This article is about software defined wide area network (SD-WAN) and specifically related to the context of information security. Encrypting communications Much has been said lately about end to end encryption in the context of online communications such as those associated with zoom . The expectation with SD-WAN is that it fulfill these requirements and it holds true for Fusion. It is possible to configure Wireshark to capture traffic from Linux nodes and this includes SD-WAN nodes. This is a great means of troubleshooting problems and it also highlights some of the cases where missing encryption can be exploited. Often the last mile is established across fibre or wireless operator networks. When troubleshooting why a last mile wasn't provisioned I captured traffic on the last mile using Wireshark. It turned out the operator has made a mistake and allocated the last mile on the wrong port. I was able to access the unencrypted traffic of a state operated enterprise (S
This is the blog of Ronald Bartels that wanders on and off the subject of problem management (that is how it started). Mostly now the topics are about IoT and SD-WAN.