RansNet SD-WAN supports comprehensive VPN topologies to adapt to different customers’ traffic flow requirements. Please review the options below and choose the most suitable topology options for your deployment.
VPN Topology
VPN topology defines how the traffic will flow between locations. There’re mainly 3 types of topology:
- Hub-and-Spoke. This is the most typical topology in real live deployments. The traffic only flows between spoke/branch and hub site, where the central applications are hosted. For this topology, only the hub gateway must be statically accessible (direct static IP or NATed static IP); the branch sites can have static or dynamic or private IP (eg. 4G/5G connection), as long as the branch routers can reach to the gateway static IP.
- Spoke-to-Spoke. For this topology, the traffic can flow between spoke/branch sites, eg. there’s VoIP application. Note the traffic between spokes/branches still needs to route through the hub site, and this cause extra latency and bandwidth usage at Hub site. However, the IP addressing requirement is the same as hub-and-spoke, eg. only hub site needs static IP.
- Full-Mesh. For some rare situations, you need all sites to be able to communicate directly. In this scenario, the hub site must have static IP, and branch sites must be directly accessible between each other (eg. either static IP, or dynamic IP with forward forwarding)
Network Mode (Layer-3/Layer-2)
Layer-3 network means each location (hub and/or spoke) have different LAN networks (different network subnets); whereas Layer-2 network emulates a flat LAN/switched network among all locations (eg. all location networks are in the same subnet), despite the physical underlay WAN connectivity being routed/L3.
VPN Protocols
Each topology can use different combinations of encryption protocols:
- WireGuard – Recommended if both gateway and branch routers are using RansNet. It’s faster and more tolerant to link latency/instability issues.
- IPSec – Recommended if gateway is a 3rd-party product. Some compliance also requires IPSec only.
- SSL – Recommended if both SD-WAN and remote access (client VPN) are required.
Encapsulation Protocols
Depends on the topology used, we usually overlay another encapsulation tunnel on top of the encryption tunnel using below protocols:
- GRE – This is typically used to establish layer-3 network topology between locations.
- VXLAN – This is used to emulate layer-2 ethernet connections to bridge LAN networks between locations. But it can also be configured with an IP address to run as a layer-3 interface to build Layer-3 topology.
Each topology can combine with different network modes and use different protocols to suit different usage case requirements. Below sections elaborate more details of each topology and the pros and cons of each option.







