EX, UAC & Firewall Solution & Technology Demonstration Intranet, Extranet, Internet, Laptops, PDA,...

9
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net EX, UAC & Firewall Solution & Technology Demonstration

Transcript of EX, UAC & Firewall Solution & Technology Demonstration Intranet, Extranet, Internet, Laptops, PDA,...

Page 1: EX, UAC & Firewall Solution & Technology Demonstration Intranet, Extranet, Internet, Laptops, PDA, Web, Applications, Database Servers Perimeter defense: EX Defense in depth: SSG,

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net

EX, UAC & Firewall Solution &

Technology Demonstration

Page 2: EX, UAC & Firewall Solution & Technology Demonstration Intranet, Extranet, Internet, Laptops, PDA, Web, Applications, Database Servers Perimeter defense: EX Defense in depth: SSG,

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 2

Demonstrations

Page 3: EX, UAC & Firewall Solution & Technology Demonstration Intranet, Extranet, Internet, Laptops, PDA, Web, Applications, Database Servers Perimeter defense: EX Defense in depth: SSG,

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 3

End-to-End Security

Large RegionalOffice

Data Center

Small Regional Office

Retail Site

Standalone Office

Manufacturing Plant

Headquarters Office

Remote Sales OfficeVoIP Pilot

OAC

Breadth: Intranet, Extranet, Internet, Laptops, PDA, Web, Applications, Database ServersPerimeter defense: EXDefense in depth: SSG, NS, ISG, IDPCoordinated with: UAC, NSM, STRM

Page 4: EX, UAC & Firewall Solution & Technology Demonstration Intranet, Extranet, Internet, Laptops, PDA, Web, Applications, Database Servers Perimeter defense: EX Defense in depth: SSG,

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 4

Endpoint, Network and Server Security Management(End – End Security Management)

Virtual Chassis

Security Policies

Perimeter

security

Secure resourse

Bob

Alice

Page 5: EX, UAC & Firewall Solution & Technology Demonstration Intranet, Extranet, Internet, Laptops, PDA, Web, Applications, Database Servers Perimeter defense: EX Defense in depth: SSG,

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 5

Flexibility

kilometers

SecurityCamera

SecurityCamera

SecurityCamera

SecurityCamera

Page 6: EX, UAC & Firewall Solution & Technology Demonstration Intranet, Extranet, Internet, Laptops, PDA, Web, Applications, Database Servers Perimeter defense: EX Defense in depth: SSG,

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 6

Virtual Chassis

Virtual Chassis

RemediationServer

Alice

Bob

Page 7: EX, UAC & Firewall Solution & Technology Demonstration Intranet, Extranet, Internet, Laptops, PDA, Web, Applications, Database Servers Perimeter defense: EX Defense in depth: SSG,

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 7

QoS Management

Virtual Chassis

Voice / Video

Apps/Data

With QoS

Without QoS

Role and QoS

assignment

Alice

Bob

Page 8: EX, UAC & Firewall Solution & Technology Demonstration Intranet, Extranet, Internet, Laptops, PDA, Web, Applications, Database Servers Perimeter defense: EX Defense in depth: SSG,

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 8

SummaryEnd to End Security• EX provides perimeter security• Reduces risk, reduces OPEX

Flexible and reliable deployment• Virtual chassis• Reduces CAPEX, reduces OPEX

Quality of Service enablement• Single converge network• Lowers CAPEX and OPEX

Page 9: EX, UAC & Firewall Solution & Technology Demonstration Intranet, Extranet, Internet, Laptops, PDA, Web, Applications, Database Servers Perimeter defense: EX Defense in depth: SSG,

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 9Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 9