• Firewall
  • ۸۰Gbps

    ۱۶Gbps

  • Threat Protection Throughput
  • ۱۳Gbps

    ۲Gbps

  • Firewall Policies
  • ۲۰۰,۰۰۰

    ۱۰,۰۰۰

  • Virtual Domains (Default / Maximum)
  • ۱۰/۵۰۰

    ۱۰/۱۰

  • High Availability Configurations
  • Active/Active, Active/Passive, Clustering

    Active/Active, Active/Passive, Clustering

  • USB Port
  • ۱



  • Console (RJ45)
  • ۱

    ۱

  • Firewall Throughput (1518/512/64 byte UDP packets)
  • ۸۰/۸۰/۵۰ Gbps

    ۱۶/۱۶/۱۶ Gbps

  • Firewall Latency( 64byte UDP packets )
  • ۳μs

    ۳μs

  • New Sessions/Sec(TCP)
  • ۴۰۰,۰۰۰

    ۲۵۰,۰۰۰

  • IPsec VPN Throughput (512 byte)
  • ۵۰Gbps

    ۱۴Gbps

  • SSL VPN Throughput
  • ۸Gbps

    ۴۰۰Mbps

  • Concurrent SSL VPN Users (Recommended Maximum, Tunnel Mode)
  • ۳۰,۰۰۰

    ۵۰۰

  • IPS Throughput
  • ۲۳Gbps



  • Application Control Throughput (HTTP 64K)
  • ۴۰Gbps

    ۷.۵Gbps

  • NGFW Throughput
  • ۲۲Gbps

    ۲.۵Gbps

  • Threat Protection Throughput (Ent. Mix)
  • ۱۳Gbps

    ۲Gbps

  • company
  • Fortinet
    Palo Alto
    Fortinet
    cisco
  • Firewall throughput (HTTP/appmix)

  • ۵.۲/۴.۷Gbps


  • Threat Prevention throughput (HTTP/appmix)b

  • ۲.۴/۲.۶Gbps


  • IPsec VPN throughput

  • ۳.۱Gbps


  • Max sessions

  • ۴۰۰,۰۰۰


  • New sessions per secondd

  • ۷۴,۰۰۰


  • GE RJ45 Interface


  • ۸

  • Concurrent Sessions ( TCP )


  • ۶Million

  • IPsec VPN Throughput (512 byte
  • ۵۰Gbps

    ۱۴Gbps

  • Throughput: FW + AVC (1024B)



  • ۱۴Gbps
  • Throughput: FW + AVC + IPS (1024B)



  • ۱۲.۵Gbps
  • Maximum concurrent sessions, with AVC



  • ۱۰Million
  • Maximum new connections per second, with AVC



  • ۸۵K
  • TLS (Hardware Decryption)



  • ۴.۵Gbps
  • Throughput: NGIPS (1024B)



  • ۱۵Gbps
  • IPSec VPN Throughput (1024B TCP w/Fastpath)



  • ۶Gbps
  • Multi-Instance Capable



  • Yes
  • Application Visibility and Control (AVC)



  • Standard, supporting more than 4000 applications, as well as geolocations, users, and websites
  • AVC: OpenAppID support for custom, open source, application detectors



  • Standard
  • Cisco Security Intelligence



  • Standard, with IP, URL, and DNS threat intelligence
  • Cisco Firepower NGIPS



  • Available; can passively detect endpoints and infrastructure for threat correlation and Indicators of Compromise (IoC) intelligence
  • Cisco AMP for Networks



  • Available; enables detection, blocking, tracking, analysis, and containment of targeted and persistent malware, addressing the attack continuum both during and after attacks. Integrated threat correlation with Cisco AMP for Endpoints is also optionally available
  • Cisco AMP Threat Grid sandboxing



  • Available
  • URL Filtering: number of categories



  • More than 80
  • URL Filtering: number of URLs categorized



  • More than 80 Million
  • Automated threat feed and IPS signature updates



  • Yes: class-leading Collective Security Intelligence (CSI) from the Cisco Talos Group
  • Third-party and opensource ecosystem



  • Open API for integrations with third-party products; Snort® and OpenAppID community resources for new and specific threats
  • High availability and clustering



  • Active/standby. Cisco Firepower 4100 Series allows clustering of up to 6 chassis
  • Cisco Trust Anchor Technologies



  • Firepower 4100 Series platforms include Trust Anchor Technologies for supply chain and software image assurance
  • Stateful inspection firewall throughput



  • ۴۰Gbps
  • Stateful inspection firewall throughput (multiprotocol)



  • ۳۰Gbps
  • Concurrent firewall connections



  • ۱۰Million
  • Firewall latency (UDP 64B microseconds)



  • ۳.۵
  • New connections per second



  • ۴۰۰,۰۰۰
  • IPsec VPN throughput (450B UDP L2L test)



  • ۹Gbps
  • Maximum VPN Peers



  • ۱۰,۰۰۰
  • Security contexts (included; maximum)



  • ۱۰; ۲۵۰
  • High availability



  • Active/active and active/standby
  • Clustering



  • Up to 16 appliances
  • Scalability



  • VPN Load Balancing, Firewall Clustering
  • Centralized management



  • Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager or alternatively in the cloud with Cisco Defense Orchestrator
  • Adaptive Security Device Manager



  • Web-based, local management for small-scale deployments
محصولی برای مقایسه وجود ندارد.