SlideShare a Scribd company logo
1 of 18
Download to read offline
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 18
Data Sheet
Cisco Firepower Next-Generation Firewall (NGFW)
Prevent breaches, get deep visibility to detect and stop threats fast, and automate
your network and security operations to save time and work smarter.
Prevent breaches Need to prevent breaches automatically to keep your business moving forward?
Talos, our team of 250+ threat researchers, analyze millions of threats daily and
create security protections that the Cisco NGFW uses to protect you against the next
big breach. WannaCry? NotPetya? VPNFilter? Talos stopped these mega-breaches
(and others) before they hit, and Cisco firewall customers were automatically
protected. Not a bad track record.
See more to detect
and stop threats fast
Worried that your firewall isn’t showing you the full picture? Cisco NGFWs go beyond
prevention and access control to give you deep visibility to see and stop threats fast.
Use built-in advanced security features like next-generation IPS, advanced malware
protection, and sandboxing to see across users, hosts, networks and infrastructure.
They continuously monitor for suspicious activity and automatically stop it the instant
it is seen. Our advanced security capabilities help you see more so you can stop
more.
Automate to save time
and work smart
Are your products working you instead of working for you? Cisco NGFW automates
your networking and security operations to save you time and reduce complexity so
you can focus on high priority tasks. Threat alerts are prioritized so you can stop
playing whack-a-mole and focus on what matters most. Cisco NGFWs work together
with the rest of Cisco’s integrated security tools to give you visibility across multiple
attack vectors, from edge to endpoint. When this system of tools sees a threat in one
place, it will automatically be blocked everywhere.
Model Overview
Cisco Firepower 2100 Series
The industry’s first midrange NGFWs delivering sustainable performance when threat inspection is
enabled
Cisco Firepower 4100 Series:
The industry’s first 1RU NGFWs with 40-Gbps
interfaces
Cisco Firepower 9300:
Ultra-high-performance NGFW, expandable as your
needs grow
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 18
Cisco ASA 5500-X Series:
Models for branch offices, industrial applications, and the Internet edge
Firepower NGFWv:
The NGFW for virtual and cloud environments
Platform Image Support
The Cisco Firepower NGFW includes Application Visibility and Control (AVC), optional Next-Gen IPS (NGIPS),
Cisco
®
Advanced Malware Protection (AMP) for Networks, and URL Filtering. The Cisco Firepower 2100 Series,
4100 Series, and 9300 appliances use the Cisco Firepower Threat Defense software image. Alternatively, Cisco
Firepower 2100 Series, 4100 Series, and 9300 appliances can support the Cisco Adaptive Security Appliance
(ASA) software image.
Management Options
Cisco Firepower NGFWs may be managed in a variety of ways depending on the way you work, your environment,
and your needs.
The Cisco Firepower Management Center (formerly FireSIGHT) provides centralized management of the Cisco
Firepower NGFW, the Cisco Firepower NGIPS, and Cisco AMP for Networks. It also provides threat correlation for
network sensors and Advanced Malware Protection (AMP) for Endpoints.
The Cisco Firepower Device Manager is available for local management of 2100 Series and select 5500-X Series
devices running the Cisco Firepower Threat Defense software image.
The Cisco Adaptive Security Device Manager is available for local management of the Cisco Firepower 2100
Series, 4100 Series, Cisco Firepower 9300 Series, and Cisco ASA 5500-X Series devices running the ASA
software image.
Cisco Defense Orchestrator cloud-based management is also available for consistent policy management across
Cisco security devices running the ASA software image, enabling greater management efficiency for the distributed
enterprise.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 18
Firepower DDoS Mitigation
Also available on the Cisco Firepower 4100 Series and 9300 appliances is tightly integrated, comprehensive,
behavioral DDoS mitigation for both network and application infrastructure protection. This DDoS mitigation is
Radware’s Virtual DefensePro (vDP). It is available from and supported directly by Cisco.
Cisco Firepower 2100 Series Appliances
The Cisco Firepower 2100 Series is a family of four threat-focused NGFW security platforms that deliver business
resiliency through superior threat defense. It offers exceptional sustained performance when advanced threat
functions are enabled. These platforms uniquely incorporate an innovative dual multicore CPU architecture that
optimizes firewall, cryptographic, and threat inspection functions simultaneously. The series’ firewall throughput
range addresses use cases from the Internet edge to the data center. Network Equipment Building Standards
(NEBS)- compliance is supported by the Cisco Firepower 2100 Series platform.
Cisco Firepower 4100 Series Appliances
The Cisco Firepower 4100 Series is a family of four threat-focused NGFW security platforms. Their throughput
range addresses data center and internet edge use cases. They deliver superior threat defense, at faster speeds,
with a smaller footprint. Cisco Firepower 4100 Series supports flow-offloading, programmatic orchestration, and the
management of security services with RESTful APIs. Network Equipment Building Standards (NEBS)-compliance
is supported by the Cisco Firepower 4120 platform.
Cisco Firepower 9300 Security Appliance
The Cisco Firepower 9300 is a scalable (beyond 1 Tbps when clustered), carrier-grade, modular platform designed
for service providers, high-performance computing centers, large data centers, campuses, high-frequency trading
environments, and other environments that require low (less than 5-microsecond offload) latency and exceptional
throughput. Cisco Firepower 9300 supports flow-offloading, programmatic orchestration, and the management of
security services with RESTful APIs. It is also available in Network Equipment Building Standards (NEBS)-
compliant configurations.
Cisco ASA 5500-FTD-X Series Appliances
The Cisco ASA 5500-FTD-X Series is a family of eight threat-focused NGFW security platforms. Their throughput
range addresses use cases from the small or branch office to the Internet edge. They deliver superior threat
defense in a cost-effective footprint.
Cisco Firepower NGFW Virtual (NGFWv) Appliances
Cisco Firepower NGFWv is available on VMware, KVM, and the Amazon Web Services (AWS) and Microsoft
Azure environments for virtual, public, private, and hybrid cloud environments. Organizations employing SDN can
rapidly provision and orchestrate flexible network protection with Firepower NGFWv. As well, organizations using
NFV can further lower costs utilizing Firepower NGFWv.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 18
Performance Testing Methodologies
Cisco uses a variety of testing methodologies in a lab environment to ensure the performance specifications we
report are as close to real world as possible. Firewall performance is affected by many factors including network
environment, packet sizes, packet type, TLS encryption, and more.
Two modes of firewall testing exist: static or real world. Static testing leverages performance and security testing
tools in a simulated environment. Real-world testing uses samples of live traffic on a production or side-car
network. While static testing does not completely mimic performance in a real-world networking environment, we
review and modify the static methodology to ensure the results are as close to real-world as possible.
The following are test methodologies used for measurements listed in Table 1. Change in performance vs change
in packet size is not linear, so extrapolation from a single test is not possible for the almost unlimited variety of
network environments. Testing security efficacy or security service performance under loaded conditions adds
even more complexity. For these reasons we rely on the 1024B HTTP Test.
1024B HTTP Test (256KB Object)
This number is to compare with other vendors at a 256KB object size. It uses a larger and commonly tested packet
size for every simulated session. With the protocol overhead, the average frame size is around 1024 bytes. This
represents typical production conditions for most firewall deployments.
1500B UDP vs 64B UDP
This test uses a transactional UDP profile with either 1500B or 64B frames. Due to the stateless nature of UDP, it
creates very little impact on a stateful NGFW. Many vendors use this profile to measure maximum firewall
performance, however it is only practical as a comparison point. This test does not represent real-world conditions,
therefore Cisco only uses it as a legacy metric for ASA performance. For NGFW products, various UDP packet
size should only be used to test latency and not overall performance.
Performance Specifications and Feature Highlights
Table 1 summarizes the capabilities of the Cisco Firepower NGFWv, Firepower 2100 Series, and 4100 Series and
9300 appliances as well as the Cisco ASA 5500-FTD-X appliances when running the Cisco Firepower Threat
Defense image. All numbers are derived with two-way traffic evaluation to replicate the best security posture.
Table 1. Cisco Firepower Threat Defense (FTD) Performance Specifications and Feature Highlights for Physical and
Virtual Appliances
Features Cisco Firepower Model Cisco ASA 5500-FTD-X Model
NGFWv
2110
2120
2130
2140
4110
4120
4140
4150
9300
with
1
SM-24
Module
9300
with
1
SM-36
Module
9300
with
1
SM-44
Module
9300
with
3
SM-44
Modules
5506-FTD-X
5506W-FTD-X
5506H-FTD-X
5508-FTD-X
5516-FTD-X
5525-FTD-X
5545-FTD-X
5555-FTD-X
Throughput:
FW + AVC
1024B
1.9
Gbps
2.0
Gbps
3
Gbps
4.75
Gbps
8.5
Gbps
12
Gbps
20
Gbps
25
Gbps
30
Gbps
30
Gbps
42
Gbps
54
Gbps
135
Gbps
250
Mbps
250
Mbps
250
Mbps
650
Mbps
1400
Mbps
1600
Mbps
1700
Mbps
1800
Mbps
Throughput:
FW + AVC +
IPS
1024B
1.9
Gbps
2.0
Gbps
3
Gbps
4.75
Gbps
8.5
Gbps
10
Gbps
15
Gbps
20
Gbps
24
Gbps
24
Gbps
34
Gbps
53
Gbps
133
Gbps
125
Mbps
125
Mbps
125
Mbps
600
Mbps
1200
Mbps
1500
Mbps
1600
Mbps
1700
Mbps
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 18
Features Cisco Firepower Model Cisco ASA 5500-FTD-X Model
NGFWv
2110
2120
2130
2140
4110
4120
4140
4150
9300
with
1
SM-24
Module
9300
with
1
SM-36
Module
9300
with
1
SM-44
Module
9300
with
3
SM-44
Modules
5506-FTD-X
5506W-FTD-X
5506H-FTD-X
5508-FTD-X
5516-FTD-X
5525-FTD-X
5545-FTD-X
5555-FTD-X
Maximum
concurrent
sessions,
with AVC
100K 1M 1.2M 2M 3M 9M 15M 25M 30M 30M 30M 30M 60M 20K 20K 20K 100K 250K 500K 750K 1M
Maximum
new
connections
per second,
with AVC
10K 12K 16K 24K 40K 68K 120K 160K 200K 120K 160K 300K 900K 3K 3K 3K 7K 8K 10K 15K 20K
IPSec VPN
Throughput
(1024B TCP
w/Fastpath)
- 750
Mbps
1
Gbps
1.5
Gbps
3
Gbps
6
Gbps
10
Gbps
13
Gbps
14
Gbps
13.5
Gbps
16
Gbps
17
Gbps
51
Gbps
100
Mbps
100
Mbps
100
Mbps
175
Mbps
250
Mbps
300
Mbps
400
Mbps
700
Mbps
Maximum
VPN Peers
- 1500 3500 7500 10000 10000 15000 20000 20000 20000 20000 2000
0
60000 50 50 50 100 300 300 400 700
Cisco
Firepower
Device
Manager
(local
management)
Yes
(VMw
are
only)
Yes Yes Yes Yes - - - - - - - - Yes Yes Yes Yes Yes Yes Yes Yes
Centralized
management
Centralized configuration, logging, monitoring, and reporting are performed by the Management Center or alternatively in the cloud with Cisco Defense Orchestrator
Application
Visibility and
Control
(AVC)
Standard, supporting more than 4000 applications, as well as geolocations, users, and websites
AVC:
OpenAppID
support for
custom, open
source,
application
detectors
Standard
Cisco
Security
Intelligence
Standard, with IP, URL, and DNS threat intelligence
Cisco
Firepower
NGIPS
Available; can passively detect endpoints and infrastructure for threat correlation and Indicators of Compromise (IoC) intelligence
Cisco AMP
for Networks
Available; enables detection, blocking, tracking, analysis, and containment of targeted and persistent malware, addressing the attack continuum both during and after attacks. Integrated
threat correlation with Cisco AMP for Endpoints is also optionally available
Cisco AMP
Threat Grid
sandboxing
Available
URL
Filtering:
number of
categories
More than 80
URL
Filtering:
number of
URLs
categorized
More than 280 million
Automated
Malware
Analysis
Feed, Threat
Yes: Industry-leading Threat Intelligence from the Cisco Talos Threat Research Group (https://www.talosintelligence.com/)
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 18
Features Cisco Firepower Model Cisco ASA 5500-FTD-X Model
NGFWv
2110
2120
2130
2140
4110
4120
4140
4150
9300
with
1
SM-24
Module
9300
with
1
SM-36
Module
9300
with
1
SM-44
Module
9300
with
3
SM-44
Modules
5506-FTD-X
5506W-FTD-X
5506H-FTD-X
5508-FTD-X
5516-FTD-X
5525-FTD-X
5545-FTD-X
5555-FTD-X
Feed, and
IPS Signature
Updates
Third-party
and open-
source
ecosystem
Open API for integrations with third-party products; Snort
®
and OpenAppID community resources for new and specific threats
High
availability
and
clustering
Activ
e/Sta
ndby
for
ESXi
and
KVM
Active/standby; for Cisco Firepower 9300 intrachassis clustering of up to 5 chassis is allowed; Cisco Firepower 4100 Series allows clustering of up to 6 chassis
VLANs
maximum
1024 1024
Cisco Trust
Anchor
Technologies
- ASA 5506-X, 5508-X, and 5516-X appliances, Firepower 2100 Series and Firepower 4100 Series and 9300 platforms include Trust Anchor Technologies for supply chain and
software image assurance. Please see the section below for additional details
Note: Throughput assumes HTTP sessions.
Performance will vary depending on features activated, and network traffic protocol mix, packet size characteristics
and hypervisor employed (NGFWv). Performance is subject to change with new software releases. Consult your
Cisco representative for detailed sizing guidance.
Table 2 summarizes the performance and capabilities of the Cisco Firepower 2100, 4100 Series and 9300
appliances when running the ASA image. For Cisco ASA 5500-X Series performance specifications with the ASA
image, please visit the Cisco ASA with FirePOWER Services data sheet.
Table 2. ASA Performance and Capabilities on Firepower Appliances
Features Cisco Firepower Appliance Model
2110 2120 2130 2140 4110 4120 4140 4150 9300
with 1
SM-24
Module
9300
with 1
SM-36
Module
9300
with 1
SM-44
Module
9300
with 3
SM-44
Modules
Stateful
inspection
firewall
throughput
1
3 Gbps 6 Gbps 10 Gbps 20 Gbps 35 Gbps 60 Gbps 70 Gbps 75 Gbps 75 Gbps 80 Gbps 80 Gbps 234 Gbps
Stateful
inspection
firewall
throughput
(multiprotoc
ol)
2
1.5 Gbps 3 Gbps 5 Gbps 10 Gbps 15 Gbps 30 Gbps 40 Gbps 50 Gbps 50 Gbps 60 Gbps 60 Gbps 130 Gbps
Concurrent
firewall
connections
1 million 1.5 million 2 million 3 million 10 million 15 million 25 million 35 million 55 million 60 million 60 million 70 million
Firewall
latency (UDP
64B
microsecond
s)
- - - - 3.5 3.5 3.5 3.5 3.5 3.5 3.5 3.5
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 18
Features Cisco Firepower Appliance Model
2110 2120 2130 2140 4110 4120 4140 4150 9300
with 1
SM-24
Module
9300
with 1
SM-36
Module
9300
with 1
SM-44
Module
9300
with 3
SM-44
Modules
New
connections
per second
18000 28000 40000 75000 150,000 250,000 350,000 800,000 800,000 1.2 million 1.8 million 4 million
IPsec VPN
throughput
(450B UDP
L2L test)
500 Mbps 700 Mbps 1 Gbps 2 Gbps 8 Gbps 10 Gbps 14 Gbps 15 Gbps 15 Gbps 18 Gbps 20 Gbps 60 Gbps
3
/ 40 Gbps
IPsec/Cisco
AnyConnect/
Apex site-to-
site VPN
peers
1500 3500 7500 10000 10,000 15,000 20,000 20,000 20,000 20,000 20,000 60,000
3
/ 20,000
Maximum
number of
VLANs
400 600 750 1024 1024 1024 1024 1024 1024 1024 1024 1024
Security
contexts
(included;
maximum)
2; 25 2; 25 2; 30 2; 40 10; 250 10; 250 10; 250 10; 250 10; 250 10; 250 10; 250 10; 250
High
availability
Active/acti
ve and
active/sta
ndby
Active/acti
ve and
active/sta
ndby
Active/acti
ve and
active/sta
ndby
Active/a
ctive
and
active/st
andby
Active/acti
ve and
active/stan
dby
Active/acti
ve and
active/stan
dby
Active/acti
ve and
active/stan
dby
Active/acti
ve and
active/stan
dby
Active/acti
ve and
active/sta
ndby
Active/acti
ve and
active/sta
ndby
Active/acti
ve and
active/sta
ndby
Active/acti
ve and
active/sta
ndby
Clustering - - - - Up to 16
appliances
Up to 16
appliances
Up to 16
appliances
Up to 16
appliances
Up to 5
appliance
s with 3
security
modules
each
Up to 5
appliance
s with
three
security
modules
each
Up to 5
appliance
s with
three
security
modules
each
Up to 5
appliance
s with 3
security
modules
each
Scalability VPN Load Balancing VPN Load Balancing, Firewall Clustering
Centralized
management
Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager or alternatively in the cloud with Cisco Defense
Orchestrator
Adaptive
Security
Device
Manager
Web-based, local management for small-scale deployments
1
Throughput measured with 1500B User Datagram Protocol (UDP) traffic measured under ideal test conditions.
2
“Multiprotocol” refers to a traffic profile consisting primarily of TCP-based protocols and applications like HTTP, SMTP, FTP,
IMAPv4, BitTorrent, and DNS.
3
In unclustered configuration.
Table 3. Operating Requirements for Firepower NGFWv Virtual Appliances
Platform Support VMware, KVM, AWS, Azure
Minimum systems requirements: VMware 4 vCPU
8-GB memory
50-GB disk
Minimum systems requirements: KVM 4 vCPU
8-GB memory
50-GB disk
Supported AWS instances c3.xlarge
Supported Azure instances Standard_D3
Management options Firepower Management Center
Cisco Defense Orchestrator
Firepower Device Manager (VMware)
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 18
Hardware Specifications
Tables 4, 5, and 6 summarize the hardware specifications for the 2100 Series, 4100 Series, and 9300 Series,
respectively. Table 7 summarizes regulatory standards compliance. For Cisco ASA 5500-X Series hardware
specifications, please visit the Cisco ASA with FirePOWER Services data sheet.
Table 4. Cisco Firepower 2100 Series Hardware Specifications
Features Cisco Firepower Model
2110 2120 2130 2140
Dimensions (H x W x D) 1.73 x 16.90 x 19.76 in. (4.4 x 42.9 x 50.2 cm)
Form factor (rack units) 1RU
Security module slots -
I/O module slots 0 1 NM slot
Integrated I/O 12 x 10M/100M/1GBASE-T Ethernet
interfaces (RJ-45), 4 x 1 Gigabit (SFP)
Ethernet interfaces
12 x 10M/100M/1GBASE-T Ethernet interfaces
(RJ-45), 4 x 10 Gigabit (SFP+) Ethernet
interfaces
Network modules None (FPR-NM-8X10G) 8 x 10 Gigabit Ethernet
Enhanced Small Form-Factor Pluggable
(SFP+) network module
Note: The 2100 Series appliances may also be deployed as dedicated threat sensors with
fail-to-wire network modules. Please contact your Cisco representative for details.
Maximum number of interfaces Up to 16 total Ethernet ports
(12x1G RJ-45, 4x1G SFP)
Up to 24 total Ethernet ports (12x1G RJ-45,
4x10G SFP+, and network module with
8x10G SFP+)
Integrated network management ports 1 x 10M/100M/1GBASE-T Ethernet port (RJ-45)
Serial port 1 x RJ-45 console
USB 1 x USB 2.0 Type-A (500mA)
Storage 1x 100 GB, 1x spare
slot (for MSP)
1x 100 GB, 1x
spare slot (for MSP)
1x 200 GB, 1x spare
slot (for MSP)
1x 200 GB, 1x spare
slot (for MSP)
Power supplies Configuration Single integrated 250W AC power supply. Single 400W AC, Dual
400W AC optional.
Single/Dual 350W DC
optional1
Dual 400W AC.
Single/dual 350W DC
optional1
AC input voltage 100 to 240V AC 100 to 240V AC
AC maximum input current < 2.7A at 100V < 6A at 100V
AC maximum output power 250W 400W
AC frequency 50 to 60 Hz 50 to 60 Hz
AC efficiency >88% at 50% load >89% at 50% load
DC input voltage - -48V to -60VDC
DC maximum input current - < 12.5A at -48V
DC maximum output power - 350W
DC efficiency - >88% at 50% load
Redundancy None 1+1 AC or DC with dual supplies
Fans 4 integrated (2 internal, 2 exhaust) fans2
1 hot-swappable fan module (with 4 fans)2
Noise 56 dBA @ 25C
74 dBA at highest system performance.
56 dBA @ 25C
77 dBA at highest system performance.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 18
Features Cisco Firepower Model
2110 2120 2130 2140
Rack mountable Yes. Fixed mount brackets included
(2-post). Mount rails optional
(4-post EIA-310-D rack)
Yes. Mount rails included
(4-post EIA-310-D rack)
Weight 16.1 lb (7.3 kg): with 2x SSDs 19.4 lb (8.8 kg) 1 x
power supplies, 1 x
NM, 1 x fan module,
2x SSDs
21 lb (9.53 kg) 2 x
power supplies, 1 x
NM, 1 x fan module,
2x SSDs
Temperature: operating 32 to 104°F (0 to 40°C) 32 to 104°F (0 to
40°C) or NEBS
operation (see below)3
32 to 104°F (0 to
40°C)
Temperature: nonoperating -4 to 149°F (-20 to 65°C)
Humidity: operating 10 to 85% noncondensing
Humidity: nonoperating 5 to 95% noncondensing
Altitude: operating 10,000 ft (max) 10,000 ft (max) or
NEBS operation
(see below)3
10,000 ft (max)
Altitude: nonoperating 40,000 ft (max)
NEBS operation (FPR-2130 Only)3
Operating altitude: 0 to 13,000 ft (3962 m)
Operating temperature:
Long term: 0 to 45°C, up to 6,000 ft (1829 m)
Long term: 0 to 35°C, 6,000 to 13,000 ft (1829 to 3964 m)
Short term: -5 to 55°C, up to 6,000 ft (1829 m)
1
Dual power supplies are hot-swappable.
2
Fans operate in a 3+1 redundant configuration where the system will continue to function with only 3 operational fans. The 3
remaining fans will run at full speed.
3
FPR-2130 platform is designed to be NEBS ready. The availability of NEBS certification is pending.
Table 5. Cisco Firepower 4100 Series Hardware Specifications
Features Cisco Firepower Model
4110 4120 4140 4150
Dimensions (H x W x D) 1.75 x 16.89 x 29.7 in. (4.4 x 42.9 x 75.4 cm)
Form factor (rack units) 1RU
Security module slots -
I/O module slots 2
Supervisor Cisco Firepower 4000 Supervisor with 8 x 10 Gigabit Ethernet ports and 2 Network Module
(NM) slots for I/O expansion
Network modules ● 8 x 10 Gigabit Ethernet Enhanced Small Form-Factor Pluggable (SFP+) network modules
● 4 x 40 Gigabit Ethernet Quad SFP+ network modules
● 8-port 1Gbps copper, FTW (fail to wire) Network Module
Note: Firepower 4100 Series appliances may also be deployed as dedicated threat sensors,
with fail-to-wire network modules. Please contact your Cisco representative for details.
Maximum number of interfaces Up to 24 x 10 Gigabit Ethernet (SFP+) interfaces; up to 8 x 40 Gigabit Ethernet (QSFP+)
interfaces with 2 network modules
Integrated network management ports 1 x Gigabit Ethernet copper port
Serial port 1 x RJ-45 console
USB 1 x USB 2.0
Storage 200 GB 200 GB 400 GB 400 GB
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 10 of 18
Features Cisco Firepower Model
4110 4120 4140 4150
Power supplies Configuration Single 1100W AC,
dual optional.
Single/dual 950W DC
optional1, 2
Single 1100W AC, dual
optional. Single/dual
950W DC optional1
Dual 1100W AC1
Dual 1100W AC1
AC input voltage 100 to 240V AC
AC maximum input current 13A
AC maximum output power 1100W
AC frequency 50 to 60 Hz
AC efficiency >92% at 50% load
DC input voltage -40V to -60VDC
DC maximum input current 27A
DC maximum output power 950W
DC efficiency >92.5% at 50% load
Redundancy 1+1
Fans 6 hot-swappable fans
Noise 78 dBA
Rack mountable Yes, mount rails included (4-post EIA-310-D rack)
Weight 36 lb (16 kg): 2 x power supplies, 2 x NMs, 6x fans; 30 lb (13.6 kg): no power supplies, no
NMs, no fans
Temperature: operating 32 to 104°F
(0 to 40°C)
32 to 104°F
(0 to 40°C) or NEBS
operation (see below)
32 to 95°F (0 to
35°C), at sea level
32 to 95°F (0 to
35°C), at sea
level
Temperature: nonoperating -40 to 149°F (-40 to 65°C)
Humidity: operating 5 to 95% noncondensing
Humidity: nonoperating 5 to 95% noncondensing
Altitude: operating 10,000 ft (max) 10,000 ft (max) or NEBS
operation (see below)
10,000 ft (max)
Altitude: nonoperating 40,000 ft (max)
NEBS operation (FPR 4120 only) Operating altitude: 0 to 13,000 ft (3960 m)
Operating temperature:
Long term: 0 to 45°C, up to 6,000 ft (1829 m)
Long term: 0 to 35°C, 6,000 to 13,000 ft (1829 to 3964 m)
Short term: -5 to 50°C, up to 6,000 ft (1829 m)
1
Dual power supplies are hot-swappable.
Table 6. Cisco Firepower 9300 Hardware Specifications
Specification Description
Dimensions (H x W x D) 5.25 x 17.5 x 32 in. (13.3 x 44.5 x 81.3 cm)
Form factor 3 Rack Units (3RU), fits standard 19-in. (48.3-cm) square-hole rack
Security module slots 3
Network module slots 2 (within supervisor)
Supervisor Cisco Firepower 9000 Supervisor with 8 x 10 Gigabit Ethernet ports and 2 network module slots for I/O
expansion
Security modules ● Cisco Firepower 9000 Security Module 24 with 2 x SSDs in RAID-1 configuration
● Cisco Firepower 9000 Security Module 36 with 2 x SSDs in RAID-1 configuration
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 11 of 18
Specification Description
Network modules ● 8 x 10 Gigabit Ethernet Enhanced Small Form-Factor Pluggable (SFP+) network modules
● 4 x 40 Gigabit Ethernet Quad SFP+ network modules
● 2 x 100 Gigabit Ethernet Quad SFP28 network modules (double-wide, occupies both network
module bays)
Note: Firepower 9300 may also be deployed as a dedicated threat sensor, with fail-to-wire network
modules. Please contact your Cisco representative for details.
Maximum number of interfaces Up to 24 x 10 Gigabit Ethernet (SFP+) interfaces; up to 8 x 40 Gigabit Ethernet (QSFP+) interfaces
with 2 network modules
Integrated network management ports 1 x Gigabit Ethernet copper port (on supervisor)
Serial port 1 x RJ-45 console
USB 1 x USB 2.0
Storage Up to 2.4 TB per chassis (800 GB per security module in RAID-1 configuration)
Power supplies AC power supply -48V DC power supply HVDC power supply
Input voltage 200 to 240V AC -40V to -60V DC*
240 to 380V DC
Maximum input current 15.5A to 12.9A 69A to 42A <14A at 200V
Maximum output power 2500W 2500W 2500W
Frequency 50 to 60 Hz - -
Efficiency (at 50% load) 92% 92% 92% (at 50% load)
Redundancy 1+1
Fans 4 hot-swappable fans
Noise 75.5 dBA at maximum fan speed
Rack mountable Yes, mount rails included (4-post EIA-310-D rack)
Weight 105 lb (47.7 kg) with one security module; 135 lb (61.2 kg) fully configured
Temperature: standard operating Up to 10,000 ft (3000 M): 32 to 104°F (0 to 40°C) for SM-24 module
32 to 88°F (0 to 35°C) for SM-36 module at sea-level
Altitude adjustment notes:
For SM-36, maximum temp is 35⁰C, for every 1000 feet above sea level subtract 1⁰C
Temperature: NEBS operating Long term: 0 to 45°C, up to 6,000 ft (1829 m)
Long term: 0 to 35°C, 6,000 to 13,000 ft (1829-3964 m)
Short term: -5 to 55°C, up to 6,000 ft (1829 m)
Note: Cisco Firepower 9300 NEBS compliance applies only to SM-24 configurations.
Temperature: nonoperating -40 to 149°F (-40 to 65°C); maximum altitude is 40,000 ft
Humidity: operating 5 to 95% noncondensing
Humidity: nonoperating 5 to 95% noncondensing
Altitude: operating SM-24: 0 to 13,000 ft (3962 m)
SM-36: 0 to 10,000 ft (3048 m); please see above Operating Temperature section for temperature
adjustment notes
Altitude: nonoperating 40,000 ft (12,192 m)
*
Minimum turn-on voltage is -44V DC
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 12 of 18
Table 7. Cisco Firepower 2100 Series, 4100 Series and Cisco Firepower 9300 NEBS, Regulatory, Safety, and EMC
Compliance
Specification Description
NEBS Cisco Firepower 9300 is NEBS compliant with SM-24 Security Modules. Cisco Firepower
4120 is NEBS compliant.
Regulatory compliance Products comply with CE markings per directives 2004/108/EC and 2006/108/EC
Safety ● UL 60950-1
● CAN/CSA-C22.2 No. 60950-1
● EN 60950-1
● IEC 60950-1
● AS/NZS 60950-1
● GB4943
EMC: emissions ● 47CFR Part 15 (CFR 47) Class A (FCC Class A)
● AS/NZS CISPR22 Class A
● CISPR22 CLASS A
● EN55022 Class A
● ICES003 Class A
● VCCI Class A
● EN61000-3-2
● EN61000-3-3
● KN22 Class A
● CNS13438 Class A
● EN300386
● TCVN7189
EMC: Immunity ● EN55024
● CISPR24
● EN300386
● KN24
● TVCN 7317
● EN-61000-4-2
● EN-61000-4-3
● EN-61000-4-4
● EN-61000-4-5
● EN-61000-4-6
● EN-61000-4-8
● EN-61000-4-11
Cisco Trust Anchor Technologies
Cisco Trust Anchor Technologies provide a highly secure foundation for certain Cisco products. They enable
hardware and software authenticity assurance for supply chain trust and strong mitigation against a man-in-the-
middle compromise of software and firmware.
Trust Anchor capabilities include:
● Image signing: Cryptographically signed images provide assurance that the firmware, BIOS, and other
software are authentic and unmodified. As the system boots, the system’s software signatures are checked
for integrity.
● Secure Boot: Secure Boot anchors the boot sequence chain of trust to immutable hardware, mitigating
threats against a system’s foundational state and the software that is to be loaded, regardless of a user’s
privilege level. It provides layered protection against the persistence of illicitly modified firmware.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 13 of 18
● Trust Anchor module: A tamper-resistant, strong-cryptographic, single-chip solution provides hardware
authenticity assurance to uniquely identify the product so that its origin can be confirmed to Cisco, providing
assurance that the product is genuine.
Firepower DDoS Mitigation
Firepower DDoS Mitigation is provided by Radware Virtual DefensePro (vDP), available and supported directly
from Cisco on the following Cisco Firepower 9300 and 4100 series appliances:
Cisco Firepower Model ASA image FTD Image
9300 – SM-44 yes yes
9300 – SM-36 yes yes
9300 – SM-24 yes yes
4150 yes yes
4140 yes yes
4120 yes yes
4110 no yes
Radware vDP is an award-winning, real-time, behavioral DDoS attack mitigation solution that protects
organizations against multiple DDoS threats. Firepower DDoS mitigation defends your application infrastructure
against network and application degradation and outage.
DDoS Mitigation: Protection Set
Firepower’s vDP DDoS mitigation consists of patent-protected, adaptive, behavioral-based real-time signature
technology that detects and mitigates zero-day network and application DDoS attacks in real time. It eliminates the
need for human intervention and does not block legitimate user traffic when under attack.
The following attacks are detected and mitigated:
● SYN flood attacks
● Network DDoS attacks, including IP floods, ICMP floods, TCP floods, UDP floods, and IGMP floods
● Application DDoS attacks, including HTTP floods and DNS query floods
● Anomalous flood attacks, such as nonstandard and malformed packet attacks
Performance
The performance figures in Table 8 apply to all Cisco Firepower 4100 series models.
Table 8. Key DDoS Performance Metrics for Cisco Firepower 4100 Series
Parameter Value
Maximum mitigation capacity/throughput 10 Gbps
Maximum legitimate concurrent sessions 209,000 Connections Per Second (CPS)
Maximum DDoS flood attack prevention rate 1,800,000 Packets Per Second (PPS)
The performance figures in Table 9 are for Cisco Firepower 9300 with 1 to 3 Security Modules irrespective of
Security Module type (SM-24, SM-36 or SM-44).
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 14 of 18
Table 9. Key DDoS Performance Metrics for Cisco Firepower 9300 with 1, 2, or 3 Security Modules.
Parameter Firepower 9300 with 1 Security
Module
Firepower 9300 with 2 Security
Modules
Firepower 9300 with 3 Security
Modules
Maximum mitigation
capacity/throughput
10 Gbps 20 Gbps 30 Gbps
Maximum legitimate
concurrent sessions
209,000 Connections Per Second
(CPS)
418,000 Connections Per Second
(CPS)
627,000 Connections Per Second
(CPS)
Maximum DDoS flood
attack prevention rate
1,800,000 Packets Per Second
(PPS)
3,600,000 Packets Per Second
(PPS)
5,400,000 Packets Per Second (PPS)
Ordering Information
Cisco Smart Licensing
The Cisco Firepower NGFW is sold with Cisco Smart Licensing. Cisco understands that purchasing, deploying,
managing, and tracking software licenses is complex. As a result, we are introducing Cisco Smart Software
Licensing, a standardized licensing platform that helps customers understand how Cisco software is used across
their network, thereby reducing administrative overhead and operating expenses.
With Smart Licensing, you have a complete view of software, licenses, and devices from one portal. Licenses are
easily registered and activated and can be shifted between like hardware platforms. Additional information is
available here: https://www.cisco.com/web/ordering/smart-software-licensing/index.html. Related information, on
Smart Licensing Smart Accounts, is available here: https://www.cisco.com/web/ordering/smart-software-
manager/smart-accounts.html.
Cisco Smart Net Total Care Support: Move Quickly with Anytime Access to Cisco Expertise and
Resources
Cisco Smart Net Total Care
™
is an award-winning technical support service that gives your IT staff direct anytime
access to Technical Assistance Center (TAC) engineers and Cisco.com resources. You receive the fast, expert
response and the dedicated accountability you require to resolve critical network issues.
Smart Net Total Care provides the following device-level support:
● Global access 24 hours a day, 365 days a year to specialized engineers in the Cisco TAC
● Anytime access to the extensive Cisco.com online knowledge base, resources, and tools
● Hardware replacement options include 2-hour, 4-hour, Next-Business-Day (NDB) advance replacement, as
well as Return For Repair (RFR)
● Ongoing operating system software updates, including both minor and major releases within your licensed
feature set
● Proactive diagnostics and real-time alerts on select devices with Smart Call Home
In addition, with the optional Cisco Smart Net Total Care Onsite Service, a field engineer installs replacement parts
at your location and helps ensure that your network operates optimally. For more information on Smart Net Total
Care please visit: https://www.cisco.com/c/en/us/services/portfolio/product-technical-support/smart-net-total-
care.html.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 15 of 18
Select Part Numbers
Tables 10, 11, and 12 provide details on part numbers for Cisco Firepower NGFW solutions. Please consult the
Ordering Guide for additional configuration options and accessories.
Table 10. Cisco Firepower 2100 Series: Select Product Components
Part Number (Appliance Master Bundle) Description
FPR2110-BUN Cisco Firepower 2110 Master Bundle
FPR2120-BUN Cisco Firepower 2120 Master Bundle
FPR2130-BUN Cisco Firepower 2130 Master Bundle
FPR2140-BUN Cisco Firepower 2140 Master Bundle
Part Number (Network Module) Description
FPR2K-NM-8X10G= Spare Cisco Firepower 8-port SFP+ network module
Part Number (Appliances with FTD software)
FPR2110-NGFW-K9 Cisco Firepower 2110 NGFW Appliance, 1RU
FPR2120-NGFW-K9 Cisco Firepower 2120 NGFW Appliance, 1RU
FPR2130-NGFW-K9 Cisco Firepower 2130 NGFW Appliance, 1RU, 1 x Network Module Bays
FPR2140-NGFW-K9 Cisco Firepower 2140 NGFW Appliance, 1RU, 1 x Network Module Bays
Cisco Firepower 2100 Series NGFW Select Licenses
L-FPR2110T-TMC= Cisco Firepower 2110 Threat Defense Threat, Malware, and URL License
L-FPR2120T-TMC= Cisco Firepower 2120 Threat Defense Threat, Malware, and URL License
L-FPR2130T-TMC= Cisco Firepower 2130 Threat Defense Threat, Malware, and URL License
L-FPR2140T-TMC= Cisco Firepower 2140 Threat Defense Threat, Malware, and URL License
Note: These optional security services licenses can be ordered with 1-, 3-, or 5-year subscriptions.
Part Number (Appliances with ASA Software)
FPR2110-ASA-K9 Cisco Firepower 2110 ASA Appliance, 1RU
FPR2120-ASA-K9 Cisco Firepower 2120 ASA Appliance, 1RU
FPR2130-ASA-K9 Cisco Firepower 2130 ASA Appliance, 1RU, 1 x Network Module Bays
FPR2140-ASA-K9 Cisco Firepower 2140 ASA Appliance, 1RU, 1 x Network Module Bays
Optional ASA Software Licenses Description
L-FPR2K-ENC-K9= License to enable strong encryption for ASA on Cisco Firepower 2100 Series
L-FPR2K-ASASC-10= Cisco Firepower 2100 Add-on 10 security context licenses
L-FPR2K-ASASC-5= Cisco Firepower 2100 Add-on 5 security context licenses
Hardware Accessories
Please consult the ordering guide for accessories including rack mounts, spare fans, power supplies, and Solid-State Drives (SSDs)
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 16 of 18
Table 11. Cisco Firepower 4100 Series: Select Product Components
Part Number (Appliance Master Bundle) Description
FPR4110-BUN Cisco Firepower 4110 Master Bundle, for ASA or Cisco Firepower Threat Defense Image
FPR4120-BUN Cisco Firepower 4120 Master Bundle, for ASA or Cisco Firepower Threat Defense Image
FPR4140-BUN Cisco Firepower 4140 Master Bundle, for ASA or Cisco Firepower Threat Defense Image
FPR4150-BUN Cisco Firepower 4150 Master Bundle, for ASA or Cisco Firepower Threat Defense Image
Part Number (Spare Network Module) Description
FPR4K-NM-8X10G= Spare Cisco Firepower 8-port SFP+ network module
FPR4K-NM-4X40G= Spare Cisco Firepower 4-port QSFP+ network module
Hardware Accessories
Please consult the ordering guide for accessories including rack mounts, spare fans, power supplies, and Solid-State Drives (SSDs)
Optional ASA Software Licenses Description
L-F4K-ASA-CAR License to add Carrier Security Features to ASA
L-FPR4K-ENCR-K9 License to enable strong encryption for ASA on Cisco Firepower 4100 Series
L-FPR4K-ASASC-10 Cisco Firepower 4100 Add-on 10 security context licenses
Cisco Firepower 4100 Series NGFW Select Licenses
L-FPR4110T-TMC= Cisco Firepower 4110 Threat Defense Threat, Malware, and URL License
L-FPR4120T-TMC= Cisco Firepower 4120 Threat Defense Threat, Malware, and URL License
L-FPR4140T-TMC= Cisco Firepower 4140 Threat Defense Threat, Malware, and URL License
L-FPR4150T-TMC= Cisco Firepower 4150 Threat Defense Threat, Malware, and URL License
Note: These optional security services licenses can be ordered with 1-, 3-, or 5-year subscriptions.
Table 12. Cisco Firepower 9300: Select Product Components
Part Number (Chassis) Description
FPR-C9300-AC Cisco Firepower 9300 AC Chassis - includes 2 power supply units + 4 fans + rack-mount kit
(3RU; accommodates up to three security modules)
FPR-C9300-DC Cisco Firepower 9300 DC Chassis - includes 2 power supply units + 4 fans + rack-mount kit
(3RU; accommodates up to three security modules)
FPR-C9300-HVDC Cisco Firepower 9300 high-voltage DC Chassis - includes 2 power supply units + 4 fans +
rack-mount kit (3RU; accommodates up to three security modules)
Part Number (Security Module) Description
FPR9K-SM-24 24 Physical Core Security Module (NEBS Ready)
FPR9K-SM-36 36 Physical Core Security Module
FPR9K-SM-44 44 Physical Core Security Module
ASA Software Licenses for Cisco
Firepower 9300
Description
L-F9K-ASA-CAR License to add Carrier Security Features to ASA
L-F9K-ASA-CAR= License to add Carrier Security Features to ASA
L-F9K-ASA-SC-10 License to add 10 Security Contexts to ASA in Cisco Firepower 9000
L-F9K-ASA-SC-10= License to add 10 Security Contexts to ASA in Cisco Firepower 9000
L-F9K-ASA License to run Standard ASA on a Cisco Firepower 9300 module
L-F9K-ASA= License to run Standard ASA on a Cisco Firepower 9300 module
L-F9K-ASA-ENCR-K9 License to enable strong encryption in ASA running on Cisco Firepower 9000
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 17 of 18
Cisco Firepower 9300 NGFW Threat Defense
Software Licenses
Description
FPR9K-TD-BASE Cisco Firepower Threat Defense Base License for Cisco Firepower 9300 NGFW
L-FPR9K-SM24-TMC= Cisco Firepower 9000 SM-24 Threat Defense Threat, Malware, and URL License
L-FPR9K-SM24-TMC-3Y Cisco Firepower 9000 SM-24 Threat Defense Threat, Malware, and URL 3Yr Svc
L-FPR9K-SM36-TMC= Cisco Firepower 9000 SM-36 Threat Defense Threat, Malware, and URL License
L-FPR9K-SM36-TMC-3Y Cisco Firepower 9000 SM-36 Threat Defense Threat, Malware, and URL 3Yr Svc
L-FPR9K-SM44-TMC= Cisco Firepower 9000 SM-44 Threat Defense Threat, Malware, and URL License
L-FPR9K-SM44-TMC-3Y Cisco Firepower 9000 SM-44 Threat Defense Threat, Malware, and URL 3Yr Svc
*
Note: Firepower 9300 may also be deployed as a dedicated threat sensor, with fail-to-wire network modules.
Please contact your Cisco representative for details.
Table 13. Cisco Firepower NGFW Virtual
Part Number (Virtual Appliance)
FPRTD-V-K9 Cisco Firepower NGFWv Base License
Cisco Firepower NGFW Virtual Select Licenses
L-FPRTD-V-T= Cisco Firepower NGFWv Threat Defense Threat Protection License
L-FPRTD-V-TM= Cisco Firepower NGFWv Threat Defense Threat and Malware Protection License
L-FPRTD-V-TC= Cisco Firepower NGFWv Threat Defense Threat and URL License
L-FPRTD-V-TMC= Cisco Firepower NGFWv Threat Defense Threat, Malware, and URL License
Note: These optional security services licenses can be ordered with 1-, 3-, or 5-year subscriptions.
Warranty Information
Find warranty information on cisco.com at the Product Warranties page.
Cisco Services
Cisco offers a wide range of service programs to accelerate customer success. These innovative services
programs are delivered through a unique combination of people, processes, tools, and partners, resulting in high
levels of customer satisfaction. Cisco Services help you protect your network investment, optimize network
operations, and prepare your network for new applications to extend network intelligence and the power of your
business. For more information about Cisco services for security, visit https://www.cisco.com/go/services/security.
Cisco Capital
Flexible payment solutions to help you achieve your objectives
Cisco Capital makes it easier to get the right technology to achieve your objectives, enable business transformation
and help you stay competitive. We can help you reduce the total cost of ownership, conserve capital, and
accelerate growth. In more than 100 countries, our flexible payment solutions can help you acquire hardware,
software, services and complementary third-party equipment in easy, predictable payments. Learn more.
More Information for Service Providers
For information about Cisco Firepower in service provider environments, please visit:
● https://www.cisco.com/c/en/us/solutions/enterprise-networks/service-provider-security-solutions/
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 18 of 18
More Information about Firepower NGFWs
For further information about Cisco Firepower NGFWs, please visit:
● https://www.cisco.com/go/ngfw
More Information about Cisco Anyconnect
● Cisco AnyConnect Secure Mobility Client
https://www.cisco.com/go/anyconnect
● Cisco AnyConnect Ordering Guide
https://www.cisco.com/c/dam/en/us/products/security/anyconnect-og.pdf
Printed in USA C78-736661-17 10/18

More Related Content

What's hot

Aci presentation
Aci presentationAci presentation
Aci presentationJoe Ryan
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
 
TechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISETechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISERobb Boyd
 
Cisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center HyderabadCisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center HyderabadMehtabRohela
 
Cisco Application Centric Infrastructure
Cisco Application Centric InfrastructureCisco Application Centric Infrastructure
Cisco Application Centric Infrastructureislam Salah
 
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017Bruno Teixeira
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptxKISHOYIANKISH
 
Cisco Catalyst 9000 Switching Family
Cisco Catalyst 9000 Switching FamilyCisco Catalyst 9000 Switching Family
Cisco Catalyst 9000 Switching FamilyMobeen Khan
 
Cisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW ClusteringCisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW Clusteringib_cims
 
ccnp-enterprise-core-networking-encor-product-overview.pptx
ccnp-enterprise-core-networking-encor-product-overview.pptxccnp-enterprise-core-networking-encor-product-overview.pptx
ccnp-enterprise-core-networking-encor-product-overview.pptxssuserff1f40
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
NetBox as the Source of Truth for Cisco NSO Configurations
NetBox as the Source of Truth for Cisco NSO ConfigurationsNetBox as the Source of Truth for Cisco NSO Configurations
NetBox as the Source of Truth for Cisco NSO ConfigurationsHank Preston
 
Cisco nexus series
Cisco nexus seriesCisco nexus series
Cisco nexus seriesAnwesh Dixit
 
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...kds850
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXssuser5824cf
 

What's hot (20)

Aci presentation
Aci presentationAci presentation
Aci presentation
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPN
 
TechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISETechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISE
 
Cisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center HyderabadCisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center Hyderabad
 
Cisco DCACI
Cisco DCACICisco DCACI
Cisco DCACI
 
Cisco Application Centric Infrastructure
Cisco Application Centric InfrastructureCisco Application Centric Infrastructure
Cisco Application Centric Infrastructure
 
