Knowledge Center - Search

×
Login for secure content  Login Required | Search Tips
Select  at least  one Content Source:  [All | None]
Knowledge Base Technical Documentation
Technotes Security Advisories
J-Net Forums(solved items) Technical Bulletins Login Required
Include Archived Items
 
Searched for: spanning

RESULTS:

Pages: [ Next ]
ArticleSA Series (SSL VPN) JumpStation
This is a system managed answer and may be the best place to check first.
A JTAC-Certified Resolution Guide
CMS-XML[KB22845] - [SSL VPN/MAG] Does Juniper SSL VPN support dual monitors for Terminal Services?
It matches the remote desktop width and height with the local virtual desktop, spanning across multiple monitors; if necessary. It works pretty well; but with some of the following limitations:
Login Required Source: Knowledge Base
CMS-XML[KB15981] - [SSL VPN/MAG] Users experience disconnects with error 23712
or 255 from NC IP Pool, as the IP range of IP pool spans more than one subnet; for example, 192.168.1.1-192.168.6.253 The client might have obtained the 192.168.2.0 or 192.168.3.255
Login Required Source: Knowledge Base
CMS-XML[KB9936] - Troubleshooting: Step-by-Step Resolution Guides
Multicast Spanning -Tree Protocol (STP)
Login Required Source: Knowledge Base
PDFENTRUST IDENTITYGUARD 9.0 FOR JUNIPER NETWORKS sa2500 SSL VPN APPLIANCE
Entrust (NASDAQ: ENTU) secures digital identities and information for governments, enterprises and consumers in 1,700 organizations spanning 60 countries. Entrust leverages a layered security approach to address the growing risks to governments and enterprises worldwide. Our layered solutions help secure the most common digital identity and information protection pain points in an organization.
By Technology: Security Products SA Series SA 2500
http://www.juniper.net/us/en/local/pdf/solutionbriefs/3510279-en.pdf
PDFMobile Device Security in the Enterprise
They can meet this challenge by not only enabling secure, granular access to corporate resources, but also by securing the user’s mobile devices from threats. This allows for a flexible mobility policy, enabling more employee choice while at the same time not compromising security policies. The solution also enables enterprises to support a heterogeneous mobile environment spanning multiple mobile platforms, differing greatly from most current mobile security deployments which deem only one or two mobile platforms as being supported.
By Technology: Security Products SA Series SA 2500
http://www.juniper.net/us/en/local/pdf/whitepapers/2000363-en.pdf
PDFAdministration Guide
If your IF-MAP Federated network spans different administrative domains, you should configure separate Session-Export policies for each domain to prevent MAC address spoofing. Each administrative domain should have an associated DHCP server and unique Session-Export policies.
By Technology: Security Products SA Series SA 2500
http://www.juniper.net/techpubs/software/ive/admin/6.5-IVEAdminGuide.pdf
CMS-XML[kb23203] - [SSL VPN/UAC/MAG] FAQs about the new 'AD group search using LDAP ' feature
and memberOf attributes as filters, the search may span across the trusted domain or beyond the defined Base DN scope. Question
Login Required Source: Knowledge Base
PDFJuniper Networks NetScreen Secure Access Release Notes
(532891) 4. cs-nc-cdl - NC on FIPS device fails to launch when proxy is enabled. (551076) 5. cs-nc-enduser - in some instances, when there are m ultiple interfaces, NC sets its own interface's MTU incorrectly. (528745) 6. cs-nc-other - Periodic HC updates do not work in Li nux causing user session to terminate prematurely.
http://www.juniper.net/techpubs/software/ive/releasenotes/Juniper_Networks_Secure_Access_Release_Notes_65R8.pdf
PDFCustom Sign-In Pages Solution Guide
<DIV> and < SPAN > tags. In those cases, it is best to leave those tags in place. You can, however, replace much of the HTML code around those tags, as well as around Template Toolkit directives.
