Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net.

Similar presentations


Presentation on theme: "Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net."— Presentation transcript:

1 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Products and Solutions Overview Stephen Philip Senior Director - Product Marketing Security Products Group

2 2 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 2 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Agenda  Juniper leadership in Security  Juniper Product Portfolio  Juniper Solutions by Location Campus WAN GW Data Center Distributed Organization Extended Organization

3 3 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 3 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Juniper Leadership in Security Juniper in the Leadership quadrant for: Firewall IPSec VPN SSL VPN IPS  # 2 in Network Security Passed Check Point in Q2  #1 in High End FW/VPN  #1 in SSL VPN  Growing faster than inline IPS market Recognized as leader by Gartner Recognized as leader by Press U.S. Department of Labor Recognized as leader by our Customers Source Infonetics Q2-2006

4 4 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 4 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Proven, Best-in-Class Innovation UAC IC AAA OAC NSM Policy, Control & Visibility Security/VPN SSG Routing Application Front End WAN Optimization Secure Access

5 5 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 5 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Evolving Challenges and Requirements Campus Organization Need a secure and resilient infrastructure able to deliver differentiated applications and services across the network Single IP infrastructure – demanding applications require network performance Virtual Organizations - dynamic perimeters, different users, devices, locations and trust levels Elevated threat environment – application level attacks and worm propagation Regulatory compliance (now global) – granular access controls and auditing

6 6 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 6 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Solutions for the Extended Organization IP Network Data Center U.S. Department of Labor RA or Extranet DMZ Assessment & Containment Native checks Client/Server APIs Remediation Cache Cleaner Virtual Environments Connection Control 1.Endpoint Assessment & Authentication 2. Trusted Xport (IPSec or SSL) 3. Authorize, Enforce & Log  Extended Organization Challenges  Deliver applications securely and appropriately to employees, contractors, partners, suppliers anywhere, anytime  Provision and manage 1000s of endpoints  Handle non-owned devices and networks  Extended Organization Solutions  Client-less model reduces mgmt overhead  SSL VPN per user, per application controls  Endpoint integrity, quarantine, remediation  Application Acceleration (AFE) improves download times & availability

7 7 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 7 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Juniper’s Coordinated Threat Control LAN Business Partner Telecommuter Correlated Threat Information  Identity  Endpoint  Access history  Detailed traffic & threat information Comprehensive Threat Detection and Prevention  Ability to detect and prevent malicious traffic  Full layer 2-7 visibility into all traffic  Proven, market leading technology Coordinated Identity- Based Threat Response  Manual or automatic response  Multiple response options: terminate, disable, or quarantine user  Supplements IDP’s threat prevention IDP detects threat and signals SA SA identifies user & takes action on user session Signal Self-registration technology for easy configuration

8 8 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 8 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Solutions for the Campus  Campus Challenges  Protect against outside/inside threats  Segment resources, users, departments  Provide secure WLAN access  Scaling across large or multiple campuses  Campus Solutions  Department & Virtual firewalls protect departmental resources  Intrusion Prevention mitigate and contains threats  802.1X & SSL VPN secured WLAN  Large L3 Routed Campuses  Unified access control solution  Infranet Controller, Agent and Enforcer Departments Campus #2 Campus #1 Departments Internet

9 9 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 9 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Unified Access Control Overview AAA AAA Servers Identity Stores Firewall Enforcers Central Policy Manager Endpoint profiling, user auth, endpoint policy Dynamic Role Provisioning User access to protected resources Protected Resource 802.1X User admission to network resources Agent

10 10 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 10 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Unified Access Control Overview Agent AAA AAA Servers Identity Stores Firewall Enforcers Central Policy Manager Endpoint profiling, user auth, endpoint policy Dynamic Role Provisioning User access to protected resources Protected Resource 802.1X User admission to network resources with SBR with OAC

11 11 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 11 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Introducing UAC 2.0 Agent AAA AAA Servers Identity Stores Firewall Enforcers Central Policy Manager Endpoint profiling, user auth, endpoint policy Dynamic Role Provisioning User access to protected resources Protected Resource 802.1X User admission to network resources with SBR with OAC  UAC 2.0 interoperates with any 802.1X infrastructure wired or wireless  UAC 2.0 is TNC compliant for truly open architecture  Access control for guests, contractors and employees  UAC 2.0 can be deployed via: 802.1X only Overlay w/firewall only Both, for maximum granularity

12 12 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 12 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Solutions for the Data Center  Data Center Challenges  Protect data, servers, infrastructure  Maximize performance, availability, resiliency  Consolidate and simplify architecture  Terminate 1000s of VPN connections  Data Center Solutions  High performance edge service routers provide 10x over competing solutions  High performance firewall/VPN/security gateway  Intrusion Prevention mitigates threats  SSL for secure access  AFE accelerate applications to users  WAN Optimizer accelerate applications to sites Web Servers Internet App Servers Data Bases SLB Web Acc Cache SSL O/L High performance Routing Integrated IPS/FW/VPN Secure Access (SSL) AFE Application Acceleration WAN Optimization

