company
Fortinet
Fortinet
cisco
Firewall Throughput (Packet per Second)
۶۷.۵Mpps
IPS Throughput ( HTTPS / Enterprise Mix)
۱۸ / ۱۳ Gbps
Threat Protection Throughput
۷.۷Gbps
Interfaces
۲x 40 GE QSFP + Ports
۲x 10 GE SFP + Ports
۲x 1 GE RJ45 management ports
SSL -VPN Throughput
۶.۵Gbps
۴۰۰Mbps
Concurrent Sessions (TCP)
۲۳Million
۱۰G BASE-SR SFP+ Ports
۲
SSL/TLS Processing
Hardware
USB Interfaces
۲
Storage
۲x 1 TB
Form Factor
۲U
Rack Mount, 1 RU
Power Supply
Dual Hot Swappable
Throughput
۱.۳Gbps
Latency
Sub-ms
High Availability
Active/Passive,
Active/Active Clustering
Active/active and active/standby
Application Licenses
Unlimited
Administrative Domains
۶۴
Firewall Throughput (Packets Per Second)
۶Mpps
Firewall Policies
۱۰,۰۰۰
IPsec VPN Throughput (512 byte packets)
۱.۳Gbps
SSL-VPN Throughput
۶.۵Gbps
۴۰۰Mbps
Maximum Number of FortiTokens
۱,۰۰۰
High Availability Configurations
Active / Active, Active / Passive, Clustering
Virtual Domains (Default / Maximum)
۱۰ / ۱۰
Client-to-Gateway IPsec VPN Tunnels
۵,۰۰۰
Maximum Number of FortiAPs (Total / Tunnel Mode)
۱۲۸ / ۶۴
Throughput: Firewall (FW) + Application Visibility and Control (AVC)(1024B)
۵۴Gbps
Throughput: FW + AVC + Intrusion Prevention System (IPS (1024B)
۴۸Gbps
Maximum concurrent sessions, with AVC
۳۵million
Maximum new connections per second, with AVC
۳۸۰K
TLS (Hardware Decryption)
۱۰Gbps
Throughput: NGIPS (1024B)
۵۷Gbps
IPSec VPN throughput (1024B TCP w/Fastpath)
۲۰Gbps
URL filtering: number of categories
More than 80
URL filtering: number of URLs categorized
More than 280 million
Stateful inspection firewall throughput
۸۰Gbps
Concurrent firewall connections
۵۵million
Firewall latency (UDP 64B microseconds)
۳.۵
New connections persecond
۱.۶million
IPsec VPN throughput (450B UDP L2L test)
۲۵Gbps
MaximumVPN Peers
۲۰,۰۰۰
Security contexts (included; maximum)
۱۰;۲۵۰
High availability
Active/Passive,
Active/Active Clustering
Active/active and active/standby
Clustering
Up to 16 security modules across up to 16 different Firepower 9300 chassis
Scalability
VPN load balancing, firewall clustering
Centralized management
Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager or alternatively in the cloud with Cisco Defense Orchestrator
Adaptive Security Device Manager
Web-based, local management for small-scale deployments