Juniper Networks Mobile Security Solution

Download Report

Transcript Juniper Networks Mobile Security Solution

Juniper Networks Mobile
Security Solution
Nosipho Masilela
COSC 356
Road Map
 Juniper Networks
 Mobile Security Solution
 Roles of the Solution Components
 Solution cons
 Conclusion
Juniper Networks
 Networking company
 Services: routing, switching security, applications
acceleration, identity policy, network control and
network management
 Customers – top 130 global service providers
 96 global fortune 100
 Federal, state and local government agencies
 Higher education institutions across the globe
Mobile Security Solution
 Provide a comprehensive multilayered security.
Mobile Security Solution
 1st Security Layer
 Unified Access Control
 Series Steel Belted Radius Servers (SRBS)
 2nd Security Layer
 Router-based security provides packet handling layer
security at the following levels:
Secure data plane
Access to Infrastructure
Network Protocols
Securing the law enforcement
Audits and session flow security
2nd Security Layer
 Secure data plane
 Anti-spoofing, IP fragment filtering, line-rate and Multi-level
Access Control Lists

Secure access into Infrastructure





Terminal Access Controller Access-Control System (TACACS)
Secure Password Authentication Protocol (Secure PAP)
RADIUS
Authentication Authorization Accounting (AAA)
Challenge-Handshake Authentication Protocol (CHAP)
2nd Security Layer
 Network Protocols
 Secure Shell (SSH)
 Secure File Transfer Protocol (FTP)
 Border Gateway Protocol (BGP)
 Session security (MD5)
 Securing the law enforcement
 Utilizing the Communications Assistance for Law
Enforcement Act (CALEA) and VLAN mirroring.
2nd Security Layer
 Security Audits
 Real-Time Active Logs and traffic flow captures.
 Session flow
 Router-based security that filters and blocks unwanted flows
or rates flow limits based on bandwidth.
 Allows for prioritization of flows across the core network.
2nd Layer Security Routers
 Juniper Networks T Series Core Routers
 E Series Broadband Service Routers
 M Series Multiservice Edge Routers
 MX Series 3D Universal Edge Routers
3rd Security Layer
 Juniper Stateful firewall
 Monitors and controls the flow of traffic
 Rule base
 Deep Inspection firewall
 Block application-level attacks before they infect the
network/ cause any damage
 Encryption of IP packets
 Integration of the Secure Socket Layer (SSL) and Transport
Layer Security (TLS)
4th Security Layer
 Occurs at the Application/Service layer
 Unusual or suspicious behavior is detected by customizable
signatures based on stateful protocol inspection, attack
patterns and behavioral learning.
 Protects over 60 protocols including VoIP over the
application/service layer against malware
penetration.
4th Security Layer
 Intrusion Detection and Prevention (IDP Series)
 Provide support to the application/service layer as they
monitor network traffic and drop traffic that may have a
malicious user
 Provides information of rogue servers or other applications,
operating systems
 Customized signatures
 Application signatures
Solution Cons
 TACACS vs. TACACS+
 Costs
 No mention of throughput provided by the Network
components
Conclusion
 Juniper Networks
 Mobile Security Solution
 Solution Layers
 Cons of Solution
References
 Alex Zinin. Protecting Internet Routing Infrastructure from Outsider DoS
Attacks. Internet Engineering Task Force. May 2005. Web. Retrieved April 6,
2012.
 F5 Networks. BIG-IP Solutions Guide, version 4.5. Mirroring Traffic to an
Inspection Device. February 27, 2010. Web. April 7, 2012.
 Juniper Networks. Juniper Networks Company Profile. Juniper Networks.
1999. Web. Retrieved April 6, 2012.
 Juniper Networks Juniper Networks Mobile Security Solution. Juniper
Networks. January 2010. Web. Retrieved April 6, 2012.
 Juniper Networks. Tackling the Top Five Network Access Control Challenges.
Netutils. January 2012. Web Retrieved April 6, 2012.
Questions
?