Access your Pro+ Content below.
WAN optimization policy goes deep: Think, user, time, location
This article is part of the June 2013 / Vol. 4/ No. 3 issue of Network Evolution
The branch office used to be uncomplicated. It housed small groups of workers—sales people, for example—who all worked on similar tasks and accessed a small group of applications. That simplicity is a thing of the past. Now branch offices often house a diverse set of workers who need access to everything from virtual desktop to basic email, delivered on a wide array of devices. The sheer number of applications sent between remote offices, their headquarters and data centers, can strain the WAN, even surpassing the limits of MPLS technologies. So network managers and administrators are responding by applying application acceleration and WAN optimization policy that takes into account user identity and role, as well as location and even time of day. This kind of granular policy setting can be accomplished with next-generation firewalls that are often attached to WAN optimization appliances. Implementing WAN optimization: In-band or out-of-band? Before network managers move into setting user-based policy, they must first determine ...
Access this Pro+ Content for Free!
Features in this issue
IT teams are setting WAN optimization policy that takes into account user, location and application type.
Ethernet-dedicated Internet is a continuous, high-bandwidth way for enterprises to connect their LANs to the public Internet and to streamline the performance of their WAN.
Network hardware providers and third-party vendors have very different WAN security offerings. How do you choose?
Columns in this issue
In the new WAN, we’ll see the rise of WAN virtualization, user-aware optimization and a move toward hosted WAN services.
SDN could make the WAN flexible enough for dynamic network virtualization, but first engineers must address a myriad of challenges.