SRX5400, SRX5600, SRX5800 Firewalls Datasheet
Download DatasheetProduct Overview
The SRX Series next-generation firewalls are built for large enterprise data centers, service provider infrastructure, and public sector networks. With a modular architecture and high-performance line cards, the SRX Series firewalls are open, scalable security platforms with flexible connectivity options and service integration. The award-winning SRX Series is powered by Junos OS, the same industry-leading operating system that keeps the world’s largest data center networks available, manageable, and secure.
Product Description
The Juniper Networks® SRX5400, SRX5600, and SRX5800 are next-generation firewalls (NGFWs) that deliver industry-leading threat protection, high performance, six nines reliability and availability, scalability, and services integration. These devices are ideally suited for large enterprise, service provider, and public sector networks, including:
- Large enterprise data centers
- Cloud and hosting provider data centers
- Mobile operator environments
- Managed service providers
- Core service provider infrastructures
The SRX5400, SRX5600, and SRX5800 firewalls are an integral part of the Juniper(R) Connected Security framework, which extends security to every point of connection on the network to safeguard applications, user, and infrastructure from advanced threats. Delivering the highest level of protection against exploits, malware, and command and control (C&C) communications, these platforms feature a carrier-grade next-generation firewall and advanced security services such as application security, intrusion prevention system (IPS), and integrated threat intelligence services.
The SRX5400, SRX5600, and SRX5800 are managed by Juniper Security Director Cloud, a unified management experience that connects current deployments with their future architectural rollouts. Security Director Cloud uses a single policy framework enabling consistent security policies across any environment and expands zero trust to all parts of the network from the edge into the data center. This provides unbroken visibility, policy configuration, administration, and collective threat intelligence all in one place.
The SRX5000 line provides unrivaled scalability and performance. Each firewall scales with the addition of Services Processing Cards (SPCs) and I/O cards (IOCs), enabling a fully equipped SRX5800 to support up to 3.36 Tbps firewall throughput. The SPCs are designed to support a range of services, enabling future support of new capabilities without the need for service-specific hardware. Using SPCs on all services ensures that there are no idle resources based on specific services being used maximizing hardware utilization.
The scalability and flexibility of the SRX5000 line is supported by equally robust interfaces. The SRX5000 line employs a modular approach, where each platform can be equipped with a flexible number of IOCs that offer multiple connectivity options, including 1GbE, 10GbE, 40GbE, and 100GbE interfaces. With the IOCs sharing the same interface slot as the SPCs, the firewall can be configured as needed to support the ideal balance of processing and I/O. Hence, each deployment of the SRX5000 line can be tailored to specific network requirements.
The scalability of both SPCs and IOCs in the SRX5000 line is enabled by the custom-designed switch fabric. Supporting up to 960 Gbps of data transfer, the fabric enables the realization of maximum processing and I/O capability available in any particular configuration. This level of scalability and flexibility enables future expansion and growth of the network infrastructure, providing unrivaled investment protection.
The tight service integration on the SRX 5000 line is enabled by The Junos® operating system. The SRX Series is equipped with a robust set of services that include stateful firewall, intrusion prevention system (IPS), denial of service (DoS), application security, VPN (IPsec), Network Address Translation (NAT), Content Security, quality of service (QoS), and large-scale multitenancy. In addition to the benefit of individual services, the SRX5000 line provides a low latency solution.
Junos OS also delivers carrier-class reliability with six nines system availability, the first in the industry to achieve independent verification by Telcordia. Furthermore, the SRX Series enjoys the benefit of a single source OS, and single integrated architecture traditionally available on Juniper’s carrier-class routers and switches.
SRX5800
The SRX5800 Firewall is the market-leading security solution supporting up to 3.36 Tbps firewall throughput and latency as low as 32 microseconds for the stateful firewall. The SRX5800 also supports 638 Gbps IPS and 338 million concurrent sessions. The SRX5800 is equipped with the full range of advanced security services and is ideally suited for securing large enterprise, hosted, or colocated data centers, service provider core and cloud provider infrastructures, and mobile operator environments. The massive performance, scalability, and flexibility of the SRX5800 make it ideal for densely consolidated processing environments, and the service density makes it ideal for cloud and managed service providers.
SRX5600
The SRX5600 Firewall uses the same SPCs and IOCs as the SRX5800 and can support up to 1.44 Tbps firewall throughput, 182 million concurrent sessions, and 245 Gbps IPS. The SRX5600 is ideally suited for securing enterprise data centers as well as aggregating various security solutions. The capability to support unique security policies per zone and its ability to scale with the growth of the network infrastructure make the SRX5600 an ideal deployment for consolidation of services in large enterprise, service provider, or mobile operator environments.
SRX5400
The SRX5400 Firewall uses the same SPCs and IOCs as the SRX5800 and can support up to 960 Gbps firewall throughput, 90 million concurrent sessions, and 172 Gbps IPS. The SRX5400 is a small footprint, high-performance firewall ideally suited for securing large enterprise campuses as well as data centers, either for edge or core security deployments. The ability to support unique security policies per zone and a compelling price/performance/footprint ratio make the SRX5400 an optimal solution for edge or data center services in large enterprise, service provider, or mobile operator environments.
Service Processing Cards
As the “brains” behind the SRX5000 line, SPCs are designed to process all available services on the platform. Without the need for dedicated hardware for specific services or capabilities, there are no instances in which a piece of hardware is taxed to the limit while other hardware is sitting idle. SPCs are designed to be pooled together, allowing the SRX5000 line to expand performance and capacities with the introduction of additional SPCs, significantly reducing management overhead and complexity. The high-performance SPC3 cards are supported on the SRX5400, SRX5600, and SRX5800 Firewalls.
I/O Cards
To provide the most flexible solution, the SRX5000 line employs the same modular architecture for SPCs and IOCs. The SRX5000 line can be equipped with one or several IOCs, supporting the ideal mix of interfaces. With the flexibility to install an IOC or an SPC on any available slot, the SRX5000 line can be equipped to support the perfect blend of interfaces and processing capabilities, meeting the needs of the most demanding environments while ensuring investment protection.
The fourth generation of IOCs delivers the highest throughput of all available linecards of up to 480 Gbps and offers multiple connectivity options from 1 G, 10GbE, and 40GbE to 100GbE.
Routing Engine (RE3) and Enhanced System Control Board (SCB4)
The SRX5K-RE3-128G RE3 is the latest in the family of REs for the SRX5000 line with a multicore processor running at 2000 MHz. It delivers improved performance, scalability, and reliability with 128 GB DRAM and includes a TPM module. The SRX5K-SCB4 enables 480 Gbps throughput per SCB and can be configured with intra- and interchassis redundancy.
Features and Benefits
Networking and Security
The SRX5000 line of Firewalls has been designed to offer industry-leading threat protection with robust networking services.
Feature | Feature Description | Benefits |
Purpose-built platform | Built from the ground up on dedicated hardware designed for networking and security services. | Delivers unrivaled performance and flexibility to protect high-speed network environments. |
Scalable performance | Scalable processing based on Juniper’s Dynamic Services Architecture. | Offers a simple and cost-effective solution to leverage new services with appropriate processing. |
System and network resiliency | Carrier-class hardware design and proven OS. | Offers the reliability needed for any critical high-speed network deployments without service interruption. Utilizes a unique architectural design based on multiple processing cores and a separation of the data and control planes. |
High availability (HA) | Active/passive and active/active HA configurations use dedicated HA interfaces. | Achieves availability and resiliency necessary for critical networks. |
Interface flexibility | Flexible I/O options with modular cards based on the Dynamic Services Architecture. | Offers flexible I/O configuration and independent I/O scalability (options include 1GbE, 10GbE, 40GbE, and 100GbE) to meet the port density requirements of demanding network environments. |
Network segmentation | Security zones, virtual LANs (VLANs), and virtual routers allow administrators to deploy security policies to isolate subnetworks and use overlapping IP address ranges. | Features the capability to tailor unique security and networking policies for various internal, external, and demilitarized zone (DMZ) subgroups. |
Robust Routing Engine | Dedicated RE provides physical and logical separation to data and control planes. | Enables deployment of consolidated routing and security devices, as well as ensuring the security of routing infrastructure—all via a dedicated management environment. |
Advanced threat protection | IPS, antivirus, antispam, enhanced web filtering, Juniper Advanced Threat Prevention Cloud, Encrypted Traffic Insights, Threat Intelligence Feeds, and Juniper ATP Appliance. |
|
AI-Predictive Threat Prevention | Continuous AI keeps known and zero-day threats off the network at line rate for the entire attack lifecycle. |
|
EVPN-VXLAN Type 5 routes | Embedded security across the entire EVPN-VXLAN fabric from Type 5 configuration supported across all Juniper SRX Series Firewalls. |
|
AppTrack | Detailed analysis on application volume/usage throughout the network based on bytes, packets, and sessions. | Provides the ability to track application usage to help identify high-risk applications and analyze traffic patterns for improved network management and control. |
AppQoS | Juniper’s rich QoS capabilities prioritize applications based on customers’ business and bandwidth needs. | Provides the ability to prioritize traffic as well as limit and shape bandwidth based on application information and contexts for improved application and overall network performance. |
Application signatures | Open signature library for identifying applications and nested applications with more than 3000 application signatures. | Accurately identifies applications so that the resulting information can be used for visibility, enforcement, control, and protection. |
SSL proxy (forward and reverse) | SSL encryption and decryption performed between the client and the server. | Combines with application identification to provide visibility and protection against threats embedded in SSL encrypted traffic. |
Stateful GTP and SCTP inspection | Support for General Packet Radio Service Tunneling Protocol (GTP) and Stream Control Transmission Protocol (SCTP) firewall in mobile operator networks. | Enables the SRX5000 line to provide stateful firewall capabilities for protecting key GPRS nodes within mobile operator networks. |
IOC3 | The third-generation I/O card offers very high levels of firewall throughput and low latency. The card includes two board choices: six 40GbE interfaces and 24 10GbE interfaces, or two 100GbE interfaces and four 10GbE interfaces. The IOC3 pairs well with existing SPC2/SPC3 for maximum firewall performance in any of the SRX5000 line of Firewalls. | Provides vastly superior, top-of-the-line connectivity efficiency and record-breaking high throughput I/O interfaces. Reduces the need for link aggregation to the firewall and enables very high firewall throughput of up to 2 Tbps with Express Path enabled. |
The fourth-generation I/O card is being offered in two flavors. The first delivers 40x10GbE interfaces while the second, depending on the chosen optics, delivers 48x10GbE, 12x40GbE, or 4x100GbE interfaces. | Provides the fastest throughput per slot and, in combination with Express Path, can deliver up to 480 Gbps of throughput per I/O card. | |
SPC3 card | Enables performance and scale with backwards compatibility to the SPC2 service cards. These cards support in-service software and in-service hardware upgrades. | Delivers always-on security resiliency to meet your growing network performance needs. |
AutoVPN | One-time hub configuration for site-to-site VPN for all spokes, even newly added ones. Configuration options include: routing, interfaces, Internet Key Exchange (IKE), and IPsec. | Enables IT administrative time and cost savings with easy, zero-touch deployment for IPsec VPN networks. |
Remote access/SSL VPN | Secure and flexible remote access SSL VPN with Juniper Secure Connect. | Extends secure access to corporate resources from anywhere. |
Multitenancy | Offers logical, large-scale segmentation and separation of security functions and features. | Enables separate, logical instances to be deployed with dedicated security policies, zones, and other features and functions. Removes the need to deploy several physical or virtual firewalls. |
IPS Capabilities
Juniper Networks IPS capabilities offer several unique features that assure the highest level of network security.
