Facebook Icon Linkin Icon Twitter Icon Google Plus Icon

FortiGate®/FortiWiFi™-80C Series

FortiGate®/FortiWiFi™-80 Series
Integrated Threat Management for Small Networks

The FortiGate/FortiWiFi-80C Series are compact, all-in-one security appliances that deliver Fortinet’s Connected UTM. Ideal for small business, remote, customer premise equipment (CPE) and retail networks, these appliances offer the network security, connectivity and performance you need at a single low per-device price.

Advanced Protection and Wireless Connectivity

You get advanced threat protection, including firewall, application control, advanced threat protection, IPS, VPN, and web filtering, all from one device that’s easy to deploy and manage. With our FortiGuard® security subscription services you’ll have automated protection against today’s sophisticated threats.

Reduce the need for additional wireless access points by integrating a highbandwidth “fat-client” into your FortiGate with the FortiWiFi-80C. It’s also a great option to secure mobile devices in BYOD environments with automatic device identification and customizable access and security policies.

VDOMs on the FortiGate/FortiWiFi-60D let you segment networks to enable guest and employee access, or protect things like cardholder data. You get the flexibility to match your business needs and meet compliance standards like PCI and HIPAA.

All-in-one High Performance Network Security

Built on the foundation FortiOS 5, the 80C series provides an integrated set of essential security technologies to protect all of your applications and data. You get the industry’s best firewall plus the latest in Advanced Threat Protection, Intrusion Protection, Web-filtering and many new features like Sandboxing, Feature Select Options for simplifying configurations and deployments, and Contextual Visibility for enhanced reporting and management.

Enquiry Now back to Fortinet

  • Specifications
  • Key Features & Benefits
  • Hardware
  • Highlights
  • Brochure

(FortiGate-80C /FortiGate-80CM / FortiWiFi-80CM )

Hardware Specifications
10/100/1000 WAN Interfaces (Copper, RJ-45) 2
10/100 Internal Switch Interfaces (Copper, RJ-45) 6
10/100 DMZ Interfaces (Copper, RJ-45) 1
Management Console Interface (Copper, RJ-45) 1
USB Interfaces 2
ExpressCard Slot 1
WLAN Support 802.11 a/n or b/g/n *FortiWiFi-80CM
Modem Port Yes *FortiGate-80CM / FortiWiFi-80CM
System Performance
Firewall Throughput (1518 / 512 / 64 byte UDP packets) 1900 / 700 / 120 Mbps
Firewall Latency (64 byte UDP packets) 45 μs
Firewall Throughput (Packets Per Second) 180 Kpps
Concurrent Sessions (TCP) 1 Million
New Sessions/Sec (TCP) 12,000
Firewall Policies 5,000
IPSec VPN Throughput (512 byte packets) 140 Mbps
Gateway-to-Gateway IPSec VPN Tunnels 200
Client-to-Gateway IPSec VPN Tunnels 1,000
SSL-VPN Throughput 70 Mbps
Concurrent SSL-VPN Users (Recommended Max) 100
IPS Throughput 350 Mbps
Antivirus Throughput (Proxy Based / Flow Based) 50 / 190 Mbps
Virtual Domains (Default / Max) 10 / 10
Max Number of FortiAPs (Total / Tunnel Mode) 32 / 16
Max Number of FortiTokens 100
Max Number of Registered FortiClients 200
High Availability Configurations Active / Active, Active / Passive, Clustering
Unlimited User Licenses Yes
Height x Width x Length 1.75 x 10.87 x 6.13 in (4.45 x 27.61 x 15.57 cm)
Weight 3.3 lb (1.5 kg)
Wall Mountable Yes
Power Required 100-240 VAC, 50-60 Hz
Power Consumption (Avg / Max) 25 / 30 W *FortiGate-80C
26 / 31.2 W *FortiGate-80CM
28 / 33.6 W *FortiWiFi-80CM
Heat Dissipation 102.3 BTU *FortiGate-80C
106.5 BTU *FortiGate-80CM
115 BTU *FortiWiFi-80CM
Operating Temperature 32 – 104 deg F (0 – 40 deg C)
Storage Temperature -31 – 158 deg F (-35 – 70 deg C)
Humidity 20 to 95% non-condensing
Compliance & Certification
Compliance FCC Part 15 Class B, C-Tick, VCCI, CE, UL/cUL, CB
Certification ICSA Labs: Firewall, IPSec, IPS, Antivirus, SSL VPN

Key Features & Benefits

Unified Security Multi-threat protection from a single device increases security and lowers costs
Simplified Licensing Unlimited user licensing and comprehensive features
Multi-Port Interfaces Multiple network interfaces and optional wireless connectivity enable data segmentation for compliance and flexible deployment



Fortinet firewall technology delivers industry-leading performance for network and application firewalling including Web 2.0 application policies based on the application identity, up to and beyond 10 Gbps throughput. Our technology identifies traffic patterns and links them to the use of specific applications, such as instant messaging and peer-to-peer applications, permitting application access control. By coupling application intelligence with firewall technology, the FortiGate platform is able to deliver real-time security with integrated application content level inspection, thereby simplifying security deployments.

Intrusion Prevention

IPS technology provides protection against current and emerging network level threats. In addition to signature-based detection, we perform anomaly-based detection whereby our system alerts users to traffic that fits a profile matching attack behavior. This behavior is then analyzed by our threat research team to identify threats as they emerge and generate new signatures that will be incorporated into our FortiGuard services.

Antivirus / Antispyware

Antivirus content inspection technology provides protection against virus, spyware, worms, phishing and other forms of malware being transmitted over the network infrastructure. By intercepting application content in transit, and reassembling the data into user expected content, the FortiGate Antivirus features ensures that malicious threats hidden within legitimate application content is identified and removed from the data stream destined for internal (or external) recipients. The addition of Fortinet’s FortiGuard subscription services ensured each FortiGate has access to updated malware signatures, resulting in high level of accuracy and detection capabilities including emerging and newly discovered viruses. ICSA Labs has certified our antivirus functionality.


Fortinet VPN technology provides secure communications between multiple networks and hosts, through both secure socket layer, or SSL, and IPsec VPN technologies, leveraging our custom FortiASIC to provide hardware acceleration for high-performance communications and data privacy. Benefits include the ability to enforce complete content inspection and multi-threat security as part of VPN communications, including antivirus, IPS and Web filtering. Additional features include traffic optimization providing prioritization for traffic across VPNs.

End-Point NAC

Endpoint NAC enforces the use of the FortiClient Endpoint Security application (either Standard or Premium editions) on your network. It verifies the installation of the most recent version of the FortiClient application, up-to-date antivirus signatures, and enabled firewall before allowing the traffic from that endpoint to pass through the FortiGate platform. You also have the option to quarantine endpoints running applications that violate policies and require remediation.

SSL Inspection

SSL-Encrypted Traffic Inspection protects clients and web and application servers from malicious SSL-encrypted traffic, to which most security devices are often blind. SSL Inspection intercepts encrypted traffic and inspects it for threats, prior to routing it to its final destination. SSL Inspection applies to both client-oriented SSL traffic (such as users connecting to an SSL-encrypted hosted CRM site) and inbound traffic destined an organization’s own web and application servers.

Web Filtering

Web filtering technology is a pro-active defense feature that identifies known locations of malware and blocks access to these malicious sources. In addition, the technology enables administrators to enforce policies based on website content categories ensuring users are not accessing content that is inappropriate for their work environment. The technology restricts access to denied categories based on the policy by comparing each Web address request to a Fortinet hosted database.

Data Loss Prevention

It is imperative for you to control the vast amount of confidential, regulated, and proprietary data traversing your network, and keep it within defined network boundaries. Working across multiple applications (including those encrypting their communications), DLP uses a sophisticated pattern-matching engine to identify and then prevent the communication of sensitive information outside the network perimeter. In addition to protecting your organization’s critical information, DLP also provides audit trails for data and files to aid in policy compliance. You can use the wide range of configurable actions WEB Filtering to log, block, and archive data, as well as ban or quarantine users.


Virtual Domain

Virtual Domain (VDOM) enables a single FortiGate system to function as multiple independent virtual FortiGate systems. Each VDOM contains its own virtual interfaces, security profiles, routing table, administration and many other features. FortiGate VDOMs reduce the complexity of your physical network by virtualizing different security resources over a common platform, greatly reducing the power and footprint required by multiple point solutions.

High Availability

High Availability (HA) configuration enhances reliability and increases performance by clustering multiple FortiGate appliances into a single entity. FortiGate High Availability supports Active-Active and Active-Passive options to provide the maximum flexibility for utilizing each member within the HA cluster. The HA feature is included as part of the FortiOS operation system so end-users can benefit from the reliability enhancement without the extra cost.

Application Control

Application control enables you to define and enforce policies for thousands of applications running on your endpoints, regardless of the port or the protocol used for communication. Application classification and control is essential to manage the explosion of new web-based applications bombarding networks today, as most application traffic looks like normal web traffic to traditional firewalls. Fortinet’s application control technology identifies application traffic and then applies security policies easily defined by the administrator. The end result is more flexible and granular policy control, with deeper visibility into your network traffic.

Wireless Controller

Wireless controller integrated into every FortiGate platform centralizes the management and monitoring of all FortiAP units. All wireless traffic is directed to the FortiGate multi-threat security platform and undergoes identity-aware firewall policies and UTM engine inspection. Only authorized wireless traffic is forwarded. From a single console you can control network access, update policies quickly and easily, and monitor compliance.

Back to Top