FFT - Constructing A Secure SD-WAN Architecture v6.2 r6
FFT - Constructing A Secure SD-WAN Architecture v6.2 r6
Subtitle
Presenter:
Date: 1
Secure SD-WAN
Objectives:
• Describe SD-WAN
• Understand the need for Secure SD-WAN
• View use cases and success stories
• Configure SD-WAN
• Monitor and manage SD-WAN
2
Traditional WAN
• Used to extend computer networks to
HQ/Datacenter
connect remote branch offices to data
Public Cloud centers
• Expensive circuit costs
SaaS
• Fixed circuits
• Long lead time
• Proprietary hardware
• Difficult to expand
• Branch traffic hauled back to HQ
Branch Office
3
The WAN is Complex and Needs Transformation
Security is “MUST”
SaaS enterprises are adopting WAN solutions as part of digital
60+ transformation 90%
Of SD-WAN vendors do
no provide security. With
direct internet access,
security becomes critical
at every branch
4
Gartner: Security is the Biggest WAN Concern
72% Security
58% Performance
47% Cost
Gartner does not endorse any vendor, product or service depicted in its research publications, and
does not advise technology users to select only those vendors with the highest ratings or other
designation. Gartner research publications consist of the opinions of Gartner's research
organization and should not be construed as statements of fact. Gartner disclaims all warranties,
Gartner Survey Analysis: Address Security and Digital Concerns to Maintain Rapid SD-WAN Growth, Naresh Singh, 12 November 2018 expressed or implied, with respect to this research, including any warranties of merchantability or
fitness for a particular purpose.
5
Enter SD-WAN
Software-defined WAN (SD-WAN)
HQ/Datacenter
Public Cloud Simplifies the management and
operation of a WAN by separating the
SaaS networking hardware from its control
mechanism
Lets companies build higher
performance WANs using lower cost and
commercially available internet access
Transport agnostic
Branch Office
6
Enterprise SD-WAN Use Case
SD-WAN Use Cases to Transform Enterprise WAN Edge
Network
Operations
Application Aware WAN Reduce WAN Cost for Simplify Operations for
Edge Lower Operating quick roll-out
Expenses (Opex)
Network
Security
Top rated threat protection Quality of experience Single pane of glass
and detection for direct (QoE) for voice and management
internet access video apps
Security
Operations
8
Fortinet Redefined WAN Edge with Secure SD-WAN
Simplification
SD-WAN Functionality
9
Enterprise SD-WAN Use Cases—MPLS Migration
Traditional WAN
MPLS
Private Cloud
Branch
Internet
10
Enterprise SD-WAN Use Cases—MPLS Migration
MPLS Backup with Local Breakout
Critical Apps (Voice and Video)
Best path is chosen depending
on latency, jitter, and packet
loss
MPLS
Private Cloud
Business Apps
Load balanced across different
lines so bandwidth is optimized
Public Cloud
Internet
11
Enterprise SD-WAN Use Cases—MPLS Migration
MPLS Backup with Local Breakout
Critical Apps (Voice and Video)
Best path is chosen depending
on latency, jitter, and packet
loss
MPLS
Private Cloud
IPsec VPN
Private Cloud
Branch
IPsec VPN
Public Cloud
Security
• Identification of strategies
Security
cloud applications •
• Application Enhanced
• Dynamic WAN application
steering
path controller
• Link load monitoring
• Zero touch
balancing
provisioning
• Traffic 6.2 new features
shaping • Forward error
correction
• Expanded SLA
strategies
• Enhanced SD-WAN
analytics
• Tunnel bonding
• SOC4 SD-WAN
acceleration
Visibility into 5000+ Application steering WAN path remediation High-level monitoring of Multi-tenancy with
applications based on expanded SLA forward error correction SD-WAN devices on a Patented VDOM
(FEC) map
High application Automated fail-over User-level segmentation
identification accuracy capabilities Tunnel bandwidth Expanded historic SLA for application
aggregation analytics
(per packet steering)
15
Transform your WAN Edge with Secure SD-WAN
Single-Pane Management
16
FortiGate Enterprise Routing Stack
FortiOS
17
Fortinet
WAN Edge MQ 2018 vs 2019 Cisco
19
SD-WAN Assessment Program
SD-WAN Assessment Program—What is it?
21
SD-WAN Assessment Program—What’s its Purpose?
• Security posture
• Bandwidth utilization
22
Sources:
1 IDC. SD-WAN Infrastructure Forecast. 2018.
2,3,4 Gartner. WAN Disruption and Transformation Survey. November 2018.
SD-WAN Assessment Program—How Does it Work?
23
SD-WAN Assessment Program—Then What?
