Techniques are presented herein that provide visibility into Secure Access Services Edge (SASE) components for real user traffic as well as for synthetic traffic. Aspects of the presented techniques support the stacking of labels as a packet travels through a service chain and then the review of same for audit purposes, thus providing audit and assurance capabilities for a customer. Those capabilities may be used to reassure the customer that they are actually receiving the correct combination of SASE services. Aspect of the presented techniques may be used to reveal violations or exceptions in a service level agreement (SLA) where, for example, certain security services were not properly engaged. Such information can help in providing a customer with complete insight and troubleshooting support.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.