Data Plane Encryption
Cisco SD-WAN utilizes in order to scale better and more efficiently. Most traditional IPsec environments use Internet Key Exchange (IKE) to handle the key exchange between IPsec peers.
In this lab, we are going to make some traffic engineering by modifying the TLOC preference of one of the WAN edge routers at the hub site.
In lab 2, we have created a Centralized Policy named CENTRALIZED-CONTROL-POLICY-V2 using the vManage GUI.
I think every network engineer has already seen that applications are moved to the cloud on a massive scale in recent years. Some apps are even developed and deployed directly in the cloud. These are known as Cloud-native applications or "born in the cloud".