The primary use case is for protecting enterprise systems.
Consumer Engineer at a comms service provider with 1,001-5,000 employees
It protects from distributed denial-of-service attacks with Screen Options
Pros and Cons
- "It protects from distributed denial-of-service attacks with Screen Options."
- "It is highly scalable, stable, and can be easily updated."
- "The GUI needs to be easier and more helpful for users who don't have security experience."
- "The GUI needs to be easier and more helpful for users who don't have security experience."
What is our primary use case?
How has it helped my organization?
It allows users connecting from homes, who urgently need to log into the networks through a secure tunnel without using internet IP gateway, access using a SSL.
What is most valuable?
- It is highly scalable, stable, and can be easily updated.
- It protects from distributed denial-of-service attacks, DDoS attacks, with Screen Options.
- When you design your networks, you can put SSL Inspection as a gateway to make the systems secured, like IT systems.
What needs improvement?
The GUI needs to be easier and more helpful for users who don't have security experience.
They need to add WAF management to the tool, as competitors already have it as part of their offerings. This feature is future of protecting enterprise solutions.
Buyer's Guide
Juniper SRX Series Firewall
May 2026
Learn what your peers think about Juniper SRX Series Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,311 professionals have used our research since 2012.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
It is very stable, but it needs an engineer on the system while it is running to monitor for attacks and when attacks are in process.
What do I think about the scalability of the solution?
It is easy to expand.
How are customer service and support?
The technical support is good, but there is a time delay between the support and attacks.
How was the initial setup?
The initial setup was straightforward, but has since become straightforward with experience.
For example, with MX (not SRX), it needs to be specific when you export or import the subnetting or addresses that you want to block or filter out of your networks. This is why it is a complex process the first time and becomes subsequently easier
What other advice do I have?
You have to be aware of Linux commands, which will make you able to use this device, like exporting file, saving file, monitoring your logs, and making a new script.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
GCD Network Architecture Manager at Technicolor
It provides stability for our complex network
Pros and Cons
- "Before, we were handling everything with a Vyatta server until our network became more complex."
- "The device could be more user-friendly."
What is our primary use case?
Firewall for a lab environment.
How has it helped my organization?
Before, we were handling everything with a Vyatta server until our network became more complex.
What is most valuable?
Stability.
What needs improvement?
The device could be more user-friendly.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Juniper SRX Series Firewall
May 2026
Learn what your peers think about Juniper SRX Series Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,311 professionals have used our research since 2012.
Chief Executive Officer with 51-200 employees
It is a good solution for firewall protection. It needs to be updated for "Next-Generation" needs.
Pros and Cons
- "From a protection perspective, it provides a network perimeter security function for our company."
- "From a protection perspective, it provides a network perimeter security function for our company."
- "This solution needs to update for "Next Generation" needs."
- "This solution needs to update for "Next Generation" needs."
What is our primary use case?
It is a basic firewall that we have been using for six years. It is a good solution.
What is most valuable?
The most valuable feature is the brand itself. From a protection perspective, it provides a network perimeter security function for our company.
What needs improvement?
We are finding that the UTM features which is required (like an antivirus or URL filtering) are not available. We are now looking for the "Next Generation" of firewall protection. We need to be less vulnerable to attacks.
In addition, we would really like to see an automated policy feature added.
For how long have I used the solution?
More than five years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Principal Director of IT at Reanaud-bray
Tried configuring the IDS for more than four months, but it did not work properly
Pros and Cons
- "We use it as a firewall at our head office and branches."
- "We use it as a firewall at our head office and branches."
- "It did not improve our safety because the IDS does not detect some attacks, but our anti-virus software did."
- "We tried configuring the IDS for more than four months, but it did not work properly."
- "It did not improve our safety because the IDS does not detect some attacks, but our anti-virus software did."
What is our primary use case?
We use it as a firewall at our head office and branches. We use its IDS solution at the head office too.
How has it helped my organization?
It did not improve our safety because the IDS does not detect some attacks, but our anti-virus software did.
What needs improvement?
- Correct the bugs in the current version.
- Help customers more with its configuration so they can feel safer.
We tried configuring the IDS for more than four months, but it did not work properly.
For how long have I used the solution?
Less than one year.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Network Analyst with 1,001-5,000 employees
The throughput is fine but the CLI is verbose, especially when configuring
Pros and Cons
- "The performance is better, but it could have been any firewall in its peer group."
- "The CLI is verbose. You have to say a lot to do a little. I don't like that part of it. Cisco's command syntax seems to be a good bit more concise. When you're trying to get something done, you don't want to have to type a bunch."
- "I'm not really that impressed with the technical support. I'm not really that impressed with the product, to be honest with you."
What is our primary use case?
Our primary use case is security. The performance has been okay. It's a bit of a change from the Ciscos in terms of the configuration syntax, from the CLI perspective. We use it just as a firewall. We don't use it for routing functionality.
How has it helped my organization?
The Juniper was a later model, later technology than we had, more horsepower than we had before. The performance is better, but it could have been any firewall in its peer group. The improvement was because our old firewalls were, well, old. So the performance has been an improvement. And the IDS, perhaps, is a little better than what the older firewalls had.
