Home
Juniper SSG 140
Contents
1. The Juniper Networks Secure Services Gateway 140 SSG 140 is a purpose built security appliance that delivers a perfect blend of performance security routing and LAN WAN connectivity for medium sized branch offices and business deployments Traffic flowing in and out of the branch office or business is protected from worms spyware Trojans and malware by a complete set of Unified Threat Management UTM security features that include stateful firewall IPSecurity IPSec virtual private network VPN Intrusion Prevention System IPS antivirus includes anti spyware anti adware anti phishing anti spam and Web Filtering The SSG 140 deployed at a branch office for secure Internet connectivity and site to site VPN to corporate headquarters Internal branch office resources are protected with unique security policies for each security zone Datasheet Juniper Networks SSG 140 Portfolio Description The SSG 140 is a high performance security platform for branch offices and small medium sized standalone businesses that want to stop internal and external attacks prevent unauthorized access and achieve regulatory compliance The SSG 140 isa modular platform that delivers more than 350 Mbps of stateful firewall traffic and 100 Mbps of IPSec VPN traffic Security Protection against worms viruses Trojans spam and emerging malware is delivered by proven Unified Threat Management UTM security features that are ba
2. and manage the deployment Automatically sets up and takes down VPN tunnels between spoke sites in a hub and spoke topology Option Description The SSG 140 is available with either 256 MB or 512 MB of DRAM The SSG 140 can be configured with any combination of the following best in class UTM and content security functionality Antivirus includes anti spyware anti phishing IPS Deep Inspection Web filtering and or anti spam Four SSG 140 interface expansion slots support optional T1 E1 ISDN BRI S T ADSL2 G SHDSL and serial physical interface modules PIMs and 10 100 1000 and SFP universal PIMs uPIMs Bridge groups supported only on uPIMs in ScreenOS 6 0 and greater releases UPIMs are only supported in ScreenOS 6 0 or greater releases Benefit Delivers performance headroom required to protect against internal and external attacks now and into the future Ensures that the network is protected against all manner of attacks Stops viruses spyware adware and other malware Blocks unwanted email from known spammers and phishers Controls blocks access to malicious Web sites Prevents application level attacks from flooding the network Provides high speed LAN connectivity future connectivity and flexible management Powerful capabilities facilitate deploying security for various internal external and DMZ sub groups on the network to prevent unauthorized access Enables the deployment of c
3. 10 Technology Park Drive Westford MA 01886 3146 USA Phone 978 589 5800 Fax 978 589 0800 ASIA PACIFIC REGIONAL SALES HEADQUARTERS Juniper Networks Hong Kong Ltd 26 F Cityplaza One 1111 King s Road Taikoo Shing Hong Kong Phone 852 2332 3636 Fax 852 2574 7803 To purchase Juniper Networks solutions please contact your Juniper Networks sales representative at 1 866 298 6428 or authorized reseller
4. temperature 4 to 158 F 20 to 70 C Humidity 10 to 90 noncondensing 1 Performance capacity and features listed are based upon systems running ScreenOS 6 1 and are the measured maximums under ideal testing conditions unless otherwise noted Actual results may vary based on ScreenOS release and deployment For a complete list of supported ScreenOS versions for SSG platforms please visit the Juniper Customer Support Center http www juniper net customers support and click on ScreenOS Software Downloads 2 IMIX stands for Internet mix and is more demanding than a single packet size as it represents a traf fic mix that is more typical of a customer s network The IMIX traffic used is made up of 58 33 64 byte packets 33 33 570 byte packets 8 33 1518 byte packets of UDP traffic 3 UTM Security features IPS Deep Inspection antivirus anti spam and Web filtering are delivered by annual subscriptions purchased separately from Juniper Networks Annual subscriptions provide signature updates and associated support The high memory option is required for UTM Security features 4 Redirect Web filtering sends traffic from the firewall to a secondary server The redirect feature is free however it does require the purchase of a separate Web filtering license from either Websense or SurfControl 5 NAT PAT policy based NAT virtual IP mapped IP virtual systems virtual routers VLANs OSPF BGP RIPv2 active active HA an
