{"id":14755,"date":"2019-09-13T08:42:16","date_gmt":"2019-09-13T13:42:16","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=14755"},"modified":"2026-02-18T10:53:38","modified_gmt":"2026-02-18T15:53:38","slug":"sd-wan-migration","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/sd-wan-migration\/","title":{"rendered":"SD-WAN Migration: 4 Things You Need to Consider"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"14755\" class=\"elementor elementor-14755\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bb3aaf0 e-flex e-con-boxed e-con e-parent\" data-id=\"bb3aaf0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e68f94a elementor-widget elementor-widget-text-editor\" data-id=\"e68f94a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">SD-WAN may not be new terminology in today\u2019s world, but it has definitely evolved alongside other technologies in modern networking. Moreover, the same can be said about SD-WAN migration, as it\u2019s often integrated within Secure Access Service Edge (SASE) frameworks.<\/span><\/p><p><span style=\"font-weight: 400;\">Overall, it should be treated as a layered strategy, not just a simple plug-and-play replacement for traditional MPLS. It\u2019s about focusing on how SD-WAN fits into your secure networking stack and modern traffic patterns. Before you get into a migration, there are four crucial angles to consider to guarantee a successful, long-term SD-WAN deployment.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab84fa6 elementor-widget elementor-widget-heading\" data-id=\"ab84fa6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Considering SD WAN Challenges With Migration\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fea185a elementor-widget elementor-widget-text-editor\" data-id=\"fea185a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">SD-WAN migration involves complex network security design, with many companies dealing with legacy MPLS, branch sites, and cloud-based workloads. Whether you\u2019re handling it in-house or with the help of <\/span><a href=\"https:\/\/www.firewalls.com\/blog\/top-5-managed-firewall-services\/\"><span style=\"font-weight: 400;\">managed services<\/span><\/a><span style=\"font-weight: 400;\">, overlooking the infrastructure aspect of this can lead to plenty of disruptions.<\/span><\/p><p><span style=\"font-weight: 400;\">Here are a few known challenges to consider before you decide to migrate:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Security consistency across all locations, cloud services, and remote endpoints is a must<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Always assess firewalls, segmentation, zero-trust policies, and compliance requirements before migrating<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Coordinate IT teams, vendors, and relevant business units for a smooth deployment<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Proper training and monitoring are a requirement to guarantee teams can manage the new SD-WAN environment<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">Avoiding unnecessary trial and error means being prepared before you even consider a migration. Overall, you can avoid potential pitfalls here by considering four crucial aspects to successful migration.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b37a4b8 elementor-widget elementor-widget-heading\" data-id=\"b37a4b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1. Mapping Branch, Edge, and Cloud Connectivity\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86495af elementor-widget elementor-widget-text-editor\" data-id=\"86495af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Before anything else, focus on creating a full inventory of your network. This includes angles like branch offices, edge devices, WAN security protocols, cloud workloads, and remote users. On top of that, map all applications as well. Whether this is on-premises or cloud-based, this is an important step to understand dependencies and traffic patterns.<\/span><\/p><p><span style=\"font-weight: 400;\">It also helps to be thorough in identifying critical network requirements, such as availability, latency, and packet loss for each location and application. Not only should you put a detailed network diagram together, but you should factor in regulatory standards that are relevant to your operation as well. Always plan for future growth to guarantee your <\/span><a href=\"https:\/\/www.firewalls.com\/blog\/which-networking-and-cybersecurity-company-provides-top-notch-sd-wan-solutions\/\"><span style=\"font-weight: 400;\">SD-WAN solution<\/span><\/a><span style=\"font-weight: 400;\"> can scale.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-853afb1 elementor-widget elementor-widget-heading\" data-id=\"853afb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2. Planning Your SD-WAN Rollout\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb8fb01 elementor-widget elementor-widget-text-editor\" data-id=\"fb8fb01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">You\u2019ll want to decide between either a full migration or a phased roll-out of WAN services based on business needs. Network complexity should be a consideration in this as well. Phased migrations work well for multi-transport WAN services, such as fiber, broadband, and the likes of 5G\/LTE connections.<\/span><\/p><p><span style=\"font-weight: 400;\">With hybrid WAN environments, SD-WAN services can coexist with existing network connections during the transition. To maintain compliance and protection throughout all of this, you can make use of firewall consolidation and cloud security. A gradual SD-WAN rollout helps with cost savings, as well as resource allocation, supporting a seamless digital transformation.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f799d84 elementor-widget elementor-widget-heading\" data-id=\"f799d84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3. Dedicated Internet Access for Reliable SD-WAN Performance\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6728925 elementor-widget elementor-widget-text-editor\" data-id=\"6728925\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Another angle to think about is ISP coordination, and this is something you\u2019ll want to have settled early on. It\u2019s an important step to avoid delays across branch offices and remote locations, and you can\u2019t forget about accounting for ISP lead times.