company
Fortinet
Fortinet
cisco
Firewall Throughput (Packet per Second)
۲۲۰Mpps
IPS Throughput ( HTTPS / Enterprise Mix)
۶۰ / ۹۰ Gbps
Threat Protection Throughput
۳۵Gbps
SSL Inspection Throughput
۳۹.۹Gbps
Concurrent Sessions (TCP)
۱۶۰Million
Firewall Policies
۲۰۰,۰۰۰
NGFW Throughput
۵۰Gbps
Virtual Domains (Default / Maximum)
۱۰/۵۰۰
Application Control Throughput
۶۵ Gbps
۱۰/۱۰۰/۱۰۰۰ Interfaces (RJ-45 ports)
۴ GE RJ45 (2 bypass),
۴ SFP GE
۱۰G BASE-SR SFP+ Ports
–
۰
SSL/TLS Processing
Hardware
Software
USB Interfaces
۲
۲
Storage
۴۸۰GB SSD
۲۴۰GB SSD
Form Factor
۱U
۱U
Power Supply
Dual
Dual
Throughput
۷۵۰ Mbps
۲۵۰ Mbps
Latency
<5ms
Sub-ms
High Availability
Active/Passive,
Active/Active Clustering
Active/Passive,
Active/Active Clustering
Active/active and active/standby
Administrative Domains
۳۲
۳۲
۱۰/۱۰۰/۱۰۰۰ Interfaces (RJ45 ports)
۴GE RJ45 (2 bypass),
۴SFP GE
Application Licenses
Unlimited
Throughput: Firewall (FW) + Application Visibility and Control (AVC)(1024B)
۶۴ Gbps
Throughput: FW + AVC + Intrusion Prevention System (IPS (1024B)
۵۵ Gbps
Maximum concurrent sessions, with AVC
۳۵ million
Maximum new connections per second, with AVC
۴۵۰K
TLS (Hardware Decryption)
۱۱ Gbps
Throughput: NGIPS (1024B)
۶۶ Gbps
IPSec VPN throughput (1024B TCP w/Fastpath)
۲۵ Gbps
MaximumVPN Peers
۲۰,۰۰۰
URL filtering: number of categories
More than 80
URL filtering: number of URLs categorized
More than 280 million
Stateful inspection firewall throughput
۸۰ Gbps
Stateful inspection firewall throughput (multiprotocol)
۶۰ Gbps
Concurrent firewall connections
۶۰ million
Firewall latency (UDP 64B microseconds)
۳.۵
New connections persecond
۱.۸ million
IPsec VPN throughput (450B UDP L2L test)
۲۷ Gbps
Security contexts (included; maximum)
۱۰; ۲۵۰
High availability
Active/Passive,
Active/Active Clustering
Active/Passive,
Active/Active Clustering
Active/active and active/standby
Clustering
Up to 16 security modules across up to 16 different Firepower 9300 chassis
Scalability
VPN load balancing, firewall clustering
Adaptive Security Device Manager
Web-based, local management for small-scale deployments
Centralized management
Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager or alternatively in the cloud with Cisco Defense Orchestrator
Cisco Security Intelligence
Standard, with IP, URL, and DNS threat intelligence