Tuesday, January 21, 2020

SilverPeak SDWAN Data Flow


Back to GigaNetworkers 

 

 

SilverPeak SDWAN Data Flow

Conceptual look at how packets are processed as they pass through an appliance. Traffic enters on the left, from the LAN, and proceeds to the right to the output interface.

 

 Steps below : 


 1. Packets come in from the LAN and the flows are inspected for matches with Route, QoS and
Optimization Policies. Traffic is classified and processed according to those policy matches
2. TCP traffic that is being accelerated is sent to TCP for processing where local proxy functions etc.
are performed.
3. Then it is processed with Network Memory, if optimization policy dictates,
4. And sent to the shaper
5. Otherwise it is classified according to QoS policies and then placed in the correct traffic class
queue for its destination tunnel.
6. UDP and other traffic receives Network Memory processing if optimization policy dictates, and
sent to the shaper for processing
7. Otherwise it is classified according to QoS policies, and placed in the correct traffic class queue for
its destination tunnel.
8. Pass-through Shaped traffic is sent to the Shaper for processing.
9. Pass-through Unshaped, at the bottom, is sent directly to the output interface.
10. The Shaper processes traffic according to the shaper configuration. QoS queues are serviced
according to priority unless their maximum wait time has been exceeded.
11. Packets are then processed according to Network Integrity and FEC packets are generated as
dictated by Link Bonding Policy configuration in the Business Intent Overlay.
12. Passthrough shaped traffic, which does not receive Network Integrity processing, is sent to the
output interface for processing and transmission.
13. Packets to be tunnelized are then encapsulated, based on the destination tunnel and tunnel type,
encrypted if necessary, and
14. Finally, they are sent to the appropriate output interface, either a physical NIC or VNIC for
transmission to the next-hop switch or router.
15. Starting in release 8.1.8, which introduces the zone based firewall, security policy is applied last,
when the output interface or overlay zone is known.


Common Network Issue and Solutions :

 

Back to GigaNetworkers 

 

No comments:

Post a Comment