Download presentation
Presentation is loading. Please wait.
Published byJeffrey Hopkins Modified over 8 years ago
1
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356
2
Road Map Juniper Networks Mobile Security Solution Roles of the Solution Components Solution cons Conclusion
3
Juniper Networks Networking company Services: routing, switching security, applications acceleration, identity policy, network control and network management Customers – top 130 global service providers 96 global fortune 100 Federal, state and local government agencies Higher education institutions across the globe
4
Mobile Security Solution Provide a comprehensive multilayered security.
5
Mobile Security Solution 1 st Security Layer Unified Access Control Series Steel Belted Radius Servers (SRBS) 2 nd Security Layer Router-based security provides packet handling layer security at the following levels: Secure data plane Access to Infrastructure Network Protocols Securing the law enforcement Audits and session flow security
6
2 nd Security Layer Secure data plane Anti-spoofing, IP fragment filtering, line-rate and Multi-level Access Control Lists Secure access into Infrastructure Terminal Access Controller Access-Control System (TACACS) Secure Password Authentication Protocol (Secure PAP) RADIUS Authentication Authorization Accounting (AAA) Challenge-Handshake Authentication Protocol (CHAP)
7
2 nd Security Layer Network Protocols Secure Shell (SSH) Secure File Transfer Protocol (FTP) Border Gateway Protocol (BGP) Session security (MD5) Securing the law enforcement Utilizing the Communications Assistance for Law Enforcement Act (CALEA) and VLAN mirroring.
8
2 nd Security Layer Security Audits Real-Time Active Logs and traffic flow captures. Session flow Router-based security that filters and blocks unwanted flows or rates flow limits based on bandwidth. Allows for prioritization of flows across the core network.
9
2 nd Layer Security Routers Juniper Networks T Series Core Routers E Series Broadband Service Routers M Series Multiservice Edge Routers MX Series 3D Universal Edge Routers
10
3 rd Security Layer Juniper Stateful firewall Monitors and controls the flow of traffic Rule base Deep Inspection firewall Block application-level attacks before they infect the network/ cause any damage Encryption of IP packets Integration of the Secure Socket Layer (SSL) and Transport Layer Security (TLS)
11
4 th Security Layer Occurs at the Application/Service layer Unusual or suspicious behavior is detected by customizable signatures based on stateful protocol inspection, attack patterns and behavioral learning. Protects over 60 protocols including VoIP over the application/service layer against malware penetration.
12
4 th Security Layer Intrusion Detection and Prevention (IDP Series) Provide support to the application/service layer as they monitor network traffic and drop traffic that may have a malicious user Provides information of rogue servers or other applications, operating systems Customized signatures Application signatures
13
Solution Cons TACACS vs. TACACS+ Costs No mention of throughput provided by the Network components
14
Conclusion Juniper Networks Mobile Security Solution Solution Layers Cons of Solution
15
References Alex Zinin. Protecting Internet Routing Infrastructure from Outsider DoS Attacks. Internet Engineering Task Force. May 2005. Web. Retrieved April 6, 2012. F5 Networks. BIG-IP Solutions Guide, version 4.5. Mirroring Traffic to an Inspection Device. February 27, 2010. Web. April 7, 2012. Juniper Networks. Juniper Networks Company Profile. Juniper Networks. 1999. Web. Retrieved April 6, 2012. Juniper Networks Juniper Networks Mobile Security Solution. Juniper Networks. January 2010. Web. Retrieved April 6, 2012. Juniper Networks. Tackling the Top Five Network Access Control Challenges. Netutils. January 2012. Web Retrieved April 6, 2012.
16
Questions ?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.