SlideShare a Scribd company logo
1 of 10
JUNIPER LN2600
Rugged Secure Router
EXTENDING
THE NETWORK
THE NETWORK OUTLOOK
NO. OF CONNECT
DEVICES GROWING
10B
20B
30B
2012 2014 2016 2018 2020
Data Center
ENVIRONMENTAL CONDITIONS
REQUIRING A RUGGED ROUTER
Moisture Dust
Temperature
extremes
Vibration
Limited maintenance
capabilities
Power Security
Industry specific
certifications
Certification
RUGGED SECURE ROUTERS
DESIGNED FOR THE HARSHEST ENVIRONMENTS
Utilities Telecommunications Manufacturing
Resource Transportation Tactical Military
Services Performance
Disabled 500K pps
Enabled 200K pps
LN2600 Rugged Secure Router
LN2600 RUGGED SECURE ROUTER
Optimized 1RU form factor
 17.25” x 10” (wall or rack mount)
 - 48VDC power
 8 GbE SFP ports
Environmentally hardened
 No fans or vents
 IEEE 1613 Class 2 compliant
 IEC 61850-3 compliant
 NEMA IP64 rated
 EN 50121-4 Rail certification
FIPS 140-2 compliant
Feature rich high performance routing
and security
Rugged Secure Router
SINGLE PLATFORM SERVING
MULTIPLE CUSTOMER NEEDS
Secure Router
Unified Treat
Management
Next Generation
Firewall
 Routing and WAN
Interfaces
 Firewall, VPN, NAT
 In-line IPS
 High availability
 Transparent mode
 Ease of use
 Best-of-breed Anti-Virus,
Anti-Spam,
Web filtering
 Cloud based AV - Sophos
 In-line IPS
 AppSecure
 Next generation
firewall (AppSecure)
 In-line IPS
 Application visibility,
tracking and enforcement
 User-role based
policies
LN SERIESLN SERIES
RUGGED SECURE ROUTERS SOLVES CUSTOMER
CHALLENGES
Easy to manage
all aspects with
Junos, a single OS
platform
Easy to activate new
security service in
UTM when needed to
address new
concerns
Designed for use
in the harshest
environments
All-in-One Ruggedized
Next Gen Firewall
VPN
IPS, AppSecure
Anti-Virus
Anti-Spam
Web filtering
Routing / WAN
UTM
LAN, Switching
Unified
Management
Comprehensive Network Management of Juniper’s
Switching, Routing, and Security Devices
JUNOS SPACE – NETWORK MANAGEMENT
 Empower developer
ecosystem to build
 Simple and smart
applications
OPEN IT UP
 Minimize user input,
automate everything
 Out-of-the-box
Juniper best
practices
 Lets you do stuff
faster
MAKE IT SMART
 Business intent
oriented, not
technology-centric
 Guide the user, not
the other way around
 Provide a delightful
user experience
KEEP IT SIMPLE
simple
Firewall management
Publish WorkFlow: Manage policy work by role for better accuracy
JUNOS SPACE SECURITY DIRECTOR
Delivers scalable and responsive security management
Improves the reach, ease, and accuracy
of security policy administration
Enables quick and intuitive web-based
management of security policy lifecycle
IPsec VPN management
Network Address
Translation (NAT)
management
Intrusion prevention
(IPS) signature
management
Application-
level policy
management
Firewall management
LN2600 RUGGED SECURE ROUTER
Single device for routing,
switching, and security
Environmentally
hardened
Industry specific
certifications
Optimized
form factors
Unified
management
Flexible power
options
Secure

More Related Content

What's hot

intrusion detection
 intrusion detection intrusion detection
intrusion detectionasif usmani
 
Lixodex Outdoor Grounds Security System
Lixodex Outdoor Grounds Security SystemLixodex Outdoor Grounds Security System
Lixodex Outdoor Grounds Security SystemThomas Hill
 
Linkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARDLinkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARDLinkwise Technology
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project PresentationBishal Acharya
 
Brochure industrial security-en
Brochure industrial security-enBrochure industrial security-en
Brochure industrial security-enVahid RG-zadeh
 
A Remote home security system
A Remote home security systemA Remote home security system
A Remote home security systemPriyanka Tyagi
 
Defending our datacenters (BICSI 2016 ASEAN conference)
Defending our datacenters  (BICSI 2016 ASEAN  conference)Defending our datacenters  (BICSI 2016 ASEAN  conference)
Defending our datacenters (BICSI 2016 ASEAN conference)Jeffrey Lam
 
