We use it as a firewall at our head office and branches. We use its IDS solution at the head office too.
Principal Director of IT at Reanaud-bray
Tried configuring the IDS for more than four months, but it did not work properly
Pros and Cons
- "We use it as a firewall at our head office and branches."
- "It did not improve our safety because the IDS does not detect some attacks, but our anti-virus software did."
- "We tried configuring the IDS for more than four months, but it did not work properly."
What is our primary use case?
How has it helped my organization?
It did not improve our safety because the IDS does not detect some attacks, but our anti-virus software did.
What needs improvement?
- Correct the bugs in the current version.
- Help customers more with its configuration so they can feel safer.
We tried configuring the IDS for more than four months, but it did not work properly.
For how long have I used the solution?
Less than one year.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Senior Network Analyst with 1,001-5,000 employees
The throughput is fine but the CLI is verbose, especially when configuring
Pros and Cons
- "The CLI is verbose. You have to say a lot to do a little. I don't like that part of it. Cisco's command syntax seems to be a good bit more concise. When you're trying to get something done, you don't want to have to type a bunch."
What is our primary use case?
Our primary use case is security. The performance has been okay. It's a bit of a change from the Ciscos in terms of the configuration syntax, from the CLI perspective. We use it just as a firewall. We don't use it for routing functionality.
How has it helped my organization?
The Juniper was a later model, later technology than we had, more horsepower than we had before. The performance is better, but it could have been any firewall in its peer group. The improvement was because our old firewalls were, well, old. So the performance has been an improvement. And the IDS, perhaps, is a little better than what the older firewalls had.
What is most valuable?
I'm not sure what the most valuable features are. I'm not really that impressed with the technical support. I'm not really that impressed with the product, to be honest with you. Throughput seems to be okay.
What needs improvement?
The CLI is verbose. You have to say a lot to do a little. I don't like that part of it. Cisco's command syntax seems to be a good bit more concise. When you're trying to get something done, you don't want to have to type a bunch. I wish there was a quicker way to configure through the CLI. I know all the tricks of hitting spacebar etc. to finish the command, and the context tricks of going further in. But it just reminds me of an older operating system, like VAX/VMS. It's just very verbose.
Maybe this is where the Space Security Director product comes in, but we aren't quite using the Security Director in Space to its fullest yet.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
It seems stable. We haven't had too many failures. We have had some but, by and large, it's been pretty stable. It's not taxed, the way we're using it.
What do I think about the scalability of the solution?
The model we have is very scalable. It's a fairly large firewall.
How is customer service and technical support?
I have spoken with technical support 30 or 50 times. On a scale of one to 10, I would evaluate Juniper technical support at five. It's never resolved in one call. It's always a couple of calls. We're not being passed from one department to another, it's just that they don't seem to be answering the question you give them. It's very frustrating.
How was the initial setup?
I migrated it from an ASA to the Juniper. It was a fairly straightforward process. There are things that are required on the Juniper that weren't required on the Cisco, like the global address book. Things have to be on there before you can do a lot of net and the like.
What other advice do I have?
You need to know what your company's strategic vision is, and then map the security part of that. I don't just mean cost-related, but the strategy for profit-related future ventures. You need to know why you want a particular firewall. Don't ignore the functions and future growth and products on the horizon from each of the vendors.
What you go with has to meet your current needs but, more importantly, is the company a going concern - meaning if they're going to get better - then how do they complement your particular industry's growth? Are they going to be there to make remote access and extranets and research easier to deliver? The product has to be configurable, with lots of options should you need to subscribe to those options.
The most important criterion, for me, when selecting a vendor is that they have to rank high in industry ratings. Juniper has just not been there. I haven't seen the 2018 reports, but year after year Juniper is not only the least visionary but one of the least in terms of performance. I also don't like the fact that they spun off their VPN to Pulse Secure. I know that's a subsidiary, but I don't necessarily want to have a separate appliance for a light-duty VPN.
I would rate Juniper at seven out of 10. It's a little harder to configure from a VPN perspective, VPN Tunnels. Their tech support is the big problem for me. I don't want to be bounced around. I don't want to get half an answer when I ask a whole question. I would take an inferior product with better tech support, without question. If I have a responsive engineering team that will fix problems when they come in, with firmware releases, etc., I'd clearly take an inferior product with that better support. It's all about function.
I probably wouldn't have chosen the Juniper in this environment. We just don't need yet another knowledge base to learn. And it doesn't fold into some of our Cisco services. For example, the assets control doesn't integrate well with the Radius servers. Something like that could be downloadable ACLs, for instance.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Juniper SRX Series Firewall
September 2025

Learn what your peers think about Juniper SRX Series Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,370 professionals have used our research since 2012.
