Enterprise SD-WAN Platform Comparison: Cisco Catalyst SD-WAN vs HPE Aruba EdgeConnect vs Juniper Session Smart Router vs Fortinet Secure SD-WAN

Four enterprise SD-WAN platforms compared on control-plane architecture, data-plane hardware scale, overlay transport model, application-aware routing, ZTP, SASE and SSE integration, multi-tenancy, management, licensing, and FedRAMP / FIPS 140-3 / Common Criteria certifications.

WiFi Hotshots is a vendor-agnostic enterprise engineering firm serving enterprise customers, enterprise architects, infrastructure buyers, and network engineering teams scoping real multi-site WAN, SASE, and branch-modernization deployments.

Ekahau ECSE — Certified Survey Engineer on every engagement

Multi-CCIE engineering bench

Fixed-fee SOW — no T&M surprises

25 years of enterprise networking leadership

All four SD-WAN platforms support application-aware routing, dynamic path selection, zero-touch provisioning, IPsec overlays (or a tunnel-free alternative, in Juniper’s case), and integration with SASE / SSE cloud security stacks. The real differences are architectural — three-plane SDN orchestration versus single-orchestrator, IPsec overlay versus session-state routing, single-appliance security integration versus chained service architecture, and FedRAMP authorization for the specific control-plane deployment. See the full enterprise SD-WAN and SASE services line, the broader enterprise networking service portfolio, or browse adjacent comparisons in the vendor comparison library.

Why These Four SD-WAN Platforms

Cisco Catalyst SD-WAN (ex-Viptela, acquired 2017, rebranded from vManage / vSmart / vBond to SD-WAN Manager / Controller / Validator in 2023), HPE Aruba Networking EdgeConnect (ex-Silver Peak, acquired 2020), Juniper Session Smart Router (ex-128 Technology, acquired 2020, now delivered via Juniper Mist WAN Assurance), and Fortinet Secure SD-WAN (integrated within FortiGate NGFW appliances from FortiOS 6.0+) are the four platforms a typical enterprise evaluates for multi-site WAN modernization, branch / hub-and-spoke topology, cloud-onramp to AWS / Azure / GCP, and SASE rollouts. VMware / Broadcom VeloCloud is undergoing post-Broadcom-divestiture branding changes and appears in an adjacent comparison when its new ownership structure stabilizes. Versa SASE and Palo Alto Prisma SD-WAN (ex-CloudGenix) are covered in the SASE-focused comparisons in this library. Extreme Networks ExtremeCloud SD-WAN and Peplink SD-WAN target different market tiers and are covered separately.

The Comparison Matrix: Specifications That Matter

Throughput figures in vendor datasheets are measured under specific test conditions — the security-services-enabled number is what matters for real deployments. Where a specification reads “not publicly documented,” the vendor does not publish that value in accessible primary sources.

