It is hard to control the bandwidth of end-users with a Cisco Firewall. That is the main issue I've faced. I used Mikrotik for many years for this very reason. Mikrotik has the option to set a bandwidth restriction for a single IP or complete segments. Cisco should add this option to their firewall.
Senior IT Officer at a real estate/law firm with 501-1,000 employees
The vendor offers a great educational series to train users on their devices
Pros and Cons
- "Cisco offers a great educational series to train users on their devices."
- "It is hard to control the bandwidth of end-users with a Cisco Firewall. That is the main issue I've faced. I used Mikrotik for many years for this very reason. Mikrotik has the option to set a bandwidth restriction for a single IP or complete segments. Cisco should add this option to their firewall."
What needs improvement?
For how long have I used the solution?
We have been using Cisco for about five years. All our products, switches, routers, and firewalls are Cisco devices.
What do I think about the scalability of the solution?
Cisco Firewall's scalability is fine.
What other advice do I have?
I rate Cisco ASA Firewall eight out of 10. Cisco offers a great educational series to train users on their devices.
Buyer's Guide
Cisco Secure Firewall
January 2026
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
880,435 professionals have used our research since 2012.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
Stable with great management of dynamic routing and good technical support
Pros and Cons
- "The initial setup was not complex."
- "Cisco is not cheap, however, it is worth investing in these technologies."
What is our primary use case?
One of the things that we have solved the most with this solution is the P2P connection that we have with different clients. It gives us greater connection security with good management of the configured rules.
Likewise, it has made it easier for us to have this type of equipment under monitoring, and, since we have implemented them, we have not been presented with any performance problems in the equipment as they have not presented CPU or RAM saturation or that for some reason it fails without any cause. We all have them managed and monitored. We always receive an email notifying us if there's something that the equipment has detected as well.
How has it helped my organization?
The ASA firewalls have undoubtedly helped us to improve our infrastructure throughout the corporation and currently we have just over 50 firewalls - all of them in different parts of Mexico.
This infrastructure has been improved since, in our corporation, we handle the dynamic EIGRP protocol, which Cisco owns, and this solution has given us a geo-redundancy in our company. In case of presenting a problem with a firewall or a link, it performs an immediate convergence where end-users do not detect a failure, helping us to maintain a 99.99% operational level at all times.
What is most valuable?
I am very happy to use this type of Cisco equipment in my infrastructure. It has given us the most value is the management of dynamic routing, in this case, EIGRP. This protocol, together with a series of additional configurations, has helped us to maintain an automatic redundancy in all our infrastructure, keeping us with very high numbers of operability and without failures that take more than 1 minute or that have not been resolved automatically. With this solution, we only speak with our suppliers either for a link or equipment report, and even if the box or circuit is out of operation, the operation continues to work without problems.
What needs improvement?
Today, ASA firewalls are leaving the market and are being replaced by firepower equipment - a technology with which I am not very familiar. However, in the training or research, I have done on this new product, I see that it has many additional tools such as centralization of the administration through a single team (in the case the firepower management). It is something that we do not have, yet we are already considering it since this type of technology will help us to have better management and better administration of the equipment through a single platform. The management of additional services with this new module will certainly help us to have the internet network much more secure with connections to the outside.
For how long have I used the solution?
I've used the solution for more than seven years.
What do I think about the stability of the solution?
The solution is great in terms of stability.
What do I think about the scalability of the solution?
The scalability is great.
How are customer service and support?
Technical support is great.
Which solution did I use previously and why did I switch?
We previously used Fortigate.
How was the initial setup?
The initial setup was not complex.
What about the implementation team?
We handled the implementation in-house.
What was our ROI?
We've seen an 80% ROI.
What's my experience with pricing, setup cost, and licensing?
Cisco is not cheap, however, it is worth investing in these technologies.
Which other solutions did I evaluate?
We always evaluate various other options.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Cisco Secure Firewall
January 2026
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
880,435 professionals have used our research since 2012.
Information Security and Compliance Manager at a tech services company with 51-200 employees
Gives us a central point for applying rule changes, rather than logging in to each device
Pros and Cons
- "Web filtering is a big improvement for us. The previous version we used, the AC520, did not have that feature included. It was not very easy for us, especially because the environment had to be isolated and we needed to get updates from outside, such as Windows patches. That feature has really helped us when we are going outside to pull those patches."
- "We're getting support but there's a big delay until we get a response from their technical team. They're in the USA and we're in Africa, so that's the difficulty. When they're in the office, they respond."
What is our primary use case?
We are a payment switch and we deal with cardholder data and information. Our primary goal is to ensure the security of customers' payