Fortinet black logo

Introduction

7.0.0
Copy Link
Copy Doc ID b5abead0-e74d-11ec-bb32-fa163e15d75b:445259
Download PDF

Introduction

The intention of this reference architecture is to provide an overview of Fortinet SD-WAN solution, along with the components and architectures to satisfy common use cases. This document will cover the Fortinet technology involved in deploying various types of SD-WAN designs, along with considerations and best practices. Our intention is to design a highly scalable, redundant, and secure SD-WAN design that is practical for your organizational requirements.

This document is not intended to be a step-by-step configuration guide. Instead, it is meant to be the starting point in your network design, where you begin to draw out the architecture that will be used to meet your specific needs. Fortinet’s SD-WAN Deployment Guide will cover the how-to configuration for some of the common architectures and designs covered in this document.

For more information and documentation about the topics covered in this document, please see the Fortinet Document Library at https://docs.fortinet.com.

This section contains the following topics:

Introduction

The intention of this reference architecture is to provide an overview of Fortinet SD-WAN solution, along with the components and architectures to satisfy common use cases. This document will cover the Fortinet technology involved in deploying various types of SD-WAN designs, along with considerations and best practices. Our intention is to design a highly scalable, redundant, and secure SD-WAN design that is practical for your organizational requirements.

This document is not intended to be a step-by-step configuration guide. Instead, it is meant to be the starting point in your network design, where you begin to draw out the architecture that will be used to meet your specific needs. Fortinet’s SD-WAN Deployment Guide will cover the how-to configuration for some of the common architectures and designs covered in this document.

For more information and documentation about the topics covered in this document, please see the Fortinet Document Library at https://docs.fortinet.com.

This section contains the following topics: