| |
SRX5400 |
SRX5600 |
SRX5800 |
| Maximum Performance and Capacity1 |
| Junos OS version tested |
Junos OS 21.2 |
Junos OS 21.2 |
Junos OS 21.2 |
| Firewall Performance, IMIX |
960 Gbps |
1.44 Tbps |
3.36 Tbps |
| Maximum performance per chassis |
960 Gbps |
1440 Tbps |
3.36 Tbps |
| Next-Generation Datacenter Firewall Performance2 |
136 Gbps |
194 Gbps |
504 Gbps |
| Secure Web Access Firewall Performance3 |
75 Gbps |
107 Gbps |
277 Gbps |
| Latency (stateful firewall) |
~11µsec |
~11µsec |
~11µsec |
| IPsec VPN AES-256-GCM (IMIX) |
188 Gbps |
269 Gbps |
699 Gbps |
| Maximum IPS performance |
172 Gbps |
245 Gbps |
638 Gbps |
| Maximum concurrent sessions |
91 Million |
182 Million |
338 Million |
| New sessions/second (sustained, tcp, 3way, firewall NAT) |
1.7/1 Million |
3.4/2 Million |
6.3/4 Million |
| Maximum users supported |
Unrestricted |
Unrestricted |
Unrestricted |
| Network Connectivity |
| IOC4 options (SRX5K-IOC4-MRAT; SRX5K-IOC4-10G) |
40x1GbE SFP+ and 40x10GbE SFP+ or 12xQSFP+/QSFP28 multirate |
| IOC3 options (SRX5K-MPC3-100G10G; SRX5K-MPC3-40G10G) |
2x100GbE CFP2 and 4x10GbE SFP+ or 6x40GbE QSFP+ and 24x10GbE SFP+ |
| Firewall |
| Network attack detection |
Yes |
Yes |
Yes |
| DoS and distributed denial of service (DDoS) protection |
Yes |
Yes |
Yes |
| TCP reassembly for fragmented packet protection |
Yes |
Yes |
Yes |
| Brute force attack mitigation |
Yes |
Yes |
Yes |
| SYN cookie protection |
Yes |
Yes |
Yes |
| Zone-based IP spoofing |
Yes |
Yes |
Yes |
| Malformed packet protection |
Yes |
Yes |
Yes |
| IPsec VPN |
| Site-to-site tunnels |
15,000 |
15,000 |
15,000 |
| Tunnel interfaces |
15,000 |
15,000 |
15,000 |
| Number of remote access / SSL VPN (concurrent) users |
25,000 |
40,000 |
50,000 |
| Tunnels |
Site-to-Site, Hub and Spoke, Dynamic Endpoint, AutoVPN, ADVPN, Group VPN (IPv4 / IPv6 / Dual Stack) |
| Internet Key Exchange |
IKEv1, IKEv2 |
| Configuration Payload |
Yes |
Yes |
Yes |
| IKE Authentication Algorithms |
MD5, SHA1, SHA-256, SHA-384, SHA-512 |
| IKE Encryption Algorithms |
Prime, DES-CBC, 3DES-CBC, AEC-CBC, AES-GCM, SuiteB |
| Authentication |
Pre-shared key and public key infrastructure (PKI X.509) |
| IPsec (Internet Protocol Security) |
Authentication Header (AH) / Encapsulating Security Payload (ESP) protocol |
| Perfect forward secrecy |
Yes |
| IPsec Authentication Algorithms |
hmac-md5, hmac-sha-196, hmac-sha-256, hmac-sha-384, hmac-sha-512 |
| IPsec Encryption Algorithms |
Prime, DES-CBC, 3DES-CBC, AEC-CBC, AES-GCM, SuiteB |
| Monitoring |
Standard-based Dead peer detection (DPD), VPN monitoring |
| Prevent replay attack |
Yes |
Yes |
Yes |
| VPNs (GRE, IP-in-IP, MPLS) |
Yes |
Yes |
Yes |
| Redundant VPN gateways |
Yes |
Yes |
Yes |
| Intrusion Prevention System (IPS) |
| Signature-based and customizable (via templates) |
Yes |
Yes |
Yes |
| Active/active traffic monitoring |
Yes |
Yes |
Yes |
| Stateful protocol signatures |
Yes |
Yes |
Yes |
| Attack detection mechanisms |
Stateful signatures, protocol anomaly detection (zero-day coverage), application identification |
Stateful signatures, protocol anomaly detection (zero-day coverage), application identification |
Stateful signatures, protocol anomaly detection (zero-day coverage), application identification |
| Attack response mechanisms |
Drop connection, close connection, session packet log, session summary, e-mail |
Drop connection, close connection, session packet log, session summary, e-mail |
Drop connection, close connection, session packet log, session summary, e-mail |
| Attack notification mechanisms |
Structured system logging |
Structured system logging |
Structured system logging |
| Worm protection |
Yes |
Yes |
Yes |
| Simplified installation through recommended policies |
Yes |
Yes |
Yes |
| Trojan protection |
Yes |
Yes |
Yes |
| Spyware/adware/keylogger protection |
Yes |
Yes |
Yes |
| Advanced malware protection |
Yes |
Yes |
Yes |
| Protection against attack proliferation from infected systems |
Yes |
Yes |
Yes |
| Reconnaissance protection |
Yes |
Yes |
Yes |
| Request and response side attack protection |
Yes |
Yes |
Yes |
| Compound attacks—combines stateful signatures and protocol anomalies |
Yes |
Yes |
Yes |
| Custom attack signatures creation |
Yes |
Yes |
Yes |
| Contexts accessible for customization |
600+ |
600+ |
600+ |
| Attack editing (port range, other) |
Yes |
Yes |
Yes |
| Stream signatures |
Yes |
Yes |
Yes |
| Protocol thresholds |
Yes |
Yes |
Yes |
| Stateful protocol signatures |
Yes |
Yes |
Yes |
| Frequency of updates |
Daily and emergency |
Daily and emergency |
Daily and emergency |
| Content Security |
| Antivirus |
Yes |
Yes |
Yes |
| Content filtering |
Yes |
Yes |
Yes |
| Enhanced Web filtering |
Yes |
Yes |
Yes |
| Redirect Web filtering |
Yes |
Yes |
Yes |
| Antispam |
Yes |
Yes |
Yes |
| AppSecure |
| AppTrack (application visibility and tracking) |
Yes |
Yes |
Yes |
| AppFirewall (policy enforcement by application name) |
Yes |
Yes |
Yes |
| AppQoS (network traffic prioritization by application name) |
Yes |
Yes |
Yes |
| User-based application policy enforcement |
Yes |
Yes |
Yes |
| GPRS Security |
| GPRS stateful firewall |
Yes |
Yes |
Yes |
| Destination Network Address Translation |
| Destination NAT with Port Address Translation (PAT) |
Yes |
Yes |
Yes |
| Destination NAT within same subnet as ingress interface IP |
Yes |
Yes |
Yes |
| Destination addresses and port numbers to one single address and a specific port number (M:1P) |
Yes |
Yes |
Yes |
| Destination addresses to one single address (M:1) |
Yes |
Yes |
Yes |
| Destination addresses to another range of addresses (M:M) |
Yes |
Yes |
Yes |
| Source Network Address Translation |
| Static Source NAT—IP-shifting Dynamic Internet Protocol (DIP) |
Yes |
Yes |
Yes |
| Source NAT with PAT—port translated |
Yes |
Yes |
Yes |
| Source NAT without PAT—fix port |
Yes |
Yes |
Yes |
| Source NAT—IP address persistency |
Yes |
Yes |
Yes |
| Source pool grouping |
Yes |
Yes |
Yes |
| Source pool utilization alarm |
