5 The Secure Access Platform in the Network CorporateLANTelecommutersSales &ServiceMobileEmployeesDirectoryStorePartner AServerFarmsIntranet /Web ServerExtranetPartnersUnix/NFSPartner B= Encrypted External Session= Standard Internal SessionMRP/ERP
6 IPSec VPN vs SSL VPN Application Type Remote, Branch Office Internet KioskMobile UsersBranch OfficeBusiness Partners, Customers, ContractorsRemote OfficeHQTelecommutersApplication TypeRemote, Branch OfficeSite to siteApplication TypeMobile UserPartner ExtranetCustomer ExtranetContractor, offshore employeeTelecommuter/day extenderType of ConnectionFixedType of ConnectionMobile or FixedRemote Network SecurityManaged, TrustedRemote Network SecurityManaged or Unmanaged, Trusted or Untrusted
7 SSL VPN Value Proposition The Juniper Networks Secure Access SSL VPN platforms deliver instant, secure access to users while significantly reducing total cost of ownership (TCO)Proof Points:Clientless Deployment: Minimal Cap Ex, Deployment, Configuration or Support Overhead; Requires No Changes to LAN/Server ResourceApplication-Layer Security: Controls access to only the application resource, not to native networkUser Flexibility/Enterprise Productivity: Delivers secure access to users from just a Web browserExternal UsersLANResources
9 Network Connect Adaptive, Dual Transport Network Access Solution High PerformanceTransport ModeHigh PerformanceTransport ModeXHigh AvailabilityTransport ModeDYNAMIC DUAL TRANSPORT NETWORK ACCESSAdaptive, Dual Transport ModeInitially attempts to set up high performance, IPSec-like transportIf unsupported by network, seamlessly fails over to SSLCross Platform Dynamic DownloadGINA IntegrationLogging, Auditing and DiagnosticsEndpoint Assessment & Containment Integration
10 Challenges Addressing Threat Control Business PartnerIntermediated trafficIPSLANTunneled trafficTelecommuterNo User Identity InformationNo way to identify user with intermediated trafficTime-consuming to identify user with tunneled trafficIdentifying user is critical to mitigating impact of security threatsNo Identity-Based Coordinated Threat ResponseNo ability to respond to source of threat because don’t know who user isNo ability to automatically coordinate responses in both IPS and SSL VPN
Your consent to our cookies if you continue to use this website.