SRX4100 and SRX4200 Firewalls Datasheet

Download Datasheet

Product Overview

Juniper’s SRX4100 and SRX4200 firewalls offer industry-leading threat protection, performance, scalability, high availability, and integrated security services. Designed for high-performance throughput while preventing exploits, malware, and malicious traffic, the SRX4100 and SRX4200 are best suited for enterprise data centers, campuses, and regional headquarters focused on adopting a Zero Trust architecture.

The SRX4100 and SRX4200 seamlessly integrate networking and security in a single-platform, fixed-form-factor firewall. Both firewalls are powered by Junos® operating system (Junos OS) and managed by Security Director Cloud, which helps organizations operationalize Zero Trust and enable architectural transformation through a unified management experience and single-policy framework.

 

SRX4200 front top image

Product Description

The Juniper Networks® SRX4100 and SRX4200 are high‑performance, next‑generation firewalls (NGFWs) with hardware acceleration that protect mission‑critical data center networks, enterprise campuses, and regional headquarters. The SRX4100 and SRX4200 are an integral part of the Juniper Connected Security framework that extends security to every point of connection on the network to safeguard users, data, and the infrastructure from advanced threats.

The SRX4100 and SRX4200 integrate networking and security in a single platform to deliver industry‑leading intrusion prevention and malware protection with high‑performance throughput, IPSec VPN, and easy policy management to secure the network reliably. Advanced application identification and classification enables greater visibility, enforcement, control, and protection over network traffic, application access, and data. These NGFWs provide detailed analyses of application volume and usage, fine‑grained application control policies, and traffic prioritization based on application information and context to reduce complexity across traditional, cloud, and hybrid IT networks.

The SRX4100 and SRX4200 firewalls deliver full automation to both enterprises and service providers. Their high performance and scale allow the SRX4100 and SRX4200 to act as VPN hubs, terminating VPN/secure overlay connections in various SD‑WAN topologies.

1000254-partnerlogos

Both SRX4100 and SRX4200 firewalls are managed by Juniper Security Director Cloud, a unified management experience that connects the organization’s current deployments with future architectural rollouts. Security Director Cloud uses a single‑policy framework enabling consistent security policies across any environment while expanding Zero Trust to all parts of the network, from the edge into the data center. This provides unbroken visibility, policy configuration, administration, and collective threat intelligence all in one place. The SRX4100 and SRX4200 comply with industry standards, delivering the scalability, ease of management, secure connectivity, and advanced threat mitigation capabilities that businesses need.

 

Architecture and Key Components

The SRX4100 and SRX4200 hardware and software architecture provides cost‑effective security performance in a small 1RU form factor. These firewalls incorporate multiple security services and networking functions on top of Juniper’s industry‑leading Junos OS.

The SRX4100 and SRX4200 recognize more than 4,800 applications and nested applications in plain-text or SSL-encrypted transactions. The firewalls also integrate with Microsoft Active Directory and combine user information with application data to provide network-wide application and user visibility and control.

 

