Juniper Networks Mobile Security
|
|
|
- Antonia McCoy
- 10 years ago
- Views:
Transcription
1 SOLUTION BRIEF Juniper Networks Mobile Security Solution Market-Leading Security Products Providers Can Use to Mitigate the Deployment Risks of IP-Based Services Challenge Network security focused on securing the transport layer is inadequate for next-generation all-ip networks, which require a multilayer security matrix that also protects the control/signaling layers and the service/application layer, integrated policy enforcement, and secureaccess technology for all layers. Solution Providing an innovative, marketleading mobile security solution that mitigates the risks associated with deploying IP-based services, Juniper s security devices are scalable, reliable, and backed by years of experience shaping the routing and security architectures of the world s top service provider networks. Benefits Highly effective network security through multilayered approach Includes network access control, authentication, authorization, transport layer security, firewall, and intrusion detection and prevention Provides deployment options for flexibility and a broad range of protocol support The Challenge What if you were managing a computer network and not implementing full security protection? Would you feel safe? For years, security was a very obvious element of computer networking but attacks through mobile devices were not that common. However, with increasingly pervasive mobile devices, especially the new generation of smart phones that are becoming more and more like the full-fledged computer, mobile device security cannot be taken for granted anymore. Consequently, the evolution of computer security will repeat itself in the mobile space. The only difference: This time it may be even more complicated than previous network security challenges. Mobile security is also more challenging than many expect because the concept of network security is changing. Network security today is focused primarily on the transport layer. This approach is inadequate for next-generation all-ip networks, which require a complex, multilayer security matrix that can also protect the control/signaling layers and the service/application layer. In addition, security for all layers must include integrated policy enforcement and secure-access technology using multi-protocol authentication, authorization, and accounting (AAA) services. Failure to implement multilayer security exposes providers to a loss of network integrity, revenue, and potentially corporate reputation. Mobile network security requires protection from the vast and constantly changing network attacks providers face daily, both externally and internally. External threats are typically widely publicized and include zero-day vulnerabilities, buffer overflows, SQL injections, viruses, worms, and trojans. Internal threats are often overlooked but may well be more common than external threats. Implementing multilayered security helps protect against both external and internal threats. 1
2 Layered Security: The only comprehensive security approach Target All Attacks Smarter Attacks Smartest Attacks Access Control AAA Router ACLs, IP spoof detection Stateful Firewall IDP: Content inspection, Anti-X Stateful Signatures URL-Filtering Application Identification Policy Manager Dynamic Policy Decision & Security feedback loop Figure 1: Layered security the only comprehensive approach The Juniper Networks Mobile Security Solution The most comprehensive approach really the only approach that works is to protect the entire network with multiple security components applied in layers (see Figure 1). At the first layer of defense, Juniper Networks AAA products provide access control to discourage opportunistic attacks from outsiders. Juniper Networks SSG Series Secure Services Gateways offer high-performance security and modular LAN/WAN connectivity. Juniper s core and edge routers prevent IP spoofing by implementing access control lists (ACLs) to drop all inbound traffic with suspicious source IPs (or IP ranges). Juniper s firewalls with stateful inspection are the next line of defense in this layered security model. They provide IPsec, VPN, and SSL VPN capabilities along with critical protection against denial of service (DoS), distributed denial of service (DDoS), and other types of attacks. Juniper Networks Intrusion Detection and Protection (IDP) provides important content inspection and antivirus/antispam capabilities. Content inspection is designed to stop L7 attacks and is the only way to detect what is really running on L7 or signaling application layers of the network. Routers Juniper Networks T Series Core Routers, and Juniper Networks E Series Broadband Services Routers, M Series Multiservice Edge Routers, and MX Series Ethernet Services Routers provide packet handling layer security at a number of levels, as shown in Figure 2. Data plane: Anti-spoofing, IP fragment filtering, and ACLs drop all inbound traffic with a suspicious source IP address or IP address ranges Network protocols: BGP Session Security, Secure FTP, and SSH Law enforcement: Communications Assistance for Law Enforcement Act (CALEA) or other government approved, lawful intercept, and VLAN mirroring, firewall, and IDP A new unique feature of Juniper s router-based security is session flow protection based on border gateway functionality (BGF). Juniper s BGF can filter and block unwanted flows, rate limit flows based on bandwidth, prioritize flows across the core network, and enable Network Address Translation (NAT)- traversal without tromboning. Unified Access Control and AAA Juniper Networks Unified Access Control and Juniper Networks SBR Series Steel-Belted Radius Servers provide secure network access control with powerful user authentication and authorization. SBR Series AAA validates the identity of the user and Unified Access Control combines that identity information with device health and location data to deliver granular access control. Only authorized users can access the network and applications from devices that adhere to your network security policies. 2
