company
Palo Alto
Palo Alto
f5
cisco
Firewall throughput (App-ID)
۱/۱Gbps
Threat prevention throughput
۶۲۰/۷۹۰Mbps
۲Gbps
IPsec VPN throughput
۴۰۰Mbps
۲Gbps
New sessions per second
۸,۳۰۰
۱۲۰,۰۰۰
Max sessions
۱۲۸,۰۰۰
۱,۰۰۰,۰۰۰
Firewall throughput (App-ID enabled)
۵Gbps
IPSec VPN throughput
۴۰۰Mbps
۲Gbps
Virtual systems (base/max2)
۱۰/۲۰
Intelligent Traffic Processing
L7 requests per second: 10M
L4 connections per second: 4.2M
L4 HTTP requests per second: 35M
Maximum L4 concurrent connections: 300M
Throughput: 320 Gbps/160 Gbps L4/L7
Hardware Offload SSL/TLS
ECC†: ۱۰۰K TPS (ECDSA P-256)
RSA: 160K TPS (2K keys)
۵۰ Gbps bulk encryption
FIPS SSL
N/A
Hardware Compression
۶۰Gbps
Hardware DDoS Protection
۲۱۰M SYN cookies per second
TurboFlex Performance Profiles
Tier 3 (4x BW)
Software Compression
N/A
Software Architecture
۶۴-bit
TMOS
On-Demand Upgradable
N/A
Virtualization (Maximum Number of vCMP Guests)
۵۶
Processor
Two 14-Core Intel Xeon processors
(total 56 hyperthreaded logical processor cores)
Memory
۵۱۲GB DDR4
Hard Drive
۱x 1.6TB Enterprise Class SSD
Throughput: Firewall (FW) + Application Visibility and Control (AVC) (1024B)
۳۴Gbps
Throughput: FW + AVC + Intrusion Prevention System (IPS (1024B)
۲۹Gbps
Maximum concurrent sessions, with AVC
۳۰Million
Maximum new connections per second, with AVC
۱۸۵K
TLS (Hardware Decryption)
۸.۵Gbps
Throughput: NGIPS (1024B)
۳۷Gbps
IPSec VPN throughput (1024B TCP w/Fastpath)
۱۶Gbps
Maximum VPN Peers
۲۰,۰۰۰
Security contexts (included; maximum)
۱۰; ۲۵۰
URL filtering: number of categories
More than 80
URL filtering: number of URLs categorized
More than 280 million
Stateful inspection firewall throughput
۸۰ Gbps
Stateful inspection firewall throughput (multiprotocol)
۶۰Gbps
Concurrent firewall connections
۶۰Million
Firewall latency (UDP 64B microseconds)
۳.۵
New connections persecond
۱.۲Million
IPsec VPN throughput (450B UDP L2L test)
۱۸Gbps
Clustering
Up to 16 security modules across up to 16 different Firepower 9300 chassis
Scalability
VPN load balancing, firewall clustering
Centralized management
Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager or alternatively in the cloud with Cisco Defense Orchestrator
Adaptive Security Device Manager
Web-based, local management for small-scale deployments
High availability
Active/active and active/standby