My concern with LACP is the entire logical bundle getting assigned to the same processing unit. That's why I mentioned ECMP from the MX. That way traffic will be spread across L3 interfaces. Again, I don't know the internal architecture of the SRX4600 but my guess is that would give you a better chance of getting things balanced. Plus, the platform may have restrictions as to which ports can be bundled together.
As for FPC 0, the name lists "SPM" which is likely Services Processing Module. Again, without a clear diagram of the internal architecture, we should avoid drawing conclusions.
Original Message:
Sent: 10-21-2025 19:44
From: Emre KOCAOGLU
Subject: Inquiry Regarding L3/L4 DDoS Mitigation Capabilities of Juniper SRX Devices
Thank you very much for your reply. The idea of applying this kind of scenario by distributing the load to the other interface via LACP sounds reasonable. Also, when I checked I see there are no modules in FPC 0. Maybe that isn't the problem. At the moment I don't have a test attack of 5M+ PPS available. If one of my customers receives such an attack, I will move the load onto the SRX and perform the checks during the attack.
Here no active ports are visible on FPC 0. Maybe the logs I took earlier are not related to the issue I experienced. I will send another message after I perform the necessary checks during an attack. Thank you very much.
------------------------------
Emre KOCAOGLU
Original Message:
Sent: 10-21-2025 18:59
From: Nikolay Semov
Subject: Inquiry Regarding L3/L4 DDoS Mitigation Capabilities of Juniper SRX Devices
Something still doesn't make sense to me ...
The datasheet quotes 400 gbps throughput ... If we're generous and take that number to be for 1518-byte packets (even though they quote the same performance for IMIX), that still translates to 30M+ PPS.
In a normal flow (i.e. traffic is allowed) -- there's input checks, check session table (session found), screens, output checks, and out it goes.
In your flow (no-session non-syn tcp) -- there's input checks, check session table (session not found), check TCP flags and drop the packet.
I can't imagine your flow is that much more complex than a normal flow. If datasheets are to be believed, the firewall should be able to do your flow 30M times per second. But let's be generous and say that your flow of seeing the missing SYN flag and dropping the packet is twice as complex as a normal established-session forwarding flow, still you'd want to see 15M pps drop rate.
What I suspect is that the quoted numbers in the datasheet are aggregate across all various components of the box for a total of 30M pps. It's safe to assume that measurement is taken under ideal conditions -- load is balanced across all the various NPUs, SPUs, or whatever.
I imagine that in your case, you're just blasting the box with small (3gbps at 5M pps ~= 75 bytes) NOT-SYN TCP packets on the same port, which then goes to the same NPU / SPU / thread / etc. (I can't easily find the internal architecture of the SRX4600; I'm assuming it has multiple of those, but who knows).
I wonder ... what if you establish multiple connections from the MX to the SRX with ECMP and set source-ip-only-based load-balancing on the MX side. The hope is that spreading the 5M PPS over multiple interfaces / cards / NPUs / SPUs / threads / whatever may get you better overall aggregate performance on the SRX ...
------------------------------
Nikolay Semov
Original Message:
Sent: 10-21-2025 17:01
From: Emre KOCAOGLU
Subject: Inquiry Regarding L3/L4 DDoS Mitigation Capabilities of Juniper SRX Devices
I think I captured a log that might point to the root cause. In the historical logs I see the following output:
Oct 20 17:54:28 SRX4600-FW PERF_MON: RTPERF_CPU_THRESHOLD_EXCEEDED: FPC 0 PIC 0 CPU utilization exceeds threshold, current value = 99
Oct 20 17:54:28 SRX4600-FW PERF_MON: RTPERF_CPU_UTIL_MAX: FPC 0 PIC 0 CPU Utilization greater than 99, expect packet loss
I suspect a component on the line card that drops packets is getting saturated at high PPS. Yet I can drop the same attack without issues on my software-based OEM server (which I use as a firewall) that cost me $1,000 USD.
