Getting Started with Catalyst SD-WAN: Architecture to Deployment
Introduction
Picture this: your organization operates dozens of branch offices spread across multiple regions. Each branch relies on expensive MPLS circuits, and deploying a new site takes weeks of manual configuration. Cloud application performance is unpredictable, and your network team spends more time firefighting than innovating. This is the reality of traditional hardware-based WANs, and it is exactly the problem that Catalyst SD-WAN was designed to solve.
Catalyst SD-WAN takes a software-defined approach to wide area networking, replacing rigid, hardware-centric architectures with a flexible, policy-driven overlay that can leverage any transport -- MPLS, internet, 5G/LTE, satellite, or even LEO connections. Instead of configuring each router individually, you manage the entire fabric from a single pane of glass, push policies centrally, and onboard new sites with zero-touch provisioning.
This article walks you through the complete Catalyst SD-WAN journey, from understanding why traditional WANs fall short, to mastering the architecture components, to grasping key features like overlay management, application-aware routing, and integrated security. Whether you are preparing for a certification exam or planning a real-world deployment, this guide gives you the foundational knowledge you need to get started with confidence.
If you want hands-on practice with these concepts, check out the SD-WAN Deployment Lab course on NHPREP for guided lab exercises that reinforce everything covered here.
Why Traditional WANs No Longer Work
Traditional WANs were built for a world where applications lived in the data center and branch users connected back to headquarters over dedicated circuits. The architecture was hardware-based, static, and predictable. But today's enterprise landscape looks nothing like that.
Cloud adoption has changed everything. Applications now reside with cloud providers -- SaaS platforms, IaaS workloads, and multi-cloud deployments are the norm. Branch users need direct, optimized access to these cloud resources, not the backhauled path through a central data center that traditional WANs enforce.
The classical hardware-based WAN introduces several pain points:
- Rigid topology: Traffic from every branch must traverse the data center or headquarters, even when the destination is a public cloud application sitting on the internet.
- Expensive transport: MPLS circuits are costly, and adding bandwidth or new sites involves long lead times and contract negotiations.
- Manual configuration: Each router requires individual, device-level configuration. Scaling to dozens or hundreds of sites becomes an operational nightmare.
- Limited visibility: Without centralized monitoring, troubleshooting performance issues across the WAN is slow and reactive.
- Security gaps: As branches gain direct internet access for cloud applications, the existing security stack concentrated in the DMZ no longer covers every traffic path.
Catalyst SD-WAN addresses each of these challenges by decoupling the control plane from the data plane, centralizing policy management, and enabling transport independence. With SD-WAN, you can use any type of transport -- fiber, cable, satellite, LEO, LTE, 5G, or DSL -- and the overlay fabric treats them all as available paths for traffic.
What Is the Catalyst SD-WAN Architecture?
The Catalyst SD-WAN architecture is built on a clean separation of planes: management, orchestration, control, and data. Each plane has a dedicated component, and together they form a cohesive, scalable fabric.
At a high level, the architecture consists of four primary elements:
| Component | Plane | Role |
|---|---|---|
| SD-WAN Manager | Management | Single pane of glass for provisioning, monitoring, and policies |
| SD-WAN Validator | Orchestration | First point of authentication; facilitates NAT traversal |
| SD-WAN Controller | Control | Distributes routing and policy information across the fabric |
| WAN Edge Router | Data | Forwards user traffic; establishes secure tunnels |
An additional component, the Analytics Engine, provides telemetry and insights. From software version 20.15/17.15 onward, the SD-WAN Manager and Analytics are converged into a single platform.
This separation of planes is what gives Catalyst SD-WAN its scalability. In a traditional WAN, every router must peer with every other router, creating O(n-squared) control plane complexity. With SD-WAN, the Controllers act as intermediaries -- similar to BGP route reflectors -- reducing control plane complexity to O(n). This means the solution scales linearly as you add more sites, rather than exponentially.
Pro Tip: Understanding the four-plane architecture is essential for any SD-WAN certification exam. Know which component belongs to which plane and what functions it performs -- this is one of the most frequently tested concepts.
How Does the Catalyst SD-WAN Manager Work?
The SD-WAN Manager is the management plane component and serves as your single pane of glass for the entire SD-WAN fabric. It handles Day 0 (initial deployment), Day 1 (configuration and policy), and Day 2 (monitoring and optimization) operations.
Key Capabilities of the SD-WAN Manager
- Centralized provisioning: Deploy configurations to hundreds of WAN Edge routers from one interface, eliminating the need to touch each device individually.
- Policies and templates: Define intent-based policies that control traffic behavior across the fabric. Use Configuration Groups, Feature Profiles, and Feature Parcels to standardize and reuse configuration elements.
- Troubleshooting and monitoring: Run real-time queries against WAN Edge routers, perform ping, traceroute, speed tests, and packet captures directly from the GUI.
- Software upgrades: Manage firmware versions across the entire fleet from a central dashboard.
- GUI with RBAC: Role-based access control ensures that different teams see only what they need.
- Programmatic interfaces: The Manager exposes REST APIs and NETCONF interfaces for automation. The REST API provides a secure HTTPS interface supporting GET, PUT, POST, and DELETE methods, enabling Python scripting and integration with third-party automation tools.
- Multitenant with web scale: The Manager supports multi-tenancy, making it suitable for managed service provider (MSP) deployments.
Configuration Approaches
The SD-WAN Manager offers multiple approaches to configuration:
- Guided Workflows: Streamlined, end-to-end guidance that helps you deploy common use cases quickly. This is a one-stop shop for onboarding and deploying SD-WAN.
- Smart Defaults (Configuration Catalog): Pre-populated with recommended networking best practices. You decide what to keep and what to modify, enabling you to build a complete configuration in under five minutes.
- Configuration Groups and Feature Profiles: A Configuration Group is a logical grouping of intent that shares a common purpose within your WAN -- for example, grouping all branch sites or all data center sites. Feature Profiles are flexible buckets of configuration (such as WAN or LAN profiles) that can be shared across Configuration Groups. Feature Parcels are the individual capabilities within a Feature Profile, such as logging or MPLS settings.
Deployment Models
The SD-WAN Manager can be deployed in several ways to match your business requirements:
| Deployment Model | Description |
|---|---|
| Cloud-delivered | Hosted by the vendor in AWS and Azure, including Government Cloud (FedRAMP) options. Includes Standard (shared and dedicated) and Certified (PCI, SOC2, ISO, C5) environments. |
| Customer/MSP Hosted | Deployed on-premises in a customer or MSP private cloud, or in a public cloud environment managed by the customer or MSP. |
Cloud-delivered deployments offer lifecycle management of the SD-WAN fabric, agile and scalable service access, operational simplicity, and rich analytics with actionable insights. For air-gapped environments, the SD-WAN Manager supports monitoring capabilities local to the Manager instance itself.
Understanding the Catalyst SD-WAN Validator
The SD-WAN Validator operates on the orchestration plane and is the first component that every device in the fabric contacts. Think of it as the gatekeeper that authenticates devices and helps them find each other.
Core Functions of the Validator
- First point of authentication: The Validator uses a white-list model. Only devices that are pre-authorized (white-listed) can join the fabric. This prevents rogue devices from participating in the overlay.
- Distributes controller and manager lists: Once a WAN Edge router authenticates with the Validator, it receives the list of SD-WAN Controllers and Managers it should connect to. This bootstraps the entire onboarding process.
- Facilitates NAT traversal: The Validator discovers the public IP address of each WAN Edge router, even when the router sits behind NAT. It then communicates this public IP back to the WAN Edge, which is critical for establishing tunnels across NAT boundaries.
- Requires a universally reachable IP address: The Validator needs a public IP address, though it can sit behind a 1:1 NAT or port forwarding.
- Highly resilient: Multiple Validators can be deployed for redundancy.
Pro Tip: The Validator is a virtual machine and does not carry any user traffic. Its sole purpose is orchestration -- authenticating devices and helping them discover the rest of the fabric infrastructure.
How Do Catalyst SD-WAN Controllers Operate?
The SD-WAN Controller is the control plane component and can be thought of as the "brain" of the solution. It functions similarly to a BGP route reflector in traditional networking: it receives routing information from WAN Edge routers and redistributes it to other WAN Edges according to policy.
What the Controller Does
- Facilitates fabric discovery: When a new WAN Edge joins the fabric, the Controller helps it discover other WAN Edges and establish data plane tunnels.
- Disseminates control plane information: The Controller distributes reachability information (IP subnets and TLOCs), encryption keys, and routing policies to all WAN Edge routers.
- Distributes data plane and application-aware routing policies: Policies defined in the SD-WAN Manager are pushed through the Controllers to the WAN Edge routers for enforcement.
- Implements control plane policies: This includes service chaining, multi-topology, and multi-hop configurations that shape how traffic flows through the fabric.
- Dramatically reduces control plane complexity: Instead of every WAN Edge needing to peer with every other WAN Edge, all WAN Edges peer with the Controllers. Note that WAN Edge routers need not connect to all Controllers -- the fabric handles distribution automatically.
The Controllers communicate with WAN Edge routers using the Overlay Management Protocol (OMP), which runs inside authenticated TLS or DTLS connections. This secure channel carries all control plane information, including subnet routes, TLOC routes, service routes, encryption keys, and policies.
What Is the WAN Edge Router in Catalyst SD-WAN?
The WAN Edge Router sits on the data plane and is the component deployed at every site -- branches, campuses, data centers, and colocation facilities. It handles the actual forwarding of user traffic through the SD-WAN fabric.
WAN Edge Capabilities
- Secure data plane: Establishes IPsec tunnels with remote WAN Edge routers for encrypted data transport.
- Secure control plane with Controllers (OMP): Maintains OMP sessions with the Controllers over TLS/DTLS connections.
- Data plane and application-aware routing policy enforcement: Implements the policies distributed by the Controllers, including traffic steering based on application SLA requirements.
- Performance statistics export: Sends telemetry data to the SD-WAN Manager and Analytics Engine for monitoring and reporting.
- Traditional routing protocol support: Leverages OSPF, BGP, EIGRP, RIP, connected routes, static routes, and VRRP for integration with existing LAN and WAN infrastructure.
- Zero-touch provisioning: Onboards into the fabric automatically with no administrative intervention (more on this below).
- Physical or virtual form factor: Available as physical appliances or virtual machines, supporting throughputs from 100 Mbps to 100 Gbps.
Catalyst SD-WAN Router Platforms
The hardware portfolio includes routers sized for every deployment scenario:
| Platform | Use Case | IPsec Throughput | SD-WAN Throughput | Threat Protection |
|---|---|---|---|---|
| 8100 Series (4 variants) | Small Branch | Up to 1.5 Gbps | Up to 1 Gbps | Up to 1 Gbps |
| 8200 Series (2 variants) | Medium Branch | Up to 5 Gbps | Up to 4 Gbps | Up to 2.5 Gbps |
| 8300 Series (2 variants) | Large Branch | Up to 20 Gbps | Up to 15 Gbps | Up to 7 Gbps |
| 8400 Series (3 variants) | Campus | Up to 45 Gbps | Up to 23 Gbps | Up to 11 Gbps |
| 8500 Series (2 variants) | Data Center | Up to 45 Gbps | Up to 23 Gbps | Route scale up to 8M |
Additional platforms include the ISR 1000 Series for small branches, the Catalyst 8000V for virtual deployments, Catalyst Cellular Gateways (CG418-E, CG522-E), and the Catalyst IR Series (IR1100, IR1800, IR8100, IR8300) for industrial and rugged environments.
How Do Transport Colors and TLOCs Work in Catalyst SD-WAN?
One of the most distinctive concepts in Catalyst SD-WAN is the Transport Locator (TLOC). A TLOC uniquely identifies a WAN transport connection on a WAN Edge router and is defined by three attributes: System IP, Color, and Encapsulation type.
What Is a TLOC?
Every WAN interface on a WAN Edge router is associated with a TLOC. The WAN Edge advertises its local TLOCs to the Controllers via OMP. The Controllers then redistribute these TLOCs to all other WAN Edges in the fabric (by default), enabling full-mesh IPsec tunnel establishment.
For example, consider a WAN Edge with System IP 10.0.0.1, two interfaces -- one connected to the internet (G0/1) and one connected to MPLS (G0/0):
- TLOC 1: System IP 10.0.0.1, Color: Internet, Encapsulation: IPsec
- TLOC 2: System IP 10.0.0.1, Color: MPLS, Encapsulation: IPsec
Understanding Colors
Color is an abstraction used to identify individual WAN transports. It serves two critical purposes: it labels the type of transport, and it dictates whether private or public IP addresses are used for tunnel establishment when NAT is present.
Colors are divided into two categories:
| Category | Colors |
|---|---|
| Private Colors | metro-ethernet, mpls, private1, private2, private3, private4, private5, private6 |
| Public Colors | 3g, lte, biz-internet, public-internet, blue, green, red, gold, silver, bronze |
The distinction matters for tunnel establishment:
- Two endpoints with private colors: The private IP address and port are used for DTLS/TLS or IPsec tunnel establishment.
- One or both endpoints with public colors: The public IP address is used for DTLS/TLS or IPsec tunnel establishment.
Color Restrict
When color restrict is enabled, the system prevents attempts to establish IPsec tunnels between TLOCs with different colors. This is useful when you want to ensure that traffic stays within a specific transport domain -- for example, keeping MPLS traffic on MPLS and internet traffic on internet, without cross-transport tunneling.
Pro Tip: Policies can be created based on TLOC colors, giving you granular control over which transports carry which types of traffic. This is a powerful tool for implementing traffic engineering across your SD-WAN fabric.
How Does the Overlay Management Protocol (OMP) Work?
The Overlay Management Protocol (OMP) is the control plane protocol that ties the entire Catalyst SD-WAN fabric together. It is a TCP-based, extensible protocol that runs between WAN Edge routers and Controllers, and between Controllers themselves.
OMP Characteristics
- Runs inside authenticated TLS/DTLS connections, ensuring that all control plane communication is encrypted and authenticated.
- Advertises control plane context and policies, including routing information, security parameters, and data plane policies.
- Dramatically lowers control plane complexity and raises overall solution scale by centralizing route distribution through the Controllers.
What Does OMP Advertise?
OMP updates carry three categories of information:
- Reachability: IP subnets (prefixes learned from the LAN side via OSPF, BGP, EIGRP, RIP, connected, or static routes) and TLOCs (transport locators identifying WAN interfaces).
- Security: Encryption keys used for IPsec tunnel establishment between WAN Edge routers.
- Policy: Data plane policies and application-aware routing (AAR) policies that control how traffic is forwarded.
Fabric Operation Walkthrough
Here is how the fabric operates end to end:
- Each WAN Edge router learns LAN-side routes via traditional routing protocols (BGP, OSPF, EIGRP, RIP, connected, or static).
- The WAN Edge converts these routes into OMP routes and advertises them to the Controller along with its local TLOCs.
- The Controller processes these OMP updates and redistributes them to other WAN Edge routers according to policy.
- Remote WAN Edge routers receive the OMP updates containing subnets, TLOCs, and policies.
- WAN Edge routers use the received TLOC information to establish IPsec tunnels with each other (the data plane).
- Bidirectional Forwarding Detection (BFD) runs over these IPsec tunnels to detect path failures quickly.
- User traffic flows through the IPsec tunnels between WAN Edge routers, segmented by VPN (VRF).
What Are VPNs and Segmentation in Catalyst SD-WAN?
Segmentation is a foundational capability of Catalyst SD-WAN. The solution uses VPNs (VRFs) to create isolated network segments that maintain separate forwarding tables and provide end-to-end traffic separation across the fabric.
VPN Types
| VPN | Purpose | Description |
|---|---|---|
| VPN 0 | Transport | Reserved for WAN uplinks. This is where your MPLS, internet, and other transport interfaces reside. |
| VPN 512 | Management | Reserved for management interfaces used to access the router out-of-band. |
| VPN n (user-defined) | Service | Represents user-defined LAN segments. You create these for different business functions, departments, or security zones. |
Key Segmentation Characteristics
- VPNs are isolated from each other, with each VPN maintaining its own forwarding table.