Features and Benefits

Table 1. SRX4100 and SRX4200 features and benefits
Business RequirementFeature/SolutionSRX4100/SRX4200 Advantages 
High performanceHigh-performance firewall
  • Best suited for enterprise campus and data center edge deployments
  • Ideal for next-generation firewall deployments at the head office
  • Scalability and feature capacity meet future needs
High-quality end user experienceApplication visibility and control
  • Continuous application updates provided by Juniper Threat Labs
  • Controls and prioritizes traffic based on application and use role
  • Inspects and detects applications inside SSL-encrypted traffic
Advanced threat protection IPS, antivirus, antispam, enhanced web filtering, Juniper Advanced Threat Prevention Cloud sandboxing, Encrypted Traffic Insights, and SecIntel Threat Intelligence feeds
  • Provides IPS capabilities and real-time updates to signatures that effectively protect against exploits, proven most effective in the industry for the past five years confirmed by multiple third-party testing companies
  • Protects against malware and malicious web traffic
  • Delivers an open threat intelligence platform that  provides a single point for all operational intelligence feeds
  • Protects against zero-day attacks
  • Stops rogue and compromised devices from disseminating malware
  • Restores visibility lost due to encryption without the heavy burden of full TLS/SSL decryption
Zero-day preventionAI-Predictive Threat Prevention
  • Predicts and prevents malware at line rate by using AI to identify threats from packet snippets effectively
  • Eliminates patient-zero infections
  • Provides network protection throughout the entire attack lifecycle, preventing reinfection from subsequent attacks, rather than just for the first 24 hours of an attack
Advanced networking servicesRouting, secure wire
  • Supports carrier-class advanced routing and quality of service (QoS)
Highly secureIPsec VPN, Remote Access/SSL VPN
  • Provides high-performance IPsec VPN with a dedicated crypto engine
  • Offers diverse VPN options for various network designs, including remote access and dynamic site-to-site communications
  • Simplifies large VPN deployments with auto VPN
  • Includes hardware-based crypto acceleration
  • Secure and flexible remote access SSL VPN with Juniper Secure Connect
Embedded security in data center fabricEVPN-VXLAN Type 5 routes
  • Enhances tunnel inspection for VXLAN encapsulated traffic with Layer 4 to Layer 7 security services
  • Eases operations with Type 5 support through BGP
  • Does not require decapsulation of EVPN-VXLAN traffic
Highly reliableChassis cluster, redundant power supplies
  • Provides stateful configuration and session state synchronization
  • Supports active/active and active/backup deployment scenarios
  • Offers highly available hardware with redundant power supply unit (PSU) and redundant fans
  • Delivers dedicated control and fabric link with seamless high availability
Easy to manage and scaleOn-box GUI, Juniper Security Director Cloud
  • Enables centralized management from Juniper’s unified management experience with unbroken visibility, Zero‑Touch Provisioning, intelligent firewall policy management and scalability, Network Address Translation (NAT), and IPsec VPN deployments
  • Includes simple, easy-to-use on-box GUI for local management
Low TCOJunos OS
  • Integrates routing and security in a single device
  • Reduces OpEx with Junos OS automation capabilities

 

SRX4100 and SRX4200 front top image

SRX4100 and SRX4200 Firewall Specifications

Software Specifications

Firewall Services

  • Stateful firewall services
  • Zone-based firewall
  • Screens and distributed denial of service (DDoS) protection
  • Protection from protocol and traffic anomalies
  • Unified Access Control (UAC)
 

Network Address Translation (NAT)

  • Source NAT with Port Address Translation (PAT)
  • Bidirectional 1:1 static NAT
  • Destination NAT with PAT
  • Persistent NAT
  • IPv6 address translation
 

VPN Features

  • Tunnels: Site-to-site, hub and spoke, dynamic endpoint, AutoVPN, ADVPN, Group VPN (IPv4/ IPv6/Dual Stack)
  • Juniper Secure Connect: Remote access/SSL VPN
  • Configuration payload: Yes
  • IKE Encryption algorithms: Prime, DES-CBC, 3DES-CBC, AEC-CBC, AES-GCM, Suite B
  • IKE authentication algorithms: MD5, SHA-1, SHA-128, SHA-256, SHA-384
  • Authentication: Pre-shared key and public key infrastructure (PKI) (X.509)
  • IPsec: Authentication Header (AH)/Encapsulating Security Payload (ESP) protocol
  • IPsec Authentication Algorithms: hmac-md5, hmac-sha-196, hmac-sha-256
  • IPsec Encryption Algorithms: Prime, DES-CBC, 3DES-CBC, AEC-CBC, AES-GCM, Suite B
  • Perfect forward secrecy, anti-reply
  • Internet Key Exchange: IKEv1, IKEv2
  • Monitoring: Standard-based dead peer detection (DPD) support, VPN monitoring
  • VPNs GRE, IP-in-IP, and MPLS

 

High Availability Features

  • Virtual Router Redundancy Protocol (VRRP) – IPv4 and IPv6
  • Stateful high availability:
    • Dual box clustering
    • Active/passive
    • Active/active
    • Configuration synchronization
    • Firewall session synchronization
    • Device/link detection
    • In-Service Software Upgrade (ISSU)
    • Multi-Node HA (MNHA)
  • IP monitoring with route and interface failover
 

Application Security Services1

  • Application visibility and control
  • Application QoS
  • Advanced/application policy-based routing (APBR)
  • Application Quality of Experience (AppQoE)
  • Application-based multipath routing
  • User-based firewall

