Juniper ISG2000 Integrated Security Gateways Firewall NS-ISG-2000
USD $200 - $3,000 /Piece
Min.Order:1 Piece
Juniper ISG2000 Integrated Security Gateways Firewall NS-ISG-2000
The ISG2000 delivers up to 4 Gbps firewall throughput, up to 2 Gbps VPN throughput, and optionally up to 2 Gbps IPS throughput.
The ISG2000 Integrated Security Gateway is a fully integrated firewall/VPN/IPS system with multi-gigabit performance, modular architecture, and rich virtualization capabilities that delivers up to 4 Gbps of firewall throughput and up to 2 Gbps of optional integrated intrusion detection and protection (IDP) throughput. The base firewall/VPN system allows for up to four I/O modules and three security modules for IDP integration.
The ISG Series Integrated Security Gateways are ideally suited for securing enterprise, carrier, and data center environments where advanced applications such as VoIP and streaming media demand secure, consistent, and scalable performance.
Security features include intrusion prevention system (IPS), antispam, Web filtering, and Internet Content Adaptation Protocol (ICAP) antivirus redirection support, and can include integrated IDP or a General Packet Radio Service (GPRS) firewall/VPN for mobile network environments.
Number of Interfaces | Up to 16 mini GBIC (SX, LX, or TX), up to 8 10/100/1000, up to 28 10/100, or up to 4 10GE |
Maximum Number of IP Addresses in Trusted Interfaces | Unrestricted |
Maximum Throughput | 4G Firewall 2G 3DES/AES VPN |
Maximum Number of Sessions | 1,000,000 |
Maximum Number of VPN Tunnels | 10,000 |
Maximum Number of Policies | 30,000 |
Maximum Number of Virtual Systems | 0 default, upgradeable to 250 |
ASIC-based Architecture delivers predictable, linear performance for all packet sizes at multi-gigabit speeds.
Hardware Component Redundancy provides multiple high availability options with route-based VPNs that offer resiliency and reliability.
Network Security derives from embedded Web filtering, antispam, IPS, ICAP antivirus, and integrated IDP.
Network Segmentation creates security zone, virtual systems, virtual LANS, and virtual routers, allowing security policies that isolate guests and regional servers or databases.
Certifications fulfill requirements for Federal Information Processing Standards (FIPS), common criteria, International Computer Security Association (ICSA), and others.