Junos Software version tested | |
---|---|
Junos 11.4R1 | |
Firewall performance (max) | |
150 Gbps | |
IPS performance (NSS 4.2.1) | |
30 Gbps | |
AES256+SHA-1 / 3DES+SHA-1 VPN performance | |
30 Gbps | |
Maximum concurrent sessions | |
20 million | |
New sessions/second (sustained, TCP, 3-way) | |
350000 | |
Maximum security policies | |
80000 | |
Maximum users supported | |
Unrestricted | |
Maximum available slots for IOCs | |
11 | |
Fixed I/O ports | |
N/A | |
CX111 3G Bridge support | |
N/A | |
Internal 3G Express Card Slot support | |
N/A | |
Centralized Management | |
Junos Space Security Design | |
LAN interface options | |
40 x 1 Gigabit Ethernet SFP | |
4 x 10 Gigabit Ethernet (short reach (SR) or long reach (LR)) | |
16 x 10/100/1000 Ethernet FlexIOC | |
4 x 10 Gigabit Ethernet (SR or LR) FlexIOC | |
High-availability support | |
Active/Passive Active/Active | |
Low impact chassis cluster | |
Interface aggregation groups across chassis cluster | |
AppSecure Services | |
Application Identification | yes |
Application Denial of Service Protection (AppDoS) | yes |
AppTrack | yes |
AppQoS | yes |
AppFW | yes |
Dimensions and Power | |
Dimensions (W x H x D) | 17.5 x 27.8 x 23.5 in (44.5 x 70.5 x 59.7 cm) |
Weight | Chassis |
Power supply (AC) | 200 to 240 V AC |
Power supply (DC) | -40 to -60 V DC |
Maximum power draw | 5100 W |
Firewall | |
Network attack detection | Yes |
DoS and DDoS protection | Yes |
TCP reassembly for fragmented packet protection | Yes |
Brute force attack mitigation | Yes |
SYN cookie protection | Yes |
Zone-based IP spoofing | Yes |
Malformed packet protection | Yes |
GPRS stateful inspection | Yes |
Intrusion Prevention System | |
Stateful protocol signatures | Yes |
Attack detection mechanisms | Stateful signatures protocol anomaly detection (zero-day coverage) application identification |
Attack response mechanisms | Drop connection close connection session packet log session summary email custom session |
Attack notification mechanisms | Structured syslog |
Worm protection | Yes |
SSL encrypted traffic inspection | Yes |
Simplified installation through recommended policies | Yes |
Trojan protection | Yes |
Spyware/adware/keylogger protection | Yes |
Other malware protection | Yes |
Protection against attack proliferation from infected systems | Yes |
Reconnaissance protection | Yes |
Request and response side attack protection | Yes |
Compound attacks — combines stateful signatures and protocol anomalies | Yes |
Create custom attack signatures | Yes |
Access contexts for customization | 500+ |
Attack editing (port range other) | Yes |
Stream signatures | Yes |
Protocol thresholds | Yes |
Stateful protocol signatures | Yes |
Approximate number of attacks covered | 6000+ |
Detailed threat descriptions and remediation/patch info | Yes |
Create and enforce appropriate application-usage policies | Yes |
Attacker and target audit trail and reporting | Yes |
Deployment modes | Inline or TAP |
Making sure IT support would be handled any time day or night, business hours or during holiday and vacation time.
A proactive and responsible professional, well-trained, competent IT staff that can be trusted using proven processes and advanced IT tool-sets.
We handle all updates, antivirus, security, and monitoring for you. You’ll know your systems are healthy every single day.
Request a free consultation
today and let’s see how we can
help you meet your goals.