SlideShare a Scribd company logo
1 of 4
Download to read offline
Datasheet
Page 
Juniper Networks	SSG 5 and SSG 20
The Juniper Networks Secure Services Gateway 5 (SSG 5) and Secure Services Gateway 20 (SSG 20) are purpose-built security appliances that
deliver a perfect blend of performance, security, routing and LAN/WAN connectivity for small branch office and small business deployments.
Traffic flowing in and out of the branch office can be protected from worms, Spyware, Trojans, and malware by a complete set of Unified Threat
Management (UTM) security features including Stateful firewall, IPSec VPN, IPS, Antivirus (includes Anti-Spyware, Anti-Adware, Anti-Phishing), Anti-
Spam, and Web Filtering.
The rich set of UTM security features allows the SSG 5 and SSG 20 to be deployed as a stand alone network protection device. With its robust
routing engine, the SSG 5 and SSG 20 can also be deployed as a traditional branch office router or as a combination security and routing device to
help reduce IT capital and operational expenditures. The SSG 5 and SSG 20 provide customers with the following features and benefits:
•	 Extensible I/O architecture that delivers fixed LAN connectivity plus WAN I/O options on top of unmatched security to reduce costs and extend
investment protection.
•	 UTM security features backed by best-in-class security partners to ensure that the network is protected against all manner of attacks.
•	 Advanced security features such as network segmentation allows administrators to deploy security policies to isolate guests, wireless networks
and regional servers or databases to prevent unauthorized access and contain any attacks that may occur.
•	 Dedicated, security specific processing hardware and software platform delivers performance required to protect high speed LAN as well as
lower speed WAN connections.
Used by enterprises, service providers and stand alone businesses alike, the SSG 5 and SSG 20 are
ideally suited for locations that are smaller, with fewer employees yet still require advanced security
and routing features to protect business critical traffic traversing the WAN and high speed internal
networks. Typical deployments include small businesses, distributed branch offices, retail outlets,
and fixed telecommuter environments.
SSG 5:
The SSG 5 is a fixed form factor platform that delivers 160 Mbps of Stateful firewall traffic and
40 Mbps of IPSec VPN throughput. The SSG 5 Series is equipped with seven on-board 10/100
interfaces with optional fixed WAN ports (ISDN BRI S/T, V.92 or RS-232 Serial/Aux). Optional
support for 802.11 a/b/g and a broad array of wireless specific security allow the SSG 5 to
consolidate security, routing and wireless access point into a single device.
SSG 20:
The SSG 20 is a modular platform that delivers 160 Mbps of Stateful firewall traffic and 40 Mbps of
IPSec VPN throughput. The SSG 20 is equipped with five on-board 10/100 interfaces with two I/O
expansion slots that support I/O cards, such as ADSL2+, T1, E1, ISDN BRI S/T, V.92 for additional
WAN connectivity. Optional support for 802.11 a/b/g and a broad array of wireless specific security
allow the SSG 20 to consolidate security, routing and wireless access point into a single device.
Security
Proven Stateful firewall and IPSec VPN combined with best-in-class
UTM security features including IPS (Deep Inspection), Antivirus
(includes Anti-Spyware, Anti-Adware, Anti-Phishing), Anti-Spam, and
Web Filtering protects both LAN and WAN traffic from worms, Spyware,
Trojans, malware and other emerging attacks.
LAN/WAN connectivity
The combination of LAN/WAN connectivity options and supporting
protocols provides customers with the ability to deploy the SSG 5 or SSG
20 as a traditional LAN-based firewall or as a consolidated routing and
security device, thereby reducing TCO.
Network segmentation
The SSG 5 and SSG 20 provide an advanced set of network
segmentation features such as Security Zones, Virtual Routers and
VLANs that allow administrators to deploy different levels of security
to different user groups by dividing the network into distinct, secure
domains, each with their own security policy.
Seamlessly transform your network
Whether you are deploying a few SSGs to your local offices or
implementing thousands around the world, Juniper Networks
Professional Services can help. From simple lab testing to major network
implementations, we can identify the goals, define the deployment
process, create or validate the network design, and manage the
deployment. We collaborate with your team to transform your network
infrastructure to ensure that it is flexible, scalable, reliable, and secure.
Page 
			 SSG 20	 SSG 5
Maximum Performance and Capacity(1)
	 ScreenOS version support 	 ScreenOS 5.4	 ScreenOS 5.4
	 Firewall performance (Large packets)	 160 Mbps	 160 Mbps
	 Firewall performance(2)
(IMIX)	 90 Mbps	 90 Mbps
	 Firewall Packets per second (64 byte)	 30,000 	 30,000
	 VPN performance (3DES+SHA-1)	 40 Mbps 	 40 Mbps
	 Concurrent sessions	 4,000	 4,000
	 New sessions/second	 2,800	 2,800
	 Policies	 200	 200
	 Users supported	 Unrestricted	 Unrestricted
Network Connectivity
	 Fixed I/O 	 5x 10/100	 7x 10/100
	 Physical Interface Module (Mini-PIM) Slots	 2	 0
	 WAN interface options	 ADSL2+, T1, E1, 	 ISDN BRI S/T or
			 ISDN BRI S/T, V.92	 RS-232 Serial/Aux or
			 (See Mini-PIM datasheets)	 V.92
				 (factory configured)
	 LAN interface options	 None	 None
	 Wireless networking	 Dual Radio 802.11a + 802.11b/g (factory configured)
Firewall		
	 Network attack detection	 Yes	 Yes
	 DoS and DDoS protection	 Yes	 Yes
	 TCP reassembly for fragmented
	 packet protection	 Yes	 Yes
	 Malformed packet protection	 Yes	 Yes
Unified Threat Management/Content Security(3)
	
