Campus Lan Design Guide
Campus Lan Design Guide
Campus Lan Design Guide
Table of Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Campus Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Campus LAN Design Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Infrastructure Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Campus Architecture Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7 Layered Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7 Benefits and Challenges to the Layered Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 A Network Revolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Implementation: Access Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Access Layer Design Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Wired Port Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 WLAN Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 PoE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Virtual LAN and Spanning Tree Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 Using Layer 2 versus Layer 3 at the Access Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 Considerations for Implementing Unified Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Threat Containment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Modular Chassis Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Access Layer Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Scalable Access Solutions with Virtual Chassis Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Wireless Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Aggregation Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Aggregation Layer Design Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Segmentation/Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Distributed Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Aggregation Layer Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Scalable Aggregation Layer Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Core Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19 Core Layer Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19 Core Layer Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19 High Performance Core Layer Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19 Is the Core Layer Essential? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Challenges and Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Consolidating the Core and Aggregation Layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 High Availability in the Campus Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Device-Level High Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Link-Level High Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Redundant Links: Square versus Triangle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Virtual Chassis Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Link Aggregation Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Redundant Trunk Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Best Practices for Campus Link Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Network Software HA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Unified Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 IEEE 802.1X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Ubiquitous Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Segmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Access Control Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Additional Access Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Operational Simplicity and Unified Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Unified Management with Juniper Networks Network and Security Manager (NSM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 NSM Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Remote Configuration and Management with Juniper Networks J-Web Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 J-Web Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 About Juniper Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Table of Figures
Figure 1: Highly available campus LAN configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7 Figure 2: The layered approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7 Figure 3: Access layer at a highly available campus LAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Figure 4: Flexible and roaming wireless access solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Figure 5: Layer 2 versus Layer 3 at the access layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 Figure 6: Virtual Chassis technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Figure 7: Reducing CapEx and OpEx with Virtual Chassis technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14 Figure 8: Aggregation layer in a highly available campus LAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Figure 9: Distributed switching at the core/aggregation layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Figure 10: Core layer in a highly available campus LAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19 Figure 11: Benefits of the core layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Figure 12: Core layer collapsed into the aggregation layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Figure 13: Homing: square versus triangle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Figure 14: Link aggregation group (LAG) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Figure 15: Virtual Chassis and LAG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Figure 16: Best practices link redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Figure 17: Campus security architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Figure 18: Enforcing endpoint health policy for all user types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Figure 19: Enforcing security policies between different departments, resources and services . . . . . . . . . . . . . . . . . . . . . . . 28 Figure 20: Dynamic ARP Inspection (DAI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Figure 21: NSM Device Management and Device Auto Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Figure 22: NSM Topology Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Figure 23: NSM Template Based Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Figure 24: NSM Event and Log Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Figure 25: Easy-to-use graphical J-Web interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Introduction
The corporate LAN has evolved from a passive background business component to a highly active, highly visible core asset that enterprises rely on to support day-to-day operations critical to their market success. Todays network is a strategic instrument that must be accessible any time from anywheresimultaneously offering fast, secure, reliable services at scale regardless of location. It has also evolved from traditional client/server data flow support to peerto-peer flow support, and it must also accommodate an increasing number of devices and services. In addition to centralizing applications and data centers, enterprises are consolidating servers and data centers to simplify operations and reduce costs. Existing campus infrastructure solutions cannot meet the requirements needed to provide secure and reliable high-performance access for campus users, nor do they provide the centralized management capabilities critical for reducing costs and streamlining operations. A new campus LAN design that meets campus security, connectivity, and performance challenges while enabling key IT initiatives is needed. It also must scale, offer operational simplicity, and flexibly accommodate new computing trends without an entire redesign.
