SD-WAN Overview
1. What Is SD-WAN and Why Was It Created?
SD-WAN (Software-Defined Wide Area Networking) is a technology approach that applies software-defined networking (SDN) principles to the enterprise WAN. It decouples the WAN's control plane (routing decisions, policy, management) from the data plane (packet forwarding), centralising intelligence in a software controller while allowing edge devices to forward traffic over any available transport — MPLS, broadband internet, LTE/5G, or satellite — simultaneously.
SD-WAN emerged as a direct response to the limitations of traditional MPLS-centric WAN architectures in a world where cloud computing, SaaS applications, and mobile workforces have fundamentally changed where enterprise traffic goes. In the early 2000s, most enterprise traffic stayed inside the corporate network — MPLS was ideal. By the mid-2010s, 60–80% of enterprise traffic was destined for the internet and cloud, yet WAN architecture still forced all branch traffic through the corporate data centre before reaching the internet — adding latency, consuming expensive MPLS bandwidth, and creating a bottleneck.
| Problem with Traditional WAN | SD-WAN Solution |
|---|---|
| High MPLS cost for growing bandwidth needs | Use cheap broadband internet alongside (or replacing) MPLS; significant cost reduction |
| All traffic backhauled through HQ before reaching cloud/internet | Direct cloud breakout from branches — SaaS traffic goes directly to the internet from the branch |
| Manual per-device CLI configuration for each branch router | Centralised policy management via GUI/API; zero-touch provisioning for new branches |
| Static routing decisions — no awareness of real-time link quality | Application-aware routing with real-time path selection based on measured latency, jitter, and loss |
| Internet transport is insecure — no native encryption | Built-in IPsec encryption on all overlay tunnels, regardless of transport |
| Weeks to provision a new branch circuit | Zero-touch provisioning — a new branch can join the fabric in hours, not weeks |
| Single-vendor, single-transport lock-in | Transport-agnostic — mix any combination of transports and switch providers freely |
Related pages: WAN Technologies Overview | WAN Overview | MPLS | DMVPN | IPsec VPN | GRE Tunnels | Controller-Based Networking | Northbound & Southbound APIs | QoS Overview | OSPF Overview | BGP Overview | Ansible Overview | Cisco SD-WAN / Viptela Lab
2. Traditional WAN vs SD-WAN — Side by Side
Understanding the limitations of traditional WAN architecture is the key to appreciating what SD-WAN changes. The comparison below covers the most important dimensions.
| Dimension | Traditional WAN (MPLS-centric) | SD-WAN |
|---|---|---|
| Transport | Single provider MPLS circuit per site | Any transport: MPLS + internet + LTE simultaneously |
| Control plane | Distributed — each router runs its own routing protocol (OSPF, BGP) independently | Centralised — SD-WAN controller (vSmart) distributes policy to all edge devices |
| Configuration | Per-device CLI configuration — every router configured individually | Centralised GUI/API (vManage) — policies defined once, pushed to all devices |
| New branch provisioning | Weeks — MPLS circuit order, physical installation, manual CLI configuration | Hours — zero-touch provisioning; device connects and auto-downloads configuration |
| Internet/cloud access | Branch traffic backhauled through HQ (data centre) then out to internet — adds 30–100+ ms latency to cloud apps | Direct cloud breakout — branch sends SaaS/internet traffic directly to internet; HQ traffic stays on MPLS/SD-WAN fabric |
| Path selection | Static or protocol-based (OSPF metric, BGP) — no real-time awareness of jitter or loss | Real-time per-path measurement (BFD) — routes traffic based on measured latency, jitter, loss per application |
| Security | MPLS is logically private but unencrypted; internet requires separate IPsec VPN infrastructure | Built-in IPsec on all paths — internet and MPLS both encrypted in the overlay; integrated next-gen firewall available on some platforms |
| Visibility | Limited — per-device logs and SNMP polling; no application-level visibility | Centralised application-level telemetry — see which apps use which paths in real time |
| Cost | High MPLS circuit costs; expensive to scale bandwidth | Lower — cheap broadband for bulk traffic; MPLS only where QoS SLA is needed |
3. Overlay and Underlay — The Core Concept
The single most important conceptual distinction in SD-WAN is the separation between underlay and overlay networks. Understanding this split explains how SD-WAN achieves transport-independence.
3.1 Underlay — The Physical Transport
The underlay is the physical or logical network that provides raw IP connectivity between SD-WAN edge devices. The underlay can be any combination of transport technologies — MPLS, broadband internet, LTE/5G, satellite, or Metro Ethernet. SD-WAN does not care what the underlay is; it uses whatever is available to build the overlay.
3.2 Overlay — The SD-WAN Fabric
The overlay is a virtual network of IPsec-encrypted tunnels that SD-WAN edge devices (vEdge / cEdge) build on top of all available underlay transports. The overlay creates a full-mesh (or hub-and-spoke) logical topology of encrypted tunnels between all sites — regardless of which underlay each tunnel uses. Applications and routing policies operate on the overlay; the underlay is invisible to them.
| Concept | Underlay | Overlay |
|---|---|---|
| What it is | Physical/logical transport infrastructure | Virtual encrypted tunnel network built on top |
| Examples | MPLS, internet DSL, LTE, satellite | IPsec tunnels, OMP routes, BFD sessions |
| Who sees it | vEdge device — uses underlay for tunnel endpoints | Applications, policies, routing — operate on overlay |
| Routing | Standard IP routing (BGP, OSPF, static) to reach far-end vEdge IPs | OMP distributes overlay routes; application policies steer traffic |
| Security | May be unencrypted (internet) or logically private (MPLS) | Always encrypted — all overlay tunnels use IPsec |
4. Cisco SD-WAN / Viptela Architecture
Cisco's SD-WAN solution is based on technology acquired from Viptela in 2017. It uses a set of clearly defined components — each with a distinct role — that together form the complete SD-WAN fabric. Understanding these components and their interactions is essential for the CCNA and CCNP Enterprise exams.
5. The Four SD-WAN Planes and Their Components
5.1 vManage — Management Plane
vManage is the centralised network management system (NMS) and orchestration platform for the entire SD-WAN fabric. It is the single pane of glass through which administrators define policies, monitor the network, and manage all devices. All configuration and policy changes flow from vManage to the rest of the fabric.
| vManage Function | Description |
|---|---|
| Centralised GUI dashboard | Web-based interface showing real-time topology, device health, tunnel status, and application performance across all sites |
| REST API | Northbound API for integration with ITSM tools (ServiceNow), automation platforms, and custom scripts (Python, Ansible) |
| Policy definition | Centralised point for all data plane policies — QoS, application routing, security, AAR (Application-Aware Routing) rules |
| Device templates | Configuration templates pushed to vEdge/cEdge devices; separates device-specific variables from policy structure |
| Software upgrades | Centralised IOS XE / vEdge software image management across all WAN edge devices |
| Telemetry and alerts | Real-time streaming telemetry from all vEdge devices; configurable alerts for link failures, SLA violations, security events |
5.2 vSmart — Control Plane
vSmart is the centralised control plane controller. It runs OMP (Overlay Management Protocol) — the SD-WAN fabric's own routing protocol — communicating with all vEdge devices over TLS-secured connections. vSmart is responsible for distributing routes, keys, and policies to every edge device, making the path-selection intelligence centralised rather than distributed.
5.3 vBond — Orchestration Plane
vBond is the orchestrator — the first component a new SD-WAN edge device contacts when it boots for the first time. vBond authenticates the device's certificate, discovers its public IP address (important for NAT traversal), and tells it the IP addresses of the vSmart controllers to connect to. Once initial orchestration is complete, vBond is no longer in the regular data or control path.
5.4 vEdge / cEdge — Data Plane
vEdge routers are Viptela's original purpose-built hardware and virtual SD-WAN edge devices. cEdge routers are Cisco IOS XE-based routers (e.g., ISR 4000, ASR 1000, CSR 1000v) running the Cisco SD-WAN software. Both perform the same data plane functions. All user traffic flows through these devices.
| vEdge / cEdge Function | Description |
|---|---|
| IPsec tunnel termination | Builds and maintains encrypted IPsec tunnels to all other SD-WAN edge devices across all available transports |
| BFD path monitoring | Sends BFD hello packets every second on each tunnel to measure latency, jitter, and packet loss in real time |
| OMP participation | Peers with vSmart over OMP; advertises local prefixes; receives overlay routes and policies |
| Application-aware routing | Classifies application traffic using DPI; applies policy to forward each application on the best-performing path based on BFD-measured metrics |
| LAN connectivity | Connects to local LAN switches/VLANs; can run OSPF or BGP with LAN-side routers for local route distribution |
| Security enforcement | Can enforce application-level firewall, URL filtering, IPS (on advanced platforms); segment traffic using VPNs |
6. OMP — Overlay Management Protocol
OMP (Overlay Management Protocol) is the SD-WAN fabric's proprietary routing and signalling protocol that replaces BGP/OSPF for the overlay network. OMP runs between vEdge devices and vSmart controllers over TLS-secured TCP connections. It carries three types of information: routes, TLOCs, and policies.