	 IPS (Deep Inspection FW)	 Yes 	 Yes
		 Protocol anomaly detection	 Yes	 Yes
		 Stateful protocol signatures 	 Yes	 Yes
	 Antivirus	 Yes	 Yes
		 Signature database	 100,000+
		 Protocols scanned	 POP3, SMTP, HTTP, IMAP, FTP
		 Anti-Phishing 	 Yes	 Yes
		 Anti-Spyware 	 Yes	 Yes
		 Anti-Adware 	 Yes	 Yes
		 Anti-Keylogger 	 Yes	 Yes
	 Anti-Spam	 Yes	 Yes
	 Integrated URL filtering	 Yes	 Yes
	 External URL filtering(4)
	 Yes	 Yes
VoIP Security 		
	 H.323. ALG 	 Yes	 Yes
	 SIP ALG 	 Yes	 Yes
	 SCCP ALG	 Yes	 Yes
	 MGCP ALG	 Yes	 Yes
	 NAT for SIP, H.323, MGCP, SCCP	 Yes	 Yes
VPN		
	 Concurrent VPN tunnels	 25	 25
	 Tunnel interfaces	 10	 10
	 DES (56-bit), 3DES (168-bit)
	 and AES encryptions	 Yes	 Yes
	 MD-5 and SHA-1 authentication	 Yes	 Yes
	 Manual key, IKE, PKI (X.509)	 Yes	 Yes
	 Perfect forward secrecy (DH Groups)	 1,2,5	 1,2,5
	 Prevent replay attack 	 Yes	 Yes
	 Remote access VPN	 Yes	 Yes
	 L2TP within IPSec 	 Yes	 Yes
	 IPSec NAT traversal	 Yes	 Yes
	 Redundant VPN gateways	 Yes	 Yes
	
			 SSG 20	 SSG 5
Firewall and VPN User Authentication		
	 Built-in (internal) database - user limit	 Up to 100	 Up to 100
	 3rd Party user authentication	 RADIUS, RSA SecurID, and LDAP
	 XAUTH VPN authentication	 Yes	 Yes
	 Web-based authentication	 Yes	 Yes
	 802.1X authentication	 Yes	 Yes
Mode of Operation
	 Layer 2 (transparent) mode(5)
	 Yes	 Yes
	 Layer 3 (route and/or NAT) mode 	 Yes	 Yes
Address Translation
	 Network Address Translation (NAT)	 Yes	 Yes
	 Port Address Translation (PAT)	 Yes	 Yes
	 Policy-based NAT/PAT	 Yes	 Yes
	 Mapped IP	 Yes	 Yes
	 Virtual IP	 Yes	 Yes
Routing		
	 BGP	 Yes	 Yes
	 OSPF	 Yes	 Yes
	 RIPv1/v2 	 Yes	 Yes
	 Static routes	 Yes	 Yes
	 Source-based routing	 Yes	 Yes
	 Policy-based routing	 Yes	 Yes
	 ECMP	 Yes	 Yes
	 Routes	 1,024	 1,024
	 Multicast 	 Yes	 Yes
		 Reverse Forwarding Path (RFP)	 Yes	 Yes
		 IGMP (v1, v2)	 Yes	 Yes
		 IGMP Proxy	 Yes	 Yes
		 PIM SM	 Yes	 Yes
		 PIM SSM	 Yes	 Yes
		 Mcast inside IPSec Tunnel	 Yes	 Yes
Encapsulations		
	 PPP	 Yes	 Yes
	 MLPPP	 Yes	 N/A
	 Frame Relay	 Yes	 N/A
	 MLFR (FRF 15, FRF 16) 	 Yes	 N/A
	 HDLC	 Yes	 N/A
Traffic Management (QoS)		
	 Guaranteed bandwidth	 Yes	 Yes
	 Maximum bandwidth	 Yes	 Yes
	 Ingress Traffic Policing	 Yes	 Yes
	 Priority-bandwidth utilization	 Yes	 Yes
	 DiffServ stamp	 Yes, per policy	 Yes, per policy
	 Wi-Fi Multi-Media (WMM)	 Yes (with WLAN)	 Yes (with WLAN)
System Management		
	 WebUI (HTTP and HTTPS)	 Yes	 Yes
	 Command Line Interface (console)	 Yes	 Yes
	 Command Line Interface (telnet)	 Yes	 Yes
	 Command Line Interface (SSH)	 Yes, v1.5 and v2.0 compatible
	 NetScreen-Security Manager	 Yes	 Yes
	 All management via VPN tunnel
	 on any interface	 Yes	 Yes
	 SNMP full custom MIB	 Yes	 Yes
	 Rapid deployment	 Yes	 Yes
Logging and Monitoring		
	 Syslog (multiple servers)	 External, up to 4 servers
	 E-mail (2 addresses)	 Yes	 Yes
	 NetIQ WebTrends	 External	 External
	 SNMP (v2)	 Yes	 Yes
	 Traceroute	 Yes	 Yes
	 VPN tunnel monitor	 Yes	 Yes
Juniper Networks Secure Services Gateway 5 and 20
Datasheet
Page 
			 SSG 20	 SSG 5
Virtualization		
	 Maximum number of configurable security zones	 8	 8
	 Maximum number of virtual routers	 3	 3
	 Maximum number of 802.1q VLANs 	 10	 10
High Availability (HA)(6)
		
	 Active/Passive	 Yes	 Yes
	 Configuration synchronization	 Yes	 Yes
	 Session synchronization for firewall and VPN	 Yes	 Yes
	 Session failover for routing change	 Yes	 Yes
	 Device failure detection	 Yes	 Yes
	 Link failure detection	 Yes	 Yes
	 Authentication for new HA members	 Yes	 Yes
	 Encryption of HA traffic	 Yes	 Yes
IP Address Assignment		
	 Static	 Yes	 Yes
	 DHCP, PPPoE client	 Yes	 Yes
	 Internal DHCP server	 Yes	 Yes
	 DHCP relay	 Yes	 Yes
PKI Support		
	 PKI Certificate requests (PKCS 7 and PKCS 10)	 Yes	 Yes
	 Automated certificate enrollment (SCEP)	 Yes	 Yes
	 Online Certificate Status Protocol (OCSP)	 Yes	 Yes
	 Certificate Authorities Supported	 Verisign, Entrust, Microsoft, RSA Keon,
			 iPlanet (Netscape), Baltimore, DOD PKI
Administration		
	 Local administrators database size	 20	 20
	 External administrator database	 RADIUS/LDAP/SecurID
	 Root Admin, Admin, and 	 Yes	 Yes
	 Read Only user levels
	 Software upgrades	 TFTP / WebUI / NSM / SCP / USB
	 Configuration Roll-back	 Yes	 Yes
External Flash		
	 Additional log storage	 via USB
	 Event logs and alarms	 Yes	 Yes
	 System config script	 Yes	 Yes
	 ScreenOS Software	 Yes	 Yes
Dimensions and Power		
	 Dimensions (W/L/H)	 11 5/8” x 7 3/8” x 1 3/4”	 8 3/4” x 5 5/8” x 1 5/8”
			 29.5cm x 18.7cm x 4.5cm	 22.2cm x 14.3cm x 4.1cm
	 Weight	 3.3 lbs (1.5 kg)	 2.1 lbs (0.95 kg)
	 Rack mountable	 Yes	 Yes
	 Power Supply (AC)	 100-240 VAC	 100-240 VAC
Certifications		
	 Safety Certifications	 CSA, CB 	 CSA, CB
	 EMC Certifications	 FCC Class B, CE Class B,	 FCC Class B, CE Class B,
			 A-Tick, VCCI class B	 A-Tick, VCCI class B
Environment	 	
	 Temp and Humidity	
	 Operating Temp 	 0 to 40 Deg C 	 0 to 40 Deg C
			 ( 32 to 104 Deg F)	 ( 32 to 104 Deg F)
	 Non-Operating Temp	 -20 to 65 Deg C 	 -20 to 65 Deg C
			 (-4 to 149 Deg F)	 (-4 to 149 Deg F)
	 Humidity 	 10 to 90% 	 10 to 90%
			 non-condensing	 non-condensing
	 MTBF (Bellcore model)
		 Non-Wireless 	 35.8 Yrs	 40.5 Yrs
		 Wireless 	 28.9 Yrs	 22.8 Yrs
			 SSG 20	 SSG 5
Wireless Radio Specifications (Wireless Models Only)		
	 Transmit Power	 Up to 200mW
	 Wireless Standards supported	 Dual Radio 802.11 a + 802.11b/g
	 Site Survey	 Yes
	 Maximum Configured SSIDs	 16
	 Maximum Active SSIDs	 4
	 Atheros SuperG	 Yes
	 Atheros eXtended Range (XR)	 Yes
	 Wi-Fi CERTIFIED® 	 Yes
Wireless Security (Wireless Models Only)		
	 Wireless Privacy	 WPA, WPA2 (AES or TKIP), IPSEC VPN, WEP
	 Wireless Authentication	 PSK, EAP-PEAP, EAP-TLS, EAP-TTLS over 802.1x
	 MAC Access Controls	 Permit or Deny
	 Client Isolation	 Yes
Antenna Option (Wireless Models Only)		
	 Diversity Antenna	 Included
	 Directional Antenna	 Future
	 Omni-directional Antenna	 Future
(1) Performance, capacity and features listed are based upon systems running ScreenOS 5.4 and are the measured maximums under ideal testing conditions
unless otherwise noted. Actual results may vary based on ScreenOS release and by deployment.
(2) IMIX stands for Internet mix and is more demanding than a single packet size as it represents a traffic mix that is more typical of a customer’s network. The
IMIX traffic used is made up of 58.33% 64 byte packets + 33.33% 570 byte packets + 8.33% 1518 byte packets of UDP traffic.
(3) UTM Security features (IPS/Deep Inspection, Antivirus, Anti-Spam and Web filtering) are delivered by annual subscriptions purchased separately from Juniper
Networks. Annual subscriptions provide signature updates and associated support. The high memory option is required for UTM Security features.
(4) Redirect Web filtering sends traffic to a secondary server and therefore entails purchasing a separate Web filtering license from either Websense or
SurfControl.
(5) NAT, PAT, policy based NAT, virtual IP
, mapped IP
, virtual systems, virtual routers, VLANs, OSPF, BGP
, RIPv2, Active/Active HA, and IP address assignment are
not available in layer 2 transparent mode.
(6) Active Passive and HA Lite require the purchase of an Extended License. In addition to the HA features, an Extended License key increases a subset of the
capacities as outlined below.
Extended License Feature	 SSG 20 and SSG 5		
	 Sessions	 Increases max from 4000 to 8000
	 VPN Tunnels	 Increases max from 25 to 40
	 VLANS	 Increases max from 10 to 50
	 VoIP Calls	 Increases max from 32 to 48
	 High Availability 	 Adds support for Stateful Active/Passive and/or HA Lite
IPS (Deep Inspection FW) Signature Packs		
Signature Packs provide the ability to tailor the attack protection to the specific deployment
and/or attack type. The following Signature packs are available for the SSG 5 and SG 20.
