company
f5
Fortinet
cisco
Intelligent Traffic Processing
۲M L7 requests per second
۱M L4 connections per second
۱۴M L4 HTTP requests per second
۴۸M max L4 concurrent connections
۸۰ Gbps L7/L4 throughput (C2400)
۱۵۵*Gbps L4, 80 Gbps L7 throughput (C2200)
۱ Gbps included compression
۴۰ Gbps maximum hardware compression
Included SSL TPS: 10,000 TPS (2K keys)
Maximum SSL TPS: 44,000 TPS (2K keys)
Bulk crypto: 36 Gbps
Hardware DDoS Protection
Hardware SYN cookies: 60M SYN cookies per second
Software Architecture
۶۴-bit
TMOS
Virtualization (Max Number of vCMP Guests)
۸۰ (۴B2250 blades, 20 per blade)
Processors
Single Intel 10-core Xeon processor (total 20 hyperthreaded logical processor cores)
Memory
۶۴GB
Hard Drive Capacity
One 800 GB solid state drive
Network Interfaces
One 10/100/1,000 Mbps Ethernet management port
Four 40 Gigabit (or sixteen 10 Gigabit) fiber ports (QSFP+)
(QSFP+40GBASE-SR4 100m transceivers sold separately)
(QSFP+ optical breakout cable assemblies available to
convert to 10 Gigabit ports)
Note: Only optics provided by F5 are supported.
Power Consumption and Heat Output
Please refer to the Platform Guide: VIPRION 2400 or
Platform Guide: VIPRION 2200 on askf5.com for the latest
relevant blade power ratings.
Note: Please refer to the Platform Guide: VIPRION 2400 or
Platform Guide: VIPRION 2200 on askf5.com for the latest
relevant blade power ratin
Weight
۱۰.0pounds(4.5 kg)
Firewall Throughput (1518 / 512 / 64 byte UDP packets):
۳ / ۳ / ۳ Gbps
Firewall Latency (64 byte UDP packets):
۳ μs
Firewall Throughput (Packets Per Second) 4.5 Mpps:
۶.۶ Mpps
GE RJ45 WAN Ports:
۱۴
GE RJ45 or SFP Shared Ports:
۲
Throughput: Firewall (FW) + Application Visibility and Control (AVC) (1024B)
۲۵Gbps
Throughput: FW + AVC + Intrusion Prevention System (IPS (1024B)
۲۱Gbps
Maximum concurrent sessions, with AVC
۳۰Million
Maximum new connections per second, with AVC
۱۳۰K
TLS (Hardware Decryption)
۷.۵Gbps
Throughput: NGIPS (1024B)
۳۰Gbps
IPSec VPN throughput (1024B TCP w/Fastpath)
۱۳.۵Gbps
AVC
Standard, supporting more than 4000 applications, as well as geolocations, users, and
websites
AVC: OpenAppID support for custom, open-source application detectors
Standard
Cisco Security Intelligence
Standard, with IP, URL, and DNS threat intelligence
Cisco Firepower NGIPS
Available; can passively detect endpoints and infrastructure for threat correlation and
Indicators of Compromise (IoC) intelligence
Cisco Advanced Malware Protection (AMP) for Networks
Available; enables detection, blocking, tracking, analysis, and containment of targeted and
persistent malware, addressing the attack continuum both during and after attacks. Integrated
threat correlation with Cisco AMP for Endpoints is also optionally available
Cisco AMP Threat Grid sandboxing
Available
URL filtering: number of categories
More than 80
URL filtering: number of URLs categorized
More than 280 Million
Automated threat feed and IPS signature updates
Yes: class-leading Collective Security Intelligence (CSI) from the Cisco Talos® group
(https://www.cisco.com/c/en/us/products/security/talos.html)
Third-party and opensource ecosystem
Open API for integrations with third-party products; Snort® and OpenAppID community
resources for new and specific threats
High availability and clustering
Active/standby; up to 6 modules across up to 6 different Firepower 9300 chassis.
Cisco Trust Anchor Technologies
Cisco Firepower 9300 Series platforms include Trust Anchor Technologies for supply chain
and software image assurance.
Stateful inspection firewall throughput
۷۵Gbps
Stateful inspection firewall throughput (multiprotocol)
۵۰Gbps
Concurrent firewall connections
۵۵Million
Firewall latency (UDP 64B microseconds)
۳.۵
New connections per second
۸۰۰,۰۰۰
IPsec VPN throughput (450B UDP L2L test)
۱۵Gbps
Maximum VPN Peers
۲۰,۰۰۰
Security contexts (included; maximum)
۱۰;۲۵۰
High availability
Active/active and active/standby
Clustering
Up to 16 security modules across up to 16 different Firepower 9300 chassis
Scalability
VPN load balancing, firewall clustering
Centralized management
Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager
or alternatively in the cloud with Cisco Defense Orchestrator
Adaptive Security Device Manager
Web-based, local management for small-scale deployments