SRX5800X-BASE2
SRX5800-PWRHC-AC-U
SRX5800-PWRHC-DC-U Original price was: $26,423.98.Current price is: $13,211.99.
Back to products
SRX5800X-BASE2
SRX5800X-BASE2-TAA Original price was: $149,945.32.Current price is: $74,972.66.

SRX5800X-BASE2

Original price was: $144,701.76.Current price is: $72,350.88.

The Juniper NetworksĀ®Ā SRX5400,Ā SRX5600, andĀ SRX5800Ā are next-generation firewalls (NGFWs) that deliver industry-leading threat protection, high performance, six nines reliability and availability, scalability, and services integration.

  • Manufacturer Number: Juniper
  • Part Number: SRX5800X-BASE2
  • Model Description: SRX5800X CONFIGURED: RE3, 2XSCB4, 2XPEM
  • Product Can Be: Array
  • Rating:
  • Availability: In Stock
  • Warranty: New- 1 Year
  • Condition: New
  • -->
  • Product Description: SRX5800 Configuration includes: Chassis, enhanced midplane, SRX5K-RE3-128G, 2xSRX5K-SCB4, 2xHC PEM, 2xHC fan tray; Supported by JUNOS release 19.3R1 onwards
  • Manufacturer: Juniper
  • Part Number: SRX5800X-BASE2
  • Model Description: SRX5800X CONFIGURED: RE3, 2XSCB4, 2XPEM
  • Rating:
  • Product Can Be: Bought , Rented ,
  • Availability: In Stock
  • Also Available In: Used, Ref, NOB
  • Condition: New
  • Warranty: New- 1 Year

24/7 Online Service

USA- +1- 860-730-3336
UK- +1- 860-730-3336

The SRX Series next-generation firewalls are built for largeĀ enterprise data centers,Ā service providerĀ infrastructure, and public sector networks. With a modular architecture and high-performance line cards, the SRX Series firewalls are open, scalable security platforms with flexible connectivity options and service integration. The award-winning SRX Series is powered byĀ JunosĀ OS, the same industry-leading operating system that keeps the worldā€™s largest data center networks available, manageable, and secure.

