Engineers from La Salle-URL share the latest news and projects in the field of network solutions in telematic engineering.

28 May 2016 | Posted by Redacción Data Center

Our Data Center Solution (II)

Hey folks! How you doing?!

Unfortunately, we have to say that this is the last post our journey... Yes, I know... it's a pity :'(

In today's post we will continue talking about the final solution of out data center, which we began 4 month ago (how quickly time goes by, no?)

The remaining part to consider about our Data Center is security and management.

The way we developed the security part, started when a lecturer came into class to explain how modern security works in a new generation Data Center. When all the content was delivered, then we were free to go and search for the security related to our companies. In our case, we had do provide security from the hand of Juniper. During the session related with security delivered in the university session, we were told that modern security does no stops in perimetral fire-walling. Instead, a new class of security is to be considered: east-weast security.

Captura de pantalla 2016-05-23 a les 20.31.59Both classes of security are considered by Juniper. The very first is provided by the SRX 3600, which has a high level of performance, capable of securing our the whole data center without any problem. The second one, east-weast security, is provided by the cSRX Container Firewall, which perfectly fits with solutions that support cloud and virtualized environments and has lots of features, but the most destacable one is called AppSecure, by which the firewall can control anCaptura de pantalla 2016-05-23 a les 20.51.27y characteristic per application, including its visibility, its enforcement, its QoS and, for sure, its security. It provides east-weast security, controlling the communications between applications, controlling from whom the communication is initiated, to who it is directed, which traffic is sent, and all this, as we said, per application, so there is no possibility of malware leaking.

All this firewalls can be controlled from the Juniper Network Director, as well as all the network devices (as we have commented in the last post), making it really easy to manage all devices in the network. This software gives to the network administrator a great view of whats is happening on the network with lots of graphics, logs and statistics (so it is easier to understand), from the point of security, to the point of device management.

Captura de pantalla 2016-05-23 a les 20.34.35

 

That's all from our part! Hope you have enjoyed the r as much as we did, and see you in other blogs!!

Share

Add new comment

CAPTCHA
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
1 + 15 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.