We are using this solution mainly for the NPCs and the firewall of the mobile data customers. We are using it to protect the ISP of the mobile data customers: 2G, 3G, and 4G customers.
Security Governance at a comms service provider with 1,001-5,000 employees
The virtualization feature is the most valuable feature, as sometimes customers request a private connection using mobile data
Pros and Cons
- "The virtualization feature is the most valuable feature. Sometimes customers are requesting a private connection using mobile data when they are connecting to remote sites."
- "The Juniper SRX product needs to improve in terms of innovation."
What is our primary use case?
What is most valuable?
In terms of features, we are using Source NAT.
The virtualization feature: Sometimes customers are requesting a private connection using mobile data when they are connecting to remote sites.
What needs improvement?
The Juniper SRX product needs to improve in terms of innovation. E.g., Checkpoint comes with a monitoring solution embedded in its product, as well as providing good reports. Checkpoint also does analysis by tracking the logs and letting you know when you are under attack. What Juniper has today in comparison is not so good.
Juniper only has limited reports, such as memory, capacity, data, and traffic.
For how long have I used the solution?
Three to five years.
Buyer's Guide
Juniper SRX Series Firewall
June 2025

Learn what your peers think about Juniper SRX Series Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
What do I think about the stability of the solution?
Since we have deployed the product, we have had two or three minor issues.
What do I think about the scalability of the solution?
We have something like 12 million customers (mobile data customers).
How are customer service and support?
Sometimes, it is difficult to contact the Juniper support because we did not purchase the support package, as it was too expensive. We are using a local reseller instead. Sometimes, when we have had issues, it can take one to three hours for resolution, which is not good at all based on our company standard. However, once we have the right thing connected on the device, then it's very fast.
I would rate the technical support as a seven out of ten. The support is skilled, but the cost is expensive.
Which solution did I use previously and why did I switch?
We previously used Cisco ASA. The results were not good.
How was the initial setup?
The initial setup is straightforward. We had the help of the local provider. So, it was very straightforward.
Even now, when I compare the initial setup to Cisco, the implementation of Juniper SRX is very simple.
What about the implementation team?
To finish the implementation, we had the help of the local provider, Ericsson.
From the design phase up to the implementation phase, it took more than one month per site. The time to validate the design documents and change, then doing those changes, approve those changes and implementing them. Because we have two sites, it was somewhere around three months.
After the acquisition phase, we discussed the plan and the design document. We did the architecture and design document with the vendor. Before going into the implementation phase, we have to validate all our documents for the high-level and low-level designs. The operational teams are also validating these documents.
Once we have all those documents validated, we request the approval for change. We have a committee who analyzes the documentation. We analyze the work that we are planning to do and validate the changes for a specific time.
We need to look if there any impact on the customer side, do we need to present it to the customer before making the change, and what is the plan for monitoring after the change?
What's my experience with pricing, setup cost, and licensing?
The direct support with Juniper is expensive. When you stop using the solution and miss one year of payments, if you want the support back on a specific node, they ask you to pay for the year that you haven't used the node.
Which other solutions did I evaluate?
We tried to move our mobile data firewall from Juniper SRX to Cisco ASA. What we found was that Cisco did not performing well at all. We were very disappointed by the Cisco solution. With the Cisco solution, we had more memory issues with the same amount of traffic. With Juniper SRX, it just needs an upgrade to carry the traffic.
We have approved vendors in every industry. We cannot deviate and chose any vendor that we want. We can only select vendors from our approved list. The two vendors on that list for this industry include Cisco and Juniper, though recently Huawei was added.
What other advice do I have?
Make sure to have skilled local support.
We are planning to move to the bigger version of Juniper SRX later this year (SRX5800). We are also planning to move to IPv6.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.

Sr. Engineer at a comms service provider with 51-200 employees
Good Layer 3 and Layer 4 protection, but the solution is not end-to-end
Pros and Cons
- "Most of our clients use it as a traditional firewall, blocking Layer 3 and Layer 4, blocking by transport."
- "it would be more powerful if Juniper brought out a security product other than the firewall, like anti-spam, endpoint protection, etc. Customers who want to deploy security solutions are not just thinking about firewalls... Juniper should have an end-to-end solution, from the endpoint to the network level."
What is our primary use case?
Juniper SRX is solely used as a firewall gateway. We use it only for interfacing with the internet and for server farms, as a data center firewall gateway.
What is most valuable?
Most of our clients use it as a traditional firewall, blocking Layer 3 and Layer 4, blocking by transport.
What needs improvement?
