SprintGrad | SD-WAN Mastery Course
7.

Is SprintGrad's SD-WAN Mastery Course Aligned with Industry Standards?

Up-to-date curriculum Tailored to the Evolving Modern WAN Landscape.
Module - 1

SD-WAN Foundations and Business Drivers

Module - 2

Cisco SD-WAN Architecture and Components

Module - 3

Deployment, Provisioning, and Configuration

Module - 4

Control Plane Operations and OMP Routing

Module - 5

Centralized Control Policies

Module - 6

Centralized Data Policies & Service Insertion

Module - 7

Application-Aware Routing (AAR)

Module - 8

SD-WAN Security

Module - 9

Cloud Connectivity & Advanced Optimization

Module - 10

Localized Policies and QoS

Module - 11

SD-WAN Design and Migration

1.1 The State of Today’s Networks
  • Challenges of modern networks
1.2 Business and IT Trends Impacting the WAN
  • Common business and IT trends affecting the WAN
1.3 Desired Benefits and Outcomes
  • Benefits sought by businesses, including reduced costs and lower operational complexity
1.4 Introducing SD-WAN and Key Concepts
  • Introduction to Cisco SD-WAN, rethinking the WAN, and the shift from connectivity-centric to application-centric architecture
1.5 Transport Independence and Hybrid WAN
  • The concept of transport independence and the origin of Hybrid WAN topologies.
2.1 SD-WAN Distributed Architecture
  • Separation of the data, management, and control planes in contrast to traditional networking.
2.2 The Four Planes of SD-WAN
  • Overview of the Management, Control, Orchestration, and Data planes.
2.3 Management and Orchestration Planes
  • vManage (Management Plane) functionality: single pane of glass, onboarding, provisioning, policy creation, troubleshooting, and monitoring.
  • vBond (Orchestration Plane) functionality: authentication, authorisation, NAT traversal, and discovery.
2.4 Control and Data Planes
  • vSmart (Control Plane) functionality: handling policies and routing, distributing encryption keys, and acting as a BGP route reflector.
  • WAN Edge devices (Data Plane): carrying data traffic, securing connections via IPsec, and enforcing policies.
2.5 Segmentation and Topology
  • Segmentation via VPNs (Virtual Private Networks), which are synonymous with VRF instances.
  • Common topology types (full mesh, hub-and-spoke).
3.1 Controller Deployment Sequence
  • Installation order: vManage > vBond > vSmart.
  • Deployment options (Cisco Cloud, Private Cloud, On-premises).
3.2 Security and Certificates
  • Use of SSL certificates for control plane authentication.
  • DTLS/TLS protocol usage for secure control plane tunnels.
3.3 WAN Edge Onboarding
  • Zero Touch Provisioning (ZTP) (Viptela OS) and Plug and Play (PNP) (IOS XE) workflows.
  • Manual bootstrapping via CLI.
3.4 Configuration Templates
  • Configuration management via templates designed for intent.
  • Types: Device, Feature, and CLI templates.
3.5 Template Variables and Rollback
  • Using variables for flexible, reusable templates.
  • Automatic rollback mechanism for configuration failures.
4.1 OMP Route Types
  • Three types of OMP route advertisements: OMP routes (vRoutes), TLOC routes (Transport Location Identifier), and Service routes.
4.2 TLOC Attributes and Colors
  • TLOC components (system IP, transport color, encapsulation).
  • Use of Colors to categorise transports (public/private).
4.3 TLOC Control: Restrict and Tunnel Groups
  • Default full-mesh behaviour and controlling tunnel establishment using the restrict attribute or tunnel groups.
4.4 OMP Best-Path Selection
  • The ordered steps for OMP best-path selection, including TLOC Preference, OMP Preference, and Origin type.
4.5 NAT Traversal and Restrictions
  • NAT detection via STUN (Session Traversal Utilities for NAT).
  • Restrictions on symmetric NAT for data plane tunnel establishment.
4.6 Routing Loop Prevention
  • Native loop prevention mechanisms when redistributing to/from IGPs: OSPF Down bit, BGP Site of Origin (SoO), and EIGRP external protocol field.
5.1 Policy Construction Fundamentals
  • Building policies using lists (e.g., prefix-list, site-list, TLOC list).
  • Sequential match-action logic (first match basis).
5.2 Centralized Policy Directionality
  • Centralized control policies applied inbound vs. outbound from the vSmart perspective.
5.3 Isolating Branch-to-Branch Traffic
  • Creating a hub-and-spoke topology by filtering TLOC advertisements outbound to branch sites.
5.4 Controlling Traffic Flow with TLOC Manipulation
  • Enabling branch-to-branch communication via data centres by updating TLOC attributes (next-hop) in OMP routes using TLOC lists.
5.5 Traffic Engineering with Route Preference
  • Using OMP Route Preference to prefer a regional data centre for a specific prefix (e.g., Internet access).
5.6 Multi-Topology and Regional Meshes
  • Configuring different topologies (e.g., regional full mesh) by manipulating TLOC and OMP route advertisements based on Site ID criteria.
5.7 Extranets and VPN Route Leaking
  • Using control policies to implement extranets by leaking routes between service VPNs (e.g., partner access) using the export-to action.
6.1 Data Policy Fundamentals
  • Centralized data policy directionality: from-service vs. from-tunnel.
  • Core actions: drop, inspect, log, and redirect/forward.
6.2 Direct Internet Access (DIA) for Guests
  • Using data policies to enforce DIA for untrusted traffic.
