2-04 Security Products and Solutions by Stephen Philip Juniper

Download Report

Transcript 2-04 Security Products and Solutions by Stephen Philip Juniper

Juniper Security
Products and Solutions
Overview
Stephen Philip
Senior Director - Product Marketing
Security Products Group
Copyright©©2005
2003
Juniper
Networks,
Copyright
Juniper
Networks,
Inc. Inc.
Proprietaryand
and
Confidential
Proprietary
Confidential
www.juniper.net
www.juniper.net
11
Agenda
 Juniper leadership in Security
 Juniper Product Portfolio
 Juniper Solutions by Location
•
•
•
•
•
Campus
WAN GW
Data Center
Distributed Organization
Extended Organization
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
2
2
Juniper Leadership in Security
 # 2 in Network Security
• Passed Check Point in Q2
Recognized as leader by our Customers
U.S. Department of
Labor
 #1 in High End FW/VPN
 #1 in SSL VPN
 Growing faster than inline
IPS market
Source Infonetics Q2-2006
Recognized as leader by Gartner
Recognized as leader by Press
Juniper in the
Leadership quadrant for:
• Firewall
• IPSec VPN
• SSL VPN
• IPS
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
3
3
Proven, Best-in-Class Innovation
Policy,
Control &
Visibility
Routing
Application
Security/VPN Secure
WAN
Access Optimization Front End
UAC
AAA
NSM
OAC
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
4
4
Evolving Challenges and Requirements
Organization
Organization
Campus
Need a secure and resilient infrastructure able to deliver differentiated
applications and services across the network
• Single IP infrastructure – demanding applications require network performance
• Virtual Organizations - dynamic perimeters, different users, devices, locations and trust levels
• Elevated threat environment – application level attacks and worm propagation
• Regulatory compliance (now global) – granular access controls and auditing
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
5
5
Solutions for the Extended Organization
Assessment & Containment
•
Native checks
•
Client/Server APIs
•
Remediation
•
Cache Cleaner
•
Virtual Environments
•
Connection Control
 Extended Organization Challenges
1.Endpoint
Assessment &
Authentication
2. Trusted Xport
(IPSec or SSL)
Deliver applications securely and
appropriately to employees, contractors,
partners, suppliers anywhere, anytime
Provision and manage 1000s of endpoints
Handle non-owned devices and networks
IP Network
3. Authorize,
Enforce & Log
RA or
Extranet
DMZ
Data
Center
 Extended Organization Solutions
Client-less model reduces mgmt overhead
SSL VPN per user, per application controls
Endpoint integrity, quarantine, remediation
Application Acceleration (AFE) improves
download times & availability
U.S. Department of
Labor
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
6
6
Juniper’s Coordinated Threat Control
Business
Partner
SA identifies
user & takes
action on user
session
Self-registration
technology for easy
configuration
Signal
IDP detects
threat and
signals SA
LAN
Telecommuter
Correlated Threat
Information
Coordinated IdentityBased Threat Response
Comprehensive Threat
Detection and Prevention
 Identity
 Manual or automatic response
 Endpoint
 Access history
 Multiple response options:
terminate, disable, or
quarantine user
 Ability to detect and prevent
malicious traffic
 Detailed traffic & threat
information
 Supplements IDP’s threat
prevention
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
 Full layer 2-7 visibility into all
traffic
 Proven, market leading
technology
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
7
7
Solutions for the Campus
 Campus Challenges
Internet
Campus #1
Campus #2
Protect against outside/inside threats
Segment resources, users, departments
Provide secure WLAN access
Scaling across large or multiple campuses
 Campus Solutions
Departments
Departments
Department & Virtual firewalls protect
departmental resources
Intrusion Prevention mitigate and
contains threats
802.1X & SSL VPN secured WLAN
Large L3 Routed Campuses
Unified access control solution

Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
Infranet Controller, Agent and Enforcer
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
8
8
Unified Access Control Overview
Central Policy Manager
AAA
AAA Servers
Identity Stores
User access to
protected resources
Dynamic Role
Provisioning
Endpoint
profiling, user
auth, endpoint
policy
Protected
Resource
Firewall
Enforcers
802.1X
User admission to
network resources
Agent
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
9
9
Unified Access Control Overview
Central Policy Manager
with SBR
AAA
AAA Servers
Identity Stores
User access to
protected resources
Dynamic Role
Provisioning
Firewall
Enforcers
Endpoint
profiling, user
auth, endpoint
policy
Agent
Protected
Resource
802.1X
User admission to
network resources
with OAC
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
10
10
Introducing UAC 2.0
Central Policy Manager
with SBR
AAA
AAA Servers
Identity Stores
User access to
protected resources
Dynamic Role
Provisioning
Endpoint
profiling, user
auth, endpoint
policy
Agent
with OAC
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
802.1X
Firewall
Enforcers
User admission to
network resources
Protected
Resource
 UAC 2.0 interoperates with
any 802.1X infrastructure
wired or wireless
 UAC 2.0 is TNC compliant
for truly open architecture
 Access control for guests,
contractors and employees
 UAC 2.0 can be deployed via:
• 802.1X only
• Overlay w/firewall only
• Both, for maximum
granularity
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
11
11
Solutions for the Data Center
Internet
 Data Center Challenges
Secure Access (SSL)
High performance
Routing
Integrated
IPS/FW/VPN
Protect data, servers, infrastructure
Maximize performance, availability, resiliency
Consolidate and simplify architecture
Terminate 1000s of VPN connections
WAN Optimization
AFE Application
Acceleration
 Data Center Solutions
SLB
Cache
Web
Acc
SSL
O/L
Web Servers
App Servers
Data Bases
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
High performance edge service routers provide
10x over competing solutions
High performance firewall/VPN/security gateway
Intrusion Prevention mitigates threats
SSL for secure access
AFE accelerate applications to users
WAN Optimizer accelerate applications to sites
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
12
12
How the WAN slows applications
Accelerating Applications over the WAN
Manageability
Application
Contention
SAP
Limited
Bandwidth
Oracle
Web
The WAN Pipe
VoIP
Latency
Compression,
Caching
More rich content
Protocol
Acceleration
chattiness
Lower-priority apps
Application Control
slow down critical ones
Visibility
and Reporting
Inability to understand
application
and WAN performance
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
13
13
Solutions for the WAN Gateway
 WAN Gateway Challenges
IP Network
DMZ
VoIP
DMZ
Maximize availability, resiliency, quality
Protect public facing servers and infrastructure
Optimal support for broad mix of app & traffic
Massive # VPN Connections or Large BW single
tunnels
 WAN Gateway Solutions
RA or
Extranet DMZ
Campus
Data
Center
High performance Enteprise routers
provide 10x over competing solutions
MPLS for improved quality and traffic engineering
High performance firewall/VPN, security gateway
Intrusion Prevention mitigates threats
SSL VPN Gateway for secure access
WAN Optimization to remote locations
City of Burbank
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
14
14
WAN Gateway Requirements
VPN DMZ
Partner DMZ
Ave Packet
Size
FTP
RADIUS
Web
SSL
Latency &
Sensitivity
SSL
Internet
Value & Number
of Connections
Application
Awareness /
Protection
DMZ
•
•
•
•
Provide high performance for large and small packet traffic mix
Make traffic decisions with low latency to ensure applications are not affected
Handle traffic load, complexity & availability requirements as # & value of connections increase
Understand application requirements and prevent/mitigate application-level attacks
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
15
15
Juniper Networks ISG Ground-up Design
ISG 1000
ISG 2000
Dual 1GHz PowerPC CPU
2 GB RAM
Dual 1GHz PowerPC CPU
2 GB RAM, FPGA
Dual 1GHz PowerPC CPU
2 GB RAM, FPGA
Dual 1GHz PowerPC CPU
2 GB RAM, FPGA
GigaScreen3 ASIC, 1 GB RAM
Programmable Processors
I/O
I/O
I/O
Network Traffic
I/O
Dual 1GHz PowerPC CPU
2 GB RAM
Management Module
1
2
3
Security Modules
(for IPS)
ASIC Module
I/O Modules
1
Dual 1GHz PowerPC CPU
2 GB RAM, FPGA
2
Dual 1GHz PowerPC CPU
2 GB RAM, FPGA
GigaScreen3 ASIC, 1 GB RAM
Programmable Processors
Fixed I/O
I/O
Network Traffic
Processing power unmatched by any competitive offering
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
16
16
Solutions for the Distributed Organization
Remote Campus
w Split Tunnel
 Distributed Organization Challenges
Retail Office
(1000s) WiFi Access
Internet
Small Branch
(1000s) w Split
Tunnels
Back-hauled
Branch
IP/MPLS
Network
Regional
Office
Regional
Office
Protect data, servers, infrastructure
Improve application performance
Maximize availability, resiliency
Simplify architecture, management
 Distributed Organization Solutions
Intrusion Prevention mitigates threats
Dedicated & multi-function firewalls
WAN Optimization for branch offices
Resilient, secure VPN to branch offices
MPLS VPN for QoS and traffic
engineering to regional offices
HQ
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
17
17
Best in Class Security – Secure Services Gateway
New Secure Services Gateway Models
 Advanced Security - Integrated Branch Routing and WAN interfaces
• FW, VPN , AV (including - phishing, - spyware) & Anti SPAM
• ADSL2+, T1, E1, ISDN BRI S/T, V.92, Gig E