- Reachability within a VPN is advertised by OMP, ensuring that routes are distributed only to the appropriate segments.
- WAN Edge routers maintain per-VPN routing tables for complete control plane separation.
Multiple topologies can be applied per segment:
- Full Mesh: Every site can communicate directly with every other site.
- Hub and Spoke: Branch sites communicate through a central hub.
- Partial Mesh: Selected sites have direct communication.
- Point to Point: Dedicated connectivity between two specific sites.
This end-to-end segmentation capability extends from the branch through the SD-WAN fabric to the data center, ensuring that traffic from different VPNs never crosses boundaries unless explicitly permitted by policy.
How Does Catalyst SD-WAN Handle Security?
SD-WAN introduces new security challenges. When branches gain direct internet access for cloud and SaaS applications, they are exposed to threats that were previously mitigated by the centralized security stack in the data center DMZ. Catalyst SD-WAN addresses this with a comprehensive, multi-layered security architecture.
Data Plane Security
Pairwise encryption ensures that traffic between any two WAN Edge routers is encrypted with unique session keys:
- Each WAN Edge creates a separate session key for each transport and for each peer.
- Session keys are advertised through the Controllers using OMP.
- When Edge-A needs to send traffic to Edge-B, it uses session key "AB." Edge-B uses session key "BA" for return traffic. This pairwise model means that compromising one key pair does not expose traffic between other site pairs.
Data plane integrity is maintained using AES256-GCM encryption. The Validator discovers each WAN Edge's public IP address (even through NAT) and communicates it back to the WAN Edge. The WAN Edge then computes authentication values based on the post-NAT public IP, preserving packet integrity including IP headers across NAT boundaries.
IPsec anti-replay protection prevents replay and injection attacks:
- Encrypted packets are assigned sequence numbers.
- WAN Edge routers drop packets with duplicate sequence numbers (replayed packets).
- Packets with sequence numbers lower than the minimum of the sliding window are dropped (maliciously injected packets).
- The sliding window is CoS-aware to prevent low-priority traffic from interfering with high-priority traffic.
Integrated Security Features
Catalyst SD-WAN embeds multiple security services directly into the WAN Edge router:
| Security Feature | Description |
|---|---|
| Stateful Firewall (NGFW) | Layer 3-7 application classification using NBAR2/SDAVC. Supports VRFs and interfaces as zones, self-zones, default-zones. Policy based on IPv4/IPv6, ports, protocols, FQDN, GEO, SGTs, user/user-group, and applications. Firewall actions: Pass, Drop, or Inspect. |
| Intrusion Prevention System (IPS/IDS) | Powered by the Snort 3.0 engine. IPS signatures from Talos are updated automatically by the SD-WAN Manager. Security levels include Connectivity, Balanced, Security, and Custom. Supports IPS signature allow lists. |
| URL Filtering | Content filtering of HTTP and HTTPS traffic using 82+ web categories with dynamic updates. Processing order: allow lists, block lists, web categories, then web reputation score. Supports custom regex-based allow and block URL lists. |
| Advanced Malware Protection (AMP) | Integration with the AMP cloud for file reputation and file retrospection. Integration with Threat Grid for file analysis (sandboxing). |
| TLS/SSL Decryption | TLS proxy acts as a man-in-the-middle, dynamically generating server certificates. The SD-WAN Manager can act as a Certificate Authority to automate proxy certificates. Policy-based decryption with URL reputation/category exclusions. Requires greater than 8 GB RAM on the WAN Edge. |
| DNS Security | Cloud-based DNS inspection with automatic API key registration. VPN-aware policies. Blocks malware, phishing, and non-compliance domain requests. Supports DNScrypt and local domain bypass. |
SASE Integration
For organizations adopting a Secure Access Service Edge (SASE) model, Catalyst SD-WAN integrates with cloud security services. The integration supports automated connectivity with auto or manual region selection, controller-based automation framework, and robust reliability with support for 8 active and 8 backup tunnels. Application assurance, tracking, and advanced traffic steering are all supported.