Feature | Feature Description | Benefits |
Stateful signature inspection | Signatures are applied only to relevant portions of the network traffic determined by the appropriate protocol context. | This minimizes false positives and offers flexible signature development. |
Protocol decodes | This feature enables highly accurate detection and helps reduce false positives. | Accuracy of signatures is improved through precise contexts of protocols. |
Signatures | There are more than 8500 signatures for identifying anomalies, attacks, spyware, and applications. | Attacks are accurately identified and attempts to exploit a known vulnerability are detected. |
Traffic normalization | Reassembly, normalization, and protocol decoding are provided. | Overcome attempts to bypass other IPS detections by using obfuscation methods. |
Zero-day protection | Protocol anomaly detection and same-day coverage for newly found vulnerabilities are provided. | Your network is already protected against any new exploits. |
Recommended policy | Group of attack signatures are identified by Juniper Networks Security Team as critical for the typical enterprise to protect against. | Installation and maintenance are simplified while ensuring the highest network security. |
Active/active traffic monitoring | IPS monitoring on active/active SRX5000 line chassis clusters is provided. | Support for active/active IPS monitoring, including advanced features such as in-service software upgrade. |
Packet capture | IPS policy supports packet capture logging per rule. | Ability to conduct further analysis of surrounding traffic and determine further steps to protect target. |
Content Security Capabilities
The Content Security services offered on the SRX5000 line of Firewalls include industry-leading antivirus, antispam, content filtering, and additional content security services.
Feature | Feature Description | Benefits |
Antivirus | Antivirus includes reputation enhanced, cloud-based antivirus capabilities that detect and block spyware, adware, viruses, keyloggers, and other malware over POP3 HTTP, SMTP, IMAP, and FTP protocols. This service is provided in cooperation with Sophos Labs, a dedicated security company. | Sophisticated protection from respected antivirus experts against malware attacks that can lead to data breaches and lost productivity. |
Antispam | Multilayered spam protection, up-to-date phishing URL detection, standards-based S/MIME, Open PGP and TLS encryption, MIME type, and extension blockers are provided in cooperation with Sophos Labs, a dedicated security company. | Protection against advanced persistent threats perpetrated through social networking attacks and the latest phishing scams with sophisticated e-mail filtering and content blockers. |
Enhanced Web filtering | Enhanced Web filtering includes extensive category granulation (95+ categories) and a real-time threat score delivered with Forcepoint, an expert Web security provider. | Protection against lost productivity and the impact of malicious URLs as well as helping to maintain network bandwidth for business essential traffic. |
Content filtering | Effective content filtering is based on MIME type, file extension, and protocol commands. | Protection against lost productivity and the impact of extraneous or malicious content on the network to help maintain bandwidth for business essential traffic. |
Advanced Threat Prevention
Advanced threat prevention (ATP) solutions that defend against sophisticated malware, persistent threats, and ransomware are available for the SRX5000 line. Two versions are available: Juniper ATP Cloud, a SaaS-based service, and the Juniper ATP Appliance, an on-premises solution.
Feature | Feature Description | Benefits |
Advanced malware detection and remediation | Malware analysis and sandboxing are based on machine learning and behavioral analysis. | Protects enterprise users from a spectrum of malicious attacks, including advanced malware that exploits “zero-day” vulnerabilities. |
Comprehensive threat feeds (C2, GeoIP, custom) | Curated, actionable threat intelligence feeds are delivered in near real time to SRX Series devices. | Proactively blocks malware communication channels and protects from botnets, phishing, and other attacks. |
Encrypted Traffic Insights | SRX Series firewalls collect relevant TLS/SSL connection data, including certificates used, cipher suites negotiated, and connection behavior. This information is processed by Juniper ATP Cloud, which uses network behavioral analysis and machine learning to determine whether the connection is benign or malicious. Policies configured on SRX Series firewalls can be used to block encrypted traffic identified as malicious. | Restores visibility that was lost due to encryption without the heavy burden of full TLS/SSL decryption. |
HTTP, HTTPs, e-mail | Web- and e-mail-based threats are analyzed, including encrypted sessions. | Protects users from all major threat vectors, including e-mail. Provides flexible message handling options for e-mail. The Juniper ATP Appliance includes support for cloud-based e-mail services such as Office 365 and Google Mail, and detects threats in SMB traffic. |
Integration with Security Director and JSA | Juniper Secure Analytics (JSA ) security information and event management (SIEM) can consume and correlate threat events. Juniper ATP Cloud is also fully integrated with Security Director Cloud for provisioning and monitoring. | Delivers a simplified policy application and monitoring experience with unified management from Security Director Cloud and JSA integration. |
More information about Juniper Advanced Threat Prevention products can be found at https://www.juniper.net/us/en/products/security/advanced-threat-prevention.html.