SSG 5 - Six fixed form factor models
•
7 Fast Ethernet + 1 WAN interface
•
•
•

160 Mbps FW / 40 Mbps VPN
SSG 20 – 2 modular models
•
5 Fast Ethernet + 2 Mini I/O slots
•
•
•

SSG 250
HA
STATUS ALARM
1
3
2
4
PIM 1
PIM 3
PIM 2
PIM 4
RESET
USB
CONSOLE
Juniper Networks
Model #
AUX
0/2
0/1
LINK
TX/RX
LINK
TX/RX
0/4
0/3
LINK
TX/RX
TX/RX
LINK
10/100
0/6
0/5
LINK
TX/RX
LINK
TX/RX
0/8
0/7
LINK
TX/RX
LINK
TX/RX
TX/RX
LINK
10/100/1000
O
M
W
2
1
F
T
L
S
P
E
H
U
N
R
-IA
/100
/RX
1
2
3
4
–TX
2
LINK
MODEM
CONSOLE
0
COMPACT
NetScreen
5
FLASH
•
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
160 Mbps FW / 40 Mbps VPN
8 FE and 2 GE Interfaces
4 WAN PIM slots
•
•
Serial #

Mini PIM options include ADSL2+, T1, E1, ISDN BRI S/T,
V.92 at FCS
Dual radio 802.11a + 802.11 b/g variant
SSG 140
•
•
0/9
LINK
I
O
0/0
TX/RX
POWER
ISDN BRI S/T, V.92, Serial
Dual radio 802.11a + 802.11 b/g variants of each
Standard J Series WAN interfaces
ISDN, Dual E1 and Dual T1
350 Mbps FW / 100 Mbps VPN
SSG 550/520
•
4 on-board 10/100/1000 ports
•
6 WAN/LAN I/O expansion slots
•
Up to 1 Gbps FW/NAT / 500Mbps IPSec / 500 Mbps IPS (DI)
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
18
18
Deploy Once – Add Services later
 Firewall Service
 Access Routing & VPN
Service
 Choose WAN connection &
Deploy Device
Base System Cost + WAN I/F
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
19
19
Deploy Once – Add Services later
Additional license cost
 Spam (Symantec)
 AV Service (Kaspersky)
 Web Filtering Service
(SurfControl)
 IPS Service
 Firewall Service
 Access Routing & VPN
Service
 Choose WAN connection &
Deploy Device
Base System Cost + WAN I/F
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
20
20
Deploy Once – Add Services later
Additional license cost
 Spam (Symantec)
 AV Service (Kaspersky)
 Web Filtering Service
(SurfControl)
Additional HW
Requirements = None
 IPS Service
 Firewall Service
 Access Routing & VPN
Service
 Choose WAN connection &
Deploy Device
Base System Cost + WAN I/F
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
21
21
Centralized Management
 Centralized control over
Integrated Security Devices
• Remote Management
• Secure remote management of
firewall, VPN, content security, and
routing across all devices from one
location
Network
Security
Operations
• Role-based administration
• Delegate administrative access to key
support people with Assign specific
tasks to specific individuals
• Centralized activation/deactivation of
security features
• Application attack protection, Web
usage control, Payload attack
protection, Spam Control
Copyright
2003
Juniper
Networks,
Copyright ©©2005
Juniper
Networks,
Inc. Inc.
Proprietary
and
Confidential
Proprietary and
Confidential
www.juniper.net
www.juniper.net
22
22
Thanks
Copyright©©2005
2003
Juniper
Networks,
Copyright
Juniper
Networks,
Inc. Inc.
Proprietaryand
and
Confidential
Proprietary
Confidential
www.juniper.net
www.juniper.net
23
23