Cisco SD-WAN
Cisco SD-WAN
Quan Dinh
EN Specialist Engineer
[email protected]
Dec 2019
Agenda
What is SD-WAN
SD-WAN Architecture
SD-WAN Terminology
Deployment Models
SD-WAN Platforms
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Cisco Digital Network
Architecture (Cisco DNA)
Why an intent-based
network?
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
1. Closed and hardware-centric models are giving way to open, programmable and
software-centric platforms that integrate with applications, systems and domains
beyond the network.
2. Manual, repetitive command-line-interface-driven management is being largely
superseded by policy-based automation.
3. Perimeter-based, reactive security has been supplanted by network-embedded,
context-based security that reaches from the cloud to the enterprise edge.
4. Simple network visibility is morphing to predictive and contextual analytics for
users, devices, applications, things and the network at all points in time.
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Cisco’s new architecture
is integrated to
interconnect
EVERY domain of
the expanded
enterprise
IOT CAMPUS BRANCH DC CLOUD SP SECURITY
ONLY CISCO
© 2019 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Each Domain Must Support Its Unique Role
SD-Access SD-WAN ACI
Cisco DNA Center Cisco vManage Cisco APIC
Public Cloud
Cisco ACI
Anywhere
Users
SaaS
Cisco Applications
Cisco Cloud edge
SD-Access SD-WAN
Internet
Things
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
100+ Global Enterprise Customers Across Verticals
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
SD-WAN Architecture
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
SD-WAN Architecture
Part 1:
Evolution from a Single Device to a Distributed Architecture
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Routin Routed
g packet
packet
RIB FIB
Next hop
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
MPLS,
INET,
3G,
LTE…
vSmart
Controllers
vEdge
Routers
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Integrated Control and Data Plane
O(n^2) Control Complexity
Limited Scale 6000 Network Control Plane
Routing
Tables Only 4
Routing
tables
3rd Party
vAnalytics • Orchestrates control and
Automation
management plane
vBond • First point of
authentication (white-list
vSmart model)
Controllers
• Distributes list of vSmarts/
MPLS 4G vManage to all vEdge
INET routers
vEdge • Facilitates NAT traversal
Routers
• Requires public IP Address
[could sit behind 1:1 NAT]
Cloud Data Center Campus Branch SOHO • Highly resilient
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Cisco SD-WAN Solution Elements
Management Plane
Management Plane
vManage
Cisco vManage
APIs
• Single pane of glass for
3rd Party
vAnalytics Day0, Day1 and Day2
Automation
operations
vBond • Multitenant with web scale
• Centralized provisioning
vSmart
Controllers • Policies and Templates
4G
• Troubleshooting and
MPLS
Monitoring
INET
vEdge • Software upgrades
Routers • GUI with RBAC
• Programmatic interfaces
Cloud Data Center Campus Branch SOHO (REST, NETCONF)
• Highly resilient
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
vAnalytics Value
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
vAnalytics Main Characteristics
Network Centric Application/Flow Centric
• Site Availability • Based on DPI and cflowd
• Network Availability • Bandwidth Usage
- Top sources, destinations apps
• Site Usage Analysis
- Per-Site basis
- Top sites by bandwidth consumption
- Historical bandwidth consumption • Application Performance
- Application to tunnel binding and
• Carrier Performance performance information
- Approute stats on a per-carrier basis
- Carriers health ranking
• Anomaly Detection
- Baseline of application usage
- Anomaly detection based on
overall application usage (by
application family, by site)
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
vAnalytics Dashboard
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
SD-WAN Platforms
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Controllers
Deployment Methodology
On-Premise Hosted
vBond vManage vSmart vSmart vBond vManage vSmart vSmart
VM VM
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
SD-WAN Platforms
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
vEdge-100 Routers
Hardware Specification