Signature Pack Target Deployment Defense Type Type of Attack
Object
Base Branch Offices, small
medium businesses
Client/Server and
worm protection
Range of signa-
tures and protocol
anomalies
Client Remote/Branch
Offices
Perimeter defense,
compliance for hosts
(desktops, etc)
Attacks in the server-
to-client direction
Server Small/Medium
Businesses
Perimeter defense,
compliance for
server infrastructure
Attacks in the client-
to-server direction
Worm Mitigation Remote/Branch
Offices of Large
enterprises
Most comprehensive
defense against
worm attacks
Worms, Trojans,
backdoor attacks
Copyright 2006, Juniper Networks, Inc. All rights reserved. Juniper Networks and the Juniper Networks logo are registered trademarks of Juniper
Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered trademarks, or registered service marks
in this document are the property of Juniper Networks or their respective owners. All specifications are subject to change without notice. Juniper
Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update information in this document. Juniper
Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
CORPORATE HEADQUARTERS
AND SALES HEADQUARTERS
FOR NORTH AND SOUTH AMERICA
Juniper Networks, Inc.
1194 North Mathilda Avenue
Sunnyvale, CA 94089 USA
Phone: 888-JUNIPER (888-586-4737)
or 408-745-2000
Fax: 408-745-2100
www.juniper.net
EAST COAST OFFICE
Juniper Networks, Inc.
10 Technology Park Drive
Westford, MA 01886-3146 USA
Phone: 978-589-5800
Fax: 978-589-0800
ASIA PACIFIC REGIONAL
SALES HEADQUARTERS
Juniper Networks (Hong Kong) Ltd.
Suite 2507-11, 25/F
ICBC Tower,
Citibank Plaza, 3 Garden Road,
Central, Hong Kong
Phone: 852-2332-3636
Fax: 852-2574-7803
EUROPE, MIDDLE EAST, AFRICA
REGIONAL SALES HEADQUARTERS
Juniper Networks (UK) Limited
Building 1
Aviator Park, Station Road
Addlestone
Surrey, KT15 2PG, U. K.
Phone: 44(0)-1372-385500
Fax: 44(0)-1372-385501
Page 
100176-002 Oct 2006
Ordering Information
Product	 Part Number
SSG 5 	
SSG 5 with Serial backup, 128 MB Memory	 SSG-5-SB
SSG 5 with ISDN BRI S/T backup, Interface,128 MB Memory	 SSG-5-SB-BT
SSG 5 with v.92 backup, 128 MB Memory	 SSG-5-SB-M
SSG 5 with Serial backup, Wireless 802.11a/b/g,128 MB Memory	 SSG-5-SB-W-xx
SSG 5 with ISDN BRI S/T backup, Wireless 802.11a/b/g, 128 MB memory	 SSG-5-SB-BTW-xx
SSG 5 with v.92 backup, Wireless 802.11a/b/g, 128 MB Memory	 SSG-5-SB-MW-xx
SSG 5 with Serial backup, 256 MB memory	 SSG-5-SH
SSG 5 with ISDN BRI S/T backup, 256 MB memory	 SSG-5-SH-BT
SSG 5 with v.92 backup, 256 MB memory	 SSG-5-SH-M
SSG 5 with Serial backup, Wireless 802.11a/b/g, 256 MB memory	 SSG-5-SH-W-xx
SSG 5 with ISDN BRI S/T backup, Wireless 802.11a/b/g, 256 MB memory	 SSG-5-SH-BTW-xx
SSG 5 with v.92 backup, Wireless 802.11a/b/g, 256 MB memory	 SSG-5-SH-MW-xx
SSG 20 	
SSG 20 with 2 port Mini-PIM slots, 128 MB Memory	 SSG-20-SB
SSG 20 with 2 port Mini-PIM slots,
Wireless 802.11a/b/g, 128 MB Memory	 SSG-20-SB-W-xx
SSG 20 with 2 port Mini-PIM slots, 256 MB memory	 SSG-20-SH
SSG 20 with 2 port Mini-PIM slots,
Wireless 802.11a/b/g, 256 MB memory	 SSG-20-SH-W-xx
SSG 20 I/O Options	
1 port T1 Mini Physical Interface Module	 JXM-1T1-S
1 port E1 Mini Physical Interface Module	 JXM-1E1-S
1 port ADSL2+ Annex A Mini Physical Interface Module	 JXM-1ADSL2-A-S
1 port ADSL2+ Annex B Mini Physical Interface Module	 JXM-1ADSL2-B-S
1 port v.92 Mini Physical Interface Module	 JXM-1V92-S
1 port ISDN S/T BRI Mini Physical Interface Module	 JXM-1BRI-ST-S
Product	 Part Number
SSG 5 / SSG 20 Accessories  Upgrades 	
Extended License Upgrade Key for SSG 5 	 SSG-5-ELU
Extended License Upgrade Key for SSG 20	 SSG-20-ELU
SSG 5 and SSG 20 256MB Memory Upgrade Module	 SSG-5-20-MEM-256
SSG 5 Rack Mount Kit - holds 2 units	 SSG-5-RMK
SSG 20 Rack Mount Kit	 SSG-20-RMK
SSG Wireless Replacement Antenna	 SSG-ANT
Unified Threat Management/Content Security (High Memory Option Required) 	
Anti-Virus (Anti-Spyware, Anti-Phishing)	 NS-K-AVS-SSG5
	 NS-K-AVS-SSG20
IPS (Deep Inspection)	 NS-DI-ISG-SSG5
	 NS-DI-ISG-SSG20
Web Filtering	 NS-WF-SSG5
	 NS-WF-SSG20
Anti-Spam	 NS-SPAM-SSG5
	 NS-SPAM-SSG20
Remote Office Bundle (Includes AV, DI, WF)	 NS-RBO-CS-SSG5
	 NS-RBO-CS-SSG20
Main Office Bundle (Includes AV, DI, WF, AS)	 NS-SMB-CS-SSG5
	 NS-SMB-CS-SSG20
• Note: The appropriate power cord is included based upon the sales order “Ship To” destination.
• 
Note: XX denotes Region Code for Wireless devices. Not all countries are supported. Please see Wireless Country Compliance Matrix for certified countries.
www.jnpr.net/products/integrated/ssg_5_20.html
• Note: For 2nd year renewal of Content Security Subscriptions add “-R” to above SKUs.

More Related Content

What's hot

CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...Alexander Kravchenko
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn securityJack Melson
 
Deployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceDeployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceAlfredo Boiero Sanders
 
FortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
FortiGate 1500D Series Delivers High-Performance Next-Generation FirewallFortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
FortiGate 1500D Series Delivers High-Performance Next-Generation FirewallShilaThak
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...BGA Cyber Security
 
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...Cisco Russia
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusRassul Ismailov
 
Software defined security-framework_final
Software defined security-framework_finalSoftware defined security-framework_final
Software defined security-framework_finalLan & Wan Solutions
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Canada
 
Cisco asa cx firwewall
Cisco asa cx firwewallCisco asa cx firwewall
Cisco asa cx firwewallAnwesh Dixit
 
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...Cisco Canada
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13Cohesive Networks
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 

What's hot (20)

CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
 
CCNP Security-Firewall
CCNP Security-FirewallCCNP Security-Firewall
CCNP Security-Firewall
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
My Final Year Project
My Final Year ProjectMy Final Year Project
My Final Year Project
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn security
 
Deployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceDeployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_appliance
 
FortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
FortiGate 1500D Series Delivers High-Performance Next-Generation FirewallFortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
FortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 
Secured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRRSecured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRR
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
 
VPN
VPNVPN
VPN
 
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless Campus
 
Software defined security-framework_final
Software defined security-framework_finalSoftware defined security-framework_final
Software defined security-framework_final
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Cisco asa cx firwewall
Cisco asa cx firwewallCisco asa cx firwewall
Cisco asa cx firwewall
 
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
VPN presentation - moeshesh
VPN presentation - moesheshVPN presentation - moeshesh
VPN presentation - moeshesh
 

Similar to Juniper ssg5-ssg20-datasheet

Fortinet FortiGate 100D
Fortinet FortiGate 100DFortinet FortiGate 100D
Fortinet FortiGate 100DHoai Duyen
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPEMichelle Holley
 
Cisco rv110 w wireless n vpn firewall
Cisco rv110 w wireless n vpn firewallCisco rv110 w wireless n vpn firewall
Cisco rv110 w wireless n vpn firewallIT Tech
 
Jithesh_Sr Network Engineer
Jithesh_Sr Network EngineerJithesh_Sr Network Engineer
Jithesh_Sr Network EngineerJithesh reddy
 
Office in a box - Converged Applications Gateway
Office in a box - Converged Applications GatewayOffice in a box - Converged Applications Gateway
Office in a box - Converged Applications GatewaySI3D systems
 
An introduction to Huawei Symantec
An introduction to Huawei SymantecAn introduction to Huawei Symantec
An introduction to Huawei SymantecUtopia Media
 
Air Live Rs 1200
Air Live Rs 1200Air Live Rs 1200
Air Live Rs 1200guest52b3f5
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosHaltdos
 
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_diveNur Shiqim Chok
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriElmarkPlusTurkiye
 

Similar to Juniper ssg5-ssg20-datasheet (20)

SANGFOR NGAF FIREWALL SG TECHNICAL PVT LTD 03002019693
SANGFOR NGAF FIREWALL  SG TECHNICAL PVT LTD 03002019693 SANGFOR NGAF FIREWALL  SG TECHNICAL PVT LTD 03002019693
SANGFOR NGAF FIREWALL SG TECHNICAL PVT LTD 03002019693
 
Fortinet FortiGate 100D
Fortinet FortiGate 100DFortinet FortiGate 100D
Fortinet FortiGate 100D
 
FortiGate-200B
FortiGate-200BFortiGate-200B
FortiGate-200B
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPE
 
Cisco rv110 w wireless n vpn firewall
Cisco rv110 w wireless n vpn firewallCisco rv110 w wireless n vpn firewall
Cisco rv110 w wireless n vpn firewall
 
Jithesh_Sr Network Engineer
Jithesh_Sr Network EngineerJithesh_Sr Network Engineer
Jithesh_Sr Network Engineer
 
Nagabhushana Rao P
Nagabhushana Rao PNagabhushana Rao P
Nagabhushana Rao P
 
Office in a box - Converged Applications Gateway
Office in a box - Converged Applications GatewayOffice in a box - Converged Applications Gateway
Office in a box - Converged Applications Gateway
 
An introduction to Huawei Symantec
An introduction to Huawei SymantecAn introduction to Huawei Symantec
An introduction to Huawei Symantec
 
Air Live Rs 1200
Air Live Rs 1200Air Live Rs 1200
Air Live Rs 1200
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
G. Iliev
G. Iliev G. Iliev
G. Iliev
 
Manjesh cv
Manjesh cvManjesh cv
Manjesh cv
 
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router Çözümleri
 
Jvvnl 071108
Jvvnl 071108Jvvnl 071108
Jvvnl 071108
 
FortiGate-80C
FortiGate-80CFortiGate-80C
FortiGate-80C
 
Allied Telesis x610 Series
Allied Telesis x610 SeriesAllied Telesis x610 Series
Allied Telesis x610 Series
 
Jatinder Singh
Jatinder SinghJatinder Singh
Jatinder Singh
 
2500 controller
2500 controller2500 controller
2500 controller
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Juniper ssg5-ssg20-datasheet