We also use firewalls from FortiGate and Palo Alto and they're built with technology to make them next-generation firewalls. Juniper utilizes a router OS and includes enhancements to make it a firewall. But FortiGate and Palo Alto are full-on firewalls because they are built from scratch with features which are specific to firewalls.
Juniper needs to enhance the solution so that it is more powerful. They need to update the administrative tools to create an easier admin experience. An average administrator would find it easier to configure if they could use https rather than the command line interface to do so.
In addition, it would be more powerful if Juniper brought out a security product other than firewalls, like anti-spam, endpoint protection, etc. Customers who want to deploy security solutions are not just thinking about firewalls. They're thinking about security across their environment. If Juniper could give me a security solution, beyond the firewall, that integrates with the firewall, that would be helpful. Other products have built a security fabric. So if a customer already uses one of their solutions, like a firewall, they will be thinking about integrating with that vendor's other products. If there is more than just a firewall solution, they will use that same vendor's products throughout the security environment. A security fabric is more powerful than just blocking via network parameters.
Juniper should have an end-to-end solution, from the endpoint to the network level. It would provide a more powerful security solution to the customer. Customers are looking for a holistic security solution.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
For one to three years it's stable.
What do I think about the scalability of the solution?
If users want to scale up the firewall, they basically want the cheapest firewall that gives them powerful features. Most users choose FortiGate rather than Juniper. Technically, Juniper's scalability is good. But when customers look at the overall price, FortiGate will come out cheaper than Palo Alto or Juniper.
How are customer service and technical support?
The technical support is good. The engineers help support our customers day-to-day.
How was the initial setup?
The setup depends on the deployment, on what we have to configure. But from one firewall to another firewall, it's about the same. They're not really complex. We have experience using the command line and the user interface. If you ask me which one is easier to configure, I will answer that configuring through the user interface is easier.
The amount of time the deployment takes depends on the complexity of the solution. If the firewall is used as an L3 firewall or L4 firewall, for blocking by IP address and, it's going to be faster to deploy than deploying the firewall using Unified Threat Management. In that case, we need to carefully tune the VPN configuration.
What was our ROI?
The time for one of our customers to achieve ROI depends on the scalability of the product. It also depends on the type of organization. If it's a hospitality or government organization, it will take them more time to achieve ROI than an internet service provider, where using this product is in line with their business objectives.
What's my experience with pricing, setup cost, and licensing?
In terms of pricing, Juniper is in the middle. The most expensive firewall is Palo Alto. If a customer wants the cheapest price they should go for FortiGate. Juniper is in between these products.
Which other solutions did I evaluate?
From experience, we like to use firewalls from Palo Alto and FortiGate because the solution is easy to configure with a UI to execute the app. If we use Juniper firewalls, we don't really use the UI because it is not as easy as the command line interface for configuration.
The VPN is different between Juniper and Palo Alto. As far as I know, Juniper does packet inspection in their VPN. Functions like anti-spam and antivirus are running step-by-step. Once the anti-spam processing is done, it goes on to antivirus scanning. But with Palo Alto, the technology is different. It copies each packet to each function. For example, if we activate anti-spam, antivirus, and another check, Palo Alto makes three copies of each packet and inspects them in parallel. This makes the system faster, compared to Juniper. This is the biggest difference as far as I know.
What other advice do I have?
Juniper is good at the routing protocol. If you want a solution to protect your environment from the internet, I would propose a firewall gateway solution but ultimately it depends on what the customer needs.
We are partnered with Juniper, so if customers ask for a firewall solution, the first solution that we pick is generally a Juniper firewall. If a customer wants a firewall other than Juniper, we offer it. Usually, we will do a firewall like FortiGate or Palo Alto, if the customer has enough money, as Palo Alto is very expensive.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
Buyer's Guide
Juniper SRX Series Firewall
June 2025

Learn what your peers think about Juniper SRX Series Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
Consumer Engineer at a comms service provider with 1,001-5,000 employees
It protects from distributed denial-of-service attacks with Screen Options
Pros and Cons
- "It protects from distributed denial-of-service attacks with Screen Options."
- "The GUI needs to be easier and more helpful for users who don't have security experience."
What is our primary use case?
The primary use case is for protecting enterprise systems.
How has it helped my organization?
It allows users connecting from homes, who urgently need to log into the networks through a secure tunnel without using internet IP gateway, access using a SSL.
What is most valuable?
- It is highly scalable, stable, and can be easily updated.
- It protects from distributed denial-of-service attacks, DDoS attacks, with Screen Options.
