Connecting to RISE using SD-WAN
What is SD-WAN
Software-Defined Wide Area Networking (SD-WAN)
Although SD-WAN primarily operates at Layer 3, using an overlay network such as broadband internet, it can utilize Layer 2 (Data Link) technologies such as AWS Direct Connect
In SD-WAN architecture, an SD-WAN headend acts as a hub or centralized network component, while SD-WAN edge devices
You can refer to more detailed information in the Reference Architectures for Implementing SD-WAN Solutions on AWS
Scenario A: SD-WAN appliances (edge and/or headend/hub) on-premises
AWS Transit Gateway Connect allows you to extend your SD-WAN network to AWS using GRE (Generic Routing Encapsulation)
The appliance must be configured to send and receive traffic over a GRE tunnel to and from the transit gateway using the Connect attachment. The appliance must be configured to use BGP (Border Gateway Protocol)
Each connection can be configured with its own route table and BGP peer, enabling you to extend your on-premises network segmentation via Virtual routing and forwarding (VRF) to AWS. The RISE with SAP VPC is attached to the AWS Transit Gateway.
This setup provides a streamlined way to connect your SD-WAN environment with RISE with SAP on AWS using AWS Direct Connect, maintaining network separation while simplifying the overall architecture.
In this scenario, the overlay network
Pattern A-1: SD-WAN devices integration with AWS Transit Gateway and AWS Direct Connect with your AWS landing zone
The preceding diagram illustrates a pattern of how you can extend and segment your SD-WAN traffic to AWS without adding extra infrastructure. You can create Transit Gateway connect attachments using an AWS Direct Connect connection as underlying transport in your AWS account.
Outbound from RISE with SAP VPC:
-
Traffic initiated from the RISE VPC to the corporate data center is routed to the Transit Gateway.
-
The Transit Gateway connect attachment uses the Direct Connect connection as the underlay transport and connects the Transit Gateway to the corporate data center SD-WAN device with GRE tunneling and BGP.
Inbound to RISE with SAP VPC:
-
Traffic from the corporate data center SD-WAN device to the RISE VPC is forwarded to the Transit Gateway via the GRE tunnel of the Transit Gateway attachment over the Direct Connect link.
-
Transit Gateway forwards the traffic to the destination RISE with SAP VPC.
Pattern A-2: SD-WAN devices integration with AWS Transit Gateway and AWS Direct Connect with no AWS landing zone
The preceding diagram illustrates a pattern of how you can extend and segment your SD-WAN traffic to AWS without adding extra infrastructure. In RISE with SAP, you can request SAP to create Transit Gateway connect attachments using a Direct Connect connection as underlying transport. Customers can leverage SAP-managed Direct Connect gateway (DXGW) if required.
Outbound from RISE with SAP VPC:
-
Traffic initiated from RISE VPC to the corporate data center is routed to the Transit Gateway.
-
The Transit Gateway connect attachment uses the Direct Connect connection as transport and connects the Transit Gateway to the corporate data center SD-WAN device using GRE tunneling and BGP.
Inbound to RISE with SAP VPC:
-
Traffic from the corporate data center SD-WAN device to the RISE VPC is forwarded to the Transit Gateway via the GRE tunnel of the Transit Gateway attachment over the Direct Connect link.
-
Transit Gateway forwards the traffic to the destination RISE with SAP VPC.
Scenario B: SD-WAN appliances (edge and/or headend/hub devices) in AWS
In this scenario, the virtual appliances of the SD-WAN network are deployed in a VPC within AWS. Then, you use a VPC attachment as underlying transport for the Transit Gateway connect attachment between the SD-WAN virtual appliances and the Transit Gateway in your AWS account(s). Similar to Scenario A, Transit Gateway connect attachments support GRE for higher bandwidth performance compared to a VPN connection. It supports BGP for dynamic routing and removes the need to configure static routes. In addition, its integration with Transit Gateway Network Manager provides advanced visibility through global network topology, attachment level performance metrics, and telemetry data.
Between on-premises and AWS, the overlay network
Note: Network patterns covered in the following sections are applicable only with your existing or a new landing zone setup on AWS. For SD-WAN appliances deployment and connectivity directly with AWS Account – managed by SAP, refer to Pattern A-2.
Pattern B-1: SD-WAN appliances in AWS integrated with AWS Transit Gateway Connect with your AWS landing zone
The preceding diagram illustrates a pattern of integrating your SD-WAN network with Transit Gateway using connect attachments and placing (third-party) virtual appliances of the SD-WAN network in an Appliance VPC within AWS. It’s common to have SD-WAN edge appliances deployed at branch locations, and on-premises data center to create a full mesh topology.
Outbound from RISE with SAP:
-
Traffic initiated from the RISE VPC to the corporate data center is routed to the Transit Gateway.
-
The Transit Gateway connect attachment uses the VPC attachment as transport and connects Transit Gateway to the third-party appliance in the Appliance VPC using GRE tunneling and BGP.
-
The third-party virtual appliance encapsulates the traffic, which uses the SD-WAN overlay – on top of the Direct Connect link – to reach the corporate data center.
Inbound to RISE with SAP:
-
Traffic from branches outside AWS to the RISE VPC reaches the internet gateway of the appliance VPC via the SD-WAN overlay over the internet. Similarly, traffic from the corporate data center to the RISE VPC reaches the virtual private gateway of the Appliance VPC via the SD-WAN overlay over the Direct Connect link.
-
The third-party virtual appliance in the appliance VPC forwards the traffic to the Transit Gateway via the connect attachment.
-
Transit Gateway forwards the traffic to the destination RISE VPC.
Pattern B-2: SD-WAN appliances in AWS integrated with AWS Site-to-Site VPN
The diagram above illustrates a pattern of integrating your SD-WAN network with Transit Gateway using an AWS Site-Site VPN connection and placing (third party) virtual appliances of the SD-WAN network in an Appliance VPC within AWS. You may use this option when your third-party virtual appliance does not support GRE. It’s common to have SD-WAN edge appliances deployed at branch locations, and on-premises data center to create a full mesh topology.
Outbound from RISE with SAP:
-
Traffic initiated from the RISE VPC to the corporate data center is routed to the Transit Gateway Elastic Network Interface (TGW ENI).
-
The traffic is routed between the Transit Gateway and the third-party virtual appliance using the Site-to-Site VPN connection.
-
The third-party virtual appliance encapsulates the traffic, which uses the SD-WAN overlay – on top of the Direct Connect link – to reach the corporate data center.
Inbound to RISE WITH SAP:
-
Traffic from branches outside AWS to the RISE VPC reaches the internet gateway of the appliance VPC via the SD-WAN overlay over the internet. Similarly, traffic from the corporate data center to the RISE VPC reaches the virtual private gateway of the appliance VPC via the SD-WAN overlay over the AWS Direct Connect link.
-
The third-party virtual appliance in the appliance VPC forwards the traffic to the Transit Gateway via Site-to-Site VPN connection.
-
Transit Gateway forwards the traffic to TGW ENI of the destination RISE VPC.