Juniper Networks Mobile Security Solution
Download
Report
Transcript Juniper Networks Mobile Security Solution
Juniper Networks Mobile
Security Solution
Nosipho Masilela
COSC 356
Road Map
Juniper Networks
Mobile Security Solution
Roles of the Solution Components
Solution cons
Conclusion
Juniper Networks
Networking company
Services: routing, switching security, applications
acceleration, identity policy, network control and
network management
Customers – top 130 global service providers
96 global fortune 100
Federal, state and local government agencies
Higher education institutions across the globe
Mobile Security Solution
Provide a comprehensive multilayered security.
Mobile Security Solution
1st Security Layer
Unified Access Control
Series Steel Belted Radius Servers (SRBS)
2nd Security Layer
Router-based security provides packet handling layer
security at the following levels:
Secure data plane
Access to Infrastructure
Network Protocols
Securing the law enforcement
Audits and session flow security
2nd Security Layer
Secure data plane
Anti-spoofing, IP fragment filtering, line-rate and Multi-level
Access Control Lists
Secure access into Infrastructure
Terminal Access Controller Access-Control System (TACACS)
Secure Password Authentication Protocol (Secure PAP)
RADIUS
Authentication Authorization Accounting (AAA)
Challenge-Handshake Authentication Protocol (CHAP)
2nd Security Layer
Network Protocols
Secure Shell (SSH)
Secure File Transfer Protocol (FTP)
Border Gateway Protocol (BGP)
Session security (MD5)
Securing the law enforcement
Utilizing the Communications Assistance for Law
Enforcement Act (CALEA) and VLAN mirroring.
2nd Security Layer
Security Audits
Real-Time Active Logs and traffic flow captures.
Session flow
Router-based security that filters and blocks unwanted flows
or rates flow limits based on bandwidth.
Allows for prioritization of flows across the core network.
2nd Layer Security Routers
Juniper Networks T Series Core Routers
E Series Broadband Service Routers
M Series Multiservice Edge Routers
MX Series 3D Universal Edge Routers
3rd Security Layer
Juniper Stateful firewall
Monitors and controls the flow of traffic
Rule base
Deep Inspection firewall
Block application-level attacks before they infect the
network/ cause any damage
Encryption of IP packets
Integration of the Secure Socket Layer (SSL) and Transport
Layer Security (TLS)
4th Security Layer
Occurs at the Application/Service layer
Unusual or suspicious behavior is detected by customizable
signatures based on stateful protocol inspection, attack
patterns and behavioral learning.
Protects over 60 protocols including VoIP over the
application/service layer against malware
penetration.
4th Security Layer
Intrusion Detection and Prevention (IDP Series)
Provide support to the application/service layer as they
monitor network traffic and drop traffic that may have a
malicious user
Provides information of rogue servers or other applications,
operating systems
Customized signatures
Application signatures
Solution Cons
TACACS vs. TACACS+
Costs
No mention of throughput provided by the Network
components
Conclusion
Juniper Networks
Mobile Security Solution
Solution Layers
Cons of Solution
References
Alex Zinin. Protecting Internet Routing Infrastructure from Outsider DoS
Attacks. Internet Engineering Task Force. May 2005. Web. Retrieved April 6,
2012.
F5 Networks. BIG-IP Solutions Guide, version 4.5. Mirroring Traffic to an
Inspection Device. February 27, 2010. Web. April 7, 2012.
Juniper Networks. Juniper Networks Company Profile. Juniper Networks.
1999. Web. Retrieved April 6, 2012.
Juniper Networks Juniper Networks Mobile Security Solution. Juniper
Networks. January 2010. Web. Retrieved April 6, 2012.
Juniper Networks. Tackling the Top Five Network Access Control Challenges.
Netutils. January 2012. Web Retrieved April 6, 2012.
Questions
?