Juniper Networks SSG 550 SSG-550-001 Ficha De Dados
Códigos do produto
SSG-550-001
Datasheet
Page
SSG 550/SSG 550M
SSG 520/SSG520M
Virtualization
Maximum number of security zones
60
60
Maximum number of virtual routers
8
5
Number of VLANs supported
150
125
High Availability (HA)
Active/Active
Yes
No
Active/Passive
Yes
Yes
Redundant interfaces
Yes
Yes
Configuration synchronization
Yes
Yes
Session synchronization for firewall and VPN
Yes
Yes
Session failover for routing change
Yes
Yes
Device failure detection
Yes
Yes
Link failure detection
Yes
Yes
Authentication for new HA members
Yes
Yes
Encryption of HA traffic
Yes
Yes
IP Address Assignment
Static
Yes
Yes
DHCP, PPPoE client
Yes
Yes
Internal DHCP server
Yes
Yes
DHCP relay
Yes
Yes
PKI Support
PKI Certificate requests (PKCS 7 and PKCS 10)
Yes
Yes
Automated certificate enrollment (SCEP)
Yes
Yes
Online Certificate Status Protocol (OCSP)
Yes
Yes
Certificate Authorities Supported
Verisign, Entrust, Microsoft, RSA Keon,
iPlanet (Netscape), Baltimore, DOD PKI
Administration
Local administrators database
20
20
External administrator database
RADIUS/LDAP/SecurID
Restricted administrative networks
6
6
Root Admin, Admin, and
Read Only user levels
Read Only user levels
Yes
Yes
Software upgrades
TFTP/WebUI/NSM
Configuration Roll-back
Yes
Yes
External Flash
Additional log storage
USB 1.1
USB 1.1
Event logs and alarms
Yes
Yes
System config script
Yes
Yes
ScreenOS Software
Yes
Yes
SSG 550/SSG 550M
SSG 520/SSG520M
Dimensions and Power
Dimensions (H/W/L)
3.5H/17.5W/21.5L
3.5H/17.5W/21.5L
Weight
25.0 lbs
23.0 lbs
(no interface modules +
(no interface modules)
one power supply)
25.3 lbs
30.7 lbs (six interface +
(six interface modules)
two power supplies)
Rack mountable
Yes, 2RU
Yes, 2RU
Power Supply (AC)
100-240 VAC, 420 watts
100-240 VAC, 350 watts
Power Supply (DC)
-48 to -60 VDC, 420 watts -48 to -60 VDC, 420 watts
Redundant Power Supply (Hot Swappable)
Yes
No
Certifications
Safety Certifications
UL, CUL, CSA, CB
UL, CUL, CSA, CB
EMC Certifications
FCC class A, CE class A,
FCC class A, CE class A,
C-Tick, VCCI class A
C-Tick, VCCI class A
NEBS Level 3
SSG 550/SSG 550M
SSG 520M only
Environment
Operational temperature:
32° to 122° F,
32° to 122° F,
0° to 50° C
0° to 50° C
Non-operational temperature:
-4° to 158° F,
-4° to 158° F,
-20° to 70° C
-20° to 70° C
Humidity:
10 to 90%
10 to 90%
non-condensing
non-condensing
MTBF (Bellcore model)
12 years
12 years
() Performance, capacity and features listed are based upon systems running ScreenOS 5.4 and are the measured maximums under ideal testing conditions
unless otherwise noted. Actual results may vary based on ScreenOS release and by deployment.
() IMIX stands for Internet mix and is more demanding than a single packet size as it represents a traffic mix that is typical of a customer’s network. The IMIX
traffic used is made up of 58.% 64 byte packets + .% 570 byte packets + 8.% 58 byte packets of UDP traffic.
() NAT, PAT, policy based NAT, virtual IP, mapped IP, virtual systems, virtual routers, VLANs, OSPF, BGP, RIPv, Active/Active HA, and IP address assignment are
not available in layer transparent mode.
(4) UTM Security features (IPS/Deep Inspection, Antivirus, Anti-Spam and Web filtering) are delivered by annual subscriptions purchased separately from
Juniper Networks. Annual subscriptions provide signature updates and associated support. The high memory option is required for UTM Security features.
5) Redirect Web filtering sends traffic to a secondary server and therefore entails purchasing a separate Web filtering license from either Websense or
SurfControl.
IPS (Deep Inspection FW) Signature Packs
Signature Packs provide the ability to tailor the attack protection to the
specific deployment and/or attack type. The following Signature packs
are available for the SSG 500 Series.
specific deployment and/or attack type. The following Signature packs
are available for the SSG 500 Series.
Signature Pack
Target Deployment
Defense Type
Type of Attack
Object
Object
Base
Branch Offices, small
medium businesses
medium businesses
Client/Server and
worm protection
worm protection
Range of signa-
tures and protocol
anomalies
tures and protocol
anomalies
Client
Remote/Branch
Offices
Offices
Perimeter defense,
compliance for hosts
(desktops, etc)
compliance for hosts
(desktops, etc)
Attacks in the server-
to-client direction
to-client direction
Server
Small/Medium Busi-
nesses
nesses
Perimeter defense,
compliance for server
infrastructure
compliance for server
infrastructure
Attacks in the client-
to-server direction
to-server direction
Worm Mitigation Remote/Branch
Offices of Large
enterprises
enterprises
Most comprehensive
defense against
worm attacks
defense against
worm attacks
Worms, Trojans,
backdoor attacks
backdoor attacks