Integrated Multi-Threat Protection
The FortiGate product family provides cost-effective, comprehensive protection against network, content, and application-level threats. It defends your environment from complex, sophisticated attacks without degrading network availability and affecting application performance.
FortiGate platforms combine the purpose-built FortiOS™ security operating system with custom FortiASIC processors and other hardware to provide a comprehensive and highperformance array of security and networking functions.
The FortiGate product family delivers the highest level of network, content, and application security for enterprises of all sizes, while reducing total cost of ownership. With Fortinet, you deploy the network security you need to protect your intellectual property, preserve the privacy of critical customer information, and maintain regulatory compliance.
FortiOS 5.0 Software
FortiOS 5.0, the world’s most powerful security operating system, is the foundation for all Fortinet FortiGate integrated security platforms. It provides more security, intelligence and control to help enterprises be better protected against today’s advanced threats and enable more secure BYOD environments.
|More Security Fighting Advanced Threats|
More Security to fight advanced threats. A client reputation feature gives enterprises a cumulative security ranking of each device based on a range of behaviors and provides specific, actionable information that enables organizations to identity compromised systems and potential zero-day attacks in real time. The new advanced anti-malware detection system adds an on-device behavior-based heuristic engine and cloud-based AV services that includes an operating system sandbox and botnet IP reputation database. Together with superior industry-validated AV signatures, FortiOS 5.0 delivers unbeatable multi-layered protection against today’s sophisticated malware.
|More Control Securing Mobile Devices|
More Control to secure mobile devices and BYOD environments by identifying devices and applying specific access policies as well as ecurity profiles, according to the device type or device group, location and usage.
|More Intelligence Build Smart Policies|
More Intelligence with automatic adjustment of role-based policies for users and guests based on location, data and application profile. Enhanced reporting and analysis also provides administrators with more intelligence on the behavior of their network, users, devices, applications and threats.
|FortiOS Security Services|
Virtual Private Network (VPN)
User Authentication Options
Data Center Optimization
High Availability (HA)
Virtual Domains (VDOMs)
|Intrustion Prevention System (IPS)|
Data Loss Prevention (DLP)
Endpoint Compliance and Control
- Ethernet Ports 1 – 2 – Gigabit Ethernet ports for connection to your network and the Internet.
- Ethernet Ports 3 – 6 – Fast Ethernet ports for connection to your network and the Internet.
- Console Port
- COM Port
- USB Ports 1 – 5
- Fiber Ports 7 – 10
- Power Input
- Power Switch
- Reset Button
|Technical Specifications||FortiGate Rugged-100C|
|10/100/1000BaseTX Interfaces (RJ-45)||2|
|10/100BaseTX Interfaces (RJ-45)||4|
|100BASE-FX Interfaces (SC)||4|
|USB (Server / Client)||5 / 0|
|RJ-45 Serial Console||2|
|Firewall Throughput (1518 / 512 / 64 byte UDP packets)||2,000 / 1,000 / 180 Mbps|
|Firewall Latency (64 byte UDP packets)||34 μs|
|Firewall Throughput (Packets Per Second)||270 Kpps|
|Concurrent Sessions (TCP)||2.5 Million|
|New Sessions/Sec (TCP)||22,000|
|Firewall Policies (System / VDOM)||10,000 / 5,000|
|IPSec VPN Throughput (512 byte packets)||60 Mbps|
|Gateway-to-Gateway IPSec VPN Tunnels (System / VDOM)||1,500 / 1,500|
|Client-to-Gateway IPSec VPN Tunnels||5,000|
|SSL-VPN Throughput||100 Mbps|
|Concurrent SSL-VPN Users (Recommended Max)||200|
|IPS Throughput||950 Mbps|
|Antivirus Throughput (Proxy Based / Flow Based)||300 / 700 Mbps|
|Virtual Domains (Default / Max)||10 / 10|
|Max Number of FortiAPs||32|
|Max Number of FortiTokens||1,000|
|High Availability Configurations||Active/Active, Active/Passive, Clustering|
|Unlimited User Licenses||Yes|
|Height x Width x Length||3.4 x 17.3 x 11.0 in|
(88 x 440 x 280 mm)
|Rack Mountable||Yes (Attachable Ears)|
|Weight||14.3 lb (6.5 kg)|
|AC Power||100 – 240 VAC, 47 – 63 Hz|
|DC Power||106 – 250 VDC|
|Current (Max)||250 VAC / 2A|
|Power Consumption (AVG / Max)||45 / 54 W|
|Heat Dissipation||154 BTU/h|
|Redundant Power Supply||No|
|Operating temperature||-4 to 158 deg F (-20 to 70 deg C)|
|Storage temperature||-13 to 158 deg F (-25 to 70 deg C)|
|Humidity||95% @ 40 C non-condensing|
|Compliance & Certification|
|Compliance||IEC 61850-3 (EMC), IEEE 1613 Class 2, FCC Part 15 Class A, C-Tick, VCCI, CE, UL/cUL, CB|
|Certifications||ICSA Labs: Firewall, IPSec, IPS, Antivirus, SSL VPN|