SpecificationCisco Catalyst SD-WANHPE Aruba EdgeConnectJuniper SSRFortinet Secure SD-WAN
Control plane architectureThree-plane SDN: SD-WAN Manager (orchestration + GUI + REST API), SD-WAN Controller (OMP route-reflector), SD-WAN Validator (NAT discovery + authentication + onboarding). Minimum three-node Manager cluster for production.HPE Aruba Networking Orchestrator (single control plane); 9.5.x current as of 2026 (release-notes index lists 9.3.x through 9.5.x variants). Self-hosted on-prem or public cloud; HA pair supported. Orchestrator-SP for service-provider multi-tenancy.SSR Conductor (centralized management + policy + orchestration + ZTP). Deploys standalone / HA / AWS / Azure / GCP. Alternative: Mist WAN Assurance (cloud) with same SSR data plane.FortiManager + FortiAnalyzer. On-prem or FortiManager Cloud. Appliances FM-200G / 300F / 1000F / 2000E / 3000G. Unified console across FortiGate, FortiSwitch, FortiAP, SD-WAN.
Control plane deploymentCisco cloud-hosted (default, AWS / Azure), on-prem ESXi / KVM / Hyper-V, or customer-cloud-hosted via AMI.On-prem or public cloud; HA pair supported.On-prem standalone or HA; cloud-hosted on AWS / Azure / GCP. Mist WAN Assurance is cloud-only.On-prem FortiManager appliance or VM; FortiManager Cloud (SaaS); FortiGate Cloud Overlay-as-a-Service.
Data-plane hardware rangeCatalyst 8200 (~1 Gbps IPsec w/ services), Cat 8300 (up to 8.6 Gbps IPsec), Cat 8500 / 8500L (aggregation / DC), Cat 8000V virtual. Legacy vEdge 2000 / 5000 end-of-sale.EdgeConnect appliances: EC-XS (thin-edge), EC-S-P / EC-M-H / EC-L / EC-XL-H (mid-range), EdgeConnect 10104 / 10106 / 10150 (high-end). EC-V virtual. Per-platform throughput in Hardware Reference PDF.SSR120 (1.5 Gbps), SSR130 (2 Gbps), SSR1200 (10 Gbps), SSR1300 (20 Gbps), SSR1400 (40 Gbps), SSR1500 (50 Gbps). Virtual SSR on AWS / Azure / GCP.FortiGate 40F / 60F / 80F / 90G / 100F / 200F (branch); 400F / 600F / 900G / 1100E / 1800F / 4200F / 4400F (mid / DC); VM01–VM16 virtual.
Overlay transportIPsec (default) or GRE per TLOC; ESP-in-UDP for NAT traversal. Base ports 12346, 12366, 12386, 12406, 12426 for tunnel init.IPsec tunnel-mode overlay; Orchestrator auto-builds tunnels between appliances with matching interface labels in the same Business Intent Overlay.Tunnel-free Secure Vector Routing (SVR) — routes on session metadata inline with IP header. No IPsec / GRE / VXLAN overlay by default. Avoids 24–50 byte encapsulation overhead that competing overlays add.IPsec tunnel mode; ADVPN with shortcut paths for spoke-to-spoke direct. Optional IPsec over private WAN or over internet transport.
Routing architectureOMP (Overlay Management Protocol) over DTLS / TLS. TLOC = (system-IP, color, encapsulation) 3-tuple. Colors (biz-internet, mpls, lte, metro-ethernet) drive path matching.Business Intent Overlay (BIO) policy construct: application class + SLA + topology + link bonding + path conditioning. Full-mesh, hub-and-spoke, or regional hub-and-spoke topologies.Session-state routing; 8,500+ application IDs for routing decisions; native zero-trust deny-by-default; service-router learns routes and destinations automatically.SD-WAN rules match source / destination / application; WAN intelligence fields steer members. Static application steering (manual) or dynamic (lowest cost / best quality).
Path selection + BFDDefault BFD hello 1000 ms, multiplier 7, DSCP 48 — approximately 7 s failure detection. Tunable to sub-second. SLA classes (loss %, latency ms, jitter ms) bind to AAR policy.Tunnel-health telemetry at 1-minute intervals per ECOS stats documentation; sub-second failover timers referenced in link-bonding TWP. FEC, Packet Order Correction (POC), Tunnel Bonding path conditioning.Path selection by SLA, Mean Opinion Score (MoS), average latency. BFD for liveness.Passive WAN health measurement plus active performance SLA. MOS calculated in performance SLA health checks for voice.
Application-aware routing / Cloud OnRampNBAR2 app ID + SLA class + preferred-TLOC ordered list. Cloud OnRamp: SaaS / IaaS / Multicloud (AWS + Azure + GCP) / Colocation / Cloud Interconnect (Megaport, Equinix).BIO policy per application class with auto SLA binding. Integration with HPE Aruba Networking Central for broader campus + branch + WAN unified management.Session-state routing automatically optimizes per-session path selection; 8,500+ application IDs; integrates with Mist AI via session-based telemetry to Marvis.FortiGuard Application Control DB for dynamic application steering per SLA class. ADVPN shortcut paths.
Zero-Touch Provisioning (ZTP)Plug-N-Play (PnP) cloud-based discovery + activation; air-gapped on-prem ZTP server option. Remote software upgrades via ZTP from 17.10.1a.Cloud Portal ZTP on power-up; USB-based fallback for offline sites.Native on Conductor-managed and Mist-managed SSRs via claim / activation codes.FortiZTP cloud provisioning; FortiDeploy pushes FortiManager settings to branches. Pre-configuration (model device created) or post-provision manual authorization.
SASE / SSE integrationNative Umbrella SIG (automatic IPsec tunnels, active / active or active / standby). Third-party SIG framework supports Zscaler, Netskope, Palo Alto Prisma Access.HPE Aruba Networking SSE (ex-Axis Security, HPE-acquired 2023) — ZTNA, SWG, CASB, DEM, DLP. Third-party SSE via Orchestrator service orchestration: Zscaler, Netskope, Check Point, Palo Alto Prisma, Cloudflare Magic WAN, Akamai ETP.Juniper Secure Edge Connector: JSE, Zscaler, Palo Alto Prisma Access, Custom. JSE and Zscaler do not support BGP over IPsec for dynamic routing; Prisma Access and Custom do.FortiSASE — 170+ global PoPs (partly Fortinet-owned). SWG, CASB (inline + API), Universal ZTNA, FWaaS, RBI, SSPM, DLP. Integrates with existing Secure SD-WAN “within minutes.”
