F Cisco Secure Firewall Platforms: A Complete Deep Dive Guide - The Network DNA: Networking, Cloud, and Security Technology Blog

Cisco Secure Firewall Platforms: A Complete Deep Dive Guide

Cisco Secure Firewall Platforms: Complete Deep Dive Guide 2025

Next-Generation Firewall Architecture, Performance, High Availability, Multi-Tenancy & Internet Edge Design

By Route XP  |  Published: March 3, 2026  |  Updated: March 4, 2026  |  Cisco Secure Firewall, Cisco Firepower, Network Security, Cybersecurity

Cisco Secure Firewall hardware portfolio lineup showing all series from ISA 3000 OT appliance to 9300 carrier-class modular chassis — The Network DNA
Cisco Secure Firewall Platforms — Complete Hardware Portfolio Overview 2025

Introduction: Why Cisco Secure Firewall Platforms Matter

In today's rapidly evolving threat landscape, selecting the right Next-Generation Firewall (NGFW) platform is one of the most critical decisions a network security architect can make. Cisco Secure Firewall stands at the forefront of enterprise cybersecurity, offering a comprehensive portfolio that spans everything from compact IoT/OT branch appliances to carrier-class modular chassis capable of terabit-scale throughput.

This in-depth guide covers the complete Cisco Secure Firewall hardware portfolio, throughput considerations, high availability design, multi-tenancy architecture, and internet edge routing — based on the authoritative Cisco Live session BRKSEC-2239 delivered by CCIE and CCDE expert Łukasz Bromirski of Cisco's Security Business Group.

Whether you're evaluating the Cisco Secure Firewall 4200 Series for a high-density data center, planning a clustered deployment with the 3100 Series, or designing internet edge security with BGP, this guide provides the technical depth you need to make informed decisions.

Cisco Secure Firewall: Full Portfolio Overview

Cisco offers one of the broadest security platform portfolios in the industry, covering physical appliances, virtual firewalls in private and public cloud, and purpose-built OT/IoT solutions. All platforms run either the Cisco ASA (Adaptive Security Appliance) or FTD (Firepower Threat Defense) software stack.

Hardware Appliances

Cisco's physical firewall lineup is organized into distinct performance tiers, each targeting specific deployment scenarios:

  • ISA 3000 – Purpose-built for OT/IoT environments, <0.7 Gbps, designed for harsh industrial conditions
  • Secure Firewall 1010/1010E – Desktop form factor, <1 Gbps, ideal for small branches
  • Secure Firewall 1100 Series (1120/1140/1150) – 1RU branch/SASE appliances, 2.3–5 Gbps NGFW
  • Secure Firewall 1200 Series Compact (1210CE/CP, 1220CX) – SoC-based, 6–9 Gbps, desktop with PoE options
  • Secure Firewall 1200 Series (1230/1240/1250) – 1RU rack, ARM SoC, 9–18 Gbps NGFW
  • Secure Firewall 2100 Series (2110/2120/2130/2140) – 2.5–10 Gbps, mid-range campus/enterprise
  • Secure Firewall 3100 Series (3105–3140) – 10–45 Gbps, advanced enterprise with clustering
  • Secure Firewall 4100 Series (4112–4145) – 19–53 Gbps, modular chassis enterprise
  • Secure Firewall 4200 Series (4215/4225/4245) – 65–145 Gbps, high-performance enterprise/DC
  • Secure Firewall 9300 Series – Modular carrier-class chassis, up to 64 Gbps per Service Module

Virtual and Cloud Firewalls

For cloud-first environments, Cisco provides ASAv and FTDv virtual appliances running on all major public clouds (AWS, Azure, GCP) and private cloud hypervisors. Cisco Multicloud Defense extends protection across multi-cloud environments, while ASAc runs as a container on Catalyst 9300 switches for distributed security at the network edge.

