Datasheet
Datasheet
Page 3
SSG 550/SSG 550M SSG 520/SSG520M
Virtualization
Maximum number of security zones 60 60
Maximum number of virtual routers 8 5
Number of VLANs supported 150 125
High Availability (HA)
Active/Active Yes No
Active/Passive Yes Yes
Redundant interfaces Yes Yes
Configuration synchronization Yes Yes
Session synchronization for firewall and VPN Yes Yes
Session failover for routing change Yes Yes
Device failure detection Yes Yes
Link failure detection Yes Yes
Authentication for new HA members Yes Yes
Encryption of HA traffic Yes Yes
IP Address Assignment
Static Yes Yes
DHCP, PPPoE client Yes Yes
Internal DHCP server Yes Yes
DHCP relay Yes Yes
PKI Support
PKI Certificate requests (PKCS 7 and PKCS 10) Yes Yes
Automated certificate enrollment (SCEP) Yes Yes
Online Certificate Status Protocol (OCSP) Yes Yes
Certificate Authorities Supported Verisign, Entrust, Microsoft, RSA Keon,
iPlanet (Netscape), Baltimore, DOD PKI
Administration
Local administrators database 20 20
External administrator database RADIUS/LDAP/SecurID
Restricted administrative networks 6 6
Root Admin, Admin, and
Read Only user levels Yes Yes
Software upgrades TFTP/WebUI/NSM
Configuration Roll-back Yes Yes
External Flash
Additional log storage USB 1.1 USB 1.1
Event logs and alarms Yes Yes
System config script Yes Yes
ScreenOS Software Yes Yes
SSG 550/SSG 550M SSG 520/SSG520M
Dimensions and Power
Dimensions (H/W/L) 3.5H/17.5W/21.5L 3.5H/17.5W/21.5L
Weight 25.0 lbs 23.0 lbs
(no interface modules + (no interface modules)
one power supply) 25.3 lbs
30.7 lbs (six interface + (six interface modules)
two power supplies)
Rack mountable Yes, 2RU Yes, 2RU
Power Supply (AC) 100-240 VAC, 420 watts 100-240 VAC, 350 watts
Power Supply (DC) -48 to -60 VDC, 420 watts -48 to -60 VDC, 420 watts
Redundant Power Supply (Hot Swappable) Yes No
Certifications
Safety Certifications UL, CUL, CSA, CB UL, CUL, CSA, CB
EMC Certifications FCC class A, CE class A, FCC class A, CE class A,
C-Tick, VCCI class A C-Tick, VCCI class A
NEBS Level 3 SSG 550/SSG 550M SSG 520M only
Environment
Operational temperature: 32° to 122° F, 32° to 122° F,
0° to 50° C 0° to 50° C
Non-operational temperature: -4° to 158° F, -4° to 158° F,
-20° to 70° C -20° to 70° C
Humidity: 10 to 90% 10 to 90%
non-condensing non-condensing
MTBF (Bellcore model) 12 years 12 years
(1) Performance, capacity and features listed are based upon systems running ScreenOS 5.4 and are the measured maximums under ideal testing conditions
unless otherwise noted. Actual results may vary based on ScreenOS release and by deployment.
(2) IMIX stands for Internet mix and is more demanding than a single packet size as it represents a trafc mix that is typical of a customer’s network. The IMIX
trafc used is made up of 58.33% 64 byte packets + 33.33% 570 byte packets + 8.33% 1518 byte packets of UDP trafc.
(3) NAT, PAT, policy based NAT, virtual IP, mapped IP, virtual systems, virtual routers, VLANs, OSPF, BGP, RIPv2, Active/Active HA, and IP address assignment are
not available in layer 2 transparent mode.
(4) UTM Security features (IPS/Deep Inspection, Antivirus, Anti-Spam and Web ltering) are delivered by annual subscriptions purchased separately from
Juniper Networks. Annual subscriptions provide signature updates and associated support. The high memory option is required for UTM Security features.
5) Redirect Web ltering sends trafc to a secondary server and therefore entails purchasing a separate Web ltering license from either Websense or
SurfControl.
IPS (Deep Inspection FW) Signature Packs
Signature Packs provide the ability to tailor the attack protection to the
specific deployment and/or attack type. The following Signature packs
are available for the SSG 500 Series.
Signature Pack Target Deployment Defense Type Type of Attack
Object
Base Branch Ofces, small
medium businesses
Client/Server and
worm protection
Range of signa-
tures and protocol
anomalies
Client Remote/Branch
Ofces
Perimeter defense,
compliance for hosts
(desktops, etc)
Attacks in the server-
to-client direction
Server Small/Medium Busi-
nesses
Perimeter defense,
compliance for server
infrastructure
Attacks in the client-
to-server direction
Worm Mitigation Remote/Branch
Ofces of Large
enterprises
Most comprehensive
defense against
worm attacks
Worms, Trojans,
backdoor attacks