Integrated securityThousandEyes agent embedded from IOS-XE 17.6.1 (IOx Docker); Enterprise Firewall with App Awareness + Snort IPS, URL filtering, AMP, TLS decryption on cEdge. Can chain to external Cisco Secure Firewall / FTD.Aruba Central Client Insights for AI device profiling; broader Aruba Central Zero Trust role-based controls. Data-path security relies on SSE integration above.Optional Advanced Security Pack on-box: stateful firewall, IDS / IPS, URL filtering, anti-malware — used before offloading traffic to an SSE.NGFW + IPS + AV + web filtering + SD-WAN + ZTNA enforcement in the same FortiGate appliance under the same FortiOS policy engine. No service chaining required.
Multi-tenancyService-Provider multi-tenancy: one Manager cluster + shared Validators / Controllers serve multiple tenants. VPN = VRF segmentation (control-plane initiated, data-plane enforced). Zone-Based Firewall zones bound per-VPN.Orchestrator-SP scale-out multi-tenant SaaS — “hundreds to thousands” of tenants via dynamically instantiated per-tenant Orchestrators. RBAC at SP and tenant tiers. Microsoft Entra ID SSO integration.Conductor supports multiple Authorities for multi-tenancy. Network Tenancy for endpoint segmentation and hypersegmentation.SD-WAN Architecture for MSSPs 7.4.0 guide. Fabric Overlay Orchestrator + Overlay-as-a-Service (OaaS) via FortiGate Cloud Advanced Service.
Flagship throughputCat 8500-12X: up to 200/120 Gbps CEF (1400B/IMIX); native IPsec up to 46/30 Gbps; SD-WAN IPsec up to 33/22 Gbps. Miercom-validated (Dataplane Optimized Mode) up to 383 Gbps IPsec L2 and 208 Gbps IPsec+QoS+DPI+FNF. Cat 8300 up to ~19 Gbps CEF / up to ~6.6 Gbps IPsec (C8300-1N1S-4T2X, model-dependent). Cat 8200 up to 3.8 Gbps CEF / up to 1 Gbps IPsec.Per-platform throughput table in HPE EdgeConnect Hardware Reference PDF. HPE Store positions EC-XL-H / 10150 for “2 to 10 Gbps” WAN. Higher models documented but specific Gbps requires direct HPE QuickSpecs lookup.SSR120 1.5 Gbps / SSR130 2 Gbps / SSR1200 10 Gbps / SSR1300 20 Gbps / SSR1400 40 Gbps / SSR1500 50 Gbps per session-smart-networking datasheet.FG-1800F (single NP7 ASIC, 200 Gbps NP7 capacity): FW 80 Gbps / IPsec VPN 50 Gbps / IPS 27 Gbps / NGFW 20 Gbps / Threat Protection 16 Gbps. FG-4200F (4x NP7): FW 800 Gbps / IPsec VPN ~310 Gbps / IPS 52 Gbps / NGFW 47 Gbps / Threat Protection 45 Gbps.
Management integrationSD-WAN Manager 20.13 (TLS 1.3 control connections) with role views (NetOps / SecOps / AIOps / DevOps). Integrates with Cisco Catalyst Center (ex-DNA Center) for unified campus + WAN and Cisco Security Cloud Control for security policy.REST API (ECOS) full Orchestrator + appliance programmability. Python SDK (`pyedgeconnect`). Aruba Central orchestrates the broader EdgeConnect family (SD-WAN + SD-Branch + Microbranch).Juniper Apstra integration through Paragon Automation for DC + WAN orchestration. Mist AI session-based telemetry feeds Marvis Virtual Network Assistant.FortiManager scales to 100,000 managed devices; FortiAI-Assist on recent releases. Unified console across FortiGate, FortiSwitch, FortiAP, SD-WAN.
LicensingDNA Essentials / Advantage / Premier. DNA Advantage required for full SD-WAN, AAR, Cloud OnRamp, bundled Network Advantage perpetual. DNA Premier End-of-Sale 2025-08-19; renewals through 2026-08-19.Base / Advanced / Boost tiers documented in HPE QuickSpecs; exact feature-matrix per tier requires QuickSpecs access. Advanced Security Pack as add-on.Advanced Security Pack as add-on; Mist WAN Assurance subscription for cloud option. Specific standard / essentials / advanced tier names not publicly stated in the session-smart-networking datasheet.FortiGuard bundles (ENT / UTP / ATP). FortiCare support tiers. Precision AI Network Security Bundle aggregates ATP + AWF + AURL + ADNS + Advanced SD-WAN + Device Security.
FedRAMP / FIPS / Common CriteriaFedRAMP Moderate authorized (HHS OIG sponsorship). StateRAMP / GovRAMP authorization 2024-08-21. FIPS 140-2 / 140-3 compliant on supported hardware. ISR / ASR / Cat 8k DoD APL, STIG, Common Criteria certified.NIST CMVP certificate #4547 (Silver Peak EdgeConnect ECOS 8.1.9 / 9.1.0, FIPS 140-2 Level 1, Intel Atom C3558). CMVP #4116 (EC-XS / M / XL FIPS variants, FIPS 140-2 Level 2 hardware). Common Criteria user guide published; EAL not publicly verified this session. FedRAMP — Aruba Central is FedRAMP Authorized; EdgeConnect-specific FedRAMP not independently confirmed.Common Criteria + FIPS 140-2 certified: SSR v6.2.5-5r2 (Enterprise Linux 7.9, kernel 4.18.0) on SSR120 / 130 / 1200 / 1300 / 1400 / 1500. CLI-only admin path. FedRAMP not publicly verified for SSR.FIPS 140-2 Level 1 and Level 2 for FortiOS 6.4 / 7.0 on FortiGate appliances (tamper-evident). FIPS 140-3 Level 1 certified for FortiClient 7.0; FortiOS 7.2 / 7.4 FIPS 140-3 certification in progress per Fortinet. Common Criteria EAL4+ under NDcPP v2.2e for FortiOS 6.4 / 7.0 on FortiGate NGFW. FedRAMP per-product varies; FortiGate VM on AWS GovCloud documented, specific ATOs on FedRAMP Marketplace.