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptx
 
ACI Hands-on Lab
ACI Hands-on LabACI Hands-on Lab
ACI Hands-on Lab
 
Cisco Catalyst 9000 Switching Family
Cisco Catalyst 9000 Switching FamilyCisco Catalyst 9000 Switching Family
Cisco Catalyst 9000 Switching Family
 
Cisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW ClusteringCisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW Clustering
 
ccnp-enterprise-core-networking-encor-product-overview.pptx
ccnp-enterprise-core-networking-encor-product-overview.pptxccnp-enterprise-core-networking-encor-product-overview.pptx
ccnp-enterprise-core-networking-encor-product-overview.pptx
 
CCNP Security-Firewall
CCNP Security-FirewallCCNP Security-Firewall
CCNP Security-Firewall
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
NetBox as the Source of Truth for Cisco NSO Configurations
NetBox as the Source of Truth for Cisco NSO ConfigurationsNetBox as the Source of Truth for Cisco NSO Configurations
NetBox as the Source of Truth for Cisco NSO Configurations
 
Packets never lie: An in-depth overview of 802.11 frames
Packets never lie: An in-depth overview of 802.11 framesPackets never lie: An in-depth overview of 802.11 frames
Packets never lie: An in-depth overview of 802.11 frames
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Cisco nexus series
Cisco nexus seriesCisco nexus series
Cisco nexus series
 
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
 

Similar to Cisco Firepower Next-Generation Firewall (NGFW).pdf

Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
Cisco Connect Halifax 2018   Putting firepower into the next generation firewallCisco Connect Halifax 2018   Putting firepower into the next generation firewall
Cisco Connect Halifax 2018 Putting firepower into the next generation firewallCisco Canada
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Canada
 
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...Cisco Canada
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation SecurityBGA Cyber Security
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallCisco Canada
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Canada
 
Cisco firepower ngips series migration options
Cisco firepower ngips series migration optionsCisco firepower ngips series migration options
Cisco firepower ngips series migration optionsIT Tech
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
Migration to cisco next generation firewall
Migration to cisco next generation firewallMigration to cisco next generation firewall
Migration to cisco next generation firewallIT Tech
 
Cisco asa5540, best guard for enterprise
Cisco asa5540, best guard for enterpriseCisco asa5540, best guard for enterprise
Cisco asa5540, best guard for enterpriseIT Tech
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochureIEI Integration Corp.
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar kazmi
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-BrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochurebakar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 

Similar to Cisco Firepower Next-Generation Firewall (NGFW).pdf (20)

Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
Cisco Connect Halifax 2018   Putting firepower into the next generation firewallCisco Connect Halifax 2018   Putting firepower into the next generation firewall
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation Firewall
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
 
Cisco firepower ngips series migration options
Cisco firepower ngips series migration optionsCisco firepower ngips series migration options
Cisco firepower ngips series migration options
 
Sudharsan rangasamy resume
Sudharsan rangasamy resumeSudharsan rangasamy resume
Sudharsan rangasamy resume
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Migration to cisco next generation firewall
Migration to cisco next generation firewallMigration to cisco next generation firewall
Migration to cisco next generation firewall
 
Cisco asa5540, best guard for enterprise
Cisco asa5540, best guard for enterpriseCisco asa5540, best guard for enterprise
Cisco asa5540, best guard for enterprise
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