  • 1. Datasheet Page Juniper Networks SSG 5 and SSG 20 The Juniper Networks Secure Services Gateway 5 (SSG 5) and Secure Services Gateway 20 (SSG 20) are purpose-built security appliances that deliver a perfect blend of performance, security, routing and LAN/WAN connectivity for small branch office and small business deployments. Traffic flowing in and out of the branch office can be protected from worms, Spyware, Trojans, and malware by a complete set of Unified Threat Management (UTM) security features including Stateful firewall, IPSec VPN, IPS, Antivirus (includes Anti-Spyware, Anti-Adware, Anti-Phishing), Anti- Spam, and Web Filtering. The rich set of UTM security features allows the SSG 5 and SSG 20 to be deployed as a stand alone network protection device. With its robust routing engine, the SSG 5 and SSG 20 can also be deployed as a traditional branch office router or as a combination security and routing device to help reduce IT capital and operational expenditures. The SSG 5 and SSG 20 provide customers with the following features and benefits: • Extensible I/O architecture that delivers fixed LAN connectivity plus WAN I/O options on top of unmatched security to reduce costs and extend investment protection. • UTM security features backed by best-in-class security partners to ensure that the network is protected against all manner of attacks. • Advanced security features such as network segmentation allows administrators to deploy security policies to isolate guests, wireless networks and regional servers or databases to prevent unauthorized access and contain any attacks that may occur. • Dedicated, security specific processing hardware and software platform delivers performance required to protect high speed LAN as well as lower speed WAN connections. Used by enterprises, service providers and stand alone businesses alike, the SSG 5 and SSG 20 are ideally suited for locations that are smaller, with fewer employees yet still require advanced security and routing features to protect business critical traffic traversing the WAN and high speed internal networks. Typical deployments include small businesses, distributed branch offices, retail outlets, and fixed telecommuter environments. SSG 5: The SSG 5 is a fixed form factor platform that delivers 160 Mbps of Stateful firewall traffic and 40 Mbps of IPSec VPN throughput. The SSG 5 Series is equipped with seven on-board 10/100 interfaces with optional fixed WAN ports (ISDN BRI S/T, V.92 or RS-232 Serial/Aux). Optional support for 802.11 a/b/g and a broad array of wireless specific security allow the SSG 5 to consolidate security, routing and wireless access point into a single device. SSG 20: The SSG 20 is a modular platform that delivers 160 Mbps of Stateful firewall traffic and 40 Mbps of IPSec VPN throughput. The SSG 20 is equipped with five on-board 10/100 interfaces with two I/O expansion slots that support I/O cards, such as ADSL2+, T1, E1, ISDN BRI S/T, V.92 for additional WAN connectivity. Optional support for 802.11 a/b/g and a broad array of wireless specific security allow the SSG 20 to consolidate security, routing and wireless access point into a single device. Security Proven Stateful firewall and IPSec VPN combined with best-in-class UTM security features including IPS (Deep Inspection), Antivirus (includes Anti-Spyware, Anti-Adware, Anti-Phishing), Anti-Spam, and Web Filtering protects both LAN and WAN traffic from worms, Spyware, Trojans, malware and other emerging attacks. LAN/WAN connectivity The combination of LAN/WAN connectivity options and supporting protocols provides customers with the ability to deploy the SSG 5 or SSG 20 as a traditional LAN-based firewall or as a consolidated routing and security device, thereby reducing TCO. Network segmentation The SSG 5 and SSG 20 provide an advanced set of network segmentation features such as Security Zones, Virtual Routers and VLANs that allow administrators to deploy different levels of security to different user groups by dividing the network into distinct, secure domains, each with their own security policy. Seamlessly transform your network Whether you are deploying a few SSGs to your local offices or implementing thousands around the world, Juniper Networks Professional Services can help. From simple lab testing to major network implementations, we can identify the goals, define the deployment process, create or validate the network design, and manage the deployment. We collaborate with your team to transform your network infrastructure to ensure that it is flexible, scalable, reliable, and secure.
  • 2. Page SSG 20 SSG 5 Maximum Performance and Capacity(1) ScreenOS version support ScreenOS 5.4 ScreenOS 5.4 Firewall performance (Large packets) 160 Mbps 160 Mbps Firewall performance(2) (IMIX) 90 Mbps 90 Mbps Firewall Packets per second (64 byte) 30,000 30,000 VPN performance (3DES+SHA-1) 40 Mbps 40 Mbps Concurrent sessions 4,000 4,000 New sessions/second 2,800 2,800 Policies 200 200 Users supported Unrestricted Unrestricted Network Connectivity Fixed I/O 5x 10/100 7x 10/100 Physical Interface Module (Mini-PIM) Slots 2 0 WAN interface options ADSL2+, T1, E1, ISDN BRI S/T or ISDN BRI S/T, V.92 RS-232 Serial/Aux or (See Mini-PIM datasheets) V.92 (factory configured) LAN interface options None None Wireless networking Dual Radio 802.11a + 802.11b/g (factory configured) Firewall Network attack detection Yes Yes DoS and DDoS protection Yes Yes TCP reassembly for fragmented packet protection Yes Yes Malformed packet protection Yes Yes Unified Threat Management/Content Security(3) IPS (Deep Inspection FW) Yes Yes Protocol anomaly detection Yes Yes Stateful protocol signatures Yes Yes Antivirus Yes Yes Signature database 100,000+ Protocols scanned POP3, SMTP, HTTP, IMAP, FTP Anti-Phishing Yes Yes Anti-Spyware Yes Yes Anti-Adware Yes Yes Anti-Keylogger Yes Yes Anti-Spam Yes Yes Integrated URL filtering Yes Yes External URL filtering(4) Yes Yes VoIP Security H.323. ALG Yes Yes SIP ALG Yes Yes SCCP ALG Yes Yes MGCP ALG Yes Yes NAT for SIP, H.323, MGCP, SCCP Yes Yes VPN Concurrent VPN tunnels 25 25 Tunnel interfaces 10 10 DES (56-bit), 3DES (168-bit) and AES encryptions Yes Yes MD-5 and SHA-1 authentication Yes Yes Manual key, IKE, PKI (X.509) Yes Yes Perfect forward secrecy (DH Groups) 1,2,5 1,2,5 Prevent replay attack Yes Yes Remote access VPN Yes Yes L2TP within IPSec Yes Yes IPSec NAT traversal Yes Yes Redundant VPN gateways Yes Yes SSG 20 SSG 5 Firewall and VPN User Authentication Built-in (internal) database - user limit Up to 100 Up to 100 3rd Party user authentication RADIUS, RSA SecurID, and LDAP XAUTH VPN authentication Yes Yes Web-based authentication Yes Yes 802.1X authentication Yes Yes Mode of Operation Layer 2 (transparent) mode(5) Yes Yes Layer 3 (route and/or NAT) mode Yes Yes Address Translation Network Address Translation (NAT) Yes Yes Port Address Translation (PAT) Yes Yes Policy-based NAT/PAT Yes Yes Mapped IP Yes Yes Virtual IP Yes Yes Routing BGP Yes Yes OSPF Yes Yes RIPv1/v2 Yes Yes Static routes Yes Yes Source-based routing Yes Yes Policy-based routing Yes Yes ECMP Yes Yes Routes 1,024 1,024 Multicast Yes Yes Reverse Forwarding Path (RFP) Yes Yes IGMP (v1, v2) Yes Yes IGMP Proxy Yes Yes PIM SM Yes Yes PIM SSM Yes Yes Mcast inside IPSec Tunnel Yes Yes Encapsulations PPP Yes Yes MLPPP Yes N/A Frame Relay Yes N/A MLFR (FRF 15, FRF 16) Yes N/A HDLC Yes N/A Traffic Management (QoS) Guaranteed bandwidth Yes Yes Maximum bandwidth Yes Yes Ingress Traffic Policing Yes Yes Priority-bandwidth utilization Yes Yes DiffServ stamp Yes, per policy Yes, per policy Wi-Fi Multi-Media (WMM) Yes (with WLAN) Yes (with WLAN) System Management WebUI (HTTP and HTTPS) Yes Yes Command Line Interface (console) Yes Yes Command Line Interface (telnet) Yes Yes Command Line Interface (SSH) Yes, v1.5 and v2.0 compatible NetScreen-Security Manager Yes Yes All management via VPN tunnel on any interface Yes Yes SNMP full custom MIB Yes Yes Rapid deployment Yes Yes Logging and Monitoring Syslog (multiple servers) External, up to 4 servers E-mail (2 addresses) Yes Yes NetIQ WebTrends External External SNMP (v2) Yes Yes Traceroute Yes Yes VPN tunnel monitor Yes Yes Juniper Networks Secure Services Gateway 5 and 20
  • 3. Datasheet Page SSG 20 SSG 5 Virtualization Maximum number of configurable security zones 8 8 Maximum number of virtual routers 3 3 Maximum number of 802.1q VLANs 10 10 High Availability (HA)(6) Active/Passive Yes Yes Configuration synchronization Yes Yes Session synchronization for firewall and VPN Yes Yes Session failover for routing change Yes Yes Device failure detection Yes Yes Link failure detection Yes Yes Authentication for new HA members Yes Yes Encryption of HA traffic Yes Yes IP Address Assignment Static Yes Yes DHCP, PPPoE client Yes Yes Internal DHCP server Yes Yes DHCP relay Yes Yes PKI Support PKI Certificate requests (PKCS 7 and PKCS 10) Yes Yes Automated certificate enrollment (SCEP) Yes Yes Online Certificate Status Protocol (OCSP) Yes Yes Certificate Authorities Supported Verisign, Entrust, Microsoft, RSA Keon, iPlanet (Netscape), Baltimore, DOD PKI Administration Local administrators database size 20 20 External administrator database RADIUS/LDAP/SecurID Root Admin, Admin, and Yes Yes Read Only user levels Software upgrades TFTP / WebUI / NSM / SCP / USB Configuration Roll-back Yes Yes External Flash Additional log storage via USB Event logs and alarms Yes Yes System config script Yes Yes ScreenOS Software Yes Yes Dimensions and Power Dimensions (W/L/H) 11 5/8” x 7 3/8” x 1 3/4” 8 3/4” x 5 5/8” x 1 5/8” 29.5cm x 18.7cm x 4.5cm 22.2cm x 14.3cm x 4.1cm Weight 3.3 lbs (1.5 kg) 2.1 lbs (0.95 kg) Rack mountable Yes Yes Power Supply (AC) 100-240 VAC 100-240 VAC Certifications Safety Certifications CSA, CB CSA, CB EMC Certifications FCC Class B, CE Class B, FCC Class B, CE Class B, A-Tick, VCCI class B A-Tick, VCCI class B Environment Temp and Humidity Operating Temp 0 to 40 Deg C 0 to 40 Deg C ( 32 to 104 Deg F) ( 32 to 104 Deg F) Non-Operating Temp -20 to 65 Deg C -20 to 65 Deg C (-4 to 149 Deg F) (-4 to 149 Deg F) Humidity 10 to 90% 10 to 90% non-condensing non-condensing MTBF (Bellcore model) Non-Wireless 35.8 Yrs 40.5 Yrs Wireless 28.9 Yrs 22.8 Yrs SSG 20 SSG 5 Wireless Radio Specifications (Wireless Models Only) Transmit Power Up to 200mW Wireless Standards supported Dual Radio 802.11 a + 802.11b/g Site Survey Yes Maximum Configured SSIDs 16 Maximum Active SSIDs 4 Atheros SuperG Yes Atheros eXtended Range (XR) Yes Wi-Fi CERTIFIED® Yes Wireless Security (Wireless Models Only) Wireless Privacy WPA, WPA2 (AES or TKIP), IPSEC VPN, WEP Wireless Authentication PSK, EAP-PEAP, EAP-TLS, EAP-TTLS over 802.1x MAC Access Controls Permit or Deny Client Isolation Yes Antenna Option (Wireless Models Only) Diversity Antenna Included Directional Antenna Future Omni-directional Antenna Future (1) Performance, capacity and features listed are based upon systems running ScreenOS 5.4 and are the measured maximums under ideal testing conditions unless otherwise noted. Actual results may vary based on ScreenOS release and by deployment. (2) IMIX stands for Internet mix and is more demanding than a single packet size as it represents a traffic mix that is more typical of a customer’s network. The IMIX traffic used is made up of 58.33% 64 byte packets + 33.33% 570 byte packets + 8.33% 1518 byte packets of UDP traffic. (3) UTM Security features (IPS/Deep Inspection, Antivirus, Anti-Spam and Web filtering) are