Campus Overview
The term campus, when used in this document, refers to a main enterprise location consisting of one or more buildings in close proximity at the same locale. A campus is usually, though not necessarily, the corporate headquarters or a major site. A multi-floor office building housing an enterprise, a corporation with several buildings in an office park complex, and the sprawling facilities making up a university are all examples of a campus. All buildings and floors on the campus are connected to shared resources and services in a data center, which may or may not be part of the campus, via a campus LAN or WAN connection. The campus may also be connected to remote locations such as branch and regional offices via a WAN. As most business processes are carried out online, any campus LAN downtime or inefficiency has a negative impact on the corporate bottom line. Secure, high-performance, highly available LAN services are crucial to ensure that each campus facility is always online so that business productivity and customer satisfaction are maximized. This document focuses on the challenges and considerations facing todays enterprise so that they may plan and create a LAN meeting those requirements. The campus LAN is made up of three main layers: the access layer, the aggregation layer, and the core layer. Each layer, covered in more detail further in this document, provides a set of services to the enterprise that require a series of considerations and address a set of challenges. Services Needed in the Campus LAN The campus LAN must provide the following high-level services to optimize efficient business operations: LAN ConnectivityThe campus infrastructure must provide secure wired and wireless LAN connectivity for an increasing number of IP devices such as computers, telephones, PDAs, surveillance cameras, smartphones and more. SecuritySecurity is critical to all campus LAN services. Access to networks and applications must be open and pervasive, yet remain secure and controlled. Todays networks not only need to effectively handle unmanaged devices and guest users attempting network access, they also need to address support for unmanageable devices, post admission control, and application access control, visibility, and monitoring. Key security components and policies include: - Policies ensuring Quality of Service (QoS) - Mitigating denial of service (DoS) and distributed denial of service (DDoS) attacks and threats - Ensuring that the organization meets compliance criteria All security policies should be centrally managed and remotely deployed. Unified CommunicationDeployment of VoIP phones using Power over Ethernet (PoE) technology, as well as video conferencing and web-based training through video on demand (VOD) applications, over the same campus LAN infrastructure as data calls for the logical separation of delivery of these services. Implementation of QoS policies is also needed to prioritize and guarantee delivery of latency/jitter, and loss sensitive VoIP and video traffic over data.
High PerformanceLAN-like application performance must be provided at all times throughout the campus. Moderate oversubscription is common in the LAN access layer but line-rate performance is highly desirable in the LAN aggregation and core layers. High Availability (HA)Downtime is not an option in todays campus LAN. It must offer at least five nines or 99.999 percent of reliability with a goal of approaching the level of service provided by the public switched telephone network (PSTN). HA should be addressed throughout the LAN design. Networking equipment and software that is cost-effective, feature-rich, highly reliable, and offers centralized management capabilities is vital to reduce downtime and operational costs. Robust, reliable connectivity is also required. In addition, emerging technologies such as unified communications depend on an optimized and always-on, high-performance network from end to end to function effectively. Centralized ManagementA key service required in a campus LAN is centralized management of all network switches, firewalls, routers, VPN, and intrusion detection and prevention (IDP) devices. Centralized management solutions reduce the time and expense required to configure and manage network devices. In addition, network traffic can be more easily analyzed with such a system, facilitating network performance optimization. Each of these areas is addressed in more detail in this document and, when appropriate, additional considerations or challenges for a specific service or feature are presented.
Scope
This design guide proposes practices, technologies, and products that help campus architects and engineers design a modern campus LAN. It also introduces issues related to changing campus needs and presents practices, technologies, and design considerations for campus architects and engineers. In addition, this guide shows how infrastructure solutions from Juniper Networks allow businesses to advance the economics of networking through a truly innovative, gamechanging operating environment that helps them increase revenue and raise productivity today and into the future.
User productivity Since most business processes are now carried out online, the corporate LAN is a critical component of business growth and innovation. Because of that, any LAN downtime or inefficiency negatively impacts the corporate bottom line. Conversely, boosting network performance enhances business productivity, according to Information Week (2007). As such, the network must be leveraged with services such as wireless coverage and remote access to maximize productivity. Increasing focus on security FBI/CSI statistics show that 72 percent of all companies surveyed reported at least one security incident in 2006. And there continues to be a proliferation of both internal and external attacks. Not surprisingly, a 2006 Forrester Research survey found that 57 percent of all firms consider upgrading security environment a top priority. As critical business processes become more distributed and unified communications present new vulnerabilities, the need for robust security is likely to intensify. User access policies are needed. Demand for wireless services One of the main drivers of better business decisions is access to key information and resources at all times. Employees of modern business go to meetings with their laptops in tow, expecting wireless access to all of their applications, data stores, resources, and services. Not only must wireless service be provided throughout the campus, but it should enable users to seamlessly move across the campus without service disruption, much like roaming cell coverage. Such wireless service enables users to access whatever materials are needed to support a presentation or budget forecast, start a download from a centralized server and have it finished by the time they get to the conference room with their laptop, or talk on a Wi-Fi phone throughout the campus. Wireless service and access must always be secure. Different levels of wireless access must be provided for contractors, partners, and other guest users, ensuring not only that the proper level of service is delivered but that access to the appropriate resources is restricted. Server centralization and data center consolidation A 2007 Forrester report states that 51 percent of all firms consider server centralization a key priority. Gartner (2007) also reports that most enterprise servers operate at 20 percent capacity. New technologies like virtualization are needed to better utilize these resources. At the same time, most campuses need local servers that require extra security, bandwidth optimization, and traffic prioritization. To further reduce costs, simplify operations, and comply with regulatory guidelines, enterprises are also consolidating data centers. According to a 2006 Nemertes Research report, 91 percent of companies interviewed were under compliance constraints and more than 50 percent of the companies had consolidated their dispersed data centers into fewer larger data centers in the last 12 months, with even more planning to consolidate in the next 12 months. In addition to high availability requirements ensuring nonstop operations, centralization raises new latency and security issues. Centralized management solutions that help reduce the time and resources devoted to keeping campuses online and operational are also needed.
