SlideShare a Scribd company logo
Overview: Juniper SSL VPNStrategy, Architecture and Introduction
Technical OverviewFeaturesExtranet style web interface access to resourcesFull/split tunnel capabilities with Network ConnectMobile ready with Junos PulseNo client installation requiredGranular Authentication, Authorization and Auditing capabilitiesSecure Meeting Space
Basic ConceptsJuniper model for secure remote access is granular allowing each component to be administered en masse or individuallyRealms -> Users ->  Roles -> ResourcesRealms: Groupings of authentication resources (RADIUS, AD, LDAP, Local, etc)Users: User objects (individuals who will be granted access)Roles: Ad-hoc groups of users that can contain one or more security groupsResources: Specific network resources that roles are enabled to accessRDP connections to serversWeb pagesNetwork CIDR blocks (ie, 165.124.188.0/26)File Shares
Basic Concepts, Cont’d
IPsec VPN v. SSL VPN: What’s the difference?IPsec Designed for site-to-site encryption over insecure networksEncapsulates packets at the network layerOperates in two modesTransport Mode: Packets payload is encrypted at sender and decrypted at receiverTunnel Mode: Sessions are built and torn down between endpoints (sites and user)=
IPsec Modes
IPsec continued
SSL VPNDesigned specifically for individual remote access to resourcesAllows for granular access to resourcesRequires no software installation or configurationAllows for users to have a seamless experience- no more connections and disconnections
SSL  Crypto Negotiation
SSL VPN Cont’d

More Related Content

PPT
RADIUS
PDF
20071015 Architecting Enterprise Security
PDF
10. grid security
PPTX
Data sharing with accountability in cloud
PPTX
Ensuring distributed accountability
PPTX
The process of authentication
PPTX
The process of authentication
PPT
RADIUS
20071015 Architecting Enterprise Security
10. grid security
Data sharing with accountability in cloud
Ensuring distributed accountability
The process of authentication
The process of authentication

Viewers also liked (17)

DOC
Configuring the cisco switch with the cli based setup program
PPSX
如何建立IPSEC VPN
DOCX
Cisco 1921 vs. cisco 1941 vs. cisco 1941 w
PDF
Porque cambiar de IPSec a SSL VPN
PDF
300 101 Dumps - Implementing Cisco IP Routing
PPTX
How to create Security on Cisco switch
DOC
Study Notes BGP Exam
PPTX
Seminar (network security)
PPTX
Juniper Srx quickstart-12.1r3
PPTX
Using BGP To Manage Dual Internet Connections
PDF
BGP Advance Technique by Steven & James
PPTX
BGP Traffic Engineering / Routing Optimisation
PDF
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
PDF
Alphorm.com Formation CEHV9 III
PDF
Segment Routing: A Tutorial
PPT
BGP protocol presentation
DOCX
Cisco asa 5500 x series migration options-asa 5555-x, asa 5525-x & asa 55...
Configuring the cisco switch with the cli based setup program
如何建立IPSEC VPN
Cisco 1921 vs. cisco 1941 vs. cisco 1941 w
Porque cambiar de IPSec a SSL VPN
300 101 Dumps - Implementing Cisco IP Routing
How to create Security on Cisco switch
Study Notes BGP Exam
Seminar (network security)
Juniper Srx quickstart-12.1r3
Using BGP To Manage Dual Internet Connections
BGP Advance Technique by Steven & James
BGP Traffic Engineering / Routing Optimisation
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
Alphorm.com Formation CEHV9 III
Segment Routing: A Tutorial
BGP protocol presentation
Cisco asa 5500 x series migration options-asa 5555-x, asa 5525-x & asa 55...
Ad

Similar to Juniper SA Overview (20)

DOCX
AZ500 Secure Networking. and how things are implemented
PPTX
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
PPTX
Unlocking DevOps Secuirty :Vault & Keylock
PPTX
Security for cloud native workloads
PDF
DTS Solution - Software Defined Security v1.0
PPTX
Connect your datacenter to Microsoft Azure
PDF
TechWiseTV Workshop: Cisco Stealthwatch and ISE
PPTX
Security and LDAP integration in InduSoft Web Studio
PDF
Global Azure Bootcamp 2018 - Azure Network Security
PDF
Networking in docker ee with kubernetes and swarm
PDF
Networking in Docker EE 2.0 with Kubernetes and Swarm
DOC
Decentralized access control with anonymous authentication of data stored in ...
DOC
IEEE paper 2014 abstract
PDF
Psdot 12 a secure erasure code-based cloud storage
PPT
lec3_10.ppt
DOCX
Please identify hardware device(s) (peripherals) and describe how a NO.docx
PDF
Kollective_SD_ECDN_WP[1]
PPTX
Hybrid - Seguridad en Contenedores v3.pptx
PPTX
Ecommerce final ppt
PPTX
Distributed Computing Environment
AZ500 Secure Networking. and how things are implemented
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
Unlocking DevOps Secuirty :Vault & Keylock
Security for cloud native workloads
DTS Solution - Software Defined Security v1.0
Connect your datacenter to Microsoft Azure
TechWiseTV Workshop: Cisco Stealthwatch and ISE
Security and LDAP integration in InduSoft Web Studio
Global Azure Bootcamp 2018 - Azure Network Security
Networking in docker ee with kubernetes and swarm
Networking in Docker EE 2.0 with Kubernetes and Swarm
Decentralized access control with anonymous authentication of data stored in ...
IEEE paper 2014 abstract
Psdot 12 a secure erasure code-based cloud storage
lec3_10.ppt
Please identify hardware device(s) (peripherals) and describe how a NO.docx
Kollective_SD_ECDN_WP[1]
Hybrid - Seguridad en Contenedores v3.pptx
Ecommerce final ppt
Distributed Computing Environment
Ad