13 13 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 13 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net How the WAN slows applications Inability to understand application and WAN performance Lower-priority apps slow down critical ones Protocol chattiness Visibility and Reporting Acceleration Application Control More rich content Compression, Caching VoIP Web Oracle SAP Application Contention Limited Bandwidth Latency The WAN Pipe Manageability Accelerating Applications over the WAN

14 14 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 14 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Solutions for the WAN Gateway  WAN Gateway Challenges  Maximize availability, resiliency, quality  Protect public facing servers and infrastructure  Optimal support for broad mix of app & traffic  Massive # VPN Connections or Large BW single tunnels  WAN Gateway Solutions  High performance Enteprise routers provide 10x over competing solutions  MPLS for improved quality and traffic engineering  High performance firewall/VPN, security gateway  Intrusion Prevention mitigates threats  SSL VPN Gateway for secure access  WAN Optimization to remote locations IP Network Campus Data Center DMZ RA or Extranet DMZ VoIP DMZ City of Burbank

15 15 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 15 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net WAN Gateway Requirements Value & Number of Connections Application Awareness / Protection Ave Packet Size Latency & Sensitivity Provide high performance for large and small packet traffic mix Make traffic decisions with low latency to ensure applications are not affected Handle traffic load, complexity & availability requirements as # & value of connections increase Understand application requirements and prevent/mitigate application-level attacks Internet SSL VPN DMZ Web Partner DMZ FTP SSL DMZ RADIUS

16 16 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 16 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net ISG 2000 I/O GigaScreen3 ASIC, 1 GB RAM Programmable Processors Network Traffic Dual 1GHz PowerPC CPU 2 GB RAM, FPGA Dual 1GHz PowerPC CPU 2 GB RAM ASIC Module Security Modules (for IPS) Management Module I/O Modules Fixed I/OI/O Network Traffic GigaScreen3 ASIC, 1 GB RAM Programmable Processors Dual 1GHz PowerPC CPU 2 GB RAM, FPGA ISG 1000 Dual 1GHz PowerPC CPU 2 GB RAM Juniper Networks ISG Ground-up Design 1 3 2 1 2 Processing power unmatched by any competitive offering

17 17 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 17 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Internet Back-hauled Branch Solutions for the Distributed Organization  Distributed Organization Challenges  Protect data, servers, infrastructure  Improve application performance  Maximize availability, resiliency  Simplify architecture, management  Distributed Organization Solutions  Intrusion Prevention mitigates threats  Dedicated & multi-function firewalls  WAN Optimization for branch offices  Resilient, secure VPN to branch offices  MPLS VPN for QoS and traffic engineering to regional offices IP/MPLS Network HQ Regional Office Small Branch (1000s) w Split Tunnels Retail Office (1000s) WiFi Access Remote Campus w Split Tunnel

18 18 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 18 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Best in Class Security – Secure Services Gateway  SSG 5 - Six fixed form factor models 7 Fast Ethernet + 1 WAN interface ISDN BRI S/T, V.92, Serial Dual radio 802.11a + 802.11 b/g variants of each 160 Mbps FW / 40 Mbps VPN  SSG 20 – 2 modular models 5 Fast Ethernet + 2 Mini I/O slots Mini PIM options include ADSL2+, T1, E1, ISDN BRI S/T, V.92 at FCS Dual radio 802.11a + 802.11 b/g variant 160 Mbps FW / 40 Mbps VPN  SSG 140 8 FE and 2 GE Interfaces 4 WAN PIM slots Standard J Series WAN interfaces ISDN, Dual E1 and Dual T1 350 Mbps FW / 100 Mbps VPN  SSG 550/520 4 on-board 10/100/1000 ports 6 WAN/LAN I/O expansion slots Up to 1 Gbps FW/NAT / 500Mbps IPSec / 500 Mbps IPS (DI) New Secure Services Gateway Models  Advanced Security - Integrated Branch Routing and WAN interfaces FW, VPN, AV (including - phishing, - spyware) & Anti SPAM ADSL2+, T1, E1, ISDN BRI S/T, V.92, Gig E

19 19 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 19 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Deploy Once – Add Services later  Choose WAN connection & Deploy Device Base System Cost + WAN I/F  Access Routing & VPN Service  Firewall Service

20 20 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 20 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Deploy Once – Add Services later  IPS Service  Web Filtering Service (SurfControl)  AV Service (Kaspersky)  Spam (Symantec) Additional license cost  Choose WAN connection & Deploy Device Base System Cost + WAN I/F  Access Routing & VPN Service  Firewall Service

21 21 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 21 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Deploy Once – Add Services later  IPS Service  Web Filtering Service (SurfControl)  AV Service (Kaspersky)  Spam (Symantec) Additional license cost Additional HW Requirements = None  Choose WAN connection & Deploy Device Base System Cost + WAN I/F  Access Routing & VPN Service  Firewall Service

22 22 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 22 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net Network Centralized Management  Centralized control over Integrated Security Devices Remote Management Secure remote management of firewall, VPN, content security, and routing across all devices from one location Role-based administration Delegate administrative access to key support people with Assign specific tasks to specific individuals Centralized activation/deactivation of security features Application attack protection, Web usage control, Payload attack protection, Spam Control Security Operations Network Security Operations Network Security Operations

23 Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 23 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 23 Thanks


Download ppt "Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net."

Similar presentations


Ads by Google