SD-WAN overlay design is about how you structure your network to optimize traffic flow, ensure reliability, and secure data transmission. It combines network topology, tunneling protocols, and application-specific configurations to create an efficient and high-performing SD-WAN setup.
The topology defines how SD-WAN devices (branch sites, data centers, and hubs) are connected to each other. Two common designs are Hub-and-Spoke and Full-Mesh.
Tunneling is used to securely connect SD-WAN endpoints, enabling reliable and encrypted communication.
SD-WAN can prioritize and optimize traffic based on application requirements, ensuring critical business apps receive the best network resources.
Monitor Network Performance Regularly
Consider Redundant Links
Optimize Topology Based on Business Needs
Leverage Dynamic Tunnels
Test and Validate Configurations
Designing an efficient SD-WAN overlay requires more than just choosing between Hub-and-Spoke or Full-Mesh topologies. Additional factors such as hybrid topology, security, high availability (HA), and WAN optimization strategies must be considered to ensure a resilient, secure, and high-performance network.
Hybrid topology combines the advantages of both Hub-and-Spoke and Full-Mesh architectures, allowing organizations to optimize network performance while maintaining centralized control.
Hub-and-Spoke for General Traffic
Full-Mesh for High-Priority Traffic
Combines management simplicity (Hub-and-Spoke) with performance efficiency (Full-Mesh).
Reduces latency for critical applications by enabling direct communication between branches.
Optimizes bandwidth usage by dynamically choosing between hub-based and direct paths.
Requires advanced routing and SD-WAN policies to manage hybrid traffic.
Complex dynamic VPN tunnel management (e.g., ADVPN must be properly configured).
Security is a critical component of SD-WAN overlay design, as SD-WAN devices operate over the public internet and multiple ISPs.
Example Implementation:
config firewall policy
edit 10
set srcintf "sd-wan"
set dstintf "sd-wan"
set srcaddr "Branch1_Subnet"
set dstaddr "Branch2_Subnet"
set action accept
set schedule always
set service ALL
set authentication enable
next
end
Example: Enabling IPsec Encryption for SD-WAN VPN
config vpn ipsec phase1-interface
edit "Branch1-to-Branch2"
set interface "wan1"
set proposal aes256-sha256
set dhgrp 14
next
end
Example: Enabling DDoS Protection
config firewall DoS-policy
edit 1
set interface "wan1"
set srcaddr all
set dstaddr all
set service ALL
set action block
set anomaly "tcp_syn_flood"
set status enable
next
end
Protects data and network integrity in public internet-based WANs.
Prevents unauthorized access to SD-WAN edge devices.
Reduces attack risks with proactive monitoring and threat detection.
SD-WAN deployments require redundancy at multiple levels to ensure seamless failover and prevent downtime.
Example: VRRP Configuration
config system interface
edit "wan1"
set vrrp enable
set vrrp-virtual-mac enable
set vrrp-group 1
set vrrp-priority 100
set vrrp-ip "192.168.1.1"
next
end
Prevents SD-WAN downtime in case of ISP or hardware failures.
Ensures seamless failover and session persistence.
Improves WAN reliability and service availability.
SD-WAN overlay performance can be improved with specific optimization techniques to enhance throughput and reduce latency.
Improves application performance over lossy WAN connections.
Enhances end-user experience for cloud and SaaS applications.
Optimizes bandwidth usage and prevents congestion.
What is the primary purpose of the hub device in a hub-and-spoke SD-WAN topology?
The hub acts as a central gateway that establishes and manages IPsec tunnels with branch spokes.
In a hub-and-spoke SD-WAN architecture, branch sites (spokes) establish IPsec tunnels to a central hub device. The hub provides connectivity between branches and often hosts shared resources such as data center applications or internet access. All branch-to-branch communication initially passes through the hub. This topology simplifies routing and security management because all spokes connect to a single central point. It is commonly used in enterprise WAN deployments where branches require centralized security inspection or access to corporate resources located in the data center.
Demand Score: 78
Exam Relevance Score: 92
What problem does ADVPN solve in traditional hub-and-spoke SD-WAN designs?
It eliminates the need for all branch-to-branch traffic to pass through the hub.
In traditional hub-and-spoke VPN networks, traffic between branch sites must first travel to the hub and then back out to the destination branch. This creates additional latency and unnecessary bandwidth usage at the hub. ADVPN (Auto-Discovery VPN) allows branches to dynamically establish direct tunnels with each other after initial communication through the hub. These direct tunnels are called shortcuts. By enabling shortcuts, ADVPN improves network efficiency, reduces latency, and decreases load on the hub device. This design is particularly useful for large SD-WAN deployments where branch-to-branch traffic is common.
Demand Score: 84
Exam Relevance Score: 95
Which component in ADVPN acts as the central route reflector and tunnel coordinator?
The ADVPN hub.
In an ADVPN deployment, the hub performs multiple roles. It acts as the route reflector that distributes routing information to branch spokes and coordinates shortcut tunnel creation between spokes. When a spoke attempts to communicate with another spoke, the hub initially handles the traffic and then instructs the spokes to establish a direct IPsec shortcut tunnel. After the shortcut is created, traffic flows directly between the spokes instead of passing through the hub. This mechanism allows the network to retain the simplicity of hub-and-spoke topology while gaining the performance benefits of dynamic mesh connectivity.
Demand Score: 80
Exam Relevance Score: 94
What routing protocol is commonly used with ADVPN deployments to distribute routes between spokes?
BGP is most commonly used.
BGP is frequently used with ADVPN because it scales well in large SD-WAN environments and supports route reflection through the hub. In this design, the hub typically acts as a BGP route reflector while branch spokes operate as BGP clients. The hub distributes route information between spokes, enabling them to learn about each other’s networks. When traffic flows between branches, ADVPN can dynamically establish shortcut tunnels based on this routing information. Using BGP with ADVPN allows the network to scale to hundreds or thousands of sites while maintaining efficient route propagation and traffic steering.
Demand Score: 75
Exam Relevance Score: 90
Why is ADVPN considered more scalable than a full mesh VPN topology?
Because tunnels are created dynamically only when needed.
In a full mesh VPN topology, every site must maintain tunnels with all other sites. As the number of sites increases, the number of tunnels grows exponentially, making the network difficult to manage. ADVPN solves this scalability problem by creating tunnels dynamically between spokes only when traffic requires them. This means the network initially operates like a hub-and-spoke topology, but direct tunnels are formed automatically when branches communicate. Once the traffic stops, those shortcuts can be removed. This on-demand tunnel creation allows large SD-WAN networks to scale efficiently without the configuration complexity of a full mesh design.
Demand Score: 76
Exam Relevance Score: 91