software instances that can be deployed on commodity hardware or within cloud infrastructure. They represent the virtualisation of SD-WAN functions and contribute significantly to network flexibility and scalability. Virtual appliances allow organisations to integrate and manage networking functions without the constraints of physical hardware, permitting rapid deployment across various locations.

Both virtual and physical SD-WAN nodes are responsible for the network overlay, essentially creating a managed network layer independent of the underlying transport links. They enforce defined policies to route traffic intelligently across the WAN, utilising broadband Internet, LTE/5G, or MPLS to establish high-performance connections for applications.

Virtual SD-WAN nodes offer Virtual Network Functions (VNFs), including security services and load balancing, which enable connections to emulate the quality of dedicated circuits. By deploying virtualised services, businesses can achieve operational efficiency compared to dedicated edge hardware with cost reductions.

In summary, the choice between virtual and physical SD-WAN nodes hinges on organisational requirements for performance, cost, scalability, and management. The ongoing evolution of network technology continues to shift the balance in favour of virtual solutions, characterised by adaptability and lower total cost of ownership.Virtual or Physical Nodes Mind Map

7. Cloud Vendor Integration

SD-WAN's integration with cloud vendors is now one of the most research subjects when IT decision makers compare vendors and service providers.

Cloud Vendor Integration and Features Key Benefits Source
Microsoft Azure Azure SD-WAN connects branch sites to Azure via tunnels, allowing access to Azure workloads and automated interconnection with on-premises SD-WAN and SASE technologies. Integration with Cisco and Fortinet offers extended fabric and security. Seamless interconnection, global transit between branches and Azure, optimised branch connectivity, and security. Microsoft Docs, Azure, Cisco, Fortinet
Amazon Web Services (AWS) Integration with Cisco SD-WAN complements AWS Transit Gateway, aiming to optimise WAN connectivity. It focuses on application optimisation, security, and cloud integration. Secure and resilient cloud access, enhanced application performance, and efficient path selection for network traffic. AWS, Cisco
Google Cloud Integration with Cisco and Fortinet SD-WAN facilitates automated connectivity and on-demand provisioning, ensuring high-performance site-to-site and site-to-cloud connections. Simplified management, automated provisioning, high reliability, and performance leveraging Google’s global cloud infrastructure. Cisco, Fortinet

SD-WAN optimised traffic through cloud path selection, enabling real-time network condition assessments. This dynamic selection process ensures optimal routes depending on network conditions or connection type.

The examination of these architectures is crucial in understanding how SD-WAN solutions are deployed and managed in a cloud-centric enterprise environment. Each vendor's approach provides insights into their capabilities and outlines the strategic importance of cloud integrations. Spanning from advanced optimisation features to multi-layered security protocols, these integrations are now integral to any SD-WAN solution.Cloud Vendor Integration Mind Map

8. Public and Private Gateways

Public SD-WAN Gateways:

Public SD-WAN gateways are provisioned on a global basis at specific PoP (Point of Presence) locations. The gateways are provisioned with multiple ISP connections to ensure resilience and diversity together with improving application performance.

Technical Characteristics:

  • Multi-Tenancy: Supports multiple customers on shared infrastructure, with logical separation of traffic and robust tenant isolation mechanisms.
  • Path Selection and Optimisation: Employs algorithms, which include Dynamic Multipath Optimisation (DMPO) to steer traffic based on real-time link conditions, latency, jitter, and loss.
  • Cloud Integration: Native integration with IaaS and SaaS platforms, often using API-driven automation for configuration and management.
  • Encryption and Security: Typically utilises IPsec tunnels for data protection, coupled with advanced end-to-end encryption standards.

Vendor Example - VeloCloud (VMware): VeloCloud's public gateways use a multi-tenant architecture, providing cost-effective and scalable SD-WAN headend services. VeloCloud DMPO (Dynamic Multipath Optimisation)  offers real-time traffic steering across multiple links and with cloud-based orchestration for centralised management. VeloCloud’s gateways also include built-in security features like stateful firewall, intrusion detection, and web filtering.

Private SD-WAN Gateways:

Private SD-WAN gateways offer an alternative to public gateways by offering MPLS and VPLS connectivity between core PoP locations.

Technical Characteristics:

  • Dedicated Resources: Ensures predictable performance and capacity, free from 'noisy neighbor' issues common in shared environments.
  • Customisable Security Posture: Allows for bespoke security configurations, including advanced firewall policies, custom IPS signatures, and dedicated VPN instances.
  • Network Performance: Often integrated with WAN optimisation techniques such as deduplication, compression, and protocol optimization for enhanced application performance.
  • Private Connectivity: Direct peering with ISPs and private links, avoiding the public internet for sensitive traffic.

Vendor Example - Cato Networks: Cato provides a global private backbone, connecting Cato Sockets (edge SD-WAN devices) to Cato Cloud, a cloud-native platform merging network security with global connectivity. The architecture supports Zero-Touch Provisioning (ZTP) for rapid deployment and integrates a suite of security services, including next-generation firewall, IPS, and anti-malware, delivered as-a-service.

Aryaka: Aryaka’s SD-WAN solution includes a private core network with PoPs strategically placed worldwide. This setup minimises latency and optimises application performance, especially over long distances. Aryaka’s solution is also notable for their integrated WAN optimisation capabilities and the ability to provide end-to-end managed services.Public and Private Gateways Mind Map

9. Hybrid WAN

Hybrid WAN in SD-WAN architecture combines MPLS, VPLS, point-to-point circuits, and Internet VPNs. Integrated with SD-WAN, taking a Hybrid approach benefits from dynamic path optimisation and packet steering for real-time traffic routing across the best performing circuit. The optimisation feature of SD-WAN is needed to maintain performance when network conditions are impacted by packet loss or high latency.

Managing complex hybrid networks is simplified with SD-WAN, which keeps networks at optimal levels without the need to specify circuit preference. However, where needed, Policy-based control in hybrid SD-WANs allows users to set rules for path selection and network behaviours to force specific application to prefer one of the hybrid WAN circuits.

Hybrid WAN Component Role in SD-WAN Enhancement
MPLS Provides reliable, high-performance connectivity for critical applications
Broadband Adds cost-effective bandwidth and redundancy
LTE/5G Delivers rapid deployment capabilities and additional bandwidth
IPsec Ensures secure connectivity over public internet links

Hybrid WAN Mind Map10. Managed Services

While managed services are not generally viewed as a component of the actual SD-WAN architecture, the choice of vendor or provider can impact feature capability and therefore your users.

When selecting a managed service provider (MSP) for SD-WAN, several critical considerations must be evaluated:

  1. Security: The MSP should provide security monitoring to protect against cyber threats.
  2. Support: Continuous support and proactive monitoring are essential for maintaining network integrity.
  3. Service-Level Agreements (SLAs): Clear SLAs guarantee uptime, performance, and issue resolution timelines.
  4. Network Expansion Plans: The provider must be capable of accommodating future network growth and technological advancements.

Potential clients must ask questions to ascertain the alignment of managed services with organisational requirements:

  • How does the MSP manage connectivity for Software as a Service (SaaS) and cloud infrastructures?
  • What measures are in place to ensure the reliability of their managed SD-WAN service?
  • Can they offer on-demand bandwidth to address fluctuating network demands?

Additional perspectives can be explored through Netify's discussion on the purposes and advantages of SD-WAN as a managed service.Managed Services Mind Map

11. SASE Security in SD-WAN Architecture

SASE (Secure Access Service Edge) represents a more comprehensive framework that converges SD-WAN with advanced security features. SASE securely connects users, endpoints, and services regardless of their location. SASE solutions typically include a Zero Trust Network Access (ZTNA) model, which replaces the traditional "trust but verify" approach with "never trust, always verify."

SASE Component Functionality
ZTNA Grants secure access based on user and device identity.
MDR Identifies and manages threats in real-time.
XDR Provides comprehensive threat detection and response across networks.
CASB Secures SaaS applications and cloud platforms.
SWG Ensures safe internet access and data compliance.
NGFW Offers advanced, granular network security.

In the context of SD-WAN architecture, the integration of SASE offers several advantages. SASE combines the strengths of SD-WAN, such as flexible, software-driven traffic management, with SASE's multi-layered security. These features range from next-generation firewall (NGFW) features, secure local internet breakout, and advanced threat protection.

The move to cloud services and remote workforce models has created the need for SASE, driven by a shift towards a security model that allows organisations to support a dynamic, distributed workforce. The ability for zero-touch provisioning in SD-WAN minimises manual configurations for rapid deployment of networking and security measures across branches.

VPN connections once served as the backbone of secure remote access. But, within a SASE-enabled SD-WAN architecture, their role is more nuanced. Integrated within a comprehensive SASE framework, VPNs become part of a broader, more flexible approach to secure access.

Incorporating SASE into SD-WAN architecture is key for enterprises to achieve secure and efficient networking.SASE Security in SD-WAN Architecture Mind Map

12. SD-WAN Architecture and AI

Artificial Intelligence (AI) and SD-WAN marks a transition in network management. By integrating AI, network operations are augmented with intelligent traffic management, which enables real-time access control and centralised management that is both efficient and highly capable of adapting to network demands.

