Juniper Networks Unified Access Control

Image of Juniper Networks Unified Access Control (UAC) network access control products
  • Dynamic, standards-based network and application access control
  • Comprehensive access protection, visibility and monitoring for networks, applications and sensitive data
  • Flexible, phased deployment reduces installation complexity and cost
  • Best-in-class scalability and centralized policy management eases network access control, deployment, provisioning and administration


Comprehensive Network Access Control for High-Performance Businesses

Juniper Networks Unified Access Control (UAC) delivers a comprehensive network access control solution that combines user identity, device security state and location information for session-specific access control policy by user. Open and standards-based, UAC leverages existing enterprise network infrastructure, components, and software to reduce deployment complexity and cost while increasing operational efficiencies. Juniper UAC is built on our award-winning, field-tested, best-in-class security and network access control products. Juniper Networks Unified Access Control is adaptable and scalable to meet the network access control requirements for businesses of all sizes.

Network access control policies can be shared between Juniper Networks UAC and Secure Access (SA) appliances when managed by Network and Security Manager (NSM). This centralizes provisioning of enterprise-wide network access control and ensures consistent policies for remote and local access, simplifying policy development and management.

All network access control policy is implemented by the Infranet Controller, UAC's hardened, centralized policy server. User identity, device security state and network location are determined by the UAC Agent. The UAC Agent is available as a dynamically downloadable agent with support for the most popular enterprise computing platforms; a dynamically downloadable lightweight agent with cross-platform support for Microsoft Windows, Apple Mac OS, and Linux platforms; or an agentless mode, for when installing a software client is not feasible.

The Infranet Controller combines the gathered user identity, device security state and network location information to create a unique network access control policy per user and per session. UAC can enforce access policy at Layer 2 using any vendor's 802.1X-enabled wireless network access point or switch, including the Juniper EX-series Ethernet switches; at Layers 3 – 7, using any Juniper firewall platform, or both for greater granularity.


Product Features
Juniper Networks Infranet Controller 4000 (IC 4000) and UAC Agent
  • Ideal for controlling network access mid- sized to large organizations, remote or branch offices
  • Supports thousands of simultaneous endpoint devices
  • Available standalone or in cluster pairs

Juniper Networks Infranet Controller 4500 (IC 4500) and UAC Agent

  • Next generation Infranet Controller platform
  • Ideal for controlling network access mid-sized to large organizations, remote or branch offices
  • Delivers best-in-class scalability and performance
  • Supports thousands of simultaneous endpoint devices
  • Available standalone or in cluster pairs
Juniper Networks Infranet Controller 6000 (IC 6000) and UAC Agent
  • Ideal for controlling network access large, multinational organizations and government agencies
  • Supports tens of thousands of simultaneous endpoint devices
  • Redundant and/or field upgradeable hard disks, power supplies and fans
  • Available in standalone or multi-unit clusters
Juniper Networks Infranet Controller 6500 (IC 6500) and UAC Agent
  • Next generation Infranet Controller platform
  • Ideal for controlling network access large, multinational organizations and government agencies
  • Delivers best-in-class scalability and performance
  • Supports tens of thousands of simultaneous endpoint devices
  • Dual, hot-swappable, mirrored SATA hard drives, fans, and optional power supplies
  • Available in standalone or multi-unit clusters

Comments

Popular Posts