3 ROUTER-BASED SECURITY Secure the Data Plane Line-Rate ACLs, Ex-ACLs and Multi-level ACLs, IP Fragment Filtering, Anti-Spoofing T Series Secure Access Into infrastructure Secure Network Protocols Secure the Law Enforcement TACACS, RADIUS, AAA, Secure PAP, CHAP BGP Session Security (MD5) Secure FTP, Secure Shell (SSH) CALEA Lawful Interception, Port and VLAN Mirroring Next-Generation Network CORE Products T Series E Series M Series MX Series Secure Audits Session Flow Security Real-Time Active Logs (local and remote), Traffic Flow Captures, RMON, SNMPv3 Filter and Block Unwanted Flows, Rate Limit Flows Based on Bandwidth Next-Generation Network EDGE Products M Series, MX Series, E Series IETF OPSEC Complaint Figure 2: Router-based security Firewall Security Effective mobile security requires both stateless and stateful firewalls. Stateless firewalls determine whether a packet is permitted into the network by analyzing basic information in the packet headers. Stateful inspection firewalls monitor and control the flow of traffic between networks by tracking the state of sessions and dropping packets that are not part of authorized sessions. Firewalls must be able to scale to handle the volume of traffic flow so that the network s performance is not negatively impacted. Additional security includes VPN using IPsec for authenticating and encrypting IP packets, SSL, and Transport Layer Security (TLS). Application/Service Layer Juniper s security solutions detect unusual or suspicious behavior on the application layer using customizable signatures based on stateful protocol inspection, attack patterns, and behavioral learning. This capability is vital for service providers who want to protect their networks against the most malicious attacks. Juniper protects more than 60 protocols against penetration and proliferation of worms and other malware including trojans, spyware, keyloggers, and adware. Juniper Networks Support for SCTP Stream Control Transmission Protocol (SCTP) is a reliable message-oriented (not byte-stream) multi-streaming transport protocol operating over IP. SCTP was intended initially for Internet telephony, but now has developed into a robust, general purpose transport protocol. Among other things, SCTP offers network level fault tolerance through its support of multihoming at either or both ends of an association, and it offers congestion avoidance behavior and resistance to flooding and masquerade attacks. SCTP is essentially the foundation for the transport of telephony SS7 (Signaling System 7) protocols over IP. This trend of conveying SS7 signaling over SCTP/IP is fully backed by leading standard organizations and is expanding to other applications/signaling over SCTP (for example, Media Gateway Control Protocol (MEGACO)). Juniper Networks ISG Series Integrated Security Gateways feature the industry s first SCTP firewall solution. The Juniper solution: Checks SCTP syntax Performs stateful inspection to deny malicious SCTP messages (hijack and redirection, for example) Limits the SCTP traffic rate to counter bombing attacks Allows users to configure screening certain types of SCTP messages to reconcile compatibility problems Performs address translation to hide the topology Logs SCTP traffic for recording irregular activities Blocks dynamic capability of removing/adding IPs to already existing SCTP association Includes NAT/Naming Authority Pointer (NAPTR) functionality that is necessary to replace private IP addresses in the IP and the SCTP header with public IP addresses/port numbers 3
4 Securing Data Centers with the SRX Series Services Gateways Security in the data center is extremely important, as it is the heart of information processing for most organizations. It is imperative that data center services are always available and that they are secure. The ideal goal in the data center is to group together services that are alike and trusted to talk to one another without a security barrier. An example of this approach is the tiered application architecture consisting of a Web server, application server, and database server. For a typical deployment, all of the similar types of servers for a specific application deployment are grouped in the same network segment. The first step in securing server access is the deployment of a stateful firewall. This will limit connectivity between servers to the required minimum number of services, ensuring that unwanted access to servers will not occur. This mitigates the possibility of a host making unauthorized connections to a server, but scaling this type of security configuration can be difficult. Limiting the way servers are connected to one other is a great start in securing connectivity between applications. The next step is to secure what is inside these connections by employing intrusion prevention system (IPS) techniques. IPS allows a device to look inside network connections to determine if they contain a malicious attack. This is extremely important in locations such as the data center, where an attack can lead to anything from a service outage to the actual loss of data. Because of these risks, deploying IPS is of critical importance. IDP Security Juniper Networks Intrusion Detection and Prevention (IDP) lends additional support to the role of firewalls by monitoring and analyzing network traffic for signs of attacks at the application and service layer. IDP can drop traffic that is deemed to be from a malicious user. IDP is designed to detect the presence of attacks within permitted traffic flow to the network by using stateful signatures that scan for attacks based on known patterns. These signatures must be easily customizable in order to meet various provider requirements and specific concerns. In today s environment of constantly evolving threats, mobile providers require solutions that can protect against both unknown and known patterns. Many of the most significant threats involve zero-day attacks, or unknown pattern attacks that leverage vulnerabilities for which there is no signature or software patch. IDP not only prevents networks against attacks, it provides information on rogue servers, as well as types and versions of applications and operating systems that may have unknowingly been added to the network. Application signatures, available on IDP, go a step further and enable accurate intrusion detection of specific applications such as peer-to-peer or instant messaging. Armed with the knowledge of specific applications running in the network, administrators can more easily enforce security policies and maintain compliance with corporate application use policy. IDP systems also provide Differentiated Services (DiffServ) The two limitations of IPS are scale and deployment location. First, it is difficult to scale an IPS deployment to the needs of a data center using conventional IPS appliances. This is not always a matter of IPS device capacity; it can also be driven by the ability to deploy the IPS device. For example, it may not be practical to deploy IPS units in front of all of the various application sets. The IPS also may not scale to large enough performance numbers to deploy it at the data center core. To add to this challenge, a typical IPS device can only process a specific amount of traffic. So when an IPS is deployed, it is not possible to specify which traffic it chooses to process or not, and the IPS device is limited by the same performance scaling challenges as mentioned in the previous section. The ideal answer would be deploying an IPS device that could selectively process traffic to reduce the overall throughput necessary to do the job. Juniper Networks SRX5600 and SRX5800 Services Gateways are engineered from the ground up to offer robust data center networking and security services featuring intelligent IPS technology. Powered by the proven Juniper Networks JUNOS Software and dynamic services architecture, the SRX5000 line also provides unrivaled performance and scalability to ensure uninterrupted network infrastructure expansion and growth without sacrificing security. markings to allow the routers to enforce bandwidth limitations on nonessential applications. Not only can administrators control the access of specific applications, they can ensure that business-critical applications receive a predictable quality of service (QoS). To help block malicious application-level attacks, Juniper Networks seamlessly integrates intrusion prevention across the entire product line. For central enterprise sites, data center environments, and service provider networks with high volumes of throughput, the ISG Series with IDP and the SRX5000 line can be deployed for application-level protection. The ISG Series and SRX Series tightly integrate the same software found on the IDP platforms to provide unmatched application-level protection against worms, trojans, spyware, and malware. More than 60 protocols are supported, including those used by advanced applications such as VoIP and streaming media. Unmatched security processing power and network segmentation features protect critical high-speed networks against the penetration and proliferation of existing and emerging application-level threats. With multiple attack detection mechanisms, including stateful signatures and protocol anomaly, the ISG Series and the SRX5000 line perform in-depth analysis of application protocol, context, and state to deliver zero-day protection from application-level attacks. 4
5 On all other models, security administrators can deploy IPS capability using the Deep Inspection firewall to block applicationlevel attacks. Deep Inspection utilizes two of the eight attackdetection mechanisms available on the standalone Juniper Networks IDP Series Intrusion Detection and Prevention Appliances and integrates them with the stateful inspection firewall. Deployed in perimeter locations such as the branch office, a Deep Inspection firewall can block application-level attacks before they infect the network and inflict any damage. Juniper offers a range of products for mobile security, including ISG Series and ISG Series with IDP products. The ISG General Packet Radio Service (GPRS) solutions are GPRS Tunneling Protocol (GTP)-aware and designed for the high-performance security of GPRS (enhanced second-generation) and universal mobile telecommunications system (UMTS) third-generationenabled mobile networks. In addition to countering sophisticated threats, DoS attacks, and malicious users, Juniper Networks ISG2000 Integrated Security Gateway can limit messages, throttle bandwidth-hungry applications that consume uplink/ downlink traffic, and perform Third-Generation Partnership Project (3GPP) R6 IE removal to help retain interoperability in roaming between second- and third-generation networks. SRX Series Services Gateways Scalable performance: Dynamic Services Architecture allows the SRX Series to leverage new services with appropriate processing capabilities without sacrificing overall system performance. System and network resiliency: Carrier-class reliability based on features ranging from redundant hardware and components to JUNOS Software, Juniper s proven OS. Interface flexibility: Highly flexible I/O configuration and independent I/O scalability meet the needs of virtually any network environment. Network segmentation: Security zone, virtual LANs (VLANs), and virtual routers allow administrators to tailor security and networking policies for various internal, external, and demilitarized zone (DMZ) subgroups. Robust routing engine: Carrier-class routing engine provides physical and logical separation of data and control planes to allow deployment of consolidated routing and security devices, and ensures the security of routing infrastructures. Comprehensive threat protection: Integrated security features and services include a multi-gigabit firewall, intrusion detection and protection, DoS, NAT, and QoS. The security in the SRX Series Services Gateways takes advantage of Juniper Networks technologies, leveraging the firewall capabilities in the ScreenOS software and the IPS technology of IDP. This is integrated into JUNOS running on service processing cards (SPCs). The firewall capabilities and policy creation are similar to the configuration on ScreenOS; policies are created between zones and then the specific hosts and applications are specified. This creates a policy that the administrator can configure to permit, deny, or reject the traffic. When a traditional stateful firewall is not enough, it is also possible to inspect the traffic as it goes through the firewall by flagging a security policy for IDP inspection. Once the session is established, the IDP engine inspects the traffic and the IDP policy is consulted to check against the traffic. IDP matches against the familiar source IP, destination IP, and application, and it also checks against a set of attacks. If the traffic matches one of these attacks, the attack is stopped. SRX Series Services Gateways leverage over 10 years of experience from all of Juniper s various products. In particular, the SRX Series has been designed using a similar architecture as that employed in the MX Series Ethernet Services Routers. The difference between the MX Series and the SRX Series is that the SRX Series needs to be able to implement secure traffic services. To do so, Juniper Networks has created the SPC for the SRX Series a powerful, high-speed, high-density computing card that is modular so that several of them can be added into a chassis. Adding additional cards automatically allows for scalable performance. The SRX Series has true separation between control and forwarding planes. The control plane allows all of the management and dynamic routing interaction to occur independent of the data plane processing. The data plane is a high-performance switching backplane that allows for line rate transversal of traffic between SPCs and interface cards. This ensures that the chassis can push traffic as fast as it can be processed by the SPCs. The interface cards also are similar to the interfaces used on the MX Series routers. The cards offer line rate performance, avoiding road blocks for getting traffic in and out of the interfaces. The interface capability of the SRX Series is extremely high density for a firewall. It can support up to 10 slots of interfaces mixing and matching 4-port 10-Gigabit Ethernet interface cards and 40-port 1-Gigabit Ethernet interfaces. The remaining slots can be used for service processing cards. 5
6 To deal with performance scalability, the SRX Series has been designed with expandable hardware architecture. This allows the end user to start small in terms of the number of security processing cards that are used, and then add additional cards to scale the performance over time. Each new SPC that is added increases the performance in a predictable way, allowing the organization to plan for the hardware it needs as it grows. Each SPC contains two services processing units (SPUs), with each unit acting as a high-density processor. The first SPC uses one of the SPUs as a central point. The central point processes traffic like each of the other SPUs, but it also is the central authority for determining if a session already exists or not. The central point is used as the central authority for whether or not a session is already created. If traffic enters the SRX Series and the session is not created, the central point sends the traffic to the next available SPU based upon its load balancing algorithm. The SPU performs most of the security services on the SRX Series Services Gateways. This is essentially the heavy lifting on the device. All firewalling, intrusion detection and protection, and session state maintenance is done on the SPU. This type of performance scalability is what is needed in the data center. It allows the SRX Series to be deployed with confidence that it will be able to handle all of the necessary sessions. An additional SPC can be added to increase performance, reducing the need to perform an expensive forklift upgrade of a lowperformance device. Features and Benefits Highly effective network security through multilayered approach that includes: -- Network access control -- Packet handling layer -- Firewall -- Intrusion detection and prevention Flexible deployment options: -- Standalone firewall, standalone IDP Series, and firewall/ IDP combination products -- Security features across Juniper core and edge router families -- SBR Series products tailored for needs of wireline, Code Division Multiple Access (CDMA), and Global System for Mobile Communications (GSM) service providers Broad range of protocol support including: -- Control and signaling layer security (SIP, H.323, MGCP, SIGTRAN, SOAP) -- Mobile protocols including GPRS Tunneling Protocol (GTP), Generic Routing Encapsulation (GRE), IP-IP encapsulation, Point-to-Point Protocol (PPP) -- Stream Control Transmission Protocol (SCTP) for SS7 telephony Solution Components Juniper Networks SBR Series The SBR Series of high-performance RADIUS servers is a core component of mobile service provider networks, providing centralized user authentication and access policy management with the performance and reliability to handle any traffic load. Juniper Networks SSG Series The SSG Series of purpose-built security products has been designed to satisfy customer networking and security requirements for mobile networks. Juniper Networks NetScreen-5200 and NetScreen-5400 NetScreen-5200 and NetScreen-5400 integrated firewall/ipsec VPN appliances are purpose-built, dynamic security appliances with industry-leading flexibility and performance capabilities to protect mobile service provider networks and network data centers. Juniper Networks ISG1000 and ISG2000 ISG1000 and ISG2000 with IDP provides strong access control, secure communications, and network and application-level security while lowering the total cost of ownership for deploying best-in-class firewall, VPN, and intrusion prevention services. Juniper Networks SRX Series Based on JUNOS Software and dynamic services architecture, the SRX5600 and SRX5800 are designed to meet the network and security requirements for data center hyper-consolidation, rapid managed services deployments, and aggregation of security services. Juniper Networks IDP Series IDP Series products provide comprehensive and easy-to-use inline protection that prevents network and application-level attacks before they inflict any damage to the network, minimizing the time and costs associated with maintaining a secure network. Using industry-recognized stateful intrusion detection and prevention techniques, the IDP Series provides zero-day protection against worms, trojans, spyware, keyloggers, and other malware from penetrating the network or spreading from already infected network segments. Juniper Networks Routers Juniper s routers provide packet handling layer security to ensure a robust layer of defense against suspicious traffic attempting to enter and traverse service provider networks. These reliable and scalable routing platforms incorporate JUNOS Software, Juniper s trusted network operating system proven in high-performance networking environments. 6
7 Summary: Juniper Networks Provides Multilayered Security for Mobile Networks Juniper provides an innovative, marketing-leading mobile security solution that service providers can use to mitigate the risks associated with deploying IP-based services. SBR Series Steel-Belted Radius Servers provide vital network access control functionality to intercept hackers trying to gain unauthorized access to service provider mobile networks. Juniper s firewall and VPN devices have been purpose-built to perform essential security functions that safeguard the network against worms, trojans, viruses, and other malware. Juniper offers standalone firewalls enabling up to 120 Gbps firewall throughput (on the fully equipped SRX5800), standalone IDP Series systems with market-leading performance of 10 Gbps of real-world throughput, and combination firewall and IDP products. Next Steps To learn more about Juniper s Mobile Security Solution, please visit or contact your local Juniper Networks sales representative. About Juniper Networks Juniper Networks, Inc. is the leader in high-performance networking. Juniper offers a high-performance network infrastructure that creates a responsive and trusted environment for accelerating the deployment of services and applications over a single network. This fuels high-performance businesses. Additional information can be found at According to a Network World study, Juniper Networks ISG2000 with IDP is the top-rated security appliance, scoring first among all evaluated devices in the categories of management, intrusion prevention, availability, and routing. Juniper s IDP technology, integrated into the ISG2000, operates on a policy- and definitiondriven basis to identify and stop network and application-level attacks. Juniper routers can process QoS-sensitive multimedia traffic at very high speed, while enacting powerful packet filters to defeat IP-level attacks. Juniper Networks security devices are scalable, reliable, and backed by years of experience shaping the routing and security architectures of the world s top service provider networks. Corporate and Sales Headquarters Juniper Networks, Inc North Mathilda Avenue Sunnyvale, CA USA Phone: 888.JUNIPER ( ) or Fax: APAC Headquarters Juniper Networks (Hong Kong) 26/F, Cityplaza One 1111 King s Road Taikoo Shing, Hong Kong Phone: Fax: To purchase Juniper Networks solutions, please contact your Juniper Networks representative at or authorized reseller. EMEA Headquarters Juniper Networks Ireland Airside Business Park Swords, County Dublin, Ireland Phone: Fax: Copyright 2009 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, JUNOS, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. JUNOSe is a trademark of Juniper Networks, Inc. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice EN Mar 2009 Printed on recycled paper. 7
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
Juniper Networks Solution Portfolio for Public Sector Network Security
SOLUTION BROCHURE Juniper Networks Solution Portfolio for Public Sector Network Security Protect against Network Downtime, Control Access to Critical Resources, and Provide Information Assurance Juniper
PRODUCT CATEGORY BROCHURE. Juniper Networks Integrated
PRODUCT CATEGORY BROCHURE Juniper Networks Integrated Firewall/VPN Platforms Strong Security for Access Control, User Authentication, and Attack Protection at the Network and Application Level As threats
How To Protect Your Network From Attack From A Malicious Computer (For A Network) With Juniper Networks)
PRODUCT CATEGORY BROCHURE Juniper Networks Integrated Firewall/VPN Platforms Strong Security for Access Control, User Authentication, and Attack Protection at the Network and Application Level As threats
Security Portfolio. Juniper Networks Integrated Firewall/VPN Platforms. Product Brochure. Internet SRX 5600. Fixed Telecommuter or Small Medium Office
Fixed Telecommuter or Small Medium Office NSM NSM Regional Office SSG 550M Product Brochure Security Portfolio Juniper Networks Integrated Firewall/VPN Platforms SSG 140 Branch Office... SSG 320M... SSG
PRODUCT CATEGORY BROCHURE INTEGRATED FIREWALL/ VPN PLATFORMS
PRODUCT CATEGORY BROCHURE INTEGRATED FIREWALL/ VPN PLATFORMS Strong Security for Access Control, User Authentication, and Attack Protection at the Network and Application Level As threats to the network
SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork
SoLuTIoN guide CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork Contents BENEfITS of ThE CLoud-rEAdy data CENTEr NETWork............................3 getting ready......................................................................3
Juniper Networks Solution Portfolio for Public Sector Network Security
Solution Brochure Juniper Networks Solution Portfolio for Public Sector Network Security Protect against Network Downtime, Control Access to Critical Resources, and Provide Information Assurance STRM NS-Security
PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY
APPLICATION NOTE PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY Copyright 2010, Juniper Networks, Inc. Table of Contents Introduction........................................................................................
Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET
DATASHEET Network and Security Manager Product Overview Network and Security Manager provides unparalleled capability for device and security policy configuration, comprehensive monitoring, reporting tools,
Demonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series
PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations
Security Solutions Portfolio
Fixed Telecommuter or Small Medium Office Regional Office SSG 520M SSG 550M Branch Office Security Solutions Portfolio Integrated Firewall/VPN Solutions SSG 140 SSG 350M... SSG 320M... 5GT SSG 5 SSG 20.........
NETWORK AND SECURITY MANAGER
DATASHEET NETWORK AND SECURITY MANAGER Product Overview Juniper Networks Network and Security Manager (NSM) is a unified device management solution for Juniper s network infrastructure of routing, switching
MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS
APPLICATION NOTE MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS Migrating Advanced Security Policies to SRX Series Services Gateways Copyright 2009, Juniper Networks, Inc.
Firewall Migration. Migrating to Juniper Networks Firewall/VPN Solutions. White Paper
White Paper Firewall Migration Migrating to Juniper Networks Firewall/VPN Solutions Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408.745.2000 1.888 JUNIPER www.juniper.net
IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL
IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL An illustrated Guide to Configuring a Simple IF-MAP Federated Network Juniper Networks, Inc. 1 Table of Contents Introduction...3 Scope...3
The Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
WHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1
WHITE PAPER Network Simplification with Juniper Networks Technology Copyright 2011, Juniper Networks, Inc. 1 WHITE PAPER - Network Simplification with Juniper Networks Technology Table of Contents Executive
POWERING UNIFIED COMMUNICATIONS WITH BRANCH SRX SERIES SERVICES GATEWAYS
WHITE PAPER POWERING UNIFIED COMMUNICATIONS WITH BRANCH SRX SERIES SERVICES GATEWAYS Analysis of the Optimal Branch Network Architecture for Successful Unified Communications in the Enterprise Copyright
Analysis of the Optimal Branch Network Architecture for Successful Unified Communications in the Enterprise
White Paper Powering Unified Communications with Branch SRX Series Services Gateways Analysis of the Optimal Branch Network Architecture for Successful Unified Communications in the Enterprise Copyright
PRODUCT CATEGORY BROCHURE
PRODUCT CATEGORY BROCHURE SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations of Every Size
The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more
The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific
Reasons Enterprises. Prefer Juniper Wireless
Reasons Enterprises Prefer Juniper Wireless Juniper s WLAN solution meets the mobility needs of today s enterprises by delivering the highest levels of reliability, scalability, management, and security.
Juniper Networks SRX 5000 Services Gateways
Juniper Networks SRX 5000 Services Gateways Datasheet Product Description Juniper Networks SRX 5600 and SRX 5800 are next-generation services gateways based on a revolutionary new architecture that provides
White Paper. Copyright 2012, Juniper Networks, Inc. 1
White Paper SRX Series as Gi/ Firewall for Mobile Network Infrastructure Protection Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3 Overview of LTE (4G)
Solution Brief. Secure and Assured Networking for Financial Services
Solution Brief Secure and Assured Networking for Financial Services Financial Services Solutions Page Introduction To increase competitiveness, financial institutions rely heavily on their networks to
JUNOS Software: The Power
PRODUCT CATEGORY BROCHURE JUNOS Software: The Power of One Operating System Reduce Complexity, Achieve Operational Excellence, and Dynamically Deliver Services with Lower TCO Overview Juniper Networks
Juniper Networks Unified Access Control (UAC) and EX-Series Switches
White Paper Juniper Networks Unified Access Control (UAC) and EX-Series Switches Meeting Today s Security Challenges with End-to-End Network Access Control Juniper Networks, Inc. 1194 North Mathilda Avenue
Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
Simplifying the Data Center Network to Reduce Complexity and Improve Performance
SOLUTION BRIEF Juniper Networks 3-2-1 Data Center Network Simplifying the Data Center Network to Reduce Complexity and Improve Performance Challenge Escalating traffic levels, increasing numbers of applications,
Configuring and Implementing A10
IMPLEMENTATION GUIDE Configuring and Implementing A10 Networks Load Balancing Solution with Juniper s SSL VPN Appliances Although Juniper Networks has attempted to provide accurate information in this
Meeting PCI Data Security Standards with
WHITE PAPER Meeting PCI Data Security Standards with Juniper Networks STRM Series Security Threat Response Managers When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs Copyright
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
SECURE ACCESS TO THE VIRTUAL DATA CENTER
SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need
Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources
APPLICATION NOTE Juniper NETWORKS SSL VPN and Windows Mobile Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources Table of Contents Introduction.........................................................................................
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
White Paper. Protect Your Virtual. Realizing the Benefits of Virtualization Without Sacrificing Security. Copyright 2012, Juniper Networks, Inc.
White Paper Five Best Practices to Protect Your Virtual Environment Realizing the Benefits of Virtualization Without Sacrificing Security Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Executive
J-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
Cconducted at the Cisco facility and Miercom lab. Specific areas examined
Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security
ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS
SOLUTION BRIEF ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS IT Organizations Can Reduce Costly TDM Leased Line Fees Challenge IP networks were not designed to transport bit-synchronous
Secure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
Implementing Firewalls inside the Core Data Center Network
IMPLEMENTATION GUIDE Implementing Firewalls inside the Core Data Center Network Best Practices for Implementing Juniper Networks Firewall Devices in the Data Center Core Copyright 2010, Juniper Networks,
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches
APPLICATION NOTE Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2009, Juniper Networks,
Key Strategies for Long-Term Success
WHITE PAPER Security in the Next- Generation Data Center Key Strategies for Long-Term Success Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................
IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business
IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management
Voice Modules for the CTP Series
DATASHEET Voice Modules for the CTP Series Product Overview Enterprise organizations are leveraging the cost savings associated with IP transport for a variety of new packet based multimedia services.
Interoperability Test Results for Juniper Networks EX Series Ethernet Switches and NetApp Storage Systems
APPLICATION NOTE Network Attached Storage Interoperability Testing Interoperability Test Results for Juniper Networks EX Series Ethernet Switches and Storage Systems Copyright 2012, Juniper Networks, Inc.
White Paper. ZyWALL USG Trade-In Program
White Paper ZyWALL USG Trade-In Program Table of Contents Introduction... 1 The importance of comprehensive security appliances in today s world... 1 The advantages of the new generation of zyxel usg...
Product Description. Product Overview
DATASHEET vgw Gateway Product Overview The vgw Gateway provides a best-in-class virtual firewall to meet the unique security challenges of virtual data centers and clouds. IT teams can now secure their
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Deploying a Secure Wireless VoIP Solution in Healthcare
Deploying a Secure Wireless VoIP Solution in Healthcare Situation Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants
MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES
APPLICATION NOTE MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2010, Juniper Networks,
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
NETWORK AND SECURITY MANAGER APPLIANCES (NSMXPRESS AND NSM3000)
DATASHEET NETWORK AND SECURITY MANAGER APPLIANCES ( AND ) Product Overview Now more than ever, network operators need the ability to easily manage security policies and to have visibility into potential
Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000
Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business
VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES
APPLICATION NOTE VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Configuring Secure SSL VPN Access in a VMware Virtual Desktop Environment Copyright 2010, Juniper Networks, Inc. 1 Table
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
JUNOS OS: THE POWER OF ONE OPERATING SYSTEM
PRODUCT CATEGORY BROCHURE JUNOS OS: THE POWER OF ONE OPERATING SYSTEM Reduce Complexity to Increase Availability and Deploy Services Faster with Lower TCO Overview Juniper Networks Junos operating system
Introduction...3. Scope...3. Design Considerations...3. Hardware Requirements...3. Software Requirements...3. Description and Deployment Scenario...
APPLICATION NOTE Securing Virtualization in the Cloud-Ready Data Center Integrating vgw Virtual Gateway with SRX Series Services Gateways and STRM Series Security Threat Response Manager for Data Center
Using Palo Alto Networks to Protect the Datacenter
Using Palo Alto Networks to Protect the Datacenter July 2009 Palo Alto Networks 232 East Java Dr. Sunnyvale, CA 94089 Sales 866.207.0077 www.paloaltonetworks.com Table of Contents Introduction... 3 Granular
SOLUTION BROCHURE. Juniper Networks. Intelligent Security and Performance for the Distributed Enterprise
SOLUTION BROCHURE Juniper Networks Adaptive Threat Management Solutions Intelligent Security and Performance for the Distributed Enterprise Juniper Networks Adaptive Threat Management Solutions Overview
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Advantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Web Filtering For Branch SRX Series and J Series
APPLICATION NOTE Web Filtering For Branch SRX Series and J Series Configuring Web Filtering on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2009, Juniper Networks, Inc. Table
Six Steps to Ensure Application Performance, Network Resiliency, Data Integrity, and User Access Security
White Paper Architecting Your Network to Survive a Disaster Six Steps to Ensure Application Performance, Network Resiliency, Data Integrity, and User Access Security Copyright 2012, Juniper Networks, Inc.
Implementing Firewalls inside the Core Data Center Network
Implementation Guide Implementing Firewalls inside the Core Data Center Network Best Practices for Implementing Juniper Networks Firewall Devices in the Data Center Core Juniper Networks, Inc. 1194 North
The Global Attacker Security Intelligence Service Explained
White Paper How Junos Spotlight Secure Works The Global Attacker Security Intelligence Service Explained Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
Pharmacy. Regulatory Agency. Medical Equipment. Clinic. Customers Guest Partners Vendors WEB
PORTALS DEVICES Pharmacy Data Center Hospital Field Trial ATM Regulatory Agency Clinic MD Office Medical Equipment Kiosk Clinic Customers Guest Partners Vendors Customers Guest Partners Vendors SOA WEB
Secure VoIP for optimal business communication
White Paper Secure VoIP for optimal business communication Learn how to create a secure environment for real-time audio, video and data communication over IP based networks. Andreas Åsander Manager, Product
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Voice Over IP and Firewalls
Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Use of Voice Over IP (VoIP) in enterprises is becoming more and more
White Paper. Five Steps to Firewall Planning and Design
Five Steps to Firewall Planning and Design 1 Table of Contents Executive Summary... 3 Introduction... 3 Firewall Planning and Design Processes... 3 Step 1. Identify Security Requirements for Your Organization...
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
JUNIPER NETWORKS WIRELESS LAN SOLUTION
SOLUTION BROCHURE JUNIPER NETWORKS WIRELESS LAN SOLUTION Deliver Secure, Scalable, and Reliable Campus Mobility While Maximizing Performance and Minimizing Cost of Ownership Wireless LAN Solution Overview
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES
APPLICATION NOTE WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES Configuring Web Filtering on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2010, Juniper Networks, Inc. 1
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