------------------------------
Emre KOCAOGLU
Original Message:
Sent: 10-21-2025 16:22
From: Nikolay Semov
Subject: Inquiry Regarding L3/L4 DDoS Mitigation Capabilities of Juniper SRX Devices
Ok, while the control plane CPU was pretty much idle, maybe the data plane was being overwhelmed. For the same reasons you mentioned, low CPU utilization don't mean the device is not reaching its capacity. What utilization does "show chassis forwarding" show?
------------------------------
Nikolay Semov
Original Message:
Sent: 10-21-2025 16:06
From: Emre KOCAOGLU
Subject: Inquiry Regarding L3/L4 DDoS Mitigation Capabilities of Juniper SRX Devices
Total usage: 0.1%, Idle CPU: 99.9%
There's actually nothing surprising about this. In stateless firewalls, load isn't handed to the processor until a session is successfully opened. In a typical scenario, an ACK packet that doesn't start with a SYN is dropped by the screen rules and never enters the session table, so it doesn't create CPU load. What I can't understand is what causes problems during an attack attempt that exceeds 5M+ PPS, even though the packets don't reach the CPU and don't fill the session table. My guess is that the screen architecture can only withstand up to that level.
------------------------------
Emre KOCAOGLU
Original Message:
Sent: 10-21-2025 15:59
From: Nikolay Semov
Subject: Inquiry Regarding L3/L4 DDoS Mitigation Capabilities of Juniper SRX Devices
It'd be interesting to see some of the configuration under test and the direct data you've observed. For example, 0.1% CPU usage at 5M+ PPS seems odd; was that control plane usage, data plane usage, or the sum of both?
------------------------------
Nikolay Semov
Original Message:
Sent: 10-21-2025 15:39
From: Emre KOCAOGLU
Subject: Inquiry Regarding L3/L4 DDoS Mitigation Capabilities of Juniper SRX Devices
Hello everyone again,
I have set up the structure I mentioned in the thread, and it is currently active. Although the SRX has some capacity issues, I observed that, contrary to what is stated on paper, it cannot deliver the desired performance even at lower capacities. The biggest problem with the device is that the SYN-cookie feature does not work. When you enable the proxy or cookie feature for SYN packets, the expected behavior should be that the SRX sends SYN+ACK packets for SYN packets and successfully completes the ACK handshake with responding IPs. However, when this feature is enabled and tested with a SYN attack, all new SYN packets are blocked, which also prevents legitimate traffic from passing. Therefore, I observed that this feature does not work.
Another point is that when we tested attacks other than SYN, the device handled 3–4 million PPS attack tests without issues. But when the attack packet size rises to around 5M+ PPS, even though the session table has no load and the CPU is only at 0.1% usage, the device completely blocks legitimate traffic as well. Presumably, it cannot drop attacks of this scale due to capacity limits.
I have conducted numerous configuration tests over a long period, but overall, the device's protection layers-SYN, SYN+ACK, ACK-seem only focused on blocking traffic. Stateless firewall devices should be successful at distinguishing between legitimate and illegitimate traffic. I can't tell if I did something wrong. What causes the device to block traffic in an attack that creates no load on the session table or CPU, just because the packet rate exceeds 5M+ PPS (and the total size is only 2–3 Gbps)? I set up this system based on the device's datasheet numbers, spending thousands of dollars, but I guess I did not make the right choice for DDoS mitigation.
I wanted to write this to inform everyone. I would be glad to read messages from anyone who has thoughts on this. Thank you all very much.
------------------------------
Emre KOCAOGLU
Original Message:
Sent: 04-22-2025 12:17
From: Nikolay Semov
Subject: Inquiry Regarding L3/L4 DDoS Mitigation Capabilities of Juniper SRX Devices
Not at all. I'm simply pointing out a DDoS mitigation feature in the SRX. I just don't have the hard numbers you're seeking to draw a conclusion one way or the other.
------------------------------
Nikolay Semov
Original Message:
Sent: 04-22-2025 11:54
From: Emre KOCAOGLU
Subject: Inquiry Regarding L3/L4 DDoS Mitigation Capabilities of Juniper SRX Devices
Nikolay Semov, I have reviewed your message. From your correspondence, I understand that you have doubts about whether the SRX4600 device can provide effective protection against DDoS attacks. Thank you for the document you shared. Indeed, you've provided documentation indicating that even traffic which does not result in a session can still consume the device's CPU resources. In that case, would it be fair to say that I may have not selected the right device?
