Wide Area Network (WAN) – Technologies, Topologies, and Troubleshooting
1. What Is a WAN?
A Wide Area Network (WAN) is a data communication network that spans a large geographic area — cities, countries, or entire continents — connecting multiple Local Area Networks (LANs), branch offices, data centres, and remote users into a single unified network infrastructure. Unlike a LAN, which an organisation owns and operates entirely within its own building or campus, a WAN typically relies on infrastructure leased or provided by telecommunications carriers and Internet Service Providers (ISPs).
The Internet itself is the largest WAN in existence. Enterprise WANs are private networks that connect an organisation's geographically dispersed sites using a combination of leased circuits, MPLS services, VPN tunnels over the public Internet, and increasingly, SD-WAN overlays.
WAN in context — connecting dispersed sites:
[London HQ]──────MPLS circuit──────[Frankfurt Branch]
│ │
[Cisco Router] [Cisco Router]
│ │
[LAN: 10.1.0.0/16] [LAN: 10.2.0.0/16]
│
├──── IPsec VPN tunnel ──── [Dubai Branch / Remote Workers]
│
└──── Internet ──── [AWS Cloud / SaaS Applications]
Key characteristics:
✓ Spans large distances — city, country, continent, or global
✓ Operated over service-provider infrastructure (leased, not owned)
✓ Connects multiple LANs or MANs into one enterprise network
✓ Typically slower and higher-latency than LAN (longer distances, shared media)
✓ Requires WAN-specific protocols and encapsulations (PPP, HDLC, MPLS)
Related pages: Routers | WAN Technologies | MPLS | DMVPN | SD-WAN Overview | IPsec VPN | IPsec Basics | GRE Tunnels | Site-to-Site vs Remote Access VPN | BGP Overview | OSPF Overview | OSPF Neighbor States | OSPF Areas & LSAs | EIGRP Overview | Floating Static Routes | Default Routes | Dynamic NAT | Static NAT | QoS Overview | QoS Policing & Shaping | Firewalls | ping | traceroute | show ip route | show interfaces | show ip protocols
2. WAN vs LAN vs MAN
| Feature | LAN | MAN | WAN |
|---|---|---|---|
| Coverage area | Single building or campus | City or metropolitan area (up to ~50 km) | Country, continent, or global |
| Typical speed | High — 100 Mbps to 400 Gbps on modern switches | Medium to high — 10 Mbps to 10 Gbps | Variable — 1.5 Mbps (T1) to 100 Gbps (fibre backbone); often shared |
| Latency | Very low — sub-millisecond within the building | Low to medium | Higher — tens to hundreds of milliseconds over intercontinental links |
| Ownership | Single organisation owns and operates all equipment | Single or multiple entities; often a city or ISP | Operated by telecoms/ISPs; organisations lease bandwidth |
| Infrastructure | Ethernet switches, access points — owned by the org | Fibre rings, metro Ethernet — often shared | Leased circuits, MPLS clouds, satellite, undersea cables |
| Cost | Low per-Mbps cost; hardware is bought once | Medium — monthly leases to service providers | High — recurring monthly circuit costs, especially for private MPLS |
| Typical examples | Office floor network, university campus | City government network, municipal Wi-Fi | Internet, enterprise MPLS backbone, inter-country VPN |
3. WAN Technologies — Circuit-Switched vs Packet-Switched
WAN technologies are divided into two fundamental categories based on how they share the physical transmission medium between multiple users.
Circuit-Switched (Legacy)
Circuit-switched WAN: a dedicated physical path is established for the
duration of each call or session, then released.
Device A ──reserves dedicated circuit──→ Device B
←──────────────────────────────
All data for this session travels the same dedicated path.
Bandwidth is reserved even when no data is being transmitted.
Example: PSTN (Public Switched Telephone Network) — original telephone lines
ISDN (Integrated Services Digital Network) — digital voice/data
Status: Largely obsolete for data networking. Still relevant for understanding
WAN history and voice infrastructure.
Packet-Switched (Modern)
Packet-switched WAN: data is broken into packets; each packet is routed
independently through the provider network and may take different paths.
Bandwidth is shared; no dedicated circuit is reserved.