 

Threat Defense and Intelligence Services1

  • Intrusion prevention system
  • Antivirus
  • Antispam
  • Category/reputation-based URL filtering
  • SSL proxy/inspection
  • Protection from botnets (command and control)
  • Adaptive enforcement based on GeoIP
  • Juniper Advanced Threat Prevention, a cloud-based SaaS offering, to detect and block zero-day attacks
  • Adaptive Threat Profiling
  • Encrypted Traffic Insights
  • SecIntel threat intelligence
  • Juniper ATP Virtual Appliance, a distributed, on-premises advanced threat prevention solution to detect and block zero-day attacks
  • AI-Predictive Threat Prevention

1Offered as advanced security subscription license.

Routing Protocols

  • IPv4, IPv6, static routes, RIP v1/v2
  • OSPF/OSPF v3
  • BGP with route reflector
  • EVPN-VXLAN
  • IS-IS
  • Multicast: Internet Group Management Protocol (IGMP) v1/v2, Protocol Independent Multicast (PIM) sparse mode (SM)/ source‑specific multicast (SSM), Session Description Protocol (SDP), Distance Vector Multicast Routing Protocol (DVMRP), Multicast Source Discovery Protocol (MSDP); reverse path forwarding (RPF)
  • Encapsulation: VLAN, Point-to-Point Protocol over Ethernet (PPPoE)
  • Virtual routers
  • Policy-based routing, source-based routing
  • Equal-cost multipath (ECMP)

 

QoS Features

  • Support for 802.1p, DiffServ code point (DSCP), EXP
  • Classification based on VLAN, data-link connection identifier (DLCI), interface, bundles, or multifield filters
  • Marking, policing, and shaping
  • Classification and scheduling
  • Weighted random early detection (WRED)
  • Guaranteed and maximum bandwidth
  • Ingress traffic policing
  • Virtual channels

 

Network Services

  • Dynamic Host Configuration Protocol (DHCP) client/server/relay
  • Domain Name System (DNS) proxy, dynamic DNS (DDNS)
  • Juniper real-time performance monitoring (RPM) and IP monitoring
  • Juniper flow monitoring (J-Flow)
 

Advanced Routing Services

  • Packet Mode
  • MPLS (RSVP, LDP)
  • Circuit cross-connect (CCC), translational cross-connect (TCC)
  • L2/L2 MPLS VPN, pseudo-wires
  • Virtual private LAN service (VPLS), next-generation multicast VPN (NG-MVPN)
  • MPLS traffic engineering and MPLS fast re-route
 

Management, Automation, Logging, and Reporting

  • SSH, Telnet, SNMP
  • Smart image download
  • Juniper CLI and Web UI
  • Juniper Security Director Cloud
  • Python
  • Junos events, commit and OP scripts
  • Application and bandwidth usage reporting
  • Debug and troubleshooting tools

 