5. 00 Copper Universal PIM 16 Port Gigabit Ethernet 10 100 1000 Copper Universal PIM Unified Threat Management Content Security High Memory Option Required Antivirus Anti spyware Anti phishing IPS Deep Inspection Anti spam Web filtering Remote Office Bundle AV IPS WF Main Office Bundle AV IPS WF AS uPIMs are only supported in ScreenOS 6 0 or greater releases JXU 8GE TX S JXU 16GE TX S Part Number NS K AVS SSG140 NS DI SSG140 NS SPAM SSG140 NS WF SSG140 NS RBO CS SSG140 NS SMB CS SSG140 SSG 140 Memory Upgrades Spares and Communications Cables 512 MB DIMM Memory upgrade Power Cable Australia Power Cable China Power Cable Europe Power Cable Italy Power Cable Japan Power Cable UK Power Cable US Blank 1 0 plate EIA530 cable DTE RS232 cable DTE RS449 cable DTE V 35 cable DTE X 21 cable DTE Type of Attack Object Range of signatures and protocol Attacks in the server to client direction Attacks in the client to server direction Worms Trojans backdoor attacks Part Number SSG 100 MEM 512 CBL JX PWR AU CBL JX PWR CH CBL JX PWR EU CBL JX PWR IT CBL JX PWR JP CBL JX PWR UK CBL JX PWR US JX Blank FP S JX CBL EIA530 DTE JX CBL RS232 DTE JX CBL RS449 DTE JX CBL V35 DTE JX CBL X21 DTE Note The appropriate power cord is included based upon the sales order Ship To destination About Juniper Networks Juniper Networks Inc is the leader in high performance n
6. OS 6 0 and greater releases Specifications IPv6 Dual stack IPv4 IPv6 firewall and VPN Yes IPv4 to from IPv6 translations and encapsulations Yes Syn Cookie and Syn Proxy DoS Attack Detection Yes SIP RTSP Sun RPC and MS RPC ALG s Yes RIPng Yes Mode of Operation Layer 2 transparent mode Yes Layer 3 route and or NAT mode Yes Address Translation Network Address Translation NAT Yes Port Address Translation PAT Yes Policy based NAT PAT Yes Mapped IP MIP 1 000 Virtual IP VIP 16 MIP VIP Grouping Yes IP Address Assignment Static Yes Dynamic Host Configuration Protocol DHCP Point to Point Protocol over Ethernet PPPoE client Yes Internal DHCP server Yes DHCP relay Yes Traffic Management Quality of Service QoS Guaranteed bandwidth Yes per policy Maximum bandwidth Yes per policy Ingress traffic policing Yes Priority bandwidth utilization Yes Differentiated Services marking Yes per policy High Availability HA Active active L3 mode Yes Active passive Transparent amp L3 mode Yes Configuration synchronization Yes Session synchronization for firewall and VPN Yes Session failover for routing change Yes VRRP Yes Device failure detection Yes Link failure detection Yes Authentication for new HA members Yes Encryption of HA traffic Yes System Management WebUI HTTP and HTTPS Yes Command line interface console Yes Command line interface telnet Yes Command line interface SSH
7. Yes v1 5 and v2 0 compatible NetScreen Security Manager Yes All management via VPN tunnel on any interface Yes Rapid deployment No Administration Local administrator database size 20 External administrator database support RADIUS RSA SecurelD LDAP Restricted administrative networks 6 Root Admin Admin and Read Only user levels Yes Software upgrades TFTP WebUI NSM SCP USB Configuration roll back Yes Logging Monitoring System log multiple servers Yes up to 4 servers Email 2 addresses Yes NetIQ WebTrends Yes SNMP v2 Yes SNMP full custom MIB Yes Traceroute Yes VPN tunnel monitor Yes External Flash Additional log storage USB 1 1 Event logs and alarms Yes System configuration script Yes ScreenOS Software Yes Dimensions and Power Dimensions W x H x D 17 5 x 1 8 x 15 in 44 5 x 4 5 x 38 1 cm Weight 10 2 Ib 4 63 kg Rack mountable Yes 1RU Power supply AC 100 240 VAC AC Input line frequency 50 or 60 Hz AC system current rating 2 A Maximum thermal output 580 BTU hour 170 W Certifications Safety certifications UL CUL CSA CB Electromagnetic compatibility EMC certifications FCC class B CE class B Network Equipment Building System NEBS No Mean time between failures MTBF Bellcore model 16 years Security Certifications Common Criteria EAL4 Future FIPS 140 2 Level 2 Future ICSA Firewall and VPN Yes Operating Environment Operating temperature 32 to 122 F 0 to 50 C Non operating
8. cked by best in class partners To address internal security requirements and facilitate regulatory compliance the SSG 140 supports an advanced set of network protection features such as security zones virtual routers and VLANs that allow administrators to divide the network into distinct secure domains each with its own unique security policy Policies protecting each security zone can include access control rules and inspection by any of the supported UTM security features Connectivity and Routing The SSG 140 supports ten on board interfaces 8 10 100 plus 2 10 100 1000 complemented by four I O expansion slots that can house additional WAN interfaces T1 E1 ISDN BRI S T and Serial making the SSG 140 the most extensible security platform in its class This broad array of I O options coupled with WAN protocol and encapsulation support in its routing engine make the SSG 140 a platform that can easily be deployed as a traditional branch office router or as a consolidated security and routing device to reduce CAPEX and OPEX Access Control Enforcement The SSG 140 can act as an enforcement point in a Juniper Networks Unified Access Control deployment with the simple addition of the Infranet Controller The Infranet Controller functions as a central policy management engine interacting with the SSG 140 to augment or replace the firewall based access control with a solution that grants denies access based on more granular criteria that include en
9. d IP address assignment are not available in layer 2 transparent mode IPS Deep Inspection firewall Signature Packs Signature Packs provide the ability to tailor the attack protection to the specific deployment and or attack type The following Signature packs are available for the SSG 140 Signature Pack Target Deployment Base Branch offices small medium businesses Client Remote branch offices Server Small medium businesses Worm Mitigation Remote branch offices of large enterprises Ordering Information SSG 140 SSG 140 with 256 MB memory O PIM cards AC power SSG 140 with 512 MB memory O PIM cards AC power SSG 140 1 0 Options 1 Port ISDN BRI S T PIM 2 Port E1 PIM with integrated CSU DSU 2 PortT1 PIM with integrated CSU DSU 2 Port Serial PIM 1 Port ADSL 2 2 Annex A PIM 1 Port ADSL 2 2 Annex B PIM 1 Port G SHDSL PIM 6 Port SFP Gigabit Ethernet Universal PIM Defense Type Perimeter defense compliance for hosts Client server and worm protection anomalies for example desktops Perimeter defense compliance for server infrastructure Most comprehensive defense against worm attacks Part Number SSG 140 SB SSG 140 SH Part Number JX 1BRI ST S JX 2E1 RJ48 S JX 2T1 RJ48 S JX 2Serial S JX 1ADSL A S JX 1ADSL B S JX 2SHDSL S JXU 6GE SFP S 1 Port SFP 100 Mbps or Gigabit Ethernet Universal PIM SFP sold separately JXU 1SFP S 8 Port Gigabit Ethernet 10 100 10
10. dpoint state and user identity in order to accommodate the dramatic shifts in attack landscape and user characteristics World Class Support From simple lab testing to major network implementations Juniper Networks Professional Services will collaborate with your team to identify goals define the deployment process create or validate the network design and manage the deployment to its successful conclusion Features and Benefits Feature High performance Best in class UTM security features Integrated antivirus Integrated anti spam Integrated Web filtering Integrated IPS Deep Inspection Fixed Interfaces Network segmentation Robust routing engine High interface density Interface modularity Management flexibility Juniper Networks Unified Access Control enforcement point World class professional services Auto Connect VPN Product Options Option DRAM Unified Threat Management Content Security high memory option required 1 0 options Feature Description Purpose built platform is assembled from custom built hardware powerful processing and a security specific operating system UTM security features antivirus anti spam Web filtering IPS stop all manner of viruses and malware before they damage the network Annually licensed antivirus engine provided by Juniper is based on Kaspersky Lab engine Annually licensed anti spam offering provided by Juniper is based on Syman
11. etworking Juniper offers a high performance network infrastructure that creates a responsive and trusted environment Juniper NETWORK for accelerating the deployment of services and applications over a single network This fuels high performance businesses Additional information can be found at www juniper net CORPORATE HEADQUARTERS AND SALES HEADQUARTERS FOR NORTH AND SOUTH AMERICA Juniper Networks Inc 1194 North Mathilda Avenue Sunnyvale CA 94089 USA Phone 888 JUNIPER 888 586 4737 or 408 745 2000 Fax 408 745 2100 www juniper net EUROPE MIDDLE EAST AFRICA REGIONAL SALES HEADQUARTERS Juniper Networks UK Limited Building 1 Aviator Park Station Road Addlestone Surrey KT15 2PG U K Phone 44 0 1372 385500 Fax 44 0 1372 385501 Copyright 2008 Juniper Networks Inc All rights reserved Juniper Networks the Juniper Networks logo NetScreen and ScreenOS are registered trademarks of Juniper Networks Inc in the United States and other countries JUNOS and JUNOSe are trademarks of Juniper Networks Inc All other trademarks service marks registered trademarks or registered service marks are the property of their respective owners Juniper Networks assumes no responsibility for any inaccuracies in this document Juniper Networks reserves the right to change modify transfer or otherwise revise this publication without notice 100181 007 Feb 2008 EAST COAST OFFICE Juniper Networks Inc
12. face Module PIM slots 4 Modular WAN LAN interface options PIMs uPIMs 2xT1 2xE1 2xSerial 1xISDN BRI S T SFP 10 100 1000 Firewall Network attack detection Yes DoS and DDoS protection Yes TCP reassembly for fragmented packet protection Yes Brute force attack mitigation Yes SYN cookie protection Yes Zone based IP spoofing Yes Malformed packet protection Yes Unified Threat Management IPS Deep Inspection firewall Yes Protocol anomaly detection Yes Stateful protocol signatures Yes IPS DI attack pattern obfuscation Yes Antivirus Yes Signature database 200 000 Protocols scanned POP3 HTTP SMTP IMAP FTP IM Anti spyware Yes Anti adware Yes Anti keylogger Yes Instant message AV Yes Anti spam Yes Integrated URL filtering Yes External URL filtering Yes Voice over IP VoIP Security H 323 Application level gateway ALG Yes SIP ALG Yes MGCP ALG Yes SCCP ALG Yes Network Address Translation NAT for VoIP protocols Yes IPSec VPN Concurrent VPN tunnels 150 Tunnel interfaces 50 DES encryption 56 bit 3DES encryption 168 bit and AES 256 bit Yes MD 5 and SHA 1 authentication Yes Manual key Internet Key Exchange IKE IKEv2 with EAP public key infrastructure PKI X 509 Yes Perfect forward secrecy DH Groups T25 Prevent replay attack Yes IPSec VPN cont d Remote access VPN Layer 2 Tunneling Protocol L2TP within IPSec IPSec Network Address Translation NAT traversal Auto Connect VPN Redu
13. ndant VPN gateways User Authentication and Access Control Built in internal database user limit Third party user authentication RADIUS Accounting XAUTH VPN authentication Web based authentication 802 1X authentication Unified Access Control UAC enforcement point PKI Support PKI certificate requests PKCS 7 and PKCS 10 Automated certificate enrollment SCEP Online Certificate Status Protocol OCSP Certificate Authorities supported Self signed certificates Virtualization Maximum number of security zones Maximum number of virtual routers Bridge groups Maximum number of VLANs Routing BGP instances BGP peers BGP routes OSPF instances OSPF routes RIPv1 v2 instances RIP v2 routes Static routes Source based routing Policy based routing Equal cost multipath ECMP Multicast Reverse Forwarding Path RFP Internet Group Management Protocol IGMP v1 v2 IGMP Proxy Protocol Independent Multicast PIM single mode PIM source specific multicast Multicast inside IPSec tunnel Encapsulations Point to Point Protocol PPP Multilink Point to Point Protocol MLPPP MLPPP max physical interfaces Frame relay Multilink Frame Relay MLFR FRF 15 FRF 16 MLFR max physical interfaces HDLC RADIUS RSA SecurelD LDAP Yes start stop Yes Yes Yes Yes Yes Verisign Entrust Microsoft RSA Keon iPlanet Netscape Baltimore DOD PKI Yes Bridge groups supported only on uPIMs in Screen
14. onsolidated security and routing device thereby lowering operational and capital expenditures Provides unmatched interface density when compared to competitive offerings Delivers LAN and WAN connectivity options on top of unmatched security to reduce costs and extend investment protection Enables management access from any location eliminating on site visits thereby improving response time and reducing operational costs Improves security posture in a cost effective manner by leveraging existing customer network infrastructure components and best in class technology Transforms the network infrastructure to ensure that it is secure flexible scalable and reliable Provides a scalable VPN solution for mesh architectures with support for latency sensitive applications such as VoIP and video conferencing Applicable Products SSG 140 SSG 140 high memory model only SSG 140 Specifications Maximum Performance and Capacity ScreenOS version tested ScreenOS 6 1 Firewall throughput large packets 350 Mbps Firewall throughput IMIX 300 Mbps Firewall packets per second 64 byte 100 000 PPS Advanced Encryption Standard AES 256 SHA 1 VPN throughput 100 Mbps 3DES encryption SHA 1 VPN throughput 100 Mbps Maximum concurrent sessions 48 000 New sessions second 8 000 Maximum security policies 1 000 Maximum users supported Unrestricted Network Connectivity Fixed 1 0 8x10 100 2x10 100 1000 Physical Inter
15. tec technology Annually licensed Web filtering solution provided by Juniper is based on SurfControl s technology Annually licensed IPS engine Eight fixed 10 100 interfaces and two 10 100 1000 interfaces one USB port one console port and one auxiliary port Bridge groups security zones virtual LANs and virtual routers allow administrators to deploy security policies to isolate guests wireless networks and regional servers or databases Proven routing engine supports OSPF BGP and RIP v1 2 along with Frame Relay Multilink Frame Relay PPP Multilink PPP and HDLC Eight 10 100 plus two 10 100 1000 interfaces plus a console and an Aux interface for management Four SSG 140 interface expansion slots support optional T1 E1 ISDN BRI S T ADSL2 G SHDSL and serial physical interface modules PIMs and 10 100 1000 and SFP universal PIMs uPIMs Use any one of three mechanisms CLI WebUI or Juniper Networks NetScreen Security Manager to securely deploy monitor and manage security policies Interacts with the centralized policy management engine Infranet Controller to enforce session specific access control policies using criteria such as user identity device security state and network location From simple lab testing to major network implementations Juniper Networks Professional Services will collaborate with your team to identify goals define the deployment process create or validate the network design
Download Pdf Manuals
Related Search
Related Contents
Toshiba Satellite E45-B4100 61-20-00 CONTROLLING OWNER`S MANUAL MANUEL D`UTILISATEUR MANUAL Embosser Module Replacement Procedure BALANCE PROFESSIONNEL ÉLECTRONIQUE MOD. RB Samsung NP-Q1EX User Manual (Vista) Copyright © All rights reserved.
Failed to retrieve file