• company
  • Palo Alto
    juniper
    Fortinet
    cisco
  • Firewall throughput
  • ۸.۸Gbps



  • Threat Prevention throughput
  • ۴.۷Gbps



  • IPsec VPN throughput
  • ۴.۸Gbps



  • Max sessions
  • ۳,۰۰۰,۰۰۰



  • New sessions per second
  • ۱۳۵,۰۰۰



  • Virtual systems (base/max)
  • ۱/۶



  • Firewall Throughput (Packet per Second)


  • ۲.۲Mpps

  • IPS Throughput


  • ۲۰۰Mbps

  • SSL-VPN Throughput


  • ۳۰Mbps

  • Firewall Policies


  • ۵,۰۰۰

  • Virtual Domains (Default / Maximum)


  • ۱۰/۱۰

  • GE RJ45 Internal Ports


  • ۵

  • GE RJ45 WAN Ports


  • ۲

  • GE RJ45 PoE Ports


  • ۲

  • Wireless Interface


  • ۸۰۲.۱۱a/b/g/n

  • USB Ports (Client / Server)


  • ۱/۱

  • Throughput: Firewall (FW) + Application Visibility and Control (AVC)(1024B)



  • ۶۴ Gbps
  • Throughput: FW + AVC + Intrusion Prevention System (IPS (1024B)



  • ۵۵ Gbps
  • Maximum concurrent sessions, with AVC



  • ۳۵ million
  • Maximum new connections per second, with AVC



  • ۴۵۰K
  • TLS (Hardware Decryption)



  • ۱۱ Gbps
  • Throughput: NGIPS (1024B)



  • ۶۶ Gbps
  • IPSec VPN throughput (1024B TCP w/Fastpath)



  • ۲۵ Gbps
  • MaximumVPN Peers



  • ۲۰,۰۰۰
  • URL filtering: number of categories



  • More than 80
  • URL filtering: number of URLs categorized



  • More than 280 million
  • Stateful inspection firewall throughput



  • ۸۰ Gbps
  • Stateful inspection firewall throughput (multiprotocol)



  • ۶۰ Gbps
  • Concurrent firewall connections



  • ۶۰ million
  • Firewall latency (UDP 64B microseconds)



  • ۳.۵
  • New connections persecond



  • ۱.۸ million
  • IPsec VPN throughput (450B UDP L2L test)



  • ۲۷ Gbps
  • Security contexts (included; maximum)



  • ۱۰; ۲۵۰
  • High availability



  • Active/active and active/standby
  • Clustering



  • Up to 16 security modules across up to 16 different Firepower 9300 chassis
  • Scalability



  • VPN load balancing, firewall clustering
  • Adaptive Security Device Manager



  • Web-based, local management for small-scale deployments
  • Centralized management



  • Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager or alternatively in the cloud with Cisco Defense Orchestrator
  • Cisco Security Intelligence



  • Standard, with IP, URL, and DNS threat intelligence
محصولی برای مقایسه وجود ندارد.