SRX5800X-BASE2
₹11,860,800.00 Original price was: ₹11,860,800.00.₹5,930,400.00Current price is: ₹5,930,400.00.
The Juniper NetworksĀ®Ā SRX5400,Ā SRX5600, andĀ SRX5800Ā are next-generation firewalls (NGFWs) that deliver industry-leading threat protection, high performance, six nines reliability and availability, scalability, and services integration.
-
Manufacturer Number:
Juniper
-
Part Number:
SRX5800X-BASE2
-
Model Description:
SRX5800X CONFIGURED: RE3, 2XSCB4, 2XPEM
-
Product Can Be:
Array
-
Rating:
-
Availability:
In Stock
-
Warranty:
New- 1 Year
-
Condition:
New
- Product Description: SRX5800 Configuration includes: Chassis, enhanced midplane, SRX5K-RE3-128G, 2xSRX5K-SCB4, 2xHC PEM, 2xHC fan tray; Supported by JUNOS release 19.3R1 onwards
- Manufacturer: Juniper
- Part Number: SRX5800X-BASE2
- Model Description: SRX5800X CONFIGURED: RE3, 2XSCB4, 2XPEM
- Rating:
- Product Can Be: Bought , Rented ,
- Availability: In Stock
- Also Available In: Used, Ref, NOB
- Condition: New
- Warranty: New- 1 Year

Order Procedure
- Click on Get Quote button in the product page
- Provide Your Information
- Once your quote is received: Our expert will send you an email with our pricing and other information.

24/7 Online Service
USA- +1- 860-730-3336
UK- +1- 860-730-3336
India- +91-988-672-7317
- Overview
- Specifications
- Warranty
The SRX Series next-generation firewalls are built for largeĀ enterprise data centers,Ā service providerĀ infrastructure, and public sector networks. With a modular architecture and high-performance line cards, the SRX Series firewalls are open, scalable security platforms with flexible connectivity options and service integration. The award-winning SRX Series is powered byĀ JunosĀ OS, the same industry-leading operating system that keeps the worldās largest data center networks available, manageable, and secure.
SRX5400 | SRX5600 | SRX5800 | |
Maximum Performance and Capacity1 | |||
Junos OS version tested | Junos OS 21.2 | Junos OS 21.2 | Junos OS 21.2 |
Firewall Performance, IMIX | 960 Gbps | 1.44 Tbps | 3.36 Tbps |
Maximum performance per chassis | 960 Gbps | 1440 Tbps | 3.36 Tbps |
Next-Generation Datacenter Firewall Performance2 | 136 Gbps | 194 Gbps | 504 Gbps |
Secure Web Access Firewall Performance3 | 75 Gbps | 107 Gbps | 277 Gbps |
Latency (stateful firewall) | ~11Āµsec | ~11Āµsec | ~11Āµsec |
IPsec VPN AES-256-GCM (IMIX) | 188 Gbps | 269 Gbps | 699 Gbps |
Maximum IPS performance | 172 Gbps | 245 Gbps | 638 Gbps |
Maximum concurrent sessions | 91 Million | 182 Million | 338 Million |
New sessions/second (sustained, tcp, 3way, firewall NAT) | 1.7/1 Million | 3.4/2 Million | 6.3/4 Million |
Maximum users supported | Unrestricted | Unrestricted | Unrestricted |
Network Connectivity | |||
IOC4 options (SRX5K-IOC4-MRAT; SRX5K-IOC4-10G) | 40x1GbE SFP+ and 40x10GbE SFP+Ā or 12xQSFP+/QSFP28 multirate | ||
IOC3 options (SRX5K-MPC3-100G10G; SRX5K-MPC3-40G10G) | 2x100GbE CFP2 and 4x10GbE SFP+ or 6x40GbE QSFP+ and 24x10GbE SFP+ | ||
Firewall | |||
Network attack detection | Yes | Yes | Yes |
DoS and distributed denial of service (DDoS) protection | Yes | Yes | Yes |
TCP reassembly for fragmented packet protection | Yes | Yes | Yes |
Brute force attack mitigation | Yes | Yes | Yes |
SYN cookie protection | Yes | Yes | Yes |
Zone-based IP spoofing | Yes | Yes | Yes |
Malformed packet protection | Yes | Yes | Yes |
IPsec VPN | |||
Site-to-site tunnels | 15,000 | 15,000 | 15,000 |
Tunnel interfaces | 15,000 | 15,000 | 15,000 |
Number of remote access / SSL VPN (concurrent) users | 25,000 | 40,000 | 50,000 |
Tunnels | Site-to-Site, Hub and Spoke, Dynamic Endpoint, AutoVPN, ADVPN, Group VPN (IPv4 / IPv6 / Dual Stack) | ||
Ā Internet Key Exchange | IKEv1, IKEv2 | ||
