- Site-to-site IPsec VPN
- Remote IPsec VPN
- Reverse route injection
Technolgy Analyst/Lead at a tech services company with 10,001+ employees
It currently does not support VPN, but I like the documentation, reliability, and support.
What is most valuable?
How has it helped my organization?
Cisco Context gave us the feature of creating a virtual firewall, which is good. It provides us with maximum network isolation. Also impressive is the ISP redundancy.
What needs improvement?
WCCP, and URLs, in the Cisco ASA Context both need work. When changing from single mode to multiple mode or back, the commands must be done from the command line (CLI) and cannot be done via the ASDM GUI interface. ASA context should be able to support site-to-site VPN, but the current Cisco Context does not support VPN
For how long have I used the solution?
I've used them for six years.
Buyer's Guide
Cisco Secure Firewall
March 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,422 professionals have used our research since 2012.
What was my experience with deployment of the solution?
During the deployment of WCCP, we noted some loopholes like it only supports ports 80 & 443. Application which is running on multiple ports doesn't work with WCCP and to make it work we need to allow respective traffic outside the firewall.
What do I think about the stability of the solution?
Sometimes there is an issue with the site-to-site VPN.
What do I think about the scalability of the solution?
In certain cases, like an any access-list, if we add a URL the Cisco ASA access-list does not resolve that URL while this can be done in Juniper, and Fortinet.
How are customer service and support?
Customer Service:
9/10.
Technical Support:9/10,
Which solution did I use previously and why did I switch?
I have migrated some set-ups from Cisco to Juniper, but not from Juniper to Cisco.
How was the initial setup?
We have multiple ASA firewalls for different clients now we migrated to Cisco Context.
What about the implementation team?
It was done in-house.
What was our ROI?
It's 8/10.
What other advice do I have?
If it is for a banking domain, your organisation should use Cisco which can assure better security than any other vendors' products. Also, they have the best documentation, reliability and support.
Disclosure: My company has a business relationship with this vendor other than being a customer: Channel partner

Used for deep packet inspection, Internet Edge functionality, IDS, and IDP
Pros and Cons
- "We use the solution for deep packet inspection, Internet Edge functionality, IDS, and IDP."
- "The solution’s GUI could be better."
What is our primary use case?
I deployed the Cisco Secure Firewall at the Internet Edge for the most part.
What is most valuable?
We use the solution for deep packet inspection, Internet Edge functionality, IDS, and IDP.
What needs improvement?
The solution’s GUI could be better.
For how long have I used the solution?
I have been using Cisco Secure Firewall for six years.
What do I think about the scalability of the solution?
Cisco Secure Firewall is a scalable solution that allows you to add capacity.
How was the initial setup?
The solution’s initial setup is straightforward.
What's my experience with pricing, setup cost, and licensing?
The solution’s pricing is competitive.
What other advice do I have?
I rate the solution's ease of management and configuration an eight out of ten. I would recommend Cisco Secure Firewall to other users based on what they want it for and a combination of price point and supportability.
Overall, I rate the solution an eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Cisco Secure Firewall
March 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,422 professionals have used our research since 2012.
Network Engineer at a tech services company with 5,001-10,000 employees
The monitoring dashboard lets us see if the packets get from the source to the destination correctly
Pros and Cons
- "The monitoring dashboard is valuable to us for troubleshooting."
- "With the new FTD, there is a little bit of a learning curve."
What is our primary use case?
I use the solution mostly to separate internal networks.
How has it helped my organization?
Being able to create and apply new policies to the firewall has been helpful. It is an object-oriented way of doing things that helps a lot because we can build and apply new policies. We can also test it and revert to the old one if it doesn't work.
What is most valuable?
The monitoring dashboard is valuable to us for troubleshooting. It lets us see if the packets get from the source to the destination correctly.
What needs improvement?
