Firewall throughput (HTTP/appmix)
۱۲۰Gbps
Threat Prevention throughput (DSRI enabled)
۱۰۰Gbps
Threat Prevention throughput (HTTP/appmix)
۶۰Gbps
IPSec VPN throughput
۴۸Gbps
Max sessions
۴۸M
New sessions per second
۷۲۰,۰۰۰
Virtual systems (base/max)
۲۵/۲۲۵
Firewall
۲۴۰Gbps
Threat Protection Throughput
۲۳Gbps
Firewall Policies
۲۰۰,۰۰۰
Virtual Domains (Default / Maximum)
۱۰/۵۰۰
High Availability Configurations
Active/Active, Active/Passive, Clustering
Console (RJ45)
۱
Firewall Throughput (1518/512/64 byte UDP packets)
۲۴۰/۲۳۸/۱۵۰ Gbps
Firewall Latency( 64byte UDP packets )
۴μs
Concurrent Sessions ( TCP )
۵۰Million
New Sessions/Sec(TCP)
۴۶۰,۰۰۰
IPsec VPN Throughput (512 byte)
۱۴۰Gbps
SSL VPN Throughput
۱۱Gbps
Concurrent SSL VPN Users (Recommended Maximum, Tunnel Mode)
۳۰,۰۰۰
IPS Throughput
۴۴Gbps
Application Control Throughput (HTTP 64K)
۸۶Gbps
NGFW Throughput
۳۴Gbps
Threat Protection Throughput (Ent. Mix)
۲۳Gbps
company
Fortinet
f5
cisco
Dimensions
۳.۴”(۸.۶ cm)H x 17.3”(۴۴.۰ cm) W x 24.5” (۶۲.۲ cm) D
۲U industry standard rack-mount chassis
Weight
۳۱.0lbs.(14.1 kg)(1 blank line card, 0 power supplies, 0 blades, 1 fan tray)
Power Supply
AC power supply
One to two 100-240 VAC (800W)
۵۰/۶۰ Hz auto ranging
۱۰A per input line (max)
DC power supply (option)
Operating Temperature
۳۲°to 104° F (0° to 40° C)
Relative Humidity
۵to 85% at 104° F (40° C)
Safety Agency Approval
EN 60950-1:2006 + A11:2009 + A1:2010 + A12:2011
IEC 60950-1:2005, A1:2009
CSA 60950-1-07, Including Amendment 1:2011
ANSI/UL 60950-1-2011
Evaluated to all CB Countries
Certifications/Susceptibility Standards
FCC Part 15 Class A
VCCI Class A
ETSI EN 300 386 V1.5.1 (2010)
EN 55022:2010 Class A
EN 61000-3-2:2006 A1:2009+A2:2009
EN 61000-3-3:2008
EN 55024:2010
EN 55022:2010 Class A
EN 61000-3-2:2006 A1:2009+A2:2009
EN 61000-3-3:2008
Throughput: FW + AVC (1024B)
۱۳Gbps
Throughput: FW + AVC + IPS (1024B)
۱۱Gbps
Maximum concurrent sessions, with AVC
۱۰Million
Maximum new connections per second, with AVC
۶۴K
TLS (Hardware Decryption)
۴.۵Gbps
Throughput: NGIPS (1024B)
۱۵Gbps
IPSec VPN Throughput (1024B TCP w/Fastpath)
۶Gbps
Multi-Instance Capable
Yes
Application Visibility and Control (AVC)
Standard, supporting more than 4000 applications, as well as geolocations, users, and websites
AVC: OpenAppID support for custom, open source, application detectors
Standard
Cisco Security Intelligence
Standard, with IP, URL, and DNS threat intelligence
Cisco Firepower NGIPS
Available; can passively detect endpoints and infrastructure for threat correlation and Indicators of Compromise (IoC) intelligence
Cisco AMP for Networks
Available; enables detection, blocking, tracking, analysis, and containment of targeted and persistent malware, addressing the attack continuum both during and after attacks.
Integrated threat correlation with Cisco AMP for Endpoints is also optionally available
Cisco AMP Threat Grid sandboxing
Available
URL Filtering: number of categories
More than 80
URL Filtering: number of URLs categorized
More than 280 Million
Automated threat feed and IPS signature updates
Yes: class-leading Collective Security Intelligence (CSI) from the Cisco Talos Group
Third-party and opensource ecosystem
Open API for integrations with third-party products; Snort® and OpenAppID community resources for new and specific threats
High availability and clustering
Active/standby. Cisco Firepower 4100 Series allows clustering of up to 6 chassis
Cisco Trust Anchor Technologies
Firepower 4100 Series platforms include Trust Anchor Technologies for supply chain and software image assurance
Stateful inspection firewall throughput
۳۵Gbps
Stateful inspection firewall throughput (multiprotocol)
۱۵Gbps
Concurrent firewall connections
۱۰Million
Firewall latency (UDP 64B microseconds)
۳.۵
New connections per second
۱۵۰,۰۰۰
IPsec VPN throughput (450B UDP L2L test)
۸Gbps
Maximum VPN Peers
۱۰,۰۰۰
Security contexts (included; maximum)
۱۰; ۲۵۰
High availability
Active/active and active/standby
Clustering
Up to 16 appliances
Scalability
VPN Load Balancing, Firewall Clustering
Centralized management
Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager or alternatively in the cloud with Cisco Defense Orchestrator
Adaptive Security Device Manager
Web-based, local management for small-scale deployments