Pulse Connect Secure 8.0 R13 (formerly Juniper Networks, Inc. Junos Pulse Secure Access Service 8.0)

Product type: Network and Network Related Devices and Systems
Product Status: Completed
Assurance Level: Protection Profile

Version: 8.0R13
Components: Software: Junos Pulse Secure Access Service 8.0 R13; SM160 (No Cavium) SM360 MAG2600 (fixed configuration chassis and blade) MAG4610 (fixed configuration chassis and blade) Note: SM160 and SM360 are blades that can be run in MAG6610 and MAG6611 chassis Virtual Appliance: IBM Blade Center 2950 blade server with 4 CPU Cores, 4G memory and 20G disk space Virtual Appliance Software: VMware vSphere 5.1, 5.0, and 4.1

Product Details

Product Description

Certification Country: AUSTRALIA/NEW ZEALAND (2016)
Certificate Details: 2016/97
Certification Method: CC
Crypt Evaluation: Not Started

PP Compliance: Security Requirements for Network Devices, Version 1.1, 08 June 2012 (NDPP) Security Requirements for Network Devices Errata #3, 3 November 2014

Evaluation Facility: BAE Systems Applied Intelligence
Manufacturer/Vendor/Distributor: Pulse Secure, LLC

Pulse Secure, LLC

2700 Zanker Road, Suite 200
San Jose California CA 95134 United States
Website: http://www.pulsesecure.net
Product Website: http://www.pulsesecure.net


Pulse Secure LLC
Yvonne Sang
2700 Zanker road, Suite 200
San Jose California CA 95134 US
Phone: +1 408 372 9600
Email: [email protected]


Security Target
Certification Report

The Pulse Connect Secure acts as a secure application-layer gateway that intermediates all requests between remote computers and internal corporate resources. All requests from remote computers to a Secure Access appliance and from a Secure Access appliance to remote computers are encrypted using TLS/HTTPS encryption. All unencrypted requests (e.g. HTTP) are redirected to HTTPS, which ensures the connection is encrypted. Each request is subject to administratively defined access control and authorization policies, such as dual-factor or client-side digital certificate authentication, before the request is forwarded to an internal resource. Users gain authenticated access to authorized resources via an extranet session hosted by the appliance. From any Internet-connected Web browser, users can access Web-based enterprise applications, Java applications, file shares and terminal hosts. Secure Access generates audit records for security events. The administrator and read-only administrator are the only roles with access to the audit trail and have the ability to view the audit trail.