24
Case Studies
Fortinet’s Global SD-WAN Adoption
FortiGate SD-WAN customer
Business Drivers
Consolidation of branch
services
26
Goals
Consolidation of Branch Services
Unified best of breed approach, competing
against powerful national supermarket chains
Undergoing digital transformation to simplify
management and increase productivity
Challenges
Unique set of security and networking
requirements for each retail member
Large supermarket in Northern Europe Proliferation of IoT devices, demanding more
bandwidth and security
28
Reduce WAN OpEx Spending
Goals
Multinational automotive supplier
Fully adopted cloud applications and SDN
technologies
Challenges
Immediate need for SD-WAN deployment,
with special requirements for WAN path
control and SLA strategy
MPLS infrastructure was inflexible and costly
Characteristics • SD-WAN is a feature rather • The Fortinet Security Fabric provides end to end visibility and threat
than the entire solution
intelligence across a wide attack surface
• NGFW security built-in as part • Performance:
of the solution
• The best performing VPN with dedicated security processors
• NSS Labs SD-WAN testing gave Fortinet a Recommended rating,
recognized for class leading QoE, the lowest total cost of ownership
(TCO), and SSL decryption
• Unmatched ability to scale branch office SD-WAN deployments with
Form factors • Hardware appliance or VM
FortiGate and FortiManager using zero-touch provisioning (cite
case studies when appropriate)
31
Competitive Positioning—Pure Play SD-WAN
Pure Play SD-WAN How to Position Against
Examples • Secure SD-WAN vs SD-WAN
• Both Gartner and NSS Labs recognize the importance of security
for SD-WAN
• Better end to end visibility and threat intelligence across a wide
attack surface with the Security Fabric
34
NSS Labs SD-WAN Report Results
NSS Labs SD-WAN—Industry’s First SD-WAN Group Test
36
NSS Labs SD-WAN v1.0 2018 (Products Tested)
Only three Vendors Recommended out of ten participating
Refused
Recommended Verified Caution Participation
37
Overall Results
Fortinet SD-WAN measured best in class for quality and TCO
38
Fortinet Receives Second Consecutive SD-WAN Recommended
Rating from NSS Labs
Only three vendors out of 60+ SD-WAN vendors achieved consecutive Recommended rating
Built-in NGFW security has received five consecutive Recommended rating from the NSS Labs NGFW test
39
How to Position Fortinet Results
Proven best of breed SD-WAN
Highest QoE for VoIP, beating even pure play SD-WAN vendors (scoring 4.38 out of 4.41)
Sustained high quality for VoIP, even during brownout conditions when packet loss, latency, and jitter was
introduced
Second best QoE for video, scoring 4.26 out of 4.53
40
Introducing the World’s First SD-WAN ASIC
41
World’s First SD-WAN ASIC (SOC4)
X2
SOC3
X1
42
The Fortinet SD-WAN ASIC Powered FortiGate 100F
Zero CPU
IPSec NGFW Tunnels SSL
Forwarding
43
FortiOS 6.2 Secure SD-WAN
SD-WAN Configuration Steps
45
Enable SD-WAN
Network > SD-WAN
• Select the interfaces that will become members
of the SD-WAN and provide a gateway for that
interface. NEW
• Physical interfaces that are referenced by any
other configuration element (for example, routes
or policies) will not appear in this list NEW
46
SD-WAN IPsec VPN Wizard
• What it does:
• Simplifies dual VPN creation for
SD-WAN
47
Forward Error Correction (FEC)
• What it does:
• Allows for dynamic remediation of packet loss or
erroneous data caused by adverse WAN conditions
• Use cases:
• Increase the reliability of WAN traffic sent through an
overlay VPN tunnel established over a broadband
internet link
• Increase the QoE of voice or video traffic that is pinned
to specific overlay tunnels
48
SD-WAN Virtual Interface
• A virtual interface named SD-WAN is automatically created
• All static routes and firewall policies must be configured using this virtual interface
Network > Interfaces
49
Dynamic Routing Support
50
Performance SLA
NEW
SLA Targets
Link Status
51
Performance SLA—Link Health Monitor
Available Protocols via CLI:
ping PING link monitor
http HTTP-GET link monitor
tcp-echo TCP echo link monitor
udp-echo UDP echo link monitor
TWAMP Two-Way Active Measurement
Protocol
52
Link Quality Measurements
• Status check also measures the link quality of each member interface based on
latency, jitter, and packet loss percentage
NEW
53
Performance SLA—SLA Targets
• You can specify multiple SLA
targets in one performance
SLA
54
SD-WAN Rules
• Rules can match traffic based on:
• Source IP address, destination IP address, or
port number
• Internet services database (ISDB) address
object
• Users or user groups
• Type of service (ToS)
NEW
• Lets you route traffic through the member
interfaces that best fit your needs
55
SD-WAN Rules—Manual
56
SD-WAN Rules—Best Quality
57
SD-WAN Rules—Lowest Cost (SLA)
58
SD-WAN Rules—Maximize Bandwidth (SLA)
59
SD-WAN Rules—Internet Services & Application
61
SD-WAN Rules Precedence
• SD-WAN rules are treated as policy-based routes
62
SD-WAN Rules
SD-WAN rules are evaluated in the same way as the firewall policies: from top to
bottom, using the first match
Implicit Rule
Double-click on the implicit rule to display the load balancing options
63
SD-WAN Load Balancing Methods
• Source IP (default)
• Sessions from the same source IP address use the same interface
• Source-destination IP
• Sessions with the same source and destination IP pair use the same interface
• Spillover
• Use one interface until threshold is reached, then use the next interface
• Sessions
• The number of sessions distributed is determined by the interface weights
• Volume
• Sessions are distributed so that traffic volume is distributed by the interface weights
64
SD-WAN Rules IPv6 Support
65
SD-WAN Link Status Monitoring
Network > Performance SLA
66
SD-WAN Link Status Monitoring Cont’d
• Use the following command to verify which link is the preferred link
67
SD-WAN Usage Monitor
• Real time SD-WAN usage monitor
• View SD-WAN traffic distribution by bandwidth, volume, or session
68
Verify SD-WAN Traffic Routing
69
Verify SD-WAN Traffic Routing
• Use the Forward Traffic logs or the packet capture tool to verify traffic routing.
