Firewall
۲۴۰Gbps
Threat Protection Throughput
۳۰Gbps
Firewall Policies
۲۰۰,۰۰۰
Virtual Domains (Default / Maximum)
۱۰/۵۰۰
High Availability Configurations
Active/Active, Active/Passive, Clustering
Console port
۱
Firewall Throughput (1518/512/64 byte UDP packets)
۲۴۰/۲۴۰/۱۵۰ Gbps
Firewall Latency( 64byte UDP packets )
۴μs
Concurrent Sessions ( TCP )
۵۰Million
New Sessions/Sec(TCP)
۴۶۰,۰۰۰
IPsec VPN Throughput (512 byte)
۱۴۵Gbps
SSL VPN Throughput
۱۲Gbps
Concurrent SSL VPN Users (Recommended Maximum, Tunnel Mode)
۳۰,۰۰۰
IPS Throughput
۵۵Gbps
Application Control Throughput (HTTP 64K)
۹۵Gbps
NGFW Throughput
۴۰Gbps
Threat Protection Throughput (Ent. Mix)
۳۰Gbps
company
Fortinet
cisco
cisco
Throughput: Firewall (FW) + Application Visibility and Control (AVC)(1024B)
۶۴ Gbps
۵۴Gbps
Throughput: FW + AVC + Intrusion Prevention System (IPS (1024B)
۵۵ Gbps
۴۸Gbps
Maximum concurrent sessions, with AVC
۳۵ million
۳۵million
Maximum new connections per second, with AVC
۴۵۰K
۳۸۰K
TLS (Hardware Decryption)
۱۱ Gbps
۱۰Gbps
Throughput: NGIPS (1024B)
۶۶ Gbps
۵۷Gbps
IPSec VPN throughput (1024B TCP w/Fastpath)
۲۵ Gbps
۲۰Gbps
MaximumVPN Peers
۲۰,۰۰۰
۲۰,۰۰۰
URL filtering: number of categories
More than 80
More than 80
URL filtering: number of URLs categorized
More than 280 million
More than 280 million
Stateful inspection firewall throughput
۸۰ Gbps
۸۰Gbps
Stateful inspection firewall throughput (multiprotocol)
۶۰ Gbps
Concurrent firewall connections
۶۰ million
۵۵million
Firewall latency (UDP 64B microseconds)
۳.۵
۳.۵
New connections persecond
۱.۸ million
۱.۶million
IPsec VPN throughput (450B UDP L2L test)
۲۷ Gbps
۲۵Gbps
Security contexts (included; maximum)
۱۰; ۲۵۰
۱۰;۲۵۰
High availability
Active/active and active/standby
Active/active and active/standby
Clustering
Up to 16 security modules across up to 16 different Firepower 9300 chassis
Up to 16 security modules across up to 16 different Firepower 9300 chassis
Scalability
VPN load balancing, firewall clustering
VPN load balancing, firewall clustering
Adaptive Security Device Manager
Web-based, local management for small-scale deployments
Web-based, local management for small-scale deployments
Centralized management
Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager or alternatively in the cloud with Cisco Defense Orchestrator
Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager or alternatively in the cloud with Cisco Defense Orchestrator
Cisco Security Intelligence
Standard, with IP, URL, and DNS threat intelligence