In our previous post, we explored the foundational architecture of Cisco’s SD-WAN solution. That included a deep dive into the four primary control components that define the fabric: vManage, vSmart, vBond, and the vEdge routers. While we originally planned to move directly into the fabric bring-up sequence, we’re taking a purposeful detour. This installment focuses entirely on the lab environment that will underpin the rest of this series.
Building and using a lab is more than just a technical requirement—it’s the bridge between theory and practice. It’s where architectural diagrams take shape, and where the features of SD-WAN come to life through packet flows, routing decisions, and device interactions. For this reason, it is critical to understand both the design and the reasoning behind the structure of the lab itself.
This lab is crafted to replicate a production-grade SD-WAN deployment with enough variety and complexity to demonstrate real-world behavior. Over the course of this series, the lab will evolve to include policies, traffic engineering, segmentation, and failure scenarios.
Let’s begin with a logical overview of the lab.
Logical Topology and Site Roles
At its core, the lab is comprised of five distinct sites. Each site has a unique connectivity profile and role within the overall SD-WAN topology.
Site 1 serves as the hub or data center. It acts as the aggregation point for traffic between branch sites and legacy infrastructure.
Sites 2, 3, and 4 serve as SD-WAN branch sites, each with various LAN and WAN configurations.
Site 5 is a legacy MPLS-only site, representing traditional WAN environments that haven’t yet transitioned to SD-WAN.
This structure enables us to test scenarios such as hub-and-spoke routing, full mesh overlays, and transitions between legacy and SD-WAN segments.
The logical topology diagram shows the interconnectivity of the sites over three types of WAN transports:
MPLS
Internet A
Internet B
Each WAN segment has its own addressing scheme and emulated behaviors, allowing us to simulate real-life network dynamics such as jitter, packet loss, and latency.
The LAN-side address space across all sites is taken from the 10.0.0.0/8 private range. The addressing follows a structured pattern:
The second octet identifies the site number.
The third octet identifies the VPN number (a concept analogous to a VRF).
For example:
VPN 1 at site 1: 10.1.1.0/24
VPN 3 at site 2: 10.2.3.0/24
This addressing strategy simplifies lab design and routing while clearly delineating segments of traffic as the environment scales.
WAN Transport Addressing
The WAN side is where the SD-WAN overlay really comes into play. Each vEdge router connects to at least two WAN transport networks. Here’s how we have structured these:
MPLS WAN uses the private address space: 192.168.0.0/16
Internet A and B use the shared address space: 100.64.0.0/10 as defined in RFC 6598
Each WAN subnet is a /24, with:
The third octet representing the site number
The fourth octet representing the device number
The final IP in each range (.254) is always reserved for the provider device, which is simulated in our lab by a WAN emulation host.
Example:
Site 1 MPLS IP: 192.168.1.1/24
Site 1 MPLS next-hop: 192.168.1.254
Site 1 Internet A IP: 100.64.1.1/24
Site 1 Internet A next-hop: 100.64.1.254
This clean and consistent WAN addressing pattern helps us easily trace paths and troubleshoot issues later in the series.
WAN Emulation for Realism
Two dedicated Linux virtual machines are used to emulate our WAN connections:
One emulates the MPLS cloud
The other emulates Internet A
These machines run open-source WAN emulation software known as WANem. This powerful tool allows us to introduce controlled impairments such as:
Latency
Packet loss
Jitter
Bandwidth throttling
By tuning these parameters, we can simulate degraded circuits, failover scenarios, and application-performance testing in a realistic way without needing actual physical WAN links.
This emulation is critical when evaluating SD-WAN’s performance routing and application-aware routing features.
Cloud-Based Controllers
The three core SD-WAN control components—vManage, vBond, and vSmart—are hosted in the cloud. In a real deployment, these may reside in public or private cloud infrastructure. For our lab, these controllers are reachable only via the two internet connections.
This mirrors the production recommendation that control plane elements remain reachable via high-availability paths and remain logically separate from data plane activities.
The IP reachability from the vEdge devices to the cloud controllers is made possible by NAT through the WANem machines and a home network firewall. These NAT translations ensure that the lab remains isolated from the actual internet while still simulating public connectivity.
The NAT boundary is essential for testing the SD-WAN control plane bring-up process, which depends on devices discovering and authenticating with controllers across a WAN.
