-
Network architectures are undergoing a complete overhaul, initiated by the advent of software-defined networking (SDN). In addition to creating new possibilities, such as the reconfiguration of data paths in a matter of seconds through full automation, the main aim is to drive the operation of an enterprise network towards greater efficiency and flexibility. This trend is already having an impact on the design concepts of WAN connections. In addition to the highly reliable MPLS VPNs, cost-effective Internet connections are available as WAN connections. The hybrid WAN concept has been developed as an intermediate step towards software-defined WAN in order to make optimum use of both with regard to the QoS requirements of the applications. Here, data traffic is controlled by means of controller functions distributed across the network, while central control plane servers are used for this in the SD-WAN.
-
Course Contents
-
- Motivation and Market Overview
- Using MPLS-VPN and Internet Accesses in an Optimal Manner
- Overlay Network for WAN
- Requirements of the Application
- Application-Related Routing
- Central Control of the Data Traffic
- Optimization of the Data Transfer
- Security in SD-WAN and Hybrid WAN
- Controllers for SD-WAN
- Protocols for SD-WAN
- Design Concepts
- Migration Strategies
- Future Trends
The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.
Premium Course Documents
In addition to the digital documentation package, the exclusive Premium Print Package is also available to you.
- High-quality color prints of the ExperTeach documentation
- Exclusive folder in an elegant design
- Document pouch in backpack shape
- Elegant LAMY ballpoint pen
- Practical notepad
The Premium Print Package can be added during the ordering process for € 150,- plus VAT (only for classroom participation). -
Target Group
-
Planners and operators of enterprise wide area networks as well as employees of Internet service providers, whose tasks include the planning and optimization of customer WANs, will find numerous suggestions and state-of-the-art solutions in this course.
-
Knowledge Prerequisites
-
Solid knowledge of wide area networks and IP routing is required for successful participation.
1 | SD-WAN at a Glance |
1.1 | What is Software-Defined WAN? |
1.1.1 | What\qs behind Software-Defined Networking (SDN)? |
1.1.2 | The Idea |
1.1.3 | Definition of SDN |
1.1.4 | Classic Routers / Switch Networks |
1.1.5 | Software-Defined Networking |
1.1.6 | Substructure of the Control Plane |
1.1.7 | Networking with SDN |
1.2 | Why SD-WAN? |
1.2.1 | Complexity of the IT Infrastructures in the Subsidiaries |
1.2.2 | Adaptation to the Modern Cloud Infrastructure |
1.2.3 | Typical Services |
1.3 | What does SD-WAN offer? |
1.3.1 | Evaluation of SD-WAN |
2 | Architectural Concepts of SD-WAN |
2.1 | Features of the Conventional WAN Concept |
2.1.1 | Features of the Conventional WAN Concept |
2.1.2 | The Hub-and-Spoke Design |
2.2 | The Hybrid WAN Concept |
2.2.1 | Private WAN Connection via MPLS |
2.2.2 | Virtual Private LAN Service |
2.3 | GET VPNs to Protect the Transport over MPLS |
2.3.1 | The Connection to the Internet |
2.3.2 | Security via Firewall Systems |
2.3.3 | Router with Access Lists |
2.3.4 | Dynamic Packet Filters (Stateful Inspection) |
2.3.5 | Proxy Server |
2.3.6 | Firewalls—All in One |
2.4 | The SD-WAN Concept |
2.4.1 | Overlay Network over the Hybrid WAN |
2.4.2 | Application-based Routing |
2.4.3 | Performance Loop |
2.4.4 | Performance Routing |
2.4.5 | Classic Routing |
2.4.6 | Application Visibility |
2.4.7 | Direct Internet Access (DIA) |
2.5 | Provisioning Virtual Services |
2.5.1 | Brocade vRouter |
2.5.2 | Cloud Services Router 1000v |
2.5.3 | Virtual Firewalls and WAN Accelerator |
2.5.4 | Container Firewall by Juniper: cSRX |
2.5.5 | ASA1000V and vASA—The Virtualized Firewall |
2.5.6 | vWAAS |
2.6 | Orchestration |
2.6.1 | Infrastructure Orchestration |
2.6.2 | Service Orchestration |
2.6.3 | Service Chaining |
2.7 | North- & Southbound Protocols |
2.7.1 | REST API |
3 | SD-WAN Standardization |
3.1 | SD-WAN Components |
3.2 | Connection of the SD-WAN Router to the WAN |
3.2.1 | SD-WAN Router at the Customer Location |
3.2.2 | Connection to an MPLS Network |