Infrastructure Solutions
The network infrastructure of todays campus is no longer sufficient to satisfy these requirements. Instead of adding additional costly layers of legacy equipment and highly skilled IT resources to support the growing number of devices and services in the campus network, enterprises need a new, more integrated and consolidated campus solution. Juniper Networks delivers a proven IP infrastructure for the campus that meets these challenges, enabling the performance, scalability, flexibility, security, and intelligence needed to not just meet but increase campus user productivity. Juniper Networks offers flexible configurations and price points that meet the needs of all campuses, while delivering high-performance throughput with services such as firewall, Juniper Networks Adaptive Threat Management Solutions, VPN, MPLS, IPV6, and Connectionless Network Service (CLNS).
EX4200 line
EX8200 line
M Series
HQ
EX8200 line
EX8200 line
OAC
OAC
Access Point
SA Series
ISG Series
SBR Series
CAMPUS
Device Connectivity
r 10/ 100/ 1000 aye BA sL SE es c -T Ac r GbE and 10 e Gb ay L E n io yer - 10 G e La b or
G LA
Agg reg at
er Fib
DATA CENTER
eg
cc
at
io n
es
L aye r 1 0
Gb
ib
F
La
ye r 1 0 G b E
AG
er
SE BA
-T
Co
Ag
gr
A
sL
a ye
r 1 0/ 1 0 0
0 / 100
A Network Revolution
A recent entrant into the evolving switching market, Juniper Networks has factored lessons learned and experiences into the development of a new portfolio of Ethernet switch products and network solution designs that address contemporary issues and accommodate future growth. These new products are designed to eliminate unnecessary network layers while providing a platform for delivering higher availability, converged communications, integrated security, and higher operational efficiency. With these solutions, Juniper Networks simultaneously advances the fundamentals and economics of networking by delivering greater value, increasing simplicity, and lowering the total cost of network ownership.
ACCESS LAYER
L2 Switch
L2 Switch
AGGREGATION LAYER
L2/L3 Switch L2/L3 Switch
CORE LAYER
L2/L3 Switch
L2/L3 Switch
WLAN Connectivity
Ideal for employees meeting in conference rooms or areas other than their offices, as well as contractors, partners, and guests, wireless access must be provided across the campus. With the plethora of IP devices available on the market and used in the workforce, especially by unknown guests, a comprehensive security policy must ensure that only trusted devices access the campus network. Further, the appropriate LAN resources must be restricted and made available only to those with the proper credentials. This is especially true for contractors, partners, and other guests. Seamless coverage enabling a user to roam the campus with the same login credentials is also expected. There are two main designs for flexible and roaming wireless solutions: Non-controller based wireless accessIn this design, an 802.1Q trunk for access point to switch is required. Roaming requires spanning at least two VLANs between access layer switches. Controller-based wireless accessThis design uses a virtualized, centralized wireless controller. Access point VLANs are placed local to the access switch. Roaming does not require spanning VLANs across the campus network.
Access Point
Access Point
Wireless OAC
Wireless OAC
ACCESS
L2/L3 Switch
L2/L3 Switch
AGGREGATION
Wireless VLANs
L2/L3 Switch
L2/L3 Switch
However, there are some devices such as security cameras with advanced pan, tilt, and zoom functions and IEEE 802.11n WLAN access points that may need more than 15.4 watts of PoE.
