![]() Control Component Redundancy/High Availability.On-Premise Control Component Deployment.Cisco Cloud-Hosted Deployment (recommended).Ports for SD-WAN Manager Clustering and Disaster Recovery.Protocols Allowed Through the Tunnel Interface.Network Configuration Protocol (NETCONF).Additional Ports for the VPN 0 Transport.Bidirectional Forwarding Detection (BFD).Communication Between Private and Public Colors.When multiple authentication types are configured, the strongest method between the two points is chosen (AH-SHA1 HMAC). By default, AH-SHA1 HMAC and ESP HMAC-SHA1 are both configured. The authentication algorithm, which verifies the integrity and authenticity of data, is configurable and is included in TLOC properties which is exchanged with the SD-WAN Controllers. The encryption algorithm is AES-256 GCM but can fall back to AES-256 CBC if needed (as in the case of multicast traffic). ![]() For encrypting data plane traffic, a modified version of Encapsulating Security Payload (ESP) is used to protect the data packet payload.SD-WAN Validator as a NAT Traversal Facilitator.Automated Device Provisioning (ZTP or PnP).Authentication/Authorization of SD-WAN Devices.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |