Firewall
۱.۰۵Tbps
Threat Protection Throughput
۲۰Gbps
۳ Gbps
Firewall Policies
۲۰۰,۰۰۰
۱۰,۰۰۰
Virtual Domains (Default / Maximum)
۱۰/۵۰۰
High Availability Configurations
Active/Active, Active/Passive, Clustering
Console port
۱
Firewall Throughput (1518/512/64 byte UDP packets)
۱.۰۵Tbps / 1.05Tbps / 680Gbps
Firewall Latency( 64byte UDP packets )
۳μs
Concurrent Sessions ( TCP )
۱۶۰Million
New Sessions/Sec(TCP)
۵۵۰,۰۰۰
IPsec VPN Throughput (512 byte)
۴۰۰Gbps
SSL VPN Throughput
۹.۵Gbps
۲.۵ Gbps
Concurrent SSL VPN Users (Recommended Maximum, Tunnel Mode)
۳۰,۰۰۰
IPS Throughput
۳۲Gbps
۵ Gbps
Application Control Throughput (HTTP 64K)
۹۵Gbps
NGFW Throughput
۲۸Gbps
۳.۵ Gbps
Threat Protection Throughput (Ent. Mix)
۲۰Gbps
company
Fortinet
Fortinet
cisco
juniper
Firewall Throughput (1518/512/64 byte UDP)
۳۲ / ۳۲ / ۲۰ Gbps
Firewall Latency
۳μs
Concurrent Sessions
۴ Million
SSL Inspection Throughput
۳.۹ Gbps
Interfaces
۱۸x GE RJ45, 16x GE SFP
Local Storage
۴۸۰ GB (301E)
Power Supplies
Single AC PS, opt. Dual PS
Throughput: Firewall (FW) + Application Visibility and Control (AVC)(1024B)
۶۴ Gbps
Throughput: FW + AVC + Intrusion Prevention System (IPS (1024B)
۵۵ Gbps
Maximum concurrent sessions, with AVC
۳۵ million
Maximum new connections per second, with AVC
۴۵۰K
TLS (Hardware Decryption)
۱۱ Gbps
Throughput: NGIPS (1024B)
۶۶ Gbps
IPSec VPN throughput (1024B TCP w/Fastpath)
۲۵ Gbps
MaximumVPN Peers
۲۰,۰۰۰
URL filtering: number of categories
More than 80
URL filtering: number of URLs categorized
More than 280 million
Stateful inspection firewall throughput
۸۰ Gbps
Stateful inspection firewall throughput (multiprotocol)
۶۰ Gbps
Concurrent firewall connections
۶۰ million
Firewall latency (UDP 64B microseconds)
۳.۵
New connections persecond
۱.۸ million
IPsec VPN throughput (450B UDP L2L test)
۲۷ Gbps
Security contexts (included; maximum)
۱۰; ۲۵۰
High availability
Active/active and active/standby
Clustering
Up to 16 security modules across up to 16 different Firepower 9300 chassis
Scalability
VPN load balancing, firewall clustering
Adaptive Security Device Manager
Web-based, local management for small-scale deployments
Centralized management
Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager or alternatively in the cloud with Cisco Defense Orchestrator
Cisco Security Intelligence
Standard, with IP, URL, and DNS threat intelligence