Centralized Management
Juniper, Security Director Cloud is the central manager for all SRX Series Firewalls. It provides security policy management for all physical, virtual, and containerized firewalls through an innovative, intuitive, and centralized web-based interface that offers enforcement across emerging and traditional threat vectors. It provides detailed visibility into application performance, reduces risk while enabling users to diagnose, and it resolves problems quickly. More information about Juniper Security Director Cloud can be found at https://www.juniper.net/us/en/products/security/security-director-network-security-management.html.
Specifications
Note: Performance, capacity, and features are measured under ideal lab testing conditions. Actual results may vary based on Junos OS release and by deployment.
SRX5400 | SRX5600 | SRX5800 | |
Maximum Performance and Capacity1 | |||
Junos OS version tested | Junos OS 21.2 | Junos OS 21.2 | Junos OS 21.2 |
Firewall Performance, IMIX | 960 Gbps | 1.44 Tbps | 3.36 Tbps |
Maximum performance per chassis | 960 Gbps | 1440 Tbps | 3.36 Tbps |
Next-Generation Datacenter Firewall Performance2 | 136 Gbps | 194 Gbps | 504 Gbps |
Secure Web Access Firewall Performance3 | 75 Gbps | 107 Gbps | 277 Gbps |
Latency (stateful firewall) | ~11µsec | ~11µsec | ~11µsec |
IPsec VPN AES-256-GCM (IMIX) | 188 Gbps | 269 Gbps | 699 Gbps |
Maximum IPS performance | 172 Gbps | 245 Gbps | 638 Gbps |
Maximum concurrent sessions | 91 Million | 182 Million | 338 Million |
New sessions/second (sustained, tcp, 3way, firewall NAT) | 1.7/1 Million | 3.4/2 Million | 6.3/4 Million |
Maximum users supported | Unrestricted | Unrestricted | Unrestricted |
Network Connectivity | |||
IOC4 options (SRX5K-IOC4-MRAT; SRX5K-IOC4-10G) | 40x1GbE SFP+ and 40x10GbE SFP+ or 12xQSFP+/QSFP28 multirate | ||
IOC3 options (SRX5K-MPC3-100G10G; SRX5K-MPC3-40G10G) | 2x100GbE CFP2 and 4x10GbE SFP+ or 6x40GbE QSFP+ and 24x10GbE SFP+ | ||
Firewall | |||
Network attack detection | Yes | Yes | Yes |
DoS and distributed denial of service (DDoS) protection | Yes | Yes | Yes |
TCP reassembly for fragmented packet protection | Yes | Yes | Yes |
Brute force attack mitigation | Yes | Yes | Yes |
SYN cookie protection | Yes | Yes | Yes |
Zone-based IP spoofing | Yes | Yes | Yes |
Malformed packet protection | Yes | Yes | Yes |
IPsec VPN | |||
Site-to-site tunnels | 15,000 | 15,000 | 15,000 |
Tunnel interfaces | 15,000 | 15,000 | 15,000 |
Number of remote access / SSL VPN (concurrent) users | 25,000 | 40,000 | 50,000 |
Tunnels | Site-to-Site, Hub and Spoke, Dynamic Endpoint, AutoVPN, ADVPN, Group VPN (IPv4 / IPv6 / Dual Stack) | ||
Internet Key Exchange | IKEv1, IKEv2 | ||
Configuration Payload | Yes | Yes | Yes |
IKE Authentication Algorithms | MD5, SHA1, SHA-256, SHA-384, SHA-512 | ||
IKE Encryption Algorithms | Prime, DES-CBC, 3DES-CBC, AEC-CBC, AES-GCM, SuiteB | ||
Authentication | Pre-shared key and public key infrastructure (PKI X.509) | ||
IPsec (Internet Protocol Security) | Authentication Header (AH) / Encapsulating Security Payload (ESP) protocol | ||
Perfect forward secrecy | Yes | ||
IPsec Authentication Algorithms | hmac-md5, hmac-sha-196, hmac-sha-256, hmac-sha-384, hmac-sha-512 | ||
IPsec Encryption Algorithms | Prime, DES-CBC, 3DES-CBC, AEC-CBC, AES-GCM, SuiteB | ||
Monitoring | Standard-based Dead peer detection (DPD), VPN monitoring | ||
Prevent replay attack | Yes | Yes | Yes |
VPNs (GRE, IP-in-IP, MPLS) | Yes | Yes | Yes |
Redundant VPN gateways | Yes | Yes | Yes |
Intrusion Prevention System (IPS) | |||