LAYER 3
LAYER 2
L2 Switch
Access Layer
Layer 2 at Access
Layer 3 at Access
10
Using Layer 2 at the access layer Using Layer 2 at the access layer is the traditional configuration. This provides plug-and-play configuration and makes the deployment in smaller networks easier to implement and manage. There are a number of challenges associated with this option. This configuration usually requires STP, resulting in multiple connections, one active and one redundant. The demarcations from L2 and L3 with OSPF add multiple fault isolation domains, which add extra complexity in configuring and managing the network. Troubleshooting can also be more difficult in such configurations. In addition, convergence in case of a switch or link failure often takes too long to ensure a highly-available campus LAN. Using Layer 3 at the access layer Routing is enabled on the switch when using Layer 3 at the access layer, but it still provides the capability to put users into different VLANs. Layer 3 is more deterministic. No Layer 2 loops are created in this design. Layer 3 should be configured in the uplinks from the access switch to the aggregation layers, with Layer 2 configured at the access switch to the devices. STP can be enabled to prevent inadvertent loops. Or STP can be disabled and bridge protocol data unit (BPDU) protection enabled, making it easier to troubleshoot. When STP is disabled, OSPF or other openstandard protocols can be used to provide sub-second convergence. For larger or more complex networks, this is a low maintenance solution in comparison to using Layer 2 at the access layer. This option is more costly to deploy with legacy network equipment, as Layer 3 usually requires an additional license fee. Recommendation Unlike competitive products, Juniper Networks solutions provide the ability to deliver either Layer 2 or Layer 3 at the access layer without any added expense, as Layer 3 features are built into the base Juniper Networks Junos operating system license with no extra license fees required. Instead of STP, Juniper solutions also use openstandard protocols such as OSPF with equal-cost multipath (ECMP) for rapid convergence. LAN designs using Juniper Networks EX4200 Ethernet Switch with Virtual Chassis technology also benefit from Redundant Trunk Group (RTG) protocol as a built-in, optimized replacement to STP for sub-second convergence and automatic, highperformance load balancing. And, according to an independent 2007 Lake Partners1 study, operating expense with Juniper Networks solutions can be up to 29 percent lower than competitive solutions. Juniper switches with Virtual Chassis technology provide simplified device management as well, equating to lower CapEx and OpEx compared to competing solutions.
11
video, for example, real-time voice data cant be cached or have lost packets retransmitted since both would add an unacceptable delay and ruin the quality of the communication, resulting in a poor user experience. Voice packets, therefore, must be given top priority when creating QoS policies. IP phones and other communication devices are likely to be spread throughout the LAN in many different physical locations. VLANs, as discussed earlier, can be used to identify and segment voice, video conferencing, and data traffic, regardless of location, into logical VLANs so that the appropriate QoS parameters can be easily applied to maintain optimal service for each data flow. To facilitate QoS, data can be classified by a combination of MAC address, IP address, physical port, and protocol. For example, a block of IP phones connected to a specific LAN segment could be placed in a VLAN designated for voice traffic based on the IP phone port numbers. Link Layer Detection Protocol-Media Endpoint Discovery (LLDPMED) may also be used to discover an IP phone and automatically place it on a VLAN. Or traffic from a softphone can be analyzed at the protocol level, with voice data given top priority regardless of the source port. Once the data is classified with the appropriate Differentiated Services code point (DSCP), it must be queued and scheduled. Most important, the same QoS rules must be enforced consistently throughout the LAN and WAN. Built-in QoS QoS and class of service (CoS) features are built into all Juniper infrastructure, security, and application acceleration solutions. All Juniper Networks switches and routers run Junos OS, which comes standard with a full complement of QoS services. Juniper Networks EX Series Ethernet Switches, for example, support eight hardware queues per port and offer a range of policing options from best-effort delivery to enhanced delivery and assured delivery. Since the same Junos OS is found across all Juniper router and switch solutions, the same QoS policies can be used throughout the LAN and WAN design for easy and consistent traffic management. In addition, ASICs in all Juniper solutions support QoS by processing prioritized data and minimizing CPU load. Note: For more information on VoIP QoS, read Juniper pub# 351113-001 August 2005: VoIP on the WAN: Its a Matter of Priorities. 2. Security Implementing unified communications on the data network increases security exposures that can have serious service impacts. Malicious attacks from outside the network and inadvertent attacks within the network must be prevented. New ways of toll fraud and new security risks like eavesdropping are being discovered at an everincreasing rate. Additional points of entry are created; a hacked VoIP system now provides a back door to the corporate LAN. Security risks range from viruses, worms, and denial of service (DoS) attacks to unauthorized access. Deployment of VoIP solutions, similar to other network appliances, must account for security of the device itself as well as how it can be used to attack the network as a whole. Juniper Networks IDP Series Intrusion Detection and Prevention Appliances are recommended to thwart VoIP-related attacks as well as typical intrusions. An 802.1X solution should be used to authenticate and manage endpoints via policy-based access. For VoIP phones that do not support an 802.1X client, one can use the MAC-based authentication feature on the EX Series switches to authenticate the phones. Using the protocol-specific application-level gateway (ALG) features on all firewalls is recommended to dynamically open and close ports for each VoIP call.
Threat Containment
It is vital that the access layer include integrated security features to guard against intruders or other external threats such as DDoS attacks. An extra layer of security should be provided by first authenticating users and performing virus checks, then enforcing precise, end-to-end security policies that determine who can access what network resources, as well as QoS policies to ensure delivery of business processes.
