Loading learning content...
Modern enterprises rarely operate from a single location. Retail chains have hundreds of stores. Financial services firms maintain regional offices across continents. Manufacturing companies connect factories, warehouses, and distribution centers. Healthcare systems span hospitals, clinics, and research facilities. Each of these remote sites requires network connectivity that enables employees to work as productively as those at headquarters—accessing centralized applications, collaborating with colleagues, and maintaining the same security posture.
This is the domain of branch connectivity—the design discipline focused on connecting geographically distributed sites to the enterprise network. Branch design introduces challenges absent from campus networks: constrained bandwidth, higher latency, limited on-site IT expertise, diverse last-mile technologies, and the fundamental economics of provisioning connectivity at scale.
By the end of this page, you will understand the complete spectrum of branch connectivity options—from traditional MPLS VPNs to modern SD-WAN architectures. You'll learn how to select appropriate WAN technologies, design for redundancy and failover, optimize application performance across distance, and balance security with user experience. This knowledge enables you to architect branch solutions for enterprises ranging from dozens to thousands of remote sites.
A branch network is a remote site connected back to centralized resources—typically a headquarters campus, regional hub, or datacenter. While branch sites vary enormously in size and function (from a two-person sales office to a 500-employee manufacturing plant), they share common characteristics that differentiate them from campus networks:
Defining Characteristics of Branch Sites:
Branch Traffic Flow Patterns:
Understanding traffic patterns is essential for cost-effective branch design. There are three primary flow patterns:
Centralized (Backhauling): All branch traffic traverses the WAN to headquarters, even internet-bound traffic. Provides centralized security inspection but increases WAN bandwidth requirements and latency for cloud applications.
Direct Internet Access (DIA): Branch sites have local internet breakout for cloud and internet traffic, while private applications still traverse the WAN. Reduces WAN load but requires security at each branch.
Mesh/Branch-to-Branch: For organizations with significant inter-branch collaboration (e.g., video conferencing between regional offices), direct branch-to-branch connectivity avoids hair-pinning through headquarters.
Most modern enterprises adopt a hybrid approach—cloud-first traffic breaks out locally, sensitive internal applications traverse secure WAN paths, and all traffic is subject to consistent security policies regardless of egress point.
The shift to cloud and SaaS applications (Office 365, Salesforce, AWS/Azure workloads) fundamentally changed branch design. When 70%+ of application traffic is internet-destined, backhauling all traffic to HQ creates unnecessary latency and WAN costs. Branch design must now optimize for cloud access, not just datacenter connectivity.
Before exploring modern SD-WAN solutions, understanding traditional WAN technologies provides essential context. Many enterprises still rely heavily on these technologies, and even SD-WAN solutions often use them as underlying transport.
MPLS VPN: The Enterprise Standard
Multi-Protocol Label Switching (MPLS) VPNs have been the dominant enterprise WAN technology for two decades. Service providers build nationwide or global MPLS networks that enterprises lease as a managed service.
| MPLS Type | Description | Advantages | Disadvantages |
|---|---|---|---|
| Layer 3 MPLS VPN | Provider manages routing; enterprise receives IP connectivity | Fully managed, SLAs, QoS guarantees | Higher cost, provider lock-in, limited control |
| Layer 2 MPLS VPN (VPLS/E-LAN) | Provider delivers Layer 2 connectivity; enterprise manages routing | Full routing control, transparent bridging | Higher complexity, limited providers |
| Point-to-Point Ethernet | Dedicated Ethernet circuit between sites | Simple, low latency, high bandwidth | Per-connection pricing, no any-to-any by default |
Other Traditional WAN Technologies:
Leased Lines (T1/E1, T3/E3): Dedicated point-to-point circuits with guaranteed bandwidth. Legacy technology largely replaced by Ethernet and MPLS, but still found in some regions.
Frame Relay: Legacy packet-switching technology that preceded MPLS. Officially end-of-life but may exist in legacy installations.
Metro Ethernet: High-bandwidth Ethernet services for urban/suburban areas. Cost-effective for sites within provider Ethernet footprint.
Broadband (Cable/DSL/Fiber): Consumer-grade or business-class internet connectivity. Low cost but no SLAs; commonly used as backup or for hybrid WAN.
Wireless (LTE/5G): Cellular-based connectivity for locations without wired options or as backup. Rapidly maturing for primary branch connectivity.
A common misconception is that MPLS provides encryption. It does not. MPLS provides traffic isolation through label switching, but traffic is transmitted in clear text within the provider network. Organizations handling sensitive data should add encryption (IPsec, MACsec) on top of MPLS, particularly for regulatory compliance.
Virtual Private Networks (VPNs) create encrypted tunnels over untrusted networks (typically the internet), enabling secure branch connectivity at a fraction of MPLS costs. VPN technologies are foundational for both standalone internet WAN and hybrid MPLS/internet architectures.
Site-to-Site VPN Architectures:
IPsec: The Standard for Site-to-Site VPN
IPsec (Internet Protocol Security) is the dominant protocol suite for site-to-site VPNs, providing:
IPsec can operate in two modes:
Tunnel Mode: Entire original IP packet is encrypted and encapsulated in new IP packet. Used for site-to-site VPNs where endpoints are gateways.
Transport Mode: Only payload is encrypted; original IP headers preserved. Used for host-to-host and rarely for site-to-site.
IKE Versions:
123456789101112131415161718192021222324252627282930313233343536373839404142434445
! Enterprise IPsec VPN Configuration Example (Hub Router)! This demonstrates a robust IKEv2 site-to-site configuration ! Define IKEv2 Proposal (encryption, integrity, DH group)crypto ikev2 proposal ENTERPRISE-PROPOSAL encryption aes-gcm-256 prf sha384 group 20 ! 384-bit ECDH (elliptic curve) ! Define IKEv2 Policy (binds proposal to identities)crypto ikev2 policy ENTERPRISE-POLICY proposal ENTERPRISE-PROPOSAL ! Define IKEv2 Key Ring (pre-shared key per branch)crypto ikev2 keyring BRANCH-KEYS peer BRANCH-NYC address 198.51.100.1 pre-shared-key local STRONG-PSK-NYC pre-shared-key remote STRONG-PSK-NYC peer BRANCH-LONDON address 203.0.113.5 pre-shared-key local STRONG-PSK-LON pre-shared-key remote STRONG-PSK-LON ! Define IKEv2 Profile (authentication method, identity)crypto ikev2 profile BRANCH-PROFILE match identity remote address 0.0.0.0 0.0.0.0 authentication remote pre-share authentication local pre-share keyring local BRANCH-KEYS ! Define IPsec Transform Set (ESP encryption/integrity)crypto ipsec transform-set ENTERPRISE-TS esp-aes 256 esp-sha384-hmac mode tunnel ! Define Crypto Map (ties everything together)crypto map BRANCH-VPN 10 ipsec-isakmp set peer 198.51.100.1 ! NYC Branch set transform-set ENTERPRISE-TS set ikev2-profile BRANCH-PROFILE match address ACL-VPN-NYC ! Apply to WAN interfaceinterface GigabitEthernet0/0/0 crypto map BRANCH-VPNWhile pre-shared keys are simpler to configure, certificate-based authentication using PKI provides stronger security, individual device identity, and scalability. For deployments beyond 10-20 sites, invest in certificate infrastructure and automate enrollment.
DMVPN: Scalable Spoke-to-Spoke VPN
Dynamic Multipoint VPN (DMVPN) solves the scalability challenges of full-mesh IPsec. Key components:
NHRP (Next Hop Resolution Protocol): Spokes register public IP addresses with hub (NHS - Next Hop Server). When spoke-to-spoke traffic is detected, NHRP resolves destination spoke's public IP.
mGRE (Multipoint GRE): Single tunnel interface supports connections to many peers, eliminating per-site tunnel configuration.
Routing Protocol: IGP (OSPF, EIGRP) or BGP runs over DMVPN, advertising internal routes. Routing intelligence enables automatic failover.
DMVPN Phases:
Software-Defined WAN (SD-WAN) represents the most significant evolution in branch connectivity in decades. SD-WAN applies the principles of Software-Defined Networking (covered in Chapter 37) to the WAN, abstracting transport from policy and enabling intelligent, application-aware traffic steering across multiple connection types.
The Forces Driving SD-WAN Adoption:
Core SD-WAN Capabilities:
1. Transport Independence SD-WAN abstracts the underlying transport (MPLS, internet, LTE, satellite) into a unified fabric. Traffic is steered across transports based on application requirements and real-time path quality—not static routing decisions.
2. Centralized Orchestration A central controller (cloud-hosted or on-premises) defines policies, pushes configurations, and provides visibility. Branch devices (SD-WAN appliances) enforce policies locally but receive configuration centrally.
3. Application-Aware Routing SD-WAN identifies applications through deep packet inspection (DPI), DNS snooping, or cloud intelligence. Critical applications (voice, video, ERP) receive different treatment than bulk traffic (backups, updates).
4. Dynamic Path Selection SD-WAN continuously monitors path characteristics (latency, jitter, packet loss) and steers traffic to the best available path. This happens per-application, per-packet, transparently.
