Unified Access Control
12Pages

{{requestButtons}}

Catalog excerpts

Unified Access Control - 1

PRODUCT CATEGORY BROCHURE UNIFIED ACCESS CONTROL Comprehensive Network Access Control Using the Network You Have Today

Open the catalog to page 1
Unified Access Control - 2

Juniper Networks® Unified Access Control is a comprehensive access control solution that: • ranularly and dynamically controls end user access G based on user identity, device security state, and location information. • everages your existing network infrastructure—from L user authentication to access points and switches, to Juniper firewalls and IDP Series appliances—through an open, standards-based architecture. • s based on field-tested components being used I today in tens of thousands of network deployments worldwide. In today’s high-performance enterprise, the network and applications...

Open the catalog to page 2
Unified Access Control - 3

UAC: An Access Control Solution You Can Trust Juniper Networks Unified Access Control (UAC) combines the best of access control and security technologies while leveraging existing security and network infrastructure investments. UAC incorporates different levels of session-specific policy—including authentication and authorization, roles, and resource policies—to deliver extremely robust access control and security policies that are simple to deploy, maintain, and modify. All policy is created and pushed by the hardened Juniper Networks IC Series Unified Access Control Appliances, the...

Open the catalog to page 3
Unified Access Control - 4

One Network Access Control Solution for All Use Cases UAC can help you quickly and simply address a number of the use cases and challenges that confront your organization today: • Guest Access – Most organizations demand instant, differentiated access for guest users—which can include partners, contractors, customers, or essentially any user other than an employee. This presents organizations with a unique set of challenges. UAC delivers several different ways to accommodate guest users, depending on your network configuration. If you are using 802.1X infrastructure for enforcement, it’s...

Open the catalog to page 4
Unified Access Control - 5

The IC Series UAC Appliances adopt and leverage the TNC’s Interface for Metadata Access Point (IF-MAP) open, standards-based protocol, integrating UAC with vendoragnostic third-party network and security devices, including devices that collect information about what’s happening with your network and applications, and their state. The collected data is reported back to an IC Series appliance, which can serve as a Metadata Access Point (MAP) server, allowing the captured network state data to be leveraged by UAC as it formulates dynamic network and application access control policies and...

Open the catalog to page 5
Unified Access Control - 6

Juniper Networks UAC Components IC4500 UAC incorporates three primary elements that are the result of Juniper’s real-world experience in the access control and security areas as well as authentication. These elements include: The IC Series Unified Access Control Appliances The IC Series UAC Appliances are UAC’s centralized policy management engine optimized IC6500/6500 FIPS for LAN access control. The IC Series can dynamically deliver, install, and upgrade the UAC Agent or Junos Pulse on the endpoint device. The IC Series also collects user authentication (integrating with your existing AAA...

Open the catalog to page 6
Unified Access Control - 7

Appliances, delivering dynamic, granular identity- and role-based network access control. You will be able to select a dynamic download of Junos Pulse or the UAC Agent from your IC Series appliance. Junos Pulse operates like the UAC Agent. Easy to deploy and manage with virtual plug-and-play connectivity, Junos Pulse enables safe, protected cloud and network access for a diverse user audience over a variety of devices. Junos Pulse leverages the existing 802.1X supplicant native to Microsoft Windows 7, Windows Vista and Windows XP to deliver Layer 2 access control. And, just like the UAC...

Open the catalog to page 7
Unified Access Control - 8

UAC’s Layer 3-7 enforcement is delivered through any Juniper Networks firewall/ VPN platform, including the ISG Series Integrated Security Gateways, the SSG Series Secure Services Gateways, and the SRX Series Services Gateways. Juniper Networks J Series Services Routers may also serve as Layer 3 UAC enforcers, providing Source IP enforcement. Some Juniper Networks firewalls also support UTM capabilities—including Juniper Networks IDP functionality, as well as network-based antivirus, antispam, antiadware, antiphishing, and Web filtering capabilities—which can be dynamically leveraged as...

Open the catalog to page 8
Unified Access Control - 9

Change Your Access Control, Not Your Network Juniper Networks realizes that the enterprise network is never static. An access control solution must be granular enough to provide the controls needed, but flexible enough to accommodate changing infrastructure and deployments. In addition, the purpose of access control itself can change. As an example, UAC might initially be deployed to provide an additional layer of access control for your wireless LAN (WLAN) but over time might be used to check the endpoint security state of devices attempting to access the wired network to ensure compliance...

Open the catalog to page 9
Unified Access Control - 10

JUNIPER NETWORKS service and support Another dilemma for organizations deploying a NAC solution is the creation, management, and provisioning of security and access policies. Centralized access policy management is achieved when UAC is deployed with Juniper Networks Network and Security Manager Juniper Networks is the leader in (NSM) and SA Series SSL VPN Appliances. Common configuration templates can be performance-enabling services created and shared between SA Series appliances for remote access control and IC Series and support, which are designed to appliances for local or LAN-based...

Open the catalog to page 10
Unified Access Control - 11

About Juniper Networks Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. The company serves customers and partners worldwide. Additional information can be found at www.juniper.net.

Open the catalog to page 11
Unified Access Control - 12

Corporate and Sales Headquarters Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA Phone: 888.JUNIPER (888.586.4737) or 408.745.2000 Fax: 408.745.2100 www.juniper.net APAC Headquarters Juniper Networks (Hong Kong) 26/F, Cityplaza One 1111 King’s Road Taikoo Shing, Hong Kong Phone: 852.2332.3636 Fax: 852.2574.7803 EMEA Headquarters Juniper Networks Ireland Airside Business Park Swords, County Dublin, Ireland Phone: 35.31.8903.600 EMEA Sales: 00800.4586.4737 Fax: 35.31.8903.601 Copyright 2012 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper...

Open the catalog to page 12

All Juniper Networks catalogs and technical brochures

  1. QFX5200 SWITCH

    13 Pages

  2. AP550

    2 Pages

  3. AP250

    2 Pages

  4. AP150W

    2 Pages

  5. AP245X

    2 Pages

  6. PTX1000

    4 Pages

  7. SRX300

    6 Pages

  8. SRX1500

    4 Pages

  9. SRX4000

    5 Pages

  10. JSA7500

    8 Pages

  11. ISG Series

    11 Pages

  12. vSRX

    6 Pages

  13. ACX500

    7 Pages

  14. QFX3500 Switch

    12 Pages

  15. QFX3600 Switch

    12 Pages

  16. QFabric System

    12 Pages

  17. DDoS Secure

    4 Pages

  18. 1100018

    6 Pages

  19. 1000195

    6 Pages

  20. 1000300

    4 Pages

  21. backgrounder

    4 Pages

  22. VXA Series

    4 Pages