company
Palo Alto
f5
cisco
Firewall throughput (App-ID enabled)
۲۰۰Gbps
Threat prevention throughput (DSRI Enabled)
۱۶۰Gbps
Threat prevention throughput
۱۰۰Gbps
IPSec VPN throughput
۸۰Gbps
Max sessions
۸۰,۰۰۰,۰۰۰
New sessions per second
۱,۲۰۰,۰۰۰
Virtual systems (base/max)
۲۵/۲۲۵
Intelligent Traffic Processing
L7 requests per second: 5.5M
L4 connections per second: 2.1M
L4 HTTP requests per second: 25M
Maximum L4 concurrent connections: 140M
Throughput: 160 Gbps/80 Gbps L4/L7
Hardware Offload SSL/TLS
ECC†: ۴۸K TPS (ECDSA P-256)
RSA: 80K TPS (2K keys)
۴۰Gbps bulk encryption
FIPS SSL
N/A
Hardware Compression
۴۰Gbps
Hardware DDoS Protection
۱۳۰M SYN cookies per second
TurboFlex Performance Profiles
Tier 3 (2x bandwidth)
Software Compression
N/A
Software Architecture
۶۴-bit
TMOS
On-Demand Upgradable
N/A
Virtualization (Maximum Number of vCMP Guests)
۳۲
Processor
One 18-Core Intel Xeon processor
(total 36 hyperthreaded logical processor cores)
Memory
۲۵۶GB DDR4
Hard Drive
۱x 960 GB Enterprise Class SSD
Throughput: Firewall (FW) + Application Visibility and Control (AVC)(1024B)
۶۴ Gbps
Throughput: FW + AVC + Intrusion Prevention System (IPS (1024B)
۵۵ Gbps
Maximum concurrent sessions, with AVC
۳۵ million
Maximum new connections per second, with AVC
۴۵۰K
TLS (Hardware Decryption)
۱۱ Gbps
Throughput: NGIPS (1024B)
۶۶ Gbps
IPSec VPN throughput (1024B TCP w/Fastpath)
۲۵ Gbps
MaximumVPN Peers
۲۰,۰۰۰
URL filtering: number of categories
More than 80
URL filtering: number of URLs categorized
More than 280 million
Stateful inspection firewall throughput
۸۰ Gbps
Stateful inspection firewall throughput (multiprotocol)
۶۰ Gbps
Concurrent firewall connections
۶۰ million
Firewall latency (UDP 64B microseconds)
۳.۵
New connections persecond
۱.۸ million
IPsec VPN throughput (450B UDP L2L test)
۲۷ Gbps
Security contexts (included; maximum)
۱۰; ۲۵۰
High availability
Active/active and active/standby
Clustering
Up to 16 security modules across up to 16 different Firepower 9300 chassis
Scalability
VPN load balancing, firewall clustering
Adaptive Security Device Manager
Web-based, local management for small-scale deployments
Centralized management
Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager or alternatively in the cloud with Cisco Defense Orchestrator
Cisco Security Intelligence
Standard, with IP, URL, and DNS threat intelligence