Description |
This article describes how to correctly deploy FortiGates by assigning them to their appropriate roles, ensuring sizing accuracy, and avoiding performance issues caused by misplacement or misuse. Incorrect role assignment or improper sizing may lead to performance bottlenecks, unnecessary latency, or a lack of critical capabilities and mandatory resources. |
Scope | FortiGate, DCFW, NGFW, ISFW, DEFW. |
Solution |
Match the Firewall to Its Intended Role: Each FortiGate model is designed for specific deployment roles. Aligning the model and its functions with the intended role is both beneficial and effective.
Fortinet provides performance metrics and capabilities for comparison purposes, helping to support the sizing process.
Product Matrix performance results are obtained through a controlled scenario, reflecting a device’s maximum capabilities under ideal conditions. Firewalls in real-world production environments handle multiple simultaneous tasks and are exposed to unpredictable workloads and conditions. As a result, actual performance may vary from any benchmark figures. For a strategic firewall selection, the Fortinet Product Matrix should be compared with the current and future operational requirements of the project/environment.
Deploying the FortiGates respecting the designated role will prevent performance issues and unforeseen events. For FortiGates that will operate in mission-critical or complex scenarios, it is recommended to consider an extra step and run a Proof of Concept (PoC).
About Proof of Concept (PoC): As previously mentioned, conducting a PoC in advance is highly recommended for mission-critical and complex scenarios. A PoC is highly recommended in scenarios such as:
Contact a Fortinet sales expert to discuss the business needs and product requirements.
How to Plan a Firewall Hardware Upgrade Based on Capacity Analysis: Upgrading firewall hardware requires proactive capacity analysis.
For reference, check the articles below to take a more proactive approach to capacity analysis. Technical Tip: How to get a periodically email alert for the CPU and MEMORY usages. Technical Tip: Performance statistics logs Technical Tip: FortiGate maximum values table
Once the resource monitoring gap is addressed, a common approach in capacity management to forecast future resource usage and predict organic growth over time, based on current measurements such as RAM usage, CPU load, number of connected VPN users, and traffic, is to apply the compound growth formula:
For example, if RAM memory usage is currently at 55% and the resource consumption has historically increased by 15% per year, after two years it would reach approximately 72.8%.
The estimate suggests that within two years, the RAM memory utilization (or any critical resource) may approach or exceed critical thresholds (typically above 65%), justifying proactive hardware evaluation or optimization. This forecasting method helps administrators avoid unexpected performance degradation by aligning FortiGate capacity with future demand.
For effective planning and model selection, it is recommended to engage with Fortinet or authorized partners, who can assist in evaluating technical requirements and supporting the implementation process.
Related documents: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.