Technical Support Engineer at a tech services company with 51-200 employees
It protects the data behind our switches
Pros and Cons
- "It integrates well with Fortinet and Palo Alto."
- "It uses many applications, like antivirus blocking and web filtering."
- "The high availability of the application is good."
- "It protects the data behind our switches."
- "Juniper needs to focus more on their perimeter firewalls."
- "The GUI needs to be easier to handle."
- "I would like to see endpoint control and endpoint testing security."
What is our primary use case?
We use it as a perimeter firewall, data center firewall, and as VPN concentrators for some companies. It protects the data behind our switches. Our company provides the switches, like the EX-Series.
We are an elite partners for Juniper. We use the firewall for data protection.
How has it helped my organization?
It has a high security implementation.
What is most valuable?
It integrates well with Fortinet and Palo Alto.
It uses many applications, like antivirus blocking and web filtering. Also, defining routing on it is very easy along with netting. The high availability of the application is good. We use the IDS and IPsec VPN features.
What needs improvement?
I would like to see endpoint control and endpoint testing security.
The GUI needs to be easier to handle.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
The stability is good.
What do I think about the scalability of the solution?
The scalability is good.
How are customer service and technical support?
When we face problems, it is a firmware or software update. We call Juniper for support and they have a very good team for technical support. They help us a lot, then we will find the solution in the upgraded version of software of unit.
Which solution did I use previously and why did I switch?
I think there was a problem before I came to the company with Cisco and their firewall, so they decided to switch to Juniper.
How was the initial setup?
It is more complex than other vendors, but we have gotten used to it. So, we find it easy to implement and deploy.
What's my experience with pricing, setup cost, and licensing?
It has a low price.
Which other solutions did I evaluate?
We are also using Fortinet and have a partnership with Palo Alto. In addition, we are looking into a partnership with Citrix.
Cisco and FortiGate were on original shortlist.
What other advice do I have?
They can use the Juniper SRX as a data center firewall. Juniper needs to focus more on their perimeter firewalls.
Our most important criteria is to look for 24-hour support, prices, partnerships, and what they offer to partners. Also, we want to know if the product can function with Juniper.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.
Network Manager at a security firm with 1-10 employees
They should add a dashboard because the product is difficult to operate. It is not that expensive.
Pros and Cons
- "It helps us perform our daily jobs."
- "I would like them to add a dashboard because it's difficult to operate."
- "The product only has basic features."
What is our primary use case?
The Juniper SRX that we have is being used as a firewall. Somehow, it is performing.
The product is a normal router with basic firewall capacity. We don't have a dedicated firewall. Therefore, I don't have high expectations from Juniper.
How has it helped my organization?
It helps us perform our daily jobs.
What is most valuable?
We are using it as a normal type of firewall.
What needs improvement?
I would like them to add a dashboard because it's difficult to operate.
The product only has basic features.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
The stability is normal.
What do I think about the scalability of the solution?
The scalability is normal.
How are customer service and technical support?
I haven't used technical support, just local support.
How was the initial setup?
The initial setup was complex.
What's my experience with pricing, setup cost, and licensing?
It is not that expensive.
Which other solutions did I evaluate?
We are evaluating Palo Alto, Barracuda, and Sophos because we need a Next-Gen firewall.
What other advice do I have?
It crashed, and we could not change it for some reason. I don't want to keep Juniper within my network anymore.
Most important criteria when selecting a vendor:
- Dedicated support team
- Easy configuration.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Sr. Programmer at a tech vendor with 51-200 employees
We use the Layer 4 firewall functions: Access rules, NAT, and site-to-site IPsec VPN
Pros and Cons
- "We mostly use the Layer 4 firewall functions: Access rules, NAT, and site-to-site IPsec VPN."
- "It needs better interoperability with Cisco gear."
How has it helped my organization?
Theere has been no change to our organization. We replaced an older Cisco ASA. We intended to use some of the UTM features, but we have not yet. In some cases, it is worse. We can’t do remote access IPsec VPNs for users like we could with the Cisco ASA. Instead, we set up OpenVPN. As the Cisco ASA is the de facto standard, doing a site-to-site IPsec VPN to other companies takes more time (e.g., IKEv2 will not work connecting to Cisco gear because traffic selectors are not supported for IKEv2).
What is most valuable?
We mostly use the Layer 4 firewall functions: Access rules, NAT, and site-to-site IPsec VPN. We liked that it had additional features and was more modern than the Cisco ASA line.
What needs improvement?
It needs better interoperability with Cisco gear.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
No stability issues.
What do I think about the scalability of the solution?
No issue. We are only a 40 person company and only have 50Mbps of internet bandwidth.
