SD-WAN deployment pitfalls: How to avoid five common challenges
Changing the network architecture is a vital task, and the
entire process can be divided into three stages: planning, deployment
verification, and operational insight. Here are five common challenges that can
go wrong during deployment and operations.
As organizations accelerate their cloud adoption and digital
transformation plans, they begin to realize that traditional network
architectures cannot handle the resulting complex and huge workloads. This in
turn promotes the growth of flexible and powerful SD-WAN deployments, and
analysts predict that the SD-WAN market will grow to more than $8.4 billion by
2025.
Changing the network architecture is a vital task, and the
entire process can be divided into three stages: planning, deployment
verification, and operational insight.
The planning phase is fairly simple, but requires caution:
service performance parameters need to be benchmarked across end users,
applications, networks, and multi-cloud services. Common requirements at this
stage include inventorying and locating all internal applications, cataloging
SaaS and IaaS applications, and appropriately adjusting the scale of MPLS and
Internet connections to accommodate expected traffic. There are some tools on
the market that can help the NetOps team do all this work, because manual
operations are almost impossible.
Once the planning is completed, the actual deployment and
operation begin, and this stage is also the most error-prone stage. The deployment
phase allows visualization of application performance, traffic segmentation,
DSCP, and SD-WAN policies for service provider tunnels, as well as verification
and monitoring of end-to-end application performance behavior.
In this process, NetOps can also use bandwidth consumption,
QoS marking, and SD-WAN policy verification to isolate the problem and find the
root cause to quickly solve the problem. The final stage implements deployment
through visual analysis, custom dashboards, alerts, reports, and rapid
troubleshooting required to properly manage SD-WAN.
Here are five common challenges that can go wrong during
deployment and operations.
Technology patchwork & hodgepodge
For more than two decades, MPLS and Internet connections
have been part of the enterprise WAN, which has led to a hodgepodge of new and
old commands and technologies. This may include statically constructed tunnels,
open ports, forgotten network devices, etc. All these undocumented changes may
expose the organization to migration risks.
It is important to realize that some undocumented changes
may be missed during the deployment process. This is where baseline planning
before and after migration and good visibility tools are essential to identify
traffic patterns and collect the necessary analysis to determine the integrity
after migration.
Poor application performance after migration
Prior to stress testing the network, configuration or policy
issues usually do not appear. This makes verification a key process during
SD-WAN deployment. A good NPMD platform is essential for visualizing before and
after patterns.
For example, after a successful SD-WAN migration, file
sharing performance may be significantly reduced. This is because file sharing
traffic was previously accelerated by edge routers on MPLS connections. When it
is downgraded to a standard Internet circuit and its priority is cancelled At
times, problems such as pauses may occur, and the verification process can help
quickly deal with such problems. In order to find problems quickly, a tool that
can provide a complete end-to-end view of the SD-WAN overlay and transmission
bottom layer is needed.
Unable to verify path selection
SD-WAN relies on path selection, but it is difficult to
verify that the strategy is working as expected. It is necessary to use
site-to-site traffic analysis tools to identify and verify the final path
selection over time, and to visualize when a different transmission method is
selected (and which traffic strategy determines the behavior).
Service provider connections proliferate
Operationally, one of the biggest challenges facing SD-WAN
migration may be the sudden proliferation of managed service providers. With
SD-WAN, each remote site can have its own ISP (including SLA).
More complicated is that although the virtual overlay looks
good, the physical bottom layer is likely to hide a lot of problematic links
and real problems. Therefore, it is important to ensure that the tools used
provide appropriate visibility (preferably for each application, each site, and
each ISP) to determine the performance of each ISP, and to analyze and isolate
specific issues in depth. One point is very important. The indicators to be
monitored include packet loss, delay, jitter, and WAN capacity utilization.
Security policy changes
Inevitably, the new SD-WAN requires a different security
strategy from traditional networks. For example, SD-WAN allows encryption when
traffic moves from one site to another, and allows network segmentation for
layered protection. Therefore, everything from employee and visitor access, to
the creation of a DMZ, to Internet access, to the construction of site-to-site
connections, all things may need to be reviewed. In addition, it is also very
important to ensure that audit data is captured and policy verification is
performed to ensure that the network operates in accordance with the expected
security (and performance).
If deployed and managed properly, SD-WAN can bring
unquestionable value to the organization. Understanding these stumbling blocks
on the road to deployment and using appropriate tools to help avoid these
challenges is the key to success.