Lab Physical Infrastructure
Physically, the lab runs on a single VMware ESXi 6.0 host. This host carries:
Five vEdge Cloud Routers
Four Cisco CSR1000v Routers
Two WANem Linux appliances
Each virtual machine is assigned to the appropriate virtual networks (port groups) on ESXi to align with the lab’s logical topology. This separation of port groups is crucial to ensure clean segmentation of LAN, WAN, and management traffic.
Management and control of these devices is performed through virtual serial console ports, allowing direct CLI access from a laptop. These connections are established using telnet over the local network. The laptop is configured to reach the ESXi host and connect to serial ports mapped to each VM.
This management setup mirrors out-of-band access in a real deployment and provides a reliable way to reach the console for each device—even in the case of configuration errors or boot failures.
ESXi Virtual Network Mapping
Each vEdge router in the lab has four network interfaces:
ge0/0 – LAN
ge0/1 – WAN 1 (MPLS or Internet A)
ge0/2 – WAN 2 (Internet B)
ge0/3 – Management
Each interface is mapped to a different ESXi port group. These port groups correspond to isolated virtual switches, keeping traffic logically and physically distinct. For example:
LAN traffic stays within the site
WAN traffic traverses the WANem virtual appliances
Management traffic is routed through a NAT boundary to the public network
This careful mapping ensures that the behavior of the lab accurately reflects the separation and policy enforcement seen in real SD-WAN environments.
Summary and Transition
At this point, we have a fully defined and structured lab environment. The logical and physical design supports a wide range of test scenarios and mimics the challenges and opportunities of real-world SD-WAN deployments.
This foundation sets the stage for all future configuration work. By understanding the roles of each site, the WAN layout, and the tools used to simulate impairments and monitor devices, we’re equipped to move on to practical implementation.
Deploying the vEdge Cloud Router
With the lab environment fully prepared, it’s time to deploy a virtual edge router and bring it into our SD-WAN fabric. This section focuses on the deployment of a vEdge Cloud router at Site 4, referred to as e4. This site will connect to two WAN transports and serve as a practical example of onboarding a new SD-WAN site.
This deployment involves downloading the necessary software, setting up the virtual machine on ESXi, configuring its basic settings, and completing the registration process using the SD-WAN control infrastructure.
Preparing the Image and Authorization Files
Before deploying the router, two files are required:
The first file is the vEdge Cloud image in OVA format. This is the software package used to create the virtual router on VMware ESXi. The image must match the version of software running on your cloud-based controllers. For this lab, version 17.2.7 is used.
The second file is the vEdge authorized device list. This file contains the serial numbers and chassis IDs of the vEdge devices that are allowed to join the overlay. This file must be uploaded into vManage before a new device can be activated.
Both files are downloaded from your vendor support portal and stored locally in preparation for deployment.
Deploying the vEdge Virtual Machine
Using the vSphere client, the OVA image is deployed on the ESXi host. The deployment wizard walks through the process of selecting the image, naming the virtual machine, choosing the compute resource, storage, and network configuration.
The virtual machine will be created with four network interfaces. These interfaces are assigned as follows:
The first interface is connected to the LAN segment of Site 4.
The second and third interfaces are connected to Internet A and Internet B WAN segments.
The fourth interface is reserved for out-of-band management.
Each network interface is mapped to a specific ESXi port group that represents a different segment of the network topology. Proper interface assignment is critical to ensure the router connects to the correct parts of the simulated environment.
After deployment, a virtual serial port is added to the virtual machine. This allows console access via telnet from the administrator’s laptop. This serial access method is useful for initial configuration and troubleshooting.
Uploading the Authorized List to vManage
Before the router can join the fabric, it must be recognized by vManage. This is done by uploading the authorized vEdge list.
In vManage, under the configuration section, the device list is accessed. The authorized list file is uploaded and validated. An option is selected to distribute the list to all control nodes, including vBond and vSmart.
Once uploaded, the dashboard displays additional entries representing the new vEdge routers included in the list. Each entry includes a chassis number and a one-time password. These are used during the activation phase to securely authenticate the router.
Configuring the vEdge for Bootstrap
With the virtual machine running and console access established, the router is configured with its initial settings.
The configuration includes the hostname, a unique system IP, site ID, the organization name, and the address of the vBond orchestrator.
The WAN interfaces are configured with IP addresses and marked as tunnel interfaces, enabling them to participate in SD-WAN overlay tunnels. Each interface is assigned a color to represent its transport type, such as private1 or private2. These colors are later used to apply policy and routing preferences.
