Navigate to:
Versa Networks is a market leader in SD-WAN, SD-Security, and SASE technology, with over 120 service provider partners worldwide. In the United States (US), Versa’s largest partners include Verizon, Lumen, and Comcast. Versa has the largest number of Global SD-WAN deployments. Versa solution is responsible for the networking and security of many global mission-critical networks in the financial, banking, energy, satellite, maritime, retail, health care, and other verticals where the best user-to-application performance in the face of all types of failures and security are the primary focus.
Read the white paper here or Download the PDF.
This white paper describes how the Versa SD-WAN, ZTNA, and SASE solutions are very well suited for satellite, maritime, and federal networks that operate in adverse and DDIL (Denied, Disrupted, Intermittent, and Limited) conditions and which often leverage NSA’s High Assurance Internet Protocol Encryption (HAIPE) or Commercial Solutions for Classified (CSfC)-based architectures.
NSS Labs has tested Versa SD-WAN, NGFW (Next Generation Firewall), and NGIPS (Next Generation Intrusion Prevention System). Product efficacy with stopping attacks was very high, while the cost of Mbps secured was the lowest amongst OEMs.
Versa has married its native SD-WAN, SD-Security, and Multi-Cloud features to deliver a cohesive and comprehensive SASE and Multi-Cloud solution.
Figure 2 shows a periodic chart of the routing, SD-WAN, and secure services edge features that Versa supports. Using these capabilities, Versa enables its customers to do the following:
Built Using IETF Standards-Based Protocols: Based on BGP/MPLS VPN and Ethernet VPN, with the use of a Private SAFI (Sub Address Family Identifier) to carry SD-WAN- related information such as:
Comprehensive QoS Capabilities Versa solution supports very comprehensive QoS (Layer3-QoS-Policy, AppQoS Policy, Policer, Marking, HQoS with 4K shapers and 64,000 queues) and SD-WAN traffic steering capabilities. Based on the layer3-layer7 fields within the received traffic, including application, URL category, and device posture, a forwarding class (FC) and packet-loss priority (PLP) is associated with a traffic flow. The FC and PLP prioritize and schedule the traffic within a VOS platform. Additionally, rewrites of inner and outer headers and egress-shaping are done based on the FC and PLP. Hence, mission traffic is prioritized over less-critical traffic within a Versa appliance as well as on transmission.
Support for complex topologies such as Full Mesh, Hub and Spoke, Partial Mesh, Spoke-Hub-Hub-Spoke, Hub-Controllers, Controller behind the hub, and many more.
Very rich template infrastructure: Versa supports a very rich template infrastructure that supports a hierarchy of templates. Using this hierarchy of templates, global policies can be defined with specific policies having higher precedence. This makes the overall configuration management simple and efficient.
A device group is a collection of devices with similar but not identical configurations. A device group is typically associated with a device template and a set of service templates of different types, such as security service template, application steering service template, QoS service template, General service template, and others. A device group can be associated with multiple security service templates which are applied in an operator-specified order. Additionally, there can be device-specific security service templates.
CGNAT for v4 and v6 NAPT-44, DNAT-44, Dynamic NAT-44, Basic-NAT-44, Twice Basic NAT-44, NPT66, NAT64, MAP-E
Multiple options for Zero Touch Provisioning.
Universal CPE to host multiple VNFs. Service Chaining hosted VNFs and external physical PNFs.
Versa also offers a Tunnel-Less SD-WAN solution, which makes the network more scalable, and bandwidth-efficient, eliminating fragmentation of packets and better security. Some of the use cases that drove this tunnel-less solution were satellite, maritime, and federal networks that leverage NSA High Assurance Internet Protocol Encryption (HAIPE) or Commercial Solutions for Classified (CSFC)-based architectures.
Versa also offers a Tunnel-Less SD-WAN solution, which makes the network more scalable, and bandwidth-efficient, eliminating fragmentation of packets and better security. Some of the use cases that drove this tunnel-less solution were satellite, maritime, and federal networks that leverage NSA High Assurance Internet Protocol Encryption (HAIPE) or Commercial Solutions for Classified (CSFC)-based architectures.
In the case of all Tunnel-less solutions, the inner packet is divided into mutable and immutable fields. Figure 3 shows all the common fields of an IP header, TCP header, and UDP header. A subset of immutable fields within an IP header, TCP header, and UDP header, which are invariant for the duration of a 5-tuple flow are show in blue color. All solutions associate some form of a cookie, label, flow-id, or a (source-port, destination-port) pair with the immutable fields.
This cookie/label/flow-id/port-pair is communicated with the entire payload packet from a sender SD-WAN CPE (SDWAN-CPE1) to a receiver SD-WAN CPE (SDWAN-CPE2) at least once. Once a remote SDWAN-CPE (e.g., SDWAN-CPE2) has learned the mapping of the sender (e.g., SDWAN-CPE1) and communicates it to the sender, the sender (SDWAN-CPE1) encodes its flow-id in the SDWAN-header and skips all immutable fields of the payload packet in the traffic that is sent from SDWAN-CPE1 to SDWAN-CPE2. Please note that within the Versa Tunnel-less solution, a sender SD-WAN CPE skips many other IP, TCP, and UDP fields of the payload packet when sending traffic to a peer SD-WAN CPE. These are not described in this white paper.
