What is SD-Branch?
SD-Branch (Software-Defined Branch) is Aruba’s approach to simplify and secure the connectivity and operations of distributed branch offices. It combines branch gateways, cloud-based management, and intelligent traffic routing.
BGWs are hardware devices placed at each branch site.
They automatically register with Aruba Central (cloud management platform) as soon as they come online.
Once registered, BGWs build secure IPsec tunnels back to central data centers or cloud services.
Security of the tunnels:
Uses IKEv2 (Internet Key Exchange Version 2) for setting up the tunnel.
Encrypts traffic using AES-GCM 256-bit, which is part of Suite B cryptography, approved for sensitive environments.
Aruba SD-Branch can connect to multiple WAN uplinks like:
MPLS (Multi-Protocol Label Switching) — reliable but expensive.
Internet broadband — high bandwidth, low cost.
LTE/5G — backup or remote area access.
Dynamic Path Selection evaluates:
Jitter: variation in packet arrival time
Latency: delay in packet delivery
Loss: packet drops
It uses these real-time metrics to choose the best available link for each application.
Example:
Voice traffic may prefer MPLS for stability.
YouTube traffic may use broadband to save MPLS bandwidth.
All traffic rules, segmentations, and failover logic are defined centrally in Aruba Central.
Policies can be pushed to all branch gateways from the cloud—no need to manually configure every site.
Central also enforces:
VLAN and segment mapping
Firewall and application control rules
Failover priorities and thresholds
IPsec (Internet Protocol Security) encrypts traffic between two endpoints—like branch gateways and a headend gateway.
Aruba implements Suite B cryptography:
ECDSA (Elliptic Curve Digital Signature Algorithm) for key exchange and authentication.
AES-256-GCM for data encryption.
Why it matters:
Even if an attacker intercepts the data traveling over the internet, they can’t read or modify it.
Aruba uses user roles to define what devices can and cannot access—even across the WAN.
These roles are persistent, meaning they travel with the user/device from site to site.
Example:
A guest device always gets internet-only access, even if it connects from a different branch.
A corporate device keeps its full access role no matter the location.
Traffic inspection happens at the headend gateway (central data center or security point). This ensures policies are centrally enforced and consistent.
Aruba branch gateways constantly monitor link health:
If a link performs poorly, Aruba can:
Reroute traffic
Adjust application flows
Log alerts in Aruba Central
This ensures business-critical applications (like Zoom or Microsoft Teams) always use the most reliable path.
Not all users are inside the office. Aruba offers secure access options for users working remotely or from personal devices.
VIA is Aruba’s VPN client software.
Available for:
Windows
macOS
iOS
Android
How it works:
User launches the VPN client.
VIA authenticates with ClearPass using:
EAP-TLS (certificate-based)
SAML (single sign-on with cloud identity like Azure AD)
Before connecting, VIA can also check:
Antivirus status
Disk encryption
Firewall enablement
This is called posture checking—only healthy, secure devices are allowed to connect.
Some Aruba customers integrate Aruba ClearPass with third-party ZTNA platforms (e.g., Zscaler, Palo Alto).
These platforms allow users to access apps via a browser, without installing a VPN client.
Identity federation lets ClearPass share user roles and device posture with the ZTNA provider.
Microsegmentation enforcement ensures:
Each user/device gets access only to what they need, not the full network.
Sensitive apps are isolated from guests or unknown devices.
VIA (Virtual Intranet Access) is Aruba’s VPN client for remote users, providing secure connectivity back to the enterprise network.
VIA can be preconfigured to auto-connect when the device:
Is outside the corporate network
Detects untrusted Wi-Fi
Configuration is delivered via:
Aruba Central
Microsoft GPO or MDM (for enterprise deployment)
Trusted Network Detection: Avoid VPN use on known safe networks (e.g., office SSID)
Always-On VPN: Force tunnel even if local Wi-Fi is “safe”
Auto-Failover: If the primary VPN gateway is unreachable, VIA retries backup gateways from a prioritized list
Ensures always-available access
Enables policy continuity even during home Wi-Fi or mobile transitions
Minimizes user intervention and support calls
Zero Trust Network Access (ZTNA) aims to verify every user and device continuously, even post-authentication.