Hardware Specifications

Table 2. SRX4100 and SRX4200 hardware specifications
SpecificationsSRX4100SRX4200
Connectivity
Total onboard ports8x1GbE/10GbE8x1GbE/10GbE
Onboard small form-factor pluggable plus (SFP+) transceiver ports8x1GbE/10GbE8x1GbE/10GbE
Out-of-Band (OOB) management ports1x1GbE1x1GbE
Dedicated high availability (HA) ports2x1GbE/10GbE (SFP/SFP+)2x1GbE/10GbE (SFP/SFP+)
Console (RJ-45)11
USB 2.0 ports (type A)22
Memory and storage
System memory (RAM)64 GB64 GB
Secondary storage (SSD)240 GB with 1+1 RAID240 GB with 1+1 RAID
Dimensions and power
Form factor1 U1 U
Size (WxHxD)17.48 x 1.7 x 25 in
(44.39 x 4.31 x 63.5 cm)
17.48 x 1.7 x 25 in
(44.39 x 4.31 x 63.5 cm)
Weight (device and PSU)Chassis with two AC power supplies: 29 lb (13.15 kg)
Chassis with two DC power supplies: 28.9 lb (13.06 kg)
Chassis with package for shipping: 47.5 lb (21.54 kg)
Chassis with two AC power supplies: 29 lb (13.15 kg)
Chassis with two DC power supplies: 28.9 lb (13.06 kg)
Chassis with package for shipping: 47.5 lb (21.54 kg)
Redundant PSU1+11+1
Power supply2x 650 W redundant
AC-DC/DC-DC PSU
2x 650 W redundant
AC-DC/DC-DC PSU
Average power consumption200 W200 W
Average heat dissipation685 BTU / hour685 BTU / hour
Maximum current consumption4A (for 110 V AC power)
2A (for 220 V AC power)
9A (for -48 V DC power)
4A (for 110 V AC power)
2A (for 220 V AC power)
9A (for -48 V DC power)
Maximum inrush current50 A by 1 AC cycle50 A by 1 AC cycle
Environmental and regulatory compliance
Acoustic noise level70 dBA70 dBA
Airflow/coolingFront to backFront to back
Operating temperature32° to 104° F
(0° to 40° C)
32° to 104° F
(0° to 40° C)
Operating humidity5% to 90% noncondensing5% to 90% noncondensing
Meantime between failures (MTBF)221,729 hours (about 25.3 years)221,729 hours (about 25.3 years)
FCC classificationClass AClass A
RoHS complianceRoHS 2RoHS 2
Performance and scale
Firewall throughput (IMIX) throughput Gbps22550
Firewall throughput (1,518 B) Gbps24080
IPsec VPN throughput (IMIX) Gbps21326
IPsec VPN throughput (1400B)217.535
Application security performance (TPS#/CPS**) in Gbps35/1670/32.5
Next-generation firewall (TPS#/CPS**) in Gbps330/860/16
Secure Web Access firewall (CPS**) in Gbps4714.5
Advanced Threat (CPS)53.57.5
Connections per second (64B)275,000550,000
SSL connections per second6,00012,000
Maximum concurrent sessions (IPv4 or IPv6)5 million10 million
Route table size (RIB/FIB) (IPv4)2 million/1.2 million2 million/1.2 million
IPsec VPN tunnels4,0754,075

2Throughput numbers based on UDP packets and RFC2544 test methodology
3Next-generation firewall performance was measured with firewall, application security, and IPS enabled
4Secure Web Access Firewall performance is measured with Firewall, Application Security, IPS, SecIntel, and URL Filtering enabled
5Advanced Threat performance is measured with Firewall, Application Security, IPS, SecIntel, URL Filtering, and Malware Protection enabled
##TPS Method: Throughput performance of average HTTP sessions
**CPS Method: Short-lived sessions

 

Juniper Mist WAN Assurance and AI-Native Operations

Alternatively, the SRX4100 and SRX4200 firewalls can be operated and orchestrated through the Juniper Mist Cloud. Mist AI delivers unprecedented automation using a combination of artificial intelligence, machine learning algorithms, and data science techniques to save time, maximize IT productivity, and deliver the best experience to digital users.

Juniper Mist WAN Assurance is built on the Juniper Mist Cloud and delivers full life cycle management and operations, including AI‑Native insights, automated speed tests, dynamic packet capture (dPCAP), anomaly detection, and root cause identification that focuses on end users’ experience. For Day 0 and Day 1 operations, WAN Assurance also provides orchestration, administration, and ZTP for SRX4100 and SRX4200. See the WAN Assurance datasheet for more information.

 

Juniper Networks Services and Support

Juniper Networks is the leader in performance-enabling services designed to accelerate, extend, and optimize your high-performance network. Our services allow you to maximize operational efficiency while reducing costs and minimizing risk, achieving a faster time to value. Juniper Networks ensures operational excellence by optimizing the network to maintain required levels of performance, reliability, and availability. For more details, please visit https://www.juniper.net/us/en/products.html.

 

Ordering Information

To order Juniper Networks SRX Series Firewalls, and to access software licensing information, please visit the How to Buy page at https://www.juniper.net/us/en/how-to-buy/form.html.

 

About Juniper Networks

Juniper Networks believes that connectivity is not the same as experiencing a great connection. Juniper's AI-Native Networking Platform is built from the ground up to leverage AI to deliver exceptional, highly secure, and sustainable user experiences from the edge to the data center and cloud. Additional information can be found at juniper.net or connect with Juniper on X (formerly Twitter), LinkedIn, and Facebook.

 

1000600 - 024 - EN OCTOBER 2024