3.2.3 | Site Redundancy |
3.3 | SD-WAN Controller Deployment |
3.3.1 | Customer-specific SD-WAN Controller |
3.3.2 | Cloud-based Customer-owned SD-WAN Controller |
3.3.3 | Cloud-based Vendor-owned SD-WAN Controller |
3.3.4 | Zero-touch Provisioning |
3.3.5 | Redundancy of the SD-WAN Controller |
3.4 | Routing |
3.4.1 | Creating Virtual Networks |
3.5 | Overlay Tunnel |
3.5.1 | Route Mass Withdrawal |
3.5.2 | Proactive Propagation of Tunnel End Points |
3.5.3 | Topologies in the Overlay |
3.5.4 | Data Traffic Protection |
3.6 | Application-based Routing |
3.6.1 | Reaction to Outages |
3.6.2 | Policer-based Traffic Offloading |
3.6.3 | Hardware-based Implementation |
3.6.4 | Detecting the Application |
3.7 | Performance Routing |
3.7.1 | Criteria for Performance Monitoring |
3.7.2 | Reaction to Changes of the Performance Parameters |
3.7.3 | Avoiding Periodic Deviations |
3.8 | Internet Access in the SD-WAN |
3.8.1 | Direct Internet Access |
3.8.2 | Optimization for Public Cloud Applications |
3.9 | Migration |
3.9.1 | Use of Aggregates |
3.9.2 | Avoiding Loops |
3.10 | Traffic Optimization |
3.10.1 | Optimization of VoIP and IPTV |
3.10.2 | Dynamic Remediation |
3.11 | Further Aspects |
3.11.1 | Service Insertion |
3.11.2 | Integration of Cloud Infrastructures |
4 | SD-WAN Vendors |
4.1 | SD-WAN Vendors in an Overview |
4.2 | VeloCloud—Cloud Delivered SD-WAN |
4.3 | Viptela—SD-WAN Solution |
4.4 | Versa Networks—Enterprise SD-WAN |
4.5 | Riverbed—Application Acceleration |
4.6 | Meraki—Software-defined WAN |
4.7 | Juniper Networks—Secure SD-WAN |
4.8 | Silver Peak Systems—Unity EdgeConnect |
4.9 | Aryaka Networks—SmartCONNECT |
4.10 | Nuage Networks—VNS |
5 | The Future of the SD-WAN |
5.1 | Locator/ID Separation Protocol (LISP) |
5.1.1 | LISP Overview |
5.1.2 | Application Scenarios |
5.1.3 | Evaluation |
5.2 | LISP in SDN Including IPv6 |
5.3 | SD-WAN Standardization |
5.3.1 | SD-WAN Concept According to MEF 70 |
A | List of Abbreviations |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.

-
Network architectures are undergoing a complete overhaul, initiated by the advent of software-defined networking (SDN). In addition to creating new possibilities, such as the reconfiguration of data paths in a matter of seconds through full automation, the main aim is to drive the operation of an enterprise network towards greater efficiency and flexibility. This trend is already having an impact on the design concepts of WAN connections. In addition to the highly reliable MPLS VPNs, cost-effective Internet connections are available as WAN connections. The hybrid WAN concept has been developed as an intermediate step towards software-defined WAN in order to make optimum use of both with regard to the QoS requirements of the applications. Here, data traffic is controlled by means of controller functions distributed across the network, while central control plane servers are used for this in the SD-WAN.
-
Course Contents
-
- Motivation and Market Overview
- Using MPLS-VPN and Internet Accesses in an Optimal Manner
- Overlay Network for WAN
- Requirements of the Application
- Application-Related Routing
- Central Control of the Data Traffic
- Optimization of the Data Transfer
- Security in SD-WAN and Hybrid WAN
- Controllers for SD-WAN
- Protocols for SD-WAN
- Design Concepts
- Migration Strategies
- Future Trends
The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.
Premium Course Documents
In addition to the digital documentation package, the exclusive Premium Print Package is also available to you.
- High-quality color prints of the ExperTeach documentation
- Exclusive folder in an elegant design
- Document pouch in backpack shape
- Elegant LAMY ballpoint pen
- Practical notepad
The Premium Print Package can be added during the ordering process for € 150,- plus VAT (only for classroom participation). -
Target Group
-
Planners and operators of enterprise wide area networks as well as employees of Internet service providers, whose tasks include the planning and optimization of customer WANs, will find numerous suggestions and state-of-the-art solutions in this course.
-
Knowledge Prerequisites
-
Solid knowledge of wide area networks and IP routing is required for successful participation.
