Fortinet black logo

SD-WAN Architecture for Enterprise

7.0.0

Secure SD-WAN solution

Secure SD-WAN solution

It is essential to distinguish between Secure SD-WAN functionality and the Secure SD-WAN solution. Secure SD-WAN functionality can be configured on any FortiGate device without requiring a separate license or additional products and components. In other words, any FortiGate device can provide this functionality in a completely autonomous manner, including traffic steering intelligence, monitoring, and of course, security.

This chapter will explain how to transform a group of autonomous devices providing local Secure SD-WAN functionality into the most critical element of your Secure SD-WAN solution. FortiGate devices can act as intelligent edge devices, providing secure connectivity across all your sites, cloud services, and the internet over the most optimal available path. The following chapters will teach you how to complete your Secure SD-WAN solution by centralizing its management (provisioning, monitoring, and reporting).

However, before we discuss the design of the Secure SD-WAN solution, we must spend some time describing the SD-WAN functionality itself. This section includes the following topics:

Secure SD-WAN solution

It is essential to distinguish between Secure SD-WAN functionality and the Secure SD-WAN solution. Secure SD-WAN functionality can be configured on any FortiGate device without requiring a separate license or additional products and components. In other words, any FortiGate device can provide this functionality in a completely autonomous manner, including traffic steering intelligence, monitoring, and of course, security.

This chapter will explain how to transform a group of autonomous devices providing local Secure SD-WAN functionality into the most critical element of your Secure SD-WAN solution. FortiGate devices can act as intelligent edge devices, providing secure connectivity across all your sites, cloud services, and the internet over the most optimal available path. The following chapters will teach you how to complete your Secure SD-WAN solution by centralizing its management (provisioning, monitoring, and reporting).

However, before we discuss the design of the Secure SD-WAN solution, we must spend some time describing the SD-WAN functionality itself. This section includes the following topics: