company
Fortinet
Fortinet
Fortinet
cisco
Devices/VDOMs (Maximum)
۱۰۰
Sustained Log Rates
۵۰
GB Log / Day
۲
Storage Capacity
۱۶TB (4 x 4 TB)
Usable Storage (after RAID)
۸TB
RAID Levels Supported
RAID 0/1/5/10
Hardware Form Factor
۱RU Rackmount
Total Interfaces
۴x GbE RJ45, 2 x SFP
Console Port
RJ45
۱
Removable Hard Drives
Redundant Hot Swap Power Supplies
Yes
Chassis Management
Yes
Height x Width x Length (cm)
۴.۴x 44.3 x 56.3
AC Power Supply
۱۰۰-۲۴۰V 50-60 Hz
Power Consumption (Average / Maximum)
۱۰۸W / 186W
۶۶.۹۳W / 116.58W
Heat Dissipation
۶۴۳ BTU/h
Operating Temperature
۳۲-۱۰۴°F (0–۴۰°C)
Safety Certifications
FCC Part 15 Class A, C-Tick, VCCI,CE, BSMI, KC, UL/cUL, CB, GOST
Firewall
۳۲۰Gbps
Threat Protection Throughput
۱۳Gbps
Firewall Policies
۲۰۰,۰۰۰
Virtual Domains (Default / Maximum)
۱۰/۵۰۰
High Availability Configurations
Active/Active, Active/Passive, Clustering
USB Port
۱
Console port
RJ45
۱
Firewall Throughput (1518/512/64 byte UDP packets)
۳۲۰/۳۰۰/۱۵۰ Gbps
Firewall Latency( 64byte UDP packets )
۵μs
New Sessions/Sec(TCP)
۴۸۰,۰۰۰
IPsec VPN Throughput (512 byte)
۱۳۵Gbps
SSL VPN Throughput
۱۰Gbps
Concurrent SSL VPN Users (Recommended Maximum, Tunnel Mode)
۳۰,۰۰۰
IPS Throughput
۳۰Gbps
Application Control Throughput (HTTP 64K)
۴۴Gbps
NGFW Throughput
۲۰Gbps
Threat Protection Throughput (Ent. Mix)
۲۰Gbps
Form Factor
۱RU
Total Network Interfaces
۴x GE RJ45 ports, 4x GE SFP slots
Storage
۲x 1 TB
Power Supplies
۱x PSU, Optional 2x PSU
Number of VMs
۱۴
Sandbox Pre-Filter Throughput (Files/Hour)
۷,۵۰۰
VM Sandboxing Throughput (Files/Hour)
۲۸۰
Real-world Effective Throughput (Files/Hour)
۱۴۰۰
Sniffer Throughput
۱Gbps
Maximum Current
۱۰۰V/5A, 240V/3A
Throughput: Firewall (FW) + Application Visibility and Control (AVC) (1024B)
۲۵Gbps
Throughput: FW + AVC + Intrusion Prevention System (IPS (1024B)
۲۱Gbps
Maximum concurrent sessions, with AVC
۳۰Million
Maximum new connections per second, with AVC
۱۳۰K
TLS (Hardware Decryption)
۷.۵Gbps
Throughput: NGIPS (1024B)
۳۰Gbps
IPSec VPN throughput (1024B TCP w/Fastpath)
۱۳.۵Gbps
AVC
Standard, supporting more than 4000 applications, as well as geolocations, users, and
websites
AVC: OpenAppID support for custom, open-source application detectors
Standard
Cisco Security Intelligence
Standard, with IP, URL, and DNS threat intelligence
Cisco Firepower NGIPS
Available; can passively detect endpoints and infrastructure for threat correlation and
Indicators of Compromise (IoC) intelligence
Cisco Advanced Malware Protection (AMP) for Networks
Available; enables detection, blocking, tracking, analysis, and containment of targeted and
persistent malware, addressing the attack continuum both during and after attacks. Integrated
threat correlation with Cisco AMP for Endpoints is also optionally available
Cisco AMP Threat Grid sandboxing
Available
URL filtering: number of categories
More than 80
URL filtering: number of URLs categorized
More than 280 Million
Automated threat feed and IPS signature updates
Yes: class-leading Collective Security Intelligence (CSI) from the Cisco Talos® group
(https://www.cisco.com/c/en/us/products/security/talos.html)
Third-party and opensource ecosystem
Open API for integrations with third-party products; Snort® and OpenAppID community
resources for new and specific threats
High availability and clustering
Active/standby; up to 6 modules across up to 6 different Firepower 9300 chassis.
Cisco Trust Anchor Technologies
Cisco Firepower 9300 Series platforms include Trust Anchor Technologies for supply chain
and software image assurance.
Stateful inspection firewall throughput
۷۵Gbps
Stateful inspection firewall throughput (multiprotocol)
۵۰Gbps
Concurrent firewall connections
۵۵Million
Firewall latency (UDP 64B microseconds)
۳.۵
New connections per second
۸۰۰,۰۰۰
IPsec VPN throughput (450B UDP L2L test)
۱۵Gbps
Maximum VPN Peers
۲۰,۰۰۰
Security contexts (included; maximum)
۱۰;۲۵۰
High availability
Active/active and active/standby
Clustering
Up to 16 security modules across up to 16 different Firepower 9300 chassis
Scalability
VPN load balancing, firewall clustering
Centralized management
Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager
or alternatively in the cloud with Cisco Defense Orchestrator
Adaptive Security Device Manager
Web-based, local management for small-scale deployments