With the new FTD, there is a little bit of a learning curve. The learning curve could probably be simplified a little bit. I've come around that learning curve, and I'm able to get around it.
For how long have I used the solution?
I have been using the solution for 15 years.
What do I think about the stability of the solution?
Cisco is known for its general stability.
What do I think about the scalability of the solution?
The solution’s scalability is excellent. I don't know if the scalability has a downside or even a limit.
How are customer service and support?
The support is really good. I have a good team that supports us, and I'm able to always reach out to them. It's nice to have somebody on the cell phone and just be able to reach out to them.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Years ago, I used different firewalls like Juniper, but mostly, it's been fixed to ASA and FTD. We switched to Cisco because our customers were using Cisco.
How was the initial setup?
The initial setup had a little bit of a learning curve, especially because I came from ASA. I needed some help from Cisco. However, I knew what I was doing once it was set up, especially with FMC and Firepower.
What about the implementation team?
We used Cisco’s support to deploy the product.
What was our ROI?
In general, we have seen an ROI on the product. Using it, applying policies, setting it up, and leaving it alone is helpful. It helps save resources.
What other advice do I have?
I don't use the product for application visibility and control. I tend to worry more about blocking or allowing certain things versus looking deep into the servers and applications and how they work.
The product is great for securing our infrastructure from end to end. I'd like to be able to test out some of the other products, like dashboards and IPS/IDS, that work with it. For the most part, I set up a firewall, and I set up the rules. If things don't work, I monitor it through the monitoring dashboard and try to figure it out.
Cisco Secure Firewall has helped free up a lot of time for our IT staff. Apart from monitoring, unless somebody needs a firewall rule change or anything like that, there's no need to mess with it. Once we set it up, it just runs.
The solution has helped our organization to improve its cybersecurity resilience. Being a firewall, by definition of the term, the product has improved our organization’s security.
People should always evaluate other products. If you’re looking for a solid firewall, Cisco makes the choice so much simpler, especially now with FMC. We are able to apply policies easily and control different firewalls at the same time.
Overall, I rate the solution a nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Head of Information Security Division at Prime Bank Ltd.
Easy setup, stable, and affordably priced
Pros and Cons
- "URL filtering is valuable."
- "The scalability has room for improvement."
What is our primary use case?
We use the solution to secure our external software application and user access through different ports.
What is most valuable?
URL filtering is valuable.
What needs improvement?
The virtualization aspect has room for improvement.
The scalability has room for improvement.
For how long have I used the solution?
I have been using the solution for three and a half years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
I give the scalability a one out of ten.
How was the initial setup?
The initial setup is straightforward.
What's my experience with pricing, setup cost, and licensing?
The price is good.
What other advice do I have?
I give the solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
CTO at a tech vendor with 1-10 employees
Helps consolidate infrastructure solutions and has a straightforward setup
Pros and Cons
- "Previously, our customers had to always utilize hand-to-hand delivery. Now, they are able to move completely to a secure digital method. They use a strictly dark fiber optics connection from a central location to the endpoint."
- "FMC could be improved because management with FMC is quite difficult compared to using Firepower web-based management."
What is our primary use case?
Previously, our customers had to always utilize hand-to-hand delivery. Now, they are able to move completely to a secure digital method. They use a strictly dark fiber optics connection from a central location to the endpoint.
What is most valuable?
Our clients have been able to consolidate infrastructure products such as Talus for hardware encryption and Dell EMC for D2D de-duplication and backup.
What needs improvement?
FMC could be improved because management with FMC is quite difficult compared to using Firepower web-based management.
For how long have I used the solution?
We've been selling Cisco Firepower for a year.
What do I think about the stability of the solution?
Our clients feel that Cisco has proven stability in enterprise networking, routers, and ASA firewall security.
How are customer service and support?
We are very confident with Cisco's technical support and would give them a ten out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, we sold Check Point and Palo Alto.