- When you design your networks, you can put SSL Inspection as a gateway to make the systems secured, like IT systems.
What needs improvement?
The GUI needs to be easier and more helpful for users who don't have security experience.
They need to add WAF management to the tool, as competitors already have it as part of their offerings. This feature is future of protecting enterprise solutions.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
It is very stable, but it needs an engineer on the system while it is running to monitor for attacks and when attacks are in process.
What do I think about the scalability of the solution?
It is easy to expand.
How are customer service and technical support?
The technical support is good, but there is a time delay between the support and attacks.
How was the initial setup?
The initial setup was straightforward, but has since become straightforward with experience.
For example, with MX (not SRX), it needs to be specific when you export or import the subnetting or addresses that you want to block or filter out of your networks. This is why it is a complex process the first time and becomes subsequently easier
What other advice do I have?
You have to be aware of Linux commands, which will make you able to use this device, like exporting file, saving file, monitoring your logs, and making a new script.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
GCD Network Architecture Manager at Technicolor
It provides stability for our complex network
What is our primary use case?
Firewall for a lab environment.
How has it helped my organization?
Before, we were handling everything with a Vyatta server until our network became more complex.
What is most valuable?
Stability.
What needs improvement?
The device could be more user-friendly.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Chief Executive Officer with 51-200 employees
It is a good solution for firewall protection. It needs to be updated for "Next-Generation" needs.
Pros and Cons
- "From a protection perspective, it provides a network perimeter security function for our company."
- "This solution needs to update for "Next Generation" needs."
What is our primary use case?
It is a basic firewall that we have been using for six years. It is a good solution.
What is most valuable?
The most valuable feature is the brand itself. From a protection perspective, it provides a network perimeter security function for our company.
What needs improvement?
We are finding that the UTM features which is required (like an antivirus or URL filtering) are not available. We are now looking for the "Next Generation" of firewall protection. We need to be less vulnerable to attacks.
In addition, we would really like to see an automated policy feature added.
For how long have I used the solution?
More than five years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Principal Director of IT at Reanaud-bray
Tried configuring the IDS for more than four months, but it did not work properly
Pros and Cons
- "We use it as a firewall at our head office and branches."
- "It did not improve our safety because the IDS does not detect some attacks, but our anti-virus software did."
- "We tried configuring the IDS for more than four months, but it did not work properly."
What is our primary use case?
We use it as a firewall at our head office and branches. We use its IDS solution at the head office too.
How has it helped my organization?
It did not improve our safety because the IDS does not detect some attacks, but our anti-virus software did.
What needs improvement?
- Correct the bugs in the current version.
- Help customers more with its configuration so they can feel safer.
We tried configuring the IDS for more than four months, but it did not work properly.
For how long have I used the solution?
Less than one year.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Network Analyst with 1,001-5,000 employees
The throughput is fine but the CLI is verbose, especially when configuring
Pros and Cons
- "The CLI is verbose. You have to say a lot to do a little. I don't like that part of it. Cisco's command syntax seems to be a good bit more concise. When you're trying to get something done, you don't want to have to type a bunch."
What is our primary use case?
Our primary use case is security. The performance has been okay. It's a bit of a change from the Ciscos in terms of the configuration syntax, from the CLI perspective. We use it just as a firewall. We don't use it for routing functionality.
How has it helped my organization?
The Juniper was a later model, later technology than we had, more horsepower than we had before. The performance is better, but it could have been any firewall in its peer group. The improvement was because our old firewalls were, well, old. So the performance has been an improvement. And the IDS, perhaps, is a little better than what the older firewalls had.
What is most valuable?
I'm not sure what the most valuable features are. I'm not really that impressed with the technical support. I'm not really that impressed with the product, to be honest with you. Throughput seems to be okay.
What needs improvement?
The CLI is verbose. You have to say a lot to do a little. I don't like that part of it. Cisco's command syntax seems to be a good bit more concise. When you're trying to get something done, you don't want to have to type a bunch. I wish there was a quicker way to configure through the CLI. I know all the tricks of hitting spacebar etc. to finish the command, and the context tricks of going further in. But it just reminds me of an older operating system, like VAX/VMS. It's just very verbose.
Maybe this is where the Space Security Director product comes in, but we aren't quite using the Security Director in Space to its fullest yet.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
It seems stable. We haven't had too many failures. We have had some but, by and large, it's been pretty stable. It's not taxed, the way we're using it.
What do I think about the scalability of the solution?
The model we have is very scalable. It's a fairly large firewall.
How is customer service and technical support?