Yes |
Yes |
Yes |
| Source IP outside of the interface subnet |
Yes |
Yes |
Yes |
| Interface source NAT—interface DIP |
Yes |
Yes |
Yes |
| Oversubscribed NAT pool with fallback to PAT when the address pool is exhausted |
Yes |
Yes |
Yes |
| Symmetric NAT |
Yes |
Yes |
Yes |
| Allocate multiple ranges in NAT pool |
Yes |
Yes |
Yes |
| Proxy Address Resolution Protocol (ARP) for physical port |
Yes |
Yes |
Yes |
| Source NAT with loopback grouping—DIP with loopback grouping |
Yes |
Yes |
Yes |
| User Authentication and Access Control |
| Built-in (internal) database |
Yes |
Yes |
Yes |
| RADIUS accounting |
Yes |
Yes |
Yes |
| Web-based authentication |
Yes |
Yes |
Yes |
| Public Key Infrastructure (PKI) Support |
| PKI certificate requests (PKCS 7, PKCS 10, and CMPv2) |
Yes |
Yes |
Yes |
| Automated certificate enrollment (SCEP) |
Yes |
Yes |
Yes |
| Certificate authorities supported |
Yes |
Yes |
Yes |
| Self-signed certificates |
Yes |
Yes |
Yes |
| Virtualization |
| Maximum custom routing instances with data plane separation |
2000 |
2000 |
2000 |
| Maximum security zones |
2000 |
2000 |
2000 |
| Maximum virtual firewalls with data plane and administrative separation (logical/tenant systems) |
500 |
500 |
500 |
| Additional off-platform virtual firewall option with Juniper Networks vSRX Virtual Firewall (VM based) |
Unlimited |
Unlimited |
Unlimited |
| Maximum number of VLANs |
4096 |
4096 |
4096 |
| Routing |
| BGP instances |
1000 |
1000 |
1000 |
| BGP peers |
2000 |
2000 |
2000 |
| BGP routes |
1 Million |
1 Million |
1 Million |
| OSPF instances |
400 |
400 |
400 |
| OSPF routes |
1 Million |
1 Million |
1 Million |
| RIP v1/v2 instances |
50 |
50 |
50 |
| RIP v2 table size |
30,000 |
30,000 |
30,000 |
| Dynamic routing |
Yes |
Yes |
Yes |
| Static routes |
Yes |
Yes |
Yes |
| Source-based routing |
Yes |
Yes |
Yes |
| Policy-based routing |
Yes |
Yes |
Yes |
| Equal cost multipath (ECMP) |
Yes |
Yes |
Yes |
| Reverse path forwarding (RPF) |
Yes |
Yes |
Yes |
| Multicast |
Yes |
Yes |
Yes |
| IPv6 |
| Firewall/stateless filters |
Yes |
Yes |
Yes |
| Dual-stack IPv4/IPv6 firewall |
Yes |
Yes |
Yes |
| RIPng |
Yes |
Yes |
Yes |
| BFD, BGP |
Yes |
Yes |
Yes |
| ICMPv6 |
Yes |
Yes |
Yes |
| OSPFv3 |
Yes |
Yes |
Yes |
| Class of service (CoS) |
Yes |
Yes |
Yes |
| Mode of Operation |
| Layer 2 (transparent) mode |
Yes |
Yes |
Yes |
| Layer 3 (route and/or NAT) mode |
Yes |
Yes |
Yes |
| IP Address Assignment |
| Static |
Yes |
Yes |
Yes |
| Dynamic Host Configuration Protocol (DHCP) |
Yes |
Yes |
Yes |
| Internal DHCP server |
Yes |
Yes |
Yes |
| DHCP relay |
Yes |
Yes |
Yes |
| Traffic Management Quality of Service (QoS) |
| Maximum bandwidth |
Yes |
Yes |
Yes |
| RFC2474 IP Diffserv in IPv4 |
Yes |
Yes |
Yes |
| Firewall filters for CoS |
Yes |
Yes |
Yes |
| Classification |
Yes |
Yes |
Yes |
| Scheduling |
Yes |
Yes |
Yes |
| Shaping |
Yes |
Yes |
Yes |
| Intelligent Drop Mechanisms (WRED) |
Yes |
Yes |
Yes |
| Three-level scheduling |
Yes |