  • Matching public addresses and forwarding to VPN 0 using nat use-vpn 0.
6.3 Direct Cloud Access (DCA) for Applications
  • Forwarding specific, trusted Layer 7 applications (e.g., WebEx) locally using nat use-vpn 0.
  • Using the optional nat fallback for resilience.
6.4 Application-Based Traffic Engineering
  • Steering specific applications over preferred tunnels using local-tloc-list (preference) or tloc-list (strict forwarding) actions.
6.5 Service Insertion (Data Plane)
  • Redirecting traffic for inspection to network services, such as a firewall at a hub.
  • Configuring the service on the WAN Edge and applying the redirection policy.
7.1 The AAR Imperative
  • Leveraging inexpensive commodity circuits while maintaining assured application experience.
7.2 SLA Class Lists
  • Defining application performance requirements using SLA Class lists (maximum Loss, Latency, Jitter thresholds).
7.3 BFD and Tunnel Monitoring
  • Using BFD for real-time path quality monitoring.
  • BFD timers: Hello Interval, Multiplier, Poll Interval, and App-Route Multiplier.
7.4 AAR Forwarding Logic
  • How AAR is evaluated only when multiple equal-cost paths exist in the routing table.
  • Mapping traffic to tunnels based on SLA compliance and preferred colors.
7.5 AAR Policy Actions
  • Configuring policies using preferred-color, backup-sla-preferred-color, and strict actions to manage failover scenarios.
8.1 Security in the DIA Model
  • Security implications of moving the Internet edge to the branch (increased attack surface).
8.2 Integrated Security Suite Overview
  • Overview of embedded security applications: Application-Aware Enterprise Firewall, IDS/IPS, URL Filtering, and AMP/Threat Grid.
8.3 Application-Aware Enterprise Firewall
  • Concepts of zones (grouping of VPNs) and zone pairs for establishing security boundaries.
  • Policy actions: Pass, Inspect, Drop.
8.4 Intrusion Detection/Prevention and Malware Protection
  • IDS/IPS leveraging Snort and Cisco Talos signatures.
  • Advanced Malware Protection (AMP) and Threat Grid sandbox analysis for file downloads.
8.5 URL Filtering and DNS Security
  • URL Filtering for enforcing acceptable use controls based on categories or reputation.
  • DNS Web Layer Security leveraging Cisco Umbrella cloud for security risks.
8.6 Cloud Security Integration
  • Connectivity to cloud-delivered firewalls (CDFW) via standards-based IPsec or GRE tunnels to offload compute burden from the WAN Edge.
9.1 Cloud onRamp for SaaS
  • Optimising connectivity to applications like Microsoft 365.
  • Calculating vQoE scores (Quality of Experience) based on loss/latency to choose the best-performing path.
  • Site types: DIA, Gateway, and Client.
9.2 Cloud onRamp for IaaS
  • Extending the SD-WAN fabric into public cloud instances (AWS, Azure).
  • Deployment using redundant WAN Edge Cloud routers in a Transit VPC/VNET.
9.3 Cloud onRamp for Colocation
  • Enabling regional service chaining by integrating Virtual Network Functions (VNFs) (firewalls, load balancers) at colocation facilities.
9.4 Loss Mitigation: FEC
  • Using Forward Error Correction (FEC) to mitigate loss by sending parity packets (XOR of data packets).
9.5 Loss Mitigation: Packet Duplication
  • Using Packet Duplication to send duplicate packets over a secondary, less-lossy tunnel to mitigate loss for critical traffic.
10.1 Localized Policy Scope
  • Localized policies are configured on WAN Edge templates and are device-specific in scope.
  • Cannot share lists with centralized policies.
10.2 Localized Control Policies
  • Manipulating route attributes of traditional protocols (BGP, OSPF, EIGRP) advertised by the WAN Edge.
  • Using route policies to influence path selection (e.g., setting BGP MED).
10.3 Localized Data Policies (ACLs)
  • Using Access Control Lists (ACLs) to filter, rewrite, or apply additional services to traffic flows at the interface level.
10.4 Quality of Service (QoS) Framework
  • QoS implemented via localized policies.
  • Steps: Assign traffic to forwarding classes (via ACLs), map classes to hardware queues, configure schedulers.
10.5 Queuing and Congestion Management
  • WAN Edge routers support eight queues (0–7). Queue 0 is the Low Latency Queue (LLQ) used for control traffic.
  • Schedulers use LLQ or Weighted Round Robin (WRR).
11.1 Design Methodology and Preparation
  • Migration usually occurs in a brownfield environment.
  • Importance of dissection of existing WAN architecture and documenting network resources.
11.2 Data Center Design
  • Recommended approach: insert and run the solution in parallel (Dedicated Pod design).
  • Allows the data centre to act as a transit site.
11.3 Transport and Service-Side Connectivity
  • Integrating transport-side connections (VPN 0).
  • Using eBGP as the recommended service-side routing protocol (VPN 1+) to the core.
11.4 Branch Design Options
  • Designs for complete CE replacement (single or dual WAN Edge).
  • Integrating with an existing MPLS CE router.
11.5 Integrating Services at the Branch
  • Design options for integration with a Branch Firewall to support Secure DIA.
  • Integrating Voice Services using a separate gateway (L2/L3 integration).
11.6 Overlay and Underlay Integration
  • Design options for traffic flow: Overlay-only (recommended), Overlay with Underlay Backup, and Full Overlay/Underlay Integration (complex).
Download Curriculum