I have spoken with technical support 30 or 50 times. On a scale of one to 10, I would evaluate Juniper technical support at five. It's never resolved in one call. It's always a couple of calls. We're not being passed from one department to another, it's just that they don't seem to be answering the question you give them. It's very frustrating.
How was the initial setup?
I migrated it from an ASA to the Juniper. It was a fairly straightforward process. There are things that are required on the Juniper that weren't required on the Cisco, like the global address book. Things have to be on there before you can do a lot of net and the like.
What other advice do I have?
You need to know what your company's strategic vision is, and then map the security part of that. I don't just mean cost-related, but the strategy for profit-related future ventures. You need to know why you want a particular firewall. Don't ignore the functions and future growth and products on the horizon from each of the vendors.
What you go with has to meet your current needs but, more importantly, is the company a going concern - meaning if they're going to get better - then how do they complement your particular industry's growth? Are they going to be there to make remote access and extranets and research easier to deliver? The product has to be configurable, with lots of options should you need to subscribe to those options.
The most important criterion, for me, when selecting a vendor is that they have to rank high in industry ratings. Juniper has just not been there. I haven't seen the 2018 reports, but year after year Juniper is not only the least visionary but one of the least in terms of performance. I also don't like the fact that they spun off their VPN to Pulse Secure. I know that's a subsidiary, but I don't necessarily want to have a separate appliance for a light-duty VPN.
I would rate Juniper at seven out of 10. It's a little harder to configure from a VPN perspective, VPN Tunnels. Their tech support is the big problem for me. I don't want to be bounced around. I don't want to get half an answer when I ask a whole question. I would take an inferior product with better tech support, without question. If I have a responsive engineering team that will fix problems when they come in, with firmware releases, etc., I'd clearly take an inferior product with that better support. It's all about function.
I probably wouldn't have chosen the Juniper in this environment. We just don't need yet another knowledge base to learn. And it doesn't fold into some of our Cisco services. For example, the assets control doesn't integrate well with the Radius servers. Something like that could be downloadable ACLs, for instance.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Technical Support Engineer at a tech services company with 51-200 employees
It protects the data behind our switches
Pros and Cons
- "It integrates well with Fortinet and Palo Alto."
- "It uses many applications, like antivirus blocking and web filtering."
- "The high availability of the application is good."
- "It protects the data behind our switches."
- "Juniper needs to focus more on their perimeter firewalls."
- "The GUI needs to be easier to handle."
- "I would like to see endpoint control and endpoint testing security."
What is our primary use case?
We use it as a perimeter firewall, data center firewall, and as VPN concentrators for some companies. It protects the data behind our switches. Our company provides the switches, like the EX-Series.
We are an elite partners for Juniper. We use the firewall for data protection.
How has it helped my organization?
It has a high security implementation.
What is most valuable?
It integrates well with Fortinet and Palo Alto.
It uses many applications, like antivirus blocking and web filtering. Also, defining routing on it is very easy along with netting. The high availability of the application is good. We use the IDS and IPsec VPN features.
What needs improvement?
I would like to see endpoint control and endpoint testing security.
The GUI needs to be easier to handle.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
The stability is good.
What do I think about the scalability of the solution?
The scalability is good.
How are customer service and technical support?
When we face problems, it is a firmware or software update. We call Juniper for support and they have a very good team for technical support. They help us a lot, then we will find the solution in the upgraded version of software of unit.
Which solution did I use previously and why did I switch?
I think there was a problem before I came to the company with Cisco and their firewall, so they decided to switch to Juniper.
How was the initial setup?
It is more complex than other vendors, but we have gotten used to it. So, we find it easy to implement and deploy.
What's my experience with pricing, setup cost, and licensing?
It has a low price.
Which other solutions did I evaluate?
We are also using Fortinet and have a partnership with Palo Alto. In addition, we are looking into a partnership with Citrix.
Cisco and FortiGate were on original shortlist.
What other advice do I have?
They can use the Juniper SRX as a data center firewall. Juniper needs to focus more on their perimeter firewalls.
Our most important criteria is to look for 24-hour support, prices, partnerships, and what they offer to partners. Also, we want to know if the product can function with Juniper.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.

Buyer's Guide
Download our free Juniper SRX Series Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
Check Point NGFW
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Fortinet FortiGate-VM
SonicWall NSa
Buyer's Guide
Download our free Juniper SRX Series Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Fortinet FortiGate and Juniper SRX?
- Which solution do you prefer: Juniper SRX4200 or FortiGate 1800?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?
- Fortinet, Palo Alto or Check Point?
- If you could go back, would you change your decision to buy that firewall and why?