JUNIPer SSR120 Session Router User Guide
AI-Driven SD-WAN: Building Networks with Security at Their Core
Service-Centric, Tenant-Based Security Architecture
With this added layer of intelligence, the soluꢀon provides
the unique capability to assign security policy, quality-of-
service (QoS) parameters, and access control policies on a
per-service, per-tenant basis. This capability makes it possible
to have unique encrypꢀon and authenꢀcaꢀon keys, custom
traffic engineering parameters, and ꢀght access control at the
individual session level. It also offers a flexible way to segment
and isolate traffic, enabling administrators to apply different
profiles based on the applicaꢀon or service that the session
contains. Further fine tuning of content access is provided
through URL filtering.
The Juniper SSR understands sessions—dedicated links
between services on the network, and the applicaꢀons and
users that rely on them—to perform vital business operaꢀons.
The traffic crossing an SSR is processed, routed, and controlled
in a service-centric manner. Services can be made to model
a given applicaꢀon, reachable at a given address, set of
addresses, or subnets.
Access to these sessions is granted based on tenancy, which
groups services together based on shared policies. As sessions
are processed through the SSR, the tenant becomes an
important construct for route determinaꢀon, segmentaꢀon,
classificaꢀon, policy, and many other core rouꢀng principles.
Zero Trust Security
Forrester’s Zero Trust Model of informaꢀon security revolves
around the “never trust, always verify” principle. With Zero Trust
security, there is no automaꢀc trust for any enꢀty—including
users, devices, applicaꢀons, and packets—regardless of what
it is and its locaꢀon on, or relaꢀve to, the network. Similarly,
The Naꢀonal Insꢀtute of Standards and Technology (NIST) SP
800-207 Publicaꢀon, Zero Trust Architecture (ZTA), defines a
ZTA as a network that does not implicitly trust users, assets or
resources based solely on their physical or network locaꢀon.
In a world of on-the-go employees and on-demand services,
the Zero Trust Model is intended to shrink trust zones, reduce
aꢁack surfaces, and restrict lateral movement if a resource is
compromised.
Tenant
Security
Service
QoS
Service Agent
Service Agent
Access
With inherent network virtualizaꢀon and infused security
funcꢀons, the AI-driven SD-WAN soluꢀon can create zero
trust security boundaries that compartmentalize different areas
of the network. In doing so, businesses can protect sensiꢀve
informaꢀon from unauthorized applicaꢀons or users, minimize
the exposure of vulnerable systems, and prevent the lateral
movement of malware throughout the network.
Figure 1: Access to network services is based on Tenancy
IP Packet
IP Packet
IP Packet
IP Packet
IP Packet
Tenant
Tenant
Service
Tenant
Tenant
Service
Service
Service ACL
Service ACL
Figure 2: Deny-by-default policy
2
| General | Details |
|---|---|
| Name | JUNIPer SSR120 Session Router User Guide |
| Make | JUNIPer |
| Language | English |
| Filetype | PDF (Download) |
| File size | 0.25 MB |
If you have any questions regarding JUNIPer SSR120 Session Router User Guide, please ask here and describe the problem in detail.

JUNIPER SSR1300 Session Router User Guide

JUNIPER SSR1400 Session Router User Guide

JuniPer Cloud-Ready SSR1500 Session Router User Guide

JUniPer MX304 Universal Router User Guide

JUNIPer SSR120 Session Smart Router User Guide

JUNIPER SSR1400 Session Smart Router User Guide

JUNIPER SSR1300 Session Smart Router User Guide

JuniPer Cloud-Ready SSR1500 Session Smart Router User Guide

JuniPer ACX7024 Cloud Metro Router User Guide

Juniper ACX7509 Cloud Metro Router User Guide
















