& cplSiteName &

SD-WAN Security a Headache?

Kelsey Kusterer Ziser

One of the early challenges in the burgeoning SD-WAN market is addressing security, and that includes both the reality and the customer perception of how secure this new service offering can be.

For example, service provider MetTel finds some customers try to run their own IPsec tunnels over the SD-WAN platform, creating new problems for themselves, because they aren't convinced the existing software-defined wide area networking service is secure, says Ed Fox, vice president of network services.

"When we go into a situation where the customer might not have MPLS today, but at their branches they're doing VPN and IPsec tunnels -- they're kind of making their own mesh -- those particular customers present a challenge when they deploy because they still want to run their IPsec tunnels over the SD-WAN solution and you lose a lot of what the SD-WAN solution gives you."

That additional encryption reduces network traffic and application visibility, and diminishes the benefits of utilizing SD-WAN. But some security operations teams remain concerned over the notion that bringing in an Internet connection to support bandwidth-intensive applications in the branch will expose them to new security threats.

"You have this situation where you have tunnels over tunnels over tunnels, which in some cases actually increases the packet size so much that there are certain things that we have to do -- particularly when LTE is part of the solution -- because those networks are very packet-size sensitive," added Fox. "So we have to make sure we take extra precautions in those situations."

Fox noted the importance of talking to customers during on-boarding of SD-WAN services to avoid this security challenge, and determine if the customer wants to maintain control over their tunnels or rely on MetTel to encrypt their traffic. MetTel currently has more than 90 customers with greater than 2,000 sites supported with SD-WAN, and has partnered with VeloCloud Networks Inc. for more than two years for SD-WAN services.

In an interview with Light Reading, VeloCloud's Vice President of Marketing Mike Wood echoed Fox's sentiment that it's important for operators to talk to enterprises deploying SD-WAN not just about its overall benefits but also its secure architecture. For example, during initial deployment, the VeloCloud SD-WAN device activates only after credentials are downloaded from the orchestrator or the branch manager authenticates the device via a link emailed by the orchestrator.

Track the heartbeat of the virtualization movement with Light Reading at the NFV & Carrier SDN event in Denver. There's still time to register for this exclusive opportunity to learn from and network with industry experts -- communications service providers get in free!

But if users don't understand that the SD-WAN service is secured and data encrypted using IPsec tunnels at the device, keeping messaging, control and management secure, Wood says, they may feel the need to add their own IPSec tunnels, creating the problems Fox describes.

In order to achieve interoperability with current and future security systems, VeloCloud created the SD-WAN Security Technology Partner Program to afford enterprises the choice to integrate the SD-WAN service with their preferred security technology. The program launched in April, enabling VelcoCloud to service chain security offerings with security partners including Check Point Software Technologies, Zscaler, IBM Security, Palo Alto Networks and Fortinet -- which MetTel also works with for its cloud firewall product. (See SD-WAN Buzz Spills Into Reseller & Partner Space.)

Next page: Multiple approaches to secure SD-WAN

(3)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
User Rank: Light Beer
8/15/2017 | 3:43:34 PM
Zero Trust Security with Session Routing from 128T can help
As noted, when deploying an SD-WAN solution, there is often a juggling act of ensuring security without losing the pre-conceived value (improved agility and cost savings) of the solution. Given that SD-WAN technologies rely on tunnels and overlays, they require coordinated provisioning along with automated key management, which isn't easy, particularly without defined standards and protocols. An alternative approach, which is actually simpler and cheaper over the long-haul, is by leapfrogging SD-WAN technologies that rely on tunnels and overlay techniques. The key is being session-oriented – understanding the language of applications and services – to enable visibility into the unique two-way exchange of information between source and destination endpoints. With session-orientation, you can enforce a Zero Trust Security model - ensuring that only valid sessions are sent along with required encryption and authentication. This removes complexities from the layers of infrastructure, and the required intricate coordination will resolve headaches.
User Rank: Light Beer
8/14/2017 | 4:40:22 AM
Cato Networks converges SD-WAN, Security as a Service and a Global Backbone
I agree that running IPSEC tunnels over SD-WAN provided IPSEC (or in our case DTLS) tunnels doesn't make sense. 

Threat protection and application control is a totally different story. Edge SD-WAN vendors work through service chaining or VNFs (virtual appliances), which involves backhauling or deploying security capabilities in the branch. Cato built a global backbone that has a full network security stack built into it. Our SD-WAN edge device and clients, connect branches, cloud instances, and mobile users to the cloud service and direct the traffic to the cloud service. All traffic, WAN and Internet, is inspected in our PoPs within 30ms of the resource - no "backhauling" and no need to deploy security in the branch (virtual or physical). 


Disclosure: I work for Cato Networks. 


User Rank: Light Sabre
8/9/2017 | 3:08:20 PM
Security is probably the number one headache for anything involving communications. We can guess that because nobody really wants to talk about it.
Featured Video
From The Founder
Light Reading founder Steve Saunders grills Cisco's Roland Acra on how he's bringing automation to life inside the data center.
Flash Poll
Upcoming Live Events
March 20-22, 2018, Denver Marriott Tech Center
April 4, 2018, The Westin Dallas Downtown, Dallas
May 14-17, 2018, Austin Convention Center
All Upcoming Live Events
SmartNICs aren't just about achieving scale. They also have a major impact in reducing CAPEX and OPEX requirements.
Hot Topics
Net Neutrality Is Not a Rational Debate
Iain Morris, News Editor, 12/4/2017
The Anatomy of Automation: Q&A With Cisco's Roland Acra
Steve Saunders, Founder, Light Reading, 12/7/2017
You Can't Fix OTT Streaming Problems If You Can't See Them
Mike Hollyman, Head of Consulting Engineering, Nokia Deepfield, 12/8/2017
Eurobites: Ericsson Restates Its Financials, Warns of Impairment Charges
Paul Rainford, Assistant Editor, Europe, 12/8/2017
Animals with Phones
We're Gonna Need More Treats Click Here
You spent how much on this thing?!
Live Digital Audio

Understanding the full experience of women in technology requires starting at the collegiate level (or sooner) and studying the technologies women are involved with, company cultures they're part of and personal experiences of individuals.

During this WiC radio show, we will talk with Nicole Engelbert, the director of Research & Analysis for Ovum Technology and a 23-year telecom industry veteran, about her experiences and perspectives on women in tech. Engelbert covers infrastructure, applications and industries for Ovum, but she is also involved in the research firm's higher education team and has helped colleges and universities globally leverage technology as a strategy for improving recruitment, retention and graduation performance.

She will share her unique insight into the collegiate level, where women pursuing engineering and STEM-related degrees is dwindling. Engelbert will also reveal new, original Ovum research on the topics of artificial intelligence, the Internet of Things, security and augmented reality, as well as discuss what each of those technologies might mean for women in our field. As always, we'll also leave plenty of time to answer all your questions live on the air and chat board.

Like Us on Facebook
Twitter Feed