A detailed packet flow in the case of the Versa Tunnel-less solution is described in Figure 4, where Client5 (C5) is communicating with Server7 (S7) through SD-WAN CPE-1 and SD-WAN CPE-2.
In Versa’s tunnel-less solution, the first packet from an ingress SD-WAN node to a peer SD-WAN node and vice versa will have complete information, while all subsequent packets from either direction will only carry the metadata along with the payload, allowing us to accommodate larger payloads or conserve bandwidth usage based on our use case.
Compared to existing tunnel-less technologies on the market, Versa’s innovative Tunnel-Less solution has significant advantages, some of which are listed below.
SD-WAN creates a virtual private network that is transport-agnostic, application-aware, and supports centralized management and provisioning. It is essential that an SD-WAN solution can easily insert itself into a brownfield network and allow for gradual migration from the existing MPLS or DMVPN networks to the SD-WAN network.
As explained above, in the case of all Tunnel-less solutions, the inner packet is divided into mutable and immutable fields. All solutions associate some form of a cookie, label, flow-id, or a (source-port, destination-port) pair with the immutable fields. This cookie/label/flow-id/port-pair is communicated with the entire payload packet from a sender SD-WAN CPE (SDWAN-CPE1) to a receiver SD-WAN CPE (SDWAN-CPE2) at least once. Once a remote SDWAN-CPE (e.g., SDWAN-CPE2) has learned the mapping of the sender (e.g., SDWAN-CPE1) and communicates it to the sender, the sender (SDWAN-CPE1) encodes its flow-id in the SDWAN-header and skips all immutable fields of the payload packet in the traffic that is sent from SDWAN-CPE1 to SDWAN-CPE2.
Because of the different ways (flow-ids, combination of outer source-port and destination-port) that various vendors have chosen to encode the immutable data, they can only inter-operate at the boundaries (NNI: Network to Network Interface) of the different vendors’ SDWAN networks. Some of the reasons this is indeed the case is because key management, encoding of packets, encryption/decryption, the control plane (propagation of routes), management plane (configuration and monitoring), and visibility plane (big data analytics) are very different for all the vendors.
Two vendors can inter-operate using IETF-based protocols like E-BGP, IKE-based IPsec, and TWAMP. Two vendors can also add the capability to decode and encode each other’s data-plane formats.
Figure 5 describes how Versa solution provides its comprehensive SD-WAN and ZTNA capabilities in federal networks that leverage NSA High Assurance Internet Protocol Encryption (HAIPE) or Commercial Solutions for Classified (CSfC)-based architectures. Such deployments typically have multiple layers, where a black network consisting of several SATCOM, MPLS, Cellular (4G/5G), and other underlays provide transport to the red network.
Non-mission critical packets, for example, from 192.168.2.2 at red-site-1 to 192.168.6.6 at red-site-2, are similarly steered appropriately based on the traffic steering and traffic conditioning configuration.
The Versa Real Time Monitor provides real-time information about all the networking, SD-WAN, and security services that are configured on each Versa appliance. It also provides information relating to the health (CPU, Memory, Bandwidth on each of the interfaces, Load) of the VOS instances.
Versa Analytics is a big data solution that analyses logs and events and provides powerful reports, analytics, and feedback to Versa Director. It integrates natively with third-party data reporting and SIEM products, such as HP ArcSight, Splunk, IBM QRadar, LogRhythm, and Elastic Search. VOS™s at branch sites continuously provide Versa Analytics monitoring information related to links, network paths, security events, services, applications, etc. Additionally, every service on the VOS™, such as the next-generation firewall, IDS/IPS, URL-filtering, CASB, SWG, DLP, RBI, UEBA, DNS Proxy, and other modules, generate flow-level and aggregate log messages that are consumed by the Versa Analytics platform.
All this information can be leveraged for functions such as capacity planning and security forensics. Figure 6, Figure 7, Figure 8 and Figure 9 provide a few examples of information available using Versa Analytics.
Versa Analytics sends these logs to Versa UEBA over a KAFKA bus. Versa UEBA can track and flag anomalous events by all entities, such as users, laptops, phones, IoT devices, and more. If a user or an IoT device exhibits anomalous behavior, then its Entity Confidence Score (ECS) is degraded. This ECS is used in different types of policies, such as the Security Access Control Policy and Traffic Monitoring Policy. If the ECS of an entity degrades, then it is published to all subscribers (such as Versa Cloud gateways) using the Versa Message Service. The Versa Cloud Gateways can enforce real-time remediation when the ECS degrades.
The Versa SD-WAN, ZTNA and Secure Services Edge solution provides a secure traffic-engineered global SD-WAN and SASE network that offers the best application experience for users and IoT devices, irrespective of their and applications’ locations, including under DDIL and adverse conditions. The Versa solution is very well suited for satellite, maritime, and federal networks that leverage NSA High Assurance Internet Protocol Encryption (HAIPE) or Commercial Solutions for Classified (CSfC)-based architectures.