Signature-based and customizable (via templates) | Yes | Yes | Yes |
Active/active traffic monitoring | Yes | Yes | Yes |
Stateful protocol signatures | Yes | Yes | Yes |
Attack detection mechanisms | Stateful signatures, protocol anomaly detection (zero-day coverage), application identification | Stateful signatures, protocol anomaly detection (zero-day coverage), application identification | Stateful signatures, protocol anomaly detection (zero-day coverage), application identification |
Attack response mechanisms | Drop connection, close connection, session packet log, session summary, e-mail | Drop connection, close connection, session packet log, session summary, e-mail | Drop connection, close connection, session packet log, session summary, e-mail |
Attack notification mechanisms | Structured system logging | Structured system logging | Structured system logging |
Worm protection | Yes | Yes | Yes |
Simplified installation through recommended policies | Yes | Yes | Yes |
Trojan protection | Yes | Yes | Yes |
Spyware/adware/keylogger protection | Yes | Yes | Yes |
Advanced malware protection | Yes | Yes | Yes |
Protection against attack proliferation from infected systems | Yes | Yes | Yes |
Reconnaissance protection | Yes | Yes | Yes |
Request and response side attack protection | Yes | Yes | Yes |
Compound attacks—combines stateful signatures and protocol anomalies | Yes | Yes | Yes |
Custom attack signatures creation | Yes | Yes | Yes |
Contexts accessible for customization | 600+ | 600+ | 600+ |
Attack editing (port range, other) | Yes | Yes | Yes |
Stream signatures | Yes | Yes | Yes |
Protocol thresholds | Yes | Yes | Yes |
Stateful protocol signatures | Yes | Yes | Yes |
Frequency of updates | Daily and emergency | Daily and emergency | Daily and emergency |
Content Security | |||
Antivirus | Yes | Yes | Yes |
Content filtering | Yes | Yes | Yes |
Enhanced Web filtering | Yes | Yes | Yes |
Redirect Web filtering | Yes | Yes | Yes |
Antispam | Yes | Yes | Yes |
AppSecure | |||
AppTrack (application visibility and tracking) | Yes | Yes | Yes |
AppFirewall (policy enforcement by application name) | Yes | Yes | Yes |
AppQoS (network traffic prioritization by application name) | Yes | Yes | Yes |
User-based application policy enforcement | Yes | Yes | Yes |
GPRS Security | |||
GPRS stateful firewall | Yes | Yes | Yes |
Destination NAT with Port Address Translation (PAT) | Yes | Yes | Yes |
Destination NAT within same subnet as ingress interface IP | Yes | Yes | Yes |
Destination addresses and port numbers to one single address and a specific port number (M:1P) | Yes | Yes | Yes |
Destination addresses to one single address (M:1) | Yes | Yes | Yes |
Destination addresses to another range of addresses (M:M) | Yes | Yes | Yes |
Source Network Address Translation | |||
Static Source NAT—IP-shifting Dynamic Internet Protocol (DIP) | Yes | Yes | Yes |
Source NAT with PAT—port translated | Yes | Yes | Yes |
Source NAT without PAT—fix port | Yes | Yes | Yes |
Source NAT—IP address persistency | Yes | Yes | Yes |
Source pool grouping | Yes | Yes | Yes |
Source pool utilization alarm | Yes | Yes | Yes |
Source IP outside of the interface subnet | Yes | Yes | Yes |
Interface source NAT—interface DIP | Yes | Yes | Yes |
Oversubscribed NAT pool with fallback to PAT when the address pool is exhausted | Yes | Yes | Yes |
Symmetric NAT | Yes | Yes | Yes |
Allocate multiple ranges in NAT pool | Yes | Yes | Yes |
Proxy Address Resolution Protocol (ARP) for physical port | Yes | Yes | Yes |
