Firewall Throughput vs. IPS Throughput: Difference
Firewall Throughput vs. IPS Throughput: Difference
Vendors often refer to UTMs (Unified Threat Management Systems), but most vendors talk about firewall throughput. A firewall and a UTM are fundamentally different. Firewalls do not prevent attacks but simply inspect traffic. Even though traffic has been permitted to certain services, traffic is constantly inspected for malicious attacks. Hackers cannot attack open ports with the IPS.
UTMs can be used to increase network security. The IPS should be always operational and on. The default setting is to turn off the IPS. Vendors don't discuss firewall throughput when a UTM has been connected. To measure firewall throughput, the IPS must be on. UTM throughput can also be measured with firewall+IPS throughput. This measurement is much more accurate. This is the most crucial factor when measuring UTM Throughput. It provides maximum security and relays the device's performance Qnap españa.
Vendors are stuck in pre-UTM days, unfortunately. They simply added an IPS to an existing firewall. The IPS was added almost as a last-minute change, so there is a significant drop in throughput if IPS is enabled. This is because they don't want to emphasize the firewall throughput. This is irrelevant when you use a UTM. Fortinet and other vendors experience a 90% reduction in throughput if IPS has been disabled (e.g. Fortigate310B – throughput drops between 8 Gbps to 800 Mbps when the IPS option was enabled).
This is in contrast to the NetASQ method. UTM throughput of Netasq includes firewall and IPS throughput. This is not true for firewalls alone. The IPS protects the network and, most importantly for NETASQ, there is no performance drop when NETASQ has IPS turned on. NetASQ measures its firewall and IP throughput whenever it refers to its UTM device.