vEdge 100m vEdge 100mw
vEdge 100
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
vEdge Cloud Virtual Routers
Deployment Methodology
On-Premise Hosted
vEdgeCloud vEdgeCloud vEdgeCloud vEdgeCloud vEdgeCloud vEdgeCloud
VM Throughput: VM
Physical Server 2x vCPU 500Mb/s
4x vCPU 1Gb/s
8x vCPU 1.5Gb/s
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Control Plane Bring up
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
1
2
vBond
3
DTL
S 1. Automated Control
Plane Bring up (Cisco)
6 5 2. Register Customer to
Which Controller PNP Connect (ZTP
and NMS you Server)
DTLS/ 3. Re-direct and
belong to
(DTLS) 7 TLS connecto to vBond
4. Edge devices will
connect to the
Controller
4
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Data Plane Bring up
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Key Exchange
Server
IPSec/GRE
For Routed Traffic Asymmetric
Encryption
Key Exchange
P P’ D’
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
SD-WAN Terminology
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
SD-WAN Terminology
Part 2:
OMP, DTLS/TLS, Site ID, Reserved VPNs, Transport and Service Sides
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Transport Locators (TLOCs)
vSmarts advertise TLOCs
vSmart to all vEdges*
(Default)
Full Mesh
SD-WAN Fabric TLOCs advertised to vSmarts
(Default)
vEdge
Local TLOCs
(System IP, Color, Encap)
vEdge vEdge
vEdge vEdge
* Can be influenced by the control policies
Transport Locator (TLOC) OMP IPSec Tunnel
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Transport Colors
T3 T1 T2 T3
Public T1 T2
T4 T4
Public
T1 T3 T1 DMZ T3
vEdge vEdge vEdge vEdge
T2 Privat T4 T2 T4
e Privat
T1, T3 – Public Color T2, T4 – Private Color e
T1, T3 – Public Color T2, T4 – Private Color
T1 T3 T2 T4 T1 T3 T2 T4
T1 T4 T2 T3 T1 T4 T2 T3
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Agenda
Part 3: MultiTenancy
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Deployment Options
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
MultiTenancy
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Technology Deep Dive
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Agenda
Zero-Trust Fabric
Fabric Operation
Application Traffic Security
Application Experience and QoS
Multicast
Cloud Adoption
High Availability
Operational Simplicity and Transparency
Analytics
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Zero Trust Fabric
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
vEdge Router Identity
During Manufacturing
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Viptela Fabric Terminology
• Overlay Management Protocol – Control plane protocol distributing reachability,
security and policies throughout the fabric
• Transport Locator (TLOC) – Transport attachment point and next hop route
attribute
• Color – Control plane tag used for IPSec tunnel establishment logic
• System IP – Unique per-device (vEdge and controllers) IPv4 notation identifier. Also
used as Router ID for BGP and OSPF.
• Organization Name – Overlay identifier common to all elements of the fabric
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Overlay Management Protocol (OMP)
vSmart • TCP based extensible control plane protocol
• Runs between vEdge routers and vSmart
controllers and between the vSmart
controllers
- Inside TLS/DTLS connections
• Leverages address families to advertise
vSmart vSmart
reachability for TLOCs, unicast/multicast
destinations (statically/dynamically learnt
service side routes), service routes (L4-L7),
BFD stats (TE and H-SDWAN) and Cloud
onRamp for SaaS probe stats (gateway)
- Uses attributes
vEdge vEdge
• Distributes IPSec encryption keys, and data
Note: vEdge routers need not connect to all vSmart Controllers and app-aware policies (embedded
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential NETCONF)
Network-wide Control Plane
Viptela SD-WAN Traditional
Data Plane + Local Control Plane Integrated Control and Data Plane
O(n) Control Complexity O(n^2) Control Complexity
High Scale Limited Scale
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Bidirectional Forwarding Detection (BFD)
vEdge
• Path liveliness and quality measurement
detection protocol
- Up/Down, loss/latency/jitter, IPSec tunnel
MTU
• Runs between all vEdge and vEdge Cloud
vEdge vEdge
routers in the topology