Source NAT with loopback grouping—DIP with loopback grouping | Yes | Yes | Yes |
User Authentication and Access Control | |||
Built-in (internal) database | Yes | Yes | Yes |
RADIUS accounting | Yes | Yes | Yes |
Web-based authentication | Yes | Yes | Yes |
Public Key Infrastructure (PKI) Support | |||
PKI certificate requests (PKCS 7, PKCS 10, and CMPv2) | Yes | Yes | Yes |
Automated certificate enrollment (SCEP) | Yes | Yes | Yes |
Certificate authorities supported | Yes | Yes | Yes |
Self-signed certificates | Yes | Yes | Yes |
Virtualization | |||
Maximum custom routing instances with data plane separation | 2000 | 2000 | 2000 |
Maximum security zones | 2000 | 2000 | 2000 |
Maximum virtual firewalls with data plane and administrative separation (logical/tenant systems) | 500 | 500 | 500 |
Additional off-platform virtual firewall option with Juniper Networks vSRX Virtual Firewall (VM based) | Unlimited | Unlimited | Unlimited |
Maximum number of VLANs | 4096 | 4096 | 4096 |
Routing | |||
BGP instances | 1000 | 1000 | 1000 |
BGP peers | 2000 | 2000 | 2000 |
BGP routes | 1 Million | 1 Million | 1 Million |
OSPF instances | 400 | 400 | 400 |
OSPF routes | 1 Million | 1 Million | 1 Million |
RIP v1/v2 instances | 50 | 50 | 50 |
RIP v2 table size | 30,000 | 30,000 | 30,000 |
Dynamic routing | Yes | Yes | Yes |
Static routes | Yes | Yes | Yes |
Source-based routing | Yes | Yes | Yes |
Policy-based routing | Yes | Yes | Yes |
Equal cost multipath (ECMP) | Yes | Yes | Yes |
Reverse path forwarding (RPF) | Yes | Yes | Yes |
Multicast | Yes | Yes | Yes |
IPv6 | |||
Firewall/stateless filters | Yes | Yes | Yes |
Dual-stack IPv4/IPv6 firewall | Yes | Yes | Yes |
RIPng | Yes | Yes | Yes |
BFD, BGP | Yes | Yes | Yes |
ICMPv6 | Yes | Yes | Yes |
OSPFv3 | Yes | Yes | Yes |
Class of service (CoS) | Yes | Yes | Yes |
Mode of Operation | |||
Layer 2 (transparent) mode | Yes | Yes | Yes |
Layer 3 (route and/or NAT) mode | Yes | Yes | Yes |
IP Address Assignment | |||
Static | Yes | Yes | Yes |
Dynamic Host Configuration Protocol (DHCP) | Yes | Yes | Yes |
Internal DHCP server | Yes | Yes | Yes |
DHCP relay | Yes | Yes | Yes |
Traffic Management Quality of Service (QoS) | |||
Maximum bandwidth | Yes | Yes | Yes |
RFC2474 IP Diffserv in IPv4 | Yes | Yes | Yes |
Firewall filters for CoS | Yes | Yes | Yes |
Classification | Yes | Yes | Yes |
Scheduling | Yes | Yes | Yes |
Shaping | Yes | Yes | Yes |
Intelligent Drop Mechanisms (WRED) | Yes | Yes | Yes |
Three-level scheduling | Yes | Yes | Yes |
Weighted round robin for each level of scheduling | Yes | Yes | Yes |
Priority of routing protocols | Yes | Yes | Yes |
Traffic management/policing in hardware | Yes | Yes | Yes |
High Availability (HA) | |||
Active/passive, active/active | Yes | Yes | Yes |
Unified in-service software upgrade (unified ISSU) | Yes | Yes | Yes |
Configuration synchronization | Yes | Yes | Yes |
Session synchronization for firewall and IPsec VPN | Yes | Yes | Yes |
Session failover for routing change | Yes | Yes | Yes |
Device failure detection | Yes | Yes | Yes |
Link and upstream failure detection | Yes | Yes | Yes |
Dual control links | Yes | Yes | Yes |
Interface link aggregation/Link Aggregation Control Protocol (LACP) | Yes | Yes | Yes |
Redundant fabric links | Yes | Yes | Yes |
Management | |||
WebUI (HTTP and HTTPS) | Yes | Yes | Yes |
Command line interface (console, telnet, SSH) | Yes | Yes | Yes |
Juniper Security Director Cloud | Yes | Yes | Yes |
Administration | |||
Local administrator database support | Yes | Yes | Yes |