Device A → Packet 1 → Router1 → Router3 → Device B
Device A → Packet 2 → Router2 → Router3 → Device B
Device A → Packet 3 → Router1 → Router2 → Router3 → Device B
Advantages over circuit-switched:
✓ Bandwidth shared efficiently (unused capacity not wasted)
✓ More resilient — packets reroute if a link fails
✓ Scales to millions of simultaneous sessions
Modern packet-switched WAN technologies:
• MPLS — provider backbone; fast label-switching; QoS support
• Broadband — DSL, cable, fibre; shared medium; internet access
• Metro Ethernet — Ethernet extended over WAN distances
• VPN over Internet — IPsec/SSL tunnels; uses public internet as transport
4. WAN Technologies — Detailed Comparison
| Technology | Type | Speed | Key Characteristics | Typical Use |
|---|---|---|---|---|
| Dedicated Leased Line (T1/E1) | Point-to-point, private | T1: 1.544 Mbps; E1: 2.048 Mbps | Always-on; fixed dedicated bandwidth; not shared; very predictable latency; high monthly cost | Connecting corporate data centres to MPLS cloud; legacy financial and government networks |
| MPLS (Multiprotocol Label Switching) | Packet-switched, private provider cloud | 2 Mbps to 10 Gbps | Labels replace IP lookups at each hop — faster forwarding; supports QoS classes; any-to-any connectivity via provider; appears as a private network to the customer | Enterprise backbone connecting multiple branch offices; voice and video with QoS guarantees |
| Broadband Internet (DSL, Cable, Fibre) | Packet-switched, public/shared | 5 Mbps to 10 Gbps (fibre) | Shared medium; lower cost; variable performance; no inherent QoS guarantees; used as WAN transport when overlaid with VPN | Small branch offices; backup WAN link; SD-WAN underlay; remote worker access |
| IPsec Site-to-Site VPN | Encrypted tunnel over public internet | Limited by underlying internet link | Encrypts all traffic between sites using AES; uses existing internet connectivity as transport; low cost; no guaranteed bandwidth or latency | Replacing MPLS at smaller branches; primary WAN for cost-sensitive organisations; backup to MPLS |
| SSL/TLS VPN (Remote Access) | Client-to-site encrypted tunnel | Limited by internet link | Individual remote users connect to corporate network using a VPN client or web browser; uses TCP/443 (HTTPS) — traverses most firewalls easily | Remote employees, work-from-home, travelling staff |
| 4G/5G Wireless WAN | Mobile broadband | 4G: up to 150 Mbps; 5G: up to 20 Gbps | No physical cabling needed; available wherever mobile coverage exists; latency higher than fibre; ideal for temporary or remote sites | WAN failover/backup link; kiosks; remote locations without fixed-line access; construction sites |
| Satellite WAN | Wireless, orbital | 12–150 Mbps (LEO satellites like Starlink) | High latency (GEO: 600ms+ round trip; LEO: 20–40ms); covers any geographic location including oceans and polar regions | Offshore platforms, maritime, extremely remote locations with no terrestrial options |
| Metro Ethernet | Ethernet over carrier fibre | 10 Mbps to 100 Gbps | Ethernet interface on the customer side; carrier provides the fibre transport; simple to integrate with existing Ethernet networks | Connecting sites within a metropolitan area; data centre interconnect |
5. MPLS — How Label Switching Works
MPLS (Multiprotocol Label Switching) is the dominant enterprise WAN backbone technology. Understanding how it differs from standard IP routing is a CCNA requirement.
Standard IP routing at each hop:
Router receives packet → reads destination IP → looks up routing table
→ forwards to next hop. Routing table lookup at EVERY router.
MPLS label switching:
Ingress PE router → reads destination IP → assigns a SHORT label (e.g., 32)
→ pushes label onto the packet header
→ subsequent P (provider core) routers → read LABEL ONLY (no IP lookup)
→ swap/push/pop labels and forward at hardware speed
→ Egress PE router → pops final label → delivers original IP packet
MPLS network components:
CE router (Customer Edge) — customer's router; speaks standard IP to PE
PE router (Provider Edge) — assigns/removes labels; runs with CE via eBGP/OSPF
P router (Provider Core) — only sees labels; no customer routing table needed
[Branch 1 CE] ──→ [PE1] ──label 32──→ [P1] ──label 45──→ [P2] ──→ [PE2] ──→ [HQ CE]
label assigned swap swap label removed
Benefits of MPLS:
✓ Faster forwarding — label lookup is O(1) vs IP routing table lookup
✓ Traffic Engineering (TE) — pre-defined paths bypass congestion
✓ QoS — labels carry Experimental (EXP) bits for traffic prioritisation
✓ Any-to-any connectivity — sites connect as if on same private network
✓ VPN isolation — different customer VPNs kept separate using VRFs
6. WAN Protocols — PPP and HDLC
On serial (point-to-point) WAN links, a Layer 2 encapsulation protocol is required. The two most tested on the CCNA are PPP and HDLC.
