bluebay2014 - Fotolia
Which SD-WAN features truly comprise SD-WAN technology?
How do you protect your organization and network against SD-WAN washing? Here are four key SD-WAN features that your system must have in order to be called SD-WAN.
Vendors' marketing efforts often try to link the latest technology trends to existing products that may not fully support the technologies being touted. In cloud computing, for example, the term cloud-enabled is attached to products whether or not their underlying foundations are truly cloud-based, leading to a practice called cloud washing.
Similarly, SD-WAN washing is vendors improperly claiming software-defined WAN capabilities on products that do not fully support all the SD-WAN features necessary for your WAN to work properly.
For a product to be a true SD-WAN, it needs four key functions.
First, the WAN connection must be virtualized. There must be a layer of abstraction between the WAN functions and the physical device. When virtualized, the WAN layer runs as an overlay above the physical WAN hardware, enabling that connection to be easily moved across different physical devices or managed remotely without having to reprogram the physical underlying device.
Second, policy oversight must be centralized. For a true SD-WAN, the policies should be managed in a central repository, where they can be distributed to the different SD-WAN devices as needed.
Third, orchestration is necessary. With the WAN virtualized and policies centralized, the SD-WAN will need the ability to orchestrate changes from a single location. It does no good to have a centralized repository if each connection must be maintained individually.
Finally, SD-WAN features must include the ability to dynamically manage traffic. This means the SD-WAN can route traffic over multiple physical connections as needed, based on rules that can be easily set and maintained. While individual, manual overrides may be feasible, the SD-WAN must be able to dynamically manage itself based on network needs.
If all of these capabilities are present, it is a true SD-WAN. If some are missing, then it's just a case of a vendor trying to SD-WAN wash its product. Its SD-WAN feature set is incomplete.
Dig Deeper on WAN technologies and services
Related Q&A from John Fruehe
Pairing SD-WAN, UCaaS together has benefits and challenges
Organizations may combine SD-WAN and UCaaS to gain synergies and avoid multivendor complexities. But the combination of the two technologies can ... Continue Reading
What network automation certification options are available?
Network automation certifications and training include vendor-specific commercial credentials, as well as open source options. Which career path is ... Continue Reading
Edge computing challenges and ways to address them
Edge computing can reduce processing times and improve application performance, but the architecture has its issues. Here are eight challenges edge ... Continue Reading