<\/span><\/p><p><span style=\"font-weight: 400;\">To help minimize downtime, you can implement last-mile redundancy in addition to carrier diversity strategies. You can\u2019t forget about DIA provisioning either, as this needs to be aligned with high availability, uptime SLAs, and any business continuity requirements. Although there are many important steps to take here, it\u2019s equally important to consider the potential effect on the end user.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e05f13 elementor-widget elementor-widget-heading\" data-id=\"6e05f13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4. Consider the End User\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77d373e elementor-widget elementor-widget-text-editor\" data-id=\"77d373e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Throughout the SD-WAN migration, you\u2019ll always want to keep the end-user experience and application performance in mind. To help detect potential issues early from this angle, it helps to monitor apps and track QoE and QoS metrics. In the same vein, anticipating and planning for downtime can do wonders for minimizing workflow disruptions.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">End users can include the likes of remote users, BYOD devices, branch offices, and more. Adding on to these measures, incorporating Zero Trust Network Access as a part of a secure <\/span><a href=\"https:\/\/www.firewalls.com\/blog\/enterprise-network-security-architecture\/\"><span style=\"font-weight: 400;\">network architecture<\/span><\/a><span style=\"font-weight: 400;\"> is a great way to maintain reliable connectivity. Reducing friction throughout all of this also considers proper training and communication to staff, which translates into positive results for the end user.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9af922e elementor-widget elementor-widget-heading\" data-id=\"9af922e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Streamlining IT Operations With Successful SD-WAN Migration\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4800789 elementor-widget elementor-widget-text-editor\" data-id=\"4800789\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">After a successful SD-WAN migration, you\u2019re back to reaping the benefits. This includes reduced overhead for IT management, as well as centralized visibility across branch, edge, and cloud networks.<\/span><\/p><p><span style=\"font-weight: 400;\">Other notable upsides to a successful migration include:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Automation and orchestration to streamline routine tasks like configuration updates and policy deployment<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Centralized policy enforcement for consistent security and compliance across every location<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Faster incident response and reduced mean time to resolution<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Operational efficiency provides IT teams with what they need to focus on more strategic initiatives, improving secure network architecture<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">It doesn\u2019t have to be an overly complicated process, but a successful migration does come with a few important steps. Without these considerations, you could end up dealing with quite a few setbacks overall. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f99113 elementor-widget elementor-widget-heading\" data-id=\"0f99113\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The Final Word\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43774be elementor-widget elementor-widget-text-editor\" data-id=\"43774be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">SD-WAN migration should be treated as a strategic initiative. Taking a full inventory of all connections, application dependencies, and compliance requirements is vital. Coupling this with a careful rollout plan is how you support both internal operations and the end user experience.<\/span><\/p><p><span style=\"font-weight: 400;\">Part of what\u2019s great about modern migration is you don\u2019t have to handle it all by yourself. Through the right tech solutions and professional services, you can have a lot more expertise on deck when you need it most. Come have a <\/span><a href=\"https:\/\/www.firewalls.com\/contact\"><span style=\"font-weight: 400;\">chat with our team<\/span><\/a><span style=\"font-weight: 400;\"> at Firewalls.com to learn how you can leverage our industry expertise to make SD-WAN migration a breeze from start to finish.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce95b28 elementor-widget elementor-widget-button\" data-id=\"ce95b28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"tel:3172254117\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Call Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-943c3bd elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"943c3bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a7071b elementor-widget elementor-widget-heading\" data-id=\"7a7071b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQ<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f126229 elementor-widget elementor-widget-n-accordion\" data-id=\"f126229\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2520\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-2520\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What is SD-WAN and Why is it Important for Modern Networks? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2520\" class=\"elementor-element elementor-element-28ad7ac e-con-full e-flex e-con e-child\" data-id=\"28ad7ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3dc6c64 elementor-widget elementor-widget-text-editor\" data-id=\"3dc6c64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">SD-WAN simplifies and centralizes network management, while improving performance, security, and scalability. It\u2019s especially valuable for businesses with cloud workloads, remote users, and hybrid WAN environments.