Datasheet

3
and application-level attack protection at the perimeter. Using
policy-based management, administrators can pick and choose
which protocols to inspect with protocol anomaly detection and/or
Stateful signatures, what types of attacks to look for and which action
to take if an attack is discovered. Attack coverage can be tailored to
specific attack protection requirements using any one of four dierent
Signature Packs
1
:
Base Signature Pack: Protects Internet-facing protocols and
services with a wide range of worm, client-to-server, and
server-to-client signatures.
Server Signature Pack: Detects and blocks external attacks
that are targeting server infrastructure
Client Signature Pack: Stops trojans, worms and other
malware with an array ofclientoriented attack objects
Worm Mitigation Signature Pack: Detects client-to-server
and server-to-client worms to deliver comprehensive worm
coverage against en masse, fast-moving worm outbreaks
Controlling Access to Known Virus Download sites
To block access to malicious Web sites, Juniper Networks has
teamed with Websense by integrating their Web filtering software
into the Juniper secure router and firewall/VPN appliances.
Using the management GUI, an administrator can assemble an
appropriate Web use policy based upon 54 different categories
encompassing over 25 million URLs (and growing every day).
Blocking Common Inbound Spam and Phishing Attacks
Juniper Networks has teamed with Sophos to leverage its market
leading real-time antispam reputation service for Juniper’s branch
and regional office platforms to help slow the flood of unwanted
email and the potential attacks they carry. Installed on the Juniper
Networks secure router or firewall/VPN gateway, the antispam
reputation service filters incoming email traffic for known spam
and phishing senders to act as a first line of defense. When email
traffic from a malicious sender arrives, it is blocked and/or flagged
so that the email server can take an appropriate action.
ANTIVIRUS SPECIFICATIONS (KASPERSKY LAB)
Protocols scanned SMTP, POP3, Webmail, FTP, IMAP, HTTP
Inbound/outbound protection Yes/Yes
New virus responsiveness On average every 30 minutes
Update frequency On average hourly
Number of virus signatures 450,000 +
Archive and Extractor Formats ACE, ARJ, Alloy, Astrum, BZIP2, BestCrypt, CAB, CABSFX, CHM, Catapult, CaveSFX, CaveSetup,
ClickTeam, ClickTeamPro, Commodore, CompiledHLP, CreateInstall, DiskDupe, DiskImage, EGDial, Eect
Oce, Embedded, Embedded Class, Embedded EXE, Embedded MS Expand, Embedded PowerPoint,
Embedded RTF, FlyStudio, GEA, GKWare Setup, GZIP, Gentee, Glue, HA, HXS, HotSoup, Inno, InstFact,
Instyler, IntroAdder, LHA, MS Expand, MSO, Momma, MultiBinder, NSIS, NeoBook, OLE files, PCAcme,
PCCrypt, PCInstall, PIMP, PLCreator, PaquetBuilder, Perl2Exe, PerlApp, Presto, ProCarry, RARv 1.4 and
above, SEA, SbookBuilder, SetupFactory, SetupSpecialist, SilverKey, SmartGlue, StarDust Installer,
Stream 1C, StubbieMan, Sydex, TSE, Tar, Thinstall, ViseMan, WinBackup, WiseSFX, ZIP, 7-Zip
WIN semi-executable extensions: pif, lnk, reg, ini (Script.Ini, etc), cla (Java Class), vbs (Visual Basic Script), vbe (Visual Basic Script
Encrypted), js (Java Script), jse (Java Script Encrypted), htm, html, htt (HTTP pages), hta - HTA (HTML
applications), asp (Active Server Pages), chm – CHM (compressed HTML), pht – PHTML, php – PHP,
wsh, wsf, the (.theme)
MS Oce extensions doc, dot, fpm, rtf, xl*, pp*, md*, shs, dwg (Acad2000), msi (MS Installer), otm (Outlook macro), pdf
(AcrobatReader), swf (ShockwaveFlash), prj (MapInfo project), jpg, jpeg, emf (Enhanced Windows
Metafile), elf
DOS executable extensions: com, exe, sys, prg, bin, bat, cmd, dpl(Borland’s Delphi files), ov*
WIN executable extensions: dll, scr, cpl, ocx, tsp, drv, vxd, fon 386
Email file extensions Eml, nws, msg, plg, mbx (Eudora database)
Help file extensions: hlp
Other file extensions: sh, pl, xml, itsf, reg, wsf, mime, rar, pk, lha, arj, ace, wmf, wma, wmv, ico, efi
1
Only one Signature Pack can be installed at any given time.
*Includes phishing, spyware, Keylogger and adware protection