Presentation is loading. Please wait.

Presentation is loading. Please wait.

Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.

Similar presentations


Presentation on theme: "Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356."— Presentation transcript:

1 Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356

2 Road Map  Juniper Networks  Mobile Security Solution  Roles of the Solution Components  Solution cons  Conclusion

3 Juniper Networks  Networking company  Services: routing, switching security, applications acceleration, identity policy, network control and network management  Customers – top 130 global service providers  96 global fortune 100  Federal, state and local government agencies  Higher education institutions across the globe

4 Mobile Security Solution  Provide a comprehensive multilayered security.

5 Mobile Security Solution  1 st Security Layer  Unified Access Control  Series Steel Belted Radius Servers (SRBS)  2 nd Security Layer  Router-based security provides packet handling layer security at the following levels: Secure data plane Access to Infrastructure Network Protocols Securing the law enforcement Audits and session flow security

6 2 nd Security Layer  Secure data plane  Anti-spoofing, IP fragment filtering, line-rate and Multi-level Access Control Lists  Secure access into Infrastructure  Terminal Access Controller Access-Control System (TACACS)  Secure Password Authentication Protocol (Secure PAP)  RADIUS  Authentication Authorization Accounting (AAA)  Challenge-Handshake Authentication Protocol (CHAP)

7 2 nd Security Layer  Network Protocols  Secure Shell (SSH)  Secure File Transfer Protocol (FTP)  Border Gateway Protocol (BGP)  Session security (MD5)  Securing the law enforcement  Utilizing the Communications Assistance for Law Enforcement Act (CALEA) and VLAN mirroring.

8 2 nd Security Layer  Security Audits  Real-Time Active Logs and traffic flow captures.  Session flow  Router-based security that filters and blocks unwanted flows or rates flow limits based on bandwidth.  Allows for prioritization of flows across the core network.

9 2 nd Layer Security Routers  Juniper Networks T Series Core Routers  E Series Broadband Service Routers  M Series Multiservice Edge Routers  MX Series 3D Universal Edge Routers

10 3 rd Security Layer  Juniper Stateful firewall  Monitors and controls the flow of traffic  Rule base  Deep Inspection firewall  Block application-level attacks before they infect the network/ cause any damage  Encryption of IP packets  Integration of the Secure Socket Layer (SSL) and Transport Layer Security (TLS)

11 4 th Security Layer  Occurs at the Application/Service layer  Unusual or suspicious behavior is detected by customizable signatures based on stateful protocol inspection, attack patterns and behavioral learning.  Protects over 60 protocols including VoIP over the application/service layer against malware penetration.

12 4 th Security Layer  Intrusion Detection and Prevention (IDP Series)  Provide support to the application/service layer as they monitor network traffic and drop traffic that may have a malicious user  Provides information of rogue servers or other applications, operating systems  Customized signatures  Application signatures

13 Solution Cons  TACACS vs. TACACS+  Costs  No mention of throughput provided by the Network components

14 Conclusion  Juniper Networks  Mobile Security Solution  Solution Layers  Cons of Solution

15 References  Alex Zinin. Protecting Internet Routing Infrastructure from Outsider DoS Attacks. Internet Engineering Task Force. May 2005. Web. Retrieved April 6, 2012.  F5 Networks. BIG-IP Solutions Guide, version 4.5. Mirroring Traffic to an Inspection Device. February 27, 2010. Web. April 7, 2012.  Juniper Networks. Juniper Networks Company Profile. Juniper Networks. 1999. Web. Retrieved April 6, 2012.  Juniper Networks Juniper Networks Mobile Security Solution. Juniper Networks. January 2010. Web. Retrieved April 6, 2012.  Juniper Networks. Tackling the Top Five Network Access Control Challenges. Netutils. January 2012. Web Retrieved April 6, 2012.

16 Questions ?


Download ppt "Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356."

Similar presentations


Ads by Google