Juniper Networks Junos Pulse Secure Access Service 7.2 R4

 
PROJECT ID
C040
ASSURANCE LEVEL
EAL3+ ALC_FLR.2
Security Target (ST)
 
Certification Report (CR)
 
PRODUCT NAME AND VERSION
Juniper Networks Junos Pulse Secure Access Service 7.2 R4
PRODUCT TYPE
Set of appliance and software client running on a remote IT system that provides secure remote access to internal network resources.
PRODUCT SPONSOR / DEVELOPER

Juniper Networks, Inc.

PRODUCT SPONSOR / DEVELOPER CONTACT DETAILS

Juniper Networks, Inc
1194 North Matilda Avenue,
Sunnyvale, California 94089-1206
UNITED STATES

URL:http://www.juniper.net
Email: This email address is being protected from spambots. You need JavaScript enabled to view it.
Tel: 978 589 8822

The Target of Evaluation (TOE) is Juniper Networks Junos Pulse Secure Access Service 7.2 R4 (hereafter referred as Secure Access) is the appliance and software client running on a remote IT system. The TOE provides secure remote access to internal network resources.

The TOE acts as a secure application-layer gateway that intermediates all request between remote computers and internal corporate resources. All requests from remote computers to a Secure Access appliance and from a Secure Access appliance to remote computers are encrypted using SSL/HTTPS 168-bit encryption. All unencrypted requests (e.g. HTTP) are redirected to HTTPS, which ensures the connection is encrypted. Each request is subject to administratively defined access control and authorisation policies, such as dual-factor or client-side digital certificate authentication, before the request is forwarded to an internal resource. Users gain authenticated access to authorised resources via an extranet session hosted by the appliance. From any Internet-connected Web browser, users can access Web-based enterprise applications, Java applications, file shares and terminal hosts. Secure Access generates audit records for security events. The administrator and read-only administrator are the only roles with access to the audit trail and have the ability to view the audit trail.

In the context of the evaluation, the TOE provides the following major security features:

  • Generates audit records for security events.
  • Cryptographic support for secure communications between users and the TOE and between TOE components.
  • Provides information flow security policy that limits traffic to URLs and resource types, such as file servers, to specific user roles.
  • Identification and authentication before any information flows are permitted and user must be authenticated before performing any administrative functions.
  • Security management functions for administrator to configure the TOE, manage users, information flow policy and auditing activities.
  • Protection of the TOE security function (TSF) by enforcing session timeouts.