<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Model Archives - Think Netsec</title>
	<atom:link href="https://www.thinknetsec.com/tag/model/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.thinknetsec.com/tag/model/</link>
	<description>Think Network Security</description>
	<lastBuildDate>Thu, 10 Aug 2017 20:04:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.1</generator>

<image>
	<url>https://www.thinknetsec.com/wp-content/uploads/2017/08/cropped-ThinkNetsec-Full-Logo-1-32x32.png</url>
	<title>Model Archives - Think Netsec</title>
	<link>https://www.thinknetsec.com/tag/model/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">133674323</site>	<item>
		<title>ASA Data Sheet</title>
		<link>https://www.thinknetsec.com/asa-data-sheet/</link>
					<comments>https://www.thinknetsec.com/asa-data-sheet/#respond</comments>
		
		<dc:creator><![CDATA[John Finnegan]]></dc:creator>
		<pubDate>Thu, 10 Aug 2017 19:41:53 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[ASA]]></category>
		<category><![CDATA[Firewalls]]></category>
		<category><![CDATA[Data Sheet]]></category>
		<category><![CDATA[Model]]></category>
		<category><![CDATA[Spec]]></category>
		<category><![CDATA[X Series]]></category>
		<guid isPermaLink="false">https://www.thinknetsec.com/?p=290</guid>

					<description><![CDATA[<p>The ASA Data Sheet can also be a little misleading so read carefully. You will see that Stateful Inspection throughput appears twice for each device. The one you should look at is Multi Protocol and not Max. Max is for UDP traffic only and not TCP packets which nearly every<a class="moretag" href="https://www.thinknetsec.com/asa-data-sheet/"> Read more&#8230;</a></p>
<p>The post <a href="https://www.thinknetsec.com/asa-data-sheet/">ASA Data Sheet</a> appeared first on <a href="https://www.thinknetsec.com">Think Netsec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The ASA Data Sheet can also be a little misleading so read carefully. You will see that Stateful Inspection throughput appears twice for each device. The one you should look at is Multi Protocol and not Max. Max is for UDP traffic only and not TCP packets which nearly every environment uses. You can see the different information at the bottom in the key.</p>
<div id="info-tab-a" class="infotab gd02v2">
<div class="mlb-pilot n12-pilot n12v1-pilot">
<table summary="tab1 content">
<tbody>
<tr>
<th width="40%">Cisco ASA Model</th>
<th width="15%">ASA 5505 / Security Plus</th>
<th width="15%"><strong>ASA 5510 / Security Plus</strong></th>
<th width="15%"><strong>ASA 5512-X / Security Plus</strong></th>
<th width="15%"><strong>ASA 5515-X</strong></th>
</tr>
<tr>
<td></td>
<td><img decoding="async" class="alignnone wp-image-292 size-full" src="https://www.thinknetsec.com/wp-content/uploads/2017/08/asa5505.jpg" alt="5505" width="60" height="48" /></td>
<td><img decoding="async" class="alignnone wp-image-293 size-full" src="https://www.thinknetsec.com/wp-content/uploads/2017/08/asa5510_100x80.jpg" alt="5510" width="100" height="80" /></td>
<td><img decoding="async" class="alignnone wp-image-294 size-full" src="https://www.thinknetsec.com/wp-content/uploads/2017/08/saleen_100x80.jpg" alt="5512" width="100" height="80" /></td>
<td><img loading="lazy" decoding="async" class="alignnone wp-image-294 size-full" src="https://www.thinknetsec.com/wp-content/uploads/2017/08/saleen_100x80.jpg" alt="5515" width="100" height="80" /></td>
</tr>
<tr>
<td><strong> Stateful Inspection throughput (max<sup>1</sup>)</strong></td>
<td>Up to 150 Mbps</td>
<td>Up to 300 Mbps</td>
<td>1 Gbps</td>
<td>1.2 Gbps</td>
</tr>
<tr>
<td><strong>Stateful Inspection throughput (multiprotocol<sup>2</sup>)</strong></td>
<td>&#8211;</td>
<td>&#8211;</td>
<td>500 Mbps</td>
<td>600 Mbps</td>
</tr>
<tr>
<td><strong>Next-Generation throughput<sup>3</sup> (multiprotocol)</strong></td>
<td>&#8211;</td>
<td>&#8211;</td>
<td>200 Mbps</td>
<td>350 Mbps</td>
</tr>
<tr>
<td><strong>IPS throughput<sup>4</sup></strong></td>
<td>Up to 75 Mbps with AIP SSC-5</td>
<td>Up to 150 Mbps with AIP SSM-10; 300 Mbps with AIP SSM-20</td>
<td>250 Mbps<br />
(Extra hardware module not required)</td>
<td>400 Mbps<br />
(Extra hardware module not required)</td>
</tr>
<tr>
<td><strong>Concurrent sessions</strong></td>
<td>10,000 /25,000</td>
<td>50,000 /130,000</td>
<td>100,000</td>
<td>250,000</td>
</tr>
<tr>
<td><strong>Connections per second</strong></td>
<td>4,000</td>
<td>9,000</td>
<td>10,000</td>
<td>15,000</td>
</tr>
<tr>
<td><strong>Packets per second (64 byte)</strong></td>
<td>85,000</td>
<td>190,000</td>
<td>450,000</td>
<td>500,000</td>
</tr>
<tr>
<td><strong>3DES/AES VPN throughput<sup>5</sup></strong></td>
<td>100 Mbps</td>
<td>170 Mbps</td>
<td>200 Mbps</td>
<td>250 Mbps</td>
</tr>
<tr>
<td><strong>Site-to-site and IPsec IKEv1 client VPN user sessions</strong></td>
<td>25</td>
<td>250</td>
<td>250</td>
<td>250</td>
</tr>
<tr>
<td><strong>AnyConnect or clientless VPN user sessions</strong></td>
<td>25</td>
<td>250</td>
<td>250</td>
<td>250</td>
</tr>
<tr>
<td><strong>Cisco Cloud Web Security users</strong></td>
<td>25</td>
<td>75</td>
<td>100</td>
<td>250</td>
</tr>
<tr>
<td><strong>VLANs</strong></td>
<td>3 (trunking disabled) / 20 (trunking enabled)</td>
<td>50 / 100</td>
<td>50 / 100</td>
<td>100</td>
</tr>
<tr>
<td><strong>High-availability support<sup>6</sup></strong></td>
<td>Not available</td>
<td>Not available; A/A and A/S</td>
<td>Not available; A/A and A/S</td>
<td>A/A and A/S</td>
</tr>
<tr>
<td><strong>Integrated I/O</strong></td>
<td>8-port FE with 2 Power over Ethernet (PoE) ports</td>
<td>5-port FE / 2-port 10/100/1000, 3-port FE</td>
<td>6-port 10/100/1000</td>
<td>6-port 10/100/1000</td>
</tr>
<tr>
<td><strong>Expansion I/O</strong></td>
<td>Not available</td>
<td>4-port 10/100/1000 or 4-port GE (SFP)</td>
<td>6-port 10/100/1000 or 6-port GE (SFP)</td>
<td>6-port 10/100/1000 or 6-port GE (SFP)</td>
</tr>
<tr>
<td><strong>Dual power supplies</strong></td>
<td>Not available</td>
<td>Not available</td>
<td>Not available</td>
<td>Not available</td>
</tr>
<tr>
<td><strong>Power</strong></td>
<td>AC/DC</td>
<td>AC/DC</td>
<td>AC/DC</td>
<td>AC/DC</td>
</tr>
</tbody>
</table>
</div>
</div>
<div id="info-tab-b" class="infotab gd02v2">
<div class="mlb-pilot n12-pilot n12v1-pilot">
<p>&nbsp;</p>
<hr />
<p>&nbsp;</p>
<table summary="tab2 content">
<tbody>
<tr>
<th>Cisco ASA Model</th>
<th>ASA 5520</th>
<th><strong>ASA 5525-X</strong></th>
<th><strong>ASA 5540</strong></th>
<th><strong>ASA 5545-X</strong></th>
<th>ASA 5550</th>
<th>ASA 5555-X</th>
</tr>
<tr>
<td></td>
<td>  <img loading="lazy" decoding="async" class="alignnone wp-image-293 size-full" src="https://www.thinknetsec.com/wp-content/uploads/2017/08/asa5510_100x80.jpg" alt="5520" width="100" height="80" /></td>
<td><img loading="lazy" decoding="async" class="alignnone wp-image-294 size-full" src="https://www.thinknetsec.com/wp-content/uploads/2017/08/saleen_100x80.jpg" alt="5525" width="100" height="80" /></td>
<td><img loading="lazy" decoding="async" class="alignnone wp-image-293 size-full" src="https://www.thinknetsec.com/wp-content/uploads/2017/08/asa5510_100x80.jpg" alt="5540" width="100" height="80" /></td>
<td><img loading="lazy" decoding="async" class="alignnone wp-image-294 size-full" src="https://www.thinknetsec.com/wp-content/uploads/2017/08/saleen_100x80.jpg" alt="5545" width="100" height="80" /></td>
<td><img loading="lazy" decoding="async" class="alignnone wp-image-295 size-full" src="https://www.thinknetsec.com/wp-content/uploads/2017/08/asa5550_100x80.jpg" alt="5505" width="100" height="80" /></td>
<td><img loading="lazy" decoding="async" class="alignnone wp-image-294 size-full" src="https://www.thinknetsec.com/wp-content/uploads/2017/08/saleen_100x80.jpg" alt="5555" width="100" height="80" /></td>
</tr>
<tr>
<td><strong> Stateful Inspection throughput (max<sup>1)</sup></strong></td>
<td>450 Mbps</td>
<td>2 Gbps</td>
<td>650 Mbps</td>
<td>3 Gbps</td>
<td>1.2 Gbps</td>
<td>4 Gbps</td>
</tr>
<tr>
<td><strong>Stateful Inspection throughput (multiprotocol<sup>2)</sup></strong></td>
<td>&#8211;</td>
<td>1 Gbps</td>
<td>&#8211;</td>
<td>1.5 Gbps</td>
<td>&#8211;</td>
<td>2 Gbps</td>
</tr>
<tr>
<td><strong>Next-Generation throughput<sup>3</sup> (multiprotocol)</strong></td>
<td>&#8211;</td>
<td>650 Mbps</td>
<td>&#8211;</td>
<td>1 Gbps</td>
<td>&#8211;</td>
<td>1.4 Gbps</td>
</tr>
<tr>
<td><strong>IPS throughput<sup>4</sup></strong></td>
<td>Up to 225 Mbps with AIP SSM-10; 375 Mbps with AIP SSM-20; 450 Mbps with AIP SSM-40</td>
<td>600 Mbps<br />
(Extra hardware module not required)</td>
<td>Up to 500 Mbps with AIP SSM-20; 650 Mbps with AIP SSM-40</td>
<td>900 Mbps<br />
(Extra hardware module not required)</td>
<td>Not Available</td>
<td>1.3 Gbps<br />
(Extra hardware module not required)</td>
</tr>
<tr>
<td><strong>Concurrent sessions</strong></td>
<td>280,000</td>
<td>500,000</td>
<td>400,000</td>
<td>750,000</td>
<td>650,000</td>
<td>1,000,000</td>
</tr>
<tr>
<td><strong>Connections per second</strong></td>
<td>12,000</td>
<td>20,000</td>
<td>25,000</td>
<td>30,000</td>
<td>33,000</td>
<td>50,000</td>
</tr>
<tr>
<td><strong>Packets per second (64 byte)</strong></td>
<td>320,000</td>
<td>700,000</td>
<td>500,000</td>
<td>900,000</td>
<td>600,000</td>
<td>1,100,000</td>
</tr>
<tr>
<td><strong>3DES/AES VPN throughput<sup>5</sup></strong></td>
<td>225 Mbps</td>
<td>300 Mbps</td>
<td>325 Mbps</td>
<td>400 Mbps</td>
<td>425 Mbps</td>
<td>700 Mbps</td>
</tr>
<tr>
<td><strong>Site-to-site and IPsec IKEv1 client VPN user sessions</strong></td>
<td>750</td>
<td>750</td>
<td>5,000</td>
<td>2,500</td>
<td>5,000</td>
<td>5,000</td>
</tr>
<tr>
<td><strong>AnyConnect or clientless VPN user sessions</strong></td>
<td>750</td>
<td>750</td>
<td>2,500</td>
<td>2,500</td>
<td>5,000</td>
<td>5,000</td>
</tr>
<tr>
<td><strong>Cisco Cloud Web Security users</strong></td>
<td>300</td>
<td>500</td>
<td>1,000</td>
<td>1,500</td>
<td>2,000</td>
<td>3,000</td>
</tr>
<tr>
<td><strong>VLANs</strong></td>
<td>150</td>
<td>200</td>
<td>200</td>
<td>300</td>
<td>400</td>
<td>500</td>
</tr>
<tr>
<td><strong>High-availability support<sup>6</sup></strong></td>
<td>A/A and A/S</td>
<td>A/A and A/S</td>
<td>A/A and A/S</td>
<td>A/A and A/S</td>
<td>A/A and A/S</td>
<td>A/A and A/S</td>
</tr>
<tr>
<td><strong>Integrated I/O</strong></td>
<td>4-port 10/100/1000 and 1-port FE</td>
<td>8-port 10/100/1000</td>
<td>4-port 10/100/1000 + 1-port FE</td>
<td>8-port 10/100/1000</td>
<td>8-port 10/100/1000 + 1-port FE</td>
<td>8-port 10/100/1000</td>
</tr>
<tr>
<td><strong>Expansion I/O</strong></td>
<td>4-port 10/100/1000 or 4-port GE (SFP)</td>
<td>6-port 10/100/1000 or 6-port GE (SFP)</td>
<td>4-port 10/100/1000 or 4-port GE (SFP)</td>
<td>6-port 10/100/1000 or 6-port GE (SFP)</td>
<td>None</td>
<td>6-port 10/100/1000 or 6-port GE (SFP)</td>
</tr>
<tr>
<td><strong>Dual Power Supplies</strong></td>
<td>Not available</td>
<td>Not available</td>
<td>Not available</td>
<td>Not available</td>
<td>Not available</td>
<td>Yes</td>
</tr>
<tr>
<td><strong>Power</strong></td>
<td>AC/DC</td>
<td>AC/DC</td>
<td>AC/DC</td>
<td>AC/DC</td>
<td>AC/DC</td>
<td>AC/DC</td>
</tr>
</tbody>
</table>
</div>
</div>
<div id="info-tab-c" class="infotab gd02v2">
<div class="mlb-pilot n12-pilot n12v1-pilot">
<p>&nbsp;</p>
<hr />
<p>&nbsp;</p>
<table summary="tab3 content">
<tbody>
<tr>
<th>Cisco ASA Model</th>
<th>ASA 5585-X with SSP10</th>
<th>ASA 5585-X with SSP20</th>
<th>ASA 5585-X with SSP40</th>
<th>ASA 5585-X with SSP60</th>
<th>ASA Services Module</th>
</tr>
<tr>
<td></td>
<td><img loading="lazy" decoding="async" class="alignnone wp-image-296 size-full" src="https://www.thinknetsec.com/wp-content/uploads/2017/08/mkk59119_100x80.jpg" alt="5585" width="100" height="80" /></td>
<td><img loading="lazy" decoding="async" class="alignnone wp-image-296 size-full" src="https://www.thinknetsec.com/wp-content/uploads/2017/08/mkk59119_100x80.jpg" alt="5585" width="100" height="80" /></td>
<td><img loading="lazy" decoding="async" class="alignnone wp-image-296 size-full" src="https://www.thinknetsec.com/wp-content/uploads/2017/08/mkk59119_100x80.jpg" alt="5585" width="100" height="80" /></td>
<td><img loading="lazy" decoding="async" class="alignnone wp-image-296 size-full" src="https://www.thinknetsec.com/wp-content/uploads/2017/08/mkk59119_100x80.jpg" alt="5585" width="100" height="80" /></td>
<td><img loading="lazy" decoding="async" class="alignnone wp-image-297 size-full" src="https://www.thinknetsec.com/wp-content/uploads/2017/08/bennu_white_100x80.jpg" alt="Module" width="100" height="80" /></td>
</tr>
<tr>
<td><strong> Stateful Inspection throughput (max<sup>1</sup>)</strong></td>
<td>4 Gbps</td>
<td>10 Gbps</td>
<td>20 Gbps</td>
<td>40 Gbps</td>
<td>20 Gbps</td>
</tr>
<tr>
<td><strong>Stateful Inspection throughput (multiprotocol<sup>2</sup>)</strong></td>
<td>2 Gbps</td>
<td>5 Gbps</td>
<td>10 Gbps</td>
<td>20 Gbps</td>
<td>16 Gbps</td>
</tr>
<tr>
<td><strong>Next-Generation throughput<sup>3</sup> (multiprotocol)</strong></td>
<td>2 Gbps<br />
(with ASA CX SSP-10)</td>
<td>5 Gbps<br />
(with ASA CX SSP-20)</td>
<td>Not available</td>
<td>Not available</td>
<td>Not available</td>
</tr>
<tr>
<td><strong>IPS throughput<sup>4</sup> (multiprotocol)</strong></td>
<td>2 Gbps<br />
(with IPS SSP-10)</td>
<td>3 Gbps<br />
(with IPS SSP-20)</td>
<td>5 Gbps<br />
(with IPS SSP-40)</td>
<td>10 Gbps<br />
(with IPS SSP-60)</td>
<td>Not available</td>
</tr>
<tr>
<td><strong>Concurrent sessions</strong></td>
<td>1,000,000</td>
<td>2,000,000</td>
<td>4,000,000</td>
<td>10,000,000</td>
<td>10,000,000</td>
</tr>
<tr>
<td><strong>Connections per second</strong></td>
<td>50,000</td>
<td>125,000</td>
<td>200,000</td>
<td>350,000</td>
<td>300,000</td>
</tr>
<tr>
<td><strong>Packets per second (64 byte)</strong></td>
<td>1,500,000</td>
<td>3,000,000</td>
<td>5,000,000</td>
<td>9,000,000</td>
<td>5,000,000</td>
</tr>
<tr>
<td><strong> 3DES/AES VPN throughput<sup>5</sup></strong></td>
<td>1 Gbps</td>
<td>2 Gbps</td>
<td>3 Gbps</td>
<td>5 Gbps</td>
<td>2 Gbps</td>
</tr>
<tr>
<td><strong>Site-to-site and IPsec IKEv1 client VPN user sessions</strong></td>
<td>5,000</td>
<td>10,000</td>
<td>10,000</td>
<td>10,000</td>
<td>10,000</td>
</tr>
<tr>
<td><strong>AnyConnect or clientless VPN user sessions</strong></td>
<td>5,000</td>
<td>10,000</td>
<td>10,000</td>
<td>10,000</td>
<td>10,000</td>
</tr>
<tr>
<td><strong>Cisco Cloud Web Security users</strong></td>
<td>7,500</td>
<td>7,500</td>
<td>7,500</td>
<td>7,500</td>
<td>7,500</td>
</tr>
<tr>
<td><strong>Integtrated I/O</strong></td>
<td>8-port 10/100/1000 and 2-port 10 GE (SFP+)<sup>6</sup></td>
<td>8-port 10/100/1000 and 2-port 10 GE (SFP+)<sup>6</sup></td>
<td>6-port 10/100/1000 and 4-port 10 GE (SFP+)</td>
<td>6-port 10/100/1000 and 4-port 10 GE (SFP+)</td>
<td>Provided by the switch or router</td>
</tr>
<tr>
<td><strong>Expansion I/O<sup>7</sup></strong></td>
<td colspan="4" align="center">8-port 10 GE(SFP/SFP+) or<br />
4-port 10 GE(SFP/SFP+) or<br />
20-port 1 GE (12-port 1 GE SFP and 8-port 10/100/100)</td>
<td>Provided by the switch or router</td>
</tr>
<tr>
<td><strong>Dual power supplies</strong></td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes. Provided by the switch or router</td>
</tr>
<tr>
<td><strong>VLANs</strong></td>
<td>1,024</td>
<td>1,024</td>
<td>1,024</td>
<td>1,024</td>
<td>1,000</td>
</tr>
<tr>
<td><strong>High-availability support<sup>8</sup></strong></td>
<td>1,024</td>
<td>1,024</td>
<td>1,024</td>
<td>1,024</td>
<td>1,000</td>
</tr>
<tr>
<td><strong>Power</strong></td>
<td>AC</td>
<td>AC</td>
<td>AC</td>
<td>AC</td>
<td>AC/DC provided by the switch or router</td>
</tr>
</tbody>
</table>
<p><strong><span class="footnote-mark"><sup>1</sup></span></strong> Maximum throughput with UDP traffic measured under ideal test conditions<br />
<strong><span class="footnote-mark"><sup>2</sup></span></strong> Multiprotocol = Traffic profile consisting primarily of TCP-based protocols/applications like HTTP, SMTP, FTP, IMAPv4, BitTorrent, and DNS.<br />
<strong><span class="footnote-mark"><sup>3</sup></span></strong>Throughput was measured using ASA CX Software Release 9.1.1 with multi-protocol traffic profile with both Application Visibility Control (AVC) and Web Security Essentials (WSE). Traffic logging was enabled as well.<br />
<strong><span class="footnote-mark"><sup>4</sup></span></strong> Firewall traffic that does not go through IPS SSP module can have higher throughput.<br />
<strong><span class="footnote-mark"><sup>5</sup></span></strong> VPN throughput and sessions count depend on the ASA device configuration and VPN traffic patterns. These elements should be taken into consideration as part of your capacity planning.<br />
<strong><span class="footnote-mark"><sup>6</sup></span></strong> Requires a separate license<br />
<strong><span class="footnote-mark"><sup>7</sup></span></strong> Half-width modules<br />
<strong><span class="footnote-mark"><sup>8</sup></span></strong> A/A = Active/Active; A/S = Active/Standby</p>
</div>
</div>
<p>This data was pulled from the following <a href="https://www.cisco.com/c/en_ca/products/security/asa-5500-series-next-generation-firewalls/models-comparison.html">Cisco Article</a></p>
<p>The post <a href="https://www.thinknetsec.com/asa-data-sheet/">ASA Data Sheet</a> appeared first on <a href="https://www.thinknetsec.com">Think Netsec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.thinknetsec.com/asa-data-sheet/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">290</post-id>	</item>
	</channel>
</rss>