- Inside IPSec tunnels
- Operates in echo mode
- Automatically invoked at IPSec tunnel
establishment
- Cannot be disabled
Full Mesh
SD-WAN Fabric TLOCs advertised to vSmarts
(Default)
vEdge
Local TLOCs
(System IP, Color, Encap)
vEdge vEdge
vEdge vEdge
* Can be influenced by the control policies
Transport Locator (TLOC) OMP IPSec Tunnel
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Transport Colors
T3 T1 T2 T3
Public T1 T2
T4 T4
Public
T1 T3 T1 DMZ T3
vEdge vEdge vEdge vEdge
T2 Privat T4 T2 T4
e Privat
T1, T3 – Public Color T2, T4 – Private Color e
T1, T3 – Public Color T2, T4 – Private Color
T1 T3 T2 T4 T1 T3 T2 T4
T1 T4 T2 T3 T1 T4 T2 T3
SLA SLA
Core
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Policy Framework
vManage
NETCONF/YANG
OMP
OMP OMP
Update Update Loca
Loca
l
l
Transport1
y2
y1
Ke
Ke
Transport2
y1
vEdge vEdge
y2
Ke
Ke
Remote
Remote Traffic Encrypted with
Keys 2
Traffic Encrypted with AES256-GCM
Keys 1 Control Plane
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Data Plane Integrity
vBond discovers vEdge public IP vSmart vEdge computes AH value
Controllers
address, even if traverses NAT based on the post NAT public IP
vBond communicates public IP Packet integrity (+IP headers) is
to the vEdge preserved across NAT
OMP OMP
Update Update
Transport1
vEdge vEdge
Transport1
TLOCs TLOCs
VPN1 VPN2 Transport2 VPN1 VPN2
BGP, OSPF, BGP, OSPF,
Connected, Connected,
Static A B C D Static
Subnets Subnets
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Application Traffic
Security
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Cisco SD-WAN VPNs
vEdge Router Security Zones
IF, IF,
Sub-IF Sub-IF
MPLS
Service Transport
(VPNn) (VPN0)
IF, IF,
Sub-IF Sub-IF
INET
Management
• VPNs are isolated from each other, each
(VPN512)
VPN has its own forwarding table
IF • Reachability within VPN is advertised by
the OMP
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
End-to-End Segmentation
VPN 1
Interface VPN1 SD-WAN VPN1 Interface
IPSec VPN 2
VLAN VPN2 Tunnel VPN2 VLAN
VPN 3
Ingress Egress
vEdge vEdge
• Segment connectivity across fabric • Labels are used to identify VPN for
w/o reliance on underlay transport destination route lookup
• vEdge routers maintain per-VPN • Interfaces and sub-interfaces (802.1Q
routing table tags) are mapped into VPNs
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Arbitrary VPN Topologies
Full-Mesh Hub-and-Spoke
vSmart vManage
vEdge
Data Policy
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Application Experience
and QoS
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Application Visibility and Recognition
Cloud
Data Center App 1
App 2
App 3,000
Data Center vEdge Router
MPLS 4G
INET
App Firewall
Small Office
Home Office Traffic prioritization
Campus
Transport selection
Branch
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
vEdge Router QoS
Data Policy
vManage Classification of application traffic into
QoS forwarding classes (queues)
vSmart
Internet
Remote Site
1
Path
MPLS Regional
Path 2 Data Center
Path 4G LTE
3
Path1: 10ms, 0% loss, 5ms
jitter
Path2: 200ms, 3% loss, 10ms IPSec Tunnel
© 2017 jitter
Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Transport1
Network Path
MTU Discovery
Host Path AES256-GCM
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential MTU Discovery Control Plane
TCP Optimization
Optimized
TCP Connections TCP Connection (Cubic) TCP Connections
SD-WAN
Fabric
Users vEdge vEdge Servers
High Latency Path
• High latency path between users and • Optimized TCP connection uses
applications, i.e. geo-distances selective acknowledgement to prevent
unnecessary retransmissions and large
• vEdge routers terminate TCP sessions
initial TCP window size to maximize
and provide local acknowledgements
- Hosts don’t have to wait for end-to-
throughput
end TCP ACKs and pause TCP • Hosts using older TCP/IP stacks will see
transmission the most benefit
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Multicast
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Multicast Traffic Flow
vEdges interoperate with IGMP v1/v2 and Replicators advertise themselves using
PIM on the service side OMP
vEdges advertise receiver multicast groups Replicators replicate multicast stream to
using OMP receivers as learnt through OMP
vEdge cannot be RP. Router is required.
- If running SSM, RP is not needed vSmart
Controllers
OMP
Update
IGMP/PIM OMP
Update
OMP OMP
Update Update Sender
Receiver Branch
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential Replicators Control Plane Multicast Stream
Cloud Adoption
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Direct Internet Access
• Can use one or more local DIA exits or
Internet backhaul traffic to the regional hub
through the SD-WAN fabric and exit to
Internet from there
- Per-VPN behavior enforcement
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Site Redundancy - Routed
Redundant pair of vEdge routers operate in
active/active mode
SD-WAN
Fabric vEdge routers are one or more Layer 3 hops
away from the hosts
Standard OSPF or BGP routing protocols are
running between the redundant pair vEdge
vEdge A OS
vEdge B routers and the site router
PF GP
/B F /B
GP
O
SP Bi-directional redistribution between OMP and
OSPF/BGP and vice versa on the vEdge
Site
Router routers
- OSPF DN bit, BGP SoO community
Site router performs equal cost multipathing
for remote destinations across SD-WA Fabric
Host - Can manipulate OSPF/BGP to prefer one vEdge
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
router over the other
Site Redundancy - Bridged
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Control Redundancy - vSmart
vSmart
vSmart controllers exchange OMP
Controllers messages between themselves and they
Control have identical view of the SD-WAN fabric
Plane
Data Plane vEdge routers connect to upto three
vSmart controllers for redundancy
Cloud
Single vSmart controller failure has no
Data Center impact, as long as there is another
vSmart controller vEdge routers are
registered with
Data Center If all vSmart controllers fail or become
MPLS 4G
INET unreachable, vEdge routers will continue
operating on a last known good state for
Small Office
Home a configurable amount of time (min of
Office Campus re-key timer and GR timer)
Branch
- No updates to reachability
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential - No IPSec rekey
- No policy changes propagation
Control Redundancy - vManage
vManage vManage servers form a cluster for
Cluster
redundancy and high availability
Management
Plane
Data Plane All servers in the cluster act as
active/active nodes
- All members of the cluster must be in
Cloud the same DC / metro area
Data Center
For geo-redundancy, vManage servers
operate in active/standby mode
Data Center - Not clustered
MPLS 4G
- Database replication between sites is
INET
needed
Small Office Loss of all vManage servers has no
Home
Office Campus
impact on fabric operation
- No administrative changes
Branch
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
- No statistics collection
Operational Simplicity
and Transparency
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Centralized Operations and Tenancy
Multi-Tenancy A B A+B
Dedicated VPN
Tenancy Tenancy
Enterprise
Tenancy
Tenant Tenant
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential B A Control Plane
Simplified Management
Single Pane Of Glass Operations Rich Analytics
Power Tools
Re orc
dir
2 3
ztp
at l
ic tro
ec hest
n
Qu tela
io
5
un on
tt
.vi
ery .co
m c
an tio e
o c ator
p
vM ra ic
m ial
ag n
Full Registration and
v
1
e
orp
co Init
m figu de
r
to m
Configuration
fro n l
ora
co itia
4
In
te
Assumption:
• DHCP on Transport Side (WAN)
• DNS to resolve ztp.viptela.com*
vEdge
* Factory default config Delivered as-a-Service
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Zero Touch Provisioning – vEdge Cloud
Control and Policy
vManage Elements
1
Cloud-Init
VM
at l
3
ic tro
n
Provisionin
io
5
un on
g Tool
m c
an tio e
vM ra ic
m ial
ag n
Full Registration and
v
2
e
co Init
m figu de
De
plo Configuration
fro n l
y
co itia
VM
4
In
Assumption:
• DHCP on Transport Side (WAN)
vEdge Cloud
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Centralized Device Configuration
Enforcement
• Centralized Feature Templates
• Enforces configuration
compliance
• Self-recover on misconfiguration
• Feature Configuration
with Variables
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Zero-Trust Admission Control
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Path Performance
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Troubleshooting
• Basic connectivity troubleshooting