We choose to sell Cisco because it has been approved by NATO. Our clients use a strictly offline infrastructure, and there were significant issues with Check Point. In addition, we have good support from the local Cisco office, and they also suggested that the end user goes with Cisco.
As a Cisco Secure Firewall reseller, the value we bring is very good support. You will not get the same level of support from some other vendors. For instance, Palo Alto and Check Point don't have direct support like Cisco. They have third-party support. Thus, you may get a response only when you escalate the issue to the third tier of the service level. With Cisco, everything is resolved within a day.
How was the initial setup?
The initial setup is straightforward because most network engineers have worked with Cisco. Cisco invested in universities, and as a result, 40% of the network experience of students is with Cisco.
Our clients are mostly financial institutions and have strict policies that do not allow personal data on external clouds outside the country. As a result, they mostly use an on-premises or hybrid cloud deployment model.
We are currently having our customers switch from the 2000 to the 3000 series.
What's my experience with pricing, setup cost, and licensing?
The price is not too high, but the subscription is a little bit high. We compared the activation of Cisco and Fortinet, and when we activated the whole portfolio of the UTM of Fortinet, the speed was reduced. We tested the same situation with the Cisco 2140 series, and there was no reduction in speed.
What other advice do I have?
When you're evaluating the solution, take a look at the customer reviews.
We have had no issues with Cisco Secure Firewall, and I would rate it at nine on a scale from one to ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Network Engineer at a computer software company with 51-200 employees
Integrates easily and has VPN capabilities, but the ASDM interface is a bit buggy and the CLI isn't always intuitive
Pros and Cons
- "I like its integration with the AnyConnect client. I also like how modular it is. For example, I can easily integrate the Umbrella add-on into it. We are planning on adding Umbrella. We haven't added it yet, but we have researched."
- "One big pain point I have is the ASDM interface because it's Java, and sometimes, it's a bit buggy and has low performance. That's something that probably won't be improved because of backward compatibility."
What is our primary use case?
We are mainly using it as a VPN gateway and edge firewall.
How has it helped my organization?
It helped us with the transition to working from home and hybrid working. Because of its VPN capabilities, it enabled us to keep working while everyone had to stay home because of COVID.
It integrates well with other systems within our environment.
What is most valuable?
I like its integration with the AnyConnect client. I also like how modular it is. For example, I can easily integrate the Umbrella add-on into it. We are planning on adding Umbrella. We haven't added it yet, but we have researched it.
What needs improvement?
One big pain point I have is the ASDM interface because it's Java, and sometimes, it's a bit buggy and has low performance. That's something that probably won't be improved because of backward compatibility.
The CLI is not always clear. It's not always intuitive.
Some of the things, such as site-to-site VPN, are complicated to set up. The settings you have are all hidden away in crypto maps, and you can't have a setting per tunnel. When you want to change one particular tunnel, you automatically change them all. That's a drawback.
For how long have I used the solution?
We've been using the Cisco ASA firewall for about two years.
What do I think about the stability of the solution?
It's reliable.
How are customer service and support?
I haven't had much contact with their tech support. We have a partner called Fundamentals for support. They're good. I'd recommend them.
Which solution did I use previously and why did I switch?
We have a Palo Alto core firewall, and we handle threat detection and intrusion prevention on that device. We don't use Cisco ASA for detecting or remediating threats.
Compared to other systems that I have used in the past, Cisco ASA is reliable, and it's not a very big hassle to set up. It's very good, and it just does its job.
How was the initial setup?
It's not a very big hassle to set up. It's a bit complex when you go into different topics that aren't the basic capabilities, such as when you go above VPN and basic ACL configuration, but all in all, it does the job.
What other advice do I have?
I'd rate it a seven out of ten because of the ASDM, non-intuitive CLI, and complication of setting some of the things.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
System Engineer
Saves us a lot of time and has a stable VPN
Pros and Cons
- "I think that the firewall feature is the most valuable to me as it is one of the oldest features for this solution. We also appreciate how stable the VPN is."
