Architecture, adoption phases, and failure points (Control Plane vs Data Plane)
Thesis
Harmony SASE is not “a VPN in the cloud.” It is a SASE platform with a global PoP/Region mesh acting as policy enforcement points for two primary planes:
The operational differentiator is a centralized governance and policy model, combined with site-to-cloud connectivity (tunnels) and routed interconnectivity (when required).
1) Mental model: Control Plane vs Data Plane
Control Plane (management/policy)
Data Plane (traffic)
Traffic flows (text diagram)
-
Remote Users (Agent / on-device) → Harmony SASE PoP → Web/SaaS
-
Remote Users / BYOD (Agentless) → Harmony SASE PoP → Private Apps (DC/Cloud)
-
Offices / DC / Cloud workloads (IPsec/WireGuard/OpenVPN) → Harmony SASE PoP → Interconnectivity / routing (when applicable)
Critical note: “Full mesh” refers to any-to-any connectivity via the SASE backbone, but site-to-site interconnectivity requires explicit routing — it is not automatic.
2) Architecture: components and responsibilities
2.1 PoPs/Regions and Cloud Gateways
-
Harmony SASE operates through globally distributed PoPs.
-
The PoP is the policy enforcement point for Internet Access and Private Access.
-
Region selection directly impacts latency, user experience, and resiliency.
2.2 Network connectivity (site-to-cloud tunnels)
Three tunnel types are supported to connect sites/resources into the mesh:
-
IPsec Site-to-Site VPN
-
WireGuard Connector
-
OpenVPN
Interconnectivity (site ↔ site)
WireGuard Connector (common pitfall)
-
By default, the WireGuard Connector is installed in accessor mode, which does not allow resource-to-resource traffic without specific configuration/re-installation.
This is a classic root cause of “tunnel is up, but no lateral traffic.”
2.3 Internet Access (SWG) + Threat Prevention
-
The typical design is to start with Internet Access Policy and, when needed, define bypass rules for critical applications—especially apps with certificate pinning.
-
Important: enforcement of Threat Prevention / DLP / inspection can impact performance and compatibility; rollout should be controlled, with baselines and monitoring.
2.4 Private Access (ZTNA) + Agentless
-
Secure access to private applications (e.g., SSH, RDP, Web, Database) via agent or agentless portal.
-
Enables onboarding for BYOD and third parties without requiring agent deployment/management in specific scenarios.
-
2.5 Data Loss Prevention (DLP)
2.6 Agent governance (anti-tampering / uninstall control)
3) Threat/Failure scenarios (real-world failures)
-
Tunnel UP, no traffic (site ↔ site)
-
WireGuard Connector with no lateral traffic
-
Application breaks after inspection (SSL / SWG)
-
Data exfiltration via SaaS/AI
-
Operations without governance
4) Architecture options (trade-offs)
Option A — Traditional VPN + NGFW/Proxy
Pros
-
Fast initial deployment
-
Operational familiarity
Cons
-
Expanded attack surface (network exposure)
-
Low per-application granularity
-
Fragmented governance and observability
-
Harder to enforce identity-driven Zero Trust
-
Option B — Point ZTNA + separate SWG
Pros
Cons
-
Multiple consoles and policy stacks
-
More complex integrations/troubleshooting
-
Hard to unify logs and governance
Option C — Harmony SASE (Internet Access + Private Access + Tunnels + Interconnectivity)
Pros
-
Centralized policy/governance model
-
PoPs/Regions as global enforcement points
-
ZTNA/agentless + DLP + Threat Prevention under unified governance
-
Support for IPsec/WireGuard/OpenVPN
Cons
-
Interconnectivity requires explicit routing design (route-based recommended)
-
Controlled rollout required (bypass/pinning/tuning)
-
Subnet planning needed to avoid overlaps