What is most valuable?
I'm not sure what the most valuable features are. I'm not really that impressed with the technical support. I'm not really that impressed with the product, to be honest with you. Throughput seems to be okay.
What needs improvement?
The CLI is verbose. You have to say a lot to do a little. I don't like that part of it. Cisco's command syntax seems to be a good bit more concise. When you're trying to get something done, you don't want to have to type a bunch. I wish there was a quicker way to configure through the CLI. I know all the tricks of hitting spacebar etc. to finish the command, and the context tricks of going further in. But it just reminds me of an older operating system, like VAX/VMS. It's just very verbose.
Maybe this is where the Space Security Director product comes in, but we aren't quite using the Security Director in Space to its fullest yet.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
It seems stable. We haven't had too many failures. We have had some but, by and large, it's been pretty stable. It's not taxed, the way we're using it.
What do I think about the scalability of the solution?
The model we have is very scalable. It's a fairly large firewall.
How is customer service and technical support?
I have spoken with technical support 30 or 50 times. On a scale of one to 10, I would evaluate Juniper technical support at five. It's never resolved in one call. It's always a couple of calls. We're not being passed from one department to another, it's just that they don't seem to be answering the question you give them. It's very frustrating.
How was the initial setup?
I migrated it from an ASA to the Juniper. It was a fairly straightforward process. There are things that are required on the Juniper that weren't required on the Cisco, like the global address book. Things have to be on there before you can do a lot of net and the like.
What other advice do I have?
You need to know what your company's strategic vision is, and then map the security part of that. I don't just mean cost-related, but the strategy for profit-related future ventures. You need to know why you want a particular firewall. Don't ignore the functions and future growth and products on the horizon from each of the vendors.
What you go with has to meet your current needs but, more importantly, is the company a going concern - meaning if they're going to get better - then how do they complement your particular industry's growth? Are they going to be there to make remote access and extranets and research easier to deliver? The product has to be configurable, with lots of options should you need to subscribe to those options.
The most important criterion, for me, when selecting a vendor is that they have to rank high in industry ratings. Juniper has just not been there. I haven't seen the 2018 reports, but year after year Juniper is not only the least visionary but one of the least in terms of performance. I also don't like the fact that they spun off their VPN to Pulse Secure. I know that's a subsidiary, but I don't necessarily want to have a separate appliance for a light-duty VPN.
I would rate Juniper at seven out of 10. It's a little harder to configure from a VPN perspective, VPN Tunnels. Their tech support is the big problem for me. I don't want to be bounced around. I don't want to get half an answer when I ask a whole question. I would take an inferior product with better tech support, without question. If I have a responsive engineering team that will fix problems when they come in, with firmware releases, etc., I'd clearly take an inferior product with that better support. It's all about function.
I probably wouldn't have chosen the Juniper in this environment. We just don't need yet another knowledge base to learn. And it doesn't fold into some of our Cisco services. For example, the assets control doesn't integrate well with the Radius servers. Something like that could be downloadable ACLs, for instance.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Technical Support Engineer at a tech services company with 51-200 employees
It protects the data behind our switches
Pros and Cons
- "It integrates well with Fortinet and Palo Alto."
- "It uses many applications, like antivirus blocking and web filtering."
- "The high availability of the application is good."
- "It protects the data behind our switches."
- "Juniper needs to focus more on their perimeter firewalls."
- "The GUI needs to be easier to handle."
- "I would like to see endpoint control and endpoint testing security."
- "Juniper needs to focus more on their perimeter firewalls."
What is our primary use case?
We use it as a perimeter firewall, data center firewall, and as VPN concentrators for some companies. It protects the data behind our switches. Our company provides the switches, like the EX-Series.
We are an elite partners for Juniper. We use the firewall for data protection.
How has it helped my organization?
It has a high security implementation.
What is most valuable?
It integrates well with Fortinet and Palo Alto.
It uses many applications, like antivirus blocking and web filtering. Also, defining routing on it is very easy along with netting. The high availability of the application is good. We use the IDS and IPsec VPN features.
What needs improvement?
I would like to see endpoint control and endpoint testing security.
The GUI needs to be easier to handle.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
The stability is good.
What do I think about the scalability of the solution?
The scalability is good.
How are customer service and technical support?
When we face problems, it is a firmware or software update. We call Juniper for support and they have a very good team for technical support. They help us a lot, then we will find the solution in the upgraded version of software of unit.
Which solution did I use previously and why did I switch?
I think there was a problem before I came to the company with Cisco and their firewall, so they decided to switch to Juniper.
How was the initial setup?
It is more complex than other vendors, but we have gotten used to it. So, we find it easy to implement and deploy.
What's my experience with pricing, setup cost, and licensing?
It has a low price.
Which other solutions did I evaluate?
We are also using Fortinet and have a partnership with Palo Alto. In addition, we are looking into a partnership with Citrix.
Cisco and FortiGate were on original shortlist.
What other advice do I have?
