Six Steps to Ensure Application Performance, Network Resiliency, Data Integrity, and User Access Security



Similar documents
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork

Demonstrating the high performance and feature richness of the compact MX Series

Simplifying the Data Center Network to Reduce Complexity and Improve Performance

WHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1

Configuring and Implementing A10

Voice Modules for the CTP Series

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.

SECURE ACCESS TO THE VIRTUAL DATA CENTER

Reasons to Choose the Juniper ON Enterprise Network

Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET

NETWORK AND SECURITY MANAGER

Reasons Enterprises. Prefer Juniper Wireless

NETWORK AND SECURITY MANAGER APPLIANCES (NSMXPRESS AND NSM3000)

IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways

Customer Benefits Through Automation with SDN and NFV

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS

Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation

Juniper Solutions for Turnkey, Managed Cloud Services

PRODUCT CATEGORY BROCHURE

NETWORKING FOR DATA CENTER CONVERGENCE, VIRTUALIZATION & CLOUD. Debbie Montano, Chief Architect dmontano@juniper.net

Solution Brief. Secure and Assured Networking for Financial Services

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Implementing Firewalls inside the Core Data Center Network

Juniper Networks Solution Portfolio for Public Sector Network Security

SOLUTIONS FOR DEPLOYING SERVER VIRTUALIZATION IN DATA CENTER NETWORKS

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES

White Paper. Protect Your Virtual. Realizing the Benefits of Virtualization Without Sacrificing Security. Copyright 2012, Juniper Networks, Inc.

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more

VMware vcloud Networking and Security Overview

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Protecting Physical and Virtual Workloads

MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS

Transforming Service Life Cycle Through Automation with SDN and NFV

JUNIPER NETWORKS WIRELESS LAN SOLUTION

Junos Pulse Secure Access Service Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and Agility

New Data Centers Require a New Network

Secure, Mobile Access to Corporate , Applications, and Intranet Resources

Key Strategies for Long-Term Success

Juniper Networks QFabric: Scaling for the Modern Data Center

PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY

DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES

Simplify the Data Center with Junos Fusion

Flattening the Data Center Architecture

Juniper Update Enabling New Network Architectures. Debbie Montano Chief Architect, Gov t, Edu & Medical dmontano@juniper.

Junos Space Virtual Control

the Data Center Connecting Islands of Resources Within and Across Locations with MX Series Routers White Paper

POWERING UNIFIED COMMUNICATIONS WITH BRANCH SRX SERIES SERVICES GATEWAYS

Analysis of the Optimal Branch Network Architecture for Successful Unified Communications in the Enterprise

Data Center Networking Designing Today s Data Center

November Defining the Value of MPLS VPNs

Product Description. Product Overview

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery

Optimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches

The Global Attacker Security Intelligence Service Explained

Interoperability Test Results for Juniper Networks EX Series Ethernet Switches and NetApp Storage Systems

Integration Guide. EMC Data Domain and Silver Peak VXOA Integration Guide

JUNIPER CARE PLUS ADVANCED SERVICES CREDITS

Virtualization Essentials

Virtual Private LAN Service (VPLS)

CA Cloud Overview Benefits of the Hyper-V Cloud

SECURE CLOUD CONNECTIVITY FOR VIRTUAL PRIVATE NETWORKS

A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN

Implementing Firewalls inside the Core Data Center Network

Virtualization, SDN and NFV

Deploying IP Telephony with EX-Series Switches

Introduction...3. Scope...3. Design Considerations...3. Hardware Requirements...3. Software Requirements...3. Description and Deployment Scenario...

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

Understanding Fundamental Issues with TRILL

USING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD ADOPTION

Enabling Solutions in Cloud Infrastructure and for Network Functions Virtualization

Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for

JUNOScope IP Service Manager

MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES

PRODUCT CATEGORY BROCHURE. Juniper Networks Integrated

Cisco Virtualized Multiservice Data Center Reference Architecture: Building the Unified Data Center

Array Networks & Microsoft Exchange Server 2010

Web Filtering For Branch SRX Series and J Series

Ultra Low Latency Data Center Switches and iwarp Network Interface Cards

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

Juniper Networks MetaFabric Architecture

F5 PARTNERSHIP SOLUTION GUIDE. F5 and VMware. Virtualization solutions to tighten security, optimize performance and availability, and unify access

Transcription:

White Paper Architecting Your Network to Survive a Disaster Six Steps to Ensure Application Performance, Network Resiliency, Data Integrity, and User Access Security Copyright 2012, Juniper Networks, Inc. 1

Table of Contents Executive Summary...3 Introduction...3 Juniper s Six-Step Approach to Architecting the Network...3 Analyze Application Workflow... 4 Simplify and Centralize the Network... 4 Improve Data Synchronization.................................................................................... 6 Monitor Network Performance... 6 Enhance Network Resiliency...7 Enable User Redirection... 8 Conclusion... 9 About Juniper Networks...10 List of Figures Figure 1: Disaster recovery heat map... 4 Figure 2: Centralized security policy... 5 Figure 3: Local compute cluster and geo cluster...7 Figure 4: Using MAG Series Junos Pulse Gateways to redirect users securely... 8 2 Copyright 2012, Juniper Networks, Inc.

Executive Summary If your IT organization has been thinking about the need to update their Business Continuity and Disaster Recovery (BCDR) plan, then you are not alone. According to recent research by 451 Research 1, disaster recovery planning is top of mind for enterprises, and data replication ranks as a top two-storage initiative for IT organizations. It is no wonder that BCDR planning is receiving more attention. Proof is in the outages and financial losses that have occurred from recent disasters from floods, tornadoes, hurricanes, and snowstorms, to Japan s tsunami. Statistics provide a warning: Seventy-five percent of businesses that do not have continuity plans fail within three years of a disaster, and 43% of that 75% never reopen. 2 In addition, government regulations have increased disaster recovery and compliance requirements significantly. These situations have raised awareness of the need to maintain productivity within a company, sustain value chain relationships, and deliver continued services to customers and partners all of which can be difficult when forced to migrate applications and user connections to a new data center location in real time. The goal of a BCDR plan is often focused on how to continuously access applications and protect data. Data replication and active/active data center planning are often at the heart of BCDR planning. However, a constructive BCDR plan also should consider user connectivity, network availability, and security. A worthwhile plan must extend further than data replication and active/active data centers. This paper explores the key components/building blocks of a comprehensive and robust BCDR solution. This includes how to protect application resources, how to ensure secure user access, how to protect data, and how to keep applications accessible 24/7. In addition, it is important to understand how to maintain availability of applications, how to ensure that users reach those applications, and how to simplify and tune the network to ensure application performance. Introduction Today, most organizations realize that they must pay attention to BCDR. However, organizations find themselves facing a number of BCDR challenges, ranging from infrastructure sprawl resulting from poor service-level agreement (SLA) definition to infrastructure built without clearly identifying application requirements. Many customers have deployed infrastructure in an ad hoc manner without consistent management or security policies. The result of these practices has been the creation of multiple failure points, difficulty managing the network and provisioning it, and poor utilization of links, many of which are frequently idle. In addition, many organizations also have a distributed authentication, authorization, and enforcement infrastructure leading to complex firewall policies that prevent user-specific enforcement and deployments based on local data center IT policies rather than on global policies. These inconsistent policies for users and application access result in security gaps. Since some organizations do not have automated backup systems, they are forced to enable manual backup and configuration synchronization systems. This results in inconsistent states, which affect the user experience, since policies are out of sync due to the time delay in restoring them. Also, legacy applications often are impacted because they cannot always be replicated and established in new locations due to their hard-coded IP addresses. And data flows from different locations can vary greatly causing congestion during link failure, while traffic may not be prioritized based on application relevance, causing lesser priority applications to impact the performance of critical applications. Juniper s Six-Step Approach to Architecting the Network Juniper Networks has designed a systematic approach to developing an industry-leading BCDR practice as a result of years of BCDR solution deployments. Part of this approach is the establishment of a six-step program to architect data center networks for business continuity and disaster recovery: 1. Analyze application workflows to ensure proper prioritization of application availability requirements. 2. Simplify and centralize the network architecture to minimize the number of failure points and to ensure consistent policies. 3. Improve data synchronization to ensure that applications are available for active/active or active/passive scenarios. 4. Continuously monitor network performance to enable an active/active or active/passive data center. 5. Enhance network resiliency so that when the failure or problem is detected, the architecture can fail over rapidly and minimize data loss. 6. Enable user redirection rapidly and securely to the new destination and ensure that users can connect to their applications and services. In the following sections, we explore each of these steps in detail. 1 451 Research 2 Bruce T. Blythe, A Manager s Guide to Catastrophic Incidents in the Workplace, August 2002. Copyright 2012, Juniper Networks, Inc. 3

Analyze Application Workflow When considering backup and recovery options, IT should consider the criticality of each application and the ability to migrate it. Some data-based applications must be replicated based on an approved scheme. Some legacy applications cannot be virtualized and cannot be moved due to hard-coded IP addresses. If the online ordering or billing system is down, business may come to a halt. Therefore, it is crucial to rate applications and prioritize their support for BCDR accordingly. An output of the application workflow analysis is the application heat map. The intent of this heat map is to identify the different applications and their importance across specific attributes such as customer experience and revenue impact. An application might have a bigger impact on the customer experience compared to revenue or vice versa. By analyzing applications in this way, IT organizations can prioritize them and develop a robust BCDR solution. Figure 1 depicts a typical heat map related to disaster recovery. APPLICATION NAME CUSTOMER EXPERIENCE REVENUE IMPACT RESTRICTIONS AD/LDAP Legacy Application Hardcoded IP Addresses VoIP Billing Application Critical Medium Figure 1: Disaster recovery heat map In addition, applications have dependencies that must be identified. Multitiered applications are complex and may have multiple application dependencies. They also often have many users with varying privileges. Multiple points of entry to the workflow may exist. These inferences are used in creating a BCDR solution plan. For instance, a distributed application requires that all dependent segments be migrated to the recovery data center before the application can resume. For an active/active data center, administrators must consider the multiuser privileges for the applications and the multiple entry points in the workflow. Therefore, analyzing application workflow must be the first step in a BCDR plan. At this stage, Juniper recommends that IT identify the Recovery Time Objective (RTO) and Recovery Point Objective (RPO) metrics for the different applications. Three important benefits to the organization are as follows: Categorization Determining application priorities (and the metrics for RTO and RPO) so that the applications can be categorized for active/active deployments Dependencies Understanding application dependencies and requiring that the ecosystem ensure that all application dependencies are available at the backup data center Privileges Identifying application user access privileges to ensure that these privileges are retained for application access at the backup data center Simplify and Centralize the Network Removing complexity from the network is key when attempting to transition to the backup data center. Security sprawl and complex routing architectures add complexity and create a considerable administrative burden, as well as impact users and applications performance. Simplifying and centralizing the network architecture minimizes the number of failure points and enables consistent policies. The first step is to eliminate security sprawl and simplify routing. This involves ensuring that the data center edge router is sufficiently powerful to handle the WAN traffic and redirection of traffic to the firewalls, as well as having the necessary features to handle data center interconnect requirements. This is an area where Juniper can provide professional consulting services, if desired. 4 Copyright 2012, Juniper Networks, Inc.

Customers can then begin consolidating security to shared firewall solutions, such as Juniper Networks SRX Series Services Gateways, attached to the data center edge router. This connection provides flexibility to take advantage of virtual contexts on the firewall to handle multiple security policies and traffic types on the same equipment. Figure 2 depicts a centralized security policy, and enforcement is distributed to provide consistency across data centers. As a result, network administrators can move the network connections behind existing standalone firewalls to the new, shared firewall and eliminate the tiers of firewall appliances. Authentication Authorization AAA Policies Synchronized MAG Series Cluster MAG Series Cluster Firewall Policies Firewall Policies PRIMARY DATA CENTER BACKUP DATA CENTER Figure 2: Centralized security policy The next step is to eliminate unnecessary router tiers and consolidate routing to the high-performance Juniper Networks MX Series 3D Universal Edge Routers. This design is then fully normalized across all infrastructure pods connecting them to the core router. The final step is to connect data centers, and separate traffic and security by application. IT organizations can satisfy the traffic requirements and save costs by deploying fewer links using MPLS virtualization technology over shared links. MPLS running on Juniper routers has been proven in the most demanding service provider networks and is available from most major service providers. To decouple from data center-specific IT policies and to ensure consistency, IT should migrate to a centralized policy administration system such as the Juniper Networks MAG Series Junos Pulse Gateways. Using distributed enforcement points is suitable for distributing loads and improving resiliency of the authentication and authorization system. The keys to this approach are centralizing policy enforcement, eliminating site-specific IT policies, and deploying simplified firewall policies that are centrally managed, thereby enabling dynamic, consistent policy enforcement. The key benefits of the simplification process are: Reduction in the number of devices, which reduces the number of points of potential failure Simplification, which reduces the number of provisioned devices while ensuring that centralized control and consistent policies are administered across data centers Improved security to centralize and virtualize security, which enables easy and consistent policy administration Copyright 2012, Juniper Networks, Inc. 5