Cisco Secure Firewall Performance Tiers at a Glance
PlatformUse CaseNGFW ThroughputSoftware
ISA 3000OT/IoT Industrial<0.7 GbpsASA or FTD
1010/1010ESmall Branch<1 GbpsASA or FTD
1100 SeriesBranch / SASE2.3–5 GbpsASA or FTD
1200C SeriesBranch / SASE (SoC)6–9 GbpsASA or FTD
1200 SeriesBranch / SASE (1RU)9–18 GbpsASA or FTD
2100 SeriesMid-Range Enterprise2.5–10 GbpsASA or FTD
3100 SeriesEnterprise / Clustering17–45 GbpsASA or FTD
4100 SeriesEnterprise / DC19–53 GbpsASA or FTD
4200 SeriesHigh-Perf Enterprise / DC65–145 GbpsASA or FTD
9300 SeriesService Provider / DCUp to 64 Gbps/moduleASA or FTD

Cisco Secure Firewall 4200 Series: Flagship Performance

The Cisco Secure Firewall 4200 Series represents Cisco's current flagship NGFW appliance platform, delivering 3x performance gains over the previous 4100 generation. Available in three models — 4215, 4225, and 4245 — the 4200 Series is purpose-built for enterprise data center, service provider, and high-density security deployments.

Cisco Secure Firewall 4200 Series 1RU appliance front panel showing SFP ports, network module bays and management interface

4200 Series Key Specifications

  • Models: 4215, 4225, 4245 (1RU form factor)
  • CPU Cores: 64 cores (4215), 128 cores (4225), 256 cores / dual CPU (4245)
  • RAM: 256 GB (4215), 512 GB (4225), 1 TB (4245)
  • Storage: Two NVMe slots, up to 1.8 TB RAID1 protected space (SED)
  • Built-in Interfaces: 8x 1/10/25G SFP/SFP+ plus two Network Module bays
  • Power: Redundant AC power supplies + triple fan trays
  • Clustering: Up to 16-node cluster (1.79 Tbps theoretical maximum)
  • Software: FTD 7.4+ and ASA 9.20+
  • Multi-Instance: Supported from FTD 7.6

4200 Series Performance Numbers

Cisco Secure Firewall 4200 Series performance comparison table: 4215 at 65 Gbps, 4225 at 85 Gbps, 4245 at 145 Gbps NGFW throughput
Cisco Secure Firewall 4200 Series — Performance (HTTP 1024B avg packet)
ModelFW+AVC+IPSIPsec VPNTLS Decryption (50%)
421565 Gbps45 Gbps20 Gbps
422585 Gbps80 Gbps30 Gbps
4245145 Gbps140 Gbps45 Gbps

The 4245 achieves up to 6x boost in IPsec VPN performance and 5x boost in TLS decryption compared to previous generations. In a 16-node cluster, the 4245 reaches a theoretical maximum of 1.79 Tbps.

4200 Series Architecture Highlights

The 4200 Series features a sophisticated hardware architecture combining x86 CPU complexes with an integrated FPGA datapath, dedicated crypto offload engines, and an internal switch fabric. The FPGA handles flow offload and crypto acceleration inline, dramatically reducing CPU load for established flows.

  • FPGA Flow Offload and Crypto Engines for line-rate hardware acceleration
  • Chip-to-chip links: 100 Gbps (4215/4225) and 2×100 Gbps (4245)
  • Internal switch fabric: up to 16×25/50 Gbps
  • Expansion network modules supporting up to 2×400G interfaces (FTD 7.6+)

Cisco Secure Firewall 3100 Series: Enterprise Clustering

The Secure Firewall 3100 Series fills the mid-to-high enterprise tier with five models (3105, 3110, 3120, 3130, 3140), offering 10–45 Gbps NGFW throughput with support for up to 16-node clustering. The 3100 Series introduced Multi-Instance support in FTD 7.4.1 and shares the same FPGA-based architecture as the 4200 Series.

Cisco Secure Firewall 3100 Series rack-mount appliance 1RU showing copper and SFP interfaces for enterprise clustering deployment

3100 Series Specifications

  • Models: 3105, 3110, 3120, 3130, 3140 — all 1RU
  • CPU Cores: 24–64 cores (single x86 CPU)
  • RAM: 64–256 GB DDR
  • Interfaces: 8×1G copper TX + 8×1/10G or 8×1/10/25G SFP + Network Module bay
  • NGFW Throughput: 17–45 Gbps (FW+AVC+IPS, 1024B avg packet)
  • IPsec Throughput: 11–39.4 Gbps (release 7.2+)
  • Clustering: Up to 16×3140 nodes = 0.57 Tbps theoretical maximum
  • Multi-Instance: Up to 10 instances on 3140 (FTD 7.4.1+)
  • Max VRFs: Up to 100 on 3140 (FTD 7.7)
Cisco Secure Firewall 3100 Series — Performance Comparison
ModelCoresRAMFW+AVC+IPSIPsec VPN
3105/31102464 GB17–19 Gbps11–14 Gbps
312032128 GB~30 Gbps~22 Gbps
313048128 GB~38 Gbps~32 Gbps
314064256 GB45 Gbps39.4 Gbps

Cisco Secure Firewall 1200 Series: Branch and SASE

The 1200 Series comes in two distinct form factors: the Compact (desktop) and the standard 1RU rack-mount variants. Both leverage System-on-a-Chip (SoC) designs with embedded ARM cores and hardware crypto accelerators, making them highly power-efficient for branch and SASE deployments.

1200 Series Compact (1210CE/CP, 1220CX) — FTD 7.6 / ASA 9.22

  • Network/Security SoC with 8 ARM cores, 16 GB RAM, 480 GB NVMe
  • 1210CP: 4 ports with UPoE+ (up to 90W per port, 120W total)
  • 1220CX: Additional 2×1/10G SFP+
  • FTD AVC+IPS: 6 Gbps (1210) / 9 Gbps (1220) at 1024B
  • IPsec VPN: 5 Gbps (1210) / 10 Gbps (1220)
  • TLS (50% decrypt): 1 Gbps (1210) / 1.5 Gbps (1220)
  • Max Concurrent Sessions: 200k (1210) / 300k (1220)
  • Max VPN Peers: 200 (1210) / 300 (1220)

1200 Series Rack (1230/1240/1250) — FTD 7.7 / ASA 9.23

  • SoC with 12–16 ARM cores, 16–32 GB DDR5 RAM, 960 GB NVMe
  • 1250: 8×1/2.5GE copper + 4×SFP+ for higher-density deployments
  • FTD AVC+IPS: 9–18 Gbps at 1024B
  • IPsec VPN: 13–22 Gbps
  • TLS (50% decrypt): 2.5–4.1 Gbps
  • Max Concurrent Sessions: 400k–1M with AVC
  • Max VPN Peers: 500–1500

Cisco Secure Firewall 9300 Series: Carrier-Class Modular Chassis

The Secure Firewall 9300 is Cisco's flagship modular chassis for service provider and large enterprise data center deployments. A single 9300 chassis supports up to three Security Modules, each capable of 64 Gbps NGFW throughput, with a central Supervisor module handling switching fabric and management.

Cisco Secure Firewall 9300 Series modular chassis showing Supervisor module, Security Modules SM-56, and network expansion bays in 3RU rack unit

9300 Series Architecture

  • Chassis: 3RU, supports up to 3 Security Modules + Supervisor
  • Supervisor: 8×10GE built-in, up to 2 Network Module bays (10G/40G/100G)
  • Security Modules (current gen): SM-40, SM-48, SM-56 with 40–56 cores and 384 GB RAM each
  • Smart NIC and Crypto Accelerator on each Security Module
  • Clustering: Up to 16 nodes across multiple chassis
  • Service Chaining: ASA + FTD on separate modules for combined RAVPN + NGFW
  • Mixed module support: Available from FXOS 2.6.1
⚠️ End-of-Life Notice: Cisco Secure Firewall 9300 SM-24, SM-36, and SM-44 modules reached Last Day of Support (LDoS) on August 31, 2025. Plan migration to SM-40, SM-48, SM-56 or the 4200 Series.