Catalyst SD-WAN also shares enterprise context with cloud security platforms, including both macro-segmentation (VPN ID) and micro-segmentation (SGT) context. This enables granular, differentiated security policy enforcement for different user segments -- employees, guests, and IoT devices -- all accessing internet and SaaS applications from a branch.
How Does Zero-Touch Deployment Work in Catalyst SD-WAN?
One of the most operationally transformative features of Catalyst SD-WAN is automated, zero-touch onboarding. A WAN Edge router can join the SD-WAN fabric automatically with no administrative intervention at the remote site.
The Onboarding Process
- Connect the WAN Edge to a transport: The router needs a WAN connection that can provide a dynamic IP address, default gateway, and DNS information via DHCP.
- DNS resolution: The router resolves the Validator address using DNS.
- Validator authentication: The WAN Edge contacts the Validator, which authenticates the device using the white-list model (the device serial number must be pre-authorized).
- Controller and Manager discovery: Upon successful authentication, the Validator provides the WAN Edge with the list of Controllers and Managers.
- OMP session establishment: The WAN Edge establishes OMP sessions with the Controllers over DTLS/TLS tunnels.
- IPsec fabric formation: Using TLOC information received from the Controllers, the WAN Edge establishes IPsec tunnels with other WAN Edges, joining the data plane fabric.
If DHCP service is not available on the WAN transport, you can use a bootstrap file stored on a USB drive or in the router's boot-flash to provide the initial connectivity parameters.
Pro Tip: Before shipping a router to a remote site, ensure its serial number has been added to the Validator's white list and that your SD-WAN Manager has the appropriate configuration template ready. When the router powers on and gets a DHCP address, it will automatically contact the Validator, receive its configuration, and join the fabric -- all without anyone at the remote site needing to touch the CLI.
What Are Application-Aware Routing and Optimization in Catalyst SD-WAN?
Application-Aware Routing (AAR) is one of the most powerful features of Catalyst SD-WAN. It continuously monitors path quality across all available tunnels and steers application traffic to the path that best meets the defined SLA requirements.
How AAR Works
You define SLA classes for different applications in the SD-WAN Manager. An SLA class specifies thresholds for three metrics:
- Latency (e.g., less than 150 ms)
- Loss (e.g., less than 2%)
- Jitter (e.g., less than 10 ms)
The WAN Edge router continuously measures these metrics across all available paths using BFD probes. When multiple paths meet the SLA, traffic is load-balanced (hashed) across them. If a path is defined as preferred and it meets the SLA, it is chosen. If no path meets the SLA, fallback actions can be configured.
Traffic Distribution Options
Catalyst SD-WAN supports several traffic distribution methods:
| Method | Behavior |
|---|---|
| Per-session load sharing (Active/Active) | Traffic is distributed across all paths on a per-flow basis. |
| Per-session weighted (Active/Active) | Traffic is distributed with weighting, sending more traffic over preferred paths. |
| Application pinning (Active/Standby) | Specific applications are pinned to a primary path with failover to a standby. |
Cloud OnRamp for SaaS
For SaaS applications, Catalyst SD-WAN provides Cloud OnRamp for SaaS, which optimizes access to cloud applications from branch sites:
- The WAN Edge router performs quality probing for selected SaaS applications across each local Direct Internet Access (DIA) exit by simulating client connections using HTTP ping.
- Results are quantified as a vQoE score (a combination of loss and latency).
- The local DIA exit with the better vQoE score is chosen to carry traffic for the selected SaaS application.
- When a regional gateway is available, probing extends to compare the local DIA path against the regional internet exit, choosing the best performer.
- Cloud OnRamp for SaaS supports 14 built-in applications plus a custom application option using NBAR.
AppQoE and WAN Optimization
Catalyst SD-WAN includes key building blocks for application quality of experience:
- TCP Optimization: Window scaling, large initial windows, selective acknowledgement, and BBR2 congestion algorithm.
