Juniper Networks Secure Access 700

Similar documents
VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES

The SonicWALL SSL-VPN Series

Cisco 526 Wireless Express Mobility Controller

Cisco RV 120W Wireless-N VPN Firewall

VIP 10 Single-channel MPEG-4 Video Encoder or Decoder

EX2500 ETHERNET SWITCHES

APC Back-UPS - Floor Style

PIN Entry & Management

TEAM Standard Commissioning Plus Assessment

Product Description. Product Overview. Architecture and Key Components of the MAG Series Junos Pulse Gateways

device management solution

ARUBA RAP-3 REMOTE ACCESS POINT

Product Overview. General Description CHAPTER

Indy Reader Chip Family

Coordinated Threat Control

Compact Laser All-in-Ones for your Small Office

Meet the Mesa Rugged Notepad featuring the advantages of both a tablet PC and a rugged handheld computer, without the disadvantages of either.

3Com Wireless Bluetooth PC Card, USB Adapter, and Printer Adapter

Sleek yet Semi-rugged! BM-170. Enterprise Handheld PDA. Handheld

Edgeport USB-to-Serial Converters

The SonicWALL PRO Series

Rugged All-in-one Handheld Computer. BIP-1500 Series

CRESCENDO SERIES Smart Cards. Smart Card Solutions

The EXTender/PBXgateway Product Suite Simplified Voice Networking for Distributed Enterprises

Product Description. Product Overview. Architecture and Key Components of the MAG Series Junos Pulse Gateways

YOUR VISION OUR POWERFUL LE1700 TABLET PC. The Motion LE1700 is powered by the Intel Core 2 Duo processor.

Multi-Technology Proximity Reader

PHOTOELECTRIC S300 PA MAXI SENSORS APPLICATIONS.

One Release. One Architecture. One OS. High-Performance Networking for the Enterprise with JUNOS Software

Secure Remote Access with Comprehensive Client Certificate Management

Comprehensive Network Access Control Based on the Network You Have Today. Juniper Networks Unified Access Control

Cisco SR 520-T1 Secure Router

Smart and Flexible! BIP-7000 Series. Industrial Handheld Computer. BIP-7000Plus BIP-7000

AP-5181 Access Point Enterprise-class a/b/g outdoor access point

FLEXIBLE, POWERFUL ALL-IN-ONE TOWER COMPUTING

Multi-ISO HF RFID reader for Motorola MC70/75/75A Terminal

PC/Windows Compatible. Foreign Language Layouts Available. Ergonomic Design

CISCO 7304 SERIES ROUTER PORT ADAPTER CARRIER CARD

Product Description. Architecture and Key Components of the MAG Series Junos Pulse Gateways. Product Overview DATASHEET

NTSC/PAL. Color Video Cameras. SSC-E450 Series SSC-E453 SSC-E453P SSC-E458P

Enterprise Guest Access

BlueSecure TM. Access Points

The HL-3000 Series Compact, Digital Color Printers with Networking

Enterprise RFID Reader High Performance, Easy to Deploy, Easy to Manage

Single Channel FM Video Transmission System 850 nm Multimode Low Profile

The Industry Standard! BIP-1300 Series. Mobile POS. Handheld Payment RFID Barcode

ZoneDirector 5000 Scalable Enterprise Class Smart WLAN Controller

JUNOS SPACE ROUTE INSIGHT

WHITE PAPER. Copyright 2010, Juniper Networks, Inc. 1

Picking. Packing. Stock replenishment. Shipping. Inventory tracking.

Zebra Kiosk. Help Yourself to a Versatile Printing.

NX 9500 INTEgraTED SERvICES PlatfORm SERIES for THE PRIvaTE ClOUD

white paper SMS Authentication: 10 Things to Know Before You Buy

Cisco NAC Network Module for Integrated Services Routers

Alcatel OmniAccess 200 Series

ZoneDirector 1100 Enterprise-Class Smart Wireless LAN Controller

Secure Card Reading and PIN Solutions

E70 EntryCheck TM Electronic Lock

USER-FRIENDLY CONTROL PANEL

HP ProCurve Network Access Controller 800

A pex II. The Portable. Data Collection. Solution

BreezeMAX. taking WiMAX further

WX Client. Product Description. Product Overview DATASHEET

PANORAMA. Key Security Features

Digital Video Recorders

Juniper Networks Adaptive Threat Management Solutions

DESIGN YOUR WORLD IN A CARD

Symantec Network Security 7100 Series

Juniper Networks M-series and J-series Routers. M10i. Solution Brochure J4350. Internet. Regional Office/ Medium Central Site. Branch Office J2320

Cisco WVC210 Wireless-G Pan Tilt Zoom (PTZ) Internet Video Camera: 2-Way Audio Cisco Small Business Video Surveillance Cameras

NSG50/100/200 Nebula Cloud Managed Security Gateway

Genuine Zebra Mobile Accessories

Campus Manager. Out-of-Band Network Access Control for Wired, Wireless and VPN Networks. DataSheet

SAS and F5 integration at F5 Networks. Updates for Version 11.6

NSG100 Nebula Cloud Managed Security Gateway

Cisco TelePresence Video Communication Server Starter Pack Express Bundle

Juniper Networks NetScreen-5GT Series

J-Care Agility Services Advanced Options

Next Level Remote Access

Cisco Catalyst Express 520 Series Switches

Full-featured, cost-effective video encoders with H.264.

Symantec Network Access Control Starter Edition

PRODUCT GUIDE. Single Line, Hand-Held, 1D, High-Density 1D, PDF-417 2D and Wireless Laser Bar Code Scanners MS9500 SERIES VOYAGER.

HySecure Quick Start Guide. HySecure 5.0

MultiModem External Wireless Modem EDGE. Benefits. Features

802.1X: Port-Based Authentication Standard for Network Access Control (NAC)

Sentriant. Voice-Class Availability. Hyper Detection and Active Deception. Surgical Defense. Types Of Threats. Extreme Networks Data Sheet

Networks with Cisco NAC Appliance primarily benefit from:

Data Sheet Fujitsu ETERNUS DX80 S2 Disk Storage System

WX CENTRAL MANAGEMENT SYSTEM

Architecture and Key Components

STORAGETEK SL150 MODULAR TAPE LIBRARY

Juniper Networks IDP 75/250/800/8200

Data Sheet Fujitsu ETERNUS DX500 S3 Disk Storage System

Cisco Aironet 1230AG Series A/B/G Access Point

Data Sheet Fujitsu ETERNUS DX400 S2 Series Disk Storage Systems

CONFIGURING THE CX111 FOR THE SSG SERIES

PANORAMA. Figure 1: Panorama deployment

STORAGETEK SL150 MODULAR TAPE LIBRARY

Codian IP VCR IP VCR 2200 Series

Transcription:

Juniper Networks Secure Access 700 Page Datasheet The Juniper Networks Secure Access 700 (SA 700) SSL VPN appliance provides small to medium enterprises a secure, cost-effective way to deploy remote access to the corporate network. Because the SA 700 uses Secure Sockets Layer (SSL) to provide encrypted transport, it enables instant remote access from just a Web browser. This clientless architecture eliminates the high cost of installing, configuring, and maintaining client software on every device, significantly reducing the total cost of ownership versus traditional VPN solutions. SSL delivery also eliminates the Network Address Translation (NAT) and firewall traversal issues encountered with traditional remote access products, allowing your remote users reliable and ubiquitous access from external networks such as home or hotels. The SA 700 comes standard with Juniper Networks Network Connect access method, which creates a secure network-layer connection via a lightweight, cross-platform dynamic download. The SA 700 can also be upgraded to include Juniper s Core Clientless access method, which enables connections from any PC anywhere to Web-enabled applications, including those with XML and Flash content, files, standards-based email, and telnet/ssh sessions. Built on Juniper s market-leading Instant Virtual Extranet (IVE) platform, the Secure Access 700 series delivers enterprise-strength AAA (authentication, authorization, auditing) and comprehensive endpoint defense. Value Summary Lower Total Cost of Ownership Dependable technology tailored to the needs of small to mid-sized enterprises by the SSL VPN market leader Juniper Networks Plug-n-play appliance that installs in minutes with minimal IT knowledge required No client software deployment or maintenance users only need an internet connection for access Simple end user and administrator interfaces facilitate quick and easy use Improved productivity for remote employees No network interoperability issues End-to-End Security Complete, secure access to LAN resources, ensuring that the endpoint device, data in transit, and internal resources are secure Seamless integration with broad range of authentication methods and protocols Juniper s Endpoint Defense Initiative includes native functionality, client- and server-side APIs and advanced malware protection capabilities for effective enforcement and unified administration of best-of-breed endpoint security Lower Total Cost of Ownership The Secure Access 700 deploys quickly and easily and does not require the costly deployment and maintenance of individual client software on each device. The SA 700 delivers an appliance tailored to the specific needs of small to mid-sized companies, in an affordable plug-n-play form factor. Uses SSL, available in all standard Web browsers No end-user client to install Leverages existing security infrastructure Interoperation with external networks eliminating issues with network address translation (NAT) or firewall traversal Desktop or 1U rack-mountable form factor Individual models provide support for 10 or 25 concurrent users Enables secure remote access from any browser Requires no changes to existing network infrastructure Eliminates the cost and complexity associated with maintaining installed clients on user PCs Supports multiple operating systems, including Windows, Linux, Mac, PocketPC and more Add new users or access to new applications with just a few clicks Integrates with existing user directories Fully compatible with a broad range of authentication methods and protocols Improves user experience by simplifying access to internal resources from external networks Reduces costly support calls Runs quietly on desktop if no server rack available Offers customers the flexibility to purchase according to their capacity requirements and budgetary limitations

Page 2 End-to-End Layered Security The SA 700 series provides complete end-to-end layered security, ensuring that the endpoint device, data in transit, and internal resources are secure. The SA 700 integrates seamlessly with a broad range of authentication methods and protocols and its hardened architecture effectively protects internal resources. Security features include: Native Host Checker Host Checker API Host Check Server Integration API Hardened security appliance and Web server Security services employ kernel-level packet filtering and safe routing Cache Cleaner Support for strong authentication methods and protocols including RADIUS, LDAP, PKI, Active Directory, RSA/Secure ID Auditing and logging Malware protection Client computers can be checked at the beginning and throughout the session to verify an acceptable security posture requiring or restricting network ports; checking files/process and validating their authenticity with MD5 hash checksums. Performs version checks on security applications, and carries out pre-authentication checks and enforcement. Enables enterprises to write their own host check method to customize the policy checks. Resource access policy for non-compliant endpoints is configurable by administrator. Created in partnership with best-of-breed endpoint security vendors, enables enterprises to enforce an endpoint trust policy for managed PCs that have personal firewall, antivirus clients, or other installed security clients, and quarantine non-compliant endpoints Enables enterprises to deliver and update third party security agents from the SA 700, which reduces public-facing infrastructure, enables consolidated reporting of security events, and enables policy-based remediation of non-compliant clients Purpose-built hardware appliance and hardened security infrastructure, with no general purpose services, system-level user accounts, or interactive shell Ensures that unauthenticated connection attempts, such as malformed packets or DOS attacks are filtered out All proxy downloads and temp files installed during the session are erased at logout, ensuring that no data is left behind Enables enterprise-strength authentication via optional integration with directories, PKI, and leading multi-factor authentication systems. Allows administrators to establish dynamic authentication policies for each user session, based on user/device/network attributes and specific login conditions, including an optional pre-authentication assessment to examine the client s security state before the login page is presented. Also includes a secure internal user database for enterprises that have not deployed 3rd party authentication. Full auditing and logging capabilities in a clear, easy-to-understand format, simplifying configuration, assessment and troubleshooting Enables customers to provision endpoint containment capabilities and secure the endpoint either prior to granting access or during the user session for comprehensive network protection Ease of Use The SA 700 features a user-friendly Web-based interface and streamlined administration making it easy to use and administer. Streamlined administration process designed specifically for small/medium enterprises Dynamically provisioned user connectivity Simple, Web-based interfaces Instant deployment and activation requires minimal IT knowledge At login, end users are immediately provisioned full connectivity as if running on the LAN, while important layered security functions run transparently. Users provisioned using the Core Clientless access method upgrade are restricted to administrator configurable Web-based applications Both the end user and administrator interfaces are simple and Web-based, facilitating quick and easy use Provision by Purpose The Secure Access 700 includes two different access methods. These different methods are selected as part of the user s role, so the administrator can enable the appropriate access on a per-session basis, taking into account user, device, and network attributes in combination with enterprise security policies. Network Connect Clientless Core Web access (Available as an upgrade) Provides complete network-layer connectivity via an automatically provisioned cross-platform download Users need only a Web browser. Network Connect transparently selects between two possible transport methods, to automatically deliver the highest performance possible for every network environment Access to Web-based applications, including complex JavaScript, XML or Flash-based apps and Java applets that require a socket connection, as well as standards-based e-mail, files and telnet/ssh hosted applications Core Web access also enables the delivery of Java applets directly from the Secure Access appliance Provides the most easily accessible form of application and resource access, and enables extremely granular security control options

Page 3 Datasheet Specifications Upgrade Options Software Core Clientless Access Upgrade Option Technical Specifications SA 700 Dimensions: 17.25 W x 1.74 H x 9 D (43.80cmW x 4.41cmH x 22.86cmD) Weight: 10lb (4.53 kg) typical (unboxed) Material: 18 gauge (.048 ) aluminum Fans: 1 ball-bearing inlet fan, plus 1 CPU blower Panel Display Front Panel Power Switch Power LED Access LED (drive access) Ports Network Two RJ-45 Ethernet 10/100 full or half-duplex (auto-negotiation) IEEE 802.3 compliant Console One 9-pin serial console port Power Input Voltage and Current 90-264 VAC Full Range 4A (RMS) at 90 VAC 2A (RMS) at 264 VAC Input Frequency 47-63Hz Efficiency 65% min, at full load Output power 220w Power Supply MTBF 100,000 hours at 25 C Ordering Information Secure Access 700 Base System SA700 Secure Access 700 Base System Secure Access 700 User Licenses SA700-ADD-10U Add 10 simultaneous users to SA 700 SA700-ADD-15U Add 15 simultaneous users to SA 700 SA700-ADD-25U Add 25 simultaneous users to SA 700 Secure Access 700 Feature Licenses SA700-CORE Core Clientless Web Access for SA 700 Environmental Temperature Range Operating: 5C to 30C (41F to 86F) Operating (short-term): 0C to 50C (32F to 122F) Non-Operating: -30C to 60C (-22F to 140F) Relative Humidity (Operating) 20% to 80% noncondensing Relative Humidity (Non-Operating) 5% to 95% noncondensing Altitude: to 10,000 ft (3,000m) Shock Operating: 2G at 11ms Non-Operating: 30G at 11ms Safety and Emissions Certification Safety: UL (UL 60950-1 First Edition: 2003) CUL (CAN/CSA-C22.2 No. 60950-1-03 First Edition) TUV GS (EN 60950-1:2002) AS/NZS CISPR 22: 2002, Class B Emissions: FCC Class B, VCCI Class B, CE class B

Page 4 CORPORATE HEADQUARTERS AND SALES HEADQUARTERS FOR NORTH AND SOUTH AMERICA EAST COAST OFFICE Juniper Networks, Inc. 10 Technology Park Drive ASIA PACIFIC REGIONAL SALES HEADQUARTERS Juniper Networks (Hong Kong) Ltd. EUROPE, MIDDLE EAST, AFRICA REGIONAL SALES HEADQUARTERS Juniper Networks (UK) Limited Copyright 2005, Juniper Networks, Inc. All rights reserved. Juniper Networks and the Juniper Networks logo are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered trademarks, or registered service marks in this document are the property of Juniper Networks or their respective owners. All specifications are subject to change without notice. Juniper Networks assumes no responsibility for any Juniper Networks, Inc. 1194 North Mathilda Avenue Westford, MA 01886-3146 USA Phone: 978-589-5800 Suite 2507-11, Asia Pacific Finance Tower Citibank Plaza, 3 Garden Road Juniper House Guildford Road inaccuracies in this document or for any obligation to update information in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Sunnyvale, CA 94089 USA Fax: 978-589-0800 Central, Hong Kong Leatherhead Phone: 888-JUNIPER (888-586-4737) Phone: 852-2332-3636 Surrey, KT22 9JH, U. K. or 408-745-2000 Fax: 852-2574-7803 Phone: 44(0)-1372-385500 Fax: 408-745-2100 Fax: 44(0)-1372-385501 www.juniper.net 100124-003 Nov 2005

BarcodesInc 200 West Monroe Street Chicago, Illinois 60606 Phone: 1-800-351-9962 Fax: 1-312-212-1800 www.barcodesinc.com About BarcodesInc BRANDS Who We Are BarcodesInc is North America's leading provider of p We Owe Our Success To You Why Choose BarcodesInc? Dedicated Account Our Account Managers will not compromise when it comes to providing you top-notch service. Your Account Manager is the primary point of contact for your business and makes it a priority to get to know you, your company and all your needs. Highly-Trained Technical Support Our technical staff has the broadest knowledge and every significant certification in the industry. One of our friendly experts is always available to suggest products and solutions for any situation. Incredible Value Our purchasing power means big savings for you. Whatever your project, our team will work hard to deliver a solution that fits your budget. Largest Inventory in the Industry and Same-Day Shipping Whatever your barcoding, mobile computing, or printing needs, we will fill your order and ship it the same Premier Access to Top Manufacturers BarcodesInc maintains strong strategic partnerships with the leading manufacturers in barcoding, mobile computing, printing and RFID. Responsive Customer Service Every phone call and email is responded to promptly, completely and accurately by our customer service Easy Returns Damaged, defective or incorrectly ordered goods may be returned without hassle. AND MORE BarcodesInc 200 West Monroe Street, Chicago, IL 60606 T: 1-800-351-9962 F: 1-312-212-1800 www.barcodesinc.com