A default route is added pointing to the gateway of each WAN segment. This ensures that the router can reach the internet and locate the SD-WAN controllers hosted in the cloud.
After applying the configuration, interface status is verified to ensure both WAN links are operational.
A simple connectivity test is performed by pinging an external IP address such as a public DNS server. This confirms that the router can reach outside the lab environment, a requirement for controller discovery and registration.
Verifying Initial Control Plane Status
Once the configuration is complete, the control connection status is checked using built-in diagnostic commands.
At this stage, no active connections are expected. The router does not yet have a valid certificate and has not been activated. The output confirms this by showing no established control plane sessions and an invalid token status.
The router is now ready to be activated using the one-time password.
Activating the Router
The activation process involves assigning the chassis number and one-time token to the router. These values are taken from the vManage dashboard, where the uploaded authorized list is displayed.
Using the router’s command interface, a request is made to activate the device using the provided credentials.
After submitting the activation command, the router contacts the vBond orchestrator. If successful, it receives an identity certificate from vManage. This certificate is used to authenticate all future control connections.
A follow-up check of the control properties shows a valid certificate is now installed. The token status changes to valid, and timestamps indicate the issue and expiry dates of the certificate.
Establishing Control Connections
With the certificate in place, the router attempts to establish connections to vSmart and vManage.
A command is issued to list the current control connections. Active sessions are displayed for both WAN transports. The output shows remote IP addresses, system IPs of peer devices, and the type of controller connected.
In our example, two sessions are established over private1 and three sessions over private2. These include connections to two vSmart controllers and one vManage node. The router is now fully registered and operational within the SD-WAN fabric.
The vManage dashboard also reflects this change. The device now appears as active and trusted, with a valid certificate and active tunnels.
Deploying a vEdge Cloud router involves several carefully ordered steps. These include downloading the correct software, deploying the virtual machine, configuring interfaces, uploading the authorization list, activating the router, and confirming connectivity.
This process is essential to bring any new site online in an SD-WAN deployment. A secure onboarding procedure ensures that only trusted devices participate in the overlay, and the use of certificates and tokens prevents unauthorized access.
With the Site 4 router now deployed and integrated, the lab is ready for further testing and policy implementation.
Validating and Troubleshooting Control Plane Connectivity
With our vEdge Cloud router successfully deployed and integrated into the SD-WAN overlay, it is time to turn our attention to validation and troubleshooting. The control plane is the foundation of SD-WAN functionality. Without stable control connections, there is no policy distribution, no route learning, and no secure tunnels. Therefore, ensuring its proper operation is essential before moving forward with any data-plane or policy-related configurations.
In this section, we will cover how to verify the control plane status of a vEdge router, interpret common command outputs, and address typical onboarding issues. The goal is to provide a practical guide that can be followed in any SD-WAN deployment, whether in a lab or a production environment.
Understanding the Control Plane in SD-WAN
The SD-WAN control plane is responsible for exchanging routing information, managing security credentials, and maintaining state across all edge and core devices. The three control plane components include:
vManage, which handles configuration, monitoring, and certificate issuance.
vBond, which orchestrates initial communication between devices.
vSmart, which distributes routing, policy, and security information across the overlay.
When a vEdge device boots and applies its bootstrap configuration, it uses the vbond IP or hostname to discover the rest of the control infrastructure. The device then attempts to establish DTLS or TLS connections with vSmart and vManage. These tunnels are authenticated using certificates, which must be valid and trusted across all components.
Confirming Local Control Properties
The first step in validation is to examine the local control properties of the vEdge device. This confirms whether the device is aware of its system information, certificate status, organization affiliation, and vbond configuration.
The key values to check include:
The system IP and site ID, which should match the configured values.
The organization name, which must exactly match the value used on the control components.
The vbond IP or hostname, which should be resolvable and reachable.
The certificate status, which must be marked as valid and installed.
The token status, which should indicate whether the one-time password has been accepted or is no longer required.
If the certificate is not installed or the token is still invalid, the vEdge will not proceed to form control connections.
Validating Control Connections
The next step is to inspect current control connections. This provides visibility into which controllers the vEdge is connected to, how many sessions are active, and over which interfaces those sessions are formed.
A properly functioning vEdge should have multiple control connections, including at least one to each of vSmart and vManage. These connections may occur over multiple WAN transport interfaces for redundancy.
Each connection record includes the following:
The peer system IP and site ID.
The public IP address used to reach the controller.
The interface and transport color used for the session.