1 | SD-WAN at a Glance |
1.1 | What is Software-Defined WAN? |
1.1.1 | What\qs behind Software-Defined Networking (SDN)? |
1.1.2 | The Idea |
1.1.3 | Definition of SDN |
1.1.4 | Classic Routers / Switch Networks |
1.1.5 | Software-Defined Networking |
1.1.6 | Substructure of the Control Plane |
1.1.7 | Networking with SDN |
1.2 | Why SD-WAN? |
1.2.1 | Complexity of the IT Infrastructures in the Subsidiaries |
1.2.2 | Adaptation to the Modern Cloud Infrastructure |
1.2.3 | Typical Services |
1.3 | What does SD-WAN offer? |
1.3.1 | Evaluation of SD-WAN |
2 | Architectural Concepts of SD-WAN |
2.1 | Features of the Conventional WAN Concept |
2.1.1 | Features of the Conventional WAN Concept |
2.1.2 | The Hub-and-Spoke Design |
2.2 | The Hybrid WAN Concept |
2.2.1 | Private WAN Connection via MPLS |
2.2.2 | Virtual Private LAN Service |
2.3 | GET VPNs to Protect the Transport over MPLS |
2.3.1 | The Connection to the Internet |
2.3.2 | Security via Firewall Systems |
2.3.3 | Router with Access Lists |
2.3.4 | Dynamic Packet Filters (Stateful Inspection) |
2.3.5 | Proxy Server |
2.3.6 | Firewalls—All in One |
2.4 | The SD-WAN Concept |
2.4.1 | Overlay Network over the Hybrid WAN |
2.4.2 | Application-based Routing |
2.4.3 | Performance Loop |
2.4.4 | Performance Routing |
2.4.5 | Classic Routing |
2.4.6 | Application Visibility |
2.4.7 | Direct Internet Access (DIA) |
2.5 | Provisioning Virtual Services |
2.5.1 | Brocade vRouter |
2.5.2 | Cloud Services Router 1000v |
2.5.3 | Virtual Firewalls and WAN Accelerator |
2.5.4 | Container Firewall by Juniper: cSRX |
2.5.5 | ASA1000V and vASA—The Virtualized Firewall |
2.5.6 | vWAAS |
2.6 | Orchestration |
2.6.1 | Infrastructure Orchestration |
2.6.2 | Service Orchestration |
2.6.3 | Service Chaining |
2.7 | North- & Southbound Protocols |
2.7.1 | REST API |
3 | SD-WAN Standardization |
3.1 | SD-WAN Components |
3.2 | Connection of the SD-WAN Router to the WAN |
3.2.1 | SD-WAN Router at the Customer Location |
3.2.2 | Connection to an MPLS Network |
3.2.3 | Site Redundancy |
3.3 | SD-WAN Controller Deployment |
3.3.1 | Customer-specific SD-WAN Controller |
3.3.2 | Cloud-based Customer-owned SD-WAN Controller |
3.3.3 | Cloud-based Vendor-owned SD-WAN Controller |
3.3.4 | Zero-touch Provisioning |
3.3.5 | Redundancy of the SD-WAN Controller |
3.4 | Routing |
3.4.1 | Creating Virtual Networks |
3.5 | Overlay Tunnel |
3.5.1 | Route Mass Withdrawal |
3.5.2 | Proactive Propagation of Tunnel End Points |
3.5.3 | Topologies in the Overlay |
3.5.4 | Data Traffic Protection |
3.6 | Application-based Routing |
3.6.1 | Reaction to Outages |
3.6.2 | Policer-based Traffic Offloading |
3.6.3 | Hardware-based Implementation |
3.6.4 | Detecting the Application |
3.7 | Performance Routing |
3.7.1 | Criteria for Performance Monitoring |
3.7.2 | Reaction to Changes of the Performance Parameters |
3.7.3 | Avoiding Periodic Deviations |
3.8 | Internet Access in the SD-WAN |
3.8.1 | Direct Internet Access |
3.8.2 | Optimization for Public Cloud Applications |
3.9 | Migration |
3.9.1 | Use of Aggregates |
3.9.2 | Avoiding Loops |
3.10 | Traffic Optimization |
3.10.1 | Optimization of VoIP and IPTV |
3.10.2 | Dynamic Remediation |
3.11 | Further Aspects |
3.11.1 | Service Insertion |
3.11.2 | Integration of Cloud Infrastructures |
4 | SD-WAN Vendors |
4.1 | SD-WAN Vendors in an Overview |
4.2 | VeloCloud—Cloud Delivered SD-WAN |
4.3 | Viptela—SD-WAN Solution |
4.4 | Versa Networks—Enterprise SD-WAN |
4.5 | Riverbed—Application Acceleration |
4.6 | Meraki—Software-defined WAN |
4.7 | Juniper Networks—Secure SD-WAN |
4.8 | Silver Peak Systems—Unity EdgeConnect |
4.9 | Aryaka Networks—SmartCONNECT |
4.10 | Nuage Networks—VNS |
5 | The Future of the SD-WAN |
5.1 | Locator/ID Separation Protocol (LISP) |
5.1.1 | LISP Overview |
5.1.2 | Application Scenarios |
5.1.3 | Evaluation |
5.2 | LISP in SDN Including IPv6 |
5.3 | SD-WAN Standardization |
5.3.1 | SD-WAN Concept According to MEF 70 |
A | List of Abbreviations |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
