Understanding UAC in a Junos OS Environment

A Unified Access Control (UAC) deployment uses the following components to secure a network and ensure that only qualified end users can access protected resources:

An SRX Series or J Series device can act as an Infranet Enforcer in a UAC network. Specifically, it acts as a Layer 3 enforcement point, controlling access by using IP-based policies pushed down from the Infranet Controller. When deployed in a UAC network, an SRX Series or J Series device is called a Junos OS Enforcer. See Figure 38.

Figure 38: Integrating a Junos Security Device into a Unified Access Control Network

Image junos-uac-integration.gif

Note: You can use the Junos OS Enforcer with the Infranet Controller and Secure Access devices in an IF-MAP Federation network. In a federated network, multiple Infranet Controllers and Secure Access devices that are not directly connected to the Junos OS Enforcer can access resources protected by the security device. There are no configuration tasks for IF-MAP Federation on the Junos OS Enforcer. You configure policies on Infranet Controllers that can dynamically create authentication table entries on the Junos OS Enforcer. See the Unified Access Control Administration Guide.

Related Topics