14
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Stack the Deck with Juniper Networks Solutions Matt Kolon VP Technical Operations APAC

Stack the Deck - JUNIPER JUNOS & CISCO IOS 互联路由 · 04.08.2008  · • JUNOS Management • STRM and new NSM Branch Connectivity • SSG, NS, M- and J-series Hi-End Security

  • Upload
    others

  • View
    11

  • Download
    0

Embed Size (px)

Citation preview

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net

Stack the Deck with Juniper Networks

Solutions

Matt KolonVP Technical Operations

APAC

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 2

Product Developments in 2008

� Network Operating System• JUNOS

� Management• STRM and new NSM

� Branch Connectivity• SSG, NS, M- and J-series

� Hi-End Security• NS family, ISG, and new platforms

� Application Acceleration• WXC and modules

� EX switching and more!

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 3

Solutions Improve Everyone’s Bottom Line

Easier to deploy and configure

Address customers’ business goals

Better insight into users’ needs

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 4

Solutions that Build Customer Confidence

� Solutions > Products• Juniper must help you more!

� Juniper has Enterprise Solutions• Vertically-Oriented Architectures• Branch, Data Center, Campus,

Extended Enterprise

� Effective Collateral for you• White papers, Application notes• Designs and Configurations• Engineered and Tested

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 5

Example #1: Unified Access Control 2.1

�Reduce operating expense• Comprehensive security• Easier deployment and operations

� Total network protection• Laptops, guests, and unmanageable devices

�Access control, visibility, and monitoring• Know who is on your network, know what they are

doing, and when they are doing it

� Juniper Solutions Mix:• IC, EX, SSG, ISG, IDP, Routers, SA

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 6

Flexible, Standards-Based Access Control

Centralized validation

Distributed enforcement

Branch Office

Campus HQ Wired/

Wireless

Internet

Data Center

UAC saves operational expense with standards-based, proven, comprehensive

Network Access Control

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 7

Example 2: Security Threat Response Mgr

� Information saves customers money• No customer knows their network well enough

� Attacks cost time and money to resolve• Difficult to analyze and understand• Complicated by complex security deployments• Huge contributors to information overload

� STRM can• Show ROI for security purchases and deployments• Allow compliance with security regulations• Update customers of their security situation regularly• Protect customers from crippling attacks

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 8

STRM Architecture

� STRM – Real time network & security visibility

� Data collection provides network, security, application, and identity awareness

� Embedded intelligence & analytics simplifies security operations

� Prioritized “offenses”separates real attacks and events from noise

� Solution enables effective Threat, Compliance & Log Management

STRM proves ROI to your customers for your solutions, and builds their trust in

you as a business partner.

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 9

Example 3: Multi-network IP Design

• Enterprises are converging to IP• They want the same benefits as

service providers

• Legacy Deployments• Expensive to build and maintain

upgrade cycle• Need expensive specialists for

Voice, Security, and Routing• Expensive due to a larger # of

physical devices to manage

• Expensive due to power and space requirements

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 10

Enterprise MPLS

� Provider MPLS• Private IP services

managed and delivered by Service Provider

� Internal MPLS Deployment• MPLS deployed and/or

managed within the enterprise

Provider MPLS Network MPLS SuperCore

Enterprise

EnterprisePrivate routing instance in Service Provider PE Router

2nd Generation Converged Enterprise Networks

Banks, Governments, and Utilities

• Anywhere Service Provider SLA’sare NOT good enough…

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 11

� Business continuity

� Disaster recovery strategies

Specific Enterprise MPLS Scenarios

� VoIP deployment [Virtualization]• Keep voice logically separated from bulk data

� Corporate M&A Strategy [Consolidation]• Speed migration of newly-acquired companies Infrastructure

� Security Zones [Virtualization]• Enterprise-wide security zones

� “Super-Core” [Transport Network]• Internally-managed core for high-value applications• Inter-DataCenter replication

• Extremely high SLA requirements

Cannot rely on provider SLAs. In-sourcing high-val ue traffic

Enterprise network managers now face many of the same challenges as traditional service providers

• Strict SLA, Network Virtualization, Departmental Charge-backs

� Cost reduction (Cap/OpEx)

� M & A assimilation

� Governance and compliance

� Green workplace strategies

� Privilege accumulation

Used to solve these issues:

Used to solve these issues:

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 12

Juniper Networks: Superior MPLS� JUNOS Operating System

• Single code-base across all routing product lines

• Same code for Enterprise and Service Provider applications

• Common MPLS Feature across routing platforms

MPLS CoreMPLS CoreLayer 3 Layer 3 VPNsVPNs

Layer 2 Layer 2 VPNsVPNs

Ethernet VPLSEthernet VPLS

Content servicesContent services

Dedicated Internet AccDedicated Internet Acc

Security servicesSecurity services

Bandwidth on demandBandwidth on demand

VoiceVoice

Channelized

FR/ATM

Ethernet

N x T1/E1, DS3/E3

SONET/SDH

M-SeriesT-Series MX-Series J-Series

Juniper MPLS gives customers control of their infrastructure and gives you the

MPLS technology advantage.

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 13

Why Juniper Solutions in 2008?

Product Momentum

New Solution Architectures for You to Use

Solutions focused on Customer Goals

Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 14Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 14