Improve Data Synchronization Maintaining business continuity means ensuring that applications can be moved to the backup data center and are available as they transition. Because many applications operate in virtual machine environments, it is critical to move virtual machines without causing delays in operations. Keeping systems up-to-date is vital to ensuring secure operations in the event of network failures or network attacks. In many cases, security WAN connectivity is also essential to secure application performance. To migrate virtual machines between data centers while maintaining sessions (known as long distance vmotion in the VMware environment), a Layer 2 stretch for connection information, such as media access control (MAC) and IP addresses, that extend across the WAN and between data centers must exist. This scheme provides the best resiliency and redundancy while ensuring performance. Juniper recommends a solution using VPLS on the MX Series routers. Juniper s solution enables massive scale using proven standards based on technology that is interoperable with other network equipment. Another part of managing the user s experience is to keep systems up to date so that they have the latest security patches. For this to occur, a centralized mechanism is required to distribute software updates to hundreds or thousands of clients. By combining a highly scalable point-to-multipoint (P2MP) solution using virtual private LAN service (VPLS), administrators can achieve data replication that is completely transparent to the underlying WAN infrastructure. If the network does not have an MPLS core and if a secure method is required to move traffic over the IP network, administrators can implement connections using generic routing encapsulation (GRE) tunnels over IP or over IPsec. Administrators can implement this transport on the same high-performance MX Series routers that support MPLS and VPLS. The benefits of a Juniper solution for data migration are: Deploy network links using standards-based MPLS technology to realize cost savings benefits due to link sharing and interoperability with existing network equipment Scale rapidly from a few data centers to several data centers and support thousands of end points Experience resiliency that is only possible using carrier-class proven technology For additional information, please refer to the MPLS Data Center Interconnection for Disaster Recovery white paper at www.juniper.net/us/en/solutions/enterprise/data-center/simplify/#literature. Monitor Network Performance Monitoring network performance is critical to ensuring application performance, meeting recovery time and recovery point objectives, and ensuring connectivity for users and partners. Tools are required to monitor network conditions that provide fault reports and performance changes. To enable network monitoring, IT organizations can deploy Juniper s comprehensive set of network monitoring tools that enable precise network visibility (L3 to L7 views) for a variety of traffic. Juniper s tools include J-Flow, real-time performance monitoring (RPM), and quality-of-service (QoS) statistics. J-Flow can be used to monitor IP metrics while RPM measures network round-trip delay, jitter, and standard deviation values for each configured RPM test. Network monitoring tools collect QoS statistics for various network parameters, which are aggregated and presented to provide network visibility into traffic flows based on IPv4, IPv6, MPLS, and other parameters. Collectively, these elements enable a complete monitoring solution. For performance monitoring to be successful, the correct tools are required to aggregate information and analyze it. This means that network administrators should be able to easily feed the network traffic flow to third-party applications, which require router integration. Juniper s routers enable third-party application integration using our software developer kit (SDK). A number of developers have created network analysis tools that integrate with our routers using Juniper Networks Junos SDK. As a result, IT organization can select the right set of tools to perform network visibility, user, usage, and traffic analyses. For examples, please refer to https://developer.juniper.net/ content/jdn/en/marketplace/discover/application-gallery/application-list.html. Network monitoring tools are not only for application performance monitoring. They also enable the creation of a robust security policy by examining user and usage behavior. This allows administrators to take proactive steps to mitigate risks and improve overall network performance. For instance, users of bandwidth intensive, noncritical applications can be penalized while allowing business critical applications priority. 6 Copyright 2012, Juniper Networks, Inc.