Migration scope, existing-estate integration, and SASE posture drive SD-WAN platform selection more than raw throughput. Send site counts, WAN transport mix, and current security stack — WiFi Hotshots returns a fixed-fee SOW.

Per-Vendor Fact Summaries

Cisco Catalyst SD-WAN (ex-Viptela)

Three-plane SDN (Manager / Controller / Validator, rebranded from vManage / vSmart / vBond in 2023). Default deployment is Cisco-cloud-hosted with on-prem and customer-cloud options. Data-plane range from Cat 8200 branch to Cat 8500-12X aggregation (Miercom-validated 383 Gbps IPsec). ThousandEyes agent is embedded in IOS-XE from 17.6.1 for WAN path visibility. Native Umbrella SIG integration plus generic framework for Zscaler, Netskope, Prisma Access. FedRAMP Moderate authorized (HHS OIG sponsorship); DoD APL + STIG + Common Criteria certified on ISR / ASR / Cat 8k. DNA Premier licensing is End-of-Sale August 2025 with renewals allowed through August 2026 — relevant for procurement cycles.

HPE Aruba Networking EdgeConnect (ex-Silver Peak)

Silver Peak lineage (HPE acquired 2020). HPE Aruba Networking Orchestrator manages EdgeConnect appliances via the Business Intent Overlay policy model. Aruba-patented path conditioning (FEC, Packet Order Correction, Tunnel Bonding) plus optional Aruba Boost WAN optimization (TCP acceleration, deduplication, compression). HPE Aruba Networking SSE (ex-Axis Security, acquired 2023) is the native SASE partner; third-party SSE via Orchestrator service orchestration supports Zscaler, Netskope, Check Point, Prisma, Cloudflare Magic WAN, Akamai. Orchestrator-SP handles service-provider multi-tenancy at “hundreds to thousands” of tenants with Microsoft Entra ID SSO. FIPS 140-2 validated (NIST CMVP #4547 software module; #4116 Level 2 hardware variants). FedRAMP — Aruba Central is FedRAMP Authorized; EdgeConnect-specific FedRAMP not independently confirmed.

Juniper Session Smart Router (ex-128 Technology)

128 Technology lineage (Juniper acquired 2020). Tunnel-free Secure Vector Routing (SVR) is the defining differentiator — sessions route on metadata inline with the IP header rather than over IPsec / GRE / VXLAN overlays. Juniper quantifies 24–50 byte encapsulation savings per packet over competing overlay techniques; on small-packet workloads (60-byte VoIP) tunnel overhead is quoted as 40 % to 100 % bandwidth amplification. Two control-plane options: on-prem SSR Conductor (standalone or HA, or cloud-hosted) or Mist WAN Assurance (cloud-only, with Marvis AI session-based telemetry). SASE connectors for Juniper Secure Edge, Zscaler, Palo Alto Prisma Access, and Custom. Advanced Security Pack adds on-box stateful firewall, IDS / IPS, URL filtering, anti-malware. Common Criteria + FIPS 140-2 certified on SSR120 / 130 / 1200 / 1300 / 1400 / 1500 at SSR v6.2.5-5r2.

Fortinet Secure SD-WAN (FortiGate-integrated)

The only platform in this comparison that runs NGFW + IPS + AV + web filtering + SD-WAN + Universal ZTNA enforcement on the same FortiGate appliance under the same FortiOS policy engine — no service chaining required. NP7 ASIC delivers 200 Gbps fabric on FG-1800F; four NP7s on FG-4200F aggregate to 800 Gbps fabric. FortiSASE is Fortinet’s cloud SSE with 170+ PoPs (partly Fortinet-owned) and integrates with existing Secure SD-WAN “within minutes” per vendor documentation. FortiManager scales to 100,000 managed devices; FortiAI-Assist is on recent releases. FIPS 140-2 Level 1 and Level 2 for FortiOS 6.4 / 7.0; FIPS 140-3 Level 1 for FortiClient 7.0 with FortiOS 7.2 / 7.4 FIPS 140-3 validation in progress. Common Criteria EAL4+ under NDcPP v2.2e for FortiOS 6.4 / 7.0. DoDIN APL, NSA CSfC, ISO 27001, SOC 2, and MEF 3.0 SD-WAN certified.

When Each Platform Is Worth Evaluating First

Routing heuristics, not recommendations. A production decision requires a site survey, a written scope, and a procurement negotiation. WiFi Hotshots engineers SD-WAN deployments across all four platforms; the routing below reflects what the documented specifications favor for common scenarios.

  • Existing Cisco Catalyst estate with Catalyst Center: Catalyst SD-WAN’s unified management integration with Catalyst Center and Security Cloud Control keeps a single operational paradigm across campus + WAN + security. ThousandEyes embedded from 17.6.1 is a differentiator for existing Cisco observability investments.
  • FedRAMP Moderate workloads with HHS OIG sponsorship path: Cisco Catalyst SD-WAN is the platform with an active FedRAMP Moderate authorization in this comparison. StateRAMP / GovRAMP authorization also in place.
  • Tunnel overhead is a concern (VoIP, real-time video at scale): Juniper SSR’s tunnel-free Secure Vector Routing is the only platform in this comparison without a default IPsec / GRE / VXLAN overlay. 40–100 % bandwidth amplification savings on small-packet workloads per Juniper documentation. Worth evaluating first for contact centers, broadcast-grade video, and voice-dominant deployments.
  • Existing Mist wireless / Wired Assurance estate: Juniper SSR with Mist WAN Assurance shares the Mist AI / Marvis Virtual Network Assistant layer, giving a single AIOps plane across wireless + wired + WAN.
  • Single-appliance NGFW + SD-WAN + ZTNA consolidation (branch simplification): Fortinet Secure SD-WAN on FortiGate is the only platform delivering NGFW + IPS + AV + web filter + SD-WAN + ZTNA in one box under one policy engine. Removes a service chain and one management plane.
  • HPE GreenLake / Aruba Central estate: EdgeConnect integrates natively into the HPE Aruba Networking control plane — Central, SSE, Wi-Fi, switching, SD-WAN — providing a unified SASE architecture for customers already standardized on HPE Aruba.
  • Service provider multi-tenancy at scale: Aruba Orchestrator-SP (“hundreds to thousands” of tenants) and Cisco Catalyst SD-WAN multi-tenant Manager cluster are the documented scale-out options. Juniper SSR and Fortinet support MSP / MSSP architectures but at different tenant-count scales.

Frequently Asked Questions

Which SD-WAN platform has FedRAMP authorization?

Cisco Catalyst SD-WAN has active FedRAMP Moderate authorization (sponsored by HHS OIG) plus StateRAMP / GovRAMP authorization from 2024-08-21. HPE Aruba Central is FedRAMP Authorized, but EdgeConnect-specific FedRAMP was not independently confirmed in public sources. Juniper SSR FedRAMP status was not publicly confirmed. Fortinet FortiGate VM on AWS GovCloud is documented; specific FortiSASE and per-product FedRAMP authorizations vary by SKU on the FedRAMP Marketplace. Federal buyers should verify the current authorization scope with each vendor’s public-sector team.