How are customer service and technical support?
Technical support is good, though we have not really used support much. Juniper has a decent knowledgebase.
Which solution did I use previously and why did I switch?
Previously, we had a Cisco ASA 5510. It was old and needed to be replaced. We switched because the Cisco ASA is underpowered. If you try to do too many functions, like IDS/IPS, UTM, virus scanning, and Smart Net, support is expensive.
How was the initial setup?
The initial setup is mostly straightforward. We are converting one of our site-to-site VPNs with another company where we have overlapping subnets. This took some doing because the Cisco ASA allowed us to do policy-based NAT and could NAT the same IP subnet two different ways depending on the destination address. We needed to exclude 10 IP addresses out of a 24 subnet from the static NAT rule which was needed to deal with the overlapping subnets and ended up having to do more than 240 individual 32 NAT rules on the Juniper SRX240H2.
What about the implementation team?
Work with a consultant who has good JunOS knowledge if you have a complex setup (we host more than 20 servers for internet access used by over a 1000 users).
What's my experience with pricing, setup cost, and licensing?
Pricing is good. Most of the costs are in the UTM (IDS/IPS, virus scanning, etc.) subscription. Palo Alto was nice, but much more expensive.
Which other solutions did I evaluate?
We looked at Juniper SRX vs FortiGate and Juniper SRX vs Palo Alto, as well as the newer Cisco ASAs.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Sr. Network Engineer at Kitsap Credit Union
Lowered our operating costs by 25% over three years, mostly recovered from maintenance/support costs
Pros and Cons
- "Juniper has the "recovery safety feature", so if you perform a "commit confirmed" and the new configuration disconnects you. then there is no "confirmed" command with X mins (default = 10 mins). It automatically reverts (recovers) to the previous configuration. This is handy for when you do not want to make that trip down range just to reboot a router."
- "Using a Juniper CLI, you configure a "candidate configuration", then "commit" it to bring it live. If you do not like it or messed up something, you just "rollback" to the previous configuration. It can all be done in a matter of minutes. This is super handy once you get use to it."
- "Third-party support for Juniper is a lot less than Cisco. This is no surprise, but a definite consideration if you are expecting to use a lot of third party support. In my guesstimate, for every 100 Cisco shops, you will find one Juniper shop."
- "JTAC (Juniper Networks Technical Assistance Center) is just okay for technical assistance. However, if you are used to Cisco TAC responsiveness, you will need to adjust your expectations with Juniper Networks TAC."
What is our primary use case?
During our last network refresh, we did a wholesale forklift upgrade from Cisco to an entire Juniper network infrastructure, including Juniper SRX router/firewall/IDP, EX Series switches, and QFX Series core switches. The entire process took over two years to complete, but once it was completed, we were extremely happy with the Juniper equipment in terms of costs, performance, maintenance, and the ability to function as we needed.
How has it helped my organization?
- Once our engineers got their heads wrapped around the nuances of Juniper's CLI (took them about six months) with training (mostly free) and were able to get settled into Junos OS, we never looked back.
- SRX firewalls/IDP functions require similar technical knowledge level as Cisco ASA and are function on par with them. I recommend investing in Juniper Space if you have a significant amount of Juniper equipment to manage. We have three of the larger SRX550s, with one cluster configuration, for edge security devices (firewall/IDPs). We are very happy with them.
- Not specifically in SRX category, but the 40Gb/10Gb interfaces in the QFX gear are truly wired for speed on all available ports. The virtual EX switch chassis configuration, where up to 10 switching devices can be managed as a single network device, is a solid configuration for us. We use it in three locations and have zero issues with it.
What is most valuable?
- I am really hesitate to repeat the Juniper sales line of "One Juniper", simply because within different devices, there are differences in the CLI commands used. This has been due to functional and hardware differences. For the vast majority of the Juniper CLI commands, if you learn them for the SRX, they are the same for the EX and QFX series switches. There is little to no differences between the Junos OS versions
- The "candidate configuration" and rollback features are real life savers. They are different from what Cisco does. At a Cisco CLI, when you hit enter, the command is live. Using a Juniper CLI, you configure a "candidate configuration", then "commit" it to bring it live. If you do not like it or messed up something, you just "rollback" to the previous configuration. It can all be done in a matter of minutes. This is super handy once you get use to it.
- Juniper has the "recovery safety feature", so if you perform a "commit confirmed" and the new configuration disconnects you. then there is no "confirmed" command with X mins (default = 10 mins). It automatically reverts (recovers) to the previous configuration. This is handy for when you do not want to make that trip down range just to reboot a router.
What needs improvement?
