Firewall
۸۰Gbps
۳۲۰Gbps
Threat Protection Throughput
۱۳Gbps
۱۳Gbps
Firewall Policies
۲۰۰,۰۰۰
۲۰۰,۰۰۰
Virtual Domains (Default / Maximum)
۱۰/۵۰۰
۱۰/۵۰۰
High Availability Configurations
Active/Active, Active/Passive, Clustering
Active/Active, Active/Passive, Clustering
USB Port
۱
۱
Console (RJ45)
۱
Firewall Throughput (1518/512/64 byte UDP packets)
۸۰/۸۰/۵۰ Gbps
۳۲۰/۳۰۰/۱۵۰ Gbps
Firewall Latency( 64byte UDP packets )
۳μs
۵μs
New Sessions/Sec(TCP)
۴۰۰,۰۰۰
۴۸۰,۰۰۰
IPsec VPN Throughput (512 byte)
۵۰Gbps
۱۳۵Gbps
SSL VPN Throughput
۸Gbps
۱۰Gbps
Concurrent SSL VPN Users (Recommended Maximum, Tunnel Mode)
۳۰,۰۰۰
۳۰,۰۰۰
IPS Throughput
۲۳Gbps
۳۰Gbps
Application Control Throughput (HTTP 64K)
۴۰Gbps
۴۴Gbps
NGFW Throughput
۲۲Gbps
۲۰Gbps
Threat Protection Throughput (Ent. Mix)
۱۳Gbps
۲۰Gbps
company
Fortinet
cisco
Fortinet
۱۰G BASE-SR SFP+ Ports
۲
SSL/TLS Processing
Hardware
USB Interfaces
۲
Storage
۲x 1 TB
Form Factor
۲U
Power Supply
Dual Hot Swappable
Throughput
۱.۳Gbps
Latency
Sub-ms
High Availability
Active/Passive,
Active/Active Clustering
Application Licenses
Unlimited
Administrative Domains
۶۴
Throughput: Firewall (FW) + Application Visibility and Control (AVC)(1024B)
۵۰Gbps
Throughput: FW + AVC + Intrusion Prevention System (IPS (1024B)
۴۳Gbps
Maximum concurrent sessions, with AVC
۳۰million
Maximum new connections per second, with AVC
۲۹۵K
TLS (Hardware Decryption)
۱۰Gbps
Throughput: NGIPS (1024B)
۵۷Gbps
IPSec VPN throughput (1024B TCP w/Fastpath)
۱۷Gbps
URL filtering: number of categories
More than 80
URL filtering: number of URLs categorized
More than 280 million
Stateful inspection firewall throughput
۸۰Gbps
Stateful inspection firewall throughput (multiprotocol)
۶۰Gbps
Concurrent firewall connections
۶۰million
Firewall latency (UDP 64B microseconds)
۳.۵
New connections persecond
۱.۸million
IPsec VPN throughput (450B UDP L2L test)
۲۰Gbps
MaximumVPN Peers
۲۰,۰۰۰
Security contexts (included; maximum)
۱۰; ۲۵۰
Clustering
Up to 16 security modules across up to 16 different Firepower 9300 chassis
Scalability
VPN load balancing, firewall clustering
Centralized management
Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager or alternatively in the cloud with Cisco Defense Orchestrator
Adaptive Security Device Manager
Web-based, local management for small-scale deployments
Cisco Security Intelligence
Standard, with IP, URL, and DNS threat intelligence
Cisco Firepower NGIPS
Available; can passively detect endpoints and infrastructure for threat correlation and Indicators of Compromise (IoC) intelligence
Console port
۱