The connection status, such as up, init, or down.
The number of retries and uptime for the session.
A control connection marked as up with a stable uptime confirms a working session. If the status is stuck in init or remains down, further investigation is needed.
Common Causes of Control Plane Failure
When control connections do not come up, the issue often lies in one of a few common areas:
The organization name is mismatched between the vEdge and the controller. This must be exact, including spaces and punctuation.
DNS resolution of the vbond hostname fails, preventing discovery of vSmart and vManage.
Static routes or default routes are missing from the vEdge, preventing reachability to the internet or cloud controllers.
The one-time activation token was not applied or was entered incorrectly.
The system clock is incorrect, causing certificate validation to fail due to time mismatch.
The firewall or NAT device between the vEdge and the internet is blocking required ports such as UDP 12346 for DTLS.
By addressing each of these points methodically, most onboarding issues can be resolved quickly.
Verifying Time and DNS Settings
Time synchronization and name resolution are often overlooked but are critical to SD-WAN operation.
If the vEdge device’s clock is significantly out of sync, certificate validation will fail. Ensure that the device has either a manually set time or a working NTP configuration.
Similarly, DNS must be configured correctly, either on the WAN interface or under the VPN 0 configuration. If DNS is not working, the device will be unable to resolve vbond hostnames, preventing connection initiation.
Testing DNS with simple name lookups and pinging known external addresses helps confirm basic functionality before diagnosing deeper issues.
Checking WAN Interface and Routing Configuration
Control connections occur over interfaces defined under VPN 0. These interfaces must be configured with correct IP addresses, tunnel interfaces enabled, and marked with an appropriate color. The device also requires a reachable gateway, typically defined via a static default route.
Inspecting interface status and IP assignments confirms whether traffic can leave the device. Verifying that each WAN transport is up and has a path to the internet is essential before assuming a control failure is due to a configuration problem on the controller side.
Adding ICMP tests, traceroute, or monitoring tools can help confirm basic path reachability between the vEdge and cloud controllers.
Monitoring the Control Plane from vManage
From the controller side, vManage provides tools to monitor device status and control connection health.
After successful activation, the vEdge device appears in the dashboard with its name, system IP, site ID, and uptime. Its control connection status is shown as green if the device is connected and has an active certificate.
If the device does not appear or is marked in red, the control connection is likely down or the device is not authenticated.
vManage also allows querying real-time status of vEdge devices, reviewing logs, and checking the device inventory. This provides a second layer of verification to confirm whether an issue lies with the edge device or the controller infrastructure.
Practical Troubleshooting Scenario
Suppose that after booting the vEdge and applying the bootstrap configuration, the device cannot establish any control connections. Running the control status commands shows no active sessions. The token status remains invalid, and the certificate is not installed.
In this case, the likely cause is a missing activation command. Revisiting the authorized device list on vManage confirms that a one-time password is available. Entering the activation request command on the vEdge allows the device to register, receive a certificate, and initiate proper control sessions.
If instead the device has a certificate but control connections remain stuck in init, then the issue may lie in transport reachability or NAT traversal. Confirming interface configuration, route paths, and access through firewalls can help resolve the problem.
Each scenario requires examining the entire path between the vEdge and the control nodes, including local settings, transport behavior, and controller status.
Best Practices
To effectively validate and troubleshoot control plane connectivity, follow these best practices:
Always confirm that the organization name matches exactly across all devices.
Ensure DNS and NTP are working before attempting activation.
Check that WAN interfaces are configured with proper IP addresses and default routes.
Apply the one-time activation token before expecting control connections.
Verify certificate status and time settings to avoid authentication issues.
Use control status commands to monitor the current state and diagnose problems.
Confirm from the vManage dashboard that the device is visible and marked as healthy.
By following a consistent checklist and verifying each component in order, most control plane issues can be identified and resolved efficiently.
With the control plane validated and the vEdge registered and connected, the foundation is now in place to begin more advanced configurations. In the next section, we will introduce the concept of overlay routing and explore how route advertisements are exchanged, controlled, and influenced by policy.
Understanding how the control plane enables and regulates the overlay is key to unlocking the full potential of SD-WAN. From route learning and propagation to segmentation and service chaining, everything relies on this control layer.
Overlay Routing and Preparing for Advanced SD-WAN Policy
With the vEdge routers registered and control plane connections fully established, we now transition into one of the most critical aspects of any SD-WAN deployment: overlay routing. This phase marks the point where the devices begin to function as part of an integrated wide area network, sharing route information, discovering remote networks, and exchanging traffic securely through encrypted tunnels.