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2521\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2521\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> How Should Businesses Plan Their SD-WAN Migration? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2521\" class=\"elementor-element elementor-element-3d7441c e-con-full e-flex e-con e-child\" data-id=\"3d7441c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ef7b508 elementor-widget elementor-widget-text-editor\" data-id=\"ef7b508\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Companies should treat migration as a strategic and layered process. This includes taking a full stock of branches, edge devices, cloud workload, and any associated applications. Moreover, planning phased rollouts, hybrid WAN configurations, and compliance requirements is how you guarantee a smooth and cost-effective deployment.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2522\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2522\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Why is Dedicated Internet Access Important for SD-WAN? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2522\" class=\"elementor-element elementor-element-b65faf4 e-con-full e-flex e-con e-child\" data-id=\"b65faf4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-477cd42 elementor-widget elementor-widget-text-editor\" data-id=\"477cd42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Early provisioning of DIA, whether fiber, broadband, or wireless, ensures high availability as well as minimal downtime. When you incorporate redundancy and carrier diversity, you can maintain uptime and support business continuity throughout migration.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2523\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2523\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> How Does SD-WAN Affect End Users? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2523\" class=\"elementor-element elementor-element-6eee5a3 e-flex e-con-boxed e-con e-child\" data-id=\"6eee5a3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-58663f8 elementor-widget elementor-widget-text-editor\" data-id=\"58663f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">SD-WAN improves application performance and network access for remote users. The same goes for things like BYOD devices and branch offices.\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2524\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2524\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What Operational Benefits Does SD-WAN Provide for IT Teams? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2524\" class=\"elementor-element elementor-element-8522531 e-flex e-con-boxed e-con e-child\" data-id=\"8522531\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f51be86 elementor-widget elementor-widget-text-editor\" data-id=\"f51be86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">SD-WAN centralizes management while reducing manual overhead for IT teams. It can also offer support with automation for routine tasks. IT teams benefit from faster incident response, consistent policy enforcement, and the ability to focus on tasks relevant to improving network performance and security.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>SD-WAN is a more affordable way to manage connections between HQ and outposts, but how hard is it to migrate from MPLS? In this article, we&#8217;ll outline 4 key considerations that small businesses should account for before any SD-WAN migration.<\/p>\n","protected":false},"author":13,"featured_media":27856,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[286,610],"tags":[],"class_list":["post-14755","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-end-user-protection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SD-WAN Migration: 4 Things You Need to Consider - Firewalls.com<\/title>\n<meta name=\"description\" content=\"Learn about the ins and outs of SD-WAN migration and the steps you don\u2019t want to miss to ensure a seamless transition.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/sd-wan-migration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SD-WAN Migration: 4 Things You Need to Consider - Firewalls.com\" \/>\n<meta property=\"og:description\" content=\"Learn about the ins and outs of SD-WAN migration and the steps you don\u2019t want to miss to ensure a seamless transition.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/sd-wan-migration\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-13T13:42:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-18T15:53:38+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/09\/4-Things-to-Consider-Before-an-SD-WAN-Migration.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lucas Modrall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lucas Modrall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/sd-wan-migration\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/sd-wan-migration\\\/\"},\"author\":{\"name\":\"Lucas Modrall\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/cc1ba4fb3acd1d71c1c04434567b3f53\"},\"headline\":\"SD-WAN Migration: 4 Things You Need to Consider\",\"datePublished\":\"2019-09-13T13:42:16+00:00\",\"dateModified\":\"2026-02-18T15:53:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/sd-wan-migration\\\/\"},\"wordCount\":1342,\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/sd-wan-migration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/4-Things-to-Consider-Before-an-SD-WAN-Migration.png\",\"articleSection\":[\"Cybersecurity\",\"End User Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/sd-wan-migration\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/sd-wan-migration\\\/\",\"name\":\"SD-WAN Migration: 4 Things You Need to Consider - Firewalls.com\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/sd-wan-migration\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/sd-wan-migration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/4-Things-to-Consider-Before-an-SD-WAN-Migration.png\",\"datePublished\":\"2019-09-13T13:42:16+00:00\",\"dateModified\":\"2026-02-18T15:53:38+00:00\",\"description\":\"Learn about the ins and outs of SD-WAN migration and the steps you don\u2019t want to miss to ensure a seamless transition.