Firewall Throughput (Packet per Second):
۴۹.۵ Mpps
Firewall Latency (64 byte, UDP):
۳µs
IPsec VPN Throughput (512 byte):
۲۵ Gbps
IPS Throughput:
۸ Gbps
Antivirus Throughput:
۳.۵ Gbps
Redundant Power Supplies:
Yes
Hardware Accelerated GE SFP Slots:
۱۶
Hardware Accelerated GE RJ45 Ports:
۱۶
company
Fortinet
Palo Alto
Palo Alto
cisco
Firewall throughput (HTTP/appmix)
۳.۸/۳.۲Gbps
Threat Prevention throughput (HTTP/appmix)b
۱.۶/۱.۷Gbps
IPsec VPN throughput
۲.۲Gbps
۵۰۰Mbps
Max sessions
۳۰۰,۰۰۰
۱۹۲,۰۰۰
New sessions per secondd
۵۲,۰۰۰
Firewall throughput (App-ID)
۲/۲Gbps
Threat prevention throughput
۷۸۰/۱۰۰۰Mbps
New sessions per second
۱۳,۰۰۰
Throughput: Firewall (FW) + Application Visibility and Control (AVC)(1024B)
۷۰ Gbps
Throughput: FW + AVC + Intrusion Prevention System (IPS (1024B)
۶۴ Gbps
Maximum concurrent sessions, with AVC
۳۵ million
Maximum new connections per second, with AVC
۴۹۰K
TLS (Hardware Decryption)
۱۲ Gbps
Throughput: NGIPS (1024B)
۷۳ Gbps
IPSec VPN throughput (1024B TCP w/Fastpath)
۲۷ Gbps
URL filtering: number of categories
More than 80
URL filtering: number of URLs categorized
More than 280 million
Stateful inspection firewall throughput
۸۰ Gbps
Stateful inspection firewall throughput (multiprotocol)
۶۴ Gbps
Concurrent firewall connections
۶۰ million
Firewall latency (UDP 64B microseconds)
۳.۵
New connections persecond
۲ million
IPsec VPN throughput (450B UDP L2L test)
۳۰ Gbps
MaximumVPN Peers
۲۰,۰۰۰
Security contexts (included; maximum)
۱۰; ۲۵۰
High availability
Active/active and active/standby
Clustering
Up to 16 security modules across up to 16 different Firepower 9300 chassis
Scalability
VPN load balancing, firewall clustering
Adaptive Security Device Manager
Web-based, local management for small-scale deployments
AVC
Standard, supporting more than 4000 applications, as well as geolocations, users, and websites
AVC: OpenAppID support for custom, open-source application detectors
Standard
Cisco Security Intelligence
Standard, with IP, URL, and DNS threat intelligence
Cisco Firepower NGIPS
Available; can passively detect endpoints and infrastructure for threat correlation and Indicators of Compromise (IoC) intelligence