12
Ideal modular solutions should offer high-density, high-speed ports with optional, cost-effective PoE capabilities. Each modular chassis should also offer high-speed uplink connections and provide the same type of HA features found in traditional chassis-based solutions. The ideal modular chassis solutions should also configure and manage more than one switch as a single Virtual Chassis configuration, dramatically reducing both capital and operating expense while providing additional HA features.
Legacy Switch 12-15 Rack Units (RU) 48-288 Gigabit Ethernet ports + 4
EX4200 line Switches 4 Rack Units 192 Gigabit Ethernet + 8 10 Gigabit Ethernet
13
3. Carrier-class reliability The EX4200 switch with Virtual Chassis technology also provides the same high availability features as modular chassisbased systems. Each switch supports redundant, load sharing, hot-swappable AC or DC power supplies, as well as a field replaceable, hot-swappable fan tray with redundant blowers, any of which can fail without affecting operations. Virtual Chassis technology provides unparalleled device and link HA using the virtual backplane protocol and Junos OS. Each set of interconnected switches with Virtual Chassis technology automatically takes full advantage of the multiple Routing Engines present to deliver graceful Route Engine switchover (GRES) and nonstop forwarding to ensure uninterrupted operation in the rare event that any individual switch fails. For added device and link HA, a Virtual Chassis can be configured to address any requirements. For example, a single Virtual Chassis configuration of 10 switches can be configured instead as two five-switch Virtual Chassis configurations, or in any other desired combination. 4. Location independence Another key feature of Virtual Chassis technology is that the virtual backplane protocol can also be extended across the optional Gigabit Ethernet or 10-Gigabit Ethernet uplink ports to interconnect switches that are more than a few meters apart, creating a single virtual switch that spans multiple wiring closets, floors, server racks, or buildings. Even when separated by long distances, interconnected switches with Virtual Chassis technology can be managed, monitored, upgraded, and otherwise treated as a single resilient switch, dramatically reducing recurring management and maintenance costs.
EAST CLOSETS
L2/L3 Switches
Floor
L2/L3 Switches
L2/L3 Switches
Floor 1
WEST CLOSETS
EAST CLOSETS
Floor EX4200 line Virtual Chassis EX4200 line Floor 1 EX4200 line EX4200 line Virtual Chassis
14
5. Reducing CapEx and OpEx At one-sixth the footprint and less than one-third the cost of the most commonly purchased chassis-based switch offering 48 fiber Gigabit Ethernet ports and four 10-Gigabit Ethernet wire-speed ports, the EX4200 with Virtual Chassis technology represents the new generation of switching. Juniper Networks EX4200 Ethernet Switch comes standard with features that are costly add-ons in competitive solutions. For example, the EX4200 includes L3 in the base platform, offers built-in 10-Gigabit Ethernet uplink capability, delivers partial or full PoE, provides built-in redundant power supplies and more in a single costoptimized platform. OpEx savings include the unified Junos OS feature set and remote mirroring capability for full troubleshooting from a central network operations center (NOC), eliminating the need to send IT staff onsite for maintenance, upgrades, and debugging. Not only does Juniper Networks lower CapEx and OpEx by collapsing layers and therefore reducing the number of devices in the network, but Virtual Chassis technology saves on valuable rack space, as well as recurring power and cooling costs. Virtual Chassis technology also frees up precious IT budget dollars that can be invested in new technologies that improve business productivity. Note: For a full set of features, benefits, and specifications, please view the Juniper Networks EX4200 Ethernet Switches data sheet.
Wireless Solutions
Secure WLAN solutions from Juniper Networks partners Aruba Networks, Trapeze Networks, and Meru Networks are recommended for campuses that wish to provide wireless service. Each solution integrates seamlessly with Juniper Networks Odyssey Access Client (OAC), an enterprise-class 802.1X software access client. Working with an 802.1X-compatible RADIUS server such as Juniper Networks Odyssey Access Client server or Juniper Networks SBR Series Steel-Belted Radius Servers, OAC secures the authentication and connection of WLAN users, ensuring that only authorized users can connect, that login credentials will not be compromised, and that data privacy will be maintained over the wireless link. A specialized version of OAC includes a cryptographic module that has been FIPS 140-2 Level 1 Validated to meet security requirements of government agencies. OAC is also an ideal client for enterprises that are deploying identity-based (wired 802.1X) networkingsaving time and effort by permitting one time deployment of wireless and wired 802.1X access while also simplifying the user experience and reducing training costs.