Embedded based home security system
Embedded based home security systemEmbedded based home security system
Embedded based home security systemNIT srinagar
 
CorporateJan2016
CorporateJan2016CorporateJan2016
CorporateJan2016Mike Foley
 
St24 c10 specification-www.ttbvs.com
St24 c10 specification-www.ttbvs.comSt24 c10 specification-www.ttbvs.com
St24 c10 specification-www.ttbvs.comTTBVS
 
Finembe MTF presentation 2012
Finembe MTF presentation 2012Finembe MTF presentation 2012
Finembe MTF presentation 2012Technopolis Plc
 
Implementation of Wireless Sensor Network in disaster detection and monitoring
Implementation of Wireless Sensor Network in disaster detection and monitoringImplementation of Wireless Sensor Network in disaster detection and monitoring
Implementation of Wireless Sensor Network in disaster detection and monitoringSinthana Sambandam
 
Enhancing Defence in depth with automated systems (SII Physical meets Cyber S...
Enhancing Defence in depth with automated systems (SII Physical meets Cyber S...Enhancing Defence in depth with automated systems (SII Physical meets Cyber S...
Enhancing Defence in depth with automated systems (SII Physical meets Cyber S...Jeffrey Lam
 
Fft perimeter intrusion_detection_-_iaa_jan12
Fft perimeter intrusion_detection_-_iaa_jan12Fft perimeter intrusion_detection_-_iaa_jan12
Fft perimeter intrusion_detection_-_iaa_jan12IPPAI
 

What's hot (20)

intrusion detection
 intrusion detection intrusion detection
intrusion detection
 
Lixodex Outdoor Grounds Security System
Lixodex Outdoor Grounds Security SystemLixodex Outdoor Grounds Security System
Lixodex Outdoor Grounds Security System
 
Linkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARDLinkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARD
 
Ppt
PptPpt
Ppt
 
Perimeter monitoring, detection and surveillance
Perimeter monitoring, detection and surveillancePerimeter monitoring, detection and surveillance
Perimeter monitoring, detection and surveillance
 
Ppt
PptPpt
Ppt
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project Presentation
 
brianwolf1
brianwolf1brianwolf1
brianwolf1
 
Bs final
Bs finalBs final
Bs final
 
Brochure industrial security-en
Brochure industrial security-enBrochure industrial security-en
Brochure industrial security-en
 
A Remote home security system
A Remote home security systemA Remote home security system
A Remote home security system
 
Wireless Home Alarm System
Wireless Home Alarm SystemWireless Home Alarm System
Wireless Home Alarm System
 
Defending our datacenters (BICSI 2016 ASEAN conference)
Defending our datacenters  (BICSI 2016 ASEAN  conference)Defending our datacenters  (BICSI 2016 ASEAN  conference)
Defending our datacenters (BICSI 2016 ASEAN conference)
 
Embedded based home security system
Embedded based home security systemEmbedded based home security system
Embedded based home security system
 
CorporateJan2016
CorporateJan2016CorporateJan2016
CorporateJan2016
 
St24 c10 specification-www.ttbvs.com
St24 c10 specification-www.ttbvs.comSt24 c10 specification-www.ttbvs.com
St24 c10 specification-www.ttbvs.com
 
Finembe MTF presentation 2012
Finembe MTF presentation 2012Finembe MTF presentation 2012
Finembe MTF presentation 2012
 
Implementation of Wireless Sensor Network in disaster detection and monitoring
Implementation of Wireless Sensor Network in disaster detection and monitoringImplementation of Wireless Sensor Network in disaster detection and monitoring
Implementation of Wireless Sensor Network in disaster detection and monitoring
 
Enhancing Defence in depth with automated systems (SII Physical meets Cyber S...
Enhancing Defence in depth with automated systems (SII Physical meets Cyber S...Enhancing Defence in depth with automated systems (SII Physical meets Cyber S...
Enhancing Defence in depth with automated systems (SII Physical meets Cyber S...
 
