• Firewall Throughput
  • ۹Mpps
    ۱۵ Mpps


  • IPS Throughput
  • ۱.۴Gbps
    ۲.۶ Gbps
    ۲.۸ / ۲ Gbps

  • NGFW Throughput
  • ۱Gbps
    ۱.۶ Gbps
    ۱.۷ Gbps

  • Threat Protection Throughput
  • ۷۰۰Mbps
    ۱Gbps
    ۱.۵ Gbps

  • Application Control Throughput
  • ۱.۸Gbps
    ۲.۲Gbps


  • IPsec VPN Throughput
  • ۶.۵Gbps
    ۱۱.۵Gbps


  • SSL VPN Throughput
  • ۹۰۰Mbps
    ۱Gbps
    ۳۵۰Mbps

  • Firewall Latency
  • ۴μs
    ۴.۹۷μs


  • Concurrent Sessions ( TCP )
  • ۷۰۰,۰۰۰
    ۱.۵ Million
    ۶Million

  • New Sessions/Second (TCP)
  • ۳۵,۰۰۰
    ۵۶,۰۰۰


  • Interface
  • ۱. ۱x USB Port ۲. ۱x Console Port ۳. ۲x GE RJ45 WAN Ports ۴. ۱x GE RJ45 DMZ Port ۵. ۲x GE RJ45 FortiLink Ports ۶. ۵x GE RJ45 Internal Ports
    ۱۰GE, 1GE


  • Local Storages

  • ۰


  • AC Power Supply
  • ۱۰.۱۷ W / 12.43 W
    ۱۰۰–۲۴۰V AC, 50/60 Hz


  • Form Factor
  • Desktop
    Rack Mount, 1 RU


  • Variants




  • IPSec VPN Throughput
  • ۶.۵Gbps
    ۱۱.۵Gbps


  • Concurrent Sessions (TCP)
  • ۷۰۰,۰۰۰
    ۱.۵ Million
    ۶Million

  • SSL inspection Throughput

  • ۱ Gbps
    ۱.۹ Gbps

  • company

  • Fortinet
    Fortinet
    cisco
  • company


  • Fortinet
    cisco
  • Firewall Throughput(Packet per Second)


  • ۱۲Mpps

  • Firewall Latency (64 byte, UDP)


  • ۳μs

  • Firewall Policies


  • ۱۰,۰۰۰

  • SSL-VPN Throughput
  • ۹۰۰Mbps
    ۱Gbps
    ۳۵۰Mbps

  • SSL Inspection Throughput

  • ۱ Gbps
    ۱.۹ Gbps

  • Local Storage


  • ۱۲۰ GB SSD

  • Power Source


  • ۱۰۰–۲۴۰V AC, 60–۵۰Hz

  • Throughput: FW + AVC (1024B)



  • ۱۳Gbps
  • Throughput: FW + AVC + IPS (1024B)



  • ۱۱Gbps
  • Maximum concurrent sessions, with AVC



  • ۱۰Million
  • Maximum new connections per second, with AVC



  • ۶۴K
  • TLS (Hardware Decryption)



  • ۴.۵Gbps
  • Throughput: NGIPS (1024B)



  • ۱۵Gbps
  • IPSec VPN Throughput (1024B TCP w/Fastpath)



  • ۶Gbps
  • Multi-Instance Capable



  • Yes
  • Application Visibility and Control (AVC)



  • Standard, supporting more than 4000 applications, as well as geolocations, users, and websites
  • AVC: OpenAppID support for custom, open source, application detectors



  • Standard
  • Cisco Security Intelligence



  • Standard, with IP, URL, and DNS threat intelligence
  • Cisco Firepower NGIPS



  • Available; can passively detect endpoints and infrastructure for threat correlation and Indicators of Compromise (IoC) intelligence
  • Cisco AMP for Networks



  • Available; enables detection, blocking, tracking, analysis, and containment of targeted and persistent malware, addressing the attack continuum both during and after attacks. Integrated threat correlation with Cisco AMP for Endpoints is also optionally available
  • Cisco AMP Threat Grid sandboxing



  • Available
  • URL Filtering: number of categories



  • More than 80
  • URL Filtering: number of URLs categorized



  • More than 280 Million
  • Automated threat feed and IPS signature updates



  • Yes: class-leading Collective Security Intelligence (CSI) from the Cisco Talos Group
  • Third-party and opensource ecosystem



  • Open API for integrations with third-party products; Snort® and OpenAppID community resources for new and specific threats
  • High availability and clustering



  • Active/standby. Cisco Firepower 4100 Series allows clustering of up to 6 chassis
  • Cisco Trust Anchor Technologies



  • Firepower 4100 Series platforms include Trust Anchor Technologies for supply chain and software image assurance
  • Stateful inspection firewall throughput



  • ۳۵Gbps
  • Stateful inspection firewall throughput (multiprotocol)



  • ۱۵Gbps
  • Concurrent firewall connections



  • ۱۰Million
  • Firewall latency (UDP 64B microseconds)



  • ۳.۵
  • New connections per second



  • ۱۵۰,۰۰۰
  • IPsec VPN throughput (450B UDP L2L test)



  • ۸Gbps
  • Maximum VPN Peers



  • ۱۰,۰۰۰
  • Security contexts (included; maximum)



  • ۱۰; ۲۵۰
  • High availability



  • Active/active and active/standby
  • Clustering



  • Up to 16 appliances
  • Scalability



  • VPN Load Balancing, Firewall Clustering
  • Centralized management



  • Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager or alternatively in the cloud with Cisco Defense Orchestrator
  • Adaptive Security Device Manager



  • Web-based, local management for small-scale deployments
محصولی برای مقایسه وجود ندارد.