The benefits of network monitoring solutions are: Juniper s router-integrated solution eliminates single purpose devices, thereby reducing CapEx and OpEx. Juniper provides a wide variety of third-party tools that can be integrated using Junos SDK. Proactive monitoring helps prioritize business critical applications. Performance monitoring provides visibility that allows administrators to estimate network usage and proactively provision for network growth. Enhance Network Resiliency High availability (HA) in the face of transitioning workloads, and the ability to facilitate capacity to accommodate increased traffic, are essential to a resilient network. This means that networks must recover rapidly from link failures and traffic must be routed around failures when failures occur. Compute clusters enhance server resiliency. There are two forms of HA compute clusters. The first is a local compute cluster where the compute resources reside in the same site and use shared disks. The second form is a geo cluster where the compute resources reside in two different sites, with disks one and two located in separate sites. Note that the geo cluster provides resiliency and is proportionally more expensive to deploy. Figure 3 depicts geo cluster support compute resiliency but is dependent on the network. Local Compute Cluster GeoCluster PUBLIC NETWORK PUBLIC NETWORK Site 1 Site 2 Site 1 Compute Cluster Compute Cluster Disk 1 Disk 2 Shared Disk PRIVATE NETWORK PRIVATE NETWORK PRIVATE NETWORK Figure 3: Local compute cluster and geo cluster Cluster networking requires network reliability and resiliency to ensure that any heartbeat signals, data synchronization, and communication are reliably communicated within the cluster. In addition, cluster networking requires deterministic latency, where the upper bounds of latency are known and fixed to ensure that any delays in heartbeat communication are not perceived as a failure. In addition, real-time state replication requires deterministic latency to ensure state synchronization. Administrators should consider several points when building comprehensive resiliency from server to WAN. Administrators must configure the switches for rapid link recovery if a device fails. Juniper s Virtual Chassis configuration (where several physical devices are combined into one logical switch) achieves this result. Access layer links connect to the core using several 10GbE connections through mesh connectivity that is enabled using link aggregation group (LAG) technology. The MX Series routers in the core and WAN have multichassis link aggregation group (MC-LAG) enabled for resiliency. The SRX Series firewall has cluster mode enabled for improved resiliency. The MPLS cloud has link level resiliency by using the MPLS fast reroute capability. In this configuration, WAN links are fully redundant and connectivity is ensured. Copyright 2012, Juniper Networks, Inc. 7

To enable resiliency in the WAN that provides the data center interconnect, Juniper recommends deploying a topology with traffic engineered paths and QoS guarantees. Fast reroute protects the critical paths, which enables 50 ms recovery time and is comparable to the highest standards set by the telecommunications industry SONET deployments. Juniper s MPLS-enabled routers achieve this level of performance. In addition, the MPLS cloud enables privacy between different application traffic using logical separation. This allows network traffic segmentation and isolation, especially when different organizations or applications share the links. The benefits of enhancing network resiliency are: This comprehensive resiliency model minimizes data loss that would result from internal and external data center failures. Traffic between data centers must be routed optimally through the least congested paths to ensure minimal delay. Any link failures result in rapid convergence using MPLS. As a result, application access is impacted minimally. Enable User Redirection Once data has been moved and the applications are running in the failover data center, it is critical to connect users to the applications quickly and securely. Ensuring that users are connected to applications depends on several factors. Server load-balancing technology is used to detect unresponsive applications and redirect users. SSL technology is used to ensure secure connections; however, it must be able to handle the increased load. Moving legacy applications, with their hard-coded IP addresses, presents an additional challenge, as does the need to enable collaboration between users who are adjusting to their rapidly changing environment. In a data center with server and application tiers, user access to these servers must be distributed so that servers are not overloaded. When servers experience performance issues, traffic must be redirected to another server. To achieve this, administrators should deploy server load-balancing devices. These can be standalone appliances or virtual instances. Juniper provides services cards for the MX Series routers known as the Multiservices Dense Port Concentrator (MS-DPC) that can run software-based load balancers. This model replaces the dedicated load balancers and reduces the number of network managed devices. The load balancer supports L4 to L7 health monitoring of servers and load-balancing of user traffic. This service is essential to ensure that applications run at optimal performance levels. Figure 4 shows how MAG Series Junos Pulse Gateways redirect users in a secure fashion to the new data center. Junos Pulse Secure Access MAG Series Number of Remote Users Emergency Demand Normal Demand Unplanned Event Time Figure 4: Using MAG Series Junos Pulse Gateways to redirect users securely 8 Copyright 2012, Juniper Networks, Inc.