http://www.juniper.net/techpubs/software/ive/admin/6.5-CSPSolutionGuide.pdf
PDFSecure Access
One of the most dramatic changes you can make to the presentation style of the templates is to convert them fully to use cascading style sheets (CSS). In some templates you can already find brief examples of CSS codes, such as the use of <DIV> and < SPAN > tags. In those cases, it is best to leave those tags in place.
http://www.juniper.net/techpubs/software/ive/admin/j-sa-sslvpn-7.0-customsigninpages.pdf
PDF2010.2
NOTE: You must deploy the isg2000 or isg1000 device inline. You cannot connect a device that is in the inline tap mode to an external TAP or SPAN port on a switch.
http://www.juniper.net/techpubs/software/management/security-manager/nsm2010_2/nsm-admin-guide.pdf
PDFAdministration Guide
NOTE: You must deploy the ISG 2000 or ISG 1000 device inline. You cannot connect a device that is in inline tap mode to an external TAP or SPAN port on a switch.
http://www.juniper.net/techpubs/software/management/security-manager/nsm2008_1/nsm2008.1_admin_guide.pdf
PDFInstallation and Administration Guide for DXOS
Arguments All test arguments must be enclosed within double quotes and cannot span more than a single line.
http://www.juniper.net/techpubs/hardware/dx/52_Installation_and_Administration_Guide.pdf
PDFSA SERIES SSL VPN APPLIANCES
SA Series SSL VPN Appliances span a wide range of appliances that provide small, midsize, and large enterprises, as well as service providers, with remote access plus sophisticated partner and customer extranet features. These products enable organizations to deploy differentiated access to resources based on user roles and groups.
By Technology: Security Products SA Series SA 2500
http://www.juniper.net/us/en/local/pdf/brochures/1500023-en.pdf
PDFCampus LAN Design Guide
• Non-controller based wireless access—In this design, an 802.1Q trunk for access point to switch is required. Roaming requires spanning at least two VLANs between access layer switches.
By Technology: Security Products SA Series SA 2500
http://www.juniper.net/us/en/local/pdf/design-guides/8020001-en.pdf
PDFCampus LAN Reference Architecture
Non-controller-based wireless access In this design, an 802.1Q trunk for access point to switch is required. Roaming requires spanning at least two virtual LANs (VLANs) between access layer switches.
By Technology: Security Products SA Series SA 2500
http://www.juniper.net/us/en/local/pdf/reference-architectures/8030005-en.pdf
PDFINFRASTRUcTURE FOR ENTERPRISE DATA cENTERS
Solution Juniper offers a future proof data center infrastructure ideally suited for the ever changing demands of business and IT. This solution supports a few hundred to tens of thousands of servers connected through a fully redundant, Spanning Tree Protocol-free data center network infrastructure.
By Technology: Security Products SA Series SA 2500
http://www.juniper.net/us/en/local/pdf/solutionbriefs/3510369-en.pdf
PDFCloud-Ready Data Center Reference Architecture
In the core, Juniper simplifies the data center network and eliminates layers of cost and complexity. Using fabric technologies such as Virtual Chassis technology, Juniper helps flatten data center networks, often reducing them from three layers to two. This technology enables a simpler, spanning -tree free topology, which enables a network that is optimized to scale as the business grows.
By Technology: Security Products SA Series SA 2500
http://www.juniper.net/us/en/local/pdf/reference-architectures/8030001-en.pdf
PDFDATA CENTER INFRASTRUCTURE FOR SMALL AND MIDSIZE BUSINESSES
• Pricing attractive to SMBs Spanning -tree free environment with full network high availability • Junos OS consistency-based environment and stream processing capabilities.
By Technology: Security Products SA Series SA 2500
http://www.juniper.net/us/en/local/pdf/solutionbriefs/3510364-en.pdf
Pages: [Next ]
Redirecting...
 
Copyright© 1999-2012 Juniper Networks, Inc. All rights reserved.