Click here to load reader

Juniper Networks - Pod Lupou - Arrow FILE/Ju · PDF fileJuniper Networks - Pod Lupou

  • View
    217

  • Download
    0

Embed Size (px)

Text of Juniper Networks - Pod Lupou - Arrow FILE/Ju · PDF fileJuniper Networks - Pod Lupou

  • Copyright 2003 Juniper Networks, Inc. www.juniper.net 1

    Konsolidace systKonsolidace systmm je jasnm trendemje jasnm trendem...pod lupou Juniper Networks...pod lupou Juniper Networks

    Ale PopelkaBDM Juniper Networks

    [email protected]

    Bratislava, 3.10.2006

  • 2Copyright 2003 Juniper Networks, Inc. www.juniper.net

    AGENDA

    Juniper Networks, Juniper Networks, PortfolioPortfolioIntroducing the SSG Introducing the SSG SerieSerieJunosJunosIntroducing the J4350 & J6350Introducing the J4350 & J6350IntroducingIntroducing thethe MM--SerieSerie

  • 3Copyright 2003 Juniper Networks, Inc. www.juniper.net

    Juniper Networks

    Consistent revenue growth $2.1B in 2005, up 54% from 2004

    Net Qtly Revenues - $567m in Q1 26% increase Y:Y

    4,164 employees worldwide> 70 countriesStrong cash position Cash and Investments = $2bn

    $2BN company in $20BN market

    Americas

    APAC

    EMEA

    Americas

    EMEA

    APAC

    Geographic Diversification

  • 4Copyright 2003 Juniper Networks, Inc. www.juniper.net

    EMEA Q4 2005 Service Provider Routing Market Share (non MS-WAN)

    Source: Canalys

    40%

    31%

    21%8%

    Juniper CiscoAlcatelOthers

    Best in Class Technology - SP

    Winning in Service Providers

  • 5Copyright 2003 Juniper Networks, Inc. www.juniper.net

    Market Share*1 in SSL VPN1 in High-end Firewall2 in High-end Enterprise Routing2 in WAN Acceleration

    Gartner Leadership QuadrantFirewall VPNSSLIntrusion Prevention SystemsApplication Acceleration

    Best in Class Technology - Enterprise

    * Source: Synergy IDC and Infonetics

  • 6Copyright 2003 Juniper Networks, Inc. www.juniper.net

    Ochrana perimetruRouter/Firewall/IPSecVPN

    NetScreenNetworking, RoutingJ-Serie/M-SerieE-Serie/T-Serie

    Secure Access SA-SSL VPN

    Sercure MeetingAplikanAkcelertory- Datacenter DX

    VoIP Session Border Controller

    Inside LAN IPSNetScreen IDP

    Secure

    Assured

    AAA/802.1x Funk SoftwareOdyssey

    Unified Access ControlInfranet Controler

    System Solutions - Overview

    - WAN WX/WXC

  • 7Copyright 2003 Juniper Networks, Inc. www.juniper.net

    AGENDA

    Juniper Networks, Juniper Networks, PortfolioPortfolioIntroducing the SSG Introducing the SSG SerieSerieIntroducing the J4350 & J6350Introducing the J4350 & J6350IntroducingIntroducing thethe MM--SerieSerie

  • 8Copyright 2003 Juniper Networks, Inc. www.juniper.net

    Requirements Multifunction Security Services

    Advanced Content Security LAN Segmentation

    Small Packet Performance High Speed Encryption

    Next Gen WAN Support Central/Delegated Management

    Regional & Branch Office Solution Alternatives

    Security

    Routing

    Security Appliances CP/Nokia, Cisco,

    Juniper

    Routers Cisco, Nortel,

    Juniper

    Internet Bandwidth

    Segmentation

    Juniper Networks Secure Services Gateway

    (SSG)

  • 9Copyright 2003 Juniper Networks, Inc. www.juniper.net

    Secure Service Gateway FamilySecurity Services Gateway (SSG) family integrates proven security and WAN connectivity to deliver secured and assured networking

    New levels of price/performance and I/O flexibility Combines best-in-class security and WAN connectivity

    SSG 5 - Six fixed form factor models 160 Mbps FW / 40 Mbps VPN

    SSG 20 2 modular models 160 Mbps FW / 40 Mbps VPN

    SSG 140 350+ Mbps FW / 100 Mbps VPN 8 FE and 2 GE Interfaces + 4 WAN PIM slots

    SSG 520 650+ Mbps FW / 300 Mbps VPN

    SSG 550 1+ Gbps FW / 500 Mbps VPN

  • 10Copyright 2003 Juniper Networks, Inc. www.juniper.net

    Juniper Networks SSG 140 Ideal CPE for Larger Branch Offices, Medium Businesses

    Key Features Proven all-in-one security solution

    (UTM) (4) WAN I/O expansion slots

    2xT1, 2xE1, 2xSerial, 1xISDN BRI S/T

    Dynamic routing OSPF, BGP, RIPv1/2, virtual routers

    WAN Encapsulations PPP, MLPPP, FR, MLFR, HDLC

    Key Differentiators Best-in-class threat management

    solution (UTM) Kaspersky - Antivirus, Anti-

    Spyware Anti-Phishing Symantec Anti-spam SurfControl - Web filtering

    Performance, security, connectivity options in a single solution

    Only system in its class with GE Highest I/O density in its class

    Juniper Networks SSG 140 350 Mbps FW / 100 Mbps VPN (8) 10/100 interfaces + (2)

