The Juniper Networks SSG300 line of secure services gateways comprises high-performance security platforms that help businesses stop internal & external attacks, prevent unauthorized access, & achieve regulatory compliance. The Juniper Networks SSG350M Secure Services Gateway provides 500 Mbps of stateful firewall performance & 225 Mbps of IPsec VPN performance, while the Juniper Networks SSG320M Secure Services Gateway provides 400 Mbps of stateful firewall performance & 175 Mbps of IPsec VPN performance. Security: Protection against worms, viruses, trojans, spam, & emerging malware is delivered by proven Unifi ed Threat Management (UTM) security features that are backed by best-in-class partners. To address internal security requirements & facilitate regulatory compliance, the SSG300 line supports an advanced set of network protection features such as security zones, virtual routers, & VLANs that allow administrators to divide the network into distinct, secure domains, each with their own unique security policy. Policies protecting each security zone can include access control rules & inspection by any of the supported UTM security features. Connectivity & Routing: The SSG300 line provides four onboard 10/100/1000 interfaces complemented by I/O expansion slots that can house a mix of LAN or WAN interfaces, making the SSG300 line an extremely flexible platform. The broad array of I/O options coupled with WAN protocol & encapsulation support makes the SSG300 line of gateways easily deployable as traditional branch office routers or as consolidated security & routing devices, which can help reduce Cap Ex & Op Ex. Access Control Enforcement: The SSG300 line of gateways can act as enforcement points in a Juniper Networks Unified Access Control deployment with the simple addition of the Juniper Networks IC Series UAC Appliances. The IC Series functions as a central policy management engine by interacting with the SSG300 line to augment or replace the firewall-based access control. It grants/denies access based on more granular criteria, including endpoint state & user identity in order to accommodate the dramatic shifts in attack landscape & user characteristics.