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/sd-wan-migration\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/sd-wan-migration\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/sd-wan-migration\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/4-Things-to-Consider-Before-an-SD-WAN-Migration.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/4-Things-to-Consider-Before-an-SD-WAN-Migration.png\",\"width\":1200,\"height\":600,\"caption\":\"SD-WAN Migration: 4 Things You Need to Consider\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/sd-wan-migration\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SD-WAN Migration: 4 Things You Need to Consider\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/www.facebook.com\\\/firewallscom\",\"https:\\\/\\\/x.com\\\/firewallscom\",\"https:\\\/\\\/www.linkedin.com\\\/company-beta\\\/1439857\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/cc1ba4fb3acd1d71c1c04434567b3f53\",\"name\":\"Lucas Modrall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7d2017c4bb69e7b8adb91dbbfcc089b8e3a8f50a1ea2fddd1fdb91a7c47cd74?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7d2017c4bb69e7b8adb91dbbfcc089b8e3a8f50a1ea2fddd1fdb91a7c47cd74?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7d2017c4bb69e7b8adb91dbbfcc089b8e3a8f50a1ea2fddd1fdb91a7c47cd74?s=96&r=g\",\"caption\":\"Lucas Modrall\"},\"description\":\"Lucas is a Content Writer for Firewalls.com. He copywrites all of our short and long-form blog content.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/lucas-m-5b4106186\\\/\"],\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/author\\\/lucasm\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SD-WAN Migration: 4 Things You Need to Consider - Firewalls.com","description":"Learn about the ins and outs of SD-WAN migration and the steps you don\u2019t want to miss to ensure a seamless transition.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/sd-wan-migration\/","og_locale":"en_US","og_type":"article","og_title":"SD-WAN Migration: 4 Things You Need to Consider - Firewalls.com","og_description":"Learn about the ins and outs of SD-WAN migration and the steps you don\u2019t want to miss to ensure a seamless transition.","og_url":"https:\/\/www.firewalls.com\/blog\/sd-wan-migration\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2019-09-13T13:42:16+00:00","article_modified_time":"2026-02-18T15:53:38+00:00","og_image":[{"width":1200,"height":600,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/09\/4-Things-to-Consider-Before-an-SD-WAN-Migration.png","type":"image\/png"}],"author":"Lucas Modrall","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Lucas Modrall","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/sd-wan-migration\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/sd-wan-migration\/"},"author":{"name":"Lucas Modrall","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/cc1ba4fb3acd1d71c1c04434567b3f53"},"headline":"SD-WAN Migration: 4 Things You Need to Consider","datePublished":"2019-09-13T13:42:16+00:00","dateModified":"2026-02-18T15:53:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/sd-wan-migration\/"},"wordCount":1342,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/sd-wan-migration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/09\/4-Things-to-Consider-Before-an-SD-WAN-Migration.png","articleSection":["Cybersecurity","End User Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/sd-wan-migration\/","url":"https:\/\/www.firewalls.com\/blog\/sd-wan-migration\/","name":"SD-WAN Migration: 4 Things You Need to Consider - Firewalls.com","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/sd-wan-migration\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/sd-wan-migration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/09\/4-Things-to-Consider-Before-an-SD-WAN-Migration.png","datePublished":"2019-09-13T13:42:16+00:00","dateModified":"2026-02-18T15:53:38+00:00","description":"Learn about the ins and outs of SD-WAN migration and the steps you don\u2019t want to miss to ensure a seamless transition.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/sd-wan-migration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/sd-wan-migration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/sd-wan-migration\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/09\/4-Things-to-Consider-Before-an-SD-WAN-Migration.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/09\/4-Things-to-Consider-Before-an-SD-WAN-Migration.png","width":1200,"height":600,"caption":"SD-WAN Migration: 4 Things You Need to Consider"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/sd-wan-migration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"SD-WAN Migration: 4 Things You Need to Consider"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/cc1ba4fb3acd1d71c1c04434567b3f53","name":"Lucas Modrall","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c7d2017c4bb69e7b8adb91dbbfcc089b8e3a8f50a1ea2fddd1fdb91a7c47cd74?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c7d2017c4bb69e7b8adb91dbbfcc089b8e3a8f50a1ea2fddd1fdb91a7c47cd74?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c7d2017c4bb69e7b8adb91dbbfcc089b8e3a8f50a1ea2fddd1fdb91a7c47cd74?s=96&r=g","caption":"Lucas Modrall"},"description":"Lucas is a Content Writer for Firewalls.com. He copywrites all of our short and long-form blog content.","sameAs":["https:\/\/www.linkedin.com\/in\/lucas-m-5b4106186\/"],"url":"https:\/\/www.firewalls.com\/blog\/author\/lucasm\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/14755","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=14755"}],"version-history":[{"count":32,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/14755\/revisions"}],"predecessor-version":[{"id":28249,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/14755\/revisions\/28249"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/27856"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=14755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=14755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=14755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}