5. Integrated Security Modern SD-WAN platforms integrate firewall, IPS, web filtering, and CASB capabilities—often called SASE (Secure Access Service Edge) when combined with cloud-delivered security.
| Capability | Traditional WAN | SD-WAN |
|---|---|---|
| Transport | Single (usually MPLS) | Multiple (MPLS + Internet + LTE) |
| Path Selection | Static routing or failover | Dynamic, application-aware, real-time |
| Configuration | Device-by-device CLI | Centralized policy, zero-touch deployment |
| Visibility | Protocol-level (SNMP) | Application-level, real-time analytics |
| Security Model | Backhaul + central security | Distributed security + cloud integration |
| Provisioning Time | Weeks to months | Days to hours, zero-touch |
| Cost Model | Per-circuit monthly cost | Leverage commodity internet, reduce MPLS |
Major SD-WAN vendors include Cisco (Viptela/Meraki), VMware (VeloCloud), Fortinet, Palo Alto (Prisma SD-WAN), HPE (Silver Peak), Versa Networks, and many others. While all share core principles, implementations vary significantly in overlay protocols, path selection algorithms, security integration, and cloud integration depth. Evaluate based on your specific requirements.
Branch sites require connectivity resilience appropriate to their business criticality. A 500-employee manufacturing plant has different uptime requirements than a 5-person sales office. Design decisions around redundancy must balance cost against business impact of downtime.
The Redundancy Spectrum:
| Tier | WAN Redundancy | LAN Redundancy | Typical Use Case | Downtime Tolerance |
|---|---|---|---|---|
| Basic | Single WAN circuit | Single switch/router | Small sales office, retail store | Hours acceptable |
| Standard | Dual WAN (MPLS + Internet) | Single device with dual WAN ports | Regional office, medium retail | Minutes to 1 hour |
| Enhanced | Dual circuits + LTE backup | Redundant routers (HSRP/VRRP) | Large branch, distribution center | Minutes |
| Mission Critical | Dual circuits to diverse carriers + LTE | Redundant switches and routers | Hospital, financial trading floor | Seconds (HA clustering) |
WAN Failover Mechanisms:
1. Active/Standby (Cold Standby)
2. Active/Active with Load Sharing
3. Priority-Based Steering (SD-WAN)
123456789101112131415161718192021
# Example: Router Dual WAN Failover Configuration# Uses IP SLA to monitor primary path health and switch to backup ! Track primary WAN gateway reachabilityip sla 1 icmp-echo 10.0.0.1 source-interface GigabitEthernet0/0 frequency 5ip sla schedule 1 life forever start-time now track 10 ip sla 1 reachability delay down 15 up 30 ! Primary route (lower metric) with trackingip route 0.0.0.0 0.0.0.0 10.0.0.1 10 track 10 name PRIMARY-MPLS ! Backup route (higher metric) - activates when track object failsip route 0.0.0.0 0.0.0.0 192.168.1.1 200 name BACKUP-INTERNET ! When primary fails (3 missed ICMPs = 15 sec), tracker goes down! Primary route withdrawn, traffic shifts to backup! When primary recovers, 30-second delay before returning trafficLTE/5G as WAN Backup:
Cellular connectivity provides an increasingly viable backup option:
Advantages:
Considerations:
Best Practices for LTE Backup:
Redundancy you don't test is redundancy you don't have. Schedule quarterly failover drills for critical branches. Test during business hours to validate actual user experience. Document recovery times and address any issues discovered. Untested failover mechanisms frequently fail when actually needed.
What happens when branch connectivity to headquarters fails completely? Can employees continue working, or does business halt entirely? Branch survivability design ensures critical functions continue during WAN outages.
The Survivability Continuum:
Fully Centralized (Thin Branch)
Hybrid (Common Approach)
Fully Distributed (Fat Branch)
Example: RODC for Branch Authentication
Read-Only Domain Controllers address a common branch challenge: authentication requires connectivity to writable DCs at headquarters, creating both WAN dependency and latency for logins.
RODC provides:
Limitations:
IT cannot unilaterally decide branch survivability requirements. Engage business stakeholders to understand: What functions must continue during WAN outage? For how long? What's the cost of interruption? Match technical solutions to documented business requirements, not assumed needs.
Enterprise branch networks typically follow standardized design patterns (templates) that can be replicated across dozens to thousands of sites. Standardization enables:
Common Branch Design Archetypes:
Small Branch (5-25 users)
Characteristics:
Typical Equipment:
Design Notes:
Create 3-5 branch templates based on size/function categories. Document each template thoroughly: equipment list, logical design, configuration templates, cabling standards, and deployment runbook. New sites select the appropriate template rather than designing from scratch. This enables junior staff to deploy sites while senior engineers focus on template evolution.
We've covered substantial ground in branch network design. Let's consolidate the key takeaways:
What's Next:
With campus and branch networks understood, we'll next explore WAN Design—the technologies and architectures connecting distributed sites across metropolitan, national, and global distances. We'll examine carrier services, routing protocol selection for WAN, traffic engineering, and the emerging dominance of SD-WAN for enterprise connectivity.
You now understand the principles and practices of branch network connectivity—from traditional MPLS VPNs to modern SD-WAN architectures. This knowledge enables you to design, evaluate, and implement branch solutions that balance cost, performance, security, and resilience across distributed enterprise environments.