ANEXO 1: Glosario de Términos Se presenta en este

ANEXO 1: Glosario de Términos Se presenta en este

 

ANEXO 1: Glosario de Términos

Se presenta en este anexo el glosario de términos técnicos utilizados en la elaboración de esta tesis.

AMENAZA

Es un peligro potencial para la información o sistemas. Puede utilizar una vulnerabilidad para dañar una empresa o individuo.

ANTISPAM

Es el método para evitar que correo electrónico de tipo “spam” o “correo basura” no llegue a la casilla de correo electrónico de los usuarios.

APPLIANCE

Equipo o sistema de cómputo que se vende listo para usar, en donde el hardware y software están previamente configurados y usualmente utiliza un sistema operativo propietario.

ATAQUE

Es la ejecución de una amenaza. Y puede ser de cuatro tipos. Interrupción, que corresponde a detener el flujo de la información. Intercepción, que corresponde a capturar parte de la información que fluye o está en un repositorio. Modificación, que corresponde a modificar el comportamiento de un sistema o información y

Fabricación, que corresponde a falsificar información o una identificación.

CONFIDENCIALIDAD DE LA INFORMACIÓN

Provee la habilidad de asegurar el nivel de acceso a cierta información y previene accesos no autorizados.

CONTRAMEDIDA

Reduce el riesgo de que una vulnerabilidad pueda ser explotada. Las contramedidas que consideramos en la presente investigación son los antivirus, firewalls, redes privadas virtuales, control de acceso y autenticación fuerte.

CONTROLADOR DE DOMINIO

Es el corazón del servicio de directorio de Microsoft. Entre sus funciones están la autenticación de los usuarios, que es que proceso de garantizar o denegar a un usuario el acceso a recursos de una red Microsoft.

COOKIE:

 

 

Archivo que se almacena en el disco duro de una computadora para guardar información de un visitante a un sitio web.

DIRECTORIO ACTIVO

Es la versión propietaria del servicio de directorio LDAP desarrollada por Microsoft para su plataforma Windows. Tiene la función de almacenar de manera centralizada y organizada, la información de una empresa. El directorio activo permite establecer políticas a nivel de empresa, desplegar programas y configuraciones de manera global.

DISPONIBILIDAD DE LA INFORMACIÓN

Busca que los sistemas vuelvan a funcionar en el menor tiempo posible y con la mayor cantidad de sus funcionalidades ante cualquier contrariedad.

EXPLOIT

Programa o software que explota la vulnerabilidad de otro programa o sistema para acceder al mismo de forma no autorizada y causar un comportamiento imprevisto.

GRANULARIDAD

Término que refiere a que tan específico de define el nivel de detalle de una política de seguridad. A mayor granularidad, mayor nivel de detalle.

INTEGRIDAD DE LA INFORMACIÓN

Asegura que la información del sistema sea correcta y consistente. Previene la modificación no autorizada de la información.

MALWARE

Programa, software o código malicioso cuyo objetivo es causar daños a una computadora, sistema o red.

NAT

(Network Address Translation). Traducción en tiempo real de las direcciones IP utilizadas en los paquetes que transportan los dispositivos de ruteo como routers o firewalls, cuando cruzan de una red a otra. Existen dos tipos de NAT: estático y dinámico. El NAT estático permite asociar una a una (1:1) una dirección IP de un segmento a otra de un segundo segmento de manera bidireccional. Una NAT dinámica traslada varias direcciones IP de un segmento a otra, en un único sentido.

PAT

(Port Address Translation). Traducción en tiempo real de direcciones IP y puertos

TCP o UDP cuando cruzan un dispositivo de ruteo. Con PAT una sola dirección IP de una red se puede convertir a varias de la otra red.

 

 

RAID

Arreglo o combinación de discos duros que funcionan conjuntamente alcanzando un tamaño y rendimiento que no se conseguiría con un sólo disco duro grande, y asegura la redundancia de datos para que éstos no se pierdan en caso de falla.

RED LAN

Redes de área local. Físicamente se encuentran en un mismo local o edificio, o se encuentran en locales cercanos.

RED MAN

Redes de área metropolitana. Físicamente conformada por varias redes LAN localizadas en una misma ciudad.

RED WAN

Físicamente está conformada por varias redes LAN y MAN que pueden estar localizadas en diferentes ciudades o países.

RIESGO

Es la posibilidad o probabilidad de que un ente explote o haga uso de una vulnerabilidad.

SEGURIDAD PERIMETRAL

Asume la integración de elementos y sistemas para la protección de perímetros, detección de tentativas de intrusión y/o disuasión de intrusos.

SERVIDORES PUBLICOS

Son aquellos elementos que por la aplicación que se ejecuta en ellos, son accedidos directamente desde el Internet. Puede tratarse de un servidor de correo, un servidor

Web o ftp, entre otros.

SERVICIO

Corresponde a la aplicación que se desea publicar hacia Internet. Puede tratarse de un portal Web, correo electrónico, transferencia de archivos, hasta un portal de transacciones bancarias.

SPYWARE

Programa espía que se instala en una computadora con o sin el consentimiento del usuario para recopilar información de los hábitos de navegación que se realizan en ella.

SSH

(Secure Shell). Protocolo cifrado para acceder en forma segura a maquinas remotas a través de una red.

 

SSL/TLS

(Secure Sockets Layer/Transport Layer Security). Es un protocolo que ofrece un canal seguro para la transferencia de información para aplicaciones de tipo clienteservidor. Este canal está diseñado para proveer privacidad y autenticación.

VPN

Red privada virtual. Tecnología para unir dos redes seguras a través de una red insegura (como por ejemplo: Internet).

VULNERABILIDAD

 

Es un software, hardware o procedimiento defectuoso que puede proporcionar una puerta abierta para accesos no autorizados

 

 

 

ANEXO 2: Hojas Técnicas de los productos que conforman la solución de seguridad

Se presenta en este anexo las hojas técnicas de las soluciones, equipos y software, que conforman la solución propuesta.

 

 

 

DATASHEET

SSG5 AND SSG20

SECURE SERVICES

GATEWAYS

Product Overview

The Juniper Networks SSG5 and SSG20

Secure Services Gateways are purposebuilt security appliances that deliver a perfect blend of performance, security, routing and LAN/WAN connectivity for small branch offices, fixed telecommuters and small standalone business deployments. Traffic flowing in and out of the branch office or business is protected from worms, spyware, trojans, and malware by a complete set of Unified Threat Management security features that include stateful firewall,

IPsec VPN, intrusion prevention system

(IPS), antivirus (includes antispyware, anti-adware, antiphishing), antispam and Web filtering.

Product Description

The Juniper Networks

®

SSG5 and SSG20 Secure Services Gateways are high-performance security platforms for small branch office and standalone businesses that want to stop internal and external attacks, prevent unauthorized access and achieve regulatory compliance. Both the SSG5 and SSG20 deliver 160 Mbps of stateful firewall traffic and

40 Mbps of IPsec VPN traffic.

Security: Protection against worms, viruses, trojans, spam, and emerging malware is delivered by proven unified threat management (UTM) security features that are backed by best-in-class partners. To address internal security requirements and facilitate regulatory compliance, the SSG5 and SSG20 both support an advanced set of network protection features such as security zones, virtual routers and VLANs that allow administrators to divide the network into distinct secure domains, each with its own unique security policy. Policies protecting each security zone can include access control rules and inspection by any of the supported UTM security features.

Regional Office

Headquarters

Zone A

SSG20

Internet

M7i

NetScreen-5400

Zone C

Zone B

The SSG20 deployed at a branch office for secure Internet connectivity and site-to-site VPN to corporate headquarters. Internal wired and wireless resources are protected with unique security policies applied to each security zone.

1

Connectivity and Routing: The SSG5 has seven on-board 10/100 interfaces with optional fixed WAN ports. The SSG20 has five

10/100 interfaces with two I/O expansion slots for additional WAN connectivity. The broad array of I/O options coupled with WAN protocol and encapsulation support in the routing engine make both the SSG5 and the SSG20 a solution that can easily be deployed as a traditional branch office router or as a consolidated security and routing device to reduce CapEx and OpEx. Both the SSG5 and SSG20 support 802.11 a/b/g as a factory configured option supported by a wide array of wireless specific security features.

Access Control Enforcement: The SSG5 and SSG20 can act as enforcement points in a Juniper Networks Unified Access

Control deployment with the simple addition of the IC Series UAC appliance. The IC Series functions as a central policy management engine, interacting with the SSG5 or SSG20 to augment or replace the firewall-based access control with a solution that grants/denies access based on more granular criteria that include endpoint state and user identity in order to accommodate the dramatic shifts in attack landscape and user characteristics.

World Class Support: From simple lab testing to major network implementations, Juniper Networks Professional Services will collaborate with your team to identify goals.

Features and Benefits

FEATURE

High performance

Best-in-class UTM security features UTM security features (antivirus, antispam, Web filtering, IPS) stop all manner of viruses and malware before they damage the network.

Integrated antivirus Annually licensed antivirus engine is based on

Kaspersky Lab engine.

Integrated antispam

Integrated Web filtering

Integrated IPS (Deep Inspection)

FEATURE DESCRIPTION

Purpose-built platform is assembled from custombuilt hardware, powerful processing and a securityspecific operating system.

Annually licensed anti-spam offering is based on

Sophos technology.

Annually licensed Web filtering solution is based on

Websense SurfControl technology.

Annually licensed IPS engine.

Fixed Interfaces

Network segmentation

Interface modularity

Robust routing engine

802.11 a/b/g wireless-specific security features

BENEFIT

Delivers performance headroom required to protect against internal and external attacks now and into the future.

Ensures that the network is protected against all manner of attacks.

Stops viruses, spyware, adware and other malware.

Blocks unwanted email from known spammers and phishers.

Controls/blocks access to malicious Web sites.

Seven fixed 10/100 interfaces on the SSG5, and five fixed 10/100 interfaces on the SSG20. The SSG5 is factory configured with either RS232 Serial/AUX or

ISDN BRI S/T or V.92 fixed WAN backup. Both models include one console port and one auxiliary port.

Security zones, virtual LANs and virtual routers allow administrators to deploy security policies to isolate guests, wireless networks and regional servers or databases.

Two interface expansion slots (SSG20 only) supporting optional ADSL 2+, T1, E1, ISDN BRI S/T,

Serial, SFP and v.92 Mini physical interface modules

(Mini-PIMs).*

Proven routing engine supports OSPF, BGP, and

RIP v1/2.

Wireless-specific privacy and authentication features augment the UTM security capabilities to protect wireless traffic.

Prevents application-level attacks from flooding the network.

Provides high-speed LAN connectivity, redundant WAN connectivity and flexible management.

Facilitates deployment of internal security to prevent unauthorized access, contain attacks and assist in achieving regulatory compliance.

Delivers combination of LAN and WAN connectivity on top of unmatched security to reduce costs and extend investment protection.

Enables the deployment of a consolidated security and routing device, thereby lowering operational and capital expenditures.

Provides additional device consolidation opportunities

(WLAN access point, security, routing) for small office environment.

*Serial and SFP Mini-PIMs only supported in ScreenOS 6.0 or greater releases

2

Features and Benefits (continued)

FEATURE

Juniper Networks Unified Access

Control enforcement point

Management flexibility

World-class professional services

FEATURE DESCRIPTION

Interacts with the centralized policy management engine (IC Series) to enforce session-specific access control policies using criteria such as user identity, device security state and network location.

Use any one of three mechanisms, command line interface (CLI), WebUI or Juniper Networks Network and Security Manager (NSM) to securely deploy, monitor and manage security policies.

BENEFIT

Improves security posture in a cost-effective manner by leveraging existing customer network infrastructure components and best-in-class technology.

Enables management access from any location, eliminating onsite visits thereby improving response time and reducing operational costs.

From simple lab testing to major network implementations, Juniper Networks Professional

Services will collaborate with your team to identify goals, define the deployment process, create or validate the network design and manage the deployment.

Transforms the network infrastructure to ensure that it is secure, flexible, scalable and reliable.

Product Options

OPTION

DRAM

Unified Threat Management/Content

Security (high memory option required)

I/O options

802.11 a/b/g connectivity

Extended license

OPTION DESCRIPTION

The SSG5 and SSG20 are available with either

128 MB or 256 MB of DRAM.

The SSG5 and SSG20 can be configured with any combination of the following best-in-class UTM and content security functionality: antivirus (includes antispyware, antiphishing), IPS (Deep Inspection), Web filtering and/or antispam.

Two interface expansion slots supporting optional

ADSL 2+, T1, E1, ISDN BRI S/T, Serial, SFP and v.92 Mini physical interface modules (Mini-PIMs).

The SSG5 and SSG20 can be factory configured for

802.11 a/b/g wireless LAN connectivity.

Key capacities can be increased (sessions, VPN tunnels, VLANs) and stateful high availability (HA) support for firewall and VPN can be added.

APPLICABLE PRODUCTS

SSG5 and SSG20

High memory SSG5 or SSG20 only

SSG20 only

SSG5 and SSG20

SSG5 and SSG20

SSG5

SSG20

SSG5 WIRELESS

SSG20 WIRELESS

3

Specifications

(1)

Maximum Performance and Capacity

(2)

ScreenOS ® version tested

Firewall performance (Large packets)

Firewall performance (IMIX)

(3)

Firewall packets per second (64 byte)

Advanced Encryption Standard (AES) 256+SHA-1 VPN performance

3DES encryption +SHA-1 VPN performance

Maximum concurrent sessions

New sessions/second

Maximum security policies

Maximum users supported

Network Connectivity

Fixed I/O

Mini-Physical Interface Module (Mini-PIM) slots

WAN interface options

Firewall

Network attack detection

DoS and DDoS protection

TCP reassembly for fragmented packet protection

Brute force attack mitigation

SYN cookie protection

Zone-based IP spoofing

Malformed packet protection

Unified Threat Management

(4)

IPS (Deep Inspection firewall)

Protocol anomaly detection

Stateful protocol signatures

IPS/DI attack pattern obfuscation

Antivirus

Instant message AV

Signature database

Protocols scanned

Antispyware

Anti-adware

Anti-keylogger

Anti-spam

Integrated URL filtering

External URL filtering

(5)

VoIP Security

H.323. Application-level gateway (ALG)

SIP ALG

MGCP ALG

SCCP ALG

Network Address Translation (NAT) for VoIP protocols

SSG5 BASE/EXTENDED

ScreenOS 6.2

160 Mbps

90 Mbps

30,000 PPS

40 Mbps

40 Mbps

8,000/16,000

2,800

200

Unrestricted

SSG20 BASE/EXTENDED

ScreenOS 6.2

160 Mbps

90 Mbps

30,000 PPS

40 Mbps

40 Mbps

8,000/16,000

2,800

200

Unrestricted

7x10/100

0

Factory configured: RS232 Serial AUX or ISDN BRI

S/T or V.92

5x10/100

2

Mini-PIMs: 1xADSL 2+, 1xT1, 1xE1, V.92, ISDN BRI

S/T, 1xSFP, 1xSerial

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

200,000+

POP3, HTTP, SMTP, IMAP, FTP, IM

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

200,000+

POP3, HTTP, SMTP, IMAP, FTP, IM

Yes

Yes

Yes

Yes

Yes

Yes

4

Specifications (continued)

SSG5 BASE/EXTENDED

IPsec VPN

Auto-Connect VPN

Concurrent VPN tunnels

Tunnel interfaces

DES encryption (56-bit), 3DES encryption (168-bit) and

Advanced Encryption Standard (AES) (256-bit)

MD-5 and SHA-1 authentication

Manual key, Internet Key Exchange (IKE), IKEv2 with EAP public key infrastructure (PKI) (X.509)

Perfect forward secrecy (DH Groups)

Prevent replay attack

Remote access VPN

Layer2 Tunneling Protocol (L2TP) within IPsec

IPsec Network Address Translation (NAT) traversal

Redundant VPN gateways

User Authentication and Access Control

Built-in (internal) database - user limit

Third-party user authentication

RADIUS Accounting

XAUTH VPN authentication

Web-based authentication

802.1X authentication

Unified Access Control (UAC) enforcement point

PKI Support

PKI Certificate requests (PKCS 7 and PKCS 10)

Automated certificate enrollment (SCEP)

Online Certificate Status Protocol (OCSP)

Certificate Authorities supported

Self-signed certificates

Virtualization

Maximum number of security zones

Maximum number of virtual routers

Maximum number of VLANs

Routing

BGP instances

BGP peers

BGP routes

OSPF instances

OSPF routes

RIP v1/v2 instances

RIP v2 routes

Static routes

Source-based routing

Policy-based routing

Equal-cost multipath (ECMP)

100

RADIUS, RSA SecureID, LDAP

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

VeriSign, Entrust, Microsoft, RSA Keon, iPlanet

(Netscape) Baltimore, DoD PKI

Yes

8

3/4

10/50

3/4

10/16

1,024

3

1,024

16

1,024

1,024

Yes

Yes

Yes

Yes

25/40

10

Yes

Yes

Yes

1,2,5

Yes

Yes

Yes

Yes

Yes

SSG20 BASE/EXTENDED

Yes

25/40

10

Yes

Yes

Yes

1,2,5

Yes

Yes

Yes

Yes

Yes

100

RADIUS, RSA SecureID, LDAP

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

VeriSign, Entrust, Microsoft, RSA Keon, iPlanet

(Netscape) Baltimore, DoD PKI

Yes

8

3/4

10/50

3/4

10/16

1,024

3

1,024

16

1,024

1,024

Yes

Yes

Yes

5

Specifications (continued)

SSG5 BASE/EXTENDED

Routing (continued)

Multicast

Reverse Path Forwarding (RPF)

Internet Group Management Protocol (IGMP) (v1, v2)

IGMP Proxy

PIM single mode

PIM source-specific multicast

Multicast inside IPsec tunnel

ICMP Router Discovery Protocol (IRDP)

Encapsulations

Point-to-Point Protocol (PPP)

Multilink Point-to-Point Protocol (MLPPP)

Frame Relay

Multilink Frame Relay (MLFR) (FRF 15, FRF 16)

HDLC

IPv6

Dual stack IPv4/IPv6 firewall and VPN

IPv4 to/from IPv6 translations and encapsulations

Syn-Cookie and Syn-Proxy DoS Attack Detection

SIP, RTSP, Sun-RPC, and MS-RPC ALG’s

RIPng

BGP

Transparent mode

NSRP

DHCPv6 Relay

Mode of Operation

Layer 2 (transparent) mode (6)

Layer 3 (route and/or NAT) mode

Address Translation

Network Address Translation (NAT)

Port Address Translation (PAT)

Policy-based NAT/PAT (L2 and L3 mode)

Mapped IP (MIP) (L3 mode)

Virtual IP (VIP) (L3 mode)

MIP/VIP Grouping (L3 mode)

Dual untrust

Bridge groups*

IP Address Assignment

Static

DHCP, PPPoE client

Internal DHCP server

DHCP relay

Traffic Management Quality of Service (QoS)

Guaranteed bandwidth

Maximum bandwidth

Ingress traffic policing

Priority-bandwidth utilization

Differentiated Services stamping

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

N/A

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

300

4/5

Yes

Yes

Yes

Yes - per policy

Yes - per policy

Yes

Yes

Yes - per policy

*Bridge groups supported only on uPIMs in ScreenOS 6.0 and greater releases

6

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

300

4/5

Yes

Yes

Yes

SSG20 BASE/EXTENDED

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes - per policy

Yes - per policy

Yes

Yes

Yes - per policy

Specifications (continued)

High Availability (HA)

(7)

Active/Active - L3 mode

Active/Passive -Transparent & L3 mode

Configuration synchronization

Session synchronization for firewall and VPN

Session failover for routing change

VRRP

Device failure detection

Link failure detection

Authentication for new HA members

Encryption of HA traffic

System Management

WebUI (HTTP and HTTPS)

Command line interface (console)

Command line interface (telnet)

Command line interface (SSH)

Network and Security Manager (NSM)

All management via VPN tunnel on any interface

Rapid deployment

Administration

Local administrator database size

External administrator database support

Restricted administrative networks

Root Admin, Admin and Read Only user levels

Software upgrades

Configuration rollback

Logging/Monitoring

Syslog (multiple servers)

Email (two addresses)

NetIQ WebTrends

SNMP (v2)

SNMP full custom MIB

Traceroute

VPN tunnel monitor

External Flash

Additional log storage

Event logs and alarms

System configuration script

ScreenOS Software

SSG5 BASE/EXTENDED

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes v1.5 and v2.0 compatible

Yes

Yes

Yes

20

RADIUS, RSA SecurID, LDAP

6

Yes

TFTP, WebUI, NSM, SCP, USB

Yes

Yes - up to 4 servers

Yes

Yes

Yes

Yes

Yes

Yes

USB 1.1

Yes

Yes

Yes

SSG20 BASE/EXTENDED

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes v1.5 and v2.0 compatible

Yes

Yes

Yes

20

RADIUS, RSA SecureID, LDAP

6

Yes

TFTP, WebUI, NSM, SCP, USB

Yes

Yes - up to 4 servers

Yes

Yes

Yes

Yes

Yes

Yes

USB 1.1

Yes

Yes

Yes

7

SSG5 BASE/EXTENDED

Dimensions and Power

Dimensions (W x H x D)

Weight

Rack mountable

Power supply (AC)

Maximum thermal output

Certifications

Safety certifications

EMC certifications

Mean Time Between Failures (MTBF)

Non-wireless

Wireless

8.8 x 1.6 x 5.6 in (22.2 x 4.1 x 14.3 cm)

2.1 lb (0.95 kg)

Yes

100-240 VAC

122.8 BTU/Hour

CSA, CB

FCC class B, CE class B, A-Tick, VCCI class B

40.5 years

22.8 years

Security Certifications

Common Criteria: EAL4

FIPS 140-2: Level 2

ICSA Firewall and VPN

Operating Environment

Operating temperature

Yes

Yes

Yes

32° to 104° F (0° to 40° C)

Non-operating temperature

Humidity

-4° to 149° F (-20° to 65° C)

10% to 90% noncondensing

Wireless Radio Specifications (Wireless Models Only)

Transmit power Up to 200 mW

Wireless standards supported

Site survey

Maximum configured SSIDs

Maximum active SSIDs

Atheros SuperG

Atheros eXtended Range (XR)

Wi-Fi Certified ®

Wireless Security (Wireless Models Only)

Wireless privacy

Wireless authentication

MAC access controls

Dual Radio 802.11 a + 802.11b/g

Yes

16

4

Yes

Yes

Yes

WPA, WPA2 (AES or TKIP), IPsec VPN, WEP

PSK, EAP-PEAP, EAP-TLS, EAP-TTLS over 802.1x

Permit or Deny

Yes Client isolation

Antenna Option (Wireless Models Only)

Diversity antenna

Directional antenna

Omni-directional antenna

Included

Optional

Optional

SSG20 BASE/EXTENDED

11.6 x 1.8 x 7.4 in (29.5 x 4.5 x 18.7 cm)

3.3 lb (1.5 kg)

Yes

100-240 VAC

122.8 BTU/Hour

CSA, CB

FCC class B, CE class B, A-Tick, VCCI class B

35.8 years

28.9 years

Yes

Yes

Yes

32° to 104° F (0° to 40° C)

-4° to 149° F (-20° to 65° C)

10% to 90% noncondensing

4

Yes

Yes

Yes

Up to 200 mW

Dual Radio 802.11 a + 802.11b/g

Yes

16

WPA, WPA2 (AES or TKIP), IPsec VPN, WEP

PSK, EAP-PEAP, EAP-TLS, EAP-TTLS over 802.1x

Permit or Deny

Yes

Included

Optional

Optional

(1) Some features and functionality only supported in releases greater than ScreenOS 5.4.