What makes Juniper Session Smart Router different from other SD-WAN platforms?

Juniper SSR uses tunnel-free Secure Vector Routing (SVR) — sessions route on metadata inline with the IP header rather than over IPsec / GRE / VXLAN overlays. Cisco Catalyst SD-WAN (IPsec ESP-in-UDP default), HPE Aruba EdgeConnect (IPsec tunnels), and Fortinet Secure SD-WAN (IPsec tunnels) all use overlay encapsulation.

Juniper documents 24–50 byte encapsulation savings per packet and quotes 40 % to 100 % bandwidth amplification on small-packet VoIP workloads over competing overlay techniques.

For voice-heavy, video-heavy, or real-time-session-dominant WAN traffic, the efficiency difference is measurable.

Does Fortinet really integrate NGFW and SD-WAN in one appliance?

Yes. FortiGate runs FortiOS, which delivers NGFW, IPS, AV, web filtering, Universal ZTNA enforcement, and Secure SD-WAN on the same appliance under the same policy engine. Cisco Catalyst SD-WAN has Enterprise Firewall with App Awareness and Snort IPS on cEdge routers but typically chains to a separate Cisco Secure Firewall or Umbrella SIG for full NGFW functionality.

HPE Aruba EdgeConnect partners with Zscaler, Check Point, Palo Alto Prisma, HPE SSE, Cloudflare, or Akamai for SSE via Orchestrator service orchestration.

Juniper SSR offers an optional Advanced Security Pack on-box but typically offloads to Juniper Secure Edge or third-party SSE.

Which SD-WAN platform has the highest documented throughput?

Cisco Catalyst 8500-12X publishes up to 200 / 120 Gbps CEF (1400-byte / IMIX) with native IPsec up to 46 / 30 Gbps and SD-WAN IPsec up to 33 / 22 Gbps; Miercom Dataplane Optimized Mode validation measured up to 383 Gbps IPsec L2. Fortinet FortiGate 4200F has 4x NP7 ASICs; datasheet publishes firewall throughput 800 Gbps (1518-byte UDP), IPS throughput 52 Gbps, NGFW 47 Gbps, and Threat Protection 45 Gbps.

Juniper SSR1500 documents 50 Gbps.

HPE Aruba EdgeConnect 10150 and larger platforms require direct HPE QuickSpecs access for authoritative throughput. All marketing-ceiling figures are test-condition-specific; real deployment throughput depends on security services enabled, cipher suite, rule count, and real application mix.

Can I run SD-WAN control plane on-premises for air-gap requirements?

Yes on all four platforms. Cisco SD-WAN Manager / Controller / Validator install on on-prem ESXi / KVM / Hyper-V. HPE Aruba Orchestrator installs on-prem or in public cloud. Juniper SSR Conductor supports on-prem standalone or HA. Fortinet FortiManager has on-prem hardware and VM options. Only Juniper Mist WAN Assurance (the cloud-only alternative to on-prem SSR Conductor) does not support on-prem — SSR with Conductor remains on-prem-capable.

How does path selection work under application-aware routing?

All four platforms support SLA-based path selection driven by BFD or equivalent liveness. Cisco Catalyst SD-WAN: default BFD hello 1000 ms, multiplier 7 (~7s detection), tunable to sub-second; SLA classes (loss, latency, jitter) bound to NBAR2 application IDs. HPE Aruba EdgeConnect: Business Intent Overlays bind application class to SLA and preferred-transport ordered list.

Juniper SSR: session-state routing with 8,500+ application IDs and Mean Opinion Score tracking.

Fortinet Secure SD-WAN: passive WAN health plus active SLA with MOS for voice; FortiGuard Application Control DB for application identification.

What is the difference between SASE and SSE in these platforms?

SSE (Security Service Edge) is the cloud-security subset: Secure Web Gateway, CASB, Zero Trust Network Access, Firewall-as-a-Service, DLP, Remote Browser Isolation. SASE (Secure Access Service Edge) is SD-WAN plus SSE delivered as a unified service. Cisco integrates Umbrella SIG as its native SSE; HPE Aruba integrates HPE Aruba Networking SSE (formerly Axis Security, acquired 2023); Juniper integrates Juniper Secure Edge; Fortinet integrates FortiSASE. All four platforms support third-party SSE (Zscaler, Netskope, Palo Alto Prisma, Cloudflare, Akamai) via their respective orchestration paths.

What should a buyer verify beyond the comparison matrix?

Real procurement decisions require site-specific survey data, current WAN transport mix (MPLS / internet / LTE / 5G), existing security stack, identity provider, compliance scope (PCI DSS, HIPAA, FedRAMP, CJIS, FERPA), and 5-year TCO including licensing tier, hardware refresh cycle, and support contracts. WiFi Hotshots delivers fixed-fee SOWs that pick the platform based on fit, not vendor margin bias. Start by sending your site list and WAN transport inventory.

How does overlay transport compare — IPsec, GRE, and ESP-in-UDP — across the major SD-WAN vendors?

Cisco Catalyst SD-WAN (formerly Viptela) uses IPsec ESP-in-UDP on UDP port 12346 by default, simplifying NAT traversal because UDP 12346 is a single predictable port. GRE is supported on Catalyst SD-WAN for specific service-chaining scenarios. HPE Aruba EdgeConnect uses IPsec ESP with Boost tunnels for WAN optimization and encapsulated path ranking. Fortinet Secure SD-WAN uses IPsec ESP with ADVPN shortcuts for spoke-to-spoke dynamic mesh. Broadcom VeloCloud uses its patented Dynamic Multi-Path Optimization (DMPO) tunnels over standard IPsec.

