Instruction/ maintenance manual of the product 710008-001 Juniper Networks
Go to page of 18
Buyer’s Guide For Integrated Firewall and Virtual Private Network Solutions Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.
Copyright © 2004, Juniper Networks, In c. T able of Content s Introduc tion ................................................................................................................... ................ 3 Executive Summary .....................
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 3 Introduction Technology is radically changin g the way companies conduct bu siness, opening up new po ssibilities that enable efficiencies and growth on a global scale.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 4 Executive Summary Firewall/IPSec VPNs serve as the found ation upon which a st ron g security stance can be built, so the purch ase decision should be frame d in terms that support a long-ter m investment that can be leveraged a s the organization’s needs change and grow.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 5 3. Deliver a high level of fault tolerance to ensure the solution is al ways available. Being able to survive a failure and mainta in both connectivity and the security stance of the orga nization is the sign of good solution.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 6 Quick Checklist This section builds upon t he framework for evaluating firewall and VPN produ cts that was describe d in the previous section, providing a quick checklist of some of the top que stions to pose in each criteria category.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 7 3. Deliver a high level of fault tolerance to ensure the solution is al wa ys available • Does the solution support high ava.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 8 Det ailed Buyer ’ s Checklist This section provides a feature/function ality checklist for each of the criteria categorie s to help evaluators determine the true capabilities of vendor so lutions they are considering.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 9 capabilities • Ability to apply policies to restrict traffic between internal network segments Yes, Security Zones Ability t.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 10 Open source code Safenet No The number of years the solutions have been available on the market FW/VPN – June 1998 Deep Ins.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 11 Can scale from a small remote user to a large central site to eliminate weak links • Juni per Networks NetScreen-5XT, 5GT s.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 12 2. Predictable Performance Ability to process traffic of varying packet sizes to meet the performance requirements of the net.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 13 3. Fault Tolerant – High Availability, Resiliency Device, itself, provides redundancy: o Solid-state o Redundant components.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 14 Supports different VPN deployment modes: Rule-bas ed/Policy-base d Route-based Dynamic Route-based (Best Path) Yes Yes Yes Su.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 15 4. Ease of Use Multiple ways to interact with the system: o CLI o Web UI o Central Management Platform Yes Yes Yes Remote man.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 16 in logs o Identification of failures in logs o Web-based trouble shooting Yes Yes Offers roll-back option to last- known “g.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 17 5. Simple Deployment and Installation Delivered as an appliance for simple deployment Yes Delivered as software that has to b.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 18 Features for Remote Users and Offices Remote User solution including VPN, firewall, virus and application-level protection Ye.
An important point after buying a device Juniper Networks 710008-001 (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought Juniper Networks 710008-001 yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data Juniper Networks 710008-001 - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, Juniper Networks 710008-001 you will learn all the available features of the product, as well as information on its operation. The information that you get Juniper Networks 710008-001 will certainly help you make a decision on the purchase.
If you already are a holder of Juniper Networks 710008-001, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime Juniper Networks 710008-001.
However, one of the most important roles played by the user manual is to help in solving problems with Juniper Networks 710008-001. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device Juniper Networks 710008-001 along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center