Where PPP and HDLC apply:
[Router A] ──── Serial link (T1, leased line) ──── [Router B]
The serial interfaces on both ends need matching Layer 2 encapsulation.
──────────── HDLC (High-Level Data Link Control) ────────────────
• Cisco's DEFAULT serial encapsulation — automatically configured
• Cisco HDLC is proprietary (not compatible with non-Cisco devices)
• Simple, low overhead — no authentication, no multilink
• If both ends are Cisco routers: HDLC works out-of-the-box
Cisco HDLC configuration (default — usually no config needed):
Router(config)# interface Serial0/0/0
Router(config-if)# encapsulation hdlc
──────────── PPP (Point-to-Point Protocol) ──────────────────────
• Open standard (RFC 1661) — works between Cisco and non-Cisco routers
• Supports AUTHENTICATION (PAP or CHAP)
• Supports MULTILINK (combines multiple serial links for more bandwidth)
• Supports COMPRESSION and error detection
PPP configuration:
Router(config)# interface Serial0/0/0
Router(config-if)# encapsulation ppp
Router(config-if)# ppp authentication chap ! CHAP is more secure than PAP
CHAP authentication (Challenge Handshake Authentication Protocol):
• Uses a 3-way handshake with MD5 hash — password never sent in clear text
• Both routers must have matching usernames and passwords configured
PAP authentication (Password Authentication Protocol):
• 2-way handshake — sends credentials in plain text — less secure
PPP vs HDLC:
┌──────────────────┬────────────────────────┬────────────────────────┐
│ Feature │ HDLC (Cisco) │ PPP │
├──────────────────┼────────────────────────┼────────────────────────┤
│ Standard │ Cisco proprietary │ Open (RFC 1661) │
│ Multi-vendor │ No (Cisco–Cisco only) │ Yes │
│ Authentication │ No │ Yes (PAP / CHAP) │
│ Multilink │ No │ Yes │
│ Default on Cisco │ Yes │ No (must configure) │
└──────────────────┴────────────────────────┴────────────────────────┘
Verifying serial WAN encapsulation:
Router# show interfaces Serial0/0/0
Serial0/0/0 is up, line protocol is up
Hardware is WAN DSU/CSU
Internet address is 10.0.0.1/30
MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 usec
Encapsulation HDLC, loopback not set ← current encapsulation
Mismatched encapsulation causes:
"Serial0/0/0 is up, line protocol is down"
→ Physical link is up (carrier detect) but Layer 2 keepalives fail
→ Check encapsulation matches on BOTH ends
7. WAN Topologies
WAN topology defines how sites are interconnected. The right choice depends on the number of sites, redundancy requirements, traffic patterns, and budget.
Point-to-Point
[Site A] ──── dedicated link ──── [Site B]
Characteristics:
✓ Simple — one link, one path
✓ Low latency — direct connection, no intermediate hops
✓ Predictable performance — dedicated bandwidth
✗ Not scalable — N sites require N-1 links from a hub (or N×(N-1)/2 for mesh)
✗ No redundancy — link failure = complete outage between the two sites
Best for: two-site organisations; direct data-centre-to-data-centre links;
serial connections on older WAN infrastructure.
Hub-and-Spoke (Star)
[HQ / Hub]
/ | \
/ | \
[Branch1] [Branch2] [Branch3]
Characteristics:
✓ Cost-effective — each branch only needs ONE WAN link (to the hub)
✓ Scalable — adding a branch = adding one link to the hub
✓ Centralised security — all traffic passes through the hub for inspection
✗ Single point of failure — if the hub fails, ALL spokes lose WAN connectivity
✗ Suboptimal branch-to-branch traffic — Branch1→Branch2 must traverse the hub
(double the WAN bandwidth consumed; adds latency)
Best for: enterprise networks with many branch offices connecting to
a central headquarters or data centre; MPLS VPN deployments.
DMVPN (Dynamic Multipoint VPN) improvement:
Allows spoke sites to build direct spoke-to-spoke tunnels dynamically
when needed, while maintaining hub-and-spoke as the default.