| OMP Information Type | What It Carries | Purpose |
|---|---|---|
| OMP Routes | Prefixes reachable via the overlay (analogous to BGP NLRIs — Network Layer Reachability Information) | Tells all vEdge devices what subnets are reachable at each site, and via which TLOC |
| TLOCs (Transport Locators) |
Identifies each tunnel endpoint: System IP + Colour (transport type) + Encapsulation (IPsec/GRE) | Each vEdge can have multiple TLOCs (one per WAN interface); vSmart uses TLOCs to build the overlay topology |
| Service Routes | Information about services available at a site (firewall, IPS, load balancer) | Allows traffic to be steered to security service nodes in a service-chaining topology |
7. Application-Aware Routing (AAR)
Application-Aware Routing (AAR) is one of SD-WAN's most compelling capabilities. Instead of routing traffic based purely on destination IP prefix (as traditional routing protocols do), AAR routes traffic based on application identity and real-time measured path quality — choosing the best transport for each application dynamically, and switching paths automatically when quality degrades.
AAR Configuration Concepts
| AAR Component | Description |
|---|---|
| SLA Class | Defines acceptable thresholds for latency, jitter, and packet loss. Named policy objects (e.g., "VOIP-SLA", "BUSINESS-SLA") referenced in data policies |
| Data Policy | Defines which traffic matches which SLA class and which TLOCs (transports) to prefer. Configured in vManage and distributed by vSmart to relevant vEdge devices |
| BFD measurement | BFD sends probe packets on each tunnel every 1 second (configurable). Rolling average of loss/latency/jitter is maintained per tunnel per color |
| Fallback behavior | If no path meets the SLA threshold, configurable fallback: use best available path, drop traffic, or use a backup transport |
8. Zero-Touch Provisioning (ZTP)
Zero-Touch Provisioning (ZTP) is the SD-WAN feature that allows a new branch router to join the fabric and receive its full configuration automatically — without any engineer needing to physically touch or pre-configure the device. An IT administrator ships a factory-fresh vEdge or cEdge device to the branch; a local non-technical user plugs it in and connects the WAN cables. The device does the rest.
9. SD-WAN Security — Built-In vs Bolted-On
Security in SD-WAN is fundamentally different from traditional WAN. Rather than relying on a separate VPN concentrator or firewall to secure internet traffic, SD-WAN builds security into the fabric at every layer.
9.1 Overlay Encryption
All SD-WAN overlay tunnels use IPsec with AES-256-GCM encryption by default. Every packet traversing the overlay — even over MPLS — is encrypted and authenticated. Keys are automatically distributed and rotated by vSmart via OMP. No manual IKE configuration is required on edge devices.
9.2 Authentication and PKI
Every SD-WAN device (vEdge, cEdge, vSmart, vBond, vManage) has a unique certificate signed by a trusted Certificate Authority. All control-plane connections (OMP between vEdge and vSmart) use TLS with mutual certificate authentication — no device can join the fabric without a valid certificate. This prevents rogue devices from inserting themselves into the fabric.