Fft perimeter intrusion_detection_-_iaa_jan12
Fft perimeter intrusion_detection_-_iaa_jan12Fft perimeter intrusion_detection_-_iaa_jan12
Fft perimeter intrusion_detection_-_iaa_jan12
 

Similar to Juniper LN2600

Junos space seminar
Junos space seminarJunos space seminar
Junos space seminarKappa Data
 
Alvarion Wi Mesh Wi2 Presentation
Alvarion Wi Mesh    Wi2 PresentationAlvarion Wi Mesh    Wi2 Presentation
Alvarion Wi Mesh Wi2 PresentationMonark Goel
 
Juniper round table switching and product overview
Juniper round table   switching and product overviewJuniper round table   switching and product overview
Juniper round table switching and product overviewKappa Data
 
Mobility is more than BYOD
Mobility is more than BYODMobility is more than BYOD
Mobility is more than BYODKappa Data
 
New H3 C Enterprise Portfolio May 15
New H3 C Enterprise Portfolio   May 15New H3 C Enterprise Portfolio   May 15
New H3 C Enterprise Portfolio May 15embeijlen
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5Sen Nathan
 
Hospitality ruckus wireless
Hospitality ruckus wirelessHospitality ruckus wireless
Hospitality ruckus wirelessayman khder
 
An introduction to Huawei Symantec
An introduction to Huawei SymantecAn introduction to Huawei Symantec
An introduction to Huawei SymantecUtopia Media
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013juliankanarek
 
Manging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkManging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkSecurEdgeNetworks
 
Managing Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkManaging Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkSecurEdgeNetworks
 
Introducing ACX Series and the Universal Access Solution
Introducing ACX Series and the Universal Access SolutionIntroducing ACX Series and the Universal Access Solution
Introducing ACX Series and the Universal Access SolutionHe Hariyadi
 
Introducing ACX Series and the Universal Access Solution
Introducing ACX Series and the Universal Access Solution Introducing ACX Series and the Universal Access Solution
Introducing ACX Series and the Universal Access Solution Juniper Networks
 
Solusi IPPBX UC61XX Grandstream
Solusi IPPBX UC61XX GrandstreamSolusi IPPBX UC61XX Grandstream
Solusi IPPBX UC61XX GrandstreamFanky Christian
 
Avaya ethernet switching portfolio presentation [level 3 - tdi][1]
Avaya ethernet switching   portfolio presentation [level 3 - tdi][1]Avaya ethernet switching   portfolio presentation [level 3 - tdi][1]
Avaya ethernet switching portfolio presentation [level 3 - tdi][1]IP10 TECNOLOGIA
 

Similar to Juniper LN2600 (20)

Junos space seminar
Junos space seminarJunos space seminar
Junos space seminar
 
Alvarion Wi Mesh Wi2 Presentation
Alvarion Wi Mesh    Wi2 PresentationAlvarion Wi Mesh    Wi2 Presentation
Alvarion Wi Mesh Wi2 Presentation
 
Juniper round table switching and product overview
Juniper round table   switching and product overviewJuniper round table   switching and product overview
Juniper round table switching and product overview
 
Mobility is more than BYOD
Mobility is more than BYODMobility is more than BYOD
Mobility is more than BYOD
 
New H3 C Enterprise Portfolio May 15
New H3 C Enterprise Portfolio   May 15New H3 C Enterprise Portfolio   May 15
New H3 C Enterprise Portfolio May 15
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5
 
W02 Profinet benefits workshop - Andy Williams, Siemens
W02   Profinet benefits workshop - Andy Williams, SiemensW02   Profinet benefits workshop - Andy Williams, Siemens
W02 Profinet benefits workshop - Andy Williams, Siemens
 
Hospitality ruckus wireless
Hospitality ruckus wirelessHospitality ruckus wireless
Hospitality ruckus wireless
 
Решения Mobile Backhaul и Mobile Backhaul Security
Решения Mobile Backhaul и Mobile Backhaul SecurityРешения Mobile Backhaul и Mobile Backhaul Security
Решения Mobile Backhaul и Mobile Backhaul Security
 
An introduction to Huawei Symantec
An introduction to Huawei SymantecAn introduction to Huawei Symantec
An introduction to Huawei Symantec
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
 
Zoneflex , Ruckus Wireless
Zoneflex , Ruckus WirelessZoneflex , Ruckus Wireless
Zoneflex , Ruckus Wireless
 
Manging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkManging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless Network
 
Ap8222 ss
Ap8222 ssAp8222 ss
Ap8222 ss
 
Managing Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkManaging Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless Network
 
Introducing ACX Series and the Universal Access Solution
Introducing ACX Series and the Universal Access SolutionIntroducing ACX Series and the Universal Access Solution
Introducing ACX Series and the Universal Access Solution
 
Introducing ACX Series and the Universal Access Solution
Introducing ACX Series and the Universal Access Solution Introducing ACX Series and the Universal Access Solution
Introducing ACX Series and the Universal Access Solution
 
Solusi IPPBX UC61XX Grandstream
Solusi IPPBX UC61XX GrandstreamSolusi IPPBX UC61XX Grandstream
Solusi IPPBX UC61XX Grandstream
 
Avaya ethernet switching portfolio presentation [level 3 - tdi][1]
Avaya ethernet switching   portfolio presentation [level 3 - tdi][1]Avaya ethernet switching   portfolio presentation [level 3 - tdi][1]
Avaya ethernet switching portfolio presentation [level 3 - tdi][1]
 
FTTX and Triple Play
FTTX and Triple PlayFTTX and Triple Play
FTTX and Triple Play
 

More from Juniper Networks

Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the MarketJuniper Networks
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseJuniper Networks
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANJuniper Networks
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Juniper Networks
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesJuniper Networks
 
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANStop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANJuniper Networks
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachJuniper Networks
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Juniper Networks
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Juniper Networks
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper Networks
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationJuniper Networks
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveJuniper Networks
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud Juniper Networks
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper Networks
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionJuniper Networks
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastJuniper Networks
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingJuniper Networks
 

More from Juniper Networks (20)

Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the Market
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven Enterprise
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WAN
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.
 
SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devices
 
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANStop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WAN
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic Approach
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
 
What's Your IT Alter Ego?
What's Your IT Alter Ego?What's Your IT Alter Ego?
What's Your IT Alter Ego?
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCO
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider Organization
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 Infographic
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer Satisfaction
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning Fast
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computing
 

Recently uploaded

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 

Recently uploaded (20)

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 

Juniper LN2600

  • 2. EXTENDING THE NETWORK THE NETWORK OUTLOOK NO. OF CONNECT DEVICES GROWING 10B 20B 30B 2012 2014 2016 2018 2020 Data Center
  • 3. ENVIRONMENTAL CONDITIONS REQUIRING A RUGGED ROUTER Moisture Dust Temperature extremes Vibration Limited maintenance capabilities Power Security Industry specific certifications Certification
  • 4. RUGGED SECURE ROUTERS DESIGNED FOR THE HARSHEST ENVIRONMENTS Utilities Telecommunications Manufacturing Resource Transportation Tactical Military
  • 5. Services Performance Disabled 500K pps Enabled 200K pps LN2600 Rugged Secure Router LN2600 RUGGED SECURE ROUTER Optimized 1RU form factor  17.25” x 10” (wall or rack mount)  - 48VDC power  8 GbE SFP ports Environmentally hardened  No fans or vents  IEEE 1613 Class 2 compliant  IEC 61850-3 compliant  NEMA IP64 rated  EN 50121-4 Rail certification FIPS 140-2 compliant Feature rich high performance routing and security
  • 6. Rugged Secure Router SINGLE PLATFORM SERVING MULTIPLE CUSTOMER NEEDS Secure Router Unified Treat Management Next Generation Firewall  Routing and WAN Interfaces  Firewall, VPN, NAT  In-line IPS  High availability  Transparent mode  Ease of use  Best-of-breed Anti-Virus, Anti-Spam, Web filtering  Cloud based AV - Sophos  In-line IPS  AppSecure  Next generation firewall (AppSecure)  In-line IPS  Application visibility, tracking and enforcement  User-role based policies LN SERIESLN SERIES
  • 7. RUGGED SECURE ROUTERS SOLVES CUSTOMER CHALLENGES Easy to manage all aspects with Junos, a single OS platform Easy to activate new security service in UTM when needed to address new concerns Designed for use in the harshest environments All-in-One Ruggedized Next Gen Firewall VPN IPS, AppSecure Anti-Virus Anti-Spam Web filtering Routing / WAN UTM LAN, Switching Unified Management
  • 8. Comprehensive Network Management of Juniper’s Switching, Routing, and Security Devices JUNOS SPACE – NETWORK MANAGEMENT  Empower developer ecosystem to build  Simple and smart applications OPEN IT UP  Minimize user input, automate everything  Out-of-the-box Juniper best practices  Lets you do stuff faster MAKE IT SMART  Business intent oriented, not technology-centric  Guide the user, not the other way around  Provide a delightful user experience KEEP IT SIMPLE simple
  • 9. Firewall management Publish WorkFlow: Manage policy work by role for better accuracy JUNOS SPACE SECURITY DIRECTOR Delivers scalable and responsive security management Improves the reach, ease, and accuracy of security policy administration Enables quick and intuitive web-based management of security policy lifecycle IPsec VPN management Network Address Translation (NAT) management Intrusion prevention (IPS) signature management Application- level policy management Firewall management
  • 10. LN2600 RUGGED SECURE ROUTER Single device for routing, switching, and security Environmentally hardened Industry specific certifications Optimized form factors Unified management Flexible power options Secure