External administrator database support | Yes | Yes | Yes |
Restricted administrative networks | Yes | Yes | Yes |
Root admin, admin, and read-only user levels | Yes | Yes | Yes |
Software upgrades | Yes | Yes | Yes |
Configuration rollback | Yes | Yes | Yes |
Logging/Monitoring | |||
Structured syslog | Yes | Yes | Yes |
SNMP (v2 and v3) | Yes | Yes | Yes |
Traceroute | Yes | Yes | Yes |
Certifications | |||
Safety certifications | Yes | Yes | Yes |
Electromagnetic Compatibility (EMC) certifications | Yes | Yes | Yes |
RoHS2 Compliant (European Directive 2011/65/EU) | Yes | Yes | Yes |
NIST FIPS-140-2 Level 2 | Yes | Yes | Yes |
Common Criteria NDPP+TFFW EP + VPN EP | Yes | Yes | Yes |
USGv6 | Yes | Yes | Yes |
Dimensions and Power | |||
Dimensions (W x H x D) | 17.45 x 8.7 x 24.5 in (44.3 x 22.1 x 62.2 cm) |
17.5 x 14 x 23.8 in (44.5 x 35.6 x 60.5 cm) |
17.5 x 27.8 x 23.5 in (44.5 x 70.5 x 59.7 cm) |
Weight | Fully configured 128 lb (58.1 kg) |
Fully Configured: 180 lb (81.7 kg) |
Fully Configured: 334 lb (151.6 kg) |
Power supply (AC) | 100 to 240 VAC | 100 to 240 VAC | 200 to 240 VAC |
Power supply (DC) | -40 to -60 VDC | -40 to -60 VDC | -40 to -60 VDC |
Maximum power | 4,100 watts (AC high capacity) |
4,100 watts (AC high capacity) | 8,200 watts (AC high capacity) |
Typical Power | 1540 watts | 2440 watts | 5015 watts, 10200 Watts (AC/DC), 200-305 VAC, 200-410 VDC |
Environmental | |||
Operating temperature – long term | 41° to 104° F (5° to 40° C) | 41° to 104° F (5° to 40° C) | 41° to 104° F (5° to 40° C |
Humidity – long term | 5% to 85% noncondensing | 5% to 85% noncondensing | 5% to 85% noncondensing |
Humidity – short term | 5% to 93% noncondensing but not to exceed 0.026 kg water/kg of dry air | 5% to 93% noncondensing but not to exceed 0.026 kg water/kg of dry air | 5% to 93% noncondensing but not to exceed 0.026 kg water/kg of dry air |
1 Performance, capacity and features listed are measured under ideal testing conditions. Actual results may vary based on Junos OS releases and by deployments. |
2Next-Generation Data Center firewall performance is measured with Firewall, Application Security, and IPS enabled using 64KB transactions. |
3Secure Web Access firewall performance is measured with Firewall, Application Security, IPS, SecIntel, and URL Filtering enabled using 64KB transactions. |
Juniper Networks Services and Support
Juniper Networks is the leader in performance-enabling services that are designed to accelerate, extend, and optimize your high-performance network. Our services allow you to maximize operational efficiency while reducing costs and minimizing risk, achieving a faster time to value for your network. Juniper Networks ensures operational excellence by optimizing the network to maintain required levels of performance, reliability, and availability. For more details, please visit https://www.juniper.net/us/en/products.html.
Ordering Information
To order Juniper Networks SRX Firewalls, and to access software licensing information, please visit the How to Buy page at https://www.juniper.net/us/en/how-to-buy/form.html.
About Juniper Networks
At Juniper Networks, we are dedicated to dramatically simplifying network operations and driving superior experiences for end users. Our solutions deliver industry-leading insight, automation, security and AI to drive real business results. We believe that powering connections will bring us closer together while empowering us all to solve the world’s greatest challenges of well-being, sustainability and equality.
1000254 - 050 - EN OCTOBER 2023