Likelihood to Recommend When we are asked by local partners which security equipment we use we always recommend our Cisco security products. The Firepower firewall is no exception and we can easily recommend this to others who need a fast, secure, and well built system that integrates well with all your existing hardware and software.
Read full review SRXs seem to be well suited at the enterprise level for plain routers, firewalls, and IDP/IDS. They work well on MPLS and Ethernet, including Internet. I have 3 SRXs also performing edge duty, with 2 in a high availability (HA) cluster. The Juniper line of SRXs provides a good range of scaling from small business to extremely large enterprise. Wire speed is a common comparison factor and Juniper shines in that area.
Read full review Pros Policy management in the GUI. I'm old-school, and still create ACLs in the CLI, but using the GUI for this is very nice. Event monitoring and reporting is great, and you can get very granular when it comes to what information you are viewing. I really like the troubleshooting features that are built in, especially the packet tracer and the ability to generate and download a troubleshooting package to review or send to TAC. Read full review Edge Device (Tunneling & Routing) Routing Instances Zone Based Firewall L3 Gateway/Vlan termination DHCP Server & DHCP Relay Good support community & Good available documentation Good support by the Vendor Read full review Cons When deployed as Firepower Threat Defense, configurations cannot be made within the device itself. Troubleshooting can be difficult if the Cisco Firepower 4100 Series firewall is managed by the Cisco Firepower Management Center. There are two operating systems in Cisco Firepower 4100 Series, firmware upgrade process will take a long time. Read full review My only real criticism of the product is that it's hard to figure out how to upgrade the firmware from the CLI via TFTP via the docs, but it works great once you get it sorted. Read full review Support Rating This is the one area where I have a beef with Juniper. When I called into Cisco TAC, 90% of the time, the first person I spoke with was able to resolve my issue. With Juniper TAC, 90% of the time, the first person I speak with is not able to resolve my issue, seems to almost be reading from a script, and must escalate my ticket. All of which takes time.
Read full review Alternatives Considered As I mentioned before, the Fortigates have better failover. I think the Cisco interface is easier to use that that of the
FortiGate . My only criticism would be that with multiple CLIs, it can get a bit confusing when you are trying to configure something or troubleshoot from the CLI.
Read full review Juniper SRX stands tall compared to all these products for Large Service Provider Networks, where traffic volume is larger. Also, cost comparison with SRX's few other products can also be another contributing factor while selecting this. As well as Juniper Routers, Switches, and multiple products from the same vendor to maintain one single vendor environment. As well as Juniper Support is also really good.
Read full review Return on Investment Positive impact would be our increased security network wide. Another positive would be the increased processing power, saving us time and [from] needing more equipment. A negative impact would be the increased need for having to learn a new interface. Read full review It is a workhorse for our field operations. It provides the last touch for an ISP to the customer. The customer has no view of the device, but with the repeatability of the device, they do not need to. The ability to roll out a dynamic routing protocol attached to a security zone allows elasticity to the environment that supports growth. VLAN support on the inside interfaces allow this to be the only device in some smaller deployments we install these in. Read full review ScreenShots