15
Aggregation Layer
The aggregation layer, sometimes referred to as the distribution layer, aggregates connections and traffic flows from multiple access layer switches to provide high-density connectivity to the LAN core.
ACCESS LAYER
L2 Switch
L2 Switch
AGGREGATION LAYER
L2/L3 Switch L2/L3 Switch
CORE LAYER
L2/L3 Switch
L2/L3 Switch
Distributed Switching
New, emerging technologies are causing a shift in how networks are designed. Administrators are always looking for ways to eliminate STP without the need to push Layer 3 to the access layer. One concept that is garnering a fair amount of attention is distributed switching in the core/aggregation layer. Redundant devices are being transformed into single, logical devices (see Figure 9).
16
Virtual Chassis
Virtual Chassis
Virtual Chassis
LAG
LAG
INTERNET/WAN
17
2. Scalable performance To meet the aggregation demands of even the largest campus, the EX8200 line of modular switches delivers a powerful, high-density, high-performance 10-Gigabit Ethernet and Gigabit Ethernet solution. Capable of up to 3.2 Tbps throughput, the EX8200 line of Ethernet switches offers up to 64 (eight-slot chassis) or 128 (16-slot chassis) wire-speed 10-Gigabit Ethernet ports. The EX4200-24F 24-port SFP+ 2-port 10-Gigabit Ethernet SKU is ideal for low-to-medium density Gigabit Ethernet aggregation needs. Its advanced Virtual Chassis technology enables seamless scaling by allowing up to 10 EX4200 switches to be interconnected via a 128 Gbps backplane or via optional Gigabit Ethernet or 10-Gigabit Ethernet uplink modules. Virtual Chassis technology simplifies administration as these devices can be managed as one unit. In addition, multiple 10-Gigabit Ethernet uplinks from any of the switches that are members of the same Virtual Chassis configuration (up to 10 EX 4200 switches), regardless of physical location, can be link-aggregated for higher bandwidth connections to other aggregation or core switches. 3. CapEx and OpEx savings Typically more than two layers of legacy Layer 3 switches are required to achieve the wire-speed port densities demanded by todays high-performance campus. The Juniper Networks EX4200 Ethernet Switch, however, meets these needs and also enables the collapse of the LAN core and aggregation layers, creating a direct positive impact on the economics of networking. Virtual Chassis technology also simplifies network operations and lowers operating expense on all fronts, from Junos OS upgrades and moves, adds and changes, to troubleshooting and problem resolution. Previously, only expensive chassis-based switches could provide the combination of high 1000BASE-X fiber port densities and the HA features required to satisfy aggregation layer requirements. While certainly scalable and highly available, these modular chassis-based switches are not a very cost-effective solution for such applications. First, they require a considerable up-front investment for the chassis and common equipment, even if not fully populated. Second, because of their size, modular chassis require more space in already crowded racks, taking up valuable real estate. Third, modular chassis require more power and coolingrecurring costs that increase operational expenses and contribute to the production of greenhouse gasses that threaten the environment. The EX4200 with Virtual Chassis technology represents the new generation of aggregation switching. It delivers greater value while reducing capital and operating expenses, freeing up valuable IT resources to invest in new technologies to improve business productivity. Note: For a full set of features, benefits, and specifications, please view the Juniper Networks EX4200 Ethernet Switches data sheet.
18
Core Layer
The core layer provides a fabric for high-speed packet switching between multiple aggregation devices or the access layer in a collapsed network. It serves as the gateway where all other modules meet, such as the WAN edge.
ACCESS LAYER
L2 Switch
L2 Switch
AGGREGATION LAYER
L2/L3 Switch L2/L3 Switch
CORE LAYER
L2/L3 Switch
L2/L3 Switch
Figure 10: Core layer in a highly available campus LAN Core Layer Considerations
High-density throughput and HA features are the main core layer considerations. The core typically requires a 10-Gigabit Ethernet interface for high throughput, and wire-rate performance. Core layer switches should also offer redundant control plane, power and cooling components for device redundancy. The design should include multiple core layer switches as system redundancy for network redundancy and optimal convergence.