Yes |
Yes |
| Weighted round robin for each level of scheduling |
Yes |
Yes |
Yes |
| Priority of routing protocols |
Yes |
Yes |
Yes |
| Traffic management/policing in hardware |
Yes |
Yes |
Yes |
| High Availability (HA) |
| Active/passive, active/active |
Yes |
Yes |
Yes |
| Unified in-service software upgrade (unified ISSU) |
Yes |
Yes |
Yes |
| Configuration synchronization |
Yes |
Yes |
Yes |
| Session synchronization for firewall and IPsec VPN |
Yes |
Yes |
Yes |
| Session failover for routing change |
Yes |
Yes |
Yes |
| Device failure detection |
Yes |
Yes |
Yes |
| Link and upstream failure detection |
Yes |
Yes |
Yes |
| Dual control links |
Yes |
Yes |
Yes |
| Interface link aggregation/Link Aggregation Control Protocol (LACP) |
Yes |
Yes |
Yes |
| Redundant fabric links |
Yes |
Yes |
Yes |
| Management |
| WebUI (HTTP and HTTPS) |
Yes |
Yes |
Yes |
| Command line interface (console, telnet, SSH) |
Yes |
Yes |
Yes |
| Juniper Security Director Cloud |
Yes |
Yes |
Yes |
| Administration |
| Local administrator database support |
Yes |
Yes |
Yes |
| External administrator database support |
Yes |
Yes |
Yes |
| Restricted administrative networks |
Yes |
Yes |
Yes |
| Root admin, admin, and read-only user levels |
Yes |
Yes |
Yes |
| Software upgrades |
Yes |
Yes |
Yes |
| Configuration rollback |
Yes |
Yes |
Yes |
| Logging/Monitoring |
| Structured syslog |
Yes |
Yes |
Yes |
| SNMP (v2 and v3) |
Yes |
Yes |
Yes |
| Traceroute |
Yes |
Yes |
Yes |
| Certifications |
| Safety certifications |
Yes |
Yes |
Yes |
| Electromagnetic Compatibility (EMC) certifications |
Yes |
Yes |
Yes |
| RoHS2 Compliant (European Directive 2011/65/EU) |
Yes |
Yes |
Yes |
| NIST FIPS-140-2 Level 2 |
Yes |
Yes |
Yes |
| Common Criteria NDPP+TFFW EP + VPN EP |
Yes |
Yes |
Yes |
| USGv6 |
Yes |
Yes |
Yes |
| Dimensions and Power |
| Dimensions (W x H x D) |
17.45 x 8.7 x 24.5 in |
17.5 x 14 x 23.8 in |
17.5 x 27.8 x 23.5 in |
| (44.3 x 22.1 x 62.2 cm) |
(44.5 x 35.6 x 60.5 cm) |
(44.5 x 70.5 x 59.7 cm) |
| Weight |
Fully configured 128 lb |
Fully Configured: 180 lb |
Fully Configured: 334 lb |
| (58.1 kg) |
(81.7 kg) |
(151.6 kg) |
| Power supply (AC) |
100 to 240 VAC |
100 to 240 VAC |
200 to 240 VAC |
| Power supply (DC) |
-40 to -60 VDC |
-40 to -60 VDC |
-40 to -60 VDC |
| Maximum power |
4,100 watts |
4,100 watts (AC high capacity) |
8,200 watts (AC high capacity) |
| (AC high capacity) |
| Typical Power |
1540 watts |
2440 watts |
5015 watts, 10200 Watts (AC/DC), 200-305 VAC, 200-410 VDC |
| Environmental |
| Operating temperature – long term |
41° to 104° F (5° to 40° C) |
41° to 104° F (5° to 40° C) |
41° to 104° F (5° to 40° C |
| Humidity – long term |
5% to 85% noncondensing |
5% to 85% noncondensing |
5% to 85% noncondensing |
| Humidity – short term |
5% to 93% noncondensing but not to exceed 0.026 kg water/kg of dry air |
5% to 93% noncondensing but not to exceed 0.026 kg water/kg of dry air |
5% to 93% noncondensing but not to exceed 0.026 kg water/kg of dry air |