DATASHEET
1
Product Description
Juniper Networks
®
Junos
®
Space Security Design is a state-of-the-art, scalable enterprise
solution designed to automate the visualization, configuration, and deployment of the
security architecture of a multi-domain network.
Large-scale network security implementations often increase operational complexity
and cause configuration errors leading to heightened security risk. Considering the critical
elements of a network security deployment as topology visualization, business policy
management, VPN implementation, as well as provisioning, distribution and application
of required configurations require a holistic, smart, and automated design approach.
Grappling with compliance requirements and the need to reduce administrative costs,
IT departments can translate business policies easily and quickly into the network
infrastructure with minimal manual intervention using Security Design. Benefiting from
a platform-wide consistent visual interface, Security Design features a sophisticated yet
simple web based design environment.
JuNoS SPACE SECurITy DESIGN
Product Overview
In properly designed networks, security is
an integral attribute of the system. When
security is treated as an afterthought, or
developed independent of the overall
design requirements, it is often costly,
inflexible, and risky.
Enterprises are mostly driven by
time-to-market pressures and often
deploy systems before achieving
appropriate levels of quality and
security. Consequences can impact
overall deployment schedules, increase
complexity, and even delay profitability.
Junos Space Security Design helps
integrate a secure network design
workflow into your branch deployment
solution. The result is faster time
to market, reduced security risk,
centralized, consistent configuration of
the network, and overall lower cost of
maintenance.
London
SRX240
Branch
HQ
SRX3400
San Francisco
SRX240
allowed
HTTPS
MS-SQL
RADIUS
denied
HTTP
Internet
TELNET
SSH
allowed
SNMP
SSH
Security Design
running on
Junos Space
Figure 1: Typical topology for headquarters to branch security