Cisco Secure Firewall 2100 Series: Mid-Range Enterprise

The Secure Firewall 2100 Series targets mid-range enterprise and branch deployments with four models (2110, 2120, 2130, 2140). It features a unique dual-processing architecture combining an x86 CPU with a dedicated Network Processor Unit (NPU) for hardware-assisted inspection.

Cisco Secure Firewall 2100 Series mid-range enterprise firewall appliance 1RU front view with copper and SFP data interfaces
  • NGFW Throughput: 2.5–10 Gbps (FW+AVC+IPS, 1024B)
  • IPsec VPN: 950 Mbps–3.5 Gbps
  • TLS Decryption: 365 Mbps–1.4 Gbps
  • RAM: 16–64 GB | Storage: 200 GB SSD (expandable)
  • Redundant PS on 2130 and 2140 only
  • Optional 8×10GE Network Module (2130/2140) — same module as 4100/9300

Throughput Considerations: What Really Matters

Understanding firewall throughput requires more than looking at headline numbers. The Cisco Secure Firewall architecture is engineered around a fundamentally different processing model compared to traditional firewalls, with inline hardware offload replacing legacy sequential processing pipelines.

Traditional vs. Cisco's Inline Processing Architecture

In a traditional firewall design, traffic flows from the ingress interface through the switching fabric, gets inspected by the CPU, and then returns through the fabric to the egress interface. This "U-turn" architecture introduces latency and CPU bottlenecks at scale.

Cisco's new design places the crypto accelerator and FPGA inline between the internal switch fabric stages. Established flows are fully offloaded at hardware speeds (sub-5 microseconds for 64-byte UDP), while new flows and those requiring deep inspection route to the full FTD/ASA engine on the CPU complex.

Configurable CPU Core Allocation (FTD 7.3+)

FTD 7.3 introduced configurable CPU core allocation, allowing administrators to tune the balance between Data Plane cores (packet processing, VPN, NAT) and Snort inspection cores. Available templates:

Template NameData Plane CoresSnort CoresBest For
DefaultBalancedBalancedGeneral NGFW
VPN Heavy with Prefilter90%10%VPN headend, basic stateful FW
VPN Heavy60%40%VPN with moderate inspection
IPS Heavy30%70%Deep IPS/file inspection

Single-Flow Performance and Elephant Flows

A fundamental constraint in stateful firewall processing is that a single TCP/UDP flow must be processed by one CPU core at a time — attempting parallel processing creates race conditions and out-of-order packets. Maximum single-flow throughput is roughly total throughput divided by Snort core count.

For large flows (Elephant Flows) that would monopolize inspection capacity, FTD 7.2 introduced Elephant Flow Detection as a replacement for the older Intelligent Application Bypass (IAB). Administrators can configure throughput and resource consumption thresholds, with remediation actions including hardware flow offload.

Flow Offload Operation

Cisco's Flow Offload capability dynamically programs the hardware offload engine after initial flow establishment. Once trusted, subsequent packets bypass the CPU entirely and are processed at wire speed by the Smart NIC or FPGA, with full state tracking, NAT/PAT, and TCP sequence randomization maintained in hardware.

FTD 7.7 introduced Dynamic Flow Offload for 3100 and 4200 platforms with significantly higher scale and a more effective hash algorithm (>50% improvement), supporting IPv4 flows with Snort 3 in Trust, Elephant Flow Offload, File Policy Detection, and IPS Policy Trust actions.

Designing for High Availability: HA vs. Clustering

Cisco Secure Firewall supports two distinct high availability models: traditional Active/Standby failover (HA) and full Active/Active clustering. The right choice depends on whether you need basic redundancy or horizontal scaling with redundancy. For a detailed step-by-step guide, see our dedicated article on Cisco Secure Firewall HA vs. Clustering design.

Active/Standby High Availability

Standard HA pairs an Active unit (handling all traffic) with a Standby unit (mirroring state but not forwarding traffic). On failure, the standby promotes itself to active with minimal traffic disruption. FTD inherits ASA's proven failover infrastructure, supporting full NGFW/NGIPS configuration replication and opaque flow state synchronization.

  • Supports all NGFW/NGIPS interface modes
  • Interface and Snort instance health monitoring (at least 50% Snort threshold)
  • Zero-downtime upgrades for most application types
  • Full stateful flow symmetry in both NGIPS and NGFW modes

Clustering: Horizontal Scaling Up to 16 Nodes

Clustering combines multiple Cisco Secure Firewall appliances into a single logical device that scales performance linearly. All nodes are simultaneously active, with the cluster managing flow ownership, direction, and backup roles transparently. Cluster sizing uses three key multipliers:

  • Throughput: 80% of combined maximum (L2) or up to 100% (L3 routing)
  • Connections Per Second: 50% of combined rated CPS
  • Maximum Concurrent Connections: 60% of combined connection table
16-Node Cluster Theoretical Maximums
PlatformMax ThroughputMax CPSMax Connections
16× 31400.57 Tbps2.4M96M
16× 42451.79 Tbps6.4M576M

Cluster Enhancements in FTD 7.6 / ASA 9.22

Individual Interface Mode (routed clustering) was introduced for FTDv, 3100, and 4200 in FTD 7.6 and ASA 9.22. Each node operates as an independent routing instance using ECMP/UCMP or PBR for load balancing — no spanned EtherChannel required to upstream switches. This mode supports routed mode only (not transparent).

Designing for Multi-Tenancy: VRFs and Multi-Instance

Cisco Secure Firewall provides multiple layers of multi-tenancy: FMC domain-based RBAC, VRF Lite, and Multi-Instance containerization. These can be combined for very high tenant density on a single platform.

VRF Lite (FTD 6.6+)

VRF Lite allows different firewall interfaces to participate in separate routing domains with overlapping IP address support. Traffic can be forwarded between VRFs using static routes with NAT. FMC uses a single security policy across all VRFs (with connection events enriched with VRF IDs), and VRF Lite can be combined with Multi-Instance for maximum isolation.

VRF Scalability by Platform (FTD 7.7)
PlatformMax VRFsPlatformMax VRFs
1010/11205411260
1140/115010411580
1230/1240104125/4145100
1250154215/4225/4245100
3105109300 SM-44/48/56100
311015FTDv30
312025ISA 300010
3130502110/212010/20
31401002130/214030/40

Multi-Instance (Container-Based Tenant Isolation)

Multi-Instance allows a single physical appliance or chassis module to run multiple independent FTD instances, each with its own management, configuration, upgrade schedule, and resource allocation — using Docker container infrastructure. Key scale numbers:

Multi-Instance Maximum Instance Count
PlatformMax InstancesInitial FTD Support
311037.4.1
3140107.4.1
4145146.4.0
4215107.6.0
4225157.6.0
4245347.6.0
9300 SM-56186.4.0

Internet Edge Design: BGP on Cisco Secure Firewall

Both ASA and FTD support RIP, OSPFv2, OSPFv3, IS-IS, EIGRP, BGP, and PIM-SM multicast routing — making the Cisco Secure Firewall a viable internet gateway. There are three common eBGP design options for internet edge deployments.

Option 1: Full BGP Table

The firewall accepts full IPv4 and IPv6 BGP routing tables (~1.3M prefixes). Memory requirement: approximately 304 MB for IPv4 and 90 MB for IPv6, plus 200–300 MB additional for route churn. Recommended: at least 1 GB free Data Plane RAM. Best for organizations needing granular traffic engineering.

Option 2: Partial BGP Routes (AS_PATH Filter to 2–3 hops)

Accept BGP routes with AS_PATH length limited to 2–3 hops, resulting in approximately 30k–200k routes. Memory drops to ~54 MB IPv4 / ~31 MB IPv6, plus 80–120 MB buffer. Best for balancing routing granularity with resource efficiency.

Option 3: Default Route Only

ISPs advertise only a default route. BGP serves as a link keepalive and ECMP mechanism. Memory consumption is minimal (<1 kB). Best for simpler topologies where optimal path selection is not required.