(2) Performance, capacity and features listed are based upon systems running ScreenOS 6.2 and are the measured maximums under ideal testing conditions unless otherwise noted. Actual results may vary based on ScreenOS release and deployment. For a complete list of supported ScreenOS versions for SSG Series gateways, please visit the Juniper Customer Support Center

(www.juniper.net/customers/support/) and click on ScreenOS Software Downloads

(3) IMIX stands for Internet mix and is more demanding than a single packet size as it represents a traffic mix that is more typical of a customer’s network. The IMIX traffic used is made up of 58.33%

64 byte packets + 33.33% 570 byte packets + 8.33% 1518 byte packets of UDP traffic.

(4) UTM Security features (IPS/Deep Inspection, antivirus, antispam and Web filtering) are delivered by annual subscriptions purchased separately from Juniper Networks. Annual subscriptions provide signature updates and associated support. The high memory option is required for UTM Security features.

(5) Redirect Web filtering sends traffic from the firewall to a secondary server. The redirect feature is free, however it does require the purchase of a separate Web filtering license from either Websense or SurfControl.

(6) NAT, PAT, policy-based NAT, virtual IP, mapped IP, virtual systems, virtual routers, VLANs, OSPF, BGP, RIPv2, active/active HA and IP address assignment are not available in layer 2 transparent mode.

(7) Active/passive and active/active HA requires the purchase of an Extended License. In addition to the HA features, an Extended License key increases a subset of the capacities as outlined below.

Active/active HA is only supported in ScreenOS 6.0 or greater releases.

8

IPS (Deep Inspection firewall) Signature Packs

Signature packs provide the ability to tailor the attack protection to the specific deployment and/or attack type. The following signature packs are available for the SSG5 and SSG20:

SIGNATURE PACK

Base

Client

Server

Worm mitigation

TARGET DEPLOYMENT

Branch offices, small/medium businesses

Remote/branch offices

Small/medium businesses

Remote/branch offices of large enterprises

DEFENSE TYPE

Client/server and worm protection

Perimeter defense, compliance for hosts (desktops, etc.)

Perimeter defense, compliance for server infrastructure

Most comprehensive defense against worm attacks

TYPE OF ATTACK OBJECT

Range of signatures and protocol anomalies

Attacks in the server-to-client direction

Attacks in the client-to-server direction

Worms, trojans, backdoor attacks

Firewall Extended Licenses

EXTENDED LICENSE FEATURE

Sessions

VPN tunnels

VLANs

VoIP calls

High availability

SSG20 AND SSG5

Increases max from 8,000 to 16,000

Increases max from 25 to 40

Increases max from 10 to 50

Increases max from 64 to 96

Adds support for stateful active/active or active/passive with ScreenOS 6.0 and above

Juniper Networks Services and Support

Juniper Networks is the leader in performance-enabling services and support, which are designed to accelerate, extend, and optimize your high-performance network. Our services allow you to bring revenue-generating capabilities online faster so you can realize bigger productivity gains and faster rollouts of new business models and ventures. At the same time, Juniper Networks ensures operational excellence by optimizing your network to maintain required levels of performance, reliability, and availability. For more details, please visit www.juniper.net/us/en/products-services/.

9

Ordering Information

MODEL NUMBER

SSG5

SSG-5-SB

DESCRIPTION

SSG-5-SB-BT

SSG-5-SB-M

SSG-5-SB-W-xx

SSG-5-SB-BTW-xx

SSG-5-SB-MW-xx

SSG-5-SH

SSG-5-SH-BT

SSG-5-SH-M

SSG-5-SH-W-xx

SSG-5-SH-BTW-xx

SSG-5-SH-MW-xx

SSG5 with 128 MB Memory, RS232 Serial backup interface

SSG5 with 128 MB Memory, ISDN BRI S/T backup interface

SSG5 with 128 MB Memory, v.92 backup interface

SSG5 with 128 MB Memory, RS232 Serial backup interface, 802.11a/b/g Wireless

SSG5 with 128 MB Memory, ISDN BRI S/T backup interface, 802.11a/b/g Wireless

SSG5 with 128 MB Memory, v.92 backup interface,

802.11a/b/g Wireless

SSG5 with 256 MB Memory, RS232 Serial backup interface

SSG5 with 256 MB Memory, ISDN BRI S/T backup interface

SSG5 with 256 MB Memory, v.92 backup interface

SSG5 with 256 MB Memory, RS232 Serial backup interface, 802.11a/b/g Wireless

SSG5 with 256 MB Memory, ISDN BRI S/T backup interface, 802.11a/b/g Wireless

SSG5 with 256 MB Memory, v.92 backup interface,

802.11a/b/g Wireless

SSG20

SSG-20-SB

SSG-20-SB-W-xx

SSG-20-SH

SSG-20-SH-W-xx

SSG20 with 128 MB Memory, 2-port Mini-PIM slots

SSG20 with 128 MB Memory, 2-port Mini-PIM slots,

802.11a/b/g Wireless

SSG20 with 256 MB Memory, 2-port Mini-PIM slots

SSG20 with 256 MB Memory, 2-port Mini-PIM slots,

802.11a/b/g Wireless

SSG20 I/O Options

JXM-1SERIAL-S

JXM-1SFP-S

JXM-1T1-S

JXM-1E1-S

JXM-1ADSL2-A-S

JXM-1ADSL2-B-S

JXM-1V92-S

1-port Serial Mini Physical Interface Module*

1-port SFP Mini Physical Interface Module**

1-port T1 Mini Physical Interface Module

1-port E1 Mini Physical Interface Module

1-port ADSL2+ Annex A Mini Physical Interface

Module

1-port ADSL2+ Annex B Mini Physical Interface

Module

1-port v.92 Mini Physical Interface Module

JXM-1BRI-ST-S

JX-SFP-1GE-LX

JX-SFP-1GE-SX

JX-SFP-1GE-T

JX-SFP-1FE-FX

1-port ISDN S/T BRI Mini Physical Interface Module

Small Form Factor Pluggable 1000BASE-LX Gigabit

Ethernet Optical Transceiver Module

Small Form Factor Pluggable 1000BASE-SX Gigabit

Ethernet Optical Transceiver Module

Small Form Factor Pluggable 1000BASE-T Gigabit

Ethernet Copper Transceiver Module

Small Form Factor Pluggable 100BASE-FX Fast

Ethernet Optical Transceiver Module

MODEL NUMBER DESCRIPTION

SSG5 / SSG20 Accessories and Upgrades

SSG-5-ELU Extended license upgrade key for SSG5

SSG-20-ELU

SSG-5-20-MEM-256

SSG-5-RMK

SSG-20-RMK

SSG-ANT

SSG-ANT-DIR

SSG-ANT-OMNI

Extended license upgrade key for SSG20

SSG5 and SSG20 256 MB memory upgrade module

SSG5 rack mount kit - holds 2 units

SSG20 rack mount kit

SSG Series wireless replacement antenna

SSG5 and SSG20 dual band directional antenna

SSG5 and SSG20 dual band omni-directional antenna

SSG-CBL-ANT-10M 10 meters (30 feet) low loss cable for SSG-ANT-XXX

Unified Threat Management/Content

Security (High Memory Option Required)

Antivirus (incl. antispyware, antiphishing) NS-K-AVS-SSG5

NS-K-AVS-SSG20

NS-DI-SSG5

NS-DI-SSG20

NS-WF-SSG5

NS-WF-SSG20

NS-SPAM2-SSG5

NS-SPAM2-SSG20

NS-RBO-CS-SSG5

NS-RBO-CS-SSG20

NS-SMB2-CS-SSG5

NS-SMB2-CS-SSG20

IPS (Deep Inspection)

Web Filtering

Anti-spam

Remote Office Bundle (Includes AV, DI, WF)

Main Office Bundle (Includes AV, DI, WF, AS)

• Note: The appropriate power cord is included based upon the sales order “Ship To” destination.

• Note: XX denotes region code for wireless devices. Not all countries are supported. Please see

Wireless Country Compliance Matrix for certified countries.

• Note: For renewal of Content Security Subscriptions, add “-R” to above SKUs.

• Note: For 2 year Content Security Subscriptions, add “-2” to above SKUs.

• Note: For 3 year Content Security Subscriptions, add “-3” to above SKUs.

About Juniper Networks

Juniper Networks, Inc. is the leader in high-performance networking. Juniper offers a high-performance network infrastructure that creates a responsive and trusted environment for accelerating the deployment of services and applications over a single network. This fuels high-performance businesses.

Additional information can be found at www.juniper.net.

* The Serial Mini-PIM is only supported in ScreenOS 6.0 or greater releases

** The SFP Mini-PIM is only supported in ScreenOS 6.0 or greater releases

10

Corporate and Sales Headquarters

Juniper Networks, Inc.

1194 North Mathilda Avenue

Sunnyvale, CA 94089 USA

Phone: 888.JUNIPER (888.586.4737) or 408.745.2000

Fax: 408.745.2100 www.juniper.net

APAC Headquarters

Juniper Networks (Hong Kong)

26/F, Cityplaza One

1111 King’s Road

Taikoo Shing, Hong Kong

Phone: 852.2332.3636

Fax: 852.2574.7803

EMEA Headquarters

Juniper Networks Ireland

Airside Business Park

Swords, County Dublin, Ireland

Phone: 35.31.8903.600

EMEA Sales: 00800.4586.4737

Fax: 35.31.8903.601

Copyright 2009 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos,

NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper

Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.

1000176-005-EN Dec 2009

12

To purchase Juniper Networks solutions, please contact your Juniper Networks representative at 1-866-298-6428 or authorized reseller.

Printed on recycled paper

DATASHEET

SA SERIES SSL VPN

APPLIANCES

SA2500, SA4500, SA6500

1

Product Overview

The Juniper Networks SA2500, SA4500, and SA6500 SSL VPN Appliances meet the needs of companies of all sizes. With the SA6500, Juniper continues to demonstrate its SSL

VPN market leadership by delivering a highly scalable solution based on realworld performance Juniper Networks

SA Series SSL VPN Appliances lead the SSL VPN market with a complete range of remote access appliances. The

SA Series now includes Junos Pulse which provides a simple, intuitive client that provides secure, authenticated access for remote users from any

Web-enabled device to corporate resources. The SA Series combines the security of SSL with standardsbased access controls, granular policy creation, and unparalleled flexibility.

The result provides ubiquitous security for all enterprise tasks with options for increasingly stringent levels of access control to protect the most sensitive applications and data. Juniper Networks

SA Series SSL VPN Appliances deliver lower total cost of ownership over traditional IPsec client solutions and unique end-to-end security features.

Product Description

The Juniper Networks

®

SA2500, SA4500, and SA6500 SSL VPN Appliances meet the needs of companies of all sizes. With the SA6500, Juniper continues to demonstrate its SSL VPN market leadership by delivering a highly scalable solution based on real-world performance testing. SA Series SSL VPN Appliances use SSL, the security protocol found in all standard

Web browsers. The use of SSL eliminates the need for pre-installed client software, changes to internal servers, and costly ongoing maintenance and desktop support. Juniper

Networks SA Series also offers sophisticated partner/customer extranet features that enable controlled access to differentiated users and groups without requiring infrastructure changes, demilitarized zone (DMZ) deployments, or software agents.

The SA Series now includes Juniper Networks Junos ® Pulse, a dynamic, integrated, multiservice network client for mobile and non-mobile devices. Junos Pulse enables optimized, accelerated anytime, anywhere access to corporate data. Pulse enables secure SSL access from a wide range of mobile and non-mobile devices, including smartphones, netbooks, notebooks, Wi-Fi or 3G-enabled devices. Junos Pulse delivers enterprises improved productivity and secure, ubiquitous access to corporate data and applications, anytime, anywhere. For more details on Junos Pulse, please visit www.juniper.net/us/en/ products-services/software/junos-platform/junos-pulse/.

Architecture and Key Components

The SA2500 SSL VPN Appliance enables small- to medium-size businesses (SMBs) to deploy cost-effective remote and extranet access, as well as intranet security. Users can access the corporate network and applications from any machine over the Web. The SA2500 offers high availability (HA) with seamless user failover. And because the SA2500 runs the exact same software as the larger SA4500 and SA6500, even smaller organizations gain the same high-performance, administrative flexibility, and end user experience.

The SA4500 SSL VPN Appliance enables mid-to-large size organizations to provide costeffective extranet access to remote employees and partners using only a Web browser. SA4500 features rich access privilege management functionality that can be used to create secure customer/partner extranets. This functionality also allows the enterprise to secure access to the corporate intranet, so that different employee and visitor populations can use exactly the resources they need while adhering to enterprise security policies. Built-in compression

for all traffic types speeds performance, and hardware-based SSL acceleration is available for more demanding environments. The

SA4500 also offers HA with seamless user failover.

The SA6500 SSL VPN Appliance is purpose-built for large enterprises and service providers. It features best-in-class performance, scalability, and redundancy for organizations with high volume secure access and authorization requirements.

Additionally, the SA6500 offers HA with seamless user failover.

The SA6500 also features a built-in compression for Web and files, and a state-of-the-art SSL acceleration chipset to speed

CPU-intensive encrypt/decrypt processes.

Because each of the SA Series SSL VPN Appliances runs on the same software, there is no need to compromise user or administrator experience based on which one you choose. All devices offer leading performance, stability, and scalability.

Therefore, deciding which device will best fit the needs of your organization is easily determined by matching the required number of concurrent users, and perhaps system redundancy and largescale acceleration options, to the needs of your growing remote access user population.

• SA2500: Supports SMBs as a cost-effective solution that can easily handle up to 100 concurrent users on a single system or two-unit cluster.

• SA4500: Enables mid-to-large size organizations to grow to as many as 1,000 concurrent users on a single system and offers the option to upgrade to hardware-based SSL acceleration for those that demand the most performance available under heavy load.

• SA6500: Purpose-built for large enterprises and service providers, the SA6500 features best-in-class performance, scalability, and redundancy for organizations with high volume secure access and authorization requirements, with support for as many as 10,000 concurrent users on a single system or tens of thousands of concurrent users across a four-unit cluster.

SA6500 Standard Features

• Dual, mirrored hot swappable Serial Advanced Technology

Attachment (SATA) hard drives

• Dual, hot swappable fans

• Hot swappable power supply

• 4 gigabyte SDRAM

• 4-port copper 10/100/1000 interface card

• 1-port copper 10/100/1000 management interface

• Hardware-based SSL acceleration module

SA6500 Optional Features

• Second power supply or DC power supply available

• 4-port small form-factor pluggable (SFP) interface card

Features and Benefits

Junos Pulse

Junos Pulse is an integrated, multi-service network client enabling anytime, anywhere connectivity, security, and acceleration with a simplified user experience that requires minimal user interaction. Junos

Pulse makes secure network and cloud access easy through virtually any device – mobile or non-mobile, Wi-Fi or 3G-enabled, managed or unmanaged – over a broad array of computing and mobile operating systems. The following table provides the key features and benefits of

Junos Pulse working with the SA Series appliances.

FEATURES

Layer 3 SSL VPN (Network Connect)

Location awareness

BENEFITS

• Layer 3 VPN connectivity with granular access control

• SSL mode only; no ESP (Encapsulating Security Payload) mode

• Seamless roaming from remote access (to Juniper SA Series) to local LAN access (via

Juniper UAC)

• Junos Pulse can be pre-configured by admins to automatically prompt end-users for credentials to authenticate to the SA Series when they are remote

Endpoint security • Full Host Checker capability to check endpoint security

• Enhanced Endpoint Security delivers on-the-fly malware protection, pre-connection scanning policies, and real-time protection supported by both the SA Series and UAC

Split tunneling options (enable or disable without route monitoring)

Flexible launch options (standalone client, browser-based launch)

Pre-configuration options (pre-configured installer to contain list of SA Series appliances)

• Key split tunneling options of Network Connect supported

• Enforces secure, granular access control

• Users can easily launch Junos Pulse via the web from the SA Series landing page

• Remote users can simply launch Junos Pulse from their desktop

• Admins can pre-configure a Junos Pulse deployment with a list of corporate SA Series appliances for end-users to choose from

Connectivity options (max/idle session timeouts, automatic reconnect, logging)

• Admins can set up flexible connectivity options for remote users

For more details on Junos Pulse, please visit www.juniper.net/us/en/products-services/software/junos-platform/junos-pulse/.

2

High Scalability Support on SA6500 SSL VPN

Appliance

The SA6500 is designed to meet the growing needs of large enterprises and service providers with its ability to support thousands of users accessing the network remotely. The following list shows the number of concurrent users that can be supported on the SA6500 platform:

• Single SA6500: Supports up to 10,000 concurrent users

• Two-unit cluster of SA6500s: Supports up to 18,000 concurrent users

• Three-unit cluster of SA6500s: Supports up to 26,000 concurrent users

• Four-unit cluster of SA6500s: Supports up to 30,000 concurrent users

All performance testing is done based on real-world scenarios with simulation of traffic based on observed customer networks.

End-to-End Layered Security

The SA2500, SA4500, and SA6500 provide complete end-to-end layered security, including endpoint client, device, data, and server layered security controls.

Table 1: End-to-End Layered Security Features and Benefits

FEATURE

Antimalware support with

Enhanced Endpoint Security

FEATURE DESCRIPTION BENEFITS

Dynamically download Webroot’s market-leading antimalware software to enforce endpoint security on devices which may not be corporate-assigned computers being used for network access.

Protects endpoints from infection in real-time from antimalware and thereby protects corporate resources from harm during network access. Enables dynamic enforcement of antimalware protection on unmanaged assets, such as PC’s of external partners, customers or suppliers.

SMS auto-remediation

Host Checker

Host Checker API

Trusted Network Connect

(TNC) support on Host

Checker

Policy-based enforcement

Hardened security appliance

Automatically remediates non-compliant endpoints by updating software applications that do not comply to corporate security policies. Dynamically initiates an update of these software applications on the endpoint using Microsoft’s SMS protocol.

Improves productivity of remote users who will gain immediate access to the corporate network without having to wait for periodic updates of software applications, and ensures compliance with corporate security policies.

Client computers can be checked both prior to and during a session to verify an acceptable device security posture requiring installed/running endpoint security applications

(antivirus, firewall, other). Also supports custom built checks including verifying ports opened/closed, checking files/processes and validating their authenticity with

Message Digest 5 (MD5) hash checksums, verifying registry settings, machine certificates, and more.

Includes cache cleaner that erases all proxy downloads and temp files at logout.

Verifies/ensures that endpoint device meets corporate security policy requirements before granting access, remediating devices, and quarantining users when necessary. Also, ensures no potentially sensitive data is left behind on the endpoint device.

Uses current security policies with remote users and devices; easier management.

Created in partnership with best-in-class endpoint security vendors. Enables enterprises to enforce an endpoint trust policy for managed PCs that have personal firewall, antivirus clients, or other installed security clients, and quarantine non-compliant devices.

Allows interoperability with diverse endpoint security solutions from antivirus to patch management to compliance management solutions.

Enables customers to leverage existing investments in endpoint security solutions from third-party vendors.

Allows the enterprise to establish trustworthiness of non-API compliant hosts without writing custom API implementations or locking out external users, such as customers or partners that run other security clients.

Designed on a purpose-built operating system.

Enables access to extranet endpoint devices like PCs from partners that may run different security clients than that of the enterprise.

Not designed to run any additional services and is thus less susceptible to attacks; no backdoors to exploit or hack.

Security services with kernellevel packet filtering and safe routing

Secure virtual workspace

Undesirable traffic is dropped before it is processed by the TCP stack.

Ensures that unauthenticated connection attempts such as malformed packets or denial of service (DoS) attacks are filtered out.

Ensures that all corporate data is securely deleted from unsecure kiosks after a session.

Coordinated threat control

A secure and separate environment for remote sessions that encrypts all data and controls I/O access (printers, drives).

Enables SA Series SSL VPN Appliances and Juniper

Networks IDP Series Intrusion Detection and Prevention

Appliances to tie the session identity of the SSL VPN with the threat detection capabilities of the IDP Series, taking automatic action on users launching attacks.

Effectively identifies, stops, and remediates both network and application-level threats within remote access traffic.

3

Ease of Administration

In addition to enterprise-class security benefits, the SA2500, SA4500, and SA6500 have a wealth of features that make it easy for the administrator to deploy and manage.

Table 2: Ease of Administration Features and Benefits

FEATURE FEATURE DESCRIPTION

Bridge CA (Certificate

Authority) support

Enables the SA Series to support federated PKI deployments with client certificate authentication. Bridge

CA is a PKI extension (as specified in RFC 5280) to cross-certify client certificates that are issued by different trust anchors (Root CAs). Also, enables the customer to configure policy extensions in the SA Series admin

UI, to enforce during certificate validation. These policy extensions can be configured as per RFC 5280 guidelines.

Based on industry standard protocols and security methods

Extensive directory integration and broad interoperability

No installation or deployment of proprietary protocols is required.

Integration with strong authentication and identity and access management platforms

Multiple hostname support

Existing directories in customer networks can be leveraged for authentication and authorization, enabling granular secure access without recreating those policies.

Ability to support SecurID, Security Assertion Markup

Language (SAML), and public key infrastructure (PKI)/ digital certificates.

Ability to host different virtual extranet websites from a single SA Series SSL VPN Appliance.

BENEFITS

Enables customers who use advanced PKI deployments to deploy the SA Series to perform strict standardscompliant certificate validation, before allowing data and applications to be shared between organizations and users.

SA Series investment can be leveraged across many applications and resources over time.

Existing directory investments can be leveraged with no infrastructure changes; no APIs for directory integration, as they are all native/built in.

Leverages existing corporate authentication methods to simplify administration.

Customizable user interface

Juniper Networks Network and

Security Manager (NSM)

In Case of Emergency (ICE)

Cross-platform support

Creation of completely customized sign-on pages.

Intuitive centralized UI for configuring, updating, and monitoring SA Series appliances within a single device/ cluster or across a global cluster deployment.

Provides licenses for a large number of additional users on an SA Series SSL VPN Appliance for a limited time when a disaster or epidemic occurs.

Ability for any platform to gain access to resources such as Windows, Mac, Linux or various mobile devices including iPhone, WinMobile, Symbian, and Android.

Saves the cost of incremental servers, eases management overhead, and provides a transparent user experience with differentiated entry URLs.

Provides an individualized look for specified roles, streamlining the user experience.

Enables companies to conveniently manage, configure and maintain SA Series appliances and other Juniper devices from one central location.

Enables a company to continue business operations by maintaining productivity, sustaining partnerships, and delivering continued services to customers when the unexpected happens.

Provides flexibility in allowing users to access corporate resources from any type of device using any type of operating system.

Rich Access Privilege Management Capabilities

The SA2500, SA4500, and SA6500 provide dynamic access privilege management capabilities without infrastructure changes, custom development, or software deployment/maintenance. This facilitates the easy deployment and maintenance of secure remote access, as well as secure extranets and intranets. When users log into the SA Series SSL VPN Appliance, they pass through a pre-authentication assessment, and are then dynamically mapped to the session role that combines established network, device, identity, and session policy settings. Granular resource authorization policies further ensure exact compliance to security restrictions.

Table 3: Access Privilege Management Features and Benefits

FEATURE

UAC-SA federation

Certificate authentication to backend servers

FEATURE DESCRIPTION

Seamlessly provision SA Series user sessions into Juniper

Networks Unified Access Control upon login – or the alternative (provisioning of UAC sessions into the SA

Series). Users need to authenticate only one time to get access in these types of environments.

Enables customers to enforce client authentication on their secure backend servers and allows the SA to present an admin-configured certificate to these servers for authentication.

BENEFITS

Provides users – whether remote or local – seamless access with a single login to corporate resources that are protected by access control policies from UAC or the SA

Series. Simplifies end user experience.

Allows customers to mandate strict SSL policies on their backend servers by configuring client authentication.

4

FEATURE

Client cert auth for ActiveSync

Multiple sessions per user

User-record synchronization

VDI (Virtual Desktop

Infrastructure) support

ActiveSync feature

Dynamic role mapping with custom expressions

Resource authorization

FEATURE DESCRIPTION

Any mobile device supporting ActiveSync along with client side certificates can now be challenged by the SA

Series for a valid client certificate before being allowed access to the ActiveSync server.

Allows remote users to launch multiple sessions to the

SA Series appliance.

Supports synchronization of user records such as user bookmarks across different non-clustered SA Series appliances.

Allows interoperability with VMware View Manager and

Citrix XenDesktop to enable administrators to deploy virtual desktops with the SA Series appliances.

Provides secure access connectivity from mobile devices

(such as Symbian, Windows Mobile, or iPhone) to the

Exchange server with no client software installation.

Enables up to 5000 simultaneous sessions on the

SA6500.

Combines network, device, and session attributes to determine which types of access are allowed. A dynamic combination of attributes on a per-session basis can be used to make the role mapping decision.

Provides extremely granular access control to the URL, server, or file level, for different roles of users.

BENEFITS

Enables the administrator to enforce strict mobile authentication policies for ActiveSync access from mobile devices.

Enables remote users to have multiple authenticated sessions open at the same time.

Ensures ease of experience for users who often travel from one region to another and therefore need to connect to different SA Series appliances.

Provides seamless access to remote users to their virtual desktops hosted on VMware or Citrix servers. Provides dynamic delivery of the Citrix ICA client or the VMware

View client, including dynamic client fallback options to allow users to easily connect to their virtual desktops.

Enables customers to allow a large number of users including employees, contractors and partners to access corporate resources through mobile phones via

ActiveSync.

Enables the administrator to provision by purpose for each unique session.

Allows administrators to tailor security policies to specific groups, providing access only to essential data.

Granular auditing and logging Can be configured to the per-user, per-resource, perevent level for security purposes as well as capacity planning.

Provides fine-grained auditing and logging capabilities in a clear, easy to understand format.

Flexible Single Sign-On (SSO) Capabilities

The SA2500, SA4500, and SA6500 offer comprehensive single sign-on features. These features increase end user productivity, greatly simplify administration of large diverse user resources, and significantly reduce the number of help desk calls.

Table 4: Flexible Single Sign-on Features and Benefits

FEATURE

Kerberos Constrained

Delegation

FEATURE DESCRIPTION BENEFITS

Support for Kerberos Constrained Delegation protocol.

When a user logs into the SA Series with a credential that cannot be proxied through to the backend server, the SA Series appliance will retrieve a Kerberos ticket on behalf of the user from the Active Directory infrastructure.

The ticket will be cached on the SA Series appliance throughout the session. When the user accesses

Kerberos-protected applications, the SA Series will use the cached Kerberos credentials to log the user into the application without prompting for a password.

Eliminates the need for companies to manage static passwords resulting in reduced administration time and costs.

Kerberos SSO and NTLMv2 support

SA Series will automatically authenticate remote users via Kerberos or NTLMv2 using user credentials.

Password management integration

Standards-based interface for extensive integration with password policies in directory stores (LDAP, Microsoft

Active Directory, NT, and others).

Simplifies user experience by avoiding having users enter credentials multiple times to access different applications.

Leverage existing servers to authenticate users; users can manage their passwords directly through the SA Series interface.

Web-based Single Sign-On

(SSO) basic authentication and NT LAN Manager (NTLM)

Web-based SSO forms-based, header variable-based, SAMLbased

Allows users to access other applications or resources that are protected by another access management system without re-entering login credentials.

Ability to pass user name, credentials, and other customer-defined attributes to the authentication forms of other products and as header variables.

Alleviates the need for end users to enter and maintain multiple sets of credentials for web-based and Microsoft applications.

Enhances user productivity and provides a customized experience.

5

Provision by Purpose

The SA2500, SA4500, and SA6500 include three different access methods. These different methods are selected as part of the user’s role, so the administrator can enable the appropriate access on a per-session basis, taking into account user, device, and network attributes in combination with enterprise security policies.

Table 5: Provisioning Features and Benefits

FEATURE

IPsec/IKEv2 support for mobile devices

Clientless core Web access

Secure Application Manager

(SAM)

Network Connect (NC)

Junos Pulse

FEATURE DESCRIPTION

Allows remote users to connect from devices such as PDA’s, mobile devices and smartphones which support IKEv2 VPN connectivity.

Administrator can also enable strict certificate authentication for access via IPsec/IKEv2.

Access to web-based applications, including complex JavaScript, XML, or Flash-based apps and Java applets that require a socket connection, as well as standards-based email like Outlook Web Access (OWA), Windows and

UNIX file share, telnet/SSH hosted-applications,

Terminal Emulation, SharePoint, and others.

A lightweight Java or Windows-based download enabling access to client/server applications.

Provides complete network-layer connectivity via an automatically provisioned cross-platform download; Windows Logon/GINA integration for domain SSO; installer services to mitigate need for admin rights. Allows for split tunneling capability.

Single, integrated remote access client that can also provide LAN access control, WAN acceleration and Dynamic VPN features to remote users, in conjunction with Juniper

Networks UAC, WXC Series Application

Acceleration Platforms and SRX Series Services

Gateways devices respectively.

BENEFITS

Extends Juniper’s leading mobility and access control features of SA Series to broad range of devices and OS platforms that support IKEv2 VPN connectivity. Enables remote users to securely authenticate to the SA Series appliance from platforms that support IKEv2 VPN connectivity.

Provides the most easily accessible form of application and resource access from a variety of end user machines, including handheld devices; enables extremely granular security control options; completely clientless approach using only a Web browser.

Enables access to client/server applications using just a

Web browser; also provides native access to terminal server applications without the need for a pre-installed client.

Users only need a Web browser. Network Connect transparently selects between two possible transport methods to automatically deliver the highest performance possible for every network environment. When used with Juniper Networks Installer Services, no admin rights are needed to install, run, and upgrade Network

Connect; optional standalone installation is available as well. Split tunneling capability provides flexibility to specify which subnets or hosts to include or exclude from being tunneled.

Pulse replaces the need to deploy and maintain multiple, separate clients for different functionalities – such as VPN, LAN access control and WAN acceleration. By seamlessly integrating all these functionalities into one single, easy-to-use client, administrators can save on client management and deployment costs to end users.

Product Options

The SA2500, SA4500, and SA6500 appliances include various license options for greater functionality.

User License

With the release of the SA2500, SA4500, and SA6500 appliances, purchasing has been simplified, thanks to a combination of features that were once separate upgrades. Now, there is only one license that is needed to get started: the user licenses. Current customers with the older generation hardware

(Juniper Networks SA2000, SA4000, and SA6000) will also benefit from these changes as systems are upgraded to version 6.1

(or higher) software.

User licenses provide the functionality that allows the remote, extranet, and intranet user to access the network. They fully meet the needs of both basic and complex deployments with diverse audiences and use cases, and require little or no client software, server changes, DMZ build-outs, or software agent deployments. And for administrative ease of user license counts, each license only enables as many users as specified in the license and are additive. For example, if a 100 user license was originally purchased and the concurrent user count grows over the next year to exceed that amount, simply adding another 100 user license to the system will now allow for up to 200 concurrent users. Key features enabled by this license include:

• Junos Pulse, SAM and Network Connect provide cross-platform support for client/server applications using SAM, as well as full network-layer access using the SSL transport mode of Junos

Pulse and the adaptive dual transport methods of Network

Connect. The combination of SAM, Junos Pulse and Network

Connect with Core Clientless access provides secure access to virtually any audience, from remote/mobile workers to partners or customers, using a wide range of devices from any network.

• Provision by purpose goes beyond role-based access controls and allows administrators to properly, accurately, and dynamically balance security concerns with access requirements.

• Advanced PKI support includes the ability to import multiple root and intermediate certificate authorities (CAs), Online

Certificate Status Protocol (OCSP), and multiple server certificates.

• User self-service provides the ability for users to create their own favorite bookmarks, including accessing their own workstation from a remote location, and even changing their password when it is set to expire.

6

• Multiple hostname support (for example, https://employees.

company.com, https://partners.company.com and https:// employees.company.com/engineering) can all be made to look as though users are the only ones using the system, complete with separate logon pages and customized views that uniquely target the needs and desires of that audience.

• User interfaces are customizable for users and delegated administrative roles.

• Advanced endpoint security controls such as Host Checker,

Cache Cleaner, and Secure Virtual Workspace work to ensure that users are dynamically provisioned to access systems and resources only to the degree that their remote systems are compliant with the organization’s security policy, after which remnant data is scrubbed from the hard drive so that nothing is left behind.

• Provides support of up to 240 VLANs.

Secure Meeting License (Optional)

The Juniper Networks Secure Meeting upgrade license extends the capabilities of the SA Series SSL VPN Appliances by providing secure anytime, anywhere, cost-effective online Web conferencing and remote control PC access. Secure Meeting enables real-time application sharing so that authorized employees and partners can easily schedule online meetings or activate instant meetings through an intuitive Web interface that requires no training or special deployments. Help desk staff or customer service representatives can provide remote assistance to any user or customer by remotely controlling his/her PC without requiring the user to install any software. Best-in-class Authentication,

Authorization, and Accounting (AAA) capabilities enable companies to easily integrate Secure Meeting with their existing internal authentication infrastructure and policies. Juniper’s market-leading, hardened, and Common Criteria-certified SSL

VPN appliance architecture, and SSL/HTTPS transport security for all traffic, means that administrators can rest assured that their Web conferencing and remote control solution adheres to the highest levels of enterprise security requirements.

The Secure Meeting upgrade is available for the SA2500, SA4500, and SA6500.

Instant Virtual System License (Optional)

Juniper Networks Instant Virtual System (IVS) option is designed to enable administrators to provision logically independent SSL

VPN gateways within a single appliance/cluster. This allows service providers to offer network-based SSL VPN managed services to multiple customers from a single device or cluster, as well as enabling enterprises to completely segment SSL VPN traffic between multiple groups. IVS enables complete customer separation and provides segregation of traffic between multiple customers using granular role based VLAN (802.1Q) tagging.

This enables the secure segregation of end user traffic even if two customers have overlapping IP addresses, and enables provisioning of specific VLANs for different user constituencies such as remote employees and partners of customers.

Domain Name Service (DNS)/Windows Internet Name Service

(WINS), AAA, log/accounting servers, and application servers such as Web mail and file shares to name a few, can reside either in the respective customer’s intranets or in the service provider network.

Service providers can provision an overall concurrent number of users on a per-customer basis with the flexibility to distribute further to different user audiences such as remote employees, contractors, partners, and others. The SA Series extends programmatic support to configure and manage IVS. This enables service providers to integrate IVS management into their own operations support systems (OSS). It also enables enterprises that use Instant Virtual Systems to leverage XML import/export capabilities for management of the individual virtual systems.

The IVS upgrade is available for the SA4500 and SA6500.

High Availability License (Optional)

Juniper Networks has designed a variety of HA clustering options to support the SA Series, ensuring redundancy and seamless failover in the rare case of a system failure. These clustering options also provide performance scalability to handle the most demanding usage scenarios. The SA2500 and SA4500 can be purchased in cluster pairs, and the SA6500 can be purchased in multi-unit clusters or cluster pairs to provide complete redundancy and expansive user scalability. Both multi-unit clusters and cluster pairs feature stateful peering and failover across the

LAN and WAN, so in the unlikely event that one unit fails, system configurations (like authentication server, authorization groups, and bookmarks), user profile settings (like user-defined bookmarks and cookies), and user sessions are preserved.

Failover is seamless, so there is no interruption to user/enterprise productivity, no need for users to log in again, and no downtime.

Multi-unit clusters are automatically deployed in active/active mode, while cluster pairs can be configured in either active/active or active/passive mode.

High availability licenses allow you to share licenses from one SA

Series appliance with one or more additional SA Series appliances

(depending on the platform in question). These are not additive to the concurrent user licenses. For example, if a customer has a 100 user license for the SA4500 and then purchases another SA4500 with a 100 user cluster license, this will provide a total of 100 users that are shared across both appliances, not per appliance.

The HA option is available for the SA2500, SA4500, and SA6500.

ICE License (Optional)

SSL VPNs can help keep organizations and businesses functioning by connecting people even during the most unpredictable circumstances—hurricanes, terrorist attacks, transportation strikes, pandemics, or virus outbreaks—the result of which could mean the quarantine or isolation of entire regions or groups of people for an extended period of time. With the right balance of risk and cost, the new Juniper Networks SA Series ICE offering delivers a timely solution for addressing a dramatic peak in demand for remote access to ensure business continuity whenever a disastrous event strikes. ICE provides licenses for a large number of additional users on an SA Series SSL VPN Appliance for a limited time. With ICE, businesses can:

7

• Maintain productivity by enabling ubiquitous access to applications and information for employees from anywhere, at any time, and on any device.

• Sustain partnerships with around-the-clock, real-time access to applications and services while knowing resources are secured and protected.

• Continue to deliver exceptional service to customers and partners with online collaboration.

• Meet federal and government mandates for contingencies and continuity of operations (COOP) compliance.

• Balance risk and scalability with cost and ease of deployment.

The ICE license is available for the SA4500 and the SA6500 and includes the following features:

• Baseline

• Secure Meeting

Antimalware Support with Enhanced Endpoint Security (EES)

(Optional)

The amount of newly discovered malicious programs that can harm endpoint devices such as PCs continues to grow. According to the

1985-2008 AV-test.org report, there were over seven million new malware programs discovered in 2008, and just over five million were discovered in 2007. Malware is known to cost enterprises an increasing amount of money every year in terms of efforts involved to quarantine and remediate appropriate endpoints.

In order to prevent endpoints from being infected with malware,

Juniper Networks offers the Enhanced Endpoint Security license option. This license is a full-featured, dynamically deployable antimalware module that is an OEM of Webroot’s industry-leading

Spy Sweeper product. This dynamic antimalware download capability is also available with Unified Access Control. With this new capability, organizations can ensure that unmanaged and managed

Microsoft Windows endpoint devices conform to corporate security policies before they are allowed access to the network, applications, and resources. For example, potentially harmful keyloggers can be found and removed from an endpoint device before the user enters sensitive information such as their user credentials. The Enhanced

Endpoint Security license protects endpoints from infection in realtime and ensures only clean endpoints are granted access to the network. Enhanced Endpoint Security licenses are available as 1-year,

2-year, and 3-year subscription options (see the Ordering Information section for more details).

The Enhanced Endpoint Security option is available for the SA2500,

SA4500, and SA6500.

Premier Java RDP Applet (Optional)

Until now, client access software for Microsoft’s Terminal Server has been cut-and-dried. Microsoft’s Terminal Services client is restricted and can only be used on Windows clients with MS Internet Explorer.

With the Premier Java RDP Applet option, users can remotely access centralized Windows applications independently of the client platform (Mac, Linux, Windows, and so on) through Java-based technology.

As a platform-independent solution, the Premier Java RDP Applet lets you use the entire range of Windows applications running on the Windows Terminal Server, regardless of how the client computer is equipped. By centrally installing and managing all the

Windows applications, you can significantly reduce your total cost of ownership. The Premier Java RDP Applet is an OEM of the HOBlink

JWT (Java Windows Terminal) product created by HOB Inc., a leading

European software company specializing in Java programming.

The Premier Java RDP option is available for the SA2500, SA4500, and SA6500.

SA6500

SA2500 SA4500

8

Specifications

SA2500 SA4500 SA6500

Dimensions and Power

Dimensions (W x H x D)

Weight

Rack mountable

A/C power supply

System battery

Efficiency

Material

MTBF

Fans

17.26 x 1.75 x 14.5 in

(43.8 x 4.4 x 36.8 cm)

14.6 lb (6.6 kg) typical (unboxed)

Yes, 1U

100-240 VAC, 50-60 Hz,

2.5 A Max, 200 W

CR2032 3V lithium coin cell

80% minimum, at full load

18 gauge (.048”) cold-rolled steel

75,000 hours

Three 40 mm ball bearing fans, one 40 mm ball bearing fan in power supply

17.26 x 1.75 x 14.5 in

(43.8 x 4.4 x 36.8 cm)

15.6 lb (7.1 kg) typical (unboxed)

Yes, 1U

100-240 VAC, 50-60 Hz,

2.5 A Max, 300 W

CR2032 3V lithium coin cell

80% minimum, at full load

18 gauge (.048”) cold-rolled steel

72,000 hours

Three 40 mm ball bearing fans, one 40 mm ball bearing fan in power supply

17.26 x 3.5 x 17.72 in

(43.8 x 8.8 x 45 cm)

26.4 lb (12 kg) typical (unboxed)

Yes, 2U, 19 inch

100-240 VAC, 50-60 Hz,

2.5 A Max, 400 W

CR2032 3V lithium coin cell

80% minimum, at full load

18 gauge (.048 in) cold-rolled steel

98,000 hours

Two 80 mm hot swap, one 40 mm ball bearing fan in power supply

Panel Display

Power LED, HD activity,

HW alert

HD activity and fail LED on drive tray

Ports

Traffic

Management

Fast Ethernet

Gigabit Ethernet

Console

Environment

Operating temp

Storage temp

Relative humidity (operating)

Relative humidity (storage)

Altitude (operating)

Altitude (storage)

Certifications

Common Criteria EAL3+ certification

Safety certifications

Yes

No

Two RJ-45 Ethernet - 10/100/1000 full or half-duplex (auto-negotiation)

N/A

IEEE 802.3u compliant

IEEE 802.3z or IEEE 802.3ab compliant

One RJ-45 serial console port

41° to 104° F (5° to 40° C)

-40° to 158° F (-40° to 70° C)

8% to 90% noncondensing

5% to 95% noncondensing

10,000 ft (3,048 m) maximum

40,000 ft (12,192 m) maximum

Yes

Yes

No

Two RJ-45 Ethernet - 10/100/1000 full or half-duplex (auto-negotiation)

N/A

IEEE 802.3u compliant

IEEE 802.3z or IEEE 802.3ab compliant

One RJ-45 serial console port

41° to 104° F (5° to 40° C)

-40° to 158° F (-40° to 70° C)

8% to 90% noncondensing

5% to 95% noncondensing

10,000 ft (3,048 m) maximum

40,000 ft (12,192 m) maximum

Yes

Yes

Yes

Four RJ-45 Ethernet – full or half-duplex

(auto-negotiation); for link redundancy to internal switches

SFP module optional

One RJ-45 Ethernet - 10/100/1000 full or half-duplex (auto-negotiation)

IEEE 802.3u compliant

IEEE 802.3z or IEEE 802.3ab compliant

One RJ-45 serial console port

41° to 104° F (5° to 40° C)

-40° to 158° F (-40° to 70° C)

8% to 90% noncondensing

5% to 95% noncondensing

10,000 ft (3,048 m) maximum

40,000 ft (12,192 m) maximum

Yes

Emissions certifications

Warranty

EN60950-1:2001+ A11, UL60950-1:2003,

CAN/CSA C22.2 No. 60950-1-03, IEC

60950-1:2001

FCC Class A, EN 55022 Class A,

EN 55024 Immunity, EN 61000-3-2,

VCCI Class A

90 days;

Can be extended with support contract

EN60950-1:2001+ A11, UL60950-1:2003,

CAN/CSA C22.2 No. 60950-1-03, IEC

60950-1:2001

FCC Class A, EN 55022 Class A,

EN 55024 Immunity, EN 61000-3-2,

VCCI Class A

90 days;

Can be extended with support contract

EN60950-1:2001+ A11, UL60950-1:2003,

CAN/CSA C22.2 No. 60950-1-03, IEC

60950-1:2001

FCC Class A, EN 55022 Class A,

EN 55024 Immunity, EN 61000-3-2,

VCCI Class A

90 days;

Can be extended with support contract

Juniper Networks Services and Support

Juniper Networks is the leader in performance-enabling services and support, which are designed to accelerate, extend, and optimize your high-performance network. Our services allow you to bring revenue-generating capabilities online faster so you can realize bigger productivity gains and faster rollouts of new business models and ventures. At the same time, Juniper Networks ensures operational excellence by optimizing your network to maintain required levels of performance, reliability, and availability. For more details, please visit www.juniper.net/us/en/products-services/.