Full Mesh
[Site A] ──────── [Site B]
│ \ / │
│ \ / │
│ [Site C] │
│ \ │
└──────────[Site D]┘
Formula: links = n × (n-1) / 2
4 sites = 6 links, 5 sites = 10 links, 10 sites = 45 links
Characteristics:
✓ Maximum redundancy — any link can fail; alternative paths remain
✓ Optimal traffic — every site has a direct path to every other
✓ Lowest latency — no hub traversal needed
✗ Expensive — number of links grows quadratically with site count
✗ Complex to manage — routing, VPN tunnels, and policies on every link
Best for: critical inter-data-centre links where maximum redundancy
is required regardless of cost; headquarters-to-DR-site links.
Partial Mesh
A practical middle ground — key sites (HQ, data centres, regional hubs)
have direct links to each other (mesh), while smaller branches connect
hub-and-spoke to the nearest regional hub.
[HQ]────[DC1]────[DC2] ← full mesh for critical backbone
│ │
[Branch1] [Branch2] ← spokes connecting to regional sites
Best for: large enterprises with a tiered architecture.
8. WAN Routing Protocols
| Protocol | Type | Where Used on WAN | Key Characteristics |
|---|---|---|---|
| BGP (Border Gateway Protocol) | Exterior Gateway Protocol (EGP); path-vector | The Internet; between organisations (eBGP); between PE and CE routers in MPLS VPN (iBGP) | The routing protocol of the Internet; manages routing between autonomous systems (AS); supports policy-based routing; slow convergence; extremely scalable |
| OSPF | Interior Gateway Protocol (IGP); link-state | Within enterprise WAN; between CE and PE in MPLS as CE routing protocol | Fast convergence; hierarchical area design; scales well within an enterprise; most common IGP in enterprise WANs |
| EIGRP | Interior Gateway Protocol; advanced distance-vector (Cisco proprietary) | Cisco-only enterprise WANs; often used where OSPF complexity is undesirable | Fast convergence; DUAL algorithm; supports unequal-cost load balancing; easier to configure than OSPF |
| Static routes | Manual configuration | Small WANs with one or two paths; edge routers with a single upstream provider | Simple; predictable; no protocol overhead; no automatic failover unless floating static routes are configured |
See: BGP Overview | OSPF Overview | OSPF Neighbor States | OSPF Areas & LSAs | EIGRP Overview | Floating Static Routes | show ip protocols
9. WAN Security
Because WAN traffic crosses service-provider networks and often the public Internet, data in transit must be protected. The two primary security mechanisms are encryption (protecting confidentiality and integrity) and access control (restricting which traffic is permitted to cross WAN links).
IPsec Site-to-Site VPN — how it works:
[Branch Router] ──── Internet ──── [HQ Router]
│ │
└──── IPsec tunnel (AES-256) ──────┘
↑ All traffic encrypted here ↑
IPsec phases:
Phase 1 (IKE): Establish a secure management tunnel
→ Authenticate the peers (pre-shared key or certificates)
→ Negotiate encryption/hash algorithms (AES, SHA)
→ Exchange keys using Diffie-Hellman
Phase 2 (IPsec SA): Establish the actual data tunnel
→ Negotiate ESP (Encapsulating Security Payload) or AH
→ Encrypt and encapsulate the actual data packets
Cisco IOS VPN verification:
Router# show crypto isakmp sa ! Phase 1 tunnel status
Router# show crypto ipsec sa ! Phase 2 tunnel status; packets encrypted/decrypted
| Security Control | WAN Purpose | Implementation |
|---|---|---|
| IPsec VPN | Encrypt site-to-site traffic over untrusted public internet; provides confidentiality, integrity, and authentication | Cisco IOS crypto map or tunnel interface (GRE over IPsec); Phase 1 IKE + Phase 2 SA |
| MPLS VPN (L3VPN) | Logical isolation of customer traffic within the provider network using VRF (Virtual Routing and Forwarding) — customers share physical infrastructure but are completely isolated | Provider configures VRFs on PE routers; no encryption but logical separation enforced by the carrier |
| Firewall at WAN edge | Inspect and filter traffic entering/leaving the WAN edge; block unauthorised inbound connections; permit only needed traffic | Cisco ASA or IOS Zone-Based Firewall on the WAN-facing interface; stateful inspection of all WAN traffic |
| ACLs on WAN interfaces | Restrict which source/destination IP pairs and ports are permitted across WAN links; applied inbound on the WAN interface | ip access-group ACL_NAME in on
the Serial or WAN Ethernet interface |
See: Firewalls | IPsec VPN | IPsec Basics | GRE Tunnels | Named ACLs | Applying ACLs
10. WAN Performance — QoS and Optimisation
WAN links are the bandwidth bottleneck in most enterprise networks — a branch office LAN might run at 1 Gbps but its WAN connection might be only 10 Mbps. When that 10 Mbps is shared between VoIP calls, video conferencing, file backups, and general web traffic, Quality of Service (QoS) is essential to ensure real-time traffic gets priority.