------------------------------
Emre KOCAOGLU
Original Message:
Sent: 04-22-2025 11:12
From: Nikolay Semov
Subject: Inquiry Regarding L3/L4 DDoS Mitigation Capabilities of Juniper SRX Devices
An interesting relatively recent feature related to DDoS mitigation, should you end up going with the SRX:
https://supportportal.juniper.net/s/article/SRX-About-drop-flow
------------------------------
Nikolay Semov
Original Message:
Sent: 04-21-2025 11:30
From: Emre KOCAOGLU
Subject: Inquiry Regarding L3/L4 DDoS Mitigation Capabilities of Juniper SRX Devices
Thank you for your insights, Nikolay Semov.
I'm fully aware that a 30-second timeout for tracking SYN packets is quite excessive, and I do intend to progressively reduce this value. The SRX4600, from a technical standpoint, supports stateful inspection and appears capable of performing proper TCP handshake tracking (SYN => SYN+ACK => ACK). Therefore, it should theoretically be able to identify out-of-state ACK packets-such as those involved in an ACK flood attack-by recognizing the absence of an initial SYN and referencing its session/state table to determine whether to drop such packets.
Unfortunately, Juniper firewalls are not widely adopted in my region, and there are very few professionals who actively work with them-myself included. For this reason, I highly value feedback from experienced individuals like yourself. I'm specifically looking for confirmation from those who have utilized this model (or similar ones) for L3/L4 DDoS mitigation, to validate whether my proposed approach is technically sound.
While the SRX4600 appears to deliver strong capabilities for its price based on the official datasheet, it is not considered a low-cost device by any means. Given that we are based in Asia and the USD is a significantly valued currency here, careful consideration and thorough research are essential before investing in hardware priced in USD. From what I can gather through technical comparisons, the SRX4600 currently stands out as one of the most capable devices available within this price range for the architecture I intend to implement.
------------------------------
Emre KOCAOGLU
Original Message:
Sent: 04-20-2025 18:23
From: Nikolay Semov
Subject: Inquiry Regarding L3/L4 DDoS Mitigation Capabilities of Juniper SRX Devices
Ah, so it sounds like your concern is with traffic that doesn't belong to an existing session, rather than, or in addition to, lots of sessions being initiated with incomplete handshakes. I don't have answers, unfortunately, but this is an interesting situation. My guess is that the 500,000 connections per second quoted in the datasheet is for establishing sessions. I suspect that the device can drop more invalid TCP packets than that, but I don't know.
If nobody answers here, you should reach out to Juniper directly. They may be able to bench out your scenario and see how much invalid TCP traffic they can throw at the SRX before it starts sputtering.
I think you're being very generous with the 30 seconds for handshake completion. The default on the SRX is 20 seconds, and you can set it as low as 4 seconds. https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/security-edit-tcp-initial-timeout.html#:~:text=Define%20the%20length%20of%20time%20(in%20seconds),data%20transmission%20to%20finish%20a%20TCP%20connection.
------------------------------
Nikolay Semov
Original Message:
Sent: 04-20-2025 05:09
From: Emre KOCAOGLU
Subject: Inquiry Regarding L3/L4 DDoS Mitigation Capabilities of Juniper SRX Devices
Dear Nikolay Semov,
First of all, thank you for your response. I believe there was some confusion due to my inability to clearly convey the intended architecture. Currently, I do not own a Juniper SRX4600 device. The Juniper MX204 is performing quite well in my current setup and is meeting most of our expectations.
However, the limitation with the MX204 is its inability to perform session tracking for TCP traffic. Since it is a router, it handles UDP traffic effectively using well-crafted filters, but it lacks the capability to determine whether incoming TCP packets are part of legitimate connections. For example, during a volumetric DDoS attack, when an ACK packet is received, the MX204 cannot verify whether prior SYN or SYN+ACK packets exist, as it does not maintain a session table. Therefore, it cannot accurately differentiate between malicious and legitimate traffic.