19
2. Scalable performance The EX8200 line of modular switches delivers a powerful, high-density, high-performance solution. Capable of up to 3.2 Tbps throughput, the EX8200 line of Ethernet switches offers up to 64 (eight-slot chassis) or 128 (16-slot chassis) wire-speed 10-Gigabit Ethernet ports. The EX8200 line today delivers up to 80 Gbps of switching capacity per slot. By providing capacity now, the EX8200 line allows users to easily migrate to higher speed connections when they are readywithout requiring any changes to the switch fabric, Routing Engines, power supplies, or cooling system. The EX8200 line also offers a redundant control plane and runs Junipers operating systemJunos OSfor maximum software HA. 3. CapEx and OpEx savings Typically more than two layers of legacy Layer 3 switches are required at the core to achieve the wire-speed port densities demanded by todays high-performance campus. Enabling the collapse of the number of core layers, the high-density, high-performance Juniper Networks EX8200 line of Ethernet switches creates a direct positive impact on the economics of networking. The solution also lowers operating expense and simplifies all network operations via Junos OS. Delivering greater value while reducing capital and operating expenses, the EX8200 line frees up valuable IT resources that may be invested in new technologies to improve business productivity and further streamline operations. Note: For a full set of features, benefits, and specifications, please view the various Juniper Networks EX Series Ethernet Switch data sheets.
WITHOUT CORE
L2/L3 Switch L2/L3 Switch L2/L3 Switch L2/L3 Switch L2/L3 Switch
CORE
L2/L3 Switch L2/L3 Switch
AGGREGATION
Each switch requires N links, where N = number of switches in layer Simplied core design with dual-homed aggregation switches
20
EX4200 line
EX4200 line
EX8200 line
EX8200 line
INTERNET/PRIVATE
21
Juniper Networks EX8200 line of modular Ethernet switches advance the economics of networking in two ways. First, the EX8200 line delivers the needed 10-Gigabit Ethernet wire-rate port density in the core, eliminating the need to deploy multiple layers of switches that add complexity, cost, oversubscription, and latency. Second, the 10-Gigabit Ethernet port density is sufficient to eliminate the aggregation layer entirely for medium-sized enterprise networks, enabling the access switches to connect directly to the core over wire-speed 10-Gigabit Ethernet links. Eliminating a full layer of aggregation switches dramatically reduces CapEx and simplifies network operationseverything from OS upgrades and moves, adds and changes, to troubleshooting and problem resolution. For large enterprise networks that require an aggregation layer, Juniper Networks extends those CapEx reductions to the aggregation layer. Aggregation switches, which consolidate distributed wiring closets on a single platform and connect them to core switches, require high-density fiber interfaces to support potentially long runs between floors or even buildings. Due to their critical role of providing connectivity between distributed users and centralized servers in the corporate network, aggregation switches also require HA features to ensure continuous delivery of applications and business processes.
22
SQUARE
L2 Switches
TRIANGLE
L2/L3 Switches
L2/L3 Switches
23
Virtual Chassis 1
EAST CLOSET
EX4200 line
LAG
LAG
EX4200 line
EX4200 line
AGGREGATION
Figure 15: Virtual Chassis and LAG
EX4200 switches with Virtual Chassis technology can be configured into multiple Virtual Chassis groups within a single wiring closet or across multiple wiring closets. The uplinks from the closest Virtual Chassis groups extend across multiple EX4200 units in the aggregation layer. In this simplified design, STP is not required, yet redundancy is increased when uplinks are distributed across multiple EX4200 switches within a single Virtual Chassis group. This leads to cost and operational savings and increased HA as all uplinks are redundant and offer load sharing.
24
ACCESS
L2 Switch
L2 Switch
Redundant interconnection between Aggregation and Core Redundant nodes in Aggregation Layer Redundant interconnection between Aggregation and Core Layer 3 triangle link conguration
AGGREGATION
L2/L3 Switch
CORE
L2/L3 Switch
Network Software HA
Junos OS is the consistent operating system that powers all of Junipers switch, router, and firewall solutions, providing carrier-class network software to the campus. Junos OS supports features like nonstop forwarding (NSF), graceful restart, unified in-service software upgrade (ISSU), Bidirectional Forwarding Detection protocol (BFD), and other features that together make IP networking as failure-safe and reliable as telephony networks. Junos OSs modularity and uniform implementation of all features enables even the smallest campus to benefit from the same hardened services in their Junos OS devices as the largest service providers.
25
Security
The increased mobility of users on campus, the growing use of contractors, the co-location of partners onsite, the proliferation of unified communications, and the demand for wireless access all intensify campus LAN security issues. IT must protect valuable campus resources from internal and external threats across large or multiple LANs as it delivers high-performance, secure, and ubiquitous LAN and WLAN access.
SBR Series
INTERNET
IDP Series
DEPARTMENTS
26
EXTRANET
SA Series
Firewall
Applications
CORPORATE OFFICE
Mobile Employee
Guest
Partner
Quarantine/ Remediation
Figure 18: Enforcing endpoint health policy for all user types
IEEE 802.1X
The 802.1X standard provides a strong framework for authentication, access control, and data privacy for port-based network access control. An 802.1X access control solution completes the authentication of network credentials even before a network IP address is assigned, thus preventing unauthorized access and ensuring that viruses and other threats are halted before they can spread into an organization. After login, dynamic port-based role configuration is used to restrict use of specific resources.