SRX5400 SRX5600 SRX5800
Maximum Performance and Capacity1
Junos OS version tested Junos OS 21.2 Junos OS 21.2 Junos OS 21.2
Firewall Performance, IMIX 960 Gbps 1.44 Tbps 3.36 Tbps
Maximum performance per chassis 960 Gbps 1440 Tbps 3.36 Tbps
Next-Generation Datacenter Firewall Performance2 136 Gbps 194 Gbps 504 Gbps
Secure Web Access Firewall Performance3 75 Gbps 107 Gbps 277 Gbps
Latency (stateful firewall) ~11Āµsec ~11Āµsec ~11Āµsec
IPsec VPN AES-256-GCM (IMIX) 188 Gbps 269 Gbps 699 Gbps
Maximum IPS performance 172 Gbps 245 Gbps 638 Gbps
Maximum concurrent sessions 91 Million 182 Million 338 Million
New sessions/second (sustained, tcp, 3way, firewall NAT) 1.7/1 Million 3.4/2 Million 6.3/4 Million
Maximum users supported Unrestricted Unrestricted Unrestricted
Network Connectivity
IOC4 options (SRX5K-IOC4-MRAT; SRX5K-IOC4-10G) 40x1GbE SFP+ and 40x10GbE SFP+Ā or 12xQSFP+/QSFP28 multirate
IOC3 options (SRX5K-MPC3-100G10G; SRX5K-MPC3-40G10G) 2x100GbE CFP2 and 4x10GbE SFP+ or 6x40GbE QSFP+ and 24x10GbE SFP+
Firewall
Network attack detection Yes Yes Yes
DoS and distributed denial of service (DDoS) protection Yes Yes Yes
TCP reassembly for fragmented packet protection Yes Yes Yes
Brute force attack mitigation Yes Yes Yes
SYN cookie protection Yes Yes Yes
Zone-based IP spoofing Yes Yes Yes
Malformed packet protection Yes Yes Yes
IPsec VPN
Site-to-site tunnels 15,000 15,000 15,000
Tunnel interfaces 15,000 15,000 15,000
Number of remote access / SSL VPN (concurrent) users 25,000 40,000 50,000
Tunnels Site-to-Site, Hub and Spoke, Dynamic Endpoint, AutoVPN, ADVPN, Group VPN (IPv4 / IPv6 / Dual Stack)
Ā Internet Key Exchange IKEv1, IKEv2
Configuration Payload Yes Yes Yes
IKE Authentication Algorithms MD5, SHA1, SHA-256, SHA-384, SHA-512
IKE Encryption Algorithms Prime, DES-CBC, 3DES-CBC, AEC-CBC, AES-GCM, SuiteB
Authentication Pre-shared key and public key infrastructure (PKI X.509)
IPsec (Internet Protocol Security) Authentication Header (AH) / Encapsulating Security Payload (ESP) protocol
Perfect forward secrecy Yes
IPsec Authentication Algorithms hmac-md5, hmac-sha-196, hmac-sha-256, hmac-sha-384, hmac-sha-512
IPsec Encryption Algorithms Prime, DES-CBC, 3DES-CBC, AEC-CBC, AES-GCM, SuiteB
Monitoring Standard-based Dead peer detection (DPD), VPN monitoring
Prevent replay attack Yes Yes Yes
VPNs (GRE, IP-in-IP, MPLS) Yes Yes Yes
Redundant VPN gateways Yes Yes Yes
Intrusion Prevention System (IPS)
Signature-based and customizable (via templates) Yes Yes Yes
Active/active traffic monitoring Yes Yes Yes
Stateful protocol signatures Yes Yes Yes
Attack detection mechanisms Stateful signatures, protocol anomaly detection (zero-day coverage), application identification Stateful signatures, protocol anomaly detection (zero-day coverage), application identification Stateful signatures, protocol anomaly detection (zero-day coverage), application identification
Attack response mechanisms Drop connection, close connection, session packet log, session summary, e-mail Drop connection, close connection, session packet log, session summary, e-mail Drop connection, close connection, session packet log, session summary, e-mail
Attack notification mechanisms Structured system logging Structured system logging Structured system logging
Worm protection Yes Yes Yes
Simplified installation through recommended policies Yes Yes Yes
Trojan protection Yes Yes Yes
Spyware/adware/keylogger protection Yes Yes Yes
Advanced malware protection Yes Yes Yes
Protection against attack proliferation from infected systems Yes Yes Yes
Reconnaissance protection Yes Yes Yes
Request and response side attack protection Yes Yes Yes
Compound attacksā€”combines stateful signatures and protocol anomalies Yes Yes Yes
Custom attack signatures creation Yes Yes Yes
Contexts accessible for customization 600+ 600+ 600+
Attack editing (port range, other) Yes Yes Yes
Stream signatures Yes Yes Yes
Protocol thresholds Yes Yes Yes
Stateful protocol signatures Yes Yes Yes
Frequency of updates Daily and emergency Daily and emergency Daily and emergency
Content Security
Antivirus Yes Yes Yes
Content filtering Yes Yes Yes
Enhanced Web filtering Yes Yes Yes
Redirect Web filtering Yes Yes Yes
Antispam Yes Yes Yes
AppSecure
AppTrack (application visibility and tracking) Yes Yes Yes
AppFirewall (policy enforcement by application name) Yes Yes Yes
AppQoS (network traffic prioritization by application name) Yes Yes Yes
User-based application policy enforcement Yes Yes Yes
GPRS Security
GPRS stateful firewall Yes Yes Yes
Destination Network Address Translation
Destination NAT with Port Address Translation (PAT) Yes Yes Yes