- Byte-level caching and compression: DRE (Data Redundancy Elimination) and LZW compression reduce bandwidth consumption.
- Forward Error Correction: Protocol-agnostic FEC recovers lost packets without retransmission.
- Packet Duplication: Critical traffic can be duplicated across multiple paths to ensure delivery.
Multi-Region Fabric and Multi-Cloud Connectivity
As organizations grow globally, the scale of a single SD-WAN fabric can become a challenge. Multi-Region Fabric (MRF) addresses this by enabling hierarchical fabric designs.
What Is Multi-Region Fabric?
MRF provides intuitive, user-defined site grouping -- for example, grouping sites by geography (US region, EMEA region). Key capabilities include:
- Finer grouping using sub-regions within each region.
- Automatic restriction of overlay tunnels between regions, preventing uncontrolled full-mesh tunnel proliferation across the global fabric.
- Different topologies per region: Each region can use a different topology (full mesh, hub-and-spoke, etc.) based on its requirements.
- Mixed access transports across regions: Different regions can use different combinations of MPLS, internet, and other transports.
- Scaled control plane per region: Each region can have its own set of Controllers for localized control plane processing.
MRF introduces two router roles:
- Border Routers (BR): Regional hubs that connect access regions to the core region.
- Edge Routers (ER): Branch routers within an access region.
Inter-region connectivity flows through Border Routers and the core region, which can leverage middle-mile backbones from cloud service providers (AWS, Azure, GCP) or software-defined cloud interconnect (SDCI) providers.
Multi-Cloud Connectivity
Catalyst SD-WAN extends the fabric into public clouds, offering three connectivity models:
- Enterprise site to enterprise site: Traditional site-to-site connectivity over the SD-WAN fabric.
- Enterprise site to cloud: Connecting on-premises sites to workloads running in AWS, Azure, or GCP.
- Cloud to cloud / inter-cloud: Connecting workloads across different cloud providers or regions.
For AWS deployments, the solution automates provisioning of SD-WAN Transit VPC and Transit Gateway (TGW), handles route exchange for site-to-cloud and site-to-site traffic over the AWS backbone, and provides full visibility into inter-regional transit traffic with TGW Network Manager. Consistent policy and segmentation extend across branch and cloud for enterprise-class security.
Automation options include the built-in Cloud OnRamp for Multicloud (managed through the SD-WAN Manager UI) and custom automation using third-party tools like Terraform and Ansible.
Analytics, AIOps, and Operational Visibility in Catalyst SD-WAN
Day 2 operations are where most network teams spend the majority of their time. Catalyst SD-WAN provides extensive analytics and AI-driven operations to simplify ongoing management.
Analytics and Insights
The SD-WAN Analytics Engine provides:
- Application experience: Visibility into network and application performance with historical trends and daily, weekly, and monthly aggregates.
- End-to-end path visualization: Trace traffic flows from source to destination across the fabric.
- Traffic flow patterns: Understand application distribution across circuits.
- Scheduled reports: Network and security reports with various formatting, scheduling, and delivery options for performance monitoring, capacity planning, compliance, and cost management.
Network-Wide Path Insights (NWPI)
NWPI answers the five key troubleshooting questions: Who, What, Where, When, and Why. It provides hyperlinks that help you quickly spot impacted flows and drill down to a deeper understanding of the root cause. NWPI also integrates with ISE for identity visibility, enabling traces to be triggered for specific users and groups.
Traffic Logs
From version 20.18, the Traffic Logs feature (Monitor > Logs > Traffic Logs) provides five-tuple flow data for all flows across the network, firewall details including policy name and zone pair, and customized queries to retrieve specific flow information.
AIOps Capabilities
Catalyst SD-WAN leverages AI and machine learning for:
- Predictive path recommendations: AI-driven suggestions to improve application performance.
- Bandwidth forecasting: ML-based forecasting for capacity planning.
- Anomaly detection: Detect network anomalies and mitigate issues before they impact users. When issues do occur, root cause analysis reduces mean time to repair (MTTR).
