We recently published an illustrated deployment example. The document provides an overview of the Junos Pulse network access security services solution for the federated enterprise. The solution enforces identity-based security policies for LAN access, remote access, and resource access._ The example shows the configuration for a simple federated network we use when evaluating new Junos Pulse features. If you have not already built your own feature evaluation laboratory, you can make use of this example by emulating the network design, downloading the configuration files, and using them as a template for configuration of your own laboratory deployment. _ The example also includes links to related documentation found in the Junos Pulse Access Control Service, Junos Pulse Secure Access Service, Junos Security, and ScreenOS documentation sets, so you can quickly jump to more detailed information, including limitations and options we have not shown. We encourage you to provide feedback, comments, and suggestions so that we can improve the documentation. You can send your comments to [email protected], or fill out the documentation feedback form._ Thank you.
... View more