One of the biggest challenges for organizations is the host of legacy applications that use hard-coded IP addresses to communicate between its components. These applications are configured so that they cannot use Domain Name System (DNS) services. To solve this issue, Juniper has developed a solution using BGP Anycast addressing and Route Health Injection (RHI) enabled by an integrated application delivery controller (ADC). In this solution, both the primary and backup data centers, after evaluating L4 to L7 application health, can advertise the virtual IP instances on the ADC that store the legacy applications. The gateway advertises the host address or virtual IP (VIP) address to see if the endpoint is healthy. Then, traffic is directed to the nearest data center based on the BGP routing metric that it advertises. If failure occurs, the data center that experienced the failure stops advertising the routes of the failed servers, and as a result, traffic is redirected to the alternate data center. The Anycast address enables a client endpoint to connect to the nearest router. This enables the clients to establish persistence with a given router and enables clients to reach the destination by eliminating a DNS lookup. A challenge to application access is that in the event of failure and redirection, a significant number of users are directed to the data recovery site. What if that number of remote access users suddenly increased 5 or 10 times during a disaster? Then consider that local users require access to the data center authentication infrastructure, and we immediately observe a considerable spike in utilization. To enable the needed scalability, Juniper s secure access solution, In Case of Emergency (ICE) licensing, provides the capability to continuously deliver authentication services in the event of a user rollover during a disaster. ICE utilizes Juniper s proven SSL VPN technology to provide remote access capabilities for sudden peak loads in connection requests from remote employees, partners, and customers. To connect mobile users, the IT organization requires a solution that not only enables secure connectivity but also enables collaboration with employees and partners. Such a solution should not rely on a dedicated meeting server based in the data center. Juniper Networks Junos Pulse collaboration tool can enable combined secure access and collaboration in a single platform. Junos Pulse also integrates with Microsoft Outlook for improved convenience in sharing applications. Technological benefits to redirect users are: Anycast and RHI ensure that legacy software can be moved. Router-integrated solutions deliver faster route convergence and lower total cost of ownership (TCO). Remote users and partners can connect securely with minimal delays even during peak loads (ICE solution). The Junos Pulse platform enables mobile connectivity to the data center, enabling collaboration even when primary meeting resources are not available. Conclusion Juniper Networks can summarize its recipe for a successful Business Continuity Disaster Recovery solution in three words: simplicity, security, and agility. Simplicity means eliminating redundant architecture, improving utilization, and consolidating services in fewer links. Organizations can conveniently centralize control and benefit from consistent policy administration as well as fewer points of failure. Security ensures that all layers of the network are protected. Security must transcend from the traditional security perimeters to the extended boundary of the network. Using a combination of device virtualization and end-to-end security, from the mobile device to the hypervisor, Juniper uniquely enables a more secure network. The result of effectively combining simplicity and security is improved agility, which means change without disruption. Juniper uniquely enables an infrastructure that supports change with control. Copyright 2012, Juniper Networks, Inc. 9

About Juniper Networks Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. The company serves customers and partners worldwide. Additional information can be found at www.juniper.net. Corporate and Sales Headquarters APAC Headquarters EMEA Headquarters To purchase Juniper Networks solutions, Juniper Networks, Inc. 1194 North Mathilda Avenue Juniper Networks (Hong Kong) 26/F, Cityplaza One Juniper Networks Ireland Airside Business Park please contact your Juniper Networks representative at 1-866-298-6428 or Sunnyvale, CA 94089 USA 1111 King s Road Swords, County Dublin, Ireland authorized reseller. Phone: 888.JUNIPER (888.586.4737) Taikoo Shing, Hong Kong Phone: 35.31.8903.600 or 408.745.2000 Phone: 852.2332.3636 EMEA Sales: 00800.4586.4737 Fax: 408.745.2100 Fax: 852.2574.7803 Fax: 35.31.8903.601 www.juniper.net Copyright 2012 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. 2000496-001-EN Oct 2012 Printed on recycled paper 10 Copyright 2012, Juniper Networks, Inc.