- "I have a lot of difficulties with the solution's Firewall Management Center (FMC) and the GUI. Neither is responsive enough and should be improved."
What is our primary use case?
Our primary use cases for this solution are as a traditional firewall, VPN system, IPS, and for URL filtering.
What is most valuable?
I think that the firewall feature is the most valuable to me as it is one of the oldest features for this solution. We also appreciate how stable the VPN is.
What needs improvement?
I have a lot of difficulties with the solution's Firewall Management Center (FMC) and the GUI. Neither is responsive enough and should be improved.
For how long have I used the solution?
My organization has been using Cisco Secure Firewall for more than 10 years.
What do I think about the stability of the solution?
My opinion is that this solution is quite stable.
How are customer service and support?
We encounter tech issues often. Sometimes it's really good to work with the tech engineer, but sometimes it can be really frustrating that it's slow to go through the email chat and everything. It depends on the engineer you get.
How would you rate customer service and support?
Positive
How was the initial setup?
I have had difficulties with the implementation of this solution. When I first encountered this solution, I had difficulties bringing it up and configuring it, but this was maybe due to the fact that back then it was a new technology. It is possible that I would have an easier time with it right now.
What other advice do I have?
I would say that this solution did help free up staff. Today, and even during COVID, a lot of customers are interested in VPN solutions and this demand will only keep increasing. I work from home mostly and the solution saves me two hours per day.
I do want to stress that this solution saves our organization time. We have 13 engineers in our company and even more staff in other departments and they also have the opportunity to work from home and with this, they save a lot of time. We plan on buying a smaller office thanks to this and this too will save a lot of money for the company.
The reason we chose Cisco is that some of my colleagues partnered with the provider when they came to Hungary, so they have been working with these solutions for a long time.
I do not have experience with the Cisco migration tool, but my colleagues do and they are really happy with it and its ease of use.
I would rate this solution a nine, on a scale from one to 10, with one being the worst and 10 being the best.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
System Engineer at a computer software company with 5,001-10,000 employees
Reliable and helps to increase security and protect the company's data
Pros and Cons
- "There are some hiccups here and there, but compared to the technical support from other vendors, I have had the best experience with Cisco's technical support. I would rate them at nine out of ten."
- "Firepower's user experience should be a little bit better."
What is our primary use case?
We use Cisco ASA and Firepower.
ASA is used for AnyConnect connections, that is, for users to connect to the office. It is very reliable and works fine.
We use Firepower in some sites as firewalls to control inbound/outbound access. We use it as a software protection layer. However, because most users are now working from home, few users need it in the office. As a result, in some places, we have switched to SD-WAN.
What is most valuable?
The network products help save time if they are well configured at the beginning. They help increase security and protect the company's data.
What needs improvement?
Firepower's user experience should be a little bit better.
For how long have I used the solution?
I've been using Cisco Firepower for six months.
How are customer service and support?
There are some hiccups here and there, but compared to the technical support from other vendors, I have had the best experience with Cisco's technical support. I would rate them at nine out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup was somewhat easy because we had previous experience with implementation. We copied that strategy or tried to align it to that implementation, but there were some challenges.
We have a hybrid cloud deployment. We have our own data centers and a lot of branches. In the data centers, most Cisco technologies start with ACI. With firewalls for big branches, we find that it's easier to break out to the internet globally rather than to use data centers.
What's my experience with pricing, setup cost, and licensing?
Cisco's prices are more or less comparable to those of other products.
What other advice do I have?
Compared to other vendors' firewalls, Cisco's firewalls are a bit behind. Overall, however, I would rate Cisco Firewall at eight on a scale from one to ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Palo Alto Networks NG Firewalls
Check Point NGFW
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
SonicWall NSa
Fortinet FortiGate-VM
Untangle NG Firewall
Sophos XGS
Fortinet FortiOS
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?