with ping and traceroute from any
vEdge in the topology to any
destination
• Advance troubleshooting with real-
time queries against vEdge routers
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Centralized Software Upgrades
Failed
2 Upgrade
• All software upgrades are performed
centrally from vManage
• One or two stage upgrade
Activate Active Software A Rollback
- Load software and reboot now
Available Software B
1 3 - Load software and reboot later
Available Software C
Available Software D • Self-healing on upgrade failure
- Device will revert to the last good
image
• There is no requirement to run the
same software version on all
elements
vEdge
- Controllers should have higher software
version than routers
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Role Based Access Control (RBAC)
• Enforce segregation of
administrative responsibilities
• Create user groups to control
access to the GUI elements
- Assign read and write
permissions
• Create local user repository or
link to centralized LDAP/AD
• Map users into the user groups
- Users can belong to multiple
user groups
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Migration and
Deployment Models
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Migration Sequence
vManage
vSmar vBon
t d
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Typical Migrations
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
SD-WAN Transition Strategy
Site B Site B Site B
Non- Non-
SDWAN SDWAN SDWAN SDWAN SDWAN SDWAN
vEdge Router
Switch INET
WiFi APs
Cisco SD-WAN Fabric
4G
(Backup)
Stores Distro CentersField Offices Stores Distro Centers GS Stores Field Offices
Gold
(Single MPLS, Single Broadband)
Silver
(Dual Broadband)
Bronze
(Single Broadband)
MPLS
Cisco SD-WAN
vEdge Router
Switch
INET
Large Medium Medium Small Large Medium Medium Small Medium Small
MPLS2
INET
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Cisco SD-WAN Case Study
Reece Group
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Challenges
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Cisco Team Offer
• Rapid deployment of branch locations
• Improved business return on network investment and technical staff
• Secure and scalable platform to enable enhanced in-store services
• Improved branch availability and bandwidth utilization to improve
end user application experience
What they're saying
"With Cisco SD-WAN, my life as a network
administrator is significantly easier. To deploy new
configurations and policy changes across the entire
network, what would have taken a very long time
previously, touching many devices individually, now
takes a matter of minutes."
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Cisco SD-WAN Case Study
Riedel Networks
Who is Riedel Networks
Riedel Networks was founded in 2005 when a Formula 1 team needed a simpler,
more cost-effective networking solution for its car telemetry data. Since then, this
subsidiary of Riedel Communications has shifted its focus to providing clients with
high-performance MPLS VPNs. When the company wanted to solidify its
networking business without hurting MPLS sales, it partnered with Cisco to
provide its customers with SD-WAN.
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Challenges
multitenancy
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Cisco Team Offer
• Attracted new business and offered more products to existing MPLS
clients
• Achieved substantial cost savings for customers who chose a hybrid
network model
• Projects 25-30 percent annual growth over the next five years
What they're saying
"SD-WAN is making our portfolio of networking
services more appealing. The more we can offer on
top of our existing infrastructure, the likelier we are
to bring in new customers and to retain existing
ones. SD-WAN is a value-add that will ensure
Riedel Networks' growth."
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Cisco SD-WAN All Case Studies
https://www.cisco.com/c/en/us/solutions/enterprise-networks/network-architecture-
customer-success-stories.html?flt2_general-table0=Cisco%20SD-WAN
Backup Slides
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential
Zero Touch Provisioning
Administrator Installer
ZTP
Identity Trust
Server
vManage
DHCP
vEdge
Identity
vSmart vBond (X.509)
© 2017 Cisco and/or its affi liates. All rights reserved. Cisco Confidential