Destination NAT within same subnet as ingress interface IP Yes Yes Yes
Destination addresses and port numbers to one single address and a specific port number (M:1P) Yes Yes Yes
Destination addresses to one single address (M:1) Yes Yes Yes
Destination addresses to another range of addresses (M:M) Yes Yes Yes
Source Network Address Translation
Static Source NATā€”IP-shifting Dynamic Internet Protocol (DIP) Yes Yes Yes
Source NAT with PATā€”port translated Yes Yes Yes
Source NAT without PATā€”fix port Yes Yes Yes
Source NATā€”IP address persistency Yes Yes Yes
Source pool grouping Yes Yes Yes
Source pool utilization alarm Yes Yes Yes
Source IP outside of the interface subnet Yes Yes Yes
Interface source NATā€”interface DIP Yes Yes Yes
Oversubscribed NAT pool with fallback to PAT when the address pool is exhausted Yes Yes Yes
Symmetric NAT Yes Yes Yes
Allocate multiple ranges in NAT pool Yes Yes Yes
Proxy Address Resolution Protocol (ARP) for physical port Yes Yes Yes
Source NAT with loopback groupingā€”DIP with loopback grouping Yes Yes Yes
User Authentication and Access Control
Built-in (internal) database Yes Yes Yes
RADIUS accounting Yes Yes Yes
Web-based authentication Yes Yes Yes
Public Key Infrastructure (PKI) Support
PKI certificate requests (PKCS 7, PKCS 10, and CMPv2) Yes Yes Yes
Automated certificate enrollment (SCEP) Yes Yes Yes
Certificate authorities supported Yes Yes Yes
Self-signed certificates Yes Yes Yes
Virtualization
Maximum custom routing instances with data plane separation 2000 2000 2000
Maximum security zones 2000 2000 2000
Maximum virtual firewalls with data plane and administrative separation (logical/tenant systems) 500 500 500
Additional off-platform virtual firewall option with Juniper Networks vSRX Virtual Firewall (VM based) Unlimited Unlimited Unlimited
Maximum number of VLANs 4096 4096 4096
Routing
BGP instances 1000 1000 1000
BGP peers 2000 2000 2000
BGP routes 1 Million 1 Million 1 Million
OSPF instances 400 400 400
OSPF routes 1 Million 1 Million 1 Million
RIP v1/v2 instances 50 50 50
RIP v2 table size 30,000 30,000 30,000
Dynamic routing Yes Yes Yes
Static routes Yes Yes Yes
Source-based routing Yes Yes Yes
Policy-based routing Yes Yes Yes
Equal cost multipath (ECMP) Yes Yes Yes
Reverse path forwarding (RPF) Yes Yes Yes
Multicast Yes Yes Yes
IPv6
Firewall/stateless filters Yes Yes Yes
Dual-stack IPv4/IPv6 firewall Yes Yes Yes
RIPng Yes Yes Yes
BFD, BGP Yes Yes Yes
ICMPv6 Yes Yes Yes
OSPFv3 Yes Yes Yes
Class of service (CoS) Yes Yes Yes
Mode of Operation
Layer 2 (transparent) mode Yes Yes Yes
Layer 3 (route and/or NAT) mode Yes Yes Yes
IP Address Assignment
Static Yes Yes Yes
Dynamic Host Configuration Protocol (DHCP) Yes Yes Yes
Internal DHCP server Yes Yes Yes
DHCP relay Yes Yes Yes
Traffic Management Quality of Service (QoS)
Maximum bandwidth Yes Yes Yes
RFC2474 IP Diffserv in IPv4 Yes Yes Yes
Firewall filters for CoS Yes Yes Yes
Classification Yes Yes Yes
Scheduling Yes Yes Yes
Shaping Yes Yes Yes
Intelligent Drop Mechanisms (WRED) Yes Yes Yes
Three-level scheduling Yes Yes Yes
Weighted round robin for each level of scheduling Yes Yes Yes
Priority of routing protocols Yes Yes Yes
Traffic management/policing in hardware Yes Yes Yes
High Availability (HA)
Active/passive, active/active Yes Yes Yes
Unified in-service software upgrade (unified ISSU) Yes Yes Yes
Configuration synchronization Yes Yes Yes
Session synchronization for firewall and IPsec VPN Yes Yes Yes
Session failover for routing change Yes Yes Yes
Device failure detection Yes Yes Yes
Link and upstream failure detection Yes Yes Yes
Dual control links Yes Yes Yes
Interface link aggregation/Link Aggregation Control Protocol (LACP) Yes Yes Yes
Redundant fabric links Yes Yes Yes
Management
WebUI (HTTP and HTTPS) Yes Yes Yes
Command line interface (console, telnet, SSH) Yes Yes Yes
Juniper Security Director Cloud Yes Yes Yes
Administration
Local administrator database support Yes Yes Yes
External administrator database support Yes Yes Yes
Restricted administrative networks Yes Yes Yes
Root admin, admin, and read-only user levels Yes Yes Yes
Software upgrades Yes Yes Yes
Configuration rollback Yes Yes Yes
Logging/Monitoring
Structured syslog Yes Yes Yes
SNMP (v2 and v3) Yes Yes Yes
Traceroute Yes Yes Yes
Certifications
Safety certifications Yes Yes Yes
Electromagnetic Compatibility (EMC) certifications Yes Yes Yes
RoHS2 Compliant (European Directive 2011/65/EU) Yes Yes Yes
NIST FIPS-140-2 Level 2 Yes Yes Yes
Common Criteria NDPP+TFFW EP + VPN EP Yes Yes Yes
USGv6 Yes Yes Yes
Dimensions and Power
Dimensions (W x H x D) 17.45 x 8.7 x 24.5 in

(44.3 x 22.1 x 62.2 cm)

17.5 x 14 x 23.8 in

(44.5 x 35.6 x 60.5 cm)

17.5 x 27.8 x 23.5 in

(44.5 x 70.5 x 59.7 cm)

Weight Fully configured 128 lb
(58.1 kg)
Fully Configured: 180 lb
(81.7 kg)
Fully Configured: 334 lb
(151.6 kg)
Power supply (AC) 100 to 240 VAC 100 to 240 VAC 200 to 240 VAC
Power supply (DC) -40 to -60 VDC -40 to -60 VDC -40 to -60 VDC
Maximum power 4,100 watts
(AC high capacity)
4,100 watts (AC high capacity) 8,200 watts (AC high capacity)
Typical Power 1540 watts 2440 watts 5015 watts, 10200 Watts (AC/DC), 200-305 VAC, 200-410 VDC
Environmental
Operating temperature ā€“ long term 41Ā° to 104Ā° F (5Ā° to 40Ā° C) 41Ā° to 104Ā° F (5Ā° to 40Ā° C) 41Ā° to 104Ā° F (5Ā° to 40Ā° C
Humidity ā€“ long term 5% to 85% noncondensing 5% to 85% noncondensing 5% to 85% noncondensing
Humidity ā€“ short term 5% to 93% noncondensing but not to exceed 0.026 kg water/kg of dry air 5% to 93% noncondensing but not to exceed 0.026 kg water/kg of dry air 5% to 93% noncondensing but not to exceed 0.026 kg water/kg of dry air

Warranty

100% Low Price Guarantee:

compuleasenetworks.com provides high-quality products at low wholesale prices

100% Money Back Guarantee:

If your returns meet our relevent standards,you can contact our customer service team to exchange or return any product that you bought from us.

Flexible Secure Payment & Shipment:

Verified authorization: Mcafee Secure, VeriSign Secured

All items are ORIGINAL and GENUINE only:

Item conditions are all "New Sealed". All items are fully tested with working conditions by Huawei certified engineer under customers' permission.

Professional Technical Support:

Experienced technical team can provide support over the phone, by chat, by email or by remotely login.

RELATED PRODUCTS