This section introduces how overlay routing works in Cisco SD-WAN, the mechanisms behind route distribution, and how the control plane facilitates dynamic and scalable connectivity across the enterprise. We will also lay the groundwork for applying traffic policies in upcoming sessions.
Understanding the SD-WAN Overlay
An overlay network is a logical network built on top of an existing physical infrastructure. In the case of Cisco SD-WAN, the overlay is established between vEdge routers using secure tunnels over the underlying WAN transports. These tunnels are built and maintained using control information received from vSmart controllers.
The overlay enables any-to-any connectivity between sites, simplifies routing, and provides the basis for applying sophisticated application-aware policies. It abstracts the physical WAN topology, allowing administrators to focus on business intent rather than static path definitions.
Each site, identified by a unique system IP and site ID, participates in this fabric. Devices advertise their local routes to vSmart, which then redistributes them to other devices based on configured policies.
Role of vSmart in Route Propagation
The vSmart controller is responsible for the route exchange and enforcement of policy across the SD-WAN fabric. When a vEdge router comes online and forms a control connection with vSmart, it advertises all of its local route information. This includes routes from directly connected networks, static routes, and routes learned from local routing protocols like OSPF or BGP.
vSmart collects these routes from all sites and redistributes them according to policy. This redistribution is highly scalable and secure, as all route exchanges occur through authenticated control connections.
Routes in Cisco SD-WAN are transported using a protocol called Overlay Management Protocol. This protocol is optimized for SD-WAN and includes route attributes that support advanced traffic control features, including service insertion, VPN segmentation, and preferred pathing.
VPNs and Segmentation
One of the key architectural elements in Cisco SD-WAN is the use of VPNs to separate and segment traffic. In this context, VPN is similar to a virtual routing and forwarding instance. Each VPN represents a separate routing domain and can be used to segregate user, guest, and management traffic.
In our lab, the third octet of the LAN IP address indicates the VPN. For example, at Site 1, 10.1.1.0 is used for VPN 1, and at Site 2, 10.2.3.0 represents VPN 3. This consistent addressing scheme makes it easier to manage segmentation.
Each VPN is isolated from the others unless explicitly connected through route leaking or service chaining policies. When a vEdge router advertises its routes to vSmart, it includes the VPN identifier, ensuring that the correct routing domains receive the appropriate updates.
This segmentation model enables secure and policy-driven routing between departments, services, or business units.
Establishing the Overlay Tunnels
Once routes are exchanged via vSmart, each vEdge router is aware of remote networks across the SD-WAN fabric. At this point, the routers can begin to form direct IPsec tunnels to other sites, depending on the routing information received.
These tunnels are formed dynamically, and their endpoints are determined based on reachability and transport preference. Each tunnel is established using pre-shared or certificate-based authentication and encrypts all user traffic flowing between sites.
The overlay tunnels provide:
Data-plane security through encryption
Transport independence across MPLS, broadband, or LTE
Fast convergence using centralized control updates
Efficient route scaling through centralized policy enforcement
These features eliminate the need for traditional mesh topologies built using static GRE or DMVPN configurations and allow the SD-WAN to adapt to network changes in real-time.
Observing Overlay Routing in the Lab
In our lab, each vEdge router has advertised its local LAN subnets to vSmart. For example, Site 4 advertises its 10.4.1.0 subnet for VPN 1. vSmart redistributes this route to other sites such as Site 1 and Site 2, where the routers install the route in their own VPN 1 routing tables.
This route visibility can be confirmed using built-in show commands to view received and installed routes per VPN. These routes will include next-hop information pointing to the system IP of the advertising router and will be marked as learned via OMP.
The overlay tunnel endpoints are also visible. For each peer site, a vEdge device will build a tunnel interface using its WAN IP and establish a secure session to the corresponding IP at the remote site. These tunnels may be formed across different transport types, depending on reachability and preferences.
Overlay Routing and Transport Independence
Cisco SD-WAN supports true transport independence. This means that overlay tunnels can be established over any available WAN path, including MPLS, broadband internet, or cellular networks.
Each transport is identified by a color attribute. For example, private1 might represent MPLS and private2 could represent internet. These colors are assigned to tunnel interfaces in the configuration and are used by policy engines to make forwarding decisions.