Without QoS on a congested WAN link:
VoIP call (latency-sensitive) ──→ queued behind large backup file transfer
→ choppy voice, calls dropping, poor user experience
With QoS:
VoIP/video (DSCP EF / CS4) ──→ priority queue → forwarded first
Business apps (DSCP AF31) ──→ guaranteed bandwidth queue
Backups/bulk transfers (DSCP BE) ──→ best-effort queue → forwarded last
QoS classification on Cisco IOS:
class-map match-any VOIP
match dscp ef
!
policy-map WAN-QOS
class VOIP
priority 512 ! strict priority queue, 512 kbps reserved
class class-default
fair-queue ! fair queuing for everything else
!
interface Serial0/0/0
service-policy output WAN-QOS
| Optimisation Technique | How It Helps | Typical Application |
|---|---|---|
| QoS / Traffic Shaping | Classifies traffic and allocates guaranteed bandwidth and priority to real-time applications; delays or drops lower-priority traffic during congestion | VoIP, video conferencing, financial transaction systems prioritised over bulk file transfers and backups |
| WAN Compression | Reduces the payload size of data before transmission, increasing effective throughput without adding bandwidth | Text-heavy traffic like XML, HTML, database queries; less effective for already-compressed data (video, images) |
| WAN Optimisation (WAAS) | Caches frequently accessed files locally at the branch; deduplicates data patterns across the WAN; reduces latency for common file server and application traffic | Cisco WAAS; Riverbed Steelhead; reduces effective bandwidth consumption for branch access to central servers |
| Load Balancing / ECMP | Distributes traffic across multiple WAN links simultaneously, increasing aggregate throughput and providing automatic failover | Dual MPLS circuits; MPLS + broadband; SD-WAN multi-link aggregation |
11. WAN Redundancy and Failover Design
WAN redundancy models — from least to most resilient:
Single link (no redundancy):
[Branch] ──── MPLS ──── [HQ]
One link failure = complete outage. Zero redundancy.
Dual-link (primary + backup):
[Branch] ──── MPLS (primary) ──── [HQ]
└─── 4G/LTE (backup) ───┘
If MPLS fails, routing automatically switches to the 4G link.
Configure with floating static routes or tracked objects:
Router(config)# ip sla 1
Router(config-ip-sla)# icmp-echo 10.0.0.1 source-interface Serial0/0/0
Router(config-ip-sla)# frequency 10
Router(config)# ip sla schedule 1 life forever start-time now
Router(config)# track 1 ip sla 1 reachability
Router(config)# ip route 0.0.0.0 0.0.0.0 Serial0/0/0 track 1
Router(config)# ip route 0.0.0.0 0.0.0.0 Cellular0/0 200 ! higher AD = backup
Dual-provider (true geographic redundancy):
[Branch] ──── ISP-A MPLS ──── [HQ DC1]
└─── ISP-B fibre ─── [HQ DC2]
Survives a complete ISP outage or site failure. BGP used for provider redundancy.
SD-WAN active-active multi-path:
[Branch] ──── MPLS ─────────────────┐
──── Broadband Internet ───→ [SD-WAN Controller cloud]──→ [HQ]
──── 4G ────────────────────┘
All three paths active simultaneously; SD-WAN steers traffic intelligently
based on real-time measurements (latency, jitter, loss per link).
12. SD-WAN — Software-Defined WAN
SD-WAN is the most significant evolution in WAN technology over the past decade. It decouples the WAN control plane (management, policy, routing decisions) from the data plane (actual packet forwarding) — following the same software-defined networking principle applied to WANs.
