Access "Wireless security review: Juniper Networks' Netscreen-5GT Wireless"
This article is part of the August 2005 issue of Betting the house on network anomaly detection systems
Juniper Networks' Netscreen-5GT Wireless Juniper Networks Price: Starts at $940 @exb Juniper Networks' Netscreen-5GT Wireless @exe Juniper Networks' NetScreen-5GT Wireless device packs a lot of security into an affordable, highly configurable package for SMBs and branch offices. Despite somewhat difficult installation/configuration and weak documentation, this device is a steal at less than $1,000. The 5GT Wireless bundles a stateful deep-packet inspection firewall, IPSec VPN and AV into a wireless access point. It supports up to four WLANs, each of which can employ different encryption and authentication methodologies. The device supports a wide range of security protocols, including WEP, WPA (both AES and TKIP) and IPSec, and an equally impressive collection of authentication methods--EAP (TLS, TTLS and PEAP), PSK, LDAP, RADIUS, RSA, SecureID and LDAP. The 5GT Wireless provides firewall protection, including NAT, through five 10/100 Mbps Ethernet ports and an ADSL port. The device can be administered through a graphical Web interface, command line, console... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
A Safe Bet?
Network anomaly detection is the newest player at the security table.
-
Boot Camp
Whip your users into shape with security awareness training.
-
Paper or PKI?
SAFE is a biopharmaceutical industry initiative to standardize credentials for drug discovery. It could save the industry billions.
-
Switching Lanes
Learn how to leverage the VLAN as a security tool.
-
Recent Releases: Security product briefs, August 2005
Learn about the security products released in August 2005.
-
Password Security
Symark Software's PowerKeeper 1.4
-
A Safe Bet?
-
-
Proving Grounds
Test labs are the ideal place to check theory against reality.
-
Hot Pick: Elemental's Elemental Compliance System 1.1
Elemental's Elemental Compliance System 1.1
-
Identity Management: Trustgenix's IdentityBridge Standard Edition
Trustgenix's IdentityBridge Standard Edition
-
Wireless security review: Juniper Networks' Netscreen-5GT Wireless
Juniper Networks' Netscreen-5GT Wireless
-
Hacking Exposed: Network Security Secrets & Solutions
Read a review of the security book Hacking Exposed: Network Security Secrets & Solutions (Fifth Edition).
-
Proving Grounds
-
Columns
-
Ping: Chrisan Herrod
Chrisan Herrod
-
Perspectives: Which security certification best meets your needs?
The pressure is on to earn security certifications to prove your worth.
-
Publisher's Note: Compliance 2.0
Learn about Compliance 2.0, which involves continuous process improvement.
-
On The Radar: NIST resources
Help from the Government
-
Ping: Chrisan Herrod
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO