Upload
hakhuong
View
229
Download
5
Embed Size (px)
Citation preview
1Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Escalating Networking Demands
The Era of the Individual
Internet Users
Source: "The World Fact Book”, US Central Intelligence Agency, 2007
Social Networking
Source: “Myspace Usage Statistics”, Trendcatching, 2006, “FacebookMember Stats”, Travels with my Overnight Bag, 2007
Internet Devices
Source: “The Internet Singularity, Dellayed” Nemertes Research, 2007
YouTube
Source: Lee Gomes, The Wall Street Journal, 2006
2Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
High-Performance DNA
Power, Cooling, Space
Silicon Design
Security
Real-time Embedded Software
Routing Protocols
1996 200820051999 2002Time
Revenue
$2B
$3B
$1B
System Design
3Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Leader in High-Performance Networking
Well Well PositionedPositionedto Executeto Execute
FAST RELIABLE SECURE
HighHigh--Performance Performance NetworkingNetworking
Operational Excellence
$1.75B Cash and Investments
5,600+
$500M
Dedicated Employees
Annual R&D Engine
4Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Infrastrutture di reti IP per far convergereprestazioni, sicurezza e innovazione
“Enterprise Nervous System (ENS)”
“Enterprise Commerce Management (ECM)”
“Inter-Business Network (IBN)”
“Adaptive Infrastructure”
“X Internet”“eBusinessPlatform”
Services
Infrastructure
Management
Policy
Control
IC
SSG
Applications world:ERP, CRM, SFA, Industry specific
Applications world:ERP, CRM, SFA, Industry specific
• EAI & B2Bi• BPM & Work flow• Portals
• Search• Knowledge Management• Data-marts
SCMContent Mgmt.Bus. AnalyticsOther
Functionality?
The Juniper
product set is well
positioned in several
categories, notably
security, at a point
solution level.
5Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Piattaforme per Imprese e Operatori
Purpose-built platforms delivering performance, stability and control
Inside Enterprise
Extended Enterprise
Core AccessNetwork
Carrier Edge
WANGateway
Department Servers
Finance
HR
Sales
BusinessPartners
Day Extenders
Mobile Workers
Customers
BranchOffices
Fixed Telecommuters
DMZ
Distributed EnterpriseData Center
Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 6
Opportunita’
Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 7
SSG
8Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
SSG Product Family FitPerformance
� Improved performance & processing
� Wider range of platforms with UTM
� Modular (Expandable) Memory
� Improved connectivity
Micro BranchRetail
Ent Class Teleworker
Small BranchSmall Office
Regional BranchSME
Regional BranchMedium EnterpriseCentral Site
9Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
3.65
4.12
4.294.35
3.20
3.40
3.60
3.80
4.00
4.20
4.40
Billio
n $
CY06 CY07 CY08 CY09
Integrated Security Appliance and Software VPN and
firewall
Source: Infonetics Research, VPN & Firewall Products Quarterly Market Share Report 2006
Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 10
SSL
11Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
IPSec VPN for the Distributed EnterpriseSSL VPN for the Extended Enterprise
Remote OfficeBranch Office
Fixed telecommuters
Business Partners
HQ
MobileUsers
Business Partners
Department Servers DMZ-1
Finance
HR
Sales
Managed, TrustedRemote Network Security
IP to IP controlControl Requirement
Network AccessAccess Requirement
IPSec VPNVPN Type
FixedType of Connection
Remote, Branch Office
Telecommuter
Partner Network Connect
Application Type
UnManaged, UnTrustedRemote Network Security
User to Application controlControl Requirement
Per Application Access Access Requirement
SSL VPNVPN Type
Mobile or FixedType of Connection
Mobile User
Partner ExtranetApplication Type
12Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Password with min length
Password
ProspectCustomer
WhitepaperSiebel from 9AM-5PM
customers.company.com
Dual factor (token, passkey)
Password
FT employee Contractor
Intranet Outlook
Files
Specific files if host check
passes
employees.company.com
MRP +PricingMRP
Gold PartnerSilver Partner
Dual factor (token, passkey)
Password
partners.company.com
employee customerpartner
Dynamic Authentication Determines What can be accessed
ResourcesAllowed
Role
DynamicAuthentication
Step 3b: Control Experience – Multiple URLDifferentiated Access Per User Group
Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 13
Wan Acceleration
14Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
WAN Acceleration
14Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Speed response times
• 5x to 10x average• 100x peak (Exchange, file services)
Assure application delivery Provide full visibility
Reduce WAN bandwidth
• QoS, bandwidth allocation, Multipath
• 60% to 70% average reduction• 98% peak reduction
•Reporting on apps, WAN
Simplify branch architecture
• Fewer devices• Automated deployment
15Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Risultati in Campo: Roma – Milano
Summary
Peak Data Reduction 89.17 %
Total Data Reduction 68.16 %
Effective WAN Capacity 3.141 X
Total Bytes Into Reduction 14,041.502 MB
Total Bytes Out of Reduction 4,471.044 MB
Total Bytes Passed Through 1397.11 MB
Percentage Reduction
0
10
20
30
40
50
60
70
80
90
100
Sun Mon Tue Wed Thu Fri Sat
w eekdays
% r
eductio
n
Peak Reduction Reduction
Application Summary
HTTP
Others
CIFS
Exchange
LDAP
Kerberos
DNS
ICMP
FTP
Remaining Applications
Application by Traffic Volume
0
0.5
1
1.5
2
2.5
3
Sun Mon Tue Wed Thu Fri Sat
w eekdays
Gb
HTTP
Others
CIFS
Exchange
LDAP
Kerberos
DNS
ICMP
FTP
Remaining Applications
Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 16
Da ieri:Switch!
17Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
UnifiedManagement
Up to 65% Less Power
Up to 80% Space Savings
99.999%Availability
Collapse Layers
Standards-basedAccess Control
One Release Train
ApplicationVisibility
Building High-Performance Networks with EX-series Switches
17Copyright © 2008 Juniper Networks, Inc. www.juniper.net
18Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
High-Performance on the Inside Too!
18
8.58.5 9.09.0 9.19.1
4Q07 1Q08 2Q08
Simpler
Predictable
Reliable
Copyright © 2008 Juniper Networks, Inc. www.juniper.net
19Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Quadranti Magici di GartnerJuniper, il leader in tutte le categorie
FW/VPN SSL VPN
IPS
IPSec
WOC