Configuration Payload | Yes | Yes | Yes |
IKE Authentication Algorithms | MD5, SHA1, SHA-256, SHA-384, SHA-512 | ||
IKE Encryption Algorithms | Prime, DES-CBC, 3DES-CBC, AEC-CBC, AES-GCM, SuiteB | ||
Authentication | Pre-shared key and public key infrastructure (PKI X.509) | ||
IPsec (Internet Protocol Security) | Authentication Header (AH) / Encapsulating Security Payload (ESP) protocol | ||
Perfect forward secrecy | Yes | ||
IPsec Authentication Algorithms | hmac-md5, hmac-sha-196, hmac-sha-256, hmac-sha-384, hmac-sha-512 | ||
IPsec Encryption Algorithms | Prime, DES-CBC, 3DES-CBC, AEC-CBC, AES-GCM, SuiteB | ||
Monitoring | Standard-based Dead peer detection (DPD), VPN monitoring | ||
Prevent replay attack | Yes | Yes | Yes |
VPNs (GRE, IP-in-IP, MPLS) | Yes | Yes | Yes |
Redundant VPN gateways | Yes | Yes | Yes |
Intrusion Prevention System (IPS) | |||
Signature-based and customizable (via templates) | Yes | Yes | Yes |
Active/active traffic monitoring | Yes | Yes | Yes |
Stateful protocol signatures | Yes | Yes | Yes |
Attack detection mechanisms | Stateful signatures, protocol anomaly detection (zero-day coverage), application identification | Stateful signatures, protocol anomaly detection (zero-day coverage), application identification | Stateful signatures, protocol anomaly detection (zero-day coverage), application identification |
Attack response mechanisms | Drop connection, close connection, session packet log, session summary, e-mail | Drop connection, close connection, session packet log, session summary, e-mail | Drop connection, close connection, session packet log, session summary, e-mail |
Attack notification mechanisms | Structured system logging | Structured system logging | Structured system logging |
Worm protection | Yes | Yes | Yes |
Simplified installation through recommended policies | Yes | Yes | Yes |
Trojan protection | Yes | Yes | Yes |
Spyware/adware/keylogger protection | Yes | Yes | Yes |
Advanced malware protection | Yes | Yes | Yes |
Protection against attack proliferation from infected systems | Yes | Yes | Yes |
Reconnaissance protection | Yes | Yes | Yes |
Request and response side attack protection | Yes | Yes | Yes |
Compound attacksācombines stateful signatures and protocol anomalies | Yes | Yes | Yes |
Custom attack signatures creation | Yes | Yes | Yes |
Contexts accessible for customization | 600+ | 600+ | 600+ |
Attack editing (port range, other) | Yes | Yes | Yes |
Stream signatures | Yes | Yes | Yes |
Protocol thresholds | Yes | Yes | Yes |
Stateful protocol signatures | Yes | Yes | Yes |
Frequency of updates | Daily and emergency | Daily and emergency | Daily and emergency |
Content Security | |||
Antivirus | Yes | Yes | Yes |
Content filtering | Yes | Yes | Yes |
Enhanced Web filtering | Yes | Yes | Yes |
Redirect Web filtering | Yes | Yes | Yes |
Antispam | Yes | Yes | Yes |
AppSecure | |||
AppTrack (application visibility and tracking) | Yes | Yes | Yes |
AppFirewall (policy enforcement by application name) | Yes | Yes | Yes |
AppQoS (network traffic prioritization by application name) | Yes | Yes | Yes |
User-based application policy enforcement | Yes | Yes | Yes |
GPRS Security | |||
GPRS stateful firewall | Yes | Yes | Yes |
Destination Network Address Translation | |||
Destination NAT with Port Address Translation (PAT) | Yes | Yes | Yes |
Destination NAT within same subnet as ingress interface IP | Yes | Yes | Yes |
Destination addresses and port numbers to one single address and a specific port number (M:1P) | Yes | Yes | Yes |
Destination addresses to one single address (M:1) | Yes | Yes | Yes |
Destination addresses to another range of addresses (M:M) | Yes | Yes | Yes |
Source Network Address Translation | |||