Traditional WAN:
Each router configured independently → manual CLI on every device
Policy changes require visiting or SSHing to every router individually
Traffic engineering requires per-device configuration
SD-WAN:
Central SD-WAN Controller (cloud or on-premises)
↓ (pushes policies automatically)
[Branch vEdge/cEdge router] ← receives policy, enforces locally
[Branch vEdge/cEdge router]
[Branch vEdge/cEdge router]
SD-WAN capabilities:
✓ Centralised management — configure all sites from one dashboard
✓ Multi-link transport — uses MPLS, broadband, and 4G simultaneously
✓ Intelligent path selection — automatically routes VoIP on low-latency
link; bulk data on cheapest link; in real time based on link health
✓ Application-aware routing — recognises Salesforce, Office 365, Teams
by application signature and applies specific policies
✓ Zero Touch Provisioning (ZTP) — new branch router connects, pulls config
automatically from controller; no on-site engineer needed for rollout
✓ Built-in IPsec — all WAN links encrypted by default between all sites
✓ Visibility — real-time dashboards showing per-application, per-link stats
Key vendors:
Cisco Viptela (Cisco SD-WAN) — widely deployed; integrates with Cisco IOS XE
VMware VeloCloud — strong cloud integration
Fortinet SD-WAN — security-focused; integrates with FortiGate firewall
13. Troubleshooting WAN Issues — Cisco IOS Commands
| Symptom | Likely Cause | Diagnostic Command and What to Look For |
|---|---|---|
WAN link shows "down/down" in
show interfaces |
Physical layer problem — no carrier signal; cable unplugged or faulty; CSU/DSU powered off; provider circuit down | show interfaces Serial0/0/0 —
"down/down" = physical issue; contact service
provider; check cable and CSU/DSU power |
| WAN link shows "up/down" | Physical is up (carrier present) but Layer 2 keepalives failing — encapsulation mismatch (one end HDLC, other end PPP); PPP authentication failure; missing keepalives | show interfaces Serial0/0/0 —
check encapsulation type; ensure both ends match;
debug ppp authentication for PPP
auth failures |
| Can ping WAN gateway but cannot reach remote site | Routing issue — missing route, wrong next-hop, ACL blocking traffic | show ip route — verify route to
remote subnet exists; traceroute
[remote-ip] — identify where packets
stop; show access-lists for ACL
matches |
| High latency or packet loss on WAN | Congested WAN link (insufficient bandwidth); provider network issue; QoS misconfiguration | ping [remote] repeat 100 size 1400
— check loss percentage; show interfaces
Serial0/0/0 — check input/output drop
counters; show policy-map interface
for QoS drops |
| IPsec VPN tunnel not establishing | Mismatched IKE parameters; wrong pre-shared key; firewall blocking UDP/500 (IKE) or ESP (protocol 50) | show crypto isakmp sa — check
Phase 1 state; show crypto ipsec sa
— check Phase 2 and packet counters;
debug crypto isakmp for negotiation
details |
| Intermittent connectivity on WAN | Flapping interface (Layer 1 instability); routing protocol adjacency instability; provider network congestion | show logging — look for repeated
%LINK-3-UPDOWN or interface state
change messages; show interfaces
reset counter incrementing |
WAN Troubleshooting Workflow
Layer-by-layer WAN troubleshooting (OSI model bottom-up): Layer 1 — Physical: show interfaces Serial0/0/0 → "down/down" = physical problem (cable, CSU/DSU, provider circuit) → Check LED indicators on CSU/DSU; contact ISP if needed Layer 2 — Data Link: show interfaces Serial0/0/0 → "up/down" = encapsulation mismatch or keepalive failure → Verify: show running-config | include encapsulation → Both ends must have identical encapsulation (HDLC or PPP) Layer 3 — Network: show ip route → Is there a route to the remote subnet? ping [remote-gateway-ip] → Can we reach the other end of the WAN link? traceroute [remote-site-ip] → Where does the path fail? Layer 7 — Application (if layers 1-3 OK): telnet [remote-server] [port] → Can we reach the specific TCP service? → If not: check ACLs, NAT, firewall rules at both ends
See: ping | traceroute | show ip route | show interfaces | show ip protocols | show logging | ACLs | debug commands
14. Exam Tips & Key Points
- A WAN connects multiple LANs across large geographic areas. It operates over service-provider infrastructure rather than organisation-owned equipment.
- Know the two categories of WAN switching: circuit-switched (dedicated path per session — PSTN, legacy) and packet-switched (shared infrastructure — MPLS, Internet, VPN).