Third-party support for Juniper is a lot less than Cisco. This is no surprise, but a definite consideration if you are expecting to use a lot of third party support. In my guesstimate, for every 100 Cisco shops, you will find one Juniper shop.
For how long have I used the solution?
Three to five years.
How is customer service and technical support?
JTAC (Juniper Networks Technical Assistance Center) is just okay for technical assistance. However, if you are used to Cisco TAC responsiveness, you will need to adjust your expectations with Juniper Networks TAC.
I could normally fix my issue with Cisco on the first or second call, speaking with the first Cisco TAC engineer (Tier 1) that I spoke with. Juniper Networks TAC is just as good, but in my experience, it takes about two to three times longer to get the same results. It is not unusual to require escalation before the issue is resolved. Juniper simply does not have the depth and number of Juniper experts as Cisco.
What was our ROI?
We were able to lower our overall operating costs over a three year period by 25%, mostly recovered from maintenance/support costs.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Engineer at icraft
Easy to scale up by attaching more CPU and memory
Pros and Cons
- "vSRX is easy to deploy to any virtual infrastructure, such as OpenStack, VMware, and even Docker (cSRX)."
- "It could improve areas which need high performance."
What is our primary use case?
Our primary use is having a virtual appliance vSRX PoC in telco. We tested integration to their Vim, function and performance.
How has it helped my organization?
vSRX's performance is best with less resources, such as CPU and memory. It is easy to scale up by attaching more CPU and memory.
What is most valuable?
vSRX is easy to deploy to any virtual infrastructure, such as OpenStack, VMware, and even Docker (cSRX). It has already been tested with virtual acceleration, such as DPDK, SR-IOV, and PCI-Passthrough.
What needs improvement?
It could improve areas which need high performance.
For how long have I used the solution?
Still implementing.
What's my experience with pricing, setup cost, and licensing?
Small enterprises or telco have variant licenses, and this licensing model should be improved.
Disclosure: My company has a business relationship with this vendor other than being a customer.
Senior Network Engineer at a tech services company with 51-200 employees
Zones make it easy to logically organize security polices
Pros and Cons
- "Security policies in combination with zones: It is very easy to organize the security polices in a logical structure."
- "CLI: Junos CLI is very easy to use, and it is also very easy to find back items in the configuration and to change them."
- "Commit: You can update the whole configuration without affecting the production. The new configuration will be loaded once the command "Commit" is submitted. You can also do a Commit confirmed to automatically roll back to the previous config after X minutes."
- "The visibility/reporting could be better. To see something, you have to export the log to a syslog and then process with another product."
How has it helped my organization?
Thanks to the well-structured and organized security policies, we decreased operations time to create/update/delete our security policies.
What is most valuable?
Security policies in combination with zones: It is very easy to organize the security polices in a logical structure.
CLI: Junos CLI is very easy to use, and it is also very easy to find back items in the configuration and to change them.
Commit: You can update the whole configuration without affecting the production. The new configuration will be loaded once the command "Commit" is submitted. You can also do a Commit confirmed to automatically roll back to the previous config after X minutes.
What needs improvement?
The visibility/reporting could be better. To see something, you have to export the log to a syslog and then process with another product.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
We have used it for years without any stability issues.
What do I think about the scalability of the solution?
We haven't encountered scalability issues.
How are customer service and technical support?
Technical support is pretty good. I would rate it eight out of 10.
Which solution did I use previously and why did I switch?
I previously used a Netscreen ISG1000 firewall. I switched because the ISG was end-of-life and Netscreen was bought by Juniper.
How was the initial setup?
Initial setup was complex because Junos is totally different than ScreenOS. But with some introductory courses and some googling it becomes much easier.
What's my experience with pricing, setup cost, and licensing?
I’m just the tech, I didn’t take part in the price negotiation. I would say about $20,000 for a SRX650 with IDP licence.
Which other solutions did I evaluate?
No, we didn't evaluate other options. This was a natural way for us to migrate from ISG to SRX.
What other advice do I have?
Be sure you know what you are looking for. The SRX650 is a perfect product for a small datacenter, not for a branch office where you need lots of visibility.
Implement your structure (zones) first, on paper, before starting to configure it.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Juniper SRX Series Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
Cisco Meraki MX
WatchGuard Firebox
Check Point Quantum Force (NGFW)
Azure Firewall
SonicWall TZ
Fortinet FortiGate-VM
SonicWall NSa
Buyer's Guide
Download our free Juniper SRX Series Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Fortinet FortiGate and Juniper SRX?
- Which solution do you prefer: Juniper SRX4200 or FortiGate 1800?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?
- Fortinet, Palo Alto or Check Point?
- If you could go back, would you change your decision to buy that firewall and why?