Juniper Session Smart Router (SSR) with Secure Vector Routing is the architectural outlier — tunnel-free, session-state routing that embeds metadata into the IP header. Per Juniper documentation, SVR saves 24–50 bytes of encapsulation per packet and reportedly delivers 40%–100% bandwidth amplification on small-packet VoIP workloads compared to overlay-encapsulated approaches. For voice-heavy and real-time-session-dominant workloads, the SVR efficiency is measurable.

What does application-aware routing actually measure, and how often is the measurement updated?

Application-aware routing (also called SLA-based path selection, App-Aware Routing, Business Intent Overlay) measures three primary transport characteristics per path and per application class: loss percentage, one-way or round-trip latency, and jitter. Cisco Catalyst SD-WAN measures via BFD (Bidirectional Forwarding Detection) with default hello 1000 ms, multiplier 7 (~7 second detection), tunable to sub-second hello 50 ms multiplier 3 (~150 ms detection) for sensitive workloads.

Fortinet Secure SD-WAN uses active Performance SLA plus passive WAN Health Check with measurement intervals typically 500 ms to 2 seconds. HPE Aruba EdgeConnect uses Path Conditioning with adaptive reconditioning. Juniper SSR uses session-state routing with per-session Mean Opinion Score tracking for voice. Broadcom VeloCloud DMPO measures per-packet per-path health. Faster measurement catches path degradation sooner but consumes more BFD overhead — tune the cadence against the application’s tolerance for brownouts.

What is Cloud OnRamp / Cloud Express, and how do the vendors deliver it?

Cloud OnRamp is Cisco’s category name for SD-WAN-to-cloud direct peering at AWS Transit Gateway, Azure Virtual WAN, Google Cloud, Oracle Cloud, and major SaaS providers (Microsoft 365, Salesforce, AWS S3). Catalyst SD-WAN Cloud OnRamp for SaaS automatically measures and selects the best-path to Microsoft 365 regions. HPE Aruba EdgeConnect uses Cloud Express for the same function with AWS Cloud WAN, Azure Virtual WAN, Google Cross-Cloud Network, and Equinix Fabric integration.

Fortinet Secure SD-WAN uses SaaS On-Ramp with tight integration to FortiGuard services. Broadcom VeloCloud Cloud Gateways provide cloud-adjacent compute for inspection. Juniper SSR integrates with AWS, Azure, GCP, and Oracle via VPC peering. The procurement question is (1) which cloud regions are pre-peered (co-located backbone vs Internet-transit), (2) how many SaaS destinations are measured for best-path, and (3) which cloud provider hyperscaler tier is supported. Verify the current supported-region list against your cloud footprint.

What is Versa’s SASE-integrated platform, and how does it position against Cisco / Fortinet / Broadcom VeloCloud?

Versa Networks delivers a single-stack SD-WAN plus SSE platform under Versa Operating System (VOS) on Versa FlexVNF virtual appliances and Versa Titan for managed service delivery. Per the Gartner SD-WAN Magic Quadrant (September 30, 2024), Versa is positioned as a Leader alongside Cisco, Fortinet, Palo Alto, HPE Aruba EdgeConnect, and Broadcom VeloCloud. The Versa differentiator is tight single-stack integration — one policy model covering SD-WAN, NGFW, SWG, CASB, ZTNA, and DLP.

Versa’s operational model pairs well with managed-service providers delivering multi-tenant SD-WAN + security. For enterprises with existing NGFW investments from Palo Alto, Check Point, or Cisco, single-stack Versa requires displacing those incumbents for full feature parity; for greenfield buyers with minimal security-stack incumbency, Versa’s integration depth is typically the differentiator. Review the Versa platform against your existing policy-engine inventory before committing.

What does the HPE Aruba EdgeConnect Boost license add beyond baseline EdgeConnect?

EdgeConnect Boost is HPE Aruba’s WAN optimization license (inherited from the Silver Peak acquisition) that adds payload deduplication, adaptive compression, TCP acceleration, and application-specific protocol optimizations on top of baseline EdgeConnect SD-WAN. Boost typically delivers 2x to 5x bandwidth amplification on repetitive traffic (file shares, backups, VDI) and 20%–40% on mixed-traffic workloads — actual gains vary by traffic mix and cache hit rate.

Boost is licensed separately from EdgeConnect Base and EdgeConnect Plus subscriptions. For customers with bandwidth-constrained sites (remote offices on low-megabit circuits, disaster-recovery replication over sub-100-Mbps links), Boost pays for itself quickly. For high-bandwidth branches on gigabit or multi-gigabit circuits where bandwidth is not the constraint, Boost’s amortized benefit is lower. HPE Aruba publishes ROI calculators against specific workload profiles.

What does Broadcom VeloCloud Dynamic Multi-Path Optimization do differently?

Broadcom VeloCloud Dynamic Multi-Path Optimization (DMPO) is a patented approach that monitors packet loss, jitter, and latency at sub-second intervals on each available WAN transport and adaptively steers traffic across multiple paths in real time. DMPO can split a single TCP flow across multiple transports when one path degrades, reconstructing packet order at the remote Edge or Gateway. Per Broadcom documentation, DMPO provides sub-second failover with no session reset on most application types.

Forward Error Correction (FEC) and Jitter Buffering can be enabled on specific flows to tolerate moderate packet loss on an otherwise-usable path. The operational trade-off is FEC bandwidth overhead (typically 50% overhead for 1-in-3 protection) — use FEC selectively for voice and video, not for bulk traffic. DMPO is core to VeloCloud’s positioning; other vendors deliver similar per-session path awareness under different names (Cisco’s App-Aware Routing, Fortinet’s SD-WAN SLA, Aruba’s Path Conditioning).

