Firewall Throughput
105Mpps
IPS Throughput
14Gbps
Interface
1. 2x USB Ports
2. 1x Console Port
3. 2x GE RJ45 MGMT/HA Ports
4. 16x GE RJ45 Ports
5. 8x GE SFP Slots
6. 4x 10GE/GE SFP+/SFP Slots
7. 4x 25GE/10GE SFP28/SFP+ Ultra Low Latency Slots
Threat Protection Throughput
10.5 Gbps
Application Control Throughput
32Gbps
IPSec VPN Throughput
55Gbps
SSL VPN Throughput
4.3Gbps
Firewall Latency
4.12μs
Concurrent Sessions (TCP)
8Million
New Sessions/Second (TCP)
550000
Local Storages
-
AC Power Supply
100–240V AC, 50/60Hz
Form Factor
Rack Mount, 1 RU
Variants
-
SSL Inspection Throughput
9Gbps
Throughput: Firewall (FW) + Application Visibility and Control (AVC)(1024B)
70 Gbps
Throughput: FW + AVC + Intrusion Prevention System (IPS (1024B)
64 Gbps
Maximum concurrent sessions, with AVC
35 million
Maximum new connections per second, with AVC
490K
TLS (Hardware Decryption)
12 Gbps
Throughput: NGIPS (1024B)
73 Gbps
IPSec VPN throughput (1024B TCP w/Fastpath)
27 Gbps
URL filtering: number of categories
More than 80
URL filtering: number of URLs categorized
More than 280 million
Stateful inspection firewall throughput
80 Gbps
Stateful inspection firewall throughput (multiprotocol)
64 Gbps
Concurrent firewall connections
60 million
Firewall latency (UDP 64B microseconds)
3.5
New connections persecond
2 million
IPsec VPN throughput (450B UDP L2L test)
30 Gbps
MaximumVPN Peers
20,000
Security contexts (included; maximum)
10; 250
High availability
Active/active and active/standby
Clustering
Up to 16 security modules across up to 16 different Firepower 9300 chassis
Scalability
VPN load balancing, firewall clustering
Adaptive Security Device Manager
Web-based, local management for small-scale deployments
AVC
Standard, supporting more than 4000 applications, as well as geolocations, users, and websites
AVC: OpenAppID support for custom, open-source application detectors
Standard
Cisco Security Intelligence
Standard, with IP, URL, and DNS threat intelligence
Cisco Firepower NGIPS
Available; can passively detect endpoints and infrastructure for threat correlation and Indicators of Compromise (IoC) intelligence