Cisco Firepower Next-Generation Firewall (NGFW).pdf

  • 1. © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 18 Data Sheet Cisco Firepower Next-Generation Firewall (NGFW) Prevent breaches, get deep visibility to detect and stop threats fast, and automate your network and security operations to save time and work smarter. Prevent breaches Need to prevent breaches automatically to keep your business moving forward? Talos, our team of 250+ threat researchers, analyze millions of threats daily and create security protections that the Cisco NGFW uses to protect you against the next big breach. WannaCry? NotPetya? VPNFilter? Talos stopped these mega-breaches (and others) before they hit, and Cisco firewall customers were automatically protected. Not a bad track record. See more to detect and stop threats fast Worried that your firewall isn’t showing you the full picture? Cisco NGFWs go beyond prevention and access control to give you deep visibility to see and stop threats fast. Use built-in advanced security features like next-generation IPS, advanced malware protection, and sandboxing to see across users, hosts, networks and infrastructure. They continuously monitor for suspicious activity and automatically stop it the instant it is seen. Our advanced security capabilities help you see more so you can stop more. Automate to save time and work smart Are your products working you instead of working for you? Cisco NGFW automates your networking and security operations to save you time and reduce complexity so you can focus on high priority tasks. Threat alerts are prioritized so you can stop playing whack-a-mole and focus on what matters most. Cisco NGFWs work together with the rest of Cisco’s integrated security tools to give you visibility across multiple attack vectors, from edge to endpoint. When this system of tools sees a threat in one place, it will automatically be blocked everywhere. Model Overview Cisco Firepower 2100 Series The industry’s first midrange NGFWs delivering sustainable performance when threat inspection is enabled Cisco Firepower 4100 Series: The industry’s first 1RU NGFWs with 40-Gbps interfaces Cisco Firepower 9300: Ultra-high-performance NGFW, expandable as your needs grow
  • 2. © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 18 Cisco ASA 5500-X Series: Models for branch offices, industrial applications, and the Internet edge Firepower NGFWv: The NGFW for virtual and cloud environments Platform Image Support The Cisco Firepower NGFW includes Application Visibility and Control (AVC), optional Next-Gen IPS (NGIPS), Cisco ® Advanced Malware Protection (AMP) for Networks, and URL Filtering. The Cisco Firepower 2100 Series, 4100 Series, and 9300 appliances use the Cisco Firepower Threat Defense software image. Alternatively, Cisco Firepower 2100 Series, 4100 Series, and 9300 appliances can support the Cisco Adaptive Security Appliance (ASA) software image. Management Options Cisco Firepower NGFWs may be managed in a variety of ways depending on the way you work, your environment, and your needs. The Cisco Firepower Management Center (formerly FireSIGHT) provides centralized management of the Cisco Firepower NGFW, the Cisco Firepower NGIPS, and Cisco AMP for Networks. It also provides threat correlation for network sensors and Advanced Malware Protection (AMP) for Endpoints. The Cisco Firepower Device Manager is available for local management of 2100 Series and select 5500-X Series devices running the Cisco Firepower Threat Defense software image. The Cisco Adaptive Security Device Manager is available for local management of the Cisco Firepower 2100 Series, 4100 Series, Cisco Firepower 9300 Series, and Cisco ASA 5500-X Series devices running the ASA software image. Cisco Defense Orchestrator cloud-based management is also available for consistent policy management across Cisco security devices running the ASA software image, enabling greater management efficiency for the distributed enterprise.
  • 3. © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 18 Firepower DDoS Mitigation Also available on the Cisco Firepower 4100 Series and 9300 appliances is tightly integrated, comprehensive, behavioral DDoS mitigation for both network and application infrastructure protection. This DDoS mitigation is Radware’s Virtual DefensePro (vDP). It is available from and supported directly by Cisco. Cisco Firepower 2100 Series Appliances The Cisco Firepower 2100 Series is a family of four threat-focused NGFW security platforms that deliver business resiliency through superior threat defense. It offers exceptional sustained performance when advanced threat functions are enabled. These platforms uniquely incorporate an innovative dual multicore CPU architecture that optimizes firewall, cryptographic, and threat inspection functions simultaneously. The series’ firewall throughput range addresses use cases from the Internet edge to the data center. Network Equipment Building Standards (NEBS)- compliance is supported by the Cisco Firepower 2100 Series platform. Cisco Firepower 4100 Series Appliances The Cisco Firepower 4100 Series is a family of four threat-focused NGFW security platforms. Their throughput range addresses data center and internet edge use cases. They deliver superior threat defense, at faster speeds, with a smaller footprint. Cisco Firepower 4100 Series supports flow-offloading, programmatic orchestration, and the management of security services with RESTful APIs. Network Equipment Building Standards (NEBS)-compliance is supported by the Cisco Firepower 4120 platform. Cisco Firepower 9300 Security Appliance The Cisco Firepower 9300 is a scalable (beyond 1 Tbps when clustered), carrier-grade, modular platform designed for service providers, high-performance computing centers, large data centers, campuses, high-frequency trading environments, and other environments that require low (less than 5-microsecond offload) latency and exceptional throughput. Cisco Firepower 9300 supports flow-offloading, programmatic orchestration, and the management of security services with RESTful APIs. It is also available in Network Equipment Building Standards (NEBS)- compliant configurations. Cisco ASA 5500-FTD-X Series Appliances The Cisco ASA 5500-FTD-X Series is a family of eight threat-focused NGFW security platforms. Their throughput range addresses use cases from the small or branch office to the Internet edge. They deliver superior threat defense in a cost-effective footprint. Cisco Firepower NGFW Virtual (NGFWv) Appliances Cisco Firepower NGFWv is available on VMware, KVM, and the Amazon Web Services (AWS) and Microsoft Azure environments for virtual, public, private, and hybrid cloud environments. Organizations employing SDN can rapidly provision and orchestrate flexible network protection with Firepower NGFWv. As well, organizations using NFV can further lower costs utilizing Firepower NGFWv.
  • 4. © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 18 Performance Testing Methodologies Cisco uses a variety of testing methodologies in a lab environment to ensure the performance specifications we report are as close to real world as possible. Firewall performance is affected by many factors including network environment, packet sizes, packet type, TLS encryption, and more. Two modes of firewall testing exist: static or real world. Static testing leverages performance and security testing tools in a simulated environment. Real-world testing uses samples of live traffic on a production or side-car network. While static testing does not completely mimic performance in a real-world networking environment, we review and modify the static methodology to ensure the results are as close to real-world as possible. The following are test methodologies used for measurements listed in Table 1. Change in performance vs change in packet size is not linear, so extrapolation from a single test is not possible for the almost unlimited variety of network environments. Testing security efficacy or security service performance under loaded conditions adds even more complexity. For these reasons we rely on the 1024B HTTP Test. 1024B HTTP Test (256KB Object) This number is to compare with other vendors at a 256KB object size. It uses a larger and commonly tested packet size for every simulated session. With the protocol overhead, the average frame size is around 1024 bytes. This represents typical production conditions for most firewall deployments. 1500B UDP vs 64B UDP This test uses a transactional UDP profile with either 1500B or 64B frames. Due to the stateless nature of UDP, it creates very little impact on a stateful NGFW. Many vendors use this profile to measure maximum firewall performance, however it is only practical as a comparison point. This test does not represent real-world conditions, therefore Cisco only uses it as a legacy metric for ASA performance. For NGFW products, various UDP packet size should only be used to test latency and not overall performance. Performance Specifications and Feature Highlights Table 1 summarizes the capabilities of the Cisco Firepower NGFWv, Firepower 2100 Series, and 4100 Series and 9300 appliances as well as the Cisco ASA 5500-FTD-X appliances when running the Cisco Firepower Threat Defense image. All numbers are derived with two-way traffic evaluation to replicate the best security posture. Table 1. Cisco Firepower Threat Defense (FTD) Performance Specifications and Feature Highlights for Physical and Virtual Appliances Features Cisco Firepower Model Cisco ASA 5500-FTD-X Model NGFWv 2110 2120 2130 2140 4110 4120 4140 4150 9300 with 1 SM-24 Module 9300 with 1 SM-36 Module 9300 with 1 SM-44 Module 9300 with 3 SM-44 Modules 5506-FTD-X 5506W-FTD-X 5506H-FTD-X 5508-FTD-X 5516-FTD-X 5525-FTD-X 5545-FTD-X 5555-FTD-X Throughput: FW + AVC 1024B 1.9 Gbps 2.0 Gbps 3 Gbps 4.75 Gbps 8.5 Gbps 12 Gbps 20 Gbps 25 Gbps 30 Gbps 30 Gbps 42 Gbps 54 Gbps 135 Gbps 250 Mbps 250 Mbps 250 Mbps 650 Mbps 1400 Mbps 1600 Mbps 1700 Mbps 1800 Mbps Throughput: FW + AVC + IPS 1024B 1.9 Gbps 2.0 Gbps 3 Gbps 4.75 Gbps 8.5 Gbps 10 Gbps 15 Gbps 20 Gbps 24 Gbps 24 Gbps 34 Gbps 53 Gbps 133 Gbps 125 Mbps 125 Mbps 125 Mbps 600 Mbps 1200 Mbps 1500 Mbps 1600 Mbps 1700 Mbps
  • 5. © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 18 Features Cisco Firepower Model Cisco ASA 5500-FTD-X Model NGFWv 2110 2120 2130 2140 4110 4120 4140 4150 9300 with 1 SM-24 Module 9300 with 1 SM-36 Module 9300 with 1 SM-44 Module 9300 with 3 SM-44 Modules 5506-FTD-X 5506W-FTD-X 5506H-FTD-X 5508-FTD-X 5516-FTD-X 5525-FTD-X 5545-FTD-X 5555-FTD-X Maximum concurrent sessions, with AVC 100K 1M 1.2M 2M 3M 9M 15M 25M 30M 30M 30M 30M 60M 20K 20K 20K 100K 250K 500K 750K 1M Maximum new connections per second, with AVC 10K 12K 16K 24K 40K 68K 120K 160K 200K 120K 160K 300K 900K 3K 3K 3K 7K 8K 10K 15K 20K IPSec VPN Throughput (1024B TCP w/Fastpath) - 750 Mbps 1 Gbps 1.5 Gbps 3 Gbps 6 Gbps 10 Gbps 13 Gbps 14 Gbps 13.5 Gbps 16 Gbps 17 Gbps 51 Gbps 100 Mbps 100 Mbps 100 Mbps 175 Mbps 250 Mbps 300 Mbps 400 Mbps 700 Mbps Maximum VPN Peers - 1500 3500 7500 10000 10000 15000 20000 20000 20000 20000 2000 0 60000 50 50 50 100 300 300 400 700 Cisco Firepower Device Manager (local management) Yes (VMw are only) Yes Yes Yes Yes - - - - - - - - Yes Yes Yes Yes Yes Yes Yes Yes Centralized management Centralized configuration, logging, monitoring, and reporting are performed by the Management Center or alternatively in the cloud with Cisco Defense Orchestrator Application Visibility and Control (AVC) Standard, supporting more than 4000 applications, as well as geolocations, users, and websites AVC: OpenAppID support for custom, open source, application detectors Standard Cisco Security Intelligence Standard, with IP, URL, and DNS threat intelligence Cisco Firepower NGIPS Available; can passively detect endpoints and infrastructure for threat correlation and Indicators of Compromise (IoC) intelligence Cisco AMP for Networks Available; enables detection, blocking, tracking, analysis, and containment of targeted and persistent malware, addressing the attack continuum both during and after attacks. Integrated threat correlation with Cisco AMP for Endpoints is also optionally available Cisco AMP Threat Grid sandboxing Available URL Filtering: number of categories More than 80 URL Filtering: number of URLs categorized More than 280 million Automated Malware Analysis Feed, Threat Yes: Industry-leading Threat Intelligence from the Cisco Talos Threat Research Group (https://www.talosintelligence.com/)
  • 6. © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 18 Features Cisco Firepower Model Cisco ASA 5500-FTD-X Model NGFWv 2110 2120 2130 2140 4110 4120 4140 4150 9300 with 1 SM-24 Module 9300 with 1 SM-36 Module 9300 with 1 SM-44 Module 9300 with 3 SM-44 Modules 5506-FTD-X 5506W-FTD-X 5506H-FTD-X 5508-FTD-X 5516-FTD-X 5525-FTD-X 5545-FTD-X 5555-FTD-X Feed, and IPS Signature Updates Third-party and open- source ecosystem Open API for integrations with third-party products; Snort ® and OpenAppID community resources for new and specific threats High availability and clustering Activ e/Sta ndby for ESXi and KVM Active/standby; for Cisco Firepower 9300 intrachassis clustering of up to 5 chassis is allowed; Cisco Firepower 4100 Series allows clustering of up to 6 chassis VLANs maximum 1024 1024 Cisco Trust Anchor Technologies - ASA 5506-X, 5508-X, and 5516-X appliances, Firepower 2100 Series and Firepower 4100 Series and 9300 platforms include Trust Anchor Technologies for supply chain and software image assurance. Please see the section below for additional details Note: Throughput assumes HTTP sessions. Performance will vary depending on features activated, and network traffic protocol mix, packet size characteristics and hypervisor employed (NGFWv). Performance is subject to change with new software releases. Consult your Cisco representative for detailed sizing guidance. Table 2 summarizes the performance and capabilities of the Cisco Firepower 2100, 4100 Series and 9300 appliances when running the ASA image. For Cisco ASA 5500-X Series performance specifications with the ASA image, please visit the Cisco ASA with FirePOWER Services data sheet. Table 2. ASA Performance and Capabilities on Firepower Appliances Features Cisco Firepower Appliance Model 2110 2120 2130 2140 4110 4120 4140 4150 9300 with 1 SM-24 Module 9300 with 1 SM-36 Module 9300 with 1 SM-44 Module 9300 with 3 SM-44 Modules Stateful inspection firewall throughput 1 3 Gbps 6 Gbps 10 Gbps 20 Gbps 35 Gbps 60 Gbps 70 Gbps 75 Gbps 75 Gbps 80 Gbps 80 Gbps 234 Gbps Stateful inspection firewall throughput (multiprotoc ol) 2 1.5 Gbps 3 Gbps 5 Gbps 10 Gbps 15 Gbps 30 Gbps 40 Gbps 50 Gbps 50 Gbps 60 Gbps 60 Gbps 130 Gbps Concurrent firewall connections 1 million 1.5 million 2 million 3 million 10 million 15 million 25 million 35 million 55 million 60 million 60 million 70 million Firewall latency (UDP 64B microsecond s) - - - - 3.5 3.5 3.5 3.5 3.5 3.5 3.5 3.5
