• company
  • juniper
    f5
    Fortinet
    cisco
  • Firewall Throughput (Packet per Second)


  • ۲.۲Mpps

  • IPS Throughput


  • ۲۰۰ Gbps

  • SSL -VPN Throughput


  • ۳۰Mbps

  • Firewall Policies


  • ۵,۰۰۰

  • Virtual Domains (Default / Maximum)


  • ۱۰/۱۰

  • GE RJ45 Internal Ports


  • ۵

  • GE RJ45 WAN Ports


  • ۲

  • GE RJ45 PoE Ports


  • ۲

  • Wireless Interface




  • USB Ports (Client / Server)


  • ۱/۱

  • Throughput: Firewall (FW) + Application Visibility and Control (AVC)(1024B)



  • ۵۰Gbps
  • Throughput: FW + AVC + Intrusion Prevention System (IPS (1024B)



  • ۴۳Gbps
  • Maximum concurrent sessions, with AVC



  • ۳۰million
  • Maximum new connections per second, with AVC



  • ۲۹۵K
  • TLS (Hardware Decryption)



  • ۱۰Gbps
  • Throughput: NGIPS (1024B)



  • ۵۷Gbps
  • IPSec VPN throughput (1024B TCP w/Fastpath)



  • ۱۷Gbps
  • URL filtering: number of categories



  • More than 80
  • URL filtering: number of URLs categorized



  • More than 280 million
  • Stateful inspection firewall throughput



  • ۸۰Gbps
  • Stateful inspection firewall throughput (multiprotocol)



  • ۶۰Gbps
  • Concurrent firewall connections



  • ۶۰million
  • Firewall latency (UDP 64B microseconds)



  • ۳.۵
  • New connections persecond



  • ۱.۸million
  • IPsec VPN throughput (450B UDP L2L test)



  • ۲۰Gbps
  • MaximumVPN Peers



  • ۲۰,۰۰۰
  • Security contexts (included; maximum)



  • ۱۰; ۲۵۰
  • Clustering



  • Up to 16 security modules across up to 16 different Firepower 9300 chassis
  • Scalability



  • VPN load balancing, firewall clustering
  • Centralized management



  • Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager or alternatively in the cloud with Cisco Defense Orchestrator
  • Adaptive Security Device Manager



  • Web-based, local management for small-scale deployments
  • Cisco Security Intelligence



  • Standard, with IP, URL, and DNS threat intelligence
  • Cisco Firepower NGIPS



  • Available; can passively detect endpoints and infrastructure for threat correlation and Indicators of Compromise (IoC) intelligence
محصولی برای مقایسه وجود ندارد.