    10/100/1000 (4) PIM expansion slots for I/O

    connectivity

    FrontView

    BackView

  • 11Copyright 2003 Juniper Networks, Inc. www.juniper.net

    WAN Connectivity Serial, T1/E1, DS3

    WAN ConnectivitySerial, T1/E1, DS3

    WAN Connectivity Serial, T1/E1, DS3

    WAN Connectivity Serial, T1/E1, DS3

    LAN or WAN Connectivity 10/100/1000, SFP, FE

    Serial, T1/E1, DS3

    LAN or WAN Connectivity 10/100/1000, SFP, FE

    Serial, T1/E1, DS3

    (4) Fixed 10/100/1000 interfacesRJ45 Console & Aux Interface

    (4) Fixed 10/100/1000 interfacesRJ45 Console & Aux Interface

    LAN or WAN Connectivity 10/100/1000, SFP, FE

    Serial, T1/E1, DS3

    LAN or WAN Connectivity 10/100/1000, SFP, FE

    Serial, T1/E1, DS3

    LAN or WAN Connectivity 10/100/1000, SFP, FE

    Serial, T1/E1, DS3

    LAN or WAN Connectivity 10/100/1000, SFP, FE

    Serial, T1/E1, DS3

    WAN ConnectivitySerial, T1/E1, DS3

    WAN Connectivity Serial, T1/E1, DS3

    1 Gbps FW @ 600K pps, 500 Mbps VPN500 Mbps Intrusion Prevention (DI)Dual power supplies, DC optional, NEBS optional128K sessions, 1,000 VPN tunnels

    SSG 550

    600Mbps FW @ 300K pps, 300 Mbps VPN300 Mbps Intrusion Prevention (DI)DC optional64K sessions, 500 VPN tunnels

    SSG 520

    Secure Services Gateway 500 Series Interface Support

  • 12Copyright 2003 Juniper Networks, Inc. www.juniper.net

    Content Inspection/Security Stop Common and Emerging Threats

    Inbound Threats Outbound Threats

    Web Filtering

    Spyware Site AccessPhishing Site Accesswww..com

    Web Filtering

    Viruses, file-based TrojansSpyware/Adware, Keyloggers Viruses, file-based TrojansAV AV

    Spam / PhishingAnti Spam

    Anti Spam

    Worms, TrojansWorms, Trojans, DoS(L4 & L7), Recon, ScansIPS/DI IPS/DI

    Stateful Firewall

  • 13Copyright 2003 Juniper Networks, Inc. www.juniper.net

    Multiple Admins, Different Privileges: Domain Control

    Regional Office Headquarters

    Domain hierarchy separates data: Assign domain-specific permissions Allow administrators to manage their own data

    Security AdminNetwork AdminOps TechnicianAudit Team

    OS upgrade Device config

    changes

    VPN model Adjust routing

    Signature updates Policy adjustment

    Upgrade, Adjust

    HW monitoring (interfaces up/down, fan failure, power failure)

    Interface characteristics

    Management access

    Licenses OS version

    Remote installation

    Initial configuration

    Device

    VPN monitoring Network failure

    recognition and response

    HA failover monitoring

    VPN config Route tables Routing VLAN

    VPN modeling L2/L3

    specification (Routing)

    Network

    Attack log monitoring

    Consolidation Top attacks report Log Investigation Reports

    Push device -specific policy out

    RAS user management

    Admin management

    Define security of entire network (all devices)

    Permission definitions

    Security

    Monitor, MaintainConfigureDesign, Deploy

    OS upgrade Device config

    changes

    VPN model Adjust routing

    Signature updates Policy adjustment

    Upgrade, Adjust

    HW monitoring (interfaces up/down, fan failure, power failure)

    Interface characteristics

    Management access

    Licenses OS version

    Remote installation

    Initial configuration

    Device

    VPN monitoring Network failure

    recognition and response

    HA failover monitoring

    VPN config Route tables Routing VLAN

    VPN modeling L2/L3

    specification (Routing)

    Network

    Attack log monitoring

    Consolidation Top attacks report Log Investigation Reports

    Push device -specific policy out

    User management

    Admin management

    Define security of entire network (all devices)

    Permission definitions

    Security

    Monitor, MaintainConfigureDesign, Deploy

    Device Lifecycle

    Man

    agem

    ent

    Leve

    l

    OS upgrade Device config

    changes

    VPN model Adjust routing

    Signature updates Policy adjustment

    Upgrade, Adjust

    HW monitoring (interfaces up/down, fan failure, power failure)

    Interface characteristics

    Management access

    Licenses OS version

    Remote installation

    Initial configuration

    Device

    VPN monitoring Network failure

    recognition and response

    HA failover monitoring

    VPN config Route tables Routing VLAN

    VPN modeling L2/L3

    specification (Routing)

    Network

    Attack log monitoring

    Consolidation Top attacks report Log Investigation Reports

    Push device -specific policy out

    RAS user management

    Admin management

    Define security of entire network (all devices)

    Permission definitions

    Security

    Monitor, MaintainConfigureDesign, Deploy

    OS upgrade Device config

    changes

    VPN model Adjust routing

    Signature updates Policy adjustment

    Upgrade, Adjust

    HW monitoring (interfaces up/down, fan failure, power failure)

    Interface characteristics

    Management access

    Licenses OS version

    Remote installation

    Initial confi

Search related