  • 7. © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 18 Features Cisco Firepower Appliance Model 2110 2120 2130 2140 4110 4120 4140 4150 9300 with 1 SM-24 Module 9300 with 1 SM-36 Module 9300 with 1 SM-44 Module 9300 with 3 SM-44 Modules New connections per second 18000 28000 40000 75000 150,000 250,000 350,000 800,000 800,000 1.2 million 1.8 million 4 million IPsec VPN throughput (450B UDP L2L test) 500 Mbps 700 Mbps 1 Gbps 2 Gbps 8 Gbps 10 Gbps 14 Gbps 15 Gbps 15 Gbps 18 Gbps 20 Gbps 60 Gbps 3 / 40 Gbps IPsec/Cisco AnyConnect/ Apex site-to- site VPN peers 1500 3500 7500 10000 10,000 15,000 20,000 20,000 20,000 20,000 20,000 60,000 3 / 20,000 Maximum number of VLANs 400 600 750 1024 1024 1024 1024 1024 1024 1024 1024 1024 Security contexts (included; maximum) 2; 25 2; 25 2; 30 2; 40 10; 250 10; 250 10; 250 10; 250 10; 250 10; 250 10; 250 10; 250 High availability Active/acti ve and active/sta ndby Active/acti ve and active/sta ndby Active/acti ve and active/sta ndby Active/a ctive and active/st andby Active/acti ve and active/stan dby Active/acti ve and active/stan dby Active/acti ve and active/stan dby Active/acti ve and active/stan dby Active/acti ve and active/sta ndby Active/acti ve and active/sta ndby Active/acti ve and active/sta ndby Active/acti ve and active/sta ndby Clustering - - - - Up to 16 appliances Up to 16 appliances Up to 16 appliances Up to 16 appliances Up to 5 appliance s with 3 security modules each Up to 5 appliance s with three security modules each Up to 5 appliance s with three security modules each Up to 5 appliance s with 3 security modules each Scalability VPN Load Balancing VPN Load Balancing, Firewall Clustering Centralized management Centralized configuration, logging, monitoring, and reporting are performed by Cisco Security Manager or alternatively in the cloud with Cisco Defense Orchestrator Adaptive Security Device Manager Web-based, local management for small-scale deployments 1 Throughput measured with 1500B User Datagram Protocol (UDP) traffic measured under ideal test conditions. 2 “Multiprotocol” refers to a traffic profile consisting primarily of TCP-based protocols and applications like HTTP, SMTP, FTP, IMAPv4, BitTorrent, and DNS. 3 In unclustered configuration. Table 3. Operating Requirements for Firepower NGFWv Virtual Appliances Platform Support VMware, KVM, AWS, Azure Minimum systems requirements: VMware 4 vCPU 8-GB memory 50-GB disk Minimum systems requirements: KVM 4 vCPU 8-GB memory 50-GB disk Supported AWS instances c3.xlarge Supported Azure instances Standard_D3 Management options Firepower Management Center Cisco Defense Orchestrator Firepower Device Manager (VMware)
  • 8. © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 18 Hardware Specifications Tables 4, 5, and 6 summarize the hardware specifications for the 2100 Series, 4100 Series, and 9300 Series, respectively. Table 7 summarizes regulatory standards compliance. For Cisco ASA 5500-X Series hardware specifications, please visit the Cisco ASA with FirePOWER Services data sheet. Table 4. Cisco Firepower 2100 Series Hardware Specifications Features Cisco Firepower Model 2110 2120 2130 2140 Dimensions (H x W x D) 1.73 x 16.90 x 19.76 in. (4.4 x 42.9 x 50.2 cm) Form factor (rack units) 1RU Security module slots - I/O module slots 0 1 NM slot Integrated I/O 12 x 10M/100M/1GBASE-T Ethernet interfaces (RJ-45), 4 x 1 Gigabit (SFP) Ethernet interfaces 12 x 10M/100M/1GBASE-T Ethernet interfaces (RJ-45), 4 x 10 Gigabit (SFP+) Ethernet interfaces Network modules None (FPR-NM-8X10G) 8 x 10 Gigabit Ethernet Enhanced Small Form-Factor Pluggable (SFP+) network module Note: The 2100 Series appliances may also be deployed as dedicated threat sensors with fail-to-wire network modules. Please contact your Cisco representative for details. Maximum number of interfaces Up to 16 total Ethernet ports (12x1G RJ-45, 4x1G SFP) Up to 24 total Ethernet ports (12x1G RJ-45, 4x10G SFP+, and network module with 8x10G SFP+) Integrated network management ports 1 x 10M/100M/1GBASE-T Ethernet port (RJ-45) Serial port 1 x RJ-45 console USB 1 x USB 2.0 Type-A (500mA) Storage 1x 100 GB, 1x spare slot (for MSP) 1x 100 GB, 1x spare slot (for MSP) 1x 200 GB, 1x spare slot (for MSP) 1x 200 GB, 1x spare slot (for MSP) Power supplies Configuration Single integrated 250W AC power supply. Single 400W AC, Dual 400W AC optional. Single/Dual 350W DC optional1 Dual 400W AC. Single/dual 350W DC optional1 AC input voltage 100 to 240V AC 100 to 240V AC AC maximum input current < 2.7A at 100V < 6A at 100V AC maximum output power 250W 400W AC frequency 50 to 60 Hz 50 to 60 Hz AC efficiency >88% at 50% load >89% at 50% load DC input voltage - -48V to -60VDC DC maximum input current - < 12.5A at -48V DC maximum output power - 350W DC efficiency - >88% at 50% load Redundancy None 1+1 AC or DC with dual supplies Fans 4 integrated (2 internal, 2 exhaust) fans2 1 hot-swappable fan module (with 4 fans)2 Noise 56 dBA @ 25C 74 dBA at highest system performance. 56 dBA @ 25C 77 dBA at highest system performance.
  • 9. © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 18 Features Cisco Firepower Model 2110 2120 2130 2140 Rack mountable Yes. Fixed mount brackets included (2-post). Mount rails optional (4-post EIA-310-D rack) Yes. Mount rails included (4-post EIA-310-D rack) Weight 16.1 lb (7.3 kg): with 2x SSDs 19.4 lb (8.8 kg) 1 x power supplies, 1 x NM, 1 x fan module, 2x SSDs 21 lb (9.53 kg) 2 x power supplies, 1 x NM, 1 x fan module, 2x SSDs Temperature: operating 32 to 104°F (0 to 40°C) 32 to 104°F (0 to 40°C) or NEBS operation (see below)3 32 to 104°F (0 to 40°C) Temperature: nonoperating -4 to 149°F (-20 to 65°C) Humidity: operating 10 to 85% noncondensing Humidity: nonoperating 5 to 95% noncondensing Altitude: operating 10,000 ft (max) 10,000 ft (max) or NEBS operation (see below)3 10,000 ft (max) Altitude: nonoperating 40,000 ft (max) NEBS operation (FPR-2130 Only)3 Operating altitude: 0 to 13,000 ft (3962 m) Operating temperature: Long term: 0 to 45°C, up to 6,000 ft (1829 m) Long term: 0 to 35°C, 6,000 to 13,000 ft (1829 to 3964 m) Short term: -5 to 55°C, up to 6,000 ft (1829 m) 1 Dual power supplies are hot-swappable. 2 Fans operate in a 3+1 redundant configuration where the system will continue to function with only 3 operational fans. The 3 remaining fans will run at full speed. 3 FPR-2130 platform is designed to be NEBS ready. The availability of NEBS certification is pending. Table 5. Cisco Firepower 4100 Series Hardware Specifications Features Cisco Firepower Model 4110 4120 4140 4150 Dimensions (H x W x D) 1.75 x 16.89 x 29.7 in. (4.4 x 42.9 x 75.4 cm) Form factor (rack units) 1RU Security module slots - I/O module slots 2 Supervisor Cisco Firepower 4000 Supervisor with 8 x 10 Gigabit Ethernet ports and 2 Network Module (NM) slots for I/O expansion Network modules ● 8 x 10 Gigabit Ethernet Enhanced Small Form-Factor Pluggable (SFP+) network modules ● 4 x 40 Gigabit Ethernet Quad SFP+ network modules ● 8-port 1Gbps copper, FTW (fail to wire) Network Module Note: Firepower 4100 Series appliances may also be deployed as dedicated threat sensors, with fail-to-wire network modules. Please contact your Cisco representative for details. Maximum number of interfaces Up to 24 x 10 Gigabit Ethernet (SFP+) interfaces; up to 8 x 40 Gigabit Ethernet (QSFP+) interfaces with 2 network modules Integrated network management ports 1 x Gigabit Ethernet copper port Serial port 1 x RJ-45 console USB 1 x USB 2.0 Storage 200 GB 200 GB 400 GB 400 GB
  • 10. © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 10 of 18 Features Cisco Firepower Model 4110 4120 4140 4150 Power supplies Configuration Single 1100W AC, dual optional. Single/dual 950W DC optional1, 2 Single 1100W AC, dual optional. Single/dual 950W DC optional1 Dual 1100W AC1 Dual 1100W AC1 AC input voltage 100 to 240V AC AC maximum input current 13A AC maximum output power 1100W AC frequency 50 to 60 Hz AC efficiency >92% at 50% load DC input voltage -40V to -60VDC DC maximum input current 27A DC maximum output power 950W DC efficiency >92.5% at 50% load Redundancy 1+1 Fans 6 hot-swappable fans Noise 78 dBA Rack mountable Yes, mount rails included (4-post EIA-310-D rack) Weight 36 lb (16 kg): 2 x power supplies, 2 x NMs, 6x fans; 30 lb (13.6 kg): no power supplies, no NMs, no fans Temperature: operating 32 to 104°F (0 to 40°C) 32 to 104°F (0 to 40°C) or NEBS operation (see below) 32 to 95°F (0 to 35°C), at sea level 32 to 95°F (0 to 35°C), at sea level Temperature: nonoperating -40 to 149°F (-40 to 65°C) Humidity: operating 5 to 95% noncondensing Humidity: nonoperating 5 to 95% noncondensing Altitude: operating 10,000 ft (max) 10,000 ft (max) or NEBS operation (see below) 10,000 ft (max) Altitude: nonoperating 40,000 ft (max) NEBS operation (FPR 4120 only) Operating altitude: 0 to 13,000 ft (3960 m) Operating temperature: Long term: 0 to 45°C, up to 6,000 ft (1829 m) Long term: 0 to 35°C, 6,000 to 13,000 ft (1829 to 3964 m) Short term: -5 to 50°C, up to 6,000 ft (1829 m) 1 Dual power supplies are hot-swappable. Table 6. Cisco Firepower 9300 Hardware Specifications Specification Description Dimensions (H x W x D) 5.25 x 17.5 x 32 in. (13.3 x 44.5 x 81.3 cm) Form factor 3 Rack Units (3RU), fits standard 19-in. (48.3-cm) square-hole rack Security module slots 3 Network module slots 2 (within supervisor) Supervisor Cisco Firepower 9000 Supervisor with 8 x 10 Gigabit Ethernet ports and 2 network module slots for I/O expansion Security modules ● Cisco Firepower 9000 Security Module 24 with 2 x SSDs in RAID-1 configuration ● Cisco Firepower 9000 Security Module 36 with 2 x SSDs in RAID-1 configuration
  • 11. © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 11 of 18 Specification Description Network modules ● 8 x 10 Gigabit Ethernet Enhanced Small Form-Factor Pluggable (SFP+) network modules ● 4 x 40 Gigabit Ethernet Quad SFP+ network modules ● 2 x 100 Gigabit Ethernet Quad SFP28 network modules (double-wide, occupies both network module bays) Note: Firepower 9300 may also be deployed as a dedicated threat sensor, with fail-to-wire network modules. Please contact your Cisco representative for details. Maximum number of interfaces Up to 24 x 10 Gigabit Ethernet (SFP+) interfaces; up to 8 x 40 Gigabit Ethernet (QSFP+) interfaces with 2 network modules Integrated network management ports 1 x Gigabit Ethernet copper port (on supervisor) Serial port 1 x RJ-45 console USB 1 x USB 2.0 Storage Up to 2.4 TB per chassis (800 GB per security module in RAID-1 configuration) Power supplies AC power supply -48V DC power supply HVDC power supply Input voltage 200 to 240V AC -40V to -60V DC* 240 to 380V DC Maximum input current 15.5A to 12.9A 69A to 42A <14A at 200V Maximum output power 2500W 2500W 2500W Frequency 50 to 60 Hz - - Efficiency (at 50% load) 92% 92% 92% (at 50% load) Redundancy 1+1 Fans 4 hot-swappable fans Noise 75.5 dBA at maximum fan speed Rack mountable Yes, mount rails included (4-post EIA-310-D rack) Weight 105 lb (47.7 kg) with one security module; 135 lb (61.2 kg) fully configured Temperature: standard operating Up to 10,000 ft (3000 M): 32 to 104°F (0 to 40°C) for SM-24 module 32 to 88°F (0 to 35°C) for SM-36 module at sea-level Altitude adjustment notes: For SM-36, maximum temp is 35⁰C, for every 1000 feet above sea level subtract 1⁰C Temperature: NEBS operating Long term: 0 to 45°C, up to 6,000 ft (1829 m) Long term: 0 to 35°C, 6,000 to 13,000 ft (1829-3964 m) Short term: -5 to 55°C, up to 6,000 ft (1829 m) Note: Cisco Firepower 9300 NEBS compliance applies only to SM-24 configurations. Temperature: nonoperating -40 to 149°F (-40 to 65°C); maximum altitude is 40,000 ft Humidity: operating 5 to 95% noncondensing Humidity: nonoperating 5 to 95% noncondensing Altitude: operating SM-24: 0 to 13,000 ft (3962 m) SM-36: 0 to 10,000 ft (3048 m); please see above Operating Temperature section for temperature adjustment notes Altitude: nonoperating 40,000 ft (12,192 m) * Minimum turn-on voltage is -44V DC
  • 12. © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 12 of 18 Table 7. Cisco Firepower 2100 Series, 4100 Series and Cisco Firepower 9300 NEBS, Regulatory, Safety, and EMC Compliance Specification Description NEBS Cisco Firepower 9300 is NEBS compliant with SM-24 Security Modules. Cisco Firepower 4120 is NEBS compliant. Regulatory compliance Products comply with CE markings per directives 2004/108/EC and 2006/108/EC Safety ● UL 60950-1 ● CAN/CSA-C22.2 No. 60950-1 ● EN 60950-1 ● IEC 60950-1 ● AS/NZS 60950-1 ● GB4943 EMC: emissions ● 47CFR Part 15 (CFR 47) Class A (FCC Class A) ● AS/NZS CISPR22 Class A ● CISPR22 CLASS A ● EN55022 Class A ● ICES003 Class A ● VCCI Class A ● EN61000-3-2 ● EN61000-3-3 ● KN22 Class A ● CNS13438 Class A ● EN300386 ● TCVN7189 EMC: Immunity ● EN55024 ● CISPR24 ● EN300386 ● KN24 ● TVCN 7317 ● EN-61000-4-2 ● EN-61000-4-3 ● EN-61000-4-4 ● EN-61000-4-5 ● EN-61000-4-6 ● EN-61000-4-8 ● EN-61000-4-11 Cisco Trust Anchor Technologies Cisco Trust Anchor Technologies provide a highly secure foundation for certain Cisco products. They enable hardware and software authenticity assurance for supply chain trust and strong mitigation against a man-in-the- middle compromise of software and firmware. Trust Anchor capabilities include: ● Image signing: Cryptographically signed images provide assurance that the firmware, BIOS, and other software are authentic and unmodified. As the system boots, the system’s software signatures are checked for integrity. ● Secure Boot: Secure Boot anchors the boot sequence chain of trust to immutable hardware, mitigating threats against a system’s foundational state and the software that is to be loaded, regardless of a user’s privilege level. It provides layered protection against the persistence of illicitly modified firmware.
  • 13. © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 13 of 18 ● Trust Anchor module: A tamper-resistant, strong-cryptographic, single-chip solution provides hardware authenticity assurance to uniquely identify the product so that its origin can be confirmed to Cisco, providing assurance that the product is genuine. Firepower DDoS Mitigation Firepower DDoS Mitigation is provided by Radware Virtual DefensePro (vDP), available and supported directly from Cisco on the following Cisco Firepower 9300 and 4100 series appliances: Cisco Firepower Model ASA image FTD Image 9300 – SM-44 yes yes 9300 – SM-36 yes yes 9300 – SM-24 yes yes 4150 yes yes 4140 yes yes 4120 yes yes 4110 no yes Radware vDP is an award-winning, real-time, behavioral DDoS attack mitigation solution that protects organizations against multiple DDoS threats. Firepower DDoS mitigation defends your application infrastructure against network and application degradation and outage. DDoS Mitigation: Protection Set Firepower’s vDP DDoS mitigation consists of patent-protected, adaptive, behavioral-based real-time signature technology that detects and mitigates zero-day network and application DDoS attacks in real time. It eliminates the need for human intervention and does not block legitimate user traffic when under attack. The following attacks are detected and mitigated: ● SYN flood attacks ● Network DDoS attacks, including IP floods, ICMP floods, TCP floods, UDP floods, and IGMP floods ● Application DDoS attacks, including HTTP floods and DNS query floods ● Anomalous flood attacks, such as nonstandard and malformed packet attacks Performance The performance figures in Table 8 apply to all Cisco Firepower 4100 series models. Table 8. Key DDoS Performance Metrics for Cisco Firepower 4100 Series Parameter Value Maximum mitigation capacity/throughput 10 Gbps Maximum legitimate concurrent sessions 209,000 Connections Per Second (CPS) Maximum DDoS flood attack prevention rate 1,800,000 Packets Per Second (PPS) The performance figures in Table 9 are for Cisco Firepower 9300 with 1 to 3 Security Modules irrespective of Security Module type (SM-24, SM-36 or SM-44).
  • 14. © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 14 of 18 Table 9. Key DDoS Performance Metrics for Cisco Firepower 9300 with 1, 2, or 3 Security Modules. Parameter Firepower 9300 with 1 Security Module Firepower 9300 with 2 Security Modules Firepower 9300 with 3 Security Modules Maximum mitigation capacity/throughput 10 Gbps 20 Gbps 30 Gbps Maximum legitimate concurrent sessions 209,000 Connections Per Second (CPS) 418,000 Connections Per Second (CPS) 627,000 Connections Per Second (CPS) Maximum DDoS flood attack prevention rate 1,800,000 Packets Per Second (PPS) 3,600,000 Packets Per Second (PPS) 5,400,000 Packets Per Second (PPS) Ordering Information Cisco Smart Licensing The Cisco Firepower NGFW is sold with Cisco Smart Licensing. Cisco understands that purchasing, deploying, managing, and tracking software licenses is complex. As a result, we are introducing Cisco Smart Software Licensing, a standardized licensing platform that helps customers understand how Cisco software is used across their network, thereby reducing administrative overhead and operating expenses. With Smart Licensing, you have a complete view of software, licenses, and devices from one portal. Licenses are easily registered and activated and can be shifted between like hardware platforms. Additional information is available here: https://www.cisco.com/web/ordering/smart-software-licensing/index.html. Related information, on Smart Licensing Smart Accounts, is available here: https://www.cisco.com/web/ordering/smart-software- manager/smart-accounts.html. Cisco Smart Net Total Care Support: Move Quickly with Anytime Access to Cisco Expertise and Resources Cisco Smart Net Total Care ™ is an award-winning technical support service that gives your IT staff direct anytime access to Technical Assistance Center (TAC) engineers and Cisco.com resources. You receive the fast, expert response and the dedicated accountability you require to resolve critical network issues. Smart Net Total Care provides the following device-level support: ● Global access 24 hours a day, 365 days a year to specialized engineers in the Cisco TAC ● Anytime access to the extensive Cisco.com online knowledge base, resources, and tools ● Hardware replacement options include 2-hour, 4-hour, Next-Business-Day (NDB) advance replacement, as well as Return For Repair (RFR) ● Ongoing operating system software updates, including both minor and major releases within your licensed feature set ● Proactive diagnostics and real-time alerts on select devices with Smart Call Home In addition, with the optional Cisco Smart Net Total Care Onsite Service, a field engineer installs replacement parts at your location and helps ensure that your network operates optimally. For more information on Smart Net Total Care please visit: https://www.cisco.com/c/en/us/services/portfolio/product-technical-support/smart-net-total- care.html.
  • 15. © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 15 of 18 Select Part Numbers Tables 10, 11, and 12 provide details on part numbers for Cisco Firepower NGFW solutions. Please consult the Ordering Guide for additional configuration options and accessories. Table 10. Cisco Firepower 2100 Series: Select Product Components Part Number (Appliance Master Bundle) Description FPR2110-BUN Cisco Firepower 2110 Master Bundle FPR2120-BUN Cisco Firepower 2120 Master Bundle FPR2130-BUN Cisco Firepower 2130 Master Bundle FPR2140-BUN Cisco Firepower 2140 Master Bundle Part Number (Network Module) Description FPR2K-NM-8X10G= Spare Cisco Firepower 8-port SFP+ network module Part Number (Appliances with FTD software) FPR2110-NGFW-K9 Cisco Firepower 2110 NGFW Appliance, 1RU FPR2120-NGFW-K9 Cisco Firepower 2120 NGFW Appliance, 1RU FPR2130-NGFW-K9 Cisco Firepower 2130 NGFW Appliance, 1RU, 1 x Network Module Bays FPR2140-NGFW-K9 Cisco Firepower 2140 NGFW Appliance, 1RU, 1 x Network Module Bays Cisco Firepower 2100 Series NGFW Select Licenses L-FPR2110T-TMC= Cisco Firepower 2110 Threat Defense Threat, Malware, and URL License L-FPR2120T-TMC= Cisco Firepower 2120 Threat Defense Threat, Malware, and URL License L-FPR2130T-TMC= Cisco Firepower 2130 Threat Defense Threat, Malware, and URL License L-FPR2140T-TMC= Cisco Firepower 2140 Threat Defense Threat, Malware, and URL License Note: These optional security services licenses can be ordered with 1-, 3-, or 5-year subscriptions. Part Number (Appliances with ASA Software) FPR2110-ASA-K9 Cisco Firepower 2110 ASA Appliance, 1RU FPR2120-ASA-K9 Cisco Firepower 2120 ASA Appliance, 1RU FPR2130-ASA-K9 Cisco Firepower 2130 ASA Appliance, 1RU, 1 x Network Module Bays FPR2140-ASA-K9 Cisco Firepower 2140 ASA Appliance, 1RU, 1 x Network Module Bays Optional ASA Software Licenses Description L-FPR2K-ENC-K9= License to enable strong encryption for ASA on Cisco Firepower 2100 Series L-FPR2K-ASASC-10= Cisco Firepower 2100 Add-on 10 security context licenses L-FPR2K-ASASC-5= Cisco Firepower 2100 Add-on 5 security context licenses Hardware Accessories Please consult the ordering guide for accessories including rack mounts, spare fans, power supplies, and Solid-State Drives (SSDs)
  • 16. © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 16 of 18 Table 11. Cisco Firepower 4100 Series: Select Product Components Part Number (Appliance Master Bundle) Description FPR4110-BUN Cisco Firepower 4110 Master Bundle, for ASA or Cisco Firepower Threat Defense Image FPR4120-BUN Cisco Firepower 4120 Master Bundle, for ASA or Cisco Firepower Threat Defense Image FPR4140-BUN Cisco Firepower 4140 Master Bundle, for ASA or Cisco Firepower Threat Defense Image FPR4150-BUN Cisco Firepower 4150 Master Bundle, for ASA or Cisco Firepower Threat Defense Image Part Number (Spare Network Module) Description FPR4K-NM-8X10G= Spare Cisco Firepower 8-port SFP+ network module FPR4K-NM-4X40G= Spare Cisco Firepower 4-port QSFP+ network module Hardware Accessories Please consult the ordering guide for accessories including rack mounts, spare fans, power supplies, and Solid-State Drives (SSDs) Optional ASA Software Licenses Description L-F4K-ASA-CAR License to add Carrier Security Features to ASA L-FPR4K-ENCR-K9 License to enable strong encryption for ASA on Cisco Firepower 4100 Series L-FPR4K-ASASC-10 Cisco Firepower 4100 Add-on 10 security context licenses Cisco Firepower 4100 Series NGFW Select Licenses L-FPR4110T-TMC= Cisco Firepower 4110 Threat Defense Threat, Malware, and URL License L-FPR4120T-TMC= Cisco Firepower 4120 Threat Defense Threat, Malware, and URL License L-FPR4140T-TMC= Cisco Firepower 4140 Threat Defense Threat, Malware, and URL License L-FPR4150T-TMC= Cisco Firepower 4150 Threat Defense Threat, Malware, and URL License Note: These optional security services licenses can be ordered with 1-, 3-, or 5-year subscriptions. Table 12. Cisco Firepower 9300: Select Product Components Part Number (Chassis) Description FPR-C9300-AC Cisco Firepower 9300 AC Chassis - includes 2 power supply units + 4 fans + rack-mount kit (3RU; accommodates up to three security modules) FPR-C9300-DC Cisco Firepower 9300 DC Chassis - includes 2 power supply units + 4 fans + rack-mount kit (3RU; accommodates up to three security modules) FPR-C9300-HVDC Cisco Firepower 9300 high-voltage DC Chassis - includes 2 power supply units + 4 fans + rack-mount kit (3RU; accommodates up to three security modules) Part Number (Security Module) Description FPR9K-SM-24 24 Physical Core Security Module (NEBS Ready) FPR9K-SM-36 36 Physical Core Security Module FPR9K-SM-44 44 Physical Core Security Module ASA Software Licenses for Cisco Firepower 9300 Description L-F9K-ASA-CAR License to add Carrier Security Features to ASA L-F9K-ASA-CAR= License to add Carrier Security Features to ASA L-F9K-ASA-SC-10 License to add 10 Security Contexts to ASA in Cisco Firepower 9000 L-F9K-ASA-SC-10= License to add 10 Security Contexts to ASA in Cisco Firepower 9000 L-F9K-ASA License to run Standard ASA on a Cisco Firepower 9300 module L-F9K-ASA= License to run Standard ASA on a Cisco Firepower 9300 module L-F9K-ASA-ENCR-K9 License to enable strong encryption in ASA running on Cisco Firepower 9000
  • 17. © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 17 of 18 Cisco Firepower 9300 NGFW Threat Defense Software Licenses Description FPR9K-TD-BASE Cisco Firepower Threat Defense Base License for Cisco Firepower 9300 NGFW L-FPR9K-SM24-TMC= Cisco Firepower 9000 SM-24 Threat Defense Threat, Malware, and URL License L-FPR9K-SM24-TMC-3Y Cisco Firepower 9000 SM-24 Threat Defense Threat, Malware, and URL 3Yr Svc L-FPR9K-SM36-TMC= Cisco Firepower 9000 SM-36 Threat Defense Threat, Malware, and URL License L-FPR9K-SM36-TMC-3Y Cisco Firepower 9000 SM-36 Threat Defense Threat, Malware, and URL 3Yr Svc L-FPR9K-SM44-TMC= Cisco Firepower 9000 SM-44 Threat Defense Threat, Malware, and URL License L-FPR9K-SM44-TMC-3Y Cisco Firepower 9000 SM-44 Threat Defense Threat, Malware, and URL 3Yr Svc * Note: Firepower 9300 may also be deployed as a dedicated threat sensor, with fail-to-wire network modules. Please contact your Cisco representative for details. Table 13. Cisco Firepower NGFW Virtual Part Number (Virtual Appliance) FPRTD-V-K9 Cisco Firepower NGFWv Base License Cisco Firepower NGFW Virtual Select Licenses L-FPRTD-V-T= Cisco Firepower NGFWv Threat Defense Threat Protection License L-FPRTD-V-TM= Cisco Firepower NGFWv Threat Defense Threat and Malware Protection License L-FPRTD-V-TC= Cisco Firepower NGFWv Threat Defense Threat and URL License L-FPRTD-V-TMC= Cisco Firepower NGFWv Threat Defense Threat, Malware, and URL License Note: These optional security services licenses can be ordered with 1-, 3-, or 5-year subscriptions. Warranty Information Find warranty information on cisco.com at the Product Warranties page. Cisco Services Cisco offers a wide range of service programs to accelerate customer success. These innovative services programs are delivered through a unique combination of people, processes, tools, and partners, resulting in high levels of customer satisfaction. Cisco Services help you protect your network investment, optimize network operations, and prepare your network for new applications to extend network intelligence and the power of your business. For more information about Cisco services for security, visit https://www.cisco.com/go/services/security. Cisco Capital Flexible payment solutions to help you achieve your objectives Cisco Capital makes it easier to get the right technology to achieve your objectives, enable business transformation and help you stay competitive. We can help you reduce the total cost of ownership, conserve capital, and accelerate growth. In more than 100 countries, our flexible payment solutions can help you acquire hardware, software, services and complementary third-party equipment in easy, predictable payments. Learn more. More Information for Service Providers For information about Cisco Firepower in service provider environments, please visit: ● https://www.cisco.com/c/en/us/solutions/enterprise-networks/service-provider-security-solutions/
  • 18. © 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 18 of 18 More Information about Firepower NGFWs For further information about Cisco Firepower NGFWs, please visit: ● https://www.cisco.com/go/ngfw More Information about Cisco Anyconnect ● Cisco AnyConnect Secure Mobility Client https://www.cisco.com/go/anyconnect ● Cisco AnyConnect Ordering Guide https://www.cisco.com/c/dam/en/us/products/security/anyconnect-og.pdf Printed in USA C78-736661-17 10/18