What are Cisco Catalyst SD-WAN’s control-plane components — vManage, vBond, vSmart, and cEdge?

Cisco Catalyst SD-WAN (formerly Viptela) uses four architectural planes. vManage (now Cisco SD-WAN Manager) is the management plane — policy authoring, device onboarding, monitoring, analytics; runs as on-prem cluster or Catalyst SD-WAN Manager hosted. vBond (Validator) is the orchestration plane — authenticating new devices joining the fabric via zero-touch provisioning. vSmart (Controller) is the control plane — OMP route exchange between cEdge routers.

cEdge is the data-plane router — IOS-XE running on Cisco ISR, ASR 1000, Catalyst 8200 / 8300 / 8500 / 8500L / 8500 / 8000v. vEdge (legacy Viptela hardware) is being phased out in favor of cEdge on IOS-XE. All three control-plane elements (vManage, vBond, vSmart) are deployed as virtual machines on-prem or in Cisco’s Catalyst SD-WAN Cloud. For air-gap or sovereignty-constrained deployments, on-prem is the correct architecture; for cloud-managed, Cisco SD-WAN Manager hosted is the path.

What is OMP (Overlay Management Protocol), and why is it specific to Cisco Catalyst SD-WAN?

OMP (Overlay Management Protocol) is Cisco Catalyst SD-WAN’s proprietary control-plane routing protocol — similar in function to BGP but purpose-built for SD-WAN overlays. vSmart controllers exchange OMP routes with cEdge routers; OMP distributes TLOC (Transport Locator) attributes, VRF membership, route preferences, and policy encodings. OMP rides on DTLS / TLS-secured channels between cEdge and vSmart.

Other vendors use different control-plane approaches: Fortinet uses FortiGate-native BGP over IPsec, HPE Aruba EdgeConnect uses BGP with Orchestrator-driven overlay policy, Broadcom VeloCloud uses its proprietary Gateway-mediated control, Juniper SSR uses HTTPS / REST-based Conductor control. OMP’s advantage is purpose-built SD-WAN semantics; the trade-off is single-vendor lock-in on Catalyst SD-WAN. Non-Cisco shops typically evaluate control-plane interoperability separately.

What is the TLOC (Transport Locator) concept in SD-WAN design?

TLOC (Transport Locator) is a Cisco Catalyst SD-WAN design construct that identifies a (cEdge device, transport color, encapsulation) tuple — effectively a named path endpoint. Common transport colors are biz-internet (Internet), mpls (MPLS), public-internet, private1, private2, lte, metro-ethernet, bronze, silver, gold. TLOC attributes (preference, weight) drive route selection through the OMP control plane.

TLOC-Extended allows routing through a remote cEdge’s transport interfaces (useful for shared-transport designs where one branch’s MPLS is used for transit by another branch’s traffic). Other SD-WAN vendors use analogous but differently-named constructs (Fortinet: SD-WAN zones + interfaces; Aruba: Transport Label + Overlay; Juniper SSR: Network + Path; VeloCloud: Transport + Business Policy). When the design references “biz-internet” or “mpls color,” it is Cisco-specific terminology.

How does BFD (Bidirectional Forwarding Detection) drive SD-WAN path selection?

BFD (RFC 5880, RFC 5881, RFC 5882) is a lightweight hello / keepalive protocol that detects liveness on a forwarding path at sub-second resolution. SD-WAN vendors run BFD end-to-end over each overlay tunnel, measuring round-trip latency, jitter, and loss. BFD hello intervals default to 1 second (multiplier 7 = 7-second detection on Cisco) but can be tuned down to 50 ms hello with multiplier 3 for sub-second failover.

Faster BFD delivers quicker failover but at higher control-plane overhead — at very low hello intervals, BFD can consume measurable bandwidth on low-speed links. Tune against the application’s tolerance: voice and real-time apps benefit from 200 ms detection; bulk file transfers tolerate 2-second detection with minimal impact. Per-session overhead and path measurement accuracy vary by vendor implementation — verify BFD cadence tunability against your specific application mix.

How do SD-WAN vendors optimize Microsoft 365 traffic, and does local-breakout actually help?

Microsoft publishes a curated list of Microsoft 365 Optimize category endpoints (m365-ip-address-and-url-web-service) that benefit from direct-to-Internet routing from the branch rather than backhaul-to-data-center. All major SD-WAN vendors integrate this list for policy-driven local breakout. Cisco Catalyst SD-WAN Cloud OnRamp for SaaS automatically measures path performance to M365 regions. HPE Aruba EdgeConnect Cloud Express M365 integration handles the same.

Fortinet SaaS On-Ramp, VeloCloud DMPO, and Juniper SSR all support M365 local-breakout via Microsoft’s published endpoint list. Local breakout typically reduces M365 round-trip latency from 80–200 ms (via data-center hair-pin) down to 20–60 ms (direct). It also offloads M365 traffic from expensive MPLS links onto lower-cost Internet circuits. The trade-off is that security inspection must be delivered at the branch or via SSE at the nearest PoP — otherwise, M365 traffic exits the fabric uninspected.

How does SD-WAN integrate with SASE in a single-vendor vs multi-vendor deployment?

Single-vendor SD-WAN-SASE integration means the SD-WAN vendor also delivers the SSE / SASE security half — Cisco Catalyst SD-WAN + Cisco Secure Access (formerly Umbrella SIG), Fortinet Secure SD-WAN + FortiSASE, HPE Aruba EdgeConnect + HPE Aruba Networking SSE (ex-Axis Security), Palo Alto Prisma SD-WAN + Prisma Access, Juniper SSR + Juniper Secure Edge. One vendor, one policy model, one support contract.