Static Source NATāIP-shifting Dynamic Internet Protocol (DIP) | Yes | Yes | Yes |
Source NAT with PATāport translated | Yes | Yes | Yes |
Source NAT without PATāfix port | Yes | Yes | Yes |
Source NATāIP address persistency | Yes | Yes | Yes |
Source pool grouping | Yes | Yes | Yes |
Source pool utilization alarm | Yes | Yes | Yes |
Source IP outside of the interface subnet | Yes | Yes | Yes |
Interface source NATāinterface DIP | Yes | Yes | Yes |
Oversubscribed NAT pool with fallback to PAT when the address pool is exhausted | Yes | Yes | Yes |
Symmetric NAT | Yes | Yes | Yes |
Allocate multiple ranges in NAT pool | Yes | Yes | Yes |
Proxy Address Resolution Protocol (ARP) for physical port | Yes | Yes | Yes |
Source NAT with loopback groupingāDIP with loopback grouping | Yes | Yes | Yes |
User Authentication and Access Control | |||
Built-in (internal) database | Yes | Yes | Yes |
RADIUS accounting | Yes | Yes | Yes |
Web-based authentication | Yes | Yes | Yes |
Public Key Infrastructure (PKI) Support | |||
PKI certificate requests (PKCS 7, PKCS 10, and CMPv2) | Yes | Yes | Yes |
Automated certificate enrollment (SCEP) | Yes | Yes | Yes |
Certificate authorities supported | Yes | Yes | Yes |
Self-signed certificates | Yes | Yes | Yes |
Virtualization | |||
Maximum custom routing instances with data plane separation | 2000 | 2000 | 2000 |
Maximum security zones | 2000 | 2000 | 2000 |
Maximum virtual firewalls with data plane and administrative separation (logical/tenant systems) | 500 | 500 | 500 |
Additional off-platform virtual firewall option with Juniper Networks vSRX Virtual Firewall (VM based) | Unlimited | Unlimited | Unlimited |
Maximum number of VLANs | 4096 | 4096 | 4096 |
Routing | |||
BGP instances | 1000 | 1000 | 1000 |
BGP peers | 2000 | 2000 | 2000 |
BGP routes | 1 Million | 1 Million | 1 Million |
OSPF instances | 400 | 400 | 400 |
OSPF routes | 1 Million | 1 Million | 1 Million |
RIP v1/v2 instances | 50 | 50 | 50 |
RIP v2 table size | 30,000 | 30,000 | 30,000 |
Dynamic routing | Yes | Yes | Yes |
Static routes | Yes | Yes | Yes |
Source-based routing | Yes | Yes | Yes |
Policy-based routing | Yes | Yes | Yes |
Equal cost multipath (ECMP) | Yes | Yes | Yes |
Reverse path forwarding (RPF) | Yes | Yes | Yes |
Multicast | Yes | Yes | Yes |
IPv6 | |||
Firewall/stateless filters | Yes | Yes | Yes |
Dual-stack IPv4/IPv6 firewall | Yes | Yes | Yes |
RIPng | Yes | Yes | Yes |
BFD, BGP | Yes | Yes | Yes |
ICMPv6 | Yes | Yes | Yes |
OSPFv3 | Yes | Yes | Yes |
Class of service (CoS) | Yes | Yes | Yes |
Mode of Operation | |||
Layer 2 (transparent) mode | Yes | Yes | Yes |
Layer 3 (route and/or NAT) mode | Yes | Yes | Yes |
IP Address Assignment | |||
Static | Yes | Yes | Yes |
Dynamic Host Configuration Protocol (DHCP) | Yes | Yes | Yes |
Internal DHCP server | Yes | Yes | Yes |
DHCP relay | Yes | Yes | Yes |
Traffic Management Quality of Service (QoS) | |||
Maximum bandwidth | Yes | Yes | Yes |
RFC2474 IP Diffserv in IPv4 | Yes | Yes | Yes |
Firewall filters for CoS | Yes | Yes | Yes |
Classification | Yes | Yes | Yes |
Scheduling | Yes | Yes | Yes |
Shaping | Yes | Yes | Yes |
Intelligent Drop Mechanisms (WRED) | Yes | Yes | Yes |
Three-level scheduling | Yes | Yes | Yes |
Weighted round robin for each level of scheduling | Yes | Yes | Yes |
Priority of routing protocols | Yes | Yes | Yes |
Traffic management/policing in hardware | Yes | Yes | Yes |
High Availability (HA) | |||
Active/passive, active/active | Yes | Yes | Yes |
Unified in-service software upgrade (unified ISSU) | Yes | Yes | Yes |
Configuration synchronization | Yes | Yes | Yes |
Session synchronization for firewall and IPsec VPN | Yes | Yes | Yes |
Session failover for routing change | Yes | Yes | Yes |
