![]() Legacy WAN architectures typically consist of multiple MPLS transports, or an MPLS paired with an Internet or LTE used in an active/backup fashion, most often with Internet or software-as-a-service (SaaS) traffic being backhauled to a central data center or regional hub for Internet access. Legacy WAN architectures are facing major challenges under this evolving landscape. High availability and scale continue to be important. In addition, security needs are increasing and applications are requiring prioritization and optimization, and as this complexity grows, there is a push to reduce costs and operating expenses. There is a greater demand for mobile and Internet-of-Things (IoT) device traffic, SaaS applications, and cloud adoption. The enterprise landscape is continuously evolving. Traffic Symmetry for Application VisibilityĪppendix A: Documentation References.Equal-Cost Multipath (ECMP) for Tunnels.vManage Network Management System (NMS).Controller Redundancy/High Availability.Cisco Cloud-Hosted Deployment (recommended).Ports for vManage Clustering and Disaster Recovery.Protocols Allowed Through the Tunnel Interface. ![]() Network Configuration Protocol (NETCONF). ![]() Additional Ports for the VPN 0 Transport.Bidirectional Forwarding Detection (BFD).Communication Between Private and Public Colors.When multiple authentication types are configured, the strongest method between the two points is chosen (AH-SHA1 HMAC). ![]() By default, AH-SHA1 HMAC and ESP HMAC-SHA1 are both configured. The authentication algorithm, which verifies the integrity and authenticity of data, is configurable and is included in TLOC properties which is exchanged with the vSmart controllers. The encryption algorithm is AES-256 GCM but can fall back to AES-256 CBC if needed (as in the case of multicast traffic).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |