Cisco Secure Firewall 4100 Series appliances
The Cisco Secure Firewall 4100 Series is a family of four threat-focused NGFW security platforms. Their throughput range addresses internet edge, data center and service provider use cases. They deliver superior threat defense, at faster speeds, with a smaller footprint. Cisco Secure Firewall 4100 Series supports flow-offloading, programmatic orchestration, and the management of security services with RESTful APIs. Network Equipment Building Standards (NEBS)-compliance is supported by the Cisco Secure Firewall 4125 platform. The 4100 Series platforms can run either the Cisco Secure Firewall ASA or Cisco Secure Firewall Threat Defense (FTD) software.
https://www.soniccomponents.com/product/cisco-firepower-4115-security-appliance-fpr4115-ngfw-k9/
URL filtering: number of | More than 280 million | Â | |||
Automated threat feed and IPS signature updates | Yes: Class-leading Collective Security Intelligence (CSI) from the Cisco Talos Group (https://www.cisco.com/c/en/us/products/security/talos.html) | Â | |||
Third-party and open-source ecosystem | Open API for integrations with third-party products; Snort® and OpenAppID community resources for new and specific threats |  | |||
High availability | Cisco Secure Firewall 4100 Series with Firepower Threat Defense in HA configuration supports Active/Standby setup. This is available at the appliance level or logical instances defined on two different appliances. Please check latest High Availability Configuration Guide chapter for guidelines and best practices. | ||||
Clustering | Cisco Secure Firewall 4100 Series with Firepower Threat Defense allows clustering of up to 16 appliances, or up to 16 instances across different appliances running Multi Instance feature. Clustering allows to increase overall performance and scale. Please check latest Clustering Configuration Guide chapter for guidelines and best practices. | Â | |||
Cisco Trust Anchor Technologies | Cisco Secure Firewall 4100 Series platforms include Trust Anchor Technologies for supply chain and software image assurance | Â | |||
 |  |  |  |  |  |
Note:Â Â Â Â Â Â Â Performance will vary depending on features activated, and network traffic protocol mix, and packet size characteristics. Performance is subject to change with new software releases. Consult your Cisco representative for detailed sizing guidance.