They can use the Juniper SRX as a data center firewall. Juniper needs to focus more on their perimeter firewalls.
Our most important criteria is to look for 24-hour support, prices, partnerships, and what they offer to partners. Also, we want to know if the product can function with Juniper.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.
Network Manager at a security firm with 1-10 employees
They should add a dashboard because the product is difficult to operate. It is not that expensive.
Pros and Cons
- "It helps us perform our daily jobs."
- "It helps us perform our daily jobs."
- "I would like them to add a dashboard because it's difficult to operate."
- "The product only has basic features."
- "I don't want to keep Juniper within my network anymore."
What is our primary use case?
The Juniper SRX that we have is being used as a firewall. Somehow, it is performing.
The product is a normal router with basic firewall capacity. We don't have a dedicated firewall. Therefore, I don't have high expectations from Juniper.
How has it helped my organization?
It helps us perform our daily jobs.
What is most valuable?
We are using it as a normal type of firewall.
What needs improvement?
I would like them to add a dashboard because it's difficult to operate.
The product only has basic features.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
The stability is normal.
What do I think about the scalability of the solution?
The scalability is normal.
How are customer service and technical support?
I haven't used technical support, just local support.
How was the initial setup?
The initial setup was complex.
What's my experience with pricing, setup cost, and licensing?
It is not that expensive.
Which other solutions did I evaluate?
We are evaluating Palo Alto, Barracuda, and Sophos because we need a Next-Gen firewall.
What other advice do I have?
It crashed, and we could not change it for some reason. I don't want to keep Juniper within my network anymore.
Most important criteria when selecting a vendor:
- Dedicated support team
- Easy configuration.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Sr. Programmer at a tech vendor with 51-200 employees
We use the Layer 4 firewall functions: Access rules, NAT, and site-to-site IPsec VPN
Pros and Cons
- "We mostly use the Layer 4 firewall functions: Access rules, NAT, and site-to-site IPsec VPN."
- "We liked that it had additional features and was more modern than the Cisco ASA line."
- "It needs better interoperability with Cisco gear."
- "In some cases, it is worse. We can’t do remote access IPsec VPNs for users like we could with the Cisco ASA."
How has it helped my organization?
Theere has been no change to our organization. We replaced an older Cisco ASA. We intended to use some of the UTM features, but we have not yet. In some cases, it is worse. We can’t do remote access IPsec VPNs for users like we could with the Cisco ASA. Instead, we set up OpenVPN. As the Cisco ASA is the de facto standard, doing a site-to-site IPsec VPN to other companies takes more time (e.g., IKEv2 will not work connecting to Cisco gear because traffic selectors are not supported for IKEv2).
What is most valuable?
We mostly use the Layer 4 firewall functions: Access rules, NAT, and site-to-site IPsec VPN. We liked that it had additional features and was more modern than the Cisco ASA line.
What needs improvement?
It needs better interoperability with Cisco gear.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
No stability issues.
What do I think about the scalability of the solution?
No issue. We are only a 40 person company and only have 50Mbps of internet bandwidth.
How are customer service and technical support?
Technical support is good, though we have not really used support much. Juniper has a decent knowledgebase.
Which solution did I use previously and why did I switch?
Previously, we had a Cisco ASA 5510. It was old and needed to be replaced. We switched because the Cisco ASA is underpowered. If you try to do too many functions, like IDS/IPS, UTM, virus scanning, and Smart Net, support is expensive.
How was the initial setup?
The initial setup is mostly straightforward. We are converting one of our site-to-site VPNs with another company where we have overlapping subnets. This took some doing because the Cisco ASA allowed us to do policy-based NAT and could NAT the same IP subnet two different ways depending on the destination address. We needed to exclude 10 IP addresses out of a 24 subnet from the static NAT rule which was needed to deal with the overlapping subnets and ended up having to do more than 240 individual 32 NAT rules on the Juniper SRX240H2.
What about the implementation team?
Work with a consultant who has good JunOS knowledge if you have a complex setup (we host more than 20 servers for internet access used by over a 1000 users).
What's my experience with pricing, setup cost, and licensing?
Pricing is good. Most of the costs are in the UTM (IDS/IPS, virus scanning, etc.) subscription. Palo Alto was nice, but much more expensive.
Which other solutions did I evaluate?
We looked at Juniper SRX vs FortiGate and Juniper SRX vs Palo Alto, as well as the newer Cisco ASAs.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Juniper SRX Series Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2026
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos Firewall
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
WatchGuard Firebox
Check Point Quantum Force (NGFW)
Cisco Meraki MX
Azure Firewall
Check Point Cloud Firewall (formerly CloudGuard Network Security)
SonicWall TZ
Fortinet FortiGate-VM
Palo Alto Networks VM-Series
Buyer's Guide
Download our free Juniper SRX Series Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Fortinet FortiGate and Juniper SRX?
- Which solution do you prefer: Juniper SRX4200 or FortiGate 1800?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?
- Fortinet, Palo Alto or Check Point?
- If you could go back, would you change your decision to buy that firewall and why?











