Juniper Networksメーカー710008-001の使用説明書/サービス説明書
ページ先へ移動 of 18
Buyer’s Guide For Integrated Firewall and Virtual Private Network Solutions Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.
Copyright © 2004, Juniper Networks, In c. T able of Content s Introduc tion ................................................................................................................... ................ 3 Executive Summary .....................
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 3 Introduction Technology is radically changin g the way companies conduct bu siness, opening up new po ssibilities that enable efficiencies and growth on a global scale.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 4 Executive Summary Firewall/IPSec VPNs serve as the found ation upon which a st ron g security stance can be built, so the purch ase decision should be frame d in terms that support a long-ter m investment that can be leveraged a s the organization’s needs change and grow.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 5 3. Deliver a high level of fault tolerance to ensure the solution is al ways available. Being able to survive a failure and mainta in both connectivity and the security stance of the orga nization is the sign of good solution.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 6 Quick Checklist This section builds upon t he framework for evaluating firewall and VPN produ cts that was describe d in the previous section, providing a quick checklist of some of the top que stions to pose in each criteria category.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 7 3. Deliver a high level of fault tolerance to ensure the solution is al wa ys available • Does the solution support high ava.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 8 Det ailed Buyer ’ s Checklist This section provides a feature/function ality checklist for each of the criteria categorie s to help evaluators determine the true capabilities of vendor so lutions they are considering.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 9 capabilities • Ability to apply policies to restrict traffic between internal network segments Yes, Security Zones Ability t.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 10 Open source code Safenet No The number of years the solutions have been available on the market FW/VPN – June 1998 Deep Ins.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 11 Can scale from a small remote user to a large central site to eliminate weak links • Juni per Networks NetScreen-5XT, 5GT s.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 12 2. Predictable Performance Ability to process traffic of varying packet sizes to meet the performance requirements of the net.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 13 3. Fault Tolerant – High Availability, Resiliency Device, itself, provides redundancy: o Solid-state o Redundant components.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 14 Supports different VPN deployment modes: Rule-bas ed/Policy-base d Route-based Dynamic Route-based (Best Path) Yes Yes Yes Su.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 15 4. Ease of Use Multiple ways to interact with the system: o CLI o Web UI o Central Management Platform Yes Yes Yes Remote man.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 16 in logs o Identification of failures in logs o Web-based trouble shooting Yes Yes Offers roll-back option to last- known “g.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 17 5. Simple Deployment and Installation Delivered as an appliance for simple deployment Yes Delivered as software that has to b.
FW/IPSec VPN Buyer’s Guide Copyright © 2004, Juniper Networks, In c. 18 Features for Remote Users and Offices Remote User solution including VPN, firewall, virus and application-level protection Ye.
デバイスJuniper Networks 710008-001の購入後に(又は購入する前であっても)重要なポイントは、説明書をよく読むことです。その単純な理由はいくつかあります:
Juniper Networks 710008-001をまだ購入していないなら、この製品の基本情報を理解する良い機会です。まずは上にある説明書の最初のページをご覧ください。そこにはJuniper Networks 710008-001の技術情報の概要が記載されているはずです。デバイスがあなたのニーズを満たすかどうかは、ここで確認しましょう。Juniper Networks 710008-001の取扱説明書の次のページをよく読むことにより、製品の全機能やその取り扱いに関する情報を知ることができます。Juniper Networks 710008-001で得られた情報は、きっとあなたの購入の決断を手助けしてくれることでしょう。
Juniper Networks 710008-001を既にお持ちだが、まだ読んでいない場合は、上記の理由によりそれを行うべきです。そうすることにより機能を適切に使用しているか、又はJuniper Networks 710008-001の不適切な取り扱いによりその寿命を短くする危険を犯していないかどうかを知ることができます。
ですが、ユーザガイドが果たす重要な役割の一つは、Juniper Networks 710008-001に関する問題の解決を支援することです。そこにはほとんどの場合、トラブルシューティング、すなわちJuniper Networks 710008-001デバイスで最もよく起こりうる故障・不良とそれらの対処法についてのアドバイスを見つけることができるはずです。たとえ問題を解決できなかった場合でも、説明書にはカスタマー・サービスセンター又は最寄りのサービスセンターへの問い合わせ先等、次の対処法についての指示があるはずです。