27
Ubiquitous Access
Todays 24/7 global environment requires that employees, customers, partners, and other network users have realtime access to network resources and applications from anywhere and from virtually any device. On the campus, this includes wired and wireless access for PCs, laptops, PDAs, Internet-enabled smartphones, and other IP devices. When on the road at a remote location such as a partner site, hotel room, Internet caf, or anywhere with Internet access, users must also be able to connect to LAN resources via a VPN or other secure connection.
Segmentation
Unbound by physical interfaces, segmentation logically divides networks into separate zones based on user definition.
INTERNET
ISG Series
L2/L3 Switch
FINANCE
HR
SALES
Figure 19: Enforcing security policies between different departments, resources and services
Supporting distributed security requirements without the added cost, segmentation simplifies policy configuration and management. Segmentation is ideal for grouping users so that they can access specific resources. For example, all those in the HR department can be given access to the HR database and other personnel resources. Segmentation is provided through VLANs and with other virtualization technologies.
28
Email Server
L2/L3 Switch
Victim
Attacker
29
Dynamic ARP Inspection (DAI) is a feature that intercepts ARP packets on untrusted ports and validates them against a DHCP snooping database. Nonmatching entries are dropped. This avoids forwarding of traffic to an address impersonating the valid device, preventing man-in-the-middle spoofing attacks and DoS. 4. IP source guard Another port security feature that restricts IP traffic on untrusted Layer 2 access and trunk ports is IP source guard. Working in conjunction with DHCP snooping, IP source guard filters traffic based on manually configured IP source bindings or what is automatically learned by the DCHP snooping database. This prevents IP spoofing attacks. Any IP traffic coming into the watched ports with an IP address other than those automatically or statically assigned will be dropped.
30
With NSMs topology manager, all Juniper and non-Juniper network devices such as routers, switches and security appliances can be discovered and mapped into a topology map with proper hierarchical segments, endpoints and hosts. This can then be connected to the network devices, included in the discovery and organized into a searchable database for ease of management.
31
32
33
34
Summary
The highly visible enterprise LAN is a core asset that must be accessible any time from anywhereoffering secure, highperformance services regardless of location. A number of trends are increasing security and performance challenges that existing campus infrastructure solutions cant meet. In addition, existing solutions do not provide the centralized management capabilities critical for reducing costs and streamlining operations. A new campus LAN design that meets campus security, connectivity, and performance challenges while enabling key IT initiatives is needed. It also must scale, offer operational simplicity, and flexibly accommodate new computing trends without an entire redesign. Junipers solutions, including a new family of high-performance Ethernet switches, redefine the way businesses build campus networks. Offering high port densities, wire-speed connectivity, and high availability in compact, pay-asyou-grow platforms, Junipers switches represent a powerful yet cost-effective alternative to the aging and expensive solutions pushed by todays dominant switch vendors. They enable the collapse of inefficient layers required by traditional solutions. By offering a smaller footprint in the wiring closet combined with lower power and cooling requirements, Juniper switches represent the efficient and green solutions users are looking for to power their networks of the future. In addition to a full suite of secure services, Juniper Networks products provide the end-to-end QoS required for sensitive and bandwidth-hungry applications such as unified communications. Junos OS, a single, consistent operating system used across all Juniper switch, router, and firewall products, makes the network infrastructure exceedingly easy to deploy, configure, and upgrade, saving considerable time and operating resources that can be reallocated to further improve business operations and maximize customer satisfaction. Juniper Networks infrastructure solutions advance the economics of networking, allowing businesses to change the rules with their IT investments and create a truly innovative and competitive environment that helps them increase revenue and raise productivity today and into the future.
Corporate and Sales Headquarters Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA Phone: 888.JUNIPER (888.586.4737) or 408.745.2000 Fax: 408.745.2100 www.juniper.net
APAC Headquarters Juniper Networks (Hong Kong) 26/F, Cityplaza One 1111 Kings Road Taikoo Shing, Hong Kong Phone: 852.2332.3636 Fax: 852.2574.7803
EMEA Headquarters Juniper Networks Ireland Airside Business Park Swords, County Dublin, Ireland Phone: 35.31.8903.600 EMEA Sales: 00800.4586.4737 Fax: 35.31.8903.601
To purchase Juniper Networks solutions, please contact your Juniper Networks representative at 1-866-298-6428 or authorized reseller.
Copyright 2010 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
8020001-002-EN
April 2010
35