delivered by annual subscriptions purchased separately from Juniper Networks. Annual subscriptions provide signature updates and associated support. The high memory option is required for UTM Security features. (4) Redirect Web filtering sends traffic to a secondary server and therefore entails purchasing a separate Web filtering license from either Websense or SurfControl. (5) NAT, PAT, policy based NAT, virtual IP , mapped IP , virtual systems, virtual routers, VLANs, OSPF, BGP , RIPv2, Active/Active HA, and IP address assignment are not available in layer 2 transparent mode. (6) Active Passive and HA Lite require the purchase of an Extended License. In addition to the HA features, an Extended License key increases a subset of the capacities as outlined below. Extended License Feature SSG 20 and SSG 5 Sessions Increases max from 4000 to 8000 VPN Tunnels Increases max from 25 to 40 VLANS Increases max from 10 to 50 VoIP Calls Increases max from 32 to 48 High Availability Adds support for Stateful Active/Passive and/or HA Lite IPS (Deep Inspection FW) Signature Packs Signature Packs provide the ability to tailor the attack protection to the specific deployment and/or attack type. The following Signature packs are available for the SSG 5 and SG 20. Signature Pack Target Deployment Defense Type Type of Attack Object Base Branch Offices, small medium businesses Client/Server and worm protection Range of signa- tures and protocol anomalies Client Remote/Branch Offices Perimeter defense, compliance for hosts (desktops, etc) Attacks in the server- to-client direction Server Small/Medium Businesses Perimeter defense, compliance for server infrastructure Attacks in the client- to-server direction Worm Mitigation Remote/Branch Offices of Large enterprises Most comprehensive defense against worm attacks Worms, Trojans, backdoor attacks
  • 4. Copyright 2006, Juniper Networks, Inc. All rights reserved. Juniper Networks and the Juniper Networks logo are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered trademarks, or registered service marks in this document are the property of Juniper Networks or their respective owners. All specifications are subject to change without notice. Juniper Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update information in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. CORPORATE HEADQUARTERS AND SALES HEADQUARTERS FOR NORTH AND SOUTH AMERICA Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA Phone: 888-JUNIPER (888-586-4737) or 408-745-2000 Fax: 408-745-2100 www.juniper.net EAST COAST OFFICE Juniper Networks, Inc. 10 Technology Park Drive Westford, MA 01886-3146 USA Phone: 978-589-5800 Fax: 978-589-0800 ASIA PACIFIC REGIONAL SALES HEADQUARTERS Juniper Networks (Hong Kong) Ltd. Suite 2507-11, 25/F ICBC Tower, Citibank Plaza, 3 Garden Road, Central, Hong Kong Phone: 852-2332-3636 Fax: 852-2574-7803 EUROPE, MIDDLE EAST, AFRICA REGIONAL SALES HEADQUARTERS Juniper Networks (UK) Limited Building 1 Aviator Park, Station Road Addlestone Surrey, KT15 2PG, U. K. Phone: 44(0)-1372-385500 Fax: 44(0)-1372-385501 Page 100176-002 Oct 2006 Ordering Information Product Part Number SSG 5 SSG 5 with Serial backup, 128 MB Memory SSG-5-SB SSG 5 with ISDN BRI S/T backup, Interface,128 MB Memory SSG-5-SB-BT SSG 5 with v.92 backup, 128 MB Memory SSG-5-SB-M SSG 5 with Serial backup, Wireless 802.11a/b/g,128 MB Memory SSG-5-SB-W-xx SSG 5 with ISDN BRI S/T backup, Wireless 802.11a/b/g, 128 MB memory SSG-5-SB-BTW-xx SSG 5 with v.92 backup, Wireless 802.11a/b/g, 128 MB Memory SSG-5-SB-MW-xx SSG 5 with Serial backup, 256 MB memory SSG-5-SH SSG 5 with ISDN BRI S/T backup, 256 MB memory SSG-5-SH-BT SSG 5 with v.92 backup, 256 MB memory SSG-5-SH-M SSG 5 with Serial backup, Wireless 802.11a/b/g, 256 MB memory SSG-5-SH-W-xx SSG 5 with ISDN BRI S/T backup, Wireless 802.11a/b/g, 256 MB memory SSG-5-SH-BTW-xx SSG 5 with v.92 backup, Wireless 802.11a/b/g, 256 MB memory SSG-5-SH-MW-xx SSG 20 SSG 20 with 2 port Mini-PIM slots, 128 MB Memory SSG-20-SB SSG 20 with 2 port Mini-PIM slots, Wireless 802.11a/b/g, 128 MB Memory SSG-20-SB-W-xx SSG 20 with 2 port Mini-PIM slots, 256 MB memory SSG-20-SH SSG 20 with 2 port Mini-PIM slots, Wireless 802.11a/b/g, 256 MB memory SSG-20-SH-W-xx SSG 20 I/O Options 1 port T1 Mini Physical Interface Module JXM-1T1-S 1 port E1 Mini Physical Interface Module JXM-1E1-S 1 port ADSL2+ Annex A Mini Physical Interface Module JXM-1ADSL2-A-S 1 port ADSL2+ Annex B Mini Physical Interface Module JXM-1ADSL2-B-S 1 port v.92 Mini Physical Interface Module JXM-1V92-S 1 port ISDN S/T BRI Mini Physical Interface Module JXM-1BRI-ST-S Product Part Number SSG 5 / SSG 20 Accessories Upgrades Extended License Upgrade Key for SSG 5 SSG-5-ELU Extended License Upgrade Key for SSG 20 SSG-20-ELU SSG 5 and SSG 20 256MB Memory Upgrade Module SSG-5-20-MEM-256 SSG 5 Rack Mount Kit - holds 2 units SSG-5-RMK SSG 20 Rack Mount Kit SSG-20-RMK SSG Wireless Replacement Antenna SSG-ANT Unified Threat Management/Content Security (High Memory Option Required) Anti-Virus (Anti-Spyware, Anti-Phishing) NS-K-AVS-SSG5 NS-K-AVS-SSG20 IPS (Deep Inspection) NS-DI-ISG-SSG5 NS-DI-ISG-SSG20 Web Filtering NS-WF-SSG5 NS-WF-SSG20 Anti-Spam NS-SPAM-SSG5 NS-SPAM-SSG20 Remote Office Bundle (Includes AV, DI, WF) NS-RBO-CS-SSG5 NS-RBO-CS-SSG20 Main Office Bundle (Includes AV, DI, WF, AS) NS-SMB-CS-SSG5 NS-SMB-CS-SSG20 • Note: The appropriate power cord is included based upon the sales order “Ship To” destination. • Note: XX denotes Region Code for Wireless devices. Not all countries are supported. Please see Wireless Country Compliance Matrix for certified countries. www.jnpr.net/products/integrated/ssg_5_20.html • Note: For 2nd year renewal of Content Security Subscriptions add “-R” to above SKUs.