[194536] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: SD-WAN for enlightened

daemon@ATHENA.MIT.EDU (Colton Conor)
Sat May 6 10:46:05 2017

X-Original-To: nanog@nanog.org
In-Reply-To: <CACk08n8MPKdeQJcYyGJr4Ey4hn_21hFC08Zb6E7vgrdpsFP+2A@mail.gmail.com>
From: Colton Conor <colton.conor@gmail.com>
Date: Sat, 6 May 2017 09:46:00 -0500
To: Stefan <netfortius@gmail.com>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

What I don't understand is how do all these newer, SD-WAN vendors, differ
from any of the managed FireWall companies that have nice pretty GUI's and
web management? For example, Sophos, Meraki, Fortinet, and the other large
firewall vendors that do dual wan, virus filtering, remote management, etc?



On Tue, May 2, 2017 at 1:19 PM, Stefan <netfortius@gmail.com> wrote:

> As of this announcement:
>
> http://investor.cisco.com/investor-relations/news-and-
> events/news/news-details/2017/Cisco-Announces-Intent-to-
> Acquire-Viptela/default.aspx
>
> there will be one less than before :-)
>
> Seriously - when I first learned about them, upon service inclusion of th=
e
> Viptela products into the VzB SD-WAN offering, they (Viptela -
> http://blog.ipspace.net/2014/11/viptela-sen-hybrid-wan-connectivity.html)
> looked very nice, already, as standalone products. And that was a few yea=
rs
> back.
>
> ***Stefan
>
> On Tue, May 2, 2017 at 12:44 PM, Doug Marschke <doug@sdnessentials.com>
> wrote:
>
>> Too many to list.  I don=E2=80=99t know who is =E2=80=9Cwinning=E2=80=9D=
 in market share right
>> now, as I am sure each vendor tracks their wins differently.
>>
>> There are definitely a few making more noise than others.
>>
>> Doug Marschke
>>
>> CTO
>>
>>  <http://www.sdnessentials.com> www.sdnessentials.com
>>
>> JNCIE-SP #41, JNCIE-ENT #3
>>
>> 415-902-5702 (cell)
>>
>> 415-340-3112 (office)
>>
>>
>>
>> From: Colton Conor [mailto:colton.conor@gmail.com]
>> Sent: Thursday, April 27, 2017 6:26 PM
>> To: Doug Marschke <doug@sdnessentials.com>
>> Cc: Kasper Adel <karim.adel@gmail.com>; NANOG list <nanog@nanog.org>
>> Subject: Re: SD-WAN for enlightened
>>
>>
>>
>> So who are the big SD-WAN players out there?
>>
>>
>>
>> On Mon, Apr 17, 2017 at 10:31 AM, Doug Marschke <doug@sdnessentials.com
>> <mailto:doug@sdnessentials.com> > wrote:
>>
>> Hello Kasper,
>>
>> I will do my best to answer your SD-WAN question, but as you mentioned i=
t
>> is a buzzword that has a bit of confusion in its definitions.  I would s=
ay
>> that a SD-WAN solution should have the following elements:
>>
>> 1.) Ability to manage multiple WAN connection and choose the path based
>> on user and machine criteria (The Hybrid WAN)
>> 2.) A controller to manage the polices and operations of the SD-WAN
>> devices
>> 3.) Analytics on the network and application level
>> 4.) A software overlay that abstracts and secures the underlying network=
s
>>
>> Currently there are a lot of solutions out there by many vendors.  Some
>> do all of these and some a subset, so it make the landscape a bit
>> confusing.   Lots of times vendors use SD-WAN when they are really just
>> talking about Hybrid WAN (multiple connections) or WAN optimization.
>>
>>
>>
>>
>>
>> Doug Marschke
>> CTO
>> www.sdnessentials.com <http://www.sdnessentials.com>
>> JNCIE-SP #41, JNCIE-ENT #3
>> 415-902-5702 <tel:415-902-5702>  (cell)
>> 415-340-3112 <tel:415-340-3112>  (office)
>>
>>
>> -----Original Message-----
>> From: NANOG [mailto:nanog-bounces@nanog.org <mailto:
>> nanog-bounces@nanog.org> ] On Behalf Of Kasper Adel
>> Sent: Sunday, April 16, 2017 1:14 PM
>> To: NANOG list <nanog@nanog.org <mailto:nanog@nanog.org> >
>> Subject: SD-WAN for enlightened
>>
>> Hi,
>>
>> I'm not sure if the buzzword SD-WAN is used to compensate for another
>> buzzword that got over-utilized (SDN) or it is a true 'new and improved'
>> way of doing things that has some innovation into it.
>>
>> I heard different explanation from different vendors:
>>
>> 1) appliances (+ controller) placed in-line to put traffic in tunnels
>> based on policy, with some DPI and traffic tagging...(to do
>> performance/policy based routing) over an expensive link (MPLS) and a ch=
eap
>> one (broadband) with some 'firewall-like' filtering capabilities.
>> 2) same as above, with a flavor of 'machine learning' to find a pattern
>> for traffic to optimize utilization.
>> 3) a controller that instantiates and tears down tunnels from 'classic
>> routers' based on external policies and Network based features to do
>> performance based routing over an expensive link (MPLS) and a cheap one
>> (broadband) with encryption.
>>
>> Is the above a decent high-level summary?
>>
>> Has anyone tried any of these solutions, any general feedback ?
>>
>> Cheers,
>> Kim
>>
>>
>>
>>
>

home help back first fref pref prev next nref lref last post