To perform such analysis, a stateful firewall that supports session tracking is required. While I currently use another device for this purpose, it does not have the same capabilities as the SRX4600, especially under high-volume SYN or ACK attacks. As a result, the CPU on the device following the MX204 becomes a bottleneck.
In my planned network architecture, I aim to position a Juniper SRX4600 between the MX204 and the firewall device that currently mitigates botnet attacks. The goal is to implement the following:
Continue using the MX204 with basic rules to filter UDP traffic.
Offload TCP traffic to the SRX4600, utilizing its high session capacity to perform full three-way handshake validation and distinguish between legitimate and illegitimate connections-dropping suspicious traffic directly at the SRX4600.
For scenarios where attacks such as SYN floods could potentially exceed the SRX4600's session-per-second capabilities, implement rate-limit policies on the MX204 to optimize SRX4600 resource usage effectively.
Additionally, while the SRX4600 supports tracking up to 60 million sessions, a timeout mechanism will be essential. Even if it processes 500,000 sessions per second, sessions that do not complete the SYN, SYN+ACK, and ACK sequence within ~30 seconds will need to be timed out to prevent session table saturation. It is worth noting that 60 million sessions is well beyond our current usage levels.
In summary, by incorporating the SRX4600 into the architecture, I intend to enhance an already effective DDoS protection system. Insights from those experienced with deploying SRX-series devices at this level would be highly valuable to me, especially regarding whether the SRX4600 is a suitable choice for this scenario.
------------------------------
Emre KOCAOGLU
Original Message:
Sent: 04-19-2025 23:44
From: Nikolay Semov
Subject: Inquiry Regarding L3/L4 DDoS Mitigation Capabilities of Juniper SRX Devices
Out of curiosity, what are the specific (types of) attacks that are causing your performance problems downstream? I'm just wondering if it's something that the SRX can screen out that the MX can't filter out.
I'm not sure what "well-configured" means but if the SRX can't screen out the attack (i.e. the attack looks like legitimate traffic), then your downstream infrastructure will be no better off if the SRX can handle the volume.
The datasheet for the SRX4600 mentions 570,000 connections per second, by the way. If they're all considered valid, you'll reach the 60,000,000 session limit in less than two minutes of such a sustained rate of new connections...
------------------------------
Nikolay Semov
Original Message:
Sent: 04-19-2025 11:15
From: Emre KOCAOGLU
Subject: Inquiry Regarding L3/L4 DDoS Mitigation Capabilities of Juniper SRX Devices
Dear Community,
Greetings to all. We are a data center that utilizes Juniper routers and switches across our entire network infrastructure. To protect against potential L3/L4 DDoS threats originating from outside the country, we are currently using a secure uplink service through a GRE tunnel in partnership with Serverius. However, we are now considering the implementation of the Juniper SRX4600 device to mitigate potential attacks originating from within the country.
We are seeking insights from professionals with in-depth experience in Juniper SRX devices who can help us assess whether this would be a suitable and effective decision.
Currently, the initial entry point of our traffic is the Juniper MX204. On this device, we apply several policies to filter a significant portion of the traffic and manage UDP and TCP flows through different scenarios at the lower layers. However, we have begun to experience performance degradation when high-volume TCP attacks reach the lower layers of the infrastructure.
For this reason, we are planning to continue filtering traffic downstream of the MX204 using the SRX4600, with the goal of efficiently and reliably mitigating harmful traffic. Domestic attack volumes typically do not exceed 5–10 Gbps. Based on the datasheet, the SRX4600 appears capable of handling such volumes without issue. However, we are interested in understanding whether it can deliver this level of performance-or something close to it-in real-world scenarios.
In summary, is there anyone who can provide insight or a reasonable expectation of how a well-configured SRX4600 would perform in the event of a 40–100 Gbps TCP-based volumetric attack? We do not have any concerns related to Layer 7 traffic, and thus we intend to configure the SRX4600 exclusively for L3/L4 protection, with all other features disabled.
Given its capacity of 650,000 sessions per second and 60 million concurrent sessions, can we rely on the SRX4600? Has anyone observed similar real-world performance figures?
Best regards,
------------------------------
Emre KOCAOGLU
------------------------------