JITC
JOINT INTEROPERABILITY TEST COMMAND
HOME
Notice and Consent
Legal and Regulatory
ABOUT JITC
About JITC
Our Leaders
Our History
Organization
SERVICES CATALOG
RESOURCES
Registers
IBS
IBSL Register
GEOINT
Conformance
Extensions
DES
TRE
Field Value
PKE
Application Status
ECA Status
OCSP Testing Status
External PKI Testing Status
CCEB Partner PKI Testing Status
RMA
Product Register
UHF SATCOM
IBS CIB Register
IW Register
Legacy UHF SATCOM Register
Resources
IOP Steering Group (ISG) Resource Site
Labs
Projects
Tools
Rates
REFERENCES
Policies and Governance
JITC Publications
VISITOR SUPPORT
General Information
Fort Huachuca Information
Fort Meade Information
CONTACT US
JITC
JITC Webmaster
JITC PUBLIC KEY INFRASTRUCTURE (PKI)
Home
Labs
CAC
GDS
PKE
Application Testing
External Certification Authority Testing
Online Certificate Status Protocol Responder Testing
DoD PKI Interagency/Partner Interoperability Testing
DoD PKI CCEB/Partner Interoperability Testing
PKI
Obtaining Test Certificates
Obtaining Test Common Access Cards
PKI Lab Environment
Resources
Acronyms
Frequently Asked Questions
Online Resources
Terms and Definitions
Contact Us
Points of Contact
Request for Information
PUBLIC KEY ENABLED (PKE) - APPLICATION STATUS
Updated: 7/19/2021 10:10:18 AM
Juniper Networks, Inc., Secure Access (SA) 6500, Instant Virtual Extranet (IVE), version 6.5 R2
Web Site
Juniper Networks, Inc.
Status
CERTIFIED - The certification letter is available on the JITC
Joint Interoperability Tool
web page. A JIT account must be requested to obtain access to the certification letters.
Date Certified
April 2010
Type/Supported Functions
Virtual Private Network.
Operating Systems Supported
N/A
Associated Software
Client - SSL/TLS-enabled browser, Microsoft Internet Explorer, Mozilla Firefox, Apple Safari.
Common Access Card Information
Tested - Works with DoD CACs.
Application Description
Juniper Networks, Inc.'s Secure Access (SA) 6500 is a SSL VPN access control device using the Instant Virtual Extranet (IVE) Operating System, version 6.5 R2. It provides securely encrypted, clientless remote access to a maximum of 10,000 users. Remote users are granted or denied access to internal resources based on their PKI credentials presented by their Web browser as well as user-based access control measures implemented on the device by the administrator.
Back to Application Status Page
Top of Page