9

Ordering Information

DESCRIPTION MODEL NUMBER

SA2500

Base System

SA2500

User Licenses

SA2500-ADD-10U

SA2500-ADD-25U

SA2500-ADD-50U

SA2500-ADD-100U

Feature Licenses

SA2500-MTG

Clustering Licenses

SA2500-CL-10U

SA2500 Base System

Add 10 simultaneous users to SA2500

Add 25 simultaneous users to SA2500

Add 50 simultaneous users to SA2500

Add 100 simultaneous users to SA2500

Secure Meeting for SA2500

SA2500-CL-25U

SA2500-CL-50U

SA2500-CL-100U

Clustering: Allow 10 users to be shared from another SA2500

Clustering: Allow 25 users to be shared from another SA2500

Clustering: Allow 50 users to be shared from another SA2500

Clustering: Allow 100 users to be shared from another SA2500

SA4500

Base System

SA4500

User Licenses

SA4500-ADD-50U

SA4500-ADD-100U

SA4500-ADD-250U

SA4500-ADD-500U

SA4500-ADD-1,000U

Feature Licenses

SA4500-MTG

SA4500-IVS

SA4500-ICE

SA4500-ICE-CL

SA4500 Base System

Add 50 simultaneous users to SA4500

Add 100 simultaneous users to SA4500

Add 250 simultaneous users to SA4500

Add 500 simultaneous users to SA4500

Add 1,000 simultaneous users to SA4500

Secure Meeting for SA4500

Instant Virtual System for SA4500

In Case of Emergency License for SA4500

In Case of Emergency Clustering License for SA4500

Clustering Licenses

SA4500-CL-50U

SA4500-CL-100U

SA4500-CL-250U

SA4500-CL-500U

Clustering: Allow 50 users to be shared from another SA4500

Clustering: Allow 100 users to be shared from another SA2500

Clustering: Allow 250 users to be shared from another SA4500

Clustering: Allow 500 users to be shared from another SA4500

MODEL NUMBER DESCRIPTION

SA6500

Base System

SA6500

User Licenses

SA6500-ADD-100U

SA6500-ADD-250U

SA6500-ADD-500U

SA6500-ADD-1,000U

SA6500-ADD-2,500U

SA6500-ADD-5,000U

SA6500-ADD-7,500U

SA6500-ADD-10,000U

SA6500-ADD-125,00U*

SA6500-ADD-15,000U*

SA6500 Base System

Add 100 simultaneous users to SA6500

Add 250 simultaneous users to SA6500

Add 500 simultaneous users to SA6500

Add 1,000 simultaneous users to SA6500

Add 2,500 simultaneous users to SA6500

Add 5,000 simultaneous users to SA6500

Add 7,500 simultaneous users to SA6500

Add 10,000 simultaneous users to SA6500

Add 12,500 simultaneous users to SA6500

Add 15,000 simultaneous users to SA6500

SA6500-ADD-20,000U* Add 20,000 simultaneous users to SA6500

SA6500-ADD-25,000U* Add 25,000 simultaneous users to SA6500

Feature Licenses

SA6500-MTG

SA6500-IVS

Secure Meeting for SA6500

Instant Virtual System for SA6500

SA6500-ICE

SA6500-ICE-CL

In Case of Emergency License for SA6500

In Case of Emergency Clustering License for SA6500

Clustering Licenses

SA6500-CL-100U

SA6500-CL-250U

SA6500-CL-500U

SA6500-CL-1000U

SA6500-CL-2500U

SA6500-CL-5000U

SA6500-CL-7500U

SA6500-CL-10000U

SA6500-CL-12500U

SA6500-CL-15000U

SA6500-CL-20000U

SA6500-CL-25000U

Clustering: Allow 100 users to be shared from another SA6500

Clustering: Allow 250 users to be shared from another SA6500

Clustering: Allow 500 users to be shared from another SA6500

Clustering: Allow 1,000 users to be shared from another SA6500

Clustering: Allow 2,500 users to be shared from another SA6500

Clustering: Allow 5,000 users to be shared from another SA6500

Clustering: Allow 7,500 users to be shared from another SA6500

Clustering: Allow 10,000 users to be shared from another SA6500

Clustering: Allow 12,500 users to be shared from another SA6500

Clustering: Allow 15,000 users to be shared from another SA6500

Clustering: Allow 20,000 users to be shared from another SA6500

Clustering: Allow 25,000 users to be shared from another SA6500

*Multiple SA6500s required

10

Ordering Information (continued)

MODEL NUMBER DESCRIPTION

Enhanced Endpoint Security Licenses for SA2500, SA4500, and SA6500

ACCESS-EES-10U-1YR Enhanced Endpoint Security subscription,

10 concurrent users, 1-year

ACCESS-EES-25U-1YR

ACCESS-EES-50U-1YR

ACCESS-EES-100U-1YR

ACCESS-EES-250U-1YR

ACCESS-EES-500U-1YR

Enhanced Endpoint Security subscription,

25 concurrent users, 1-year

Enhanced Endpoint Security subscription,

50 concurrent users, 1-year

Enhanced Endpoint Security subscription,

100 concurrent users, 1-year

Enhanced Endpoint Security subscription,

250 concurrent users, 1-year

Enhanced Endpoint Security subscription,

500 concurrent users, 1-year

ACCESS-EES-1000U-1YR

ACCESS-EES-2500U-1YR

ACCESS-EES-5000U-1YR

ACCESS-EES-7500U-1YR

ACCESS-EES-10U-2YR

ACCESS-EES-25U-2YR

Enhanced Endpoint Security subscription,

1000 concurrent users, 1-year

Enhanced Endpoint Security subscription

,

2500 concurrent users, 1-year

Enhanced Endpoint Security subscription

,

5000 concurrent users, 1-year

Enhanced Endpoint Security subscription

,

7500 concurrent users, 1-year

Enhanced Endpoint Security subscription

, 10 concurrent users, 2-years

Enhanced Endpoint Security subscription

, 25 concurrent users, 2-years

ACCESS-EES-50U-2YR

ACCESS-EES-100U-2YR

ACCESS-EES-250U-2YR

ACCESS-EES-500U-2YR

ACCESS-EES-1000U-2YR

Enhanced Endpoint Security subscription

, 50 concurrent users, 2-years

Enhanced Endpoint Security subscription

, 100 concurrent users, 2-years

Enhanced Endpoint Security subscription

, 250 concurrent users, 2-years

Enhanced Endpoint Security subscription

, 500 concurrent users, 2-years

Enhanced Endpoint Security subscription

,

1,000 concurrent users, 2-year s

ACCESS-EES-2500U-2YR

Enhanced Endpoint Security subscription

,

2,500 concurrent users, 2-year s

ACCESS-EES-5000U-2YR

Enhanced Endpoint Security subscription

,

5,000 concurrent users, 2-year s

ACCESS-EES-7500U-2YR

Enhanced Endpoint Security subscription

,

7,500 concurrent users, 2-years

ACCESS-EES-10U-3YR

ACCESS-EES-25U-3YR

ACCESS-EES-50U-3YR

ACCESS-EES-100U-3YR

ACCESS-EES-250U-3YR

ACCESS-EES-500U-3YR

ACCESS-EES-1000U-3YR

ACCESS-EES-2500U-3YR

ACCESS-EES-5000U-3YR

ACCESS-EES-7500U-3YR

Enhanced Endpoint Security subscription

, 10 concurrent users, 3-years

Enhanced Endpoint Security subscription

, 25 concurrent users, 3-years

Enhanced Endpoint Security subscription

, 50 concurrent users, 3-years

Enhanced Endpoint Security subscription

, 100 concurrent users, 3-year s

Enhanced Endpoint Security subscription

, 250 concurrent users, 3-years

Enhanced Endpoint Security subscription

, 500 concurrent users, 3-year s

Enhanced Endpoint Security subscription

,

1,000 concurrent users, 3-years

Enhanced Endpoint Security subscription

,

2,500 concurrent users, 3-years

Enhanced Endpoint Security subscription

,

5,000 concurrent users, 3-year s

Enhanced Endpoint Security subscription

,

7,500 concurrent users, 3-years

MODEL NUMBER DESCRIPTION

Premier RDP Applet Licenses for SA2500, SA4500, and SA6500

ACCESS-RDP-50U-1YR Java RDP Applet 1-year subscription for 50 simultaneous users

ACCESS-RDP-100U-1YR

ACCESS-RDP-250U-1YR

ACCESS-RDP-500U-1YR

ACCESS-RDP-1000U-1YR

Java RDP Applet 1-year subscription for 100 simultaneous users

Java RDP Applet 1-year subscription for 250 simultaneous users

Java RDP Applet 1-year subscription for 500 simultaneous users

Java RDP Applet 1-year subscription for 1,000 simultaneous users

ACCESS-RDP-2000U-1YR

ACCESS-RDP-2500U-1YR

Java RDP Applet 1-year subscription for 2,000 simultaneous users

Java RDP Applet 1-year subscription for 2,500 simultaneous users

ACCESS-RDP-5000U-1YR Java RDP Applet 1-year subscription for 5,000 simultaneous users

ACCESS-RDP-7500U-1YR

ACCESS-RDP-10KU-1YR

ACCESS-RDP-50U-2YR

ACCESS-RDP-100U-2YR

Java RDP Applet 1-year subscription for 7,500 simultaneous users

Java RDP Applet 1-year subscription for 10,000 simultaneous users

Java RDP Applet 2-year subscription for 50 simultaneous users

Java RDP Applet 2-year subscription for 100 simultaneous users

ACCESS-RDP-250U-2YR

ACCESS-RDP-500U-2YR

Java RDP Applet 2-year subscription for 250 simultaneous users

Java RDP Applet 2-year subscription for 500 simultaneous users

ACCESS-RDP-1000U-2YR Java RDP Applet 2-year subscription for 1,000 simultaneous users

ACCESS-RDP-2000U-2YR Java RDP Applet 2-year subscription for 2,000 simultaneous users

ACCESS-RDP-2500U-2YR Java RDP Applet 2-year subscription for 2,500 simultaneous users

ACCESS-RDP-5000U-2YR Java RDP Applet 2-year subscription for 5,000 simultaneous users

ACCESS-RDP-7500U-2YR Java RDP Applet 2-year subscription for 7,500 simultaneous users

ACCESS-RDP-10KU-2YR Java RDP Applet 2-year subscription for 10,000 simultaneous users

ACCESS-RDP-50U-3YR

ACCESS-RDP-100U-3YR

Java RDP Applet 3-year subscription for 50 simultaneous users

Java RDP Applet 3-year subscription for 100 simultaneous users

ACCESS-RDP-250U-3YR

ACCESS-RDP-500U-3YR

Java RDP Applet 3-year subscription for 250 simultaneous users

Java RDP Applet 3-year subscription for 500 simultaneous users

ACCESS-RDP-1000U-3YR Java RDP Applet 3-year subscription for 1,000 simultaneous users

ACCESS-RDP-2000U-3YR Java RDP Applet 3-year subscription for 2,000 simultaneous users

ACCESS-RDP-2500U-3YR Java RDP Applet 3-year subscription for 2,500 simultaneous users

ACCESS-RDP-5000U-3YR Java RDP Applet 3-year subscription for 5,000 simultaneous users

ACCESS-RDP-7500U-3YR Java RDP Applet 3-year subscription for 7,500 simultaneous users

ACCESS-RDP-10KU-3YR Java RDP Applet 3-year subscription for 10,000 simultaneous users

11

Ordering Information (continued)

DESCRIPTION MODEL NUMBER

Accessories

UNIV-CRYPTO

UNIV-PS-400W-AC

UNIV-80G-HDD

UNIV-MR2U-FAN

UNIV-MR1U-RAILKIT

UNIV-MR2U-RAILKIT

UNIV-SFP-FSX

UNIV-SFP-FLX

UNIV-SFP-COP

SA6500-IOC

Field upgradeable SSL acceleration module for SA4500

Field upgradeable secondary 400 W power supply for SA6500

Field replaceable 80 GB hard disk for SA6500

Field replaceable fan for SA6500

Rack mount kit for SA2500 and SA4500

Rack mount kit for SA6500

Mini-GBIC transceiver - fiber SX for SA6500

Mini-GBIC transceiver - fiber LX for SA6500

Mini-GBIC transceiver - copper for SA6500

GBIC I/O card

About Juniper Networks

Juniper Networks, Inc. is the leader in high-performance networking. Juniper offers a high-performance network infrastructure that creates a responsive and trusted environment for accelerating the deployment of services and applications over a single network. This fuels high-performance businesses.

Additional information can be found at www.juniper.net.

Corporate and Sales Headquarters

Juniper Networks, Inc.

1194 North Mathilda Avenue

Sunnyvale, CA 94089 USA

Phone: 888.JUNIPER (888.586.4737) or 408.745.2000

Fax: 408.745.2100 www.juniper.net

APAC Headquarters

Juniper Networks (Hong Kong)

26/F, Cityplaza One

1111 King’s Road

Taikoo Shing, Hong Kong

Phone: 852.2332.3636

Fax: 852.2574.7803

EMEA Headquarters

Juniper Networks Ireland

Airside Business Park

Swords, County Dublin, Ireland

Phone: 35.31.8903.600

EMEA Sales: 00800.4586.4737

Fax: 35.31.8903.601

Copyright 2010 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos,

NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper

Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.

1000220-009-EN June 2010

12

To purchase Juniper Networks solutions, please contact your Juniper Networks representative at 1-866-298-6428 or authorized reseller.

Printed on recycled paper

Product Data Sheet

RSA

®

Authentication Manager

Enterprise-class security engine for RSA SecurID

®

authentication

At a Glance

— Enterprise-class two-factor security engine powers the authentication of more than 25 million RSA

SecurID

® users worldwide

— Scales to meet the needs of small to large enterprises

— Interoperable with more than 350 products from more than 200 vendors at no additional charge

— Enables a flexible array of centrally managed credential methods

Identity Assurance

Identity assurance is the set of capabilities and methodologies that minimize business risk associated with identity impersonation and inappropriate account use.

Identity assurance brings confidence to organizations by allowing trusted identities to freely and securely interact with systems and access information, opening the door for new ways to generate revenue, satisfy customers and control costs.

RSA Authentication Manager

RSA Authentication Manager is the de facto standard in identity assurance. The system comprehensively addresses the four capabilities required for identity assurance: credential management and policy, authentication, authorization and intelligence. The RSA Identity Assurance portfolio extends user authentication from a single security measure to a continual trust model that is the basis of how an identity is used and what it can do. Trusted identities managed by RSA bring confidence to everyday transactions and support new business models by providing secure access for employees, customers and partners while striking the right balance between risk, cost and convenience.

RSA

®

Authentication Manager software is the management component of the RSA SecurID

® solution. It is used to verify authentication requests and centrally administer user authentication policies for access to enterprise networks.

Working in conjunction with RSA SecurID authenticators and

RSA

®

Authentication Agent software, the solution provides two-factor user authentication that protects access to more

VPNs, wireless networks, web applications, business applications and operating environments, including the

Microsoft

®

Windows

® operating system, than any other system available today.

High Performance and Scalability

RSA Authentication Manager software is designed to fit the needs of organizations of all sizes. Built upon an enterpriseclass multi-processor architecture, it is capable of handling tens of thousands of users, as well as hundreds of simultaneous authentications per second. It is deployed in banking, government, manufacturing, retail, high tech and healthcare worldwide, including many small to mediumsized businesses. It is available in two versions: Base

Edition and Enterprise Edition.

Database Replication

The database replication feature of the RSA Authentication

Manager enables flexible network configuration and load balancing for improved performance that ultimately lowers management costs.

The Base Edition provides one primary server and one replica server. User administration is handled by the primary server and all information is duplicated to the replica. Both servers are capable of handling authentication requests;

RSA Authentication Agents balance the work load between servers by detecting response times and directing the request accordingly, to ensure optimum performance.

The Enterprise Edition offers one primary and multiple replicas (up to 5 on the RSA SecurID Appliance; 10 or more on the software release), along with the ability to have up to six separate realms. This provides administrators with the ability to track user authentication to their network anytime in the world in real time, update security policy simultaneously across the worldwide network and develop a global network topology that increases network performance.

Manageability and Control

RSA Authentication Manager software offers a high level of management flexibility and control. There is no desktop admin software to install; a built-in web server allows for access to the management console from any web browser.

The included Juniper

®

Steel Belted RADIUS server is similarly managed from completely within the intuitive, easy-tonavigate administration console.

Native LDAP integration enables RSA Authentication

Manager to point to a single authoritative data store in real time for user and group information. Supported identity sources include Microsoft Active Directory

® or Sun One

, and no schema changes are required to the underlying database infrastructure. A Microsoft Management Console snap-in supports manipulation of user records directly from an MMC interface.

Both the Base and Enterprise Editions include RSA

®

Credential Manager, a completely integrated software module that enables user self service (Base and Enterprise) and workflow provisioning (Enterprise only) to dramatically speed the on-boarding of users to their credentials.

Auditing and Reporting

Because RSA Authentication Manager logs all transactions and user activity, administrators can utilize it as an auditing, accounting and compliance tool. It includes report templates that can be easily tailored to administration needs, including activity, exception, incident and usage summaries.

In addition to the reporting capabilities the product supports a live activity monitor that shows all or administrator-selected activity across a global deployment.

User ID: asmith

PIN: kzw08 token code: 449054

RSA

Authentication

Agent

Seed

Algorithm

Time

User ID: asmith

PIN: kzw08 token code: 449054

RAS, VPN,

SSL-VPN, WLAN, web and more

Same seed

RSA

Authentication

Manager

449054

Same algorithm

Same time

RSA SecurID Time-synchronous

Two-factor Authentication

Array of Credentialing Methods

RSA Authentication Manager supports authenticators in a variety of form factors from the traditional hardware tokens to software-based tokens that install on PCs and smart phones, to the On-demand Authenticator that delivers onetime token codes using Short Message Service (SMS) or email. All of these credentials are centrally managed from a common interface.

Turnkey Interoperability

RSA Authentication Manager is interoperable with many of the major network infrastructure and operating system products on the market - including more than 350 products from over

200 vendors – providing an organization with maximum flexibility and investment protection. Leading vendors of remote access products, VPNs, firewalls, wireless network devices, web servers and business applications have built in support for RSA Authentication Manager.

www.rsa.com

©2000-2010 EMC Corporation. All Rights Reserved.

EMC, RSA, RSA Security, SecurID and the RSA logo are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other products and services mentioned are trademarks of their respective companies.

SIDAM_DS_0710

Product Data Sheet

RSA SecurID

®

700 Authenticator

Convenient, reliable and secure choice for two-factor authentication

At a Glance

— Convenient keyfob form factor is easy for users to carry and use

— High-quality solution combined with a lifetime warranty creates a reliable choice

— Advanced time-based algorithm and tamperevident body ensures secure authentication

The RSA SecurID 700 authenticator is the most popular form factor in the SecurID authenticator portfolio offered by RSA, the Security Division of EMC, due to its convenience, reliability and security. Thousands of organizations worldwide rely upon the SecurID 700 to protect valuable network and customer resources. Used in conjunction with

RSA

®

Authentication Manager, the SecurID 700 adds an additional layer of security by requiring users to identify themselves with two unique factors – something they know, a PIN, and something they have, a unique one-time password (OTP) that changes every 60-seconds – before they are granted access to the secured application.

Convenient Form Factor

With its robust key ring, small size and easy-to-read LCD display, the SecurID 700 is a convenient form factor for employees, partners and customers. Loss of the authenticator is minimized as it easily fits on a ring of keys or in a pocket or purse. Users can easily read the OTP displayed on the authenticator and know when the number is going to change by watching the countdown indicator. The

SecurID 700 is convenient for IT managers too, as it comes pre-seeded and is ready-to-use out-of-the-box. It is integrated with over 350 certified third-party applications, helping to lower deployment costs by providing the assurance that important applications are “RSA SecurID

Ready.” The SecurID 700 can also be customized with company artwork to reinforce the issuer’s brand.

Reliable Authentication Solution

The SecurID 700 authenticator is designed to withstand the worst imaginable conditions, offering industry-leading reliability. From temperature cycling to mechanical shocks to being immersed in water, the SecurID 700 is subjected to rigorous tests to ensure that customers do not face hidden costs due to token failures. The combination of this highlevel of quality with a lifetime warranty allows organizations to reduce the overhead costs of distributing replacement tokens and drive down the overall cost of security while providing a consistent and easy-to-use authentication experience for end-users.

Strong Security

The SecurID 700 offers a time-based OTP solution that ensures a strong level of security. It has a unique symmetric key that is combined with a proven algorithm to generate a new one-time password every 60 seconds. RSA technology synchronizes each authenticator with the security server, ensuring a high level of security. The one-time password, something you have, is coupled with a secret personal identification number (PIN), something you know, to create a combination that is nearly impossible for a hacker to guess. The SecurID 700 is also tamper evident, meaning that if someone opened the token for nefarious purposes, it would be evident to the user of the device.

The RSA SecurID 700 authenticator is a smart choice for companies that are looking for a convenient, reliable and secure authentication solution. Its use by millions of users world-wide for secure access to enterprise and consumer applications demonstrates that the SecurID 700 is a proven solution that can be counted on to protect your organization’s resources.

Environmentally friendly

In an effort to help preserve the environment,

RSA reuses almost 100% of all returned authenticators. Customers can send the authenticator back to RSA and RSA will recycle the token at no additional charge.

Technical Specifications

Height: 20mm; 27mm at highest point

Width: 68mm

Thickness: 9mm

Weight: 15 grams

Materials: Plastic – ABS

Power: 3v Lithium (Coin cell)

Display: Liquid Crystal (LCD)

Server support: RSA Authentication Manager 5.1 or higher; RSA SecurID

Authentication Engine

Operating temperature: -15°C to 60°C

Lifetime: Purchased in increments of 24, 36, 48, or 60 months

Warranty: Lifetime warranty

Tamper evidence: Conforms to ISO 13491-1; ISO DIS 13491-2:2005

Product safety standards: RoHS, WEEE, CE, cRoHS,

Regulatory standards: FCC Part 15 Class A and Class B, EN55022

Class A and Class B

©2009 RSA Security Inc. All Rights Reserved.

RSA, RSA Security, SecurID and the RSA logo are either registered trademarks or trademarks of RSA Security Inc. in the United States and/or other countries.

EMC is a registered trademark of EMC Corporation. All other products and services mentioned are trademarks of their respective companies.

SID700 DS 0709

ANEXO 3: Hojas Técnicas de los productos que participaron en el proceso de selección

Se presenta en este anexo las hojas técnicas de los productos, equipos y software, que participaron del proceso de selección de componentes para la solución de seguridad propuesta.

 

 

CHECK POINT

SECURITY APPLIANCES

Table of Contents

Introduction ………………………………………………………………… 1

UTM-1 Appliances ………………………………………………………… 2

Series 80 Appliance ………………………………………………………… 3

Power-1 Appliances ………………………………………………………… 4

IP Appliances ……………………………………………………………… 5

VSX-1 Appliances …………………………………………………………… 6

DLP-1 Appliances…………………………………………………………… 7

Smart-1 ……………………………………………………………………… 8

Smart-1 SmartEvent ……………………………………………………… 9

Integrated Appliance Solutions …………………………………………… 10

Appliance Specifications ………………………………………………… 13

Introduction

Check Point appliances deliver a powerful turnkey solution for deploying Check Point award-winning software solutions to address virtually any security need. Based on the new Check Point Software

Blade architecture, Check Point appliances provide the highest level of flexibility, scalability, and extensibility in the industry. All Check Point appliances are built around a unified security architecture, enabling organizations to perform all aspects of security management via a single, unified console.

With Check Point appliances, organizations of all sizes can tailor their network security infrastructure to meet their functional and performance needs —with centralized management, simple deployment, and full extensibility.

CHECK POINT APPLIANCE OPTIONS

Check Point offers the following appliance options to effectively deliver comprehensive security applications:

Dedicated Appliances

—Check Point dedicated hardware platforms devoted to a single security application such as intrusion prevention (IPS) and data loss prevention (DLP). Dedicated appliances provide hardware resources for a single application, delivering higher performance.

Integrated Appliances

—Check Point integrated appliances take an all-in-one approach, combining multiple security applications on a single enterprise-class platform. Because applications are consolidated within a unified security architecture, organizations can reduce TCO and simplify security configuration.

Bladed Hardware

—Check Point bladed hardware platforms include a chassis with multiple hardware blades that run independent security applications. Each blade is equivalent to an independent server or appliance, and contains dedicated resources for each security application. Bladed hardware platforms deliver built-in failover and load-balancing utilities, as well as an increase in system performance.

1

UTM-1 Appliances

All inclusive. All secured.

OVERVIEW

UTM-1

appliances offer the ideal combination of proven security technologies and easy-to-use deployment and management features. With a full line of hardware-based solutions, Check Point UTM-1 appliances consolidate key security applications such as firewall, VPN, intrusion prevention, and antivirus and more into a single, easy-to-manage solution. UTM-1 Appliances are based on the Check Point Software Blade architecture that enables flexible and fast deployment of additional security capabilities, such as

VoIP protections, without the addition of new hardware.

UTM-1

appliances deliver a comprehensive set of security features including firewall, intrusion prevention, antivirus, anti-spyware, anti-spam, Web filtering, Web application security—as well as secure site-to-site and remote access connectivity.

UTM-1 Edge

family of appliances deliver integrated firewall, intrusion prevention, VPN, and antivirus for branch offices of up to 100 users, ensuring small offices stay as secure as the corporate office.

Benefits n

Industry-leading application- and network-layer firewall n

Site-to-site and remote-access VPNs n

Gateway antivirus and anti-spyware n

Intrusion prevention with type-based protections and security updates n

Web security with URL filtering and integrated security for

Web applications n

Email security and anti-spam, including the Check Point six dimensions of comprehensive messaging security n

Software Blade architecture for fast and flexible deployment of new security services

UTM-1

appliances come in six models and

UTM-1 Edge

family of appliances consists of X-Series and N-Series models. UTM-1 Edge X-Series appliances come in four models and UTM-1 Edge N-Series appliances come in two models that let organizations choose the right solution to meet price and performance requirements.

UTM-1 Edge N-Series

UTM-1 130

UTM-1 3070

For more information: www.checkpoint.com/products/utm

2

Series 80 Appliance

Enterprise-grade branch office security

OVERVIEW

The

Series 80 Appliance

sraises the bar on remote and branch office security by extending Software Blades to the edge of the network—delivering enterprise-grade security in a high-performance desktop form factor. The Series 80 appliance delivers IPsec/

SSL VPN and the same industry-proven firewall technology that secures the Global 100—all right out-of-the box. Based on the

Check Point Software Blade architecture, the Series 80 appliance enables flexible, single-click upgrades of additional security capabilities, including IPS, antivirus and anti-malware, anti-spam and email security, and URL filtering. And, the Series 80 can be easily configured, deployed and managed without the need for corporate IT staff.

Benefits n

Delivers flexible and manageable enterprise-grade security for branch offices n

Includes Best-in-Class Integrated Firewall and IPsec/

SSL VPN n

Provides the best price/performance in its class with proven throughput of 1.5 Gbps for firewall, 220 Mbps for

VPN and 720 Mbps for IPS n

Protects against emerging threats with optional Software

Blades such as IPS, antivirus, email security, and more n

High port density provides enhanced performance and minimizes the overhead of switches and routers in remote environments n

New intuitive and fast start-up wizard allows hassle-free configuration, deployment and management n

Centrally managed by SmartCenter and Provider-1

Series 80

Series 80

For more information: www.checkpoint.com/products/series-80-appliance

3

Power-1 Appliances

Security for high-performance environments

OVERVIEW

Check Point Power-1

appliances enable organizations to maximize security in high-performance environments such as large campuses or data centers. They combine integrated firewall, IPsec VPN, and intrusion prevention with advanced acceleration and networking technologies, delivering a high-performance security platform for multi-Gbps environments. The Check Point Software

Blade architecture enables flexible and fast deployment of additional security capabilities, such as VoIP protections and UTM functionality, on Power-1 appliances.

Benefits n

Streamlines deployment of enterprise security for large offices and data centers n

Ensures availability of business-critical applications with up to 30 Gbps firewall throughput and up to 15 Gbps intrusion prevention throughput n

Provides comprehensive security including Firewall, IPS,

IPsec VPN, Advanced Networking, and Acceleration &

Clustering Software Blades n

Protects against emerging threats with optional Software

Blades such as VoIP, Web Security, Antivirus, and more n

Simplifies administration with a single management conn sole for all sites

Power-1 11000 series adds performance extensibility via field upgradeability and enables customers to boost performance by 100% from lowest to highest model

Power-1

appliances, which include

Power-1 5075

,

Power-1 9075

, and the

Power-1 11000

series, let organizations choose the proper levels of performance and port density for their environments.

Power-1 5075

Power-1 9075

Power-1 11000 series

For more information: www.checkpoint.com/products/power-1

4

IP Appliances

Flexible networking and performance options

OVERVIEW

Proven for years in complex networking and performancedemanding environments,

Check Point IP

appliances offer customers integrated turnkey security functionality such as firewall,

VPN, and intrusion prevention across a wide range of models.

Optimized for Check Point Security Gateway software, the IP appliances offer unsurpassed scalability, high performance, manageability, and high port densities that reduces operational costs in complex, mission-critical security environments. IP appliances enable customers to extend a unified security architecture from the network core out to branch and remote offices.

Benefits n

Integrated security appliances based on Check Point

Software Blade architecture for fast, flexible deployment of security functionality n

Scalable, modular, and configurable security architecture with multiple acceleration (ADP service modules), security, and interface options insures investment protection n

Achieve high performance across a broad spectrum of n traffic types

Enterprise-class high availability, scalability, and fault tolern ance to insure network resiliency and business continuity

Carrier-grade serviceability and redundancy n

Streamlined IT efficiency with advanced management tools for installation, configuration, and maintenance

IP appliances

come in six models that deliver security solutions ideal for large enterprises, carrier-grade networks and remote and branch offices.

IP295

IP695

IP2455

Accelerated Data Path (ADP) for IP Appliances

For more information: www.checkpoint.com/products/ip-appliances

5

VSX-1 Appliances

Virtualized security

OVERVIEW

The

VSX-1

appliances are virtualized security gateways that enable the creation of hundreds of security systems on a single hardware platform, delivering deep cost savings and infrastructure consolidation. Based on the proven security of VPN-1

®

Power

, VSX provides best-in-class firewall, VPN, URL filtering, and intrusion-prevention technology to multiple networks, securely connecting them to each other and shared resources such as the Internet and DMZs. All security systems, virtual and real, are centrally managed through Check Point SmartCenter

or Provider-1

®

management consoles.

Ideal for MSPs, VSX-1 becomes the ideal platform for new subscription revenue opportunities by delivering new security services easily and efficiently.

Benefits n

Unique and comprehensive virtualized security solution with firewall, VPN, IPS, and URL filtering n

Consolidates from five to hundreds of security gateways on a single device, increasing device utilization and reducing power, space, and cooling n

Linear scalability with performance up to 27 Gbps n

Flexible deployment options including software and a full line of turnkey appliances n

Single proven security management architecture

VSX-1

appliances come in three models that allow organizations to choose the right solution for their performance and scalability needs.

VSX-1 3070

VSX-1 9070

VSX-1 9090

For more information: www.checkpoint.com/products/vpn-1_power_vsx

6

DLP-1 Appliances

Check Point makes DLP work

OVERVIEW

Check Point DLP-1

solves the longstanding problem with data loss prevention technology—enabling organizations to effectively protect sensitive company and customer data, without placing an additional burden on your scarce IT resources. Check Point

DLP combines state-of-the-art prevention and enforcement with end user remediation capabilities, for the ideal blend of security and usability.

UserCheck

, Check Point’s unique user remediation function, educates users on self-incident handling and corporate data policies, while empowering them to remediate events in real-time. Files that are sent or uploaded to the web are processed by

Check Point MultiSpect

, a multi-data classification engine that inspects traffic flow for all data-in-motion, and provides high accuracy in correlating users, data types, and processes.

Benefits n

Easily defines data policies while assuring consistent enforcement across the entire network n

Prevents data loss by inspecting traffic in real-time, and proactively blocking the transmission of sensitive information n

Includes more than 250 pre-defined best-practices policies and rules for easy administration n

High performance from 700Mbps to over 2.5Gbps

n

Centralized Check Point management for unprecedented visibility and control n

Open scripting language to create customized data types for easily extensible and granular prevention

DLP-1 2571

DLP-1 9571

For more information: www.checkpoint.com/products/dlp

7

Smart-1 Appliances

Extensible security management

OVERVIEW

Smart-1

appliances deliver Check Point’s market leading security management software blades on a dedicated hardware platform specifically designed for mid-size and large enterprise security networks. Based on Check Point’s software blade architecture, the line of four Smart-1 appliances are first to deliver a unified management solution for network, IPS and endpoint security with unsurpassed extensibility.

Benefits n

Provides a comprehensive set of security management

Software Blades in four turnkey security management appliances n

Maximize efficiency with a single unified management console for network and endpoint security n

Reduce costs and conserve resources with up to 12 TB of integrated storage capabilities n

Ensure operational continuity for the most demanding environments n

Simplify large scale security policy provisioning with multi-domain management (Provider-1)

Smart-1 150:

Security management for large service providers with more than 150 gateways and including up to

12 TB of integrated log storage

Smart-1 50:

Security management for enterprises and service providers with 50 to 150 gateways, including up to

4 TB of integrated log storage

Smart-1 25:

Security management for enterprises with 25 to

50 gateways, including up to 2 TB of integrated log storage

Smart-1 5:

Security management for businesses with

5 to 25 gateways including up to 500 GB of integrated log storage

Smart-1 5

Smart-1 50

Smart-1 150

For more information: www.checkpoint.com/products/smart-1

8

For more information: www.checkpoint.com/products/smart-1

Smart-1 SmartEvent Appliances

Unified security event management

OVERVIEW

Smart-1 SmartEvent

appliances deliver Check Point’s SmartEvent Software Blade event management software blades on a dedicated hardware platform. Smart-1 SmartEvent appliances are specifically designed for mid-size and large enterprise security networks, providing comprehensive security event analysis in a turnkey, plug-and-play appliance. Based on Check Point’s software blade architecture, Smart-1 SmartEvent appliances are first to deliver a unified event management solution for network, IPS and endpoint security with unsurpassed extensibility.

Benefits n

Provides a comprehensive set of security management

Software Blades in three turnkey security management appliances n

Maximize efficiency with a single unified management console for network and endpoint security event management n

Reduce costs and conserve resources with up to 4 TB of built-in storage capabilities n

Ensure operational continuity for the most demanding environments

Smart-1 SmartEvent 50:

Security Management for enterprises that need maximum flexibility, high performance and up to 2 years of log storage

Smart-1 SmartEvent 25:

Security Management for enterprises that want maximum flexibility and up to 1 year of log storage

Smart-1 SmartEvent 5:

Security Management for businesses that want an affordable solution that can scale as their business grows

Smart-1 SmartEvent 5

Smart-1 SmartEvent 25

Smart-1 SmartEvent 50

For more information: www.checkpoint.com/products/smartevent

9

Check Point Integrated

Appliance Solutions

Integrated hardware and software from Check Point and IBM

OVERVIEW

Check Point Integrated Appliance Solutions (IAS)

provide organizations with the ultimate choice in appliances—integrated software and hardware bundles customized to their exact specifications. These customized platforms enable them to provision security services based on exact corporate needs.

Organizations can choose from Check Point Software Blades such as firewall, IPSec VPN, and intrusion prevention, and additional blades including UTM functionality. They can also chose to deploy Check Point’s virtualized security gateway, VPN-1 Power VSX

, as well as Provider-1 for management of large deployments with separate security domains.

Check Point integrates the selected software onto an IBM System x

server or IBM BladeCenter

®

to provide a comprehensive solution that includes direct technical support from Check Point

Benefits n

Provides a software/hardware combination trusted by the largest organizations in the world n

Reduces complexity by ensuring compatibility of the latest certified components and servers n

Increases flexibility for security services provisioning by allowing customers to choose from multiple Check Point solutions n

Delivers scalable performance and port density based on customer needs n

Protects against emerging threats with service-based Check Point Software Blades including IPS, Antivirus, Anti-Malware, and URL Filtering

M series

Integrated Appliance Solutions are predefined models that can be customized to meet specific needs. The

M2

model delivers UTM functionality. The

M6

and

M8

models both provide maximum security for high-performance environments with integrated firewall, VPN, and intrusion prevention.

IAS M8

For more information: www.checkpoint.com/products/ias

10

Integrated Appliance Solution

Bladed Hardware

Customized security with superior network performance

OVERVIEW

Check Point Integrated Appliance Solution (IAS) Bladed Hardware

provides a customized, integrated security solution on a single, high-performance chassis. By integrating essential Check Point Security Gateway Software Blades with Crossbeam’s

X-Series carrier-grade chassis, IAS Bladed Hardware can effectively serve the needs of the most demanding, highest performance environments. Alternatively, the VPN-1 Power VSX provides a dedicated gateway for multi-layer, multi-domain virtualized security.

Leveraging the Check Point Software Blade Architecture, IAS Bladed Hardware provides customized security solutions to meet specific customer needs—including unified management of physical and virtual environments.

Benefits n

Provides a customized, integrated security solution on a single, high-performance chassis n

Integrates best-in-class award-winning security software blades with carrier-grade chassis for a comprehensive security solution n

Enables true performance scalability, with up to 40Gbps firewall throughput n

Increases flexibility for security services provisioning by allowing customers to choose from multiple Check Point solutions n

Provides a single point of contact for hardware, software, and support

With Check Point

IAS Bladed Hardware

, customers can choose among two hardware chassis and two security software bundles for a customized solution that best fits their individual needs. The Crossbeam X80 hardware chassis provides scalability and performance, while the X45 chassis provides performance in a space-saving design. The Check Point Security Gateway SG805 software bundle is designed for physical environments, while the VPN-1 Power VSX provides a virtualized security solution.

Crossbeam X80

For more information: www.checkpoint.com/products/ias-bladed-hardware

11

Check Point Integrated

Appliance Solutions

Integrated hardware and software from Check Point and HP ES

OVERVIEW

Check Point Integrated Appliance Solutions (IAS) D-Series Appliances

provide organizations to create customized security solution—integrated software and hardware—built on a baseline set of standardized platforms for delivery of security services. This choice allows organizations to combine the proven security of Check Point on high performance-oriented platforms with a single point of contact for fulfillment and support of all issues.

Organizations can customize their security solution using Check Point Software Blades such as firewall, IPSec VPN, and intrusion prevention, advanced networking and more. Organizations can also chose to deploy Check Point’s virtualized security gateway,

VPN-1 Power VSX™, Provider-1 for management of large deployment with separate security domains, End Point Suite POINTSEC.

Benefits n

Provides a customized security software and hardware bundle on high performance-oriented platforms n

Allows customers to extend security by simple software blades upgrade n

Delivers high firewall performance of up to 20 Gbps based on customer needs n

Increases flexibility for security services provisioning by allowing customers to choose from multiple Check Point solutions n

Provides a single point of contact for hardware, software and support

D-Series

Integrated Appliance Solutions are predefined models that can be customized to meet specific needs. There are eleven (11) models to choose from to meet your security needs. The VSX and VSLS provides virtualized security solution and the UTM models deliver UTM functionality.

D8

12

Appliance Specifications

UTM-1 Series

Models

Software

Edition

10/100 Ports

10/100/1000

Ports

Firewall

Throughput

VPN

Throughput

Concurrent

Sessions

IPS Throughput

UtM-1 edge

UtM-1 edge n-series

UTM-1 Edge X,

UTM-1 Edge W,

UTM-1 Edge X ADSL,

UTM-1 Edge W ADSL

Embedded

NGX

UTM-1 Edge N

UTM-1 Edge NW

Embedded

NGX

6 -

-

190 Mbps

35 Mbps

8,000

5 Mbps

6

1.0 Gbps

200 Mbps

60,000

30 Mbps

UtM-1 130 UtM-1 270 UtM-1 570

UTM-1 132

UTM-1 136

R65, R70,

R71

1

4

1.5 Gbps

120 Mbps

600,000

1.0 Gbps

UTM-1 272

UTM-1 276

R65, R70,

R71

-

4

1.5 Gbps

120 Mbps

600,000

1.0 Gbps

UTM-1 572

UTM-1 576

R65, R70,

R71

-

6

2.5 Gbps

300 Mbps

650,000

1.7 Gbps

UtM-1

1070

UtM-1

2070

UtM-1

3070

UTM-1 1073

UTM-1 1076

UTM-1 2073

UTM-1 2076

R65, R70,

R71

-

R65, R70,

R71

-

UTM-1 3073

UTM-1 3076

R65, R70,

R71

-

6

3 Gbps

350 Mbps

1.1 million

2.2 Gbps

8

3.5 Gbps

450 Mbps

1.1 million

2.7 Gbps

10

4.5 Gbps

1.1 Gbps

1.1 million

4 Gbps

Licensed Users 8/16 32/Unlimited Unlimited Unlimited Unlimited Unlimited Unlimited Unlimited

VLANs

UTM Out of the Box

Security

Acceleration

Multisite

Management

Storage

32

-

No

No

-

64

-

No

No

-

1,024

Yes

Yes

Yes

1

80 GB

1,024

Yes

Yes

Yes

1

160 GB

1,024

Yes

Yes

Yes

1

160 GB

1,024

Yes

Yes

Yes

1

160 GB

1,024

Yes

Yes

Yes

1

160 GB

1,024

Yes

Yes

Yes

1

160 GB

Form Factor

Dimensions

(standard)

Dimensions

(metric)

Weight

Desktop

8 x 1.2 x 4.8 in.

203.2 x 30.5 x 122mm

0.7kg

(1.6 lbs.)

Desktop

8 x 1.2 x 4.8 in.

203.2 x 30.5 x 122mm

0.7kg

(1.6 lbs.)

Desktop/1U

10.6 x 5.7 x 1.6 in.

270 x 145 x 40mm

1.6kg

(3.52 lbs.)

1U

16.8 x 10 x 1.73 in.

429 x 255 x 44mm

3.7kg

(8.1lbs.)

1U

16.8 x 10 x 1.73 in.

429 x 255 x 44mm

3.7kg

(8.1 lbs.)

1U

16.8 x 10 x 1.73 in.

429 x 255 x 44mm

3.7kg

(8.1 lbs.)

1U

17.4 x 15 x 1.73 in.

443 x 381 x 44mm

6.5kg

(14.3 lbs.)

1U

17.4 x 15 x 1.73 in.

443 x 381 x 44mm

6.5kg

(14.3 lbs.)

Operating

Environment

Power Input

Temperature: 5° to 40° C; Humidity: 10% to 85% non-condensing; Altitude: 2,500m

2

100/240V, 50/60Hz

Power Supply

Spec (Max)

Power

Consumption

(Max)

18W

-

18W

-

60W

46.9W

65W

26.2W

65W

41.1W

65W

40.1W

250W

63.1W

250W

77.5W

Compliance

UL 60950; FCC Part 15, Subpart B, Class A; EN 55024; EN 55022; VCCI V-3; AS/NZS 3548:1995; CNS 13438 Class A

(test passed; country approval pending); KN22, KN61000-4 Series, TTA; IC-950; ROHS

1 Maximum of 256 VLANs per interface

2 UTM-1 Edge operating environment: Temperature: 0º to 40º C, Humidity: 10%–90% non-condensing, Altitude: 4500m (15,000ft )

13

Software Edition

10/100/1000 Ports

Firewall Throughput

VPN Throughput

Concurrent Sessions

IPS Throughput

Licensed Users

VLANs

AV Throughput

Disk or Flash Based

Enclosure

Dimensions (standard)

Dimensions (metric)

Weight

Operating Environment

Power Input

Power Supply Spec (max)

Power Consumption (max)

Compliance

Appliance Specifications

Series 80

series 80

R71

10

1.5 Gbps

220 Mbps

150,000

720 Mbps

Unlimited

1024

100 Mbps

Flash

Desktop

8.75 x 1.75 x 6 in.

220 x 44 x 152.4mm

3.6kg (8 lbs.)

Temperature: 0° to 40° C;

Humidity: 5% to 95% non-condensing

100/240V, 50/60Hz, 240W

12V/2A DC 24W

16.68W

EMC: EN55022+24_2007-ITE;

FCC: FCCP15B+ICES-003-ITE;

Safety: UL/c-UL 60950-1_2nd_2007(US+CA);

IEC 60950_1_2nd_2005-CB

14

Appliance Specifications

Power-1 Series

Software Edition

10/100/1000 Ports

10Gb Ports

Firewall Throughput

1

VPN Throughput

1

Concurrent Sessions

IPS Throughput 1

Licensed Users

VLANs

UTM Out of the Box

Security Acceleration

Integrated Multigateway

Management

Storage

Enclosure

Dimensions (standard)

Dimensions (metric)

Weight

Operating Environment

Power Input

Power Supply Spec (max power-1 5075

R65, R70, R71

10/14

2 Optional

9 Gbps

2.4 Gbps

1.2 million

7.5 Gbps 2

Unlimited

1,024

3

Optional

Yes

power-1 9075

R65, R70, R71

14/18

4 Optional

16 Gbps

3.7 Gbps

1.2 million

10 Gbps 2

Unlimited

1,024

3

Optional

Yes

-

11065

R65, R70, R71

14/18

4 Optional

15 Gbps

3.7 Gbps

1.2 million

10 Gbps 2

Unlimited

1,024

3

Optional

Yes

power-1 11000 series

11075

R65, R70, R71

14/18

4 Optional

20 Gbps

4 Gbps

1.2 million

12 Gbps 2

Unlimited

1,024

Yes

-

3

Optional

11085

R65, R70, R71

14/18

4 Optional

30 Gbps

4.5 Gbps

1.2 million

15 Gbps 2

Unlimited

1,024

3

Optional

Yes

-

160 GB

2U

17 x 20 x 3.46 in.

2 x 160 GB

2U

17 x 20 x 3.46 in.

2 x 250 GB

2U

2 x 250 GB

2U

2 x 250 GB

2U

17 x 22.8 x 3.46 in.

17 x 22.8 x 3.46 in. 17 x 22.8 x 3.46 in.

431 x 509.5 x 88mm 431 x 509.5 x 88mm 431 x 580 x 88mm 431 x 580 x 88mm 431 x 580 x 88mm

14.5kg

(31.9 lbs.)

16.5kg

(36.3 lbs.)

23.4kg

(51.6 lbs.)

23.4kg

(51.6 lbs.)

23.4kg

(51.6 lbs.)

Temperature: 5° to 40° C; Humidity: 10% to 85% non-condensing; Altitude: 2,500m

100/240V, 50/60Hz 4

250W 400W 500W 500W 500W

Power Consumption (max) 164.1W

200.7W

253.2W

253.2W

253.2W

Compliance

UL 60950; FCC Part 15, Subpart B, Class A; EN 55024; EN 55022; VCCI V-3AS/NZS 3548:1995;

CNS 13438 Class A (test passed; country approval pending); KN22KN61000-4 Series, TTA; IC-950; ROHS

1 Performance data represents the maximum capabilities of the systems as measured under optimal testing conditions.

Deployment and policy considerations may impact performance results.

2

Test based on real-world traffic blend using the default profile

3

Maximum of 256 VLANs per interface

4 Redundant power supply

15

Appliance Specifications

IP Series

ip282 ip295 ip395 ip565 ip695 ip1285 ip2455

Software Edition

10/100/1000 Ports

10 GbE Ports

Firewall Throughput

VPN Throughput

Concurrent Sessions

IPS Throughput

VLANs

ADP Module

VPN Acceleration

Storage

Disk-Based or Flash

Enclosure

Dimensions (standard)

Dimensions (metric)

Weight

R65, R70, R71 R65, R70, R71 R65, R70, R71 R65, R70, R71 R65, R70, R71 R65, R70, R71 R65, R70, R71

6

-

1.5Gbps

1.0 Gbps

6/8

-

1.5 Gbps

1.0 Gbps

4/8

-

3.0 Gbps

677 Mbps

4/12

-

7 Gbps

1.7 Gbps

4/16

6

1

4/28

10

1

4/32

10 1

7.2/11.7 Gbps

2

10.3/17.5 Gbps

2

11/30 Gbps

2

1.9/ 3.3 Gbps

2

1.9/8.3 Gbps

2

1.9/8.3 Gbps

2

900,000

1.4 Gbps

900,000 1 million 1 million 1 million 1 million 1 million

9 Gbps

3

1024

-

Optional

40GB

Disk

4

1.4 Gbps 3

1024

4

-

Optional

2.9 Gbps

1024

4

-

Included

3 2.9 Gbps

1024

4

-

Included

3 4 Gbps

1024

4

Optional

Included

3

40 GB 80 GB 80 GB 80 GB

Disk or Flash Disk or Flash Disk or Flash Disk or Flash

7 Gbps 3

1024

4

Optional

Included

80 GB

Disk or Flash

1024

4

Optional

Included

80 GB

Disk or Flash

1U/half rack

8.52 x 18 x

1.71 in

216 x 457 x

44 mm

5.1kg

(11.25 lbs)

1U/half rack

8.52 x 18 x 1.71 in.

216 x 457 x 44mm

5.1kg

(11.25 lbs)

1U

17 x 16 x 1.71 in.

432 x 406 x 44mm

7.71kg

(17.0 lbs)

1U

17.23 x 22 x 1.71 in.

438 x 559 x 44mm

11.84kg

(26.1 lbs)

1U

17.23 x 24 x 1.71 in.

438 x 610 x 44mm

12.38kg

(27.3 lbs)

2U

17.23 x 24.11 x 3.46 in.

438 x 613 x 88mm

19.6kg

(43.2 lbs)

2U

17.23 x 24.11 x 3.46 in.

438 x 613 x 88mm

20.57kg

(45.35 lbs)

Operating Environment Temperature: 5° to 40° C

5

; Humidity: 10% to 85% non-condensing; Altitude: 2,500m

Power Input

Power Supply Spec

(max)

Power Consumption

(max)

133W

-

133W

-

150W

100W

100/240V, 50/60Hz

225W

165W

250W

-

700W

-

700W

-

DC Power Supply

-

Optional

Optional

Compliance

1

Optional

2

Performance without ADP/with ADP

3

Preliminary results

4 Maximum of 256 VLANs per interface

5 IP395 can go to 50° C

Safety: UL60950-1, First Edition: 2003, CAN/CSAC22.2, No 60950:2000, IEC60950-1: 2001, EN60950-1:2001+A11 with Japanese National Deviations; Emission Compliance: FCC Part 15, Subpart B, Class A, EN50024,EN55022A:

1998, CISPR 22 Class A: 1985, EN61000-3-2, EN61000-3-3; Immunity: EN55024: 1998

16

Appliance Specifications

VSX-1 Series

Software Edition (VSX Version)

10/100/1000 Ports

Firewall Throughput

VPN Throughput

Concurrent Sessions

Licensed Users

VLANs

Virtual Systems (included/capacity)

UTM Out of the Box

Security Acceleration

Multisite Management

Storage

Enclosure

Dimensions (standard)

Dimensions (metric)

Weight

Operating Environment

Power Input

Power Supply Spec (max)

Power Consumption (max)

1

Management server resides on separate server

VsX-1 3070 VsX-1 9070 VsX-1 9090

R65

10

R65

14/18

R65

28/36

4.5 Gbps

1.1 Gbps

1 million

Unlimited

4096

5/10

Optional

Yes

Optional

1

160 GB

1U

13.5 Gpbs

3.5 Gbps

1.1 million

Unlimited

4096

10/150

Optional

Yes

Optional

1

2 x 160 GB

2U

27 Gpbs

7 Gpbs

1.8 million

Unlimited

4096

10/150

Optional

Yes

Optional

1

4 x 160 GB

4U

17.4 x 15 x 1.73 in.

17 x 20 x 3.46 in.

17 x 20 x 7 in.

443 x 381 x 44mm

6.5kg (14.3 lbs.)

431 x 509.5 x 88mm

16.5kg (36.3 lbs.)

431 x 509.5 x 176mm

33kg (72.6 lbs.)

Temperature: 5° to 40° C; Humidity: 10% to 85% non-condensing; Altitude: 2,500m

250W

77.5W

100/240V, 50/60Hz

400W

200.7W

800W

400.5W

17

Appliance Specifications

DLP-1 Series

Software Edition

Number of Users

Messages/Hour

Throughput

Built-in Interfaces

Optional Interfaces

Storage Size

Enclosure

Dimensions (standard)

Dimensions (metric)

Weight

Dual, Hot-Swappable Power Supplies

Power Input

Power Supply Spec (max)

Power Consumption (max)

Operating Environment

Compliance

DLp-1 2571 DLp-1 9571

R71

1000

70,000

700 Mbps

6 Copper 1 GbE

Built-in 4-Port Copper Bypass Card

R71

5000

350,000

2.5 Gbps

10 Copper 1 GbE

LOM, 2x4 1 GbE Fiber, 2x4 1GbE Copper,

2x2 10 GbE, Modular 4-Port Copper

Bypass Card

2x2TB (Mirrored – RAID 1)

2U

500GB

1U

17.4 x 15 x 1.73 in.

443 x 381 x 44mm

6.5kg (14.3 lbs.)

No

17 x 20 x 3.46 in.

431 x 509.5 x 88mm

16.5kg (36.3 lbs.)

Yes

100/240V, 50/60Hz

250W 400W

77.5W

200.7W

Temperature: 5° to 40° C; Humidity: 10% to 85% non-condensing; Altitude: 2,500m

UL 60950; FCC Part 15, Subpart B, Class A; EN 55024; EN 55022; VCCI V-3AS/NZS

3548:1995; CNS 13438 Class A (test passed; country approval pending);

KN22KN61000-4 Series, TTA; IC-950; ROHS

18

Appliance Specifications

Smart-1 Series

Software Edition

Managed Gateways

Managed Domains

Management HA

Logs/sec

Built-in Interfaces

LCD Display

Storage

Storage Type

Fiber Channel SAN Card

Out-of-Band Management

Enclosure

Dimensions (standard)

Dimensions (metric)

Weight

Power Supply

Power Input

DC Option

Power Supply Spec (max)

Power Consumption (max)

Operating Environment

Compliance smart-1 5 smart-1 25 smart-1 50 smart-1 150

R65, R70

5 up to 25

-

Included

7,500

5 Copper GbE

Yes

1 x 0.5 TB

-

-

-

1U

17 x 10.9 x 1.75 in.

431 x 277 x 44mm

6kg

(13.2 lbs.)

1

100/240V, 50/60Hz

-

150W

70.5W

R65, R70

25 up to 50

-

Included

14,000

5 Copper GbE

-

4 x 0.5 TB

RAID 10

-

Integrated

1U

17 x 21.7 x 1.75 in.

431 x 551 x 44mm

13kg

(28.7 lbs.)

2

100/240V, 50/60Hz

-

2 x 250W

135.8W

R65, R70

50 up to 150

1 up to 3/5/10

Included

30,000

4 Copper GbE

Yes

4 x 1 TB

RAID 10

Optional

Integrated

2U

22.8 x 17.4 x 3.5 in.

580 x 442 x 88mm

23.5kg

(51.8 lbs.)

2

90/264V, 47/63Hz

Yes

2 x 600W

505.3W

Temperature: Ambient operating 0° to 40° C; Humidity: 5% to 95% non-condensing (RH)

CE, FCC Class A, RoHS

R65, R70

150 up to unlimited

3 up to 5/10/50

Included

30,000

4 Copper GbE

Yes

4 x 1 TB, up to 12 TB

RAID 10

Optional

Integrated

3U

24.9 x 17.4 x 5.2 in.

632 x 442 x 131mm

29.5kg

(65 lbs.)

3

90/264V, 47/63Hz

-

3 x 930W

399.6W

19

Appliance Specifications

Smart-1 SmartEvent Series

Software Edition

Managed Gateways

Managed Domains

Management HA

Logging Capacity (Recommended)

Storage

Storage Type

Built-in Interfaces

Fibre Channel SAN card

Out-of-band management

LCD Display

Enclosure

Dimensions (standard)

Dimensions (metric)

Weight

Power Supply

Power Input

DC Option

Power Supply Spec (max)

Power Consumption (avg)

Operating Environment

Compliance smart-1 smartevent 5 smart-1 smartevent 25 smart-1 smartevent 50

R70.2

5 up to 25

1

Included

2GB per day

1 x 0.5 TB

-

R70.2

25 up to 50

1

Included

10GB per day

4 x 0.5 TB

RAID 10

R70.2

50 up to 150

1 up to 3/5/10

Included

25GB per day

4 x 1 TB

RAID 10

5 Copper GbE

-

-

Yes

1U

17 x 10.9 x 1.75 in.

431 x 277 x 44mm

6kg (13.2 lbs.)

1

100/240V, 50/60Hz

-

5 Copper GbE

-

Integrated

-

1U

17 x 21.7 x 1.75 in.

431 x 551 x 44mm

13kg (28.7 lbs.)

2

100/240V, 50/60Hz

-

4 Copper GbE optional

Integrated

Yes

2U

22.8 x 17.4 x 3.5 in.

580 x 442 x 88mm

23.5kg (51.8 lbs.)

2

90/264V, 47/63Hz

Yes

150W

61.7W

2 x 250W

122W

2 x 600W

350.8W

Temperature: Ambient operating 0° to 40° C; Humidity: 5% to 95% non-condensing (RH)

CE, FCC, Class A, RoHS

20

Appliance Specifications

Check Point Integrated Appliance Solutions

ias

1

M2 ias

1

M6 ias

1

M8

Software Edition

10/100/1000 Ports

Firewall Throughput

2

VPN Throughput

2

Concurrent Sessions

IPS Throughput 2

Licensed Users

VLANs

UTM Out of the Box

Security Acceleration

R65, R70

4/10

7 Gbps

2.4 Gbps

1.2 million

4 Gbps 3

Unlimited

256

Optional

Yes

R65, R70

10/10

16 Gbps

3 Gbps

1.2 million

7.1 Gbps 3

Unlimited

256

Optional

Yes

R65, R70

14/18

20 Gbps

4 Gbps

1.2 million

8.6 Gbps 3

Unlimited

256

Optional

Yes

Integrated Multigateway

Management

Storage

Enclosure

Optional

2 x 73 GB

1U

Optional

2 x 73 GB

1U

Optional

2 x 73 GB

2U

Dimensions (standard)

Dimensions (metric)

Weight

17.3 x 27.5 x 1.75 in.

17.3 x 27.5 x 1.75 in.

Operating Environment

Power Input

Power Supply Spec (max) 650W

100/240V, 50/60Hz

4

650W

Power Consumption (max) 180W 212W

1 IAS = Integrated Appliance Solutions

2 Performance data represents the maximum capabilities of the systems as measured under optimal testing conditions.

Deployment and policy considerations may impact performance results.

3

Test based on real-world traffic blend using the default profile

4

Redundant power supply

17.5 x 27.5 x 3.36 in.

440 x 698 x 44mm

16.1kg

(35.5 lbs.)

443 x 698 x 44mm

16.1kg

(35.5 lbs.)

444 x 698 x 84.8mm

26.1kg

(57.5 lbs.)

Temperature: 5° to 40° C; Humidity: 10% to 85% non-condensing; Altitude: 2,500m

1300W

342W

21

Appliance Specifications

Integrated Appliance Solution Bladed Hardware Series

crossbeam X45 crossbeam X80

Throughput

Form Factor/Size

Interfaces/Connectivity

Green IT Compliancy

Other

Check Point Software

Operating System

Operating Environment

Up to 8 Gbps per APM

Up to 20 Gbps per chassis

13.5 x 17.5 x 19 in. - 19 in. rack mountable

Data: 2 x 10 Gigabit Ethernet- SR/LR via XFP and

10 x 1 Gigabit Ethernet- SX/LX via SFP

Up to 8 Gbps per APM

Up to 40 Gbps per chassis

30 x 17.5 x 17.5 in.

Per Network Processor Module ( NPM);

2x10 GbBase-SR/LR via XFP

10x1 GbBase-SX/LX via SFP

Processor

System Memory

Disk Size

Power

Module Support

Management

Single or dual dual, or Quad-core CPU

Up to 16 GB per APM

Single, dual dual-core, or Quad Core CPU

Up to 16 GB per APM

120 GB HDD per APM

1-2 PS, 1,200W or 2,700W

120-240 VAC, 2,400W rated max

200-240 VAC, 2,700W rated max

120 GB HDD per APM

1-4 PS, 1,200W or 2,700W

120-240 VAC, 3,600W rated max

200-240 VAC, 5,000W rated max

X80-DC: -48 volt DC, 100A

Up to 2 NPM, up to 5 APM, up to 2 CPM

Supports up to 7 modules total

Up to 4 NPM, up to 10 APM, up to 2 CPM

Supports up to 14 modules total

Command Line Interface (SSH, telnet, console), Greenlight Element Manager (GEM) EMS (https),

SNMP V1,2,3 support, Standard Syslog

Certification

Status Indicators

Regulatory Compliance for Chassis

Common Criteria EAL4 with Check Point Software Technologies VPN-1 R65

Power Supply and Module Active/Failed Status LED, Port link (NPM, CPM),

Minor/Major/Critical Alarm LEDs

RoHS; UL 60950, IEC 950, FCC 47 CFR Part 15 Class A, EN 55022 : EN 55024, VCCI V-3 : AS/NZS 3548 : 1995 :

CNS 13438 Class A

High efficiency power system up to 91 percent, Member of The Green Grid;

WEEE Directive, ISO 14001, RoHS

Single or Dual System High Availability GUI- or CLIbased management, scales to 2 Network Processing

Modules (NPM), 3 Application Processing Modules

(APM) and 2 Control Processing Modules (CPM)

VPN-1 NGX R65, Security Gateway

R70 & R71, VPN-1 Power VSX R65 & R67

Single or Dual System High Availability GUI- or CLIbased management, scales to 4 Network Processing

Modules (NPM), 8 Application Processing Modules

(APM) and 2 Control Processing Modules (CPM)

VPN-1 NGX R65, Security Gateway R70 & R71,

VPN-1 Power VSX R65 & R67

XOS 7.2.1, 7.3.0.3, 8.0.1, 8.1.0, 8.5.0, and 9.0

XOS 7.2.1, 7.3.0.3, 8.0.1, 8.1.0, 8.5.0, and 9.0

Temperature: 0° to 40° C (32° to 104° F); Humidity: 10% to 90% non-condensing;

Altitude: 3,048m (10,000 ft.)

22

Appliance Specifications

Check Point Integrated Appliance Solutions

D1 Gateway D1 Gateway pair D2 Gateway D6 Gateway D8 Gateway

Software Edition

Virtual Firewalls

10/100/1000

Ports

10 Gb Ports

Firewall

Throughput

VPN Throughput

Concurrent

Sessions

IPS Throughput

VLANs

Lights Out

Management

Storage

Memory

Dimensions

(standard)

Dimensions

(metric)

Weight

Power Input

R70 4003

6/6

R70 4003

6/6

NGX R70 PWR

-

6/10

-

NGX R70 PWR

6/10

NGX R70 PWR

8/18

2 Gbps

1.2 Gbps

1.2 million

254

Included

2 Gbps

1.2 Gbps

1.2 million

254

Included

7 Gbps

2.4 Gbps

1.2 million

-

256

Included

16 Gbps

3 Gbps

1.2 million

256

Included

20 Gbps

4 Gbps

1.2 million

256

Included

160 GB

1 GB

160 GB

1 GB

2 x 73 GB

(8 Max)

2 GB

2 x 73 GB

(8 Max)

4 GB

2 x 73 GB

(12 Max)

8 GB

1.69 x 17.64 x 27.56 in. 1.69 x 17.64 x 27.56 in. 1.70 x 16.78 x 27.25 in. 1.70 x 16.78 x 27.25 in. 3.38 x 17.54 x 29.25 in.

432 x 448.1 x 700mm 432 x 448.1 x 700mm 432 x 426.2 x 692.2mm 432 x 426.2 x 692.2mm 859 x 445.5 x 743mm

14.3 kg (31.49 lbs.)

90/132V, 180/264V,

47/63Hz

430W

14.3 kg (31.49 lbs.)

90/132V, 180/264V,

47/63Hz

430W

17.92 kg (39.5 lbs.)

100/240V, 50-60Hz

460W

17.92 kg (39.5 lbs.)

100/240V, 50/60Hz

460W

-

100/240V, 50/60Hz

460W

Power Supply

Spec (max)

Power

Consumption

(max)

Operating

Environment

75W 75W 170W 181W 290W

Compliance

Temperature: 10° to 35° C (50° to 95° F); Humidity: 10% to 90% non-condensing; Attitude: 3,050m (10,000 ft.)

CISPR 22; EN55022; EN55024;

FCC CFR 47, Pt 15; ICES-003; CNS13438;

GB9254; EN 61000-3-2; EN 61000-3-3;

EN 60950-1; IEC 60950-1

CISPR 22; EN55022; EN55024; FCC CFR 47, Pt 15; ICES-003;

CNS13438; GB9254; K22; K24; EN 61000-3-2; EN 61000-3-3;

EN 60950-1; IEC 60950-1 continues on next page

23

Appliance Specifications

Check Point Integrated Appliance Solutions

continued from previous page

Software Edition

Virtual Firewalls

10/100/1000

Ports

10 Gb Ports

Firewall

Throughput

VsX 50

Virtual firewall D8

NGX R67 VSX

50/250

4/4

VPN Throughput

Concurrent

Sessions

IPS Throughput

VLANs

Lights Out

Management

4/8

20 Gbps

(System Aggregate)

4 Gbps

(System Aggregate)

1.2 million

(System Aggregate)

-

256 per Firewall

Included

Storage

2 x 73 GB

(12 Max)

1 6GB Memory

Dimensions

(standard)

Dimensions

(metric)

Weight

Power Input

Power Supply

Spec (max)

Power

Consumption

(max)

VsLs 50

Virtual firewall D8

NGX R67 VSX

100/250

4/4

4/8

20 Gbps

(System Aggregate)

4 Gbps

(System Aggregate)

1.2 million

(System Aggregate)

-

256 per Firewall

Included

VsX 100

Virtual firewall D8

NGX R67 VSX

100/250

4/4

4/8

20 Gbps

(System Aggregate)

4 Gbps

(System Aggregate)

1.2 million

(System Aggregate)

-

256 per Firewall

Included

VsLs 100

Virtual firewall D8

NGX R67 VSX

100/250

4/4

4/8

20 Gbps

(System Aggregate)

4 Gbps

(System Aggregate)

1.2 million

(System Aggregate)

-

256 per Firewall

Included

UtM appliance

& UtM appliance pair

R70.1

-

4 x RJ-45 Base-T

-

-

600 Mbps

100 Mbps

600,000

46 GB

1 GB

3.38 x 17.54 x 29.25 in. 3.38 x 17.54 x 29.25 in. 3.38 x 17.54 x 29.25 in. 3.38 x 17.54 x 29.25 in.

16.8 x 10 x 1.73 in.

859 x 445.5 x 743mm 859 x 445.5 x 743mm 859 x 445.5 x 743mm 859 x 445.5 x 743mm

-

100/240V, 50/60Hz

430W

75W

2 x 73 GB

(12 Max)

16 GB

-

100/240V, 50/60Hz

430W

75W

2 x 73 GB

(12 Max)

16 GB

-

100/240V, 50/60Hz

460W

170W

2 x 73 GB

(12 Max)

16 GB

-

100/240VAC, 50/60Hz

460W

181W

380 Mbps

1,024

429 x 255 x 44mm

3.7kg (8.1 lbs.)

100/240V, 50/60Hz

65W

41.1W

Operating

Environment

Compliance

Temperature: 10° to 35° C (50° to 95° F);

Humidity: 10% to 90% non-condensing; Attitude: 3,050m (10,000 ft.)

CISPR 22; EN55022; EN55024; FCC CFR 47, Pt 15; ICES-003;

CNS13438; GB9254; K22; K24; EN 61000-3-2; EN 61000-3-3;

EN 60950-1; IEC 60950-1

Temperature: 5° to 40° C;

Humidity: 10% to 85% non-condensing;

Altitude: 2,500m

UL 60950; FCC Part 15, Subpart B, Class A;

EN 55024; EN 55022; VCCI V-3; AS/NZS

3548:1995; CNS 13438 Class A (test passed; country approval pending); KN22,

KN61000-4 Series, TTA; IC-950; ROHS

24

Contact Check Point now

www.checkpoint.com/contactus

By phone in the US: 1-800-429-4391 option 5 or

1-650-628-2000

CHECK POINT

Worldwide Headquarters

5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: [email protected]

U.S. Headquarters

800 Bridge Parkway, Redwood City, CA 94065 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com

©2003–2010 Check Point Software Technologies Ltd. All rights reserved. Check Point, Abra, AlertAdvisor, Application Intelligence, Check Point DLP Check Point Endpoint Security, Check Point

Endpoint Security On Demand, the Check Point logo, Check Point Full Disk Encryption, Check Point Horizon Manager, Check Point Media Encryption, Check Point NAC, Check Point Network

Voyager, Check Point OneCheck, Check Point R70, Check Point Security Gateway, Check Point Update Service, Check Point WebCheck, ClusterXL, Confidence Indexing, ConnectControl,

Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoreXL, DefenseNet, DLP-1, DynamicID, Endpoint Connect VPN Client, Eventia, Eventia Analyzer,

Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless

Security, Integrity SecureClient, InterSpect, IP Appliances, IPS-1, IPS Software Blade, IPSO, Software Blade, IQ Engine, MailSafe, the More, better, Simpler Security logo, MultiSpect, NG, NGX,

Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Pointsec PC, Pointsec Protector, Policy Lifecycle Management,Power-1, Provider-1, PureAdvantage, PURE Security, the puresecurity logo, [email protected], [email protected], Secure Virtual Workspace, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer,

SecureUpdate, SecureXL, SecureXL Turbocard, Security Management Portal, , SiteManager-1, Smart-1, SmartCenter, , SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole,

SmartDashboard, SmartDefense, SmartDefense Advisor, SmartEvent, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartProvisioning, SmartReporter, SmartUpdate, SmartView, SmartView

Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SmartWorkflow, SMP, SMP On-Demand, SofaWare, Software Blade architecture, the softwareblades logo, SSL Network Extender,

Stateful Clustering, Total Security, the totalsecurity logo, TrueVector, UserCheck, UTM-1, UTM-1 Edge, UTM-1 Edge Industrial, UTM-1 Total Security, VPN-1, VPN-1 Edge, VPN-1 MASS, VPN-1

Power, VPN-1 Power Multi-core, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VE, VPN-1 VSX, VSX-1, Web

Intelligence, ZoneAlarm, ZoneAlarm Antivirus, ZoneAlarm DataLock, ZoneAlarm Extreme Security, ZoneAlarm ForceField, ZoneAlarm Free Firewall, ZoneAlarm Pro, ZoneAlarm Internet Security Suite,

ZoneAlarm Security Toolbar, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates.

ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, 7,165,076, 7,540,013 and 7,725,737 and may be protected by other U.S. Patents, foreign patents, or pending applications.

September 28, 2010

Citrix Access Gateway

Datasheet

Citrix Access Gateway is the leading secure access solution for applications and desktops

• HDX SmartAccess –

Delivers simple and seamless secure access anywhere

• Data security through adaptive application-level control

• Broad client support

• Flexible deployment options with virtual and physical appliances

• World-class scalability and performance

• Accelerated virtual desktops and applications

Easy and secure application access from anywhere

Citrix Access Gateway

is a secure access solution that provides administrators granular application-level policy and action controls to secure access to virtual desktops, applications and data while allowing users to work from anywhere. It offers flexible deployment options with both physical and virtual appliances, a single point of management, and tools to help ensure compliance and the highest levels of information security across and outside the enterprise.

At the same time, it empowers users with a single point of access—optimized for roles, devices and networks—to the enterprise applications and data they need. This unique combination of capabilities helps maximize the productivity of today’s mobile workforce.

Features

All Access Gateway appliances include secure access to Citrix

®

XenDesktop

®

and Citrix

®

XenApp

deployments at no additional cost, making it the most integrated and cost-effective solution for these environments. Expanded capabilities are also available with Universal Licenses that enable Access Gateway to secure all types of applications and data, and enforce strong data security through adaptive policies. Universal Licenses can be purchased separately and are included with Platinum Editions of XenApp, XenDesktop and Citrix

®

NetScaler

®

.

www.citrix.com

2

Citrix Access Gateway

Datasheet

Feature

Easy desktop and application access

Provides secure access to all applications and data from any device with a single point of access that simplifies the user experience.

Secure access to XenApp and XenDesktop

Provides secure access to XenDesktop and

XenApp sessions without requiring a VPN connection.

Secure network access

Full VPN support enables network-level access to any server within the protected network.

Secure browser-only access

Provides secure access to web applications, e-mail, and file shares using only a browser

(no additional client components required).

Single point of access

Provides a robust landing page for users to easily access all their applications, files, e-mail, and other IT resources.

User localization

Localizes user interfaces in English, Spanish,

French, German, and Japanese.

Included appliance features

Endpoint analysis

Ensures that devices are safe to connect to the network and users have a method to easily update their devices to meet established policies.

Broad client support

Supports major platforms including

Windows

®

32 and 64-bit operating systems

(including Windows 7) and Mac

®

Os X.

I

ntegrated endpoint scanning

Continually scans client devices to determine if client security products

(anti-virus, personal firewall, or other mandatory corporate programs) are active.

Enhanced machine identity scans

Determines machine identity by scanning for known corporate images on client devices.

Quarantine groups / remediation

Provides clients that fail endpoint analysis scanning with limited access to remediation sites to bring client devices into compliance with the organization’s security policies.

Extensible endpoint analysis

Extends endpoint analysis capabilities using industry-standard development tools.

Requires

Universal

License

1

• 2

1. Requires MPX 5500 or NetScaler

2. Requires Advanced Access

Controller server

Citrix Access Gateway

Datasheet

Feature

Scenario-based policy control (SmartAccess)

Provides control to configure the most secure access to data and applications by dynamically adjusting access based on device configuration, location, and identity

Application and data security

Protects and keeps private all data transmitted between the client and gateway.

Accelerated secure access

Ensures that users have a secure and optimized access experience to avoid common networking performance issues.

Included appliance features

Requires

Universal

License

Adaptive access control

Provides access control on resources based on endpoint analysis results.

Adaptive access control for virtual hosted applications and desktops

Provides adaptive access control to applications and desktops controlled by

XenDesktop and XenApp.

Adaptive application and action control

Controls the behavior of XenDesktop and

XenApp sessions by preventing operations that may compromise data to unsecure devices.

Standards-based security

Ensures that all communications are secure with SSL/TLS encryption.

Extensive authentication support

Provides strong authentication with 2-factor methods and authenticates users against

LDAP and RADIUS servers to leverage existing directories within the organization.

Client certificate support

Validates certificates prior to granting access to protected resources in order to verify managed client devices.

Basic split tunneling control

Disables access to all network resources not hosted on the protected network.

Enhanced split tunneling control

Can disable split tunneling on clients to shut down direct Internet access but still permit access to resources on the client’s local subnet.

Browser cache cleanup

Removes objects and data stored on the local browser during the SSL VPN session.

Branch Repeater integration

When used together with the Citrix

®

Branch

Repeater ™ and Citrix Acceleration plug-in,

Citrix Access Gateway can optimize connections to XenDesktop, XenApp, and other traffic within a VPN connection to ensure the best performance over a WAN and overcome common usability problem that exist as a result of network issues.

1

1

1. Requires MPX 5500 or NetScaler

3

Citrix Access Gateway

Datasheet

Feature

Fault tolerance

Creates secure access deployments that guarantee a high-level of availability and reliability.

Simplified administration

Maximizes the efficiency of the IT organization by simplifying common installation and management tasks.

Basic high availability configuration

Links appliances to create an active-passive pair, ensuring sessions remain active if the master fails.

Optional global server load balancing

(GSLB)

Routes client connections to the best VPN site based on availability, health, proximity, and responsiveness.

Centralized administration

Configures and manages Access Gateway appliances from a single management console.

Wizard-driven configuration

Provides an intuitive series of click-through screens and simple instructions to guide administrators through installation and configuration.

Multiple virtual VPN servers

A single appliance can emulate multiple SSL

VPNs by hosting one or more virtual servers each with a unique IP, FQDN, and certificate.

Historical charting

Provides administrators with a graphical view of system and user activities.

Administrative auditing

Monitors all configuration changes made by administrators to ensure accountability and easy roll-back of configuration errors.

Auto-downloading / Auto-updating client plug-in

Automatically downloads the Citrix Secure

Access plug-in when the user connects to

Access Gateway and ensures that they always receive the latest version of the client software.

Support for automated distribution of

Access Gateway plug-in

Simplifies client installation by allowing deployment of the Access Gateway plug-in through systems and client management solutions.

Included appliance features

2

1

1

Requires

Universal

License

1

1. Requires MPX 5500 or NetScaler

2. Requires NetScaler

4

Citrix Access Gateway

Datasheet

Platform specifications

Maximum VPN users

Access Gateway VPX virtual appliance on XenServer and

VMWare

®

ESX

500

Chassis dimensions

NA

Weight

Power

Interface ports

NA

NA

Warranty, software and firmware updates

12 months included,

(software updates only)

Access Gateway

2010

500

HH: 1.72” (4.36 cm)

(1U rackmount)

W: 17.22” (43.73 cm)

D: 18.4” (46.72 cm)

12.57 lbs (5.7 kg)

Access Gateway

MPX 5500

5,000

H: 1.72” (4.36 cm)

(1U rackmount)

W: 17.22” (43.73 cm)

D: 21.75” (55.2 cm)

22 lbs (9.97 kg)

Access Gateway

9010 FIPS

5,000

H: 3.5” (8.9 cm)

(2U rackmount)

W: 17” (43.2 cm)

D: 16” (40.6 cm)

34 lbs (15.4 kg)

100-240VAC Full Range

50-60 Hz 250W

100-264VAC Full Range

47-63 Hz

90-264VAC Full Range

47-63 Hz 335W

1 Serial Port

1 USB Port

2 x 10/100/1000 BASE-T

8x10/100/1000 BASE-T

12 months included, additional plan available

12 months included, additional plan available

4 x 10/100/1000 BASE-T

1 x 10/100/1000 BASE-T

12 months included, additional plan available

www.citrix.com

About Citrix

Citrix Systems, Inc. (NASDAQ:CTXS) is a leading provider of virtual computing solutions that help companies deliver IT as an on-demand service. Founded in 1989, Citrix combines virtualization, networking, and cloud computing technologies into a full portfolio of products that enable virtual workstyles for users and virtual datacenters for IT. More than 230,000 organizations worldwide rely on Citrix to help them build simpler and more cost-effective IT environments. Citrix partners with over 10,000 companies in more than 100 countries. Annual revenue in 2009 was $1.61 billion.

©2010 Citrix Systems, Inc. All rights reserved. Citrix

®

, Citrix Access Gateway

, XenApp

, XenDesktop

®

, NetScaler

®

and

Branch Repeater

are trademarks of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered in the

United States Patent and Trademark Office and in other countries. All other trademarks and registered trademarks are property of their respective owners.

0910/PDF

FirePass SSL VPN

DATASHEET

What’s Inside:

2

Improved User Experience

3

Network Access

5

Application Access—

Secure Access to Specific

Applications

6

Portal Access—Proxy-Based

Access to Web Applications,

Files, and Email

8

Portal Access—

Comprehensive Security

9

Dynamic Policy Engine—

Total Administrative Control

11

Customization

12

iControl SSL VPN Client

API for Secure Application

Access

12

FirePass Product Details

14

FirePass Specifications

16

More Information

Increase Productivity with Flexible,

F5 BIG-IP

Local

F5 BIG-IP

Local

F5 BIG-IP

Local

F5 BIG-IP

Local

Secure Remote Access

As more mobile and remote workers use an increasing number of different devices to access corporate applications and data from many locations, your business benefits from more flexible and productive users. But securing applications, data, the network, and client devices from unauthorized access and attacks can quickly add management complexity and cost.

The FirePass

®

SSL VPN appliance and Virtual Edition (VE) provide secure remote access to enterprise applications and data for users over any device or network. FirePass ensures easy access to applications by delivering outstanding performance, scalability, availability, policy management, and endpoint security. The result is unified security enforcement and access control that increases the agility and productivity of your workforce.

Key Benefits:

Increase worker productivity

Provide fast and secure, always connected remote access from any location, from any device.

Gain ultimate flexibility

Quickly and easily deploy a virtual appliance to add remote access functionality to your existing virtual infrastructure.

Decrease costs

Reduce deployment and support costs with easy management, simple deployment, and secure application access.

Increase security

Deliver granular access control to intranet resources on a group basis, enhancing security.

Reduce risk with endpoint security

Verify the user quickly and easily with endpoint security to validate compliance with corporate policy.

DATASHEET

FirePass SSL VPN

BIG-IP Edge Client uses cutting edge roaming, domain detection, and automatic connection to deliver a seamless transition between locations.

Improved User Experience

FirePass helps ensure user productivity by minimizing the time and effort required to gain access to authorized files and applications.

“Always connected” remote access

Some access clients need constant reconnection throughout the day as users move locations or restart applications. The BIG-IP

®

Edge Client

solution is a state-of-the-art, integrated client that provides location awareness and zone determination to deliver a remote access solution unlike any other. Cutting-edge roaming, domain detection, and automatic connection create a seamless transition as users move between locations. BIG-IP Edge Client helps ensure continued user productivity whether the user is at home on a wireless network, using an air card in transit, giving a presentation from corporate wireless, in a café on guest wireless, or docked on a LAN connection. BIG-IP Edge Client is supported in FirePass 6.1 and 7.0.

BIG-IP

Edge

Client

BIG-IP

Edge

Client

BIG-IP

Edge

Client

At home

(wireless) Commuting

(air card)

BIG-IP

Edge

Client

Always connected application access

BIG-IP

Edge

Client

BIG-IP

Edge

Client

In the office

(docked LAN connection)

Presenting

(corporate wireless)

In the café

(wireless)

Seamless VPN access

When the user first enters credentials as part of the Windows logon process, BIG-IP Edge

Client caches them and then automatically tries them in the first attempt to log onto the

VPN. This streamlines the user experience to help improve productivity.

2

DATASHEET

FirePass SSL VPN

3

Network Access

FirePass provides LAN-type network access connectivity for all applications by supporting existing network infrastructure, identity management systems, and client-server operating systems.

FirePass Network Access for Microsoft Windows (Windows 7, Vista, XP), Mac, and

Linux Systems

• Eliminates the need for special administrative privileges for FirePass client component updates with Windows Installer Service, lowering management costs.

• Provides secure remote access to the entire network for all IP-based (TCP, UDP) applications.

• Includes standard features across all desktop and laptop platforms, as well as split tunneling, compression, activity-based timeouts, and automatic application launching.

• Provides remote access—unlike IPSec VPNs—without requiring preinstalled client software and configuration of the remote device. Client- or server-side application changes are not required.

• Enables administrators to restrict and protect resources accessible through the connector by instituting rules that limit access to a specific network or port.

• Uses the standard HTTPS protocol with SSL as the transport, so the device works through all HTTP proxies including public access points, private LANs, and over networks and ISPs that don’t support IPSec VPNs.

• Utilizes GZIP compression to compress traffic before it is encrypted, reducing the amount of traffic that is sent across the Internet and improving performance.

• Supports the latest OSs and Browsers—FirePass 7.0 supports 32-bit versions of:

Windows 7, Vista, and XP; Mac OS X Leopard and Snow Leopard; Internet Explorer 6,

7, and 8; Firefox 3.x; and Safari 4. It supports 64-bit versions of: Windows 7, Vista, and

XP; Linux (contact F5 or Reseller for list), Internet Explorer 7 (except Win 7) and 8; and Firefox 3.0. Talk to an F5 sales representative or reseller to review compatibility for your environment.

Client Security

• Safe Split Tunneling—To protect against back-door attacks when accessing the network with split tunneling, FirePass provides a dynamic firewall that protects Windows, Mac, and Linux users when using the full network access feature. This prevents hackers from routing through the client to the corporate network or users from inadvertently sending traffic to the public network.

• Endpoint Client Checking—FirePass increases security by detecting the presence of required processes (for example, virus scans, anti-malware, personal firewalls, OS patch levels, registry settings, and more) and the absence of other processes (for example, key logger) on the Mac, Linux or Windows client before enabling full network access.

• Hardware Endpoint Inspectors—FirePass inspects client machine features such MAC address, CPU ID, and HDD ID to identify remote devices. FirePass authorizes machines without the complexity of deploying machine certificates.

DATASHEET

FirePass SSL VPN

FirePass policies enable secure application access to a full set of corporate services, including kiosks, mobile devices, or laptops.

Windows Network Access Features

• Standalone Windows Client—FirePass establishes a network connection after entering user credentials. Software can be automatically distributed to the client using Microsoft’s

MSI installer technology.

• Windows Logon/GINA Integration—Enables implied, transparent user logon to the corporate network by integrating with the GINA (“Ctrl + Alt + Del” prompt) logon process.

• Standalone VPN Client CLI—Command-line interface support offers single sign-on support through integration with third-party applications (such as remote dialer software).

• Windows VPN Dialer—Provides a simplified user experience for those more comfortable with the dialup interface.

• Automatic Drive Mapping—Network drives can be automatically mapped to a user’s

Windows PC.

• Static IP Support—Assigns a static IP based on the user when the user establishes a network access VPN connection, lowering administrative support costs.

• Transparent Network Access—Eliminates network access browser window pop-ups and prevents users from accidentally terminating the connection.

Mobile Device Support

• Enables secure application access from Windows Mobile and smartphones.

• Provides access to both client/server- and web-based applications.

Kiosk Mobile Device Laptop

Kiosk Policy

Cache/Temp File

Cleaner

Mini Browser

Policy

FirePass SSL VPN Value Proposition

Browser-based ubiquitous access

Lower support and management costs

Endpoint security

Granular access control

Group policy enforcement

Corporate Policy

Firewall/Virus

Check

Terminal Servers Files Intranet Email

C/S Application

Full Network

Corporate Services

4

DATASHEET

FirePass SSL VPN

5

Application Access—Secure Access to Specific Applications

FirePass enables administrators to grant certain users—for example, business partners using equipment not maintained by the company—access to specific extranet applications and sites. FirePass protects network resources by only permitting access to applications that are cleared by the system administrator.

Specific Client/Server Application Access

• Enables a native client-side application to communicate back to certain corporate application servers via a secure connection between the browser and the FirePass device.

• Requires no pre-installation or configuring of any software.

• Involves no additional network-side software to access the application servers.

• Accesses applications via standard protocols: HTTP and SSL/TLS. It works with all HTTP proxies, access points, and private LANs, and over networks and ISPs that do not support traditional IPSec VPNs.

• Includes supported applications such as Outlook to Exchange Clusters, Passive FTP,

Citrix Nfuse, and network drive mapping.

• Supports custom CRM applications as well as applications that use static TCP ports.

• Supports auto-login to AppTunnels, Citrix, and WTS applications to simplify the user experience.

• Integrates with Citrix SmartAccess to deliver endpoint inspection results to Citrix applications and send SmartAccess filters to XenApp based on the results of endpoint scans.

• Supports the auto-launch of client-side applications to simplify user experience and lower support costs.

• Enables lock-down Java-based application tunnels for non-Windows and Windows systems to prevent the execution of ActiveX controls.

• Offers complete DHCP support for clients using network access, automating IP address assignment and dynamic DNS registration of addresses. DHCP support provides easier multi-unit deployments while remote-access IP address range can overlap with internal LAN.

• Delivers support for Microsoft Communicator via Portal Access, enhancing VoIP communications.

• Offers unique support for the compression of client/server application traffic over the

WAN, enhancing performance.

Terminal Server Access

• Provides secure web-based access to Microsoft Terminal Servers, Citrix MetaFrame applications, Windows XP Remote Desktops, and VNC servers.

• Provides Terminal Services for VMware View web client to enable user access from virtual desktops.

• Supports group access options, user authentication, and automatic log-on capabilities for authorized users.

• Supports automatic downloading and installation of the correct Terminal Services or Citrix remote platform client component, if not currently installed on the remote device, saving time.

DATASHEET

FirePass SSL VPN

6

• Supports remote access to XP desktops for remote troubleshooting using RDP and non-XP desktops with the built-in VNC feature.

• Provides Java-based Terminal Services support for Citrix and Microsoft.

Dynamic App Tunnels

• Provides maximum support for accessing a wide variety of client/server- and web-based applications.

• Offers a better alternative to reverse proxies for accessing applications from Windows client devices.

• Eliminates the need for web application content interoperability testing.

• Requires only “power user” privileges for installation and no special privileges for execution.

• Provides added support for auto-launching web application tunnels, simplifying the user experience.

Host Access

• Enables secure web-based access to legacy VT100, VT320, Telnet, X-Term, and IBM

3270/5250 applications.

• Requires no modifications to the applications or application servers.

• Eliminates the need for third-party host access software, reducing total cost of

ownership (TCO).

Portal Access—Proxy-Based Access to Web Applications,

Files, and Email

FirePass Portal Access capability works on any client OS with a browser: Windows, Linux,

Mac, smartphones, PDAs, and more.

Web Applications

• Provides access to internal web servers, including Microsoft Outlook Web Access, Lotus iNotes, and Microsoft SharePoint Server as easily as from inside the corporate LAN.

• Delivers granular access control to intranet resources on a group policy basis. For example, employees can gain access to all intranet sites; partners can be restricted to a specific web host.

• Dynamically maps internal URLs to external URLs, so the internal network structure does not reveal them.

• Manages user cookies at the FirePass device level to avoid exposing sensitive information.

• Passes user credentials to web hosts to support automatic login and other user-specific access to applications. FirePass also integrates with existing identity management servers

(for example, CA Netegrity) to enable single sign-on to applications.

• Proxies login requests from web hosts to avoid having users cache their passwords on client browsers.

• Enables or restricts access to specific parts of an application with granular access control list (ACL) for increased security and reduced business risks.

DATASHEET

FirePass SSL VPN

7

• Provides split-tunneling support for web applications, resulting in faster user performance when accessing public websites.

• Validates back-end certificate with rapid reverse-proxy to quickly authenticate the server’s certificate.

• Offers dynamic server-side and DNS caching for increased web application (reverse proxy) performance and faster page download times.

• Delivers out-of-the-box reverse proxy support for rewriting a wide variety of JavaScript content in web pages, saving time.

• Provides Java patch ACL support to limit client-initiated connections through FirePass using Portal Access.

• Enables NTLMv2 support for access to web applications.

• Delivers DNS relay proxy service, enabling client-side name resolution without requiring any special runtime rights (for example, modification of hosts). Also enables redirection of ports to more fully support applications such as Outlook and Windows drive mapping.

File Server Access

• Enables users to browse, upload, download, copy, move, or delete files on shared directories.

• Supports: SMB Shares; Windows Workgroups; NT 4.0 and Win2000 domains; Novell

5.1/6.0 with Native File System pack; and NFS servers.

Email Access

• Provides secure web-based access to POP/IMAP/SMTP email servers from standard and mobile device browsers.

• Enables users to send and receive messages, download attachments, and attach network files to emails.

Mobile Device Support

• Provides secure access from Apple iPhone, Windows Mobile, PDAs, smartphones, cell phones, WAP, and iMode phones to email and other web-based applications.

• Dynamically formats email from POP/IMAP/SMTP email servers to fit the smaller screens of mobile phones and PDAs.

• Supports the sending of network files as email attachments and the viewing of text and

Word documents.

• Supports ActiveSync applications, enabling PDA synchronization of email and calendar on Exchange Server from a PDA device, without requiring the pre-installed VPN client component.

DATASHEET

FirePass SSL VPN

8

Portal Access—Comprehensive Security

FirePass delivers multiple layers of control for securing information access from public systems.

Client Security

• Protected Workspace—Users of the 32-bit version of Windows XP/Vista/7 or the 64-bit version of Windows Vista/7 can be automatically switched to a protected workspace for their remote access session. In a protected workspace mode, the user cannot write files to locations outside the protected workspace; the temporary folders and all of their contents are deleted at the end of the session.

• Cache Cleanup—The cache cleanup control removes—and empties from the recycle bin—the following data from the client PC: cookies, browser history, auto-complete information, browser cache, temp files, and all ActiveX controls installed during the remote access session.

• Secure Virtual Keyboard—For additional password security, FirePass offers the patentpending Secure Virtual Keyboard which enables secure password entry from the mouse instead of the keyboard.

• Download Blocking—For systems unable to install a “cleanup” control, FirePass can be configured to block all file downloads to avoid the issue of inadvertently leaving behind temporary files, yet still enable access to applications.

• Automatic File Virtualization—In protected workspace mode, temporary files and registry settings are written to a virtual file system rather than to the local machine.

• Encrypted Saved Content—All temporary content saved on the remote system is encrypted in the event that the protected workspace doesn’t exit normally, such as in a power failure, rendering the content unreadable.

• Portal Support for Popular Mobile Clients—FirePass supports portal access with iPhone,

BlackBerry, and Opera Mini browsers.

Content Inspection and Web Application Security

For users accessing web applications on the corporate network, FirePass enhances application security and prevents application-layer attacks (for example, cross-site scripting, invalid characters, SQL injection, buffer overflow) by scanning web application access for application layer attacks—then blocking user access when an attack is detected.

Integrated Virus Protection

FirePass can scan web and file uploads using either an integrated scanner or external scanner via ICAP API. Infected files are blocked at the gateway and not allowed onto email or file servers on the network, for increased protection.

Flexible Remote Access

FirePass Virtual Edition (VE) makes it easy to quickly deploy a virtual appliance to add SSL

VPN functionality to an existing virtual infrastructure. This offers greater flexibility in disaster recovery scenarios or during a surge in remote access demand. Virtual editions of FirePass and

BIG-IP Local Traffic Manager can be combined to provide industry-leading application delivery and remote access in the same environment.

DATASHEET

FirePass SSL VPN

FirePass VE is an easy way to add flexible remote access to your current virtual environment.

Employees

Contractors

Customers

Users

Firewall

BIG-IP

Local

Traffic

Manager FirePass

BIG-IP

Local

Traffic

Manager FirePass

DMZ

FirePass

FirePass

Physical

Virtual

Internal

External

Server

Server

Dynamic Policy Engine—Total Administrative Control

The FirePass policy engine enables administrators to easily manage user authentication and authorization privileges.

Dynamic Policy-Based Access

Administrators have quick and granular control over their network resources. Through policy management support, they can authorize access to applications based on the user and device. Administrators can easily implement existing policies with import and export of pre-logon policies.

Visual Policy Editor

The Visual Policy Editor creates a flow-chart style graphical view of your access policies, giving you point-and-click ease in profiling and managing groups, users, devices, or any combination of the three. This simplifies the definition and management of endpoint policies, lowers administrative costs, and increases the ability to quickly ensure the protection of company resources.

9

DATASHEET

FirePass SSL VPN

The Visual Policy Editor makes it easy to create access policies.

CAPTCHA protects against

DoS and script-based brute force attacks.

10

User Authentication

Users can be authenticated against an internal FirePass database, using passwords. FirePass can also be easily configured to work with RADIUS, Active Directory, RSA 2-Factor, LDAP authentication methods, basic and form-based HTTP authentication, identity management servers (for example, Netegrity), and Windows domain servers. With Active Directory, users can change current or expired passwords and receive warnings when passwords are set to expire. Support for nested Active Directory configurations enables the use of a more complex, hierarchical directory structure.

Two-Factor Authentication

Many organizations use “two-factor” authentication (such as tokens or SmartCards) that require more than just a user ID and password. FirePass supports two-factor authentication including RSA SecurID ® Native ACE authentication.

Challenge Response Test

Administrators can implement CAPTCHA, an easy challenge response test for humans that protects the organization from DoS and script-based brute force attacks.

Client-side and Machine Certificates/PKI Support

FirePass integrates seamlessly with the existing PKI infrastructure and enables the administrator to restrict or permit access based on the device being used to access FirePass. FirePass can check for the presence of a client-side digital certificate or Windows machine certificate during user login. Based on the presence of a valid certificate, FirePass can support access to a broader range of applications. FirePass can also use client-side or machine certificates as a form of twofactor authentication and prohibit all network access for users without a valid certificate.

Group Management

Access privileges can be granted to individuals or to groups of users (for example: sales, partners, or IT). This enables FirePass to restrict individuals and groups to particular resources.

Group Policy Enforcement

Group policy provides an exclusive mechanism to apply and enforce policies on client systems not part of the network domain. You can use the Visual Policy Editor to design group policies, in the form of templates, that restrict user authority and access while enforcing compliance with PCI, HIPAA, and GLBA. (Note: Group Policy Objects are only available on Active

Directory.)

DATASHEET

FirePass SSL VPN

11

Dynamic Group Mapping

FirePass dynamically maps users to FirePass groups using various dynamic group mapping mechanisms such as Active Directory, RADIUS, LDAP, client certificates, landing URI, and virtual host name as well as pre-logon session variables.

Single Sign-On (SSO) Support

SSO configuration uses authentication session variables to extract SSO information from certificates and authentication information from username and password settings. Advanced session variables help system administrators extend and customize FirePass, enabling them to manipulate and create new session variables for custom deployments. They also can collect and capture RADIUS attributes plus LDAP, Active Directory, and certificate field values.

Session Timeouts and Limits

Administrators can configure inactivity and session timeouts to protect against a hacker attempting to take over a session from a user who forgets to logoff at a kiosk.

Role-Based Administration

Organizations have the flexibility to provide some administrative functions (enrolling new users, terminating sessions, re-setting passwords) to some administrator-users, without exposing all functions to them (for example, shutting down the server or deleting a certificate).

Logging and Reporting

FirePass delivers built-in logging support for logging user, administrator, session, application, and system events. Additionally, FirePass provides logs in silo format for integration with an external syslog server. The administration console offers a wide range of audit reports to help comply with security audits. Summary reports aggregate usage by day of the week, time of day, accessing OS, features used, websites accessed, session duration, session termination type, and other information for a user-specified time interval. A single URL is used to retrieve summary/group reports in either HTML or spreadsheet format.

Customization

FirePass provides advanced customization features, enabling the administrator to design a unique GUI or existing corporate website portal to best reflect corporate and user requirements.

Localized User GUI

FirePass enables all fields on the user web page to be localized, including the names of the feature (for example, web applications). This helps companies localize the user’s GUI, not just user favorites—increasing business value and lowering TCO.

Complete Login and Webtop Customization

With FirePass, administrators can completely customize an entire login and webtop web page to best suit their existing corporate website portals. Administrators can use WebDAV capabilities to upload custom pages, for an enhanced user experience.

DATASHEET

FirePass SSL VPN

12

iControl SSL VPN Client API for Secure Application Access

As the only SSL VPN product with an open client API and SDK, FirePass enables automated, secure access from the Win32 client OS (XP, Vista, 7) by providing secure system-to-system or application-to-application communication. Applications can automatically start and stop network connections transparently without requiring users to log into the VPN. This enables faster, easier connections for users while reducing client application installation costs.

FirePass Product Details

The range of FirePass appliances and Virtual Edition address the concurrent user access needs of small to large enterprises.

FirePass 1200

The FirePass 1200 device is designed for small to medium enterprises and branch offices, and supports from 10 to 100 concurrent users.

FirePass 4100

The FirePass 4100 controller is designed for medium-size enterprises and, from a price/ performance standpoint, is recommended for up to 500 concurrent users.

FirePass 4300

The FirePass 4300 appliance is designed for medium to large enterprises and service providers and supports up to 2000 concurrent users.

FirePass Virtual Edition

FirePass Virtual Edition runs in a VMware ESX 4.0 virtual environment and is designed for medium to large enterprises and service providers supporting up to 2000 concurrent users.

Clustering

The FirePass 4100 and 4300 appliances and Virtual Edition have built-in clustering support.

They can be combined with F5 BIG-IP ® Global Traffic Manager ™ and BIG-IP ® Local Traffic

Manager

to provide industry-leading scalability, performance, and availability.

Failover

FirePass appliances and Virtual Edition can also be configured for stateful failover between pairs of servers (an active server and a standby server) to avoid having to re-logon to another

FirePass device or Virtual Edition in the unlikely event of a primary unit failure.

SSL Accelerator Hardware Option

FirePass 4100 offers a unique Hardware SSL Acceleration option to offload the SSL key exchange as well as the encryption and decryption of SSL traffic. This enables significant performance gains in large enterprise environments for processor-intensive ciphers such as 3DES and AES.

DATASHEET

FirePass SSL VPN

FIPS SSL Accelerator Hardware Option

FirePass is FIPS compliant* to meet the strong security needs of government, finance, healthcare, and other security-conscious organizations. FirePass 4100 and 4300 devices offer support for FIPS 140 Level-2 enabled tamper-proof storage of SSL keys, as well as

FIPS-certified cipher support for encrypting and decrypting SSL traffic in hardware. FIPS SSL

Accelerator is available as a factory install option to the base 4100 and 4300 platform.

13

* FIPS 140-2 meets the security criteria of CESG (UK’s National Technical Authority For Information Assurance) for use in private data traffic.

FirePass Specifications

The FirePass appliance is available in three models and as a Virtual Edition to address the concurrent user access needs of small to large enterprises.

FirePass Virtual Edition

Virtual Specifications

F5 BIG-IP

Local

Traffic

Manager

F5 BIG-IP

Local

Traffic

Manager

F5 BIG-IP

Local

Traffic

Manager

F5 BIG-IP

Local

Traffic

Manager

Recommended Conc. Users: Up to 2000*

Clustering Support:

Yes – up to 10 virtual appliances

* Note: Actual performance varies depending on hardware platform, resources available, and configuration.

Host System

Requirements

It is highly recommended that the host system contain

CPUs based on AMD-V or Intel-VT technology.

Hypervisor:

VMware ESX 4.0 or ESXi 4.0

VMware vSphere Client

VMware virtual hardware version 7

Processor:

1 CPU

(4 CPUs or more are recommended for more than 500 concurrent users.)

Memory:

2 GB RAM

(8 GB or more are recommended for more than 500 concurrent users.)

Network Adapters: 3 network interfaces

Disk Space:

30 GB hard drive of thin provisioning

14

DATASHEET

FirePass SSL VPN

4300 and 4100 Series 1200 Series

Physical Specifications 4300

Recommended Conc. Users:

2000

Max. Conc. Users per Appliance :

2000

Interfaces:

4 (10/100/1000) LAN ports

Dimensions:

3.5” H x 17.5” W x 23.5” D

2U industry standard rack mount chassis

Weight:

43 lbs

Processors:

Two Opteron 2.2 GHz - dual core

Power Supply:

Dual 475 W 90/240 +/- 10% VAC auto switching

Typical Power Consumption:

275 W

Maximum Heat Output:

939 BTU/hr

Device Redundancy:

Watchdog timer, failsafe cable

(primary and secondary)

Clustering support: Yes – up to 10 appliances

FIPS SSL Accelerator Card Option:

Yes – factory only

Hard Drive Capacity:

160 GB

RAM: 8 GB standard

Temperature (operating):

41° F to 104° F (5° C to 40° C)

Non-Operating Ambient

Temperature Range:

-40° F to 149° F (-40° C to 65° C)

Relative humidity 10% to 95% at

40° C non-condensing

Humidity (relative):

20% to 90% at 40° C

Safety Agency Approval:

UL 60950 (UL 1950-3), CSA-C22.2

No 60950-00 (Bi-national standard with UL 60950

CB test certification to IEC 950,

EN 60950

Electromagnetic Emissions

Certifications:

EN55022 1998 Class A

EN55022 1998 Class A

FCC Part 15B Class A

VCCI Class A

4100

500

2000

4 (10/100/1000) LAN ports

3.5” H x 17.5” W x 23.5” D

2U industry standard rack mount chassis

40 lbs

Two Opteron 2.0 GHz - single core

425 W 90/240 +/- 10% VAC auto switching

Optional redundant power supply

275 W

939 BTU/hr

Watchdog timer, failsafe cable

(primary and secondary)

Yes – up to 10 appliances

Yes – factory only

160 GB

4 GB standard on 4110, 4120, 4130 – factory upgradable to 8 GB

(4140 and 4150 8 GB standard)

41° F to 104° F (5° C to 40° C)

-40° F to 149° F (-40° C to 65° C)

Relative humidity 10% to 95% at

40° C non-condensing

20% to 90% at 40° C

UL 60950 (UL 1950-3), CSA-C22.2

No 60950-00 (Bi-national standard with UL 60950)

CB test certification to IEC 950,

EN 60950

EN55022 1998 Class A

EN55022 1998 Class A

FCC Part 15B Class A

VCCI Class A

1200

100

100

2 (10/100) LAN ports

1.7”H x 16.7” W x 11” D

1U industry standard rack mount chassis

10 lbs

Intel Celeron 2.0GHz - single core

Single full-range 250 W

180 W

785 BTU/hr

Watchdog timer, failsafe cable

(primary and secondary)

No

No

40 GB

512 MB

41° F to 104° F (5° C to 40° C)

-40° F to 149° F (-40° C to 65° C)

Relative humidity 5% to 85% at

40° C non-condensing

20% to 90% at 40° C

UL 60950 (UL 1950-3), CSA-C22.2

No 60950-00 (Bi-national standard with UL 60950)

CB test certification to IEC 950,

EN 60950

EN55022 1998 Class A

EN55022 1998 Class A

FCC Part 15B Class A

VCCI Class A

DATASHEET

FirePass SSL VPN

More Information

Visit these resources on F5.com

to learn more about FirePass.

White papers

F5 FirePass Endpoint Security

Get to Know GPO

Podcast

Secure Remote Access for Disaster Recovery

Case study

City of Diamond Bar Deploys FirePass

Deployment guides

F5 FirePass controller with BIG-IP LTM and GTM

(FirePass v6.x, LTM, and GTM 9.4.2), Deployment Guide

FirePass and VMware View Deployment Guide

16

F5 Networks, Inc. 401 Elliott Avenue West, Seattle, WA 98119 888-882-4447 www.f5.com

F5 Networks, Inc.

Corporate Headquarters [email protected]

F5 Networks

Asia-Pacific [email protected]

F5 Networks Ltd.

Europe/Middle-East/Africa [email protected]

F5 Networks

Japan K.K.

[email protected]

© 2010 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG-IP, FirePass, iControl, TMOS, and VIPRION are trademarks or registered trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. CS03-00005 0710

Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project