company
Fortinet
Fortinet
cisco
Firewall Throughput (Packet per Second)
۲.۲Mpps
۷۵Mpps
IPS Throughput
۲۰۰Mbps
SSL-VPN Throughput
۳۰Mbps
Firewall Policies
۵,۰۰۰
Virtual Domains (Default / Maximum)
۱۰/۱۰
GE RJ45 Internal Ports
۵
GE RJ45 WAN Ports
۲
GE RJ45 PoE Ports
۲
Wireless Interface
۸۰۲.۱۱a/b/g/n
USB Ports (Client / Server)
۱/۱
IPS Throughput ( HTTPS / Enterprise Mix)
۱۸ / ۲۵ Gbps
Threat Protection Throughput
۱۳.۵Gbps
Interfaces
۲x 40 GE QSFP + Ports
۲x 10 GE SFP + Ports
۲x 1 GE RJ45 management ports
SSL Inspection Throughput
۱۵Gbps
Concurrent Sessions (TCP)
۴۰Million
Throughput: Firewall (FW) + Application Visibility and Control (AVC)(1024B)
۱۶۸ Gbps
Throughput: FW + AVC + Intrusion Prevention System (IPS (1024B)
۱۵۳ Gbps
Maximum concurrent sessions, with AVC
۶۰ million
Maximum new connections per second, with AVCs
۱.۱M
TLS (Hardware Decryption)
۲۸ Gbps
Throughput: NGIPS (1024B)
۱۷۵ Gbps
IPSec VPN throughput (1024B TCP w/Fastpath)
۸۱ Gbps
Centralizedmanagement
Centralized configuration, logging, monitoring, and reporting are performed by the Management Center or alternatively in the cloud with Cisco Defense Orchestrator
AVC
Standard, supporting more than 4000 applications, as well as geolocations, users, and websites
AVC: OpenAppID support for custom, open-source application detectors
Standard
Cisco Security Intelligence
Standard, with IP, URL, and DNS threat intelligence
URL filtering: number of categories
More than 80
URL filtering: number of URLs categorized
More than 280 million
Stateful inspection firewall throughput
۲۳۵ Gbps
Stateful inspection firewall throughput (multiprotocol)
۱۷۲ Gbps
Concurrent firewall connections
۱۹۵ million
Firewall latency (UDP 64B microseconds)
۳.۵
New connections persecond
۴.۷۵ million
IPsec VPN throughput (450B UDP L2L test)
۷۴ Gbps
MaximumVPN Peers
۶۰,۰۰۰
Security contexts (included; maximum)
۱۰; ۲۵۰
High availability
Active/active and active/standby
Clustering
Up to 16 security modules across up to 16 different Firepower 9300 chassis
Scalability
VPN load balancing, firewall clustering
Centralized management
Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager or alternatively in the cloud with Cisco Defense Orchestrator
Adaptive Security Device Manager
Web-based, local management for small-scale deployments