• company
  • Fortinet
    Fortinet
    Palo Alto
    cisco
  • ۱۰/۱۰۰/۱۰۰۰ Interfaces (RJ45 ports)
  • ۴GE RJ45, 4SFP GE
    ۸bypass, 4 SFP GE (non-bypass)


  • ۱۰G BASE-SR SFP+ Ports

  • (۲ bypass)4


  • SSL/TLS Processing
  • Software
    Hardware


  • USB Interfaces
  • ۲
    ۲


  • Storage
  • ۴۸۰GB SSD
    ۲x 2 TB


  • Form Factor
  • ۱U
    ۲U


  • Power Supply
  • Single
    Dual Hot Swappable


  • Throughput
  • ۵۰۰Mbps
    ۵Gbps


  • Latency
  • <5ms
    Sub-ms


  • High Availability
  • Active/Passive, Active/Active Clustering
    Active/Passive, Active/Active Clustering

    Active/active and active/standby
  • Application Licenses
  • Unlimited
    Unlimited


  • Administrative Domains
  • ۳۲
    ۶۴


  • Rack Mountable
  • Yes



  • Power Required
  • ۱۰۰–۲۴۰V AC, 50–۶۰ Hz



  • Maximum Current
  • ۱۰۰V/1.53A, 240V/0.64A



  • Power Consumption (Average)
  • ۱۲۷.۳۳W



  • Heat Dissipation
  • ۵۲۱.۳۸BTU/h



  • Safety Certifications
  • FCC Class A Part 15, RCM, VCCI, CE, UL/CB/cUL



  • Firewall throughput (HTTP/appmix)


  • ۳.۰/۲.۴Gbps

  • Threat Prevention throughput (HTTP/appmix)b


  • ۰.۹/۱.0Gbps

  • IPsec VPN throughput


  • ۱.۶Gbps

  • Max sessions


  • ۲۰۰,۰۰۰

  • New sessions per secondd


  • ۳۹,۰۰۰

  • Throughput: Firewall (FW) + Application Visibility and Control (AVC) (1024B)



  • ۲۵Gbps
  • Throughput: FW + AVC + Intrusion Prevention System (IPS (1024B)



  • ۲۱Gbps
  • Maximum concurrent sessions, with AVC



  • ۳۰Million
  • Maximum new connections per second, with AVC



  • ۱۳۰K
  • TLS (Hardware Decryption)



  • ۷.۵Gbps
  • Throughput: NGIPS (1024B)



  • ۳۰Gbps
  • IPSec VPN throughput (1024B TCP w/Fastpath)



  • ۱۳.۵Gbps
  • AVC



  • Standard, supporting more than 4000 applications, as well as geolocations, users, and websites
  • AVC: OpenAppID support for custom, open-source application detectors



  • Standard
  • Cisco Security Intelligence



  • Standard, with IP, URL, and DNS threat intelligence
  • Cisco Firepower NGIPS



  • Available; can passively detect endpoints and infrastructure for threat correlation and Indicators of Compromise (IoC) intelligence
  • Cisco Advanced Malware Protection (AMP) for Networks



  • Available; enables detection, blocking, tracking, analysis, and containment of targeted and persistent malware, addressing the attack continuum both during and after attacks. Integrated threat correlation with Cisco AMP for Endpoints is also optionally available
  • Cisco AMP Threat Grid sandboxing



  • Available
  • URL filtering: number of categories



  • More than 80
  • URL filtering: number of URLs categorized



  • More than 280 Million
  • Automated threat feed and IPS signature updates



  • Yes: class-leading Collective Security Intelligence (CSI) from the Cisco Talos® group (https://www.cisco.com/c/en/us/products/security/talos.html)
  • Third-party and opensource ecosystem



  • Open API for integrations with third-party products; Snort® and OpenAppID community resources for new and specific threats
  • High availability and clustering



  • Active/standby; up to 6 modules across up to 6 different Firepower 9300 chassis.
  • Cisco Trust Anchor Technologies



  • Cisco Firepower 9300 Series platforms include Trust Anchor Technologies for supply chain and software image assurance.
  • Stateful inspection firewall throughput



  • ۷۵Gbps
  • Stateful inspection firewall throughput (multiprotocol)



  • ۵۰Gbps
  • Concurrent firewall connections



  • ۵۵Million
  • Firewall latency (UDP 64B microseconds)



  • ۳.۵
  • New connections per second



  • ۸۰۰,۰۰۰
  • IPsec VPN throughput (450B UDP L2L test)



  • ۱۵Gbps
  • Maximum VPN Peers



  • ۲۰,۰۰۰
  • Security contexts (included; maximum)



  • ۱۰;۲۵۰
  • High availability
  • Active/Passive, Active/Active Clustering
    Active/Passive, Active/Active Clustering

    Active/active and active/standby
  • Clustering



  • Up to 16 security modules across up to 16 different Firepower 9300 chassis
  • Scalability



  • VPN load balancing, firewall clustering
  • Centralized management



  • Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager or alternatively in the cloud with Cisco Defense Orchestrator
  • Adaptive Security Device Manager



  • Web-based, local management for small-scale deployments
محصولی برای مقایسه وجود ندارد.