company
Palo Alto
Fortinet
Fortinet
cisco
Firewall throughput (App-ID enabled)
۲۰۰Gbps
Threat prevention throughput (DSRI Enabled)
۱۶۰Gbps
Threat prevention throughput
۱۰۰Gbps
IPSec VPN throughput
۸۰Gbps
Max sessions
۸۰,۰۰۰,۰۰۰
New sessions per second
۱,۲۰۰,۰۰۰
Virtual systems (base/max)
۲۵/۲۲۵
۱۰/۱۰۰/۱۰۰۰ Interfaces (RJ45 ports)
۸bypass, 4 SFP GE (non-bypass)
۱۰G BASE-SR SFP+ Ports
(۲ bypass)4
SSL/TLS Processing
Hardware
USB Interfaces
۲
Storage
۲x 2 TB
Form Factor
۲U
Power Supply
Dual Hot Swappable
Throughput
۵Gbps
Latency
Sub-ms
High Availability
Active/Passive,
Active/Active Clustering
Active/active and active/standby
Application Licenses
Unlimited
Administrative Domains
۶۴
Firewall
۱۵۸Gbps
IPS
۱۶.۵Gbps
NGFW
۱۳.۵Gbps
Threat Protection
۱۱Gbps
Interfaces
Multiple GE RJ45, 10 GE SFP+, 25 GE SFP28, and 40 GE QSFP+ slots
Throughput: Firewall (FW) + Application Visibility and Control (AVC)(1024B)
۱۴۸Gbps
Throughput: FW + AVC + Intrusion Prevention System (IPS (1024B)
۱۳۲Gbps
Maximum concurrent sessions, with AVC
۶۳million
Maximum new connections per second, with AVC
۸۵۰K
TLS (Hardware Decryption)
۲۵Gbps
Throughput: NGIPS (1024B)
۱۴۸Gbps
IPSec VPN throughput (1024B TCP w/Fastpath)
۵۱Gbps
MaximumVPN Peers
۶۰,۰۰۰
URL filtering: number of categories
More than 80
URL filtering: number of URLs categorized
More than 280 million
Stateful inspection firewall throughput
۲۳۴Gbps
Stateful inspection firewall throughput (multiprotocol)
۱۳۰Gbps
Concurrent firewall connections
۷۰million
Firewall latency (UDP 64B microseconds)
۳.۵
New connections persecond
۴million
High availability
Active/Passive,
Active/Active Clustering
Active/active and active/standby
Scalability
VPN load balancing, firewall clustering
Cisco Security Intelligence
Standard, with IP, URL, and DNS threat intelligence
Cisco Firepower NGIPS
Available; can passively detect endpoints and infrastructure for threat correlation and Indicators of Compromise (IoC) intelligence
Clustering
Up to 16 security modules across up to 16 different Firepower 9300 chassis
Centralized management
Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager or alternatively in the cloud with Cisco Defense Orchestrator
Adaptive Security Device Manager
Web-based, local management for small-scale deployments