Log & Report > Forward Traffic
70
Traffic Shaping
• Apply traffic shaping to SD-WAN
traffic the same as any other traffic
• Layer 7 analysis for QoS rules is
based on users, apps, URLs
• Administrators can prioritize critical
traffic over other traffic
• There are two types of traffic shapers:
Per IP and Shared
71
SD-WAN Integration in Fabric Topology
72
FortiOS Secure SD-WAN
Management and Visibility: FortiManager
73
FortiManager—Zero-Touch Provisioning & Automation
Turn-Key Provisioning for SD-WAN and SD-Branch
74
FortiManager—SD-WAN Monitoring and Controls
Performance, Bandwidth, and SLA Monitoring
• SD-WAN bandwidth monitoring to log
the interface UL/DL speeds (run 10
different times in 24hrs)
76
Conclusions:
Customers want WAN with local internet breakout
SD-WAN enables local internet breakout but this means added security
risks
Most SD-WAN vendors do not have robust NGFW security
Many SD-WAN vendors recommend multiple devices for SD-WAN and
security
Multiple devices add to the complexity and cost
77
Key Takeaway
FortiGate changes the conversation from SD-WAN to Secure
SD-WAN
Best of breed integrated SD-WAN networking and security capabilities in a single
device reduces TCO
80
SD-WAN Exercise
• In this exercise, you configure the SD-WAN virtual interface:
81
Software-Defined WAN Session
https://use.cloudshare.com/Class/x-x-x-x-x
Student name: <student email>
Passphrase: Fortinet1!
Instructor Notes
• The following slides are optional and can be used for the following:
• To remind instructors how to interact with the Fast Track labs
• To help students get started using the hands-on lab
• Feel free to use some, all, or none of the slides as part of your session
• It is recommended to keep the initial instruction short and then assist
students individually as needed
• It is suggested to use no more than the first four of the following slides and
only use the others on a case-by-case basis
83
Student Access
• Classroom URL and password are provided by your instructor
84
Student Classroom Portal
85
FortiFIED Interactive Lab Guide
Enter a Name
Application banner
Objectives list
Display tabs
Rich text
Answer choice
Complete button
Status bar
Scale text slider
Resize display bar
86
Adjusting the View
1. Right-click the browser tab
and select duplicate from
drop-down menu
2. Tear off the browser tab by
clicking it and dragging the
tab away from the browser
3. Arrange the browser
windows side by side,
based on personal
preference
4. Use the browser zoom to
adjust resolution of views
based on preference
87
Keyboard Layouts
• Windows host:
1. Under Environment Actions, use the keyboard drop-
down list to select a keyboard
2. To apply the new keyboard, log out of Jumpbox, then
log back in
88
Keyboard Layouts (cont)
• Ubuntu 14.04 (NGFW)
1. Must be done from inside the host
2. Log in, click the gear icon on the top right
and click System Settings…
3. Click Keyboard
4. Click Text Entry
5. Click +
6. Select a keyboard layout and click Add
7. Close the window
8. Click the Keyboard Layout icon on top
right and click the new layout
89
Keyboard Layouts
• Ubuntu 18.04 & Kali Host (Security Fabric & FortiWeb)
1. Must be done from inside the host
2. Log in, click the drop-down list on the top
right and select the Settings icon
3. Click Region and Language and click the +
icon under Input Sources
4. If required, use the button on the bottom of
the window to search for a keyboard
5. Click the keyboard and click Add
6. Close the window
7. Click the Keyboard Layout icon on top right
and click the new layout panel
90
Extended RDP Access
• Easiest and quickest access is through
the browser interface
• Benefits
• Allows students to use an interface that is
most familiar to them
• Custom configuration
• Lets students use a tablet as a secondary
screen
91
Use Tablet as a Secondary Screen