I have this same exact problem.
In looking at the logs it seems that the Junos Pulse Client does not have the proper Entitlement priviledges that are required in Mountain Lion...
Interesting. I'm curious if the certificate that is used to sign the applets is related to the ports that you are presenting your signed SSL certs on. I'm assuming that you are using a real (public) SSL cert on the site that users connect to. Here's what I'm getting at. Are you still presenting the default, self-signed certificate that the SA creates during setup on your outside interface? Under the 6.x IVE, it would create a "secure.companyname.com" self-signed cert.
We have host checker disabled, but on two systems we are experiencing the issue. On two other systems we are not having the issue. All systems involved were upgraded from Lion. Nothing we can find distinguishes the affected systems.
We are also facing the same Pulse uninstall issue on our current OSX Mountain Lion ... Digital Marketing people in our company is using only Apple solutions and OSX Mountain Lion has been deployed on their platform ... they are not anymore able to gain VPN SSL access in our telecom infrastructure ... is there any news from Juniper to solve this major issue ? We have open in parrallel a case with Juniper ... let's see ...
With the Junos install package still needing an adjustment to prevent it from uninstalling on Mountain Lion after a reboot, we have found a way to fix it locally.
The uninstall is caused by a script being executed at startup. It is located in /Library/LaunchDaemons. It is called "net.juniper.UninstallPulse.plist"
Just delete it and the problem is gone.
Would be good if Juniper can confirm this is a proper workaround, while we are all waiting for a new release....
We are working on getting an update out by the end of the month, possibly next week if all goes well. As a Mac user myself, I'm right there with the rest of you and not really satisfied having to go back to Network Connect.
Kevin Peterson, CISSP
Sr. Product Manager
Upgraded our SA2500 to 7.2 R2 from 7.1 and can't get past host checker on my 10.8 Mac.
I'm seeing this in syslog:
<Notice>: killed JuniperSetupClientInstaller.osx[pid 11055] because its use of the version entitlement is not allowed
I guess there are still no workarounds other than disabling host checker?
Can the IVE safely be rolled back to the latest 7.1 code?
When is a fix planned please?