Juniper unites the enterprise

New architecture, software, security wares bring Cloud fabric to campus

Juniper Networks has unveiled a reference architecture for enterprise networks intended to assist in the transition to Cloud computing.

Called Unite, the architecture is embodied in the company’s Junos operating system software and encompasses a handful of new and existing Juniper products. They include the EX9200 switch, the Junos Space Network Director management system, and third party products integrated through Juniper’s Open Converged Framework.

Unite is intended to enable enterprises to build private clouds and then interconnect them to public cloud infrastructures in a hybrid environment for application access and delivery. At the heart of it is Junos Fusion Enterprise, Junos software designed to provide a single point of network configuration and management for the enterprise network. Junos Fusion Enterprise allows customers to collapse multiple network layers into a single enterprise cloud, Juniper says.

+MORE ON NETWORK WORLD: Juniper unveils new fabric switch, architecture+

The software runs on the Junos OS image on an EX9200 switch. It supports the IEEE 802.1BR Bridge Port Extension standard for extending a bridge and its management beyond its physical enclosure and into a single-tier architecture.

This is the same software technology Juniper uses on its new QFX10000 data center switches – also called Junos Fusion -- and Cisco uses for their Nexus switch fabric extenders. Juniper employs a similar bridge extension technique on its earlier generation QFabric node/director product line to create the logical single layer topology.

Juniper says existing EX switches no older than three years old can participate in the Unite and Junos Fusion Enterprise architectures.

Also included in the Unite architecture are Juniper’s SRX series services gateway security products and Cloud-based security service. These provide the interconnection between the private, on-premises Cloud and the public cloud for hybrid cloud deployments.

Juniper’s Cloud-based threat detection and prevention system, Sky Advanced Threat Prevention, screens all applications and downloads prior to allowing them to enter the network to protect against malware. It includes free and premium versions for SRX users under a maintenance contract: the free version includes antivirus analysis, as well as static and dynamic sandbox analysis; the premium version is available for a subscription fee and also quarantines infected hosts and blocks communication with malware command and control servers.

Juniper also added two new SRX gateways to its firewall lineup to extend Unite deeper into the enterprise. The SRX300 is designed for branch small office locations, and the SRX1500 is aimed at larger enterprise branches and smaller enterprise campuses.

For management of the Unite architecture, Juniper’s Junos Space Network Director allows users to manage one or more Junos Fusion Enterprise fabric groups, including lifecycle management of cloud applications and VMs. Network Director also provides orchestration and automation of common routines, Juniper says.

On the firewall side, Juniper enhanced its Junos Space Security Director management system with increased visibility and control over workflows. Users can now see which users are using which applications, which threats have been detected, and a list of suggested actions for remediation.

Third party integration through the Open Converged Framework currently includes wireless LAN interoperability with gear from Aerohive Networks, Aruba Networks and Ruckus Wireless. Juniper announced recent deals with Aerohive and Ruckus after HP announced intentions to acquire Aruba, with which Juniper had an existing partnership.

Join the CSO newsletter!

Error: Please check your email address.

Tags Networkingsecuritysoftware

More about AdvancedAerohive NetworksCiscoHPIEEEJuniperLANRuckus Wireless

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jim Duffy

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place