- AI Assistant for Networking: An interactive, LLM-based generative AI assistant for troubleshooting and analysis.
Frequently Asked Questions
What is the difference between SD-WAN and SD-Routing?
SD-WAN and SD-Routing share the same SD-WAN Manager and SD-WAN Validator components, but SD-Routing does not require SD-WAN Controllers. SD-Routing is designed for environments running traditional WAN protocols like DMVPN, FlexVPN, GET VPN, and MPLS VPN that want centralized management and operational simplification without migrating to a full SD-WAN overlay fabric. Both can run on the same Catalyst 8000 Series and the newer 8000 Series Secure Router platforms.
How many SD-WAN Controllers do I need?
The number of Controllers depends on the scale of your deployment. Controllers are deployed as virtual machines and should be deployed in pairs (or more) for redundancy. In Multi-Region Fabric deployments, each region can have its own set of Controllers to scale the control plane independently. WAN Edge routers do not need to connect to all Controllers -- the fabric handles distribution automatically.
Can Catalyst SD-WAN work with any WAN transport?
Yes. Catalyst SD-WAN is transport-independent and supports fiber, cable, satellite, LEO, LTE, 5G, DSL, MPLS, and internet. The TLOC color abstraction allows you to label each transport and create policies that control how different transports are used for different types of traffic.
What licensing is required for Catalyst SD-WAN?
Licensing is based on the Cisco Networking Subscription (CNS) model. Two tiers are available: Cisco WAN Essentials (basic SD-WAN features) and Cisco WAN Advantage (advanced SD-WAN features). For security features (threat protection, malware defense, URL filtering), an Advanced Security add-on is available. Cloud-hosted management requires a Cloud or Cloud-Pro per-device add-on. The licensing model has been simplified with no more bandwidth tiers or HSEC requirements, and licenses can be co-termed to a single end date for easy renewals.
What is application-aware routing and how is it different from traditional routing?
Application-aware routing (AAR) goes beyond traditional destination-based forwarding by making routing decisions based on real-time path quality metrics -- latency, loss, and jitter. You define SLA classes per application, and the WAN Edge continuously measures path quality using BFD. If a path degrades below the SLA threshold, traffic is automatically steered to a path that meets the SLA, all without manual intervention. Traditional routing protocols like OSPF or BGP do not have this per-application, SLA-driven awareness.
Does Catalyst SD-WAN support zero-touch provisioning?
Yes. WAN Edge routers support fully automated, zero-touch onboarding. You connect the router to a WAN transport with DHCP (providing an IP address, default gateway, and DNS), and the router automatically contacts the Validator, authenticates, discovers the Controllers and Manager, receives its configuration, and joins the fabric. If DHCP is not available, a bootstrap file on a USB drive or boot-flash provides the necessary initial parameters.
Conclusion
Catalyst SD-WAN represents a fundamental shift in how enterprise WANs are designed, deployed, and operated. By separating the management, orchestration, control, and data planes into dedicated components -- the SD-WAN Manager, Validator, Controller, and WAN Edge Router -- the architecture delivers scalability, automation, and security that traditional WANs simply cannot match.
The key takeaways from this guide are:
- Architecture matters: Understanding the four-plane model and how OMP ties everything together is the foundation for successful SD-WAN deployment and troubleshooting.
- Transport independence: TLOC colors and the overlay fabric let you use any combination of transports without being locked into a single provider.
- Security is built in: From pairwise IPsec encryption and anti-replay protection to integrated NGFW, IPS, URL filtering, and AMP, security is not an afterthought -- it is woven into the fabric.
- Automation reduces operational burden: Zero-touch provisioning, guided workflows, smart defaults, and AIOps capabilities dramatically reduce the time and effort needed to deploy and manage the WAN.
- Cloud optimization is native: Cloud OnRamp for SaaS and multi-cloud connectivity ensure that cloud applications perform well regardless of where users are located.
Ready to put these concepts into practice? The SD-WAN Deployment Lab course on NHPREP provides hands-on exercises that walk you through deploying and configuring a Catalyst SD-WAN fabric from scratch. There is no better way to solidify your understanding than by building it yourself.