When a vEdge router forms overlay tunnels, it does so over each active transport, allowing for multiple parallel tunnels between the same pair of sites. This design allows for:
Load balancing
Path redundancy
Application-aware routing
Failover and recovery within seconds
In our lab, each vEdge is connected to two WAN transports. As a result, we can observe dual tunnels to each peer, one over private1 and one over private2. This setup allows us to test routing behaviors during link failure, latency shifts, and application performance changes.
Planning for Policy Application
Now that routes are visible and tunnels are formed, the foundation is laid for applying policies. Cisco SD-WAN uses a centralized policy model, with the vSmart controller distributing policies to edge devices.
Policy categories include:
Control policies, which determine how routes are advertised and accepted
Data policies, which govern how traffic is forwarded once it arrives on the vEdge
Application-aware routing policies, which influence path selection based on application type and transport conditions
Security policies, which enforce access control, segmentation, and service chaining
To implement a policy, administrators define match and action criteria in vManage, associate the policy with a site or VPN, and push it to the relevant vSmart controllers. Once received, the policy is enforced by the edge routers in near real-time.
Our lab is now ready to test these features. With multiple sites, diverse transports, and defined addressing, we have the flexibility to create and validate a wide range of policy scenarios.
Verifying Routing Tables and Tunnel Status
Before diving into policy, it’s important to verify that overlay routing is behaving as expected. Each vEdge device should have:
Routes to remote LAN subnets in the appropriate VPNs
Overlay tunnels established to all relevant peer sites
Correct identification of primary and backup transport paths
Reachability to all controllers and peers via OMP
These elements can be validated through the device command line or the vManage dashboard. Routing tables should list remote subnets with a next-hop pointing to the system IP of the advertising peer. Tunnel statistics should show stable sessions with low latency and error rates.
Where multiple tunnels exist between sites, administrators can observe which tunnel is active and whether traffic is flowing as intended. This sets a benchmark for later testing when policies are introduced that may influence tunnel selection or route preferences.
Preparation for Policy Testing
Overlay routing is the operational heart of Cisco SD-WAN. It transforms static, complex WAN environments into dynamic, secure, and flexible fabrics. The vSmart controller manages route exchange and tunnel formation, enabling each site to discover and communicate with every other site in a consistent and scalable manner.
By understanding how routing and segmentation work in the overlay, we are now ready to move beyond infrastructure and begin implementing intent-based policies. These policies will allow us to prioritize applications, enforce business logic, and steer traffic intelligently across available paths.
Final Thoughts
The journey through our SD-WAN lab setup has taken us from foundational architecture to hands-on deployment, validation, and preparation for policy application. By walking through this process step by step, we’ve built not just a technical environment, but a platform for experimentation, learning, and future growth.
What began with an introduction to logical site roles and transport types has evolved into a fully functional overlay network. We’ve configured vEdge routers, established control-plane trust, formed dynamic overlay tunnels, and verified that remote routing domains are reachable. Each stage of this lab has been designed to mirror real-world complexity while maintaining clarity for learning and testing.
There are a few key reflections that stand out:
SD-WAN is far more than just a replacement for traditional WAN. It introduces a centralized and scalable control model that simplifies management while enhancing flexibility, security, and application performance.
A well-designed lab environment is not just a convenience—it is essential for mastering the technology. It enables low-risk testing, troubleshooting, and exploration of advanced features before implementing them in production.
Understanding the control plane and overlay routing is critical. These are the core mechanisms that make SD-WAN adaptive and secure. Without a strong foundation in these areas, policy application and traffic steering will be guesswork.
Transport independence is not a theoretical feature—it is practical and powerful. By simulating multiple WAN paths and introducing emulated network conditions, we’ve demonstrated how SD-WAN maintains performance and availability across dynamic networks.
Looking ahead, the next logical step is to implement policies. That’s where SD-WAN truly differentiates itself: offering granular control over how, when, and where traffic flows. Policies allow you to align your network behavior with your business priorities—ensuring critical applications get the performance they need, regardless of underlying transport conditions.
As we continue the series, we’ll build on everything covered so far. From crafting control and data policies to applying security frameworks and service chaining, each topic will deepen your understanding of how to turn intent into action within the SD-WAN fabric.
Until then, take time to explore your lab, experiment with additional sites or VPNs, and become comfortable interpreting routing behavior and control-plane status. A well-practiced engineer in the lab becomes a confident one in production.
May your tunnels remain stable, your policies efficient, and your troubleshooting sharp.