Multi-vendor SD-WAN-SASE integration pairs an SD-WAN with a different-vendor SSE — typical combinations are EdgeConnect + Zscaler, Catalyst SD-WAN + Zscaler or Netskope, VeloCloud + Zscaler or Netskope. The tunnel pattern is IPsec or GRE from the SD-WAN edge to the nearest SSE PoP. Zscaler and Netskope publish partner integration guides for every major SD-WAN platform. Multi-vendor delivers best-of-breed but doubles the operational surface; single-vendor simplifies operations at some cost to module breadth.

How does zero-touch provisioning (ZTP) work per SD-WAN vendor?

Zero-touch provisioning is the branch-deployment workflow where a factory-default device boots, finds its controller, authenticates, downloads its policy, and joins the fabric — no on-site engineer required. Cisco Catalyst SD-WAN ZTP uses Plug and Play Connect (PnP Connect) on software.cisco.com — the device calls home to Cisco PnP, receives its vBond orchestrator address, and joins the SD-WAN fabric. Fortinet FortiDeploy pushes configuration to FortiGate branches via FortiManager.

HPE Aruba EdgeConnect uses Aruba Activate for zero-touch branch onboarding. Broadcom VeloCloud uses Activation Keys on the Orchestrator. Juniper SSR uses Conductor-based ZTP with HTTPS check-in. Palo Alto Prisma SD-WAN uses Prisma SD-WAN Controller-based ZTP. All vendors support drop-ship to the branch with a simple local engineer plugging in WAN + LAN cables. ZTP depends on reliable Internet connectivity at the branch and DHCP from the service provider — ensure those prerequisites before committing to ZTP-only deployment.

How does management-plane high availability work for each SD-WAN platform?

Cisco SD-WAN Manager (vManage) runs as a 3-node or 6-node cluster with data-plane redundancy; vBond and vSmart are deployed as HA pairs or triples. For cloud-managed, Cisco SD-WAN Manager hosted runs in Cisco’s cloud. Fortinet FortiManager clusters in HA pairs. HPE Aruba Orchestrator supports active-standby HA on-prem and cloud-hosted. Broadcom VeloCloud Orchestrator runs as active-active cluster.

Juniper SSR Conductor runs in standalone or HA cluster. Palo Alto Strata Cloud Manager is cloud-only for SaaS-managed deployments; Panorama provides on-prem management HA. For air-gap or sovereignty-constrained deployments, verify the vendor’s on-prem HA architecture — not every vendor supports full air-gap for the management plane. Plan management-plane capacity for 2x peak concurrent administrator load plus 25% headroom for telemetry retention.

What are the converged NGFW + SD-WAN appliance options and their trade-offs?

Fortinet FortiGate runs NGFW, IPS, AV, web filtering, Universal ZTNA, and Secure SD-WAN on the same appliance with a single FortiOS policy engine. Cisco Catalyst 8300 Series delivers cEdge SD-WAN plus SD-Branch security (FTD containerization) with Threat Defense capabilities. Palo Alto Prisma SD-WAN ION appliances pair with Prisma Access for the security half; the ION itself is SD-WAN-focused. HPE Aruba EdgeConnect is SD-WAN with native Zone-Based Firewall and service-chained external SSE.

The converged-appliance trade-off: single-appliance simplifies branch hardware and cable management, but concentrates blast radius — a failure impacts both SD-WAN and security simultaneously. For resilient designs, redundant converged appliances in HA pairs are typical. Fortinet’s FortiGate is the most common converged-NGFW-plus-SD-WAN deployment pattern in the Gartner MQ-tracked market. Size the appliance against Threat Prevention throughput (not ACL-only marketing ceiling) with 30% margin.

What operational differences emerge after a vendor name change — VeloCloud post-Broadcom, Viptela in Catalyst SD-WAN, CloudGenix as Prisma SD-WAN?

Product-name changes typically track acquisition events and corporate re-branding, but the underlying technology often persists. Broadcom acquired VMware in November 2023 and rebranded the SD-WAN product as Broadcom VeloCloud by March 2024 — the underlying code base, Orchestrator UI, and DMPO architecture carry forward. Cisco acquired Viptela in 2017 and rebranded to Cisco SD-WAN, then to Cisco Catalyst SD-WAN with the IOS-XE cEdge migration — the Viptela architecture (vBond / vSmart / vManage / OMP) persists. Palo Alto acquired CloudGenix in 2020 and rebranded to Prisma SD-WAN — the ION appliance and Application-defined control persist.

Similarly, Cisco AnyConnect became Cisco Secure Client in 2022; Cisco Umbrella is now Cisco Secure Access (SIG); Cisco DNA Center is now Cisco Catalyst Center with the Cisco Networking Subscription licensing model. For procurement, cross-reference old product names to current SKUs via the vendor’s Product Transition Guide — ordering under a legacy PID typically routes to the renamed current product, but feature parity across old and new names can be minor.

Primary Sources Cited on This Page

Citations are grouped by vendor for direct verification. If any specification on this page does not match the current vendor document, the vendor document takes precedence — please report the discrepancy to the WiFi Hotshots engineering team.

Cisco Catalyst SD-WAN

HPE Aruba Networking EdgeConnect

Juniper Session Smart Router

Fortinet Secure SD-WAN

SD-WAN Selection Is a Network Architecture Decision, Not a Bake-Off

The right SD-WAN for 400 retail locations is not the right platform for 30 hospital campuses, is not the right platform for 12 industrial sites with OT segmentation requirements. Send site lists, WAN transport inventory, compliance scope, and existing security stack — WiFi Hotshots returns a fixed-fee SOW.