Key Components of AI-Enhanced SD-WAN:

  • AI: At the core of an AI-driven SD-WAN is the capability for machine learning algorithms to conduct predictive analytics, leading to informed decisions that enhance network performance.
  • Automation: By harnessing AI, SD-WAN achieves a level of automation that offers rapid network configuration, reduces manual intervention, and accelerates troubleshooting.
  • Network Management: AI enhances SD-WAN with sophisticated network management tools, allowing for centralised control and real-time adjustments to maintain optimal performance.

Optimisation with Machine Learning:

  • Intelligent Traffic Management: ML algorithms analyse data traffic patterns to predict and mitigate network congestion before it occurs.
  • Centralised Management: A centralised AI-powered dashboard provides visibility and control over the entire network, streamlining operations.
  • Troubleshooting: AI-driven systems proactively detect anomalies and automate corrective actions to minimise downtime.

The integration of AI with SD-WAN extends to Internet of Things (IoT), where the vast number of devices require intelligent network solutions. Through the application of AI and machine learning, SD-WAN architectures can securely and efficiently manage IoT device connectivity.

Through advanced machine learning techniques and intelligent traffic management, AI-enhanced SD-WAN offers capabilities in network operation, troubleshooting, IoT integration, real-time access control and centralised management.SD-WAN Architecture and AI Mind Map

What are the components of SD-WAN architecture?

Component Description
SD-WAN Edge The network's entry point where endpoints branch offices, remote data centers, or cloud platforms reside. It determines how data enters and leaves the system.
SD-WAN Orchestrator Serves as the network's virtual manager, overseeing traffic flow and applying policies and protocols set by network operators. The orchestrator provides centralised operational control.
SD-WAN Controller Acts as the network's administrative hub, responsible for centralising network management and providing operators with a single-pane view of the network.
Virtual or Physical Nodes Augment the underlay WAN. These nodes, either physical or virtual, can add additional capabilities or capacity to the existing network.
Underlay Network The existing physical network infrastructure over which the SD-WAN is implemented, such as the internet, MPLS, LTE/4G/5G, and other types of connectivity.
Overlay Network The virtual network created by the SD-WAN that sits above the underlay network. It's where intelligent routing happens, directing traffic over the best path.
Zero Touch Provisioning (ZTP) Allows for the automated deployment and configuration of edge devices, reducing manual intervention and speeding up the deployment process.
Security Functions Integrated security features within many SD-WAN solutions, including firewalls, encryption, and intrusion prevention systems to protect the network and data.
Cloud Access Points Gateways or points of presence that allow for efficient and secure access to cloud services and applications.
Public and Private Gateways SD-WAN can be delivered as site-to-site VPN or with access to public and private PoP gateways to improve global traffic performance.
Hybrid WAN The majority of SD-WAN solutions are delivered over the Internet but require a Hybrid approach of MPLS, VPLS, private circuits, and Internet for certain demands.
Connectivity Type Internet, 4G, 5G, and Broadband are all available options for connectivity into SD-WAN.
Cloud Access Choosing an SD-WAN vendor is often driven by the vendor's capability to integrate with Cloud services like AWS, Azure, and Google Cloud.
Central Cloud Management Enables centralised management of cloud resources and services, streamlining operations and improving efficiency.
Cloud Deployment SD-WAN can be deployed with edge processing power or as a virtualised instance which reduces the overall cost and improves ROI.
Managed Services Comprehensive services provided by vendors or third parties to manage the SD-WAN infrastructure, ensuring optimised performance and security.

The 3 Tools You Need To Compare UK SD WAN Providers And Vendors.

  1. SD WAN Comparison Tool - Answer 10 questions to find your match.
  2. Read SD WAN Research - We've listed 25+ Solutions.
  3. Get the Guide - Top/Best SD WAN Vendors and Providers.

Suggested Posts

SD WAN Buyers Mindmap

Download the SD WAN Buyers Mind Map Feature Comparison Guide

Download the at-a-glance A3 PDF SD WAN Buyers Mindmap. Everything an IT decision making team need to consider when comparing vendors and managed service providers.

SD WAN Buyers Mind Map 2023

Your Mindmap is sent immediately. Complete the following information - check your junk folder if you do not receive the content within 2 minutes.

Download now

Explore Topics

Popular Article Topics

Find articles and helpful resources about any of the following:

Subscribe to Notifications

The Netify Learning Center

Learn more about comparison of SD WAN and SASE Cybersecurity with the Netify Learning Center.

See All Articles

Download the SD WAN Playbook

A comparison of SD WAN vendors & providers distilled into one page.

With the key features you should consider. And, build a vendor shortlist in less than 60 seconds with our comparison tool.