stack the deck - juniper junos & cisco ios 互联路由 · 04.08.2008 · • junos management...
TRANSCRIPT
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Stack the Deck with Juniper Networks
Solutions
Matt KolonVP Technical Operations
APAC
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 2
Product Developments in 2008
� Network Operating System• JUNOS
� Management• STRM and new NSM
� Branch Connectivity• SSG, NS, M- and J-series
� Hi-End Security• NS family, ISG, and new platforms
� Application Acceleration• WXC and modules
� EX switching and more!
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 3
Solutions Improve Everyone’s Bottom Line
Easier to deploy and configure
Address customers’ business goals
Better insight into users’ needs
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 4
Solutions that Build Customer Confidence
� Solutions > Products• Juniper must help you more!
� Juniper has Enterprise Solutions• Vertically-Oriented Architectures• Branch, Data Center, Campus,
Extended Enterprise
� Effective Collateral for you• White papers, Application notes• Designs and Configurations• Engineered and Tested
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 5
Example #1: Unified Access Control 2.1
�Reduce operating expense• Comprehensive security• Easier deployment and operations
� Total network protection• Laptops, guests, and unmanageable devices
�Access control, visibility, and monitoring• Know who is on your network, know what they are
doing, and when they are doing it
� Juniper Solutions Mix:• IC, EX, SSG, ISG, IDP, Routers, SA
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 6
Flexible, Standards-Based Access Control
Centralized validation
Distributed enforcement
Branch Office
Campus HQ Wired/
Wireless
Internet
Data Center
UAC saves operational expense with standards-based, proven, comprehensive
Network Access Control
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 7
Example 2: Security Threat Response Mgr
� Information saves customers money• No customer knows their network well enough
� Attacks cost time and money to resolve• Difficult to analyze and understand• Complicated by complex security deployments• Huge contributors to information overload
� STRM can• Show ROI for security purchases and deployments• Allow compliance with security regulations• Update customers of their security situation regularly• Protect customers from crippling attacks
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 8
STRM Architecture
� STRM – Real time network & security visibility
� Data collection provides network, security, application, and identity awareness
� Embedded intelligence & analytics simplifies security operations
� Prioritized “offenses”separates real attacks and events from noise
� Solution enables effective Threat, Compliance & Log Management
STRM proves ROI to your customers for your solutions, and builds their trust in
you as a business partner.
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 9
Example 3: Multi-network IP Design
• Enterprises are converging to IP• They want the same benefits as
service providers
• Legacy Deployments• Expensive to build and maintain
upgrade cycle• Need expensive specialists for
Voice, Security, and Routing• Expensive due to a larger # of
physical devices to manage
• Expensive due to power and space requirements
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 10
Enterprise MPLS
� Provider MPLS• Private IP services
managed and delivered by Service Provider
� Internal MPLS Deployment• MPLS deployed and/or
managed within the enterprise
Provider MPLS Network MPLS SuperCore
Enterprise
EnterprisePrivate routing instance in Service Provider PE Router
2nd Generation Converged Enterprise Networks
Banks, Governments, and Utilities
• Anywhere Service Provider SLA’sare NOT good enough…
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 11
� Business continuity
� Disaster recovery strategies
Specific Enterprise MPLS Scenarios
� VoIP deployment [Virtualization]• Keep voice logically separated from bulk data
� Corporate M&A Strategy [Consolidation]• Speed migration of newly-acquired companies Infrastructure
� Security Zones [Virtualization]• Enterprise-wide security zones
� “Super-Core” [Transport Network]• Internally-managed core for high-value applications• Inter-DataCenter replication
• Extremely high SLA requirements
Cannot rely on provider SLAs. In-sourcing high-val ue traffic
Enterprise network managers now face many of the same challenges as traditional service providers
• Strict SLA, Network Virtualization, Departmental Charge-backs
� Cost reduction (Cap/OpEx)
� M & A assimilation
� Governance and compliance
� Green workplace strategies
� Privilege accumulation
Used to solve these issues:
Used to solve these issues:
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 12
Juniper Networks: Superior MPLS� JUNOS Operating System
• Single code-base across all routing product lines
• Same code for Enterprise and Service Provider applications
• Common MPLS Feature across routing platforms
MPLS CoreMPLS CoreLayer 3 Layer 3 VPNsVPNs
Layer 2 Layer 2 VPNsVPNs
Ethernet VPLSEthernet VPLS
Content servicesContent services
Dedicated Internet AccDedicated Internet Acc
Security servicesSecurity services
Bandwidth on demandBandwidth on demand
VoiceVoice
Channelized
FR/ATM
Ethernet
N x T1/E1, DS3/E3
SONET/SDH
M-SeriesT-Series MX-Series J-Series
Juniper MPLS gives customers control of their infrastructure and gives you the
MPLS technology advantage.
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 13
Why Juniper Solutions in 2008?
Product Momentum
New Solution Architectures for You to Use
Solutions focused on Customer Goals