Recently uploaded (20)

PDF
Getting Started with Data Integration: FME Form 101
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Big Data Technologies - Introduction.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Spectroscopy.pptx food analysis technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Electronic commerce courselecture one. Pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
Getting Started with Data Integration: FME Form 101
Digital-Transformation-Roadmap-for-Companies.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
cuic standard and advanced reporting.pdf
Network Security Unit 5.pdf for BCA BBA.
Big Data Technologies - Introduction.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectroscopy.pptx food analysis technology
Empathic Computing: Creating Shared Understanding
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Electronic commerce courselecture one. Pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation theory and applications.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
MIND Revenue Release Quarter 2 2025 Press Release
MYSQL Presentation for SQL database connectivity
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Per capita expenditure prediction using model stacking based on satellite ima...
Assigned Numbers - 2025 - Bluetooth® Document

Juniper SA Overview

  • 1. Overview: Juniper SSL VPNStrategy, Architecture and Introduction
  • 2. Technical OverviewFeaturesExtranet style web interface access to resourcesFull/split tunnel capabilities with Network ConnectMobile ready with Junos PulseNo client installation requiredGranular Authentication, Authorization and Auditing capabilitiesSecure Meeting Space
  • 3. Basic ConceptsJuniper model for secure remote access is granular allowing each component to be administered en masse or individuallyRealms -> Users -> Roles -> ResourcesRealms: Groupings of authentication resources (RADIUS, AD, LDAP, Local, etc)Users: User objects (individuals who will be granted access)Roles: Ad-hoc groups of users that can contain one or more security groupsResources: Specific network resources that roles are enabled to accessRDP connections to serversWeb pagesNetwork CIDR blocks (ie, 165.124.188.0/26)File Shares
  • 5. IPsec VPN v. SSL VPN: What’s the difference?IPsec Designed for site-to-site encryption over insecure networksEncapsulates packets at the network layerOperates in two modesTransport Mode: Packets payload is encrypted at sender and decrypted at receiverTunnel Mode: Sessions are built and torn down between endpoints (sites and user)=
  • 8. SSL VPNDesigned specifically for individual remote access to resourcesAllows for granular access to resourcesRequires no software installation or configurationAllows for users to have a seamless experience- no more connections and disconnections
  • 9. SSL Crypto Negotiation

Editor's Notes

  • #6: IPSec was originally developed for secure site to site traffic between physically separated hosts or networks-Was an answer for how to secure networks as companies began transitioning from private ppp links to internet connectionsnote that this is NOT specifically designed for remote access. GRE tunnels are compute intensive, heavy things to set up.it takes the same amount of horsepower it to establish a site to site as it does to establish a remote access tunnel– they are essentially the same thing- same memory, same algorithms, just slightly different methods of handing authentication and key exchangeTherefore, specific client applications or hardware needs to be installed to get these things up and running– the Cisco VPN client we’re all so familiar with or the PIX/ASA/SPA hardwareThis becomes a real problem when you’re dealing with consultants or contractors that you’ll never meet– how do you get the client software/hardware installed properly?IPSec handles packets at the network layer of the Internet Model. This is important because it means that applications can function over a IPSec connection without having to be modified or hacked upNotable exceptions: multicast traffic, NAT’d client traffic (ESP in transport mode or IPsec authentication headers)This also means that since the connection is a true IP connection, the end user (or network) truly becomes a node on the destination network and can interact with devices or provide services to the network as if it were local.This is a benefit from many user’s perspectives as they can typically function exactly as they are used to at workBut this is a downside from a security perspective. It is functionally equivalent to handing a contractor a network cable- no real, granular authorization, little audit trail.
  • #9: Another pro of SSL VPN’s is that they allow more precise access control. First of all they provide tunnels to specific applications rather than to the entire corporate LAN. So, users on SSL VPN connections can only access the applications that they are configured to access rather than the whole network. Second, it is easier to provide different access rights to different users and have more granular control over user access.