While ZTNA enforcement might be handled by third-party platforms (e.g., Zscaler, Palo Alto), Aruba Central plays a key observability and orchestration role.
Identity Federation Logs:
Microsegmentation Insight:
Event Correlation:
Matches login events, access attempts, and posture results with:
Threat alerts
Gateway decisions
Enforcement outcomes
Log Streaming:
Central can forward logs and telemetry to:
SIEM (e.g., Splunk, ArcSight)
SOAR for response automation
Third-party ZTNA dashboards
ZTNA isn’t only about blocking access—it’s about continuous monitoring and decision logic, and Aruba Central is central to that real-time coordination.
Dynamic Path Selection enables branch gateways to intelligently route traffic over the best WAN uplink based on real-time link quality.
Latency (ms)
Jitter (variation in latency)
Packet loss (%)
Link state and availability
Administrators can define thresholds to trigger path failover or traffic shifting, e.g.:
Jitter > 30ms for 3 consecutive intervals → fail to secondary WAN
Loss > 2% over 5 seconds → shift voice traffic to MPLS
Aruba SD-WAN supports Deep Packet Inspection (DPI) to classify applications.
Admins can bind apps to specific WAN paths:
Voice and video → MPLS (for guaranteed low latency)
Office 365, YouTube → Broadband
IoT telemetry → LTE backup
Application Category: Real-Time Collaboration
Matching Apps: Zoom, Microsoft Teams
Preferred Path: MPLS
Failover Trigger: Jitter > 25ms OR Loss > 1%
Fallback Path: Internet broadband
Critical apps always take the best possible path
Non-critical traffic offloads to lower-cost links
Ensures optimal user experience and cost control
| Topic | Benefit | Aruba Implementation |
|---|---|---|
| VIA Auto-Connect & Failover | Improves user experience and connection resilience | VIA client profile + gateway redundancy |
| ZTNA Visibility in Central | Centralized control and monitoring of identity, posture, access | Federation logs + event correlation + telemetry |
| Dynamic Path Selection (Advanced) | Fine-grained routing based on jitter/loss per application | Application-aware routing + failover thresholds |
What is the primary purpose of using IPsec in WAN security?
IPsec encrypts network traffic between sites to protect data from interception.
IPsec is commonly used to secure communications across untrusted networks such as the internet. It provides confidentiality through encryption, integrity through hashing, and authentication between communicating devices. In campus networking deployments, IPsec tunnels are frequently used to connect branch offices, remote networks, or cloud services to the main campus infrastructure. By encrypting packets before transmission, IPsec prevents attackers from reading sensitive information even if they intercept the traffic.
Demand Score: 75
Exam Relevance Score: 90
Why must both sides of an IPsec tunnel agree on encryption parameters?
Because mismatched encryption settings prevent the tunnel from being established.
During VPN negotiation, both devices must agree on parameters such as encryption algorithm, hashing method, and authentication settings. These parameters are defined in security policies used during the Internet Key Exchange (IKE) process. If the configurations do not match, the devices cannot establish a secure tunnel because they cannot agree on how traffic should be encrypted and verified. Many VPN troubleshooting cases occur due to mismatched proposals or incompatible security settings.
Demand Score: 71
Exam Relevance Score: 88
What security advantage does encrypting WAN traffic provide?
It prevents attackers from reading sensitive data transmitted across public networks.
When organizations transmit data across the internet, the traffic may pass through multiple untrusted networks. Without encryption, attackers could capture packets and analyze their contents. Encryption ensures that intercepted packets cannot be understood without the correct decryption keys. This protects sensitive information such as login credentials, internal communications, and business data. WAN encryption is therefore a critical part of securing communications between distributed network locations.
Demand Score: 70
Exam Relevance Score: 86