9.3 Security Services on the Edge
Advanced SD-WAN platforms integrate security functions directly into the WAN edge device, eliminating the need for separate security appliances at each branch:
| Security Function | Description |
|---|---|
| Zone-Based Firewall | Stateful inspection between LAN segments and internet breakout traffic — same ZBF concepts as Cisco IOS Zone-Based Firewall |
| URL Filtering | Blocks or monitors web access by URL category — malware, gambling, social media — without backhauling to HQ proxy |
| IPS / IDS | Intrusion Prevention / Detection System integrated into the cEdge — inspects traffic for known threats without a separate security appliance |
| DNS Security | Integration with Cisco Umbrella — blocks malicious domains at DNS resolution time before the connection is even established |
| Segmentation (VPNs) | SD-WAN uses separate VPN segments (not the same as IPsec VPN — these are traffic segmentation groups) to isolate guest, corporate, and IoT traffic end-to-end across the fabric |
10. SD-WAN Design Patterns and Use Cases
10.1 Hub-and-Spoke vs Full Mesh
10.2 Common SD-WAN Use Cases
| Use Case | SD-WAN Capability Used |
|---|---|
| Replace or augment expensive MPLS | Use cheap internet broadband for bulk traffic; retain MPLS only for voice and latency-critical applications; AAR steers traffic appropriately |
| Direct cloud access from branches | Direct internet breakout at branch with URL filtering and DNS security; Office 365, Salesforce, AWS reach directly without HQ backhaul |
| WAN resilience and failover | Multiple transports per site; BFD detects path degradation in <1 second; AAR automatically reroutes before users notice |
| Rapid branch deployment | Zero-Touch Provisioning; new branches live in minutes; no on-site engineer required |
| Consistent security policy across all sites | Centralised security policies in vManage; same firewall, URL filter, and IPS rules enforced at every site automatically |
| Visibility and troubleshooting | vManage real-time telemetry; application-level flow visibility; identifies which path each application uses and its quality metrics |
10.3 SD-WAN vs DMVPN — Key Differences
| Feature | DMVPN | SD-WAN |
|---|---|---|
| Control plane | Distributed (EIGRP/OSPF/BGP over mGRE tunnels) | Centralised (vSmart + OMP) |
| Management | Per-device CLI (or Cisco DNA Center for some) | Fully centralised vManage GUI/API |
| Multi-transport | One tunnel per transport; manual failover policy | Automatic multi-transport with real-time BFD steering |
| Application awareness | Limited — routing based on prefix, not app identity | Full DPI / NBAR application classification and AAR |
| Zero-touch provisioning | Manual spoke config required | Full ZTP — factory-new device joins automatically |
| Cloud integration | Manual configuration for cloud breakout | Native direct cloud breakout; cloud gateway integrations |
See also: WAN Technologies Overview | MPLS | DMVPN | IPsec VPN | GRE Tunnels | Controller-Based Networking | Northbound & Southbound APIs | Cisco SD-WAN / Viptela Lab | DMVPN Phases Lab
Test Your Knowledge — SD-WAN Quiz
Related Topics & Step-by-Step Tutorials
Continue your WAN studies:
- WAN Technologies Overview — comprehensive overview of all WAN types
- MPLS – Multiprotocol Label Switching — label switching operation, CE/PE/P roles, Traffic Engineering
- DMVPN – Dynamic Multipoint VPN — dynamic spoke-to-spoke tunnels over hub-and-spoke infrastructure
- SD-WAN Overview — centralised control, multi-transport, app-aware routing
- IPsec VPN – Concepts & Protocols — site-to-site encrypted tunnels; Phase 1 IKE and Phase 2 SA
- IPsec — ESP, AH, IKE explained
- GRE Tunnels – Generic Routing Encapsulation — encapsulating multicast/routing protocols over WAN links
- Site-to-Site vs. Remote-Access VPN – Complete Compar… — site-to-site vs remote access VPN comparison
- BGP – Border Gateway Protocol Overview — EGP for inter-AS routing; the Internet routing protocol
- OSPF Overview – Open Shortest Path First Explained — most common IGP in enterprise WANs
- OSPF Areas and LSAs – Detailed Explanation — hierarchical OSPF design for large WANs
- EIGRP Overview — Cisco proprietary IGP with unequal-cost load balancing
- Floating Static Routes – Backup Routes, AD & Failover — WAN backup routing with elevated AD
- Default Routes – Complete Guide — 0.0.0.0/0 used at WAN edge to reach the internet
- QoS – Quality of Service Overview — prioritising VoIP and video over congested WAN links
- NAT – Network Address Translation Overview — translating private addresses at the WAN edge
- show interfaces – Interface Statistics & Error Analy… — check WAN interface up/down and error counters
- show ip route — verify routes to remote WAN sites
- Ping — test WAN reachability
- Traceroute – Packet Path Analysis & Troubleshooting — find where WAN path breaks
- DMVPN Phase 1, 2 & 3 (Step-by-Step)
- Site-to-Site IPsec VPN — IKEv1 & IKEv2 (Step-by-Step)
- GRE Tunnel Configuration (Step-by-Step)
- PPPoE Client Configuration (Step-by-Step)
- MPLS Fundamentals (Step-by-Step)