GreekEnglish (UK)

logo 08 13-d

Menu
 Corporate VPN Solutions

Call +302106085599 
29 Perikleous Str. Gerakas, Athens, Greece


junipertech2BsmjuniperGIF

We can provide Corporate VPN solutions of many flavors depending on the functionality and use case.

vpn1

Dynamic VPN (client-to-Site)

Virtual private network (VPN) tunnels enable users to securely access remote assets that reside behind a firewall. Client-to-site VPN tunnels are particularly helpful to remote users such as telecommuters because a single tunnel enables access to all of the resources on a network—the users do not need to configure individual access settings to each application and server.

The dynamic VPN feature (also known as remote access VPN or IPsec VPN client) further simplifies remote access by enabling users to establish Internet Protocol Security (IPsec) VPN tunnels without having to manually configure VPN settings on their PCs or laptops. Instead, authenticated users can simply download the VPN client software and the configuration details from the site to their computers.

 

vpn2

VPN for BYOD

Enabling Secure BYOD and simplified user access for native apps on iOS and Android devices providing also SSO with strong-auth and no AD password, and ensuring uniform compliance policies for datacenter and cloud applications.

Connecting to the cloud directly or via the datacenter by policy based on the user’s role, device compliance, and context and providing uniform enforcement of authorization and compliance in either case. Also ensuring consistent compliance enforcement regardless of device, access method or required service/app.

 

vpn3

Site-to-Site VPN

Junos VPN Site-to-Site utilizes an IPsec VPN tunnel consisting of tunnel setup and applied security. During tunnel setup, the peers establish security associations (SAs), which define the parameters for securing traffic between them.

After the tunnel is established, Junos VPN Site-to-Site protects the traffic sent between the two tunnel endpoints by applying the security parameters defined by the SAs during tunnel setup.

Junos VPN Site-to-Site protects user data via IPsec encryption, and tunnel mode is useful for protecting traffic between different networks when traffic must pass through an intermediate untrusted network.

 

vpn4

Group VPN

Juniper Group VPN is a method of encrypting communication between branch offices or within the data center core that is an alternative to site-to-site VPN over an MPLS network. This approach defines groups of VPN participants (Group Members) where each peer has a single tunnel to a defined group.

The VPN Group is defined and controlled by the Group Controller, which also plays the role of the Key Server (issuing encryption keys for the group). A Group Member is a member of a particular VPN group, and can communicate securely to others in their defined group.

 

 

AutoVPN
vpn5

AutoVPN simplifies the planning, design, and provisioning process by enabling IT to configure the hub just once, even when new spokes are deployed at a later time. Specifically, IT needs to configure the routing, interfaces, Internet Key Exchange (IKE), and IPsec hub settings only once. No subsequent hub configuration changes are needed.

This capability reduces IT effort to save time and costs for configuring the VPN hub-and-spoke devices. By reducing hub configuration for the VPN network to just one time for initial design, AutoVPN reduces the deployment and configuration complexity and risks associated with these changes. AutoVPN enables the automatic acceptance of permissible spokes with zero impact on existing connections. In aggregate, these capabilities reduce the risk of network and security downtime, ensuring business productivity and the delivery of company commitment and service-level agreements (SLAs).

United Telecom ΑΕ is an importer of Juniper Networks Inc. equipment for projects covering integrated secure wired and wireless networks.

Based in Athens, Greece, we are an Accredited Juniper Networks Partner providing secure and flexible solutions for all categories and sizes of Enterprise Networks and Data Centers.


junipertech2Csm
junipertech2Asm

Login or Sign Up