BGP Scale by Platform
PlatformMax BGP Routes TestedMax BGP Neighbors
1010/11005k–10k5
1200C / 1230–125050k100
3100 Series100k500 (with BFD)
4100 / 4200 Series200k500 (with BFD)
9300 Series200k500 (with BFD)

Access Control Policy Scale and Sizing

FTD 7.2 introduced Optimized Group Search (OGS) by default, enabling significantly higher policy scales at the cost of slightly reduced per-packet forwarding performance. OGS was further improved in 7.6 (hit counters, timestamps) and 7.7. Maximum tested ACE counts for key platforms (FTD 7.6):

Maximum Supported Policy Sizes — Key Platforms (FTD 7.6)
PlatformMax ACEsUI Rules (50 ACEs/rule)UI Rules (100 ACEs/rule)
1010/1010E10,000200100
211060,0001,200600
2140500,00010,0005,000
31404,000,00080,00040,000
41458,000,000160,00080,000
424510,000,000200,000100,000
9300 w/SM-569,500,000190,00095,000

End-of-Life Planning: Migration Timeline

Cisco has published Last Day of Support (LDoS) dates for several legacy platforms. Recommended migration paths are to the 1200, 3100, and 4200 Series:

Cisco Secure Firewall — Last Day of Support Dates
LDoS DatePlatforms Affected
Aug 31, 2025 (passed)4120, 4140, 4150; 9300 SM-24, SM-36, SM-44
Sep 30, 2025 (passed)ASA 5525-X, ASA 5545-X, ASA 5555-X
Aug 31, 2026ASA 5506-X, ASA 5508-X, ASA 5516-X

Firewall Management Center (FMC): Centralized Management

The Cisco Firewall Management Center (FMC) provides centralized policy, event, and device management for FTD deployments. FMC supports up to 1,024 domains with granular RBAC. Three appliance models cover small deployments to large enterprise/SP operations:

FMC Appliance Scale Comparison
ModelMax FTD SensorsMax IPS EventsMax Flow RateMax Network Hosts
FMC 17005030M5k FPS50k
FMC 270030060M12k FPS150k
FMC 47001,000400M30k FPS600k

FMC 7.3 introduced a Cluster Health Dashboard with per-member load statistics, cluster member status, and aggregated min/max metrics across time periods — giving operations teams full visibility into clustered deployments.

Summary and Quick Selection Guide

The Cisco Secure Firewall portfolio offers a uniquely broad set of options for organizations of all sizes, from compact SoC-based branch appliances to carrier-class modular chassis supporting terabit-scale clustering. Key architectural differentiators — inline hardware offload, configurable CPU allocation, dynamic flow offload, and hardware-accelerated crypto — deliver the performance needed for modern TLS-heavy traffic profiles without compromising security inspection depth.

Cisco Secure Firewall — Quick Selection Guide
Use CaseRecommended Platform
IoT/OT IndustrialISA 3000 (broad OT protocol coverage)
Small Branch / Home OfficeSecure Firewall 1010/1010E
Branch / SASE with PoESecure Firewall 1200 Compact (1210CP)
Branch / SASE (1RU)Secure Firewall 1100 or 1200 Series
Mid Enterprise / CampusSecure Firewall 2100 or 3100 Series
Large Enterprise / Data CenterSecure Firewall 3100 or 4200 Series
SP / Ultra-High Scale Clustering9300 SM-56 or 4245 in 16-node cluster
Multi-Tenant MSSP4200 or 9300 + Multi-Instance + VRF + FMC RBAC
Internet Edge with Full BGP3100 / 4200 / 9300 (100k–200k routes)
Internet Edge, Default Route Only1200 Series and above

For the latest platform specifications, software release notes, and migration guides, visit Cisco's official documentation. For related topics on this blog, explore our guides on Cisco Secure Firewall High Availability and Clustering, Cisco ISE Integration with DNA Center, and all Cisco Secure Firewall articles.


Source: Cisco Live BRKSEC-2239 | © 2025 Cisco and/or its affiliates. All rights reserved. All performance figures for 1024B average packet size with NGFW traffic profile unless otherwise noted.