Device failure detection | Yes | Yes | Yes |
Link and upstream failure detection | Yes | Yes | Yes |
Dual control links | Yes | Yes | Yes |
Interface link aggregation/Link Aggregation Control Protocol (LACP) | Yes | Yes | Yes |
Redundant fabric links | Yes | Yes | Yes |
Management | |||
WebUI (HTTP and HTTPS) | Yes | Yes | Yes |
Command line interface (console, telnet, SSH) | Yes | Yes | Yes |
Juniper Security Director Cloud | Yes | Yes | Yes |
Administration | |||
Local administrator database support | Yes | Yes | Yes |
External administrator database support | Yes | Yes | Yes |
Restricted administrative networks | Yes | Yes | Yes |
Root admin, admin, and read-only user levels | Yes | Yes | Yes |
Software upgrades | Yes | Yes | Yes |
Configuration rollback | Yes | Yes | Yes |
Logging/Monitoring | |||
Structured syslog | Yes | Yes | Yes |
SNMP (v2 and v3) | Yes | Yes | Yes |
Traceroute | Yes | Yes | Yes |
Certifications | |||
Safety certifications | Yes | Yes | Yes |
Electromagnetic Compatibility (EMC) certifications | Yes | Yes | Yes |
RoHS2 Compliant (European Directive 2011/65/EU) | Yes | Yes | Yes |
NIST FIPS-140-2 Level 2 | Yes | Yes | Yes |
Common Criteria NDPP+TFFW EP + VPN EP | Yes | Yes | Yes |
USGv6 | Yes | Yes | Yes |
Dimensions and Power | |||
Dimensions (W x H x D) | 17.45 x 8.7 x 24.5 in
(44.3 x 22.1 x 62.2 cm) |
17.5 x 14 x 23.8 in
(44.5 x 35.6 x 60.5 cm) |
17.5 x 27.8 x 23.5 in
(44.5 x 70.5 x 59.7 cm) |
Weight | Fully configured 128 lb (58.1 kg) |
Fully Configured: 180 lb (81.7 kg) |
Fully Configured: 334 lb (151.6 kg) |
Power supply (AC) | 100 to 240 VAC | 100 to 240 VAC | 200 to 240 VAC |
Power supply (DC) | -40 to -60 VDC | -40 to -60 VDC | -40 to -60 VDC |
Maximum power | 4,100 watts (AC high capacity) |
4,100 watts (AC high capacity) | 8,200 watts (AC high capacity) |
Typical Power | 1540 watts | 2440 watts | 5015 watts, 10200 Watts (AC/DC), 200-305 VAC, 200-410 VDC |
Environmental | |||
Operating temperature ā long term | 41Ā° to 104Ā° F (5Ā° to 40Ā° C) | 41Ā° to 104Ā° F (5Ā° to 40Ā° C) | 41Ā° to 104Ā° F (5Ā° to 40Ā° C |
Humidity ā long term | 5% to 85% noncondensing | 5% to 85% noncondensing | 5% to 85% noncondensing |
Humidity ā short term | 5% to 93% noncondensing but not to exceed 0.026 kg water/kg of dry air | 5% to 93% noncondensing but not to exceed 0.026 kg water/kg of dry air | 5% to 93% noncondensing but not to exceed 0.026 kg water/kg of dry air |
Low Price Guarantee:
Compulease Networks will ensure that you receive the best possible quote & try to match your target price.
100% Money Back Guarantee:
If our products donāt meet the quality standards or expectations we offer a full and final refund.
Professional Technical Support
Our experienced technical team can provide you with support over the phone, chat, email or on site.
Genuine & Original Equipments
Be it New or Refurbished Compulease Networks guarantees you with original OEM hardware equipments.
Warranty Terms & Conditions
New - 1-3 Year Warranty | Refurbished - 90 Days Standard ( Extendable up-to 1 Year )
RELATED PRODUCTS
Order Procedure
1. Email Us Or Click on Get Quote button in the product page
Send an email to marketing@rentalnetworks.com
2. Provide Your Information
In your email, please include: ā¢ Your name ā¢ Your contact number ā¢ The product you are interested in
3. Receive Details
After we receive your email, we will send you an email with our: ā¢ Our banking information ā¢ Images of the product ā¢ The product test report
4. Make Your Payment
Once you review the information, please proceed with your payment
5. Product Shipment
After we confirm your payment, we will ship your products from our center. If you have any questions, feel free to reach out! Thank you for your order.