07-07-2018 08:24 AM - edited 03-08-2019 05:31 PM
A. We have 450 branch locations currently connected using MPLS links from two different SPs (SP-A & SP-B)
B. DC, DR and 13 main branches are connected through both SP-A & SP-B links. (Redundancy & Load Sharing )
C. Other 435 branches are connected through only one MPLS link. Either SP-A/ SP-B link. (BW - 512 Kbps/ 256 Kbps)
D. Out of above 435 branches, 300 are very small branch and less critical for business. Connected through 256 links. These branches access few web based applications hosted in DC.
Now,
1. Considering the considerable cost of MPLS links, we assess the Viptela SD-WAN option and completely replace small branch MPLS links with low cost ADSL/FTTH Internet links. (Remove MPLS links and only ADSL/FTTH for DC connectivity)
2. Also for other 135 branches, we assessing the possibility of connecting one MPLS link (A/B) and one ASDL/FTTH link for redundancy and load sharing. This internet link will be additionally used for DIA.
3. Other 15 branches may connected with 02 MPLS links and one ADSL/FTTH link.
Please clarify me that, whether it is possible and what are the constraints associated with this plan? Also what are the security related features available in Viptela to secure branch DIA?
07-30-2018 04:05 PM
Hi,
Your overall plan looks ok and from very high level perspective, it's absolutely possible and seat in most common used cases already defined for SD-WAN solutions.
Please also note that Viptela never claim to be a proper security box to serve as firewall service inside your network hence it has L3 & L4 firewall capabilities.
You can apply traffic limitation * monitoring using:
As a result, you can block traffic using ACL up to L4 or using DPI feature at application level.
If you need more extensive security like IPS/IDS or malware detection or email protection, you might need to go down the service chaining path.
Regards,
Ehsan
07-31-2018 09:07 AM
12-18-2018 06:29 AM
Anyway we have pushing the traffic through service VPN.like vpn 1 to 511 .So it's seems to be segregated traffic and secure even though branch to branch connected with ipsec tunnel.So i guess it's more secure than others.
01-03-2019 01:45 PM
you can now use viptela great wall security features like a full functional firewall , IDS/IPS, Umbrella (DNS) security and URL filtering with the new code. 18.4.0 obviously you will need some resource planning when it comes to enabling these features on a device. Or you can go service chaining route by having one or 2 site dedicated for firewalling /other security
01-06-2019 02:06 AM
Hi tahiali
I believe those features aren't supported on vEdge routers, its only for XE enabled routers, right?
01-06-2019 04:18 AM - edited 01-06-2019 04:18 AM
full functional (stateful, Zone-Based firewall) is available on vEdge as well https://sdwan-docs.cisco.com/Product_Documentation/Software_Features/Release_18.3/07Policy_Applications/05Zone-Based_Firewalls
But all other mentioned earlier features only on Cisco IOS XE SDWAN software. For these features controllers should be from 18.4 branch (18.4.0 currently)
01-06-2019 04:21 AM
For vEdge, Can we use application based firewalling?
01-06-2019 12:25 PM
yes with vedge Viptela - (100, 1000, 2000 and 5000)
you can use app fw (the dpi engine is using qosmos based), IPS/IDS, URL filtering not supported on it, but DNS security is.
Cisco other platforms will support it all with some functional exceptions.
01-06-2019 12:28 PM
So, it's using on vEdge routers the stateful engine + Qosmos DPI engine, rather than stateful firewall with NBAR, right?
01-06-2019 12:35 PM
FW integration with our NBAR application detection engine will be implemented on Cisco ISR4K, 1K, ASR, CSR, and ISRv providing Ent FW with Application Awareness . The vEdges however will support a stateful FW but application detection mechanism is using Qosmos DPI (Deep Packet Inspection) Engine.
01-06-2019 12:53 PM
So, with Qosmos DPI on vEdge, the user can define the application then can apply the policy by allowing or block?
01-09-2019 02:40 PM
You cannot do custom applications as of now. but there is a list of applications which nbar2 and qosmos support muttually which can be detected and policies can be applied.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide