Junos Software version tested | |
---|---|
Junos 11.4R1 | |
Firewall performance (max) | |
150 Gbps | |
IPS performance (NSS 4.2.1) | |
30 Gbps | |
AES256+SHA-1 / 3DES+SHA-1 VPN performance | |
30 Gbps | |
Maximum concurrent sessions | |
20 million | |
New sessions/second (sustained, TCP, 3-way) | |
350000 | |
Maximum security policies | |
80000 | |
Maximum users supported | |
Unrestricted | |
Maximum available slots for IOCs | |
11 | |
Fixed I/O ports | |
N/A | |
CX111 3G Bridge support | |
N/A | |
Internal 3G Express Card Slot support | |
N/A | |
Centralized Management | |
Junos Space Security Design | |
LAN interface options | |
40 x 1 Gigabit Ethernet SFP | |
4 x 10 Gigabit Ethernet (short reach (SR) or long reach (LR)) | |
16 x 10/100/1000 Ethernet FlexIOC | |
4 x 10 Gigabit Ethernet (SR or LR) FlexIOC | |
High-availability support | |
Active/Passive Active/Active | |
Low impact chassis cluster | |
Interface aggregation groups across chassis cluster | |
AppSecure Services | |
Application Identification | yes |
Application Denial of Service Protection (AppDoS) | yes |
AppTrack | yes |
AppQoS | yes |
AppFW | yes |
Dimensions and Power | |
Dimensions (W x H x D) | 17.5 x 27.8 x 23.5 in (44.5 x 70.5 x 59.7 cm) |
Weight | Chassis |
Power supply (AC) | 200 to 240 V AC |
Power supply (DC) | -40 to -60 V DC |
Maximum power draw | 5100 W |
Firewall | |
Network attack detection | Yes |
DoS and DDoS protection | Yes |
TCP reassembly for fragmented packet protection | Yes |
Brute force attack mitigation | Yes |
SYN cookie protection | Yes |
Zone-based IP spoofing | Yes |
Malformed packet protection | Yes |
GPRS stateful inspection | Yes |
Intrusion Prevention System | |
Stateful protocol signatures | Yes |
Attack detection mechanisms | Stateful signatures protocol anomaly detection (zero-day coverage) application identification |
Attack response mechanisms | Drop connection close connection session packet log session summary email custom session |
Attack notification mechanisms | Structured syslog |
Worm protection | Yes |
SSL encrypted traffic inspection | Yes |
Simplified installation through recommended policies | Yes |
Trojan protection | Yes |
Spyware/adware/keylogger protection | Yes |
Other malware protection | Yes |
Protection against attack proliferation from infected systems | Yes |
Reconnaissance protection | Yes |
Request and response side attack protection | Yes |
Compound attacks — combines stateful signatures and protocol anomalies | Yes |
Create custom attack signatures | Yes |
Access contexts for customization | 500+ |
Attack editing (port range other) | Yes |
Stream signatures | Yes |
Protocol thresholds | Yes |
Stateful protocol signatures | Yes |
Approximate number of attacks covered | 6000+ |
Detailed threat descriptions and remediation/patch info | Yes |
Create and enforce appropriate application-usage policies | Yes |
Attacker and target audit trail and reporting | Yes |
Deployment modes | Inline or TAP |
Enjoy uninterrupted 24/7 IT support, whether it's day or night, weekends, or holidays.
We have handpicked seasoned IT experts who are well-trained to work with proven processes and advanced IT toolsets.
Rest easy knowing that all updates, antivirus, security, and monitoring are taken care of for you, each day, every day.
Need instant support? Our remote support/ticketing portal is always open!
Remote SupportLet’s discuss your goals and how We can assist you on your path to success. Schedule a free consultation call with us.
SCHEDULE A MEETING