03-SD-WAN Design Principles
03-SD-WAN Design Principles
When designing your Secure SD-WAN Solution, we recommend that you utilize the following
Five-Pillar Approach. The Five-pillar approach, described in the SD-WAN / SD-Branch
Architecture guide, which is recommended when designing a secure SD-WAN solution.
Underlay:
Determine the WAN links that will be used for the underlay network, such as your broadband
link, MPLS, 4G/5G LTE connection, and others. For each link, determine the bandwidth, quality
and reliability (packet loss, latency, and jitter), and cost. Use this information to determine
which link to prefer, what type of traffic to send across each link, and to help you the baselines
for health-checks.
Overlay:
VPN overlays are needed when traffic must travel across multiple sites. These are usually site-
to-site IPsec tunnels that interconnect branches, datacenters, and the cloud, forming a hub-
and-spoke topology. The management and maintenance of the tunnels should be considered
when determining the overlay network requirements. Manual tunnel configuration might be
sufficient in a small environment, but could become unmanageable as the environment size
increases. ADVPN can be used to help scale the solution; see ADVPN for more information.
Routing:
Traditional routing designs manipulate routes to steer traffic to different links. SD-WAN uses
traditional routing to build the basic routing table to reach different destinations, but uses SD-
WAN rules to steer traffic. This allows the steering to be based on criteria such as destination,
internet service, application, route tag, and the health of the link. Routing in an SD-WAN
solution is used to identify all possible routes across the underlays and overlays, which the
FortiGate balances using ECMP.
In the most basic configuration, static gateways that are configured on an SD-WAN member
interface automatically provide the basic routing needed for the FortiGate to balance traffic
across the links. As the number of sites and destinations increases, manually maintaining routes
to each destination becomes difficult. Using dynamic routing to advertise routes across overlay
tunnels should be considered when you have many sites to interconnect.
Security:
Security involves defining policies for access control and applying the appropriate protection
using the FortiGate's NGFW features. Efficiently grouping SD-WAN members into SD-WAN
zones must also be considered. Typically, underlays provide direct internet access and overlays
provide remote internet or network access. Grouping the underlays together into one zone,
and the overlays into one or more zones could be an effective method.