On the cloud, we use it to test functionality.
Our company is in a proof of concept mode with this product. We have not selected it yet.
On the cloud, we use it to test functionality.
Our company is in a proof of concept mode with this product. We have not selected it yet.
The GUI interface needs improvement. It also needs improvement with the VPCs.
Because we are in proof of concept, the stability hasn't been stressed more than 30 percent.
The scalability is okay.
The size of our environment is 46 offices.
The technical support has been good.
The integration and configuration with AWS was excellent.
Our experience purchasing the solution through the AWS Marketplace was good.
We like pricing through the AWS Marketplace.
We also were considering Palo Alto Networks.
Look at this product and Palo Alto's product, then do a deep comparison analysis.
It integrates with our VPC and Direct Connect Gateway.
I am also using it on-premise. Compared to the AWS version, it is pretty transparent.
I can’t really say a firewall improves anything other than security, but we have been able to solve a lot of extranet connectivity issues with these firewalls that the bigger name devices didn’t handle so well.
It is bomb proof as seen by the fact they are still in production use today. A simple human friendly command structure, making CLI edits and debug sessions easy and quick, means that they just don’t fail.
The SRX is a different device. It is much more sensitive to unexpected power loss so we had to RMA several after unexpected site power outages. The command structure is also different so that I always need my cheat sheet when debugging on them.
The NSM is its own beast. It's a 10 when it’s running properly, gives you all the info you need easily to make and document edits and monitor status of devices, but keeping it running well is almost a job in itself. It doesn’t manage its own database very well and it gets slow and unresponsive, often requiring user intervention on the server backend.
Currently we use Juniper products, SSG and SRX firewalls in about a 50/50 mix both standalone and in HA clusters. We also use their NSM for device management and logging.
The SSG models are mostly EOL and are being replaced with new “Next Gen” firewalls. The SRX models will likely continue to be used internally as support will remain available for some time.
We only use the firewall and virtual router options and they do what we need:
They constitute a solid working solution that has been able to cope with any of the unique challenges that have come up.
While the OS supports a pretty full UTM option, we found in testing that the hardware was not powerful enough to run with all the bells and whistles turned on for the amount of traffic we process. So we use other hardware for those services meaning it’s not a deal breaker for us.
We have had no issues at all with the SSG models and the SRX model only had problems with sudden power loss occasionally.
The only issue was that the Network Security Manager (which is EOL) was sold as supporting over 125 devices. That may be true if you are just managing the configurations but once you add in monitoring and logging it’s really only happy with fewer than 40 devices, as the database grows too big to deal with and needs constant maintenance.
I would rate the technical support as average, as the calls were responded to quickly but as usual it depends on who you happen to get on the phone that day. Some were very good, others times I had to ask for a different engineer to join the call.
This solution was in place when I started so I cannot answer this question.
The setup was straightforward and to get into a cluster consists of about ten commands. The hardest part is deciding on active/active or active/passive for your solution.
I’m not involved in the financial side of the purchase. Our buyers handle that. Support and licensing comes in the usual tiers, SLA for repairs and/or options turned on in the device.
I know they left Check Point and looked at Cisco products before choosing Juniper, but that decision pre-dates my involvement.
I would say get an SSG but they are EOL so for the SRX make sure you have the recovery boot system configured and a way to remote console the device.
I know this sounds like a major problem but it’s not been that big an issue. We run HA and have same day replacement on them so if we lose one it’s not a major outage, just more work to do.
One of Juniper vSRX's most valuable features is its integration with safety applications. It keeps the software secure from developers without relying on third-party solutions.
The biggest downside of Juniper vSRX is its pricing, which may be too high for smaller organizations. While it's a decent solution, the cost may limit its accessibility to smaller customers.
I have been working with the product for five to six years.
The solution's stability is good. It responds very quickly in crisis situations, which might be partly because I know the team there and how to get the information I need.
The tool's scalability is good.
I've seen really fast response times with Juniper vSRX. When there's a problem, it modifies the firmware quickly to respond to the threat. With Cisco, it can take months to make changes because their architecture is more complicated. Juniper vSRX and Fortinet are straightforward.
Positive
I rate the overall solution a nine out of ten.
The tool could be used without additional work. It is easy to implement.
The IDs of interfaces that are implemented inside of the vSRX maybe should be extended in some cases because there is the imitation of virtual interfaces.
I have been using Juniper vSRX as an end user for five years.
The product is stable.
I rate the solution’s stability a ten out of ten.
The solution’s scalability is high because more than 4000 elements can be deployed.
Around 100 users are using this solution.
Technical support is fine.
The initial setup is easy. We use the special scripts to configure it. It is automatic to configure and implement.
Documentation.
The tool is sold in a package. Hence, the individual price is very low.
I recommend the Juniper vSRX solution. Its effectiveness depends on the architect's expertise. We've encountered no issues with its deployment in our system. Our collaboration with Juniper has been satisfactory in terms of quality. However, it's essential to consider cloud technology within such architectures. The current solution lacks scalability and might need to be reevaluated based on emerging trends in security with the increasing shift toward cloud technology.
Overall, I rate the solution an eight out of ten.