- HDLC is Cisco's default serial encapsulation — Cisco-proprietary, no authentication. PPP is open standard, supports CHAP/PAP authentication, multilink, and compression. An encapsulation mismatch causes "up/down" on the serial interface.
- MPLS forwards packets using short fixed-length labels instead of full IP routing table lookups — faster, supports QoS, and provides VPN isolation via VRFs.
- WAN topologies: point-to-point (simple, unscalable), hub-and-spoke (cost-effective, single point of failure at hub), full mesh (maximum redundancy, expensive — n×(n-1)/2 links).
- BGP is the routing protocol of the Internet and is used between autonomous systems. OSPF and EIGRP are used within enterprise WANs (IGPs).
- QoS is critical on WAN links because they are the bandwidth bottleneck. VoIP needs priority queuing (DSCP EF); bulk transfers use best-effort. See QoS Policing & Shaping.
- SD-WAN uses a centralised controller to manage multiple WAN transports (MPLS + broadband + 4G) simultaneously with application-aware intelligent path selection.
- WAN troubleshooting follows the OSI model bottom-up:
physical ("down/down") → encapsulation ("up/down") →
routing (
show ip route) → application (Telnet port test, ACL check).
15. Summary Reference Table
| Topic | Key Detail |
|---|---|
| WAN definition | Network spanning large geographic areas connecting multiple LANs |
| Circuit-switched | Dedicated path per session (PSTN, ISDN) — legacy |
| Packet-switched | Shared infrastructure; packets routed independently (MPLS, Internet) |
| HDLC | Cisco default serial encapsulation; proprietary; no authentication |
| PPP | Open standard; supports CHAP/PAP authentication; multilink; compression |
| up/down on serial interface | Encapsulation mismatch or PPP authentication failure |
| MPLS operation | Labels replace IP lookups; CE/PE/P router roles; supports QoS and VPN |
| Hub-and-spoke | Cost-effective; single point of failure at hub; branch-to-branch via hub |
| Full mesh links formula | n × (n-1) / 2 |
| BGP | Exterior Gateway Protocol; routes between autonomous systems; Internet protocol |
| IPsec VPN phases | Phase 1 (IKE — authenticate + key exchange); Phase 2 (ESP — data encryption) |
| SD-WAN advantage | Centralised control; multi-link active-active; application-aware routing; ZTP |
| Verify WAN interface | show interfaces Serial0/0/0 |
| Verify IPsec VPN | show crypto isakmp sa and show crypto ipsec sa |
WAN Quiz
Related Topics & Step-by-Step Tutorials
Continue your WAN studies:
- WAN Technologies — comprehensive overview of all WAN types
- MPLS — label switching operation, CE/PE/P roles, Traffic Engineering
- DMVPN — dynamic spoke-to-spoke tunnels over hub-and-spoke infrastructure
- DMVPN Phase 1, 2 & 3 (Step-by-Step)
- SD-WAN Overview — centralised control, multi-transport, app-aware routing
- IPsec VPN — site-to-site encrypted tunnels; Phase 1 IKE and Phase 2 SA
- IPsec Basics — ESP, AH, IKE explained
- Site-to-Site IPsec VPN (Step-by-Step)
- GRE Tunnels — encapsulating multicast/routing protocols over WAN links
- Site-to-Site vs Remote Access VPN
- BGP Overview — EGP for inter-AS routing; the Internet routing protocol
- OSPF Overview — most common IGP in enterprise WANs
- OSPF Areas & LSAs — hierarchical design for large WANs
- EIGRP Overview — Cisco proprietary IGP with unequal-cost load balancing
- Floating Static Routes — WAN backup routing with elevated AD
- Default Routes — 0.0.0.0/0 used at WAN edge to reach internet
- QoS Overview — prioritising VoIP and video over congested WAN links
- QoS Policing & Shaping — controlling bandwidth on WAN interfaces
- QoS Queuing — priority queuing, CBWFQ, LLQ for WAN
- NAT Overview — translating private addresses at the WAN edge
- Dynamic NAT — many-to-one translation for internet access
- Firewalls — WAN edge security inspection
- Zone-Based Firewall — stateful IOS firewall for WAN links
- show interfaces — check WAN interface up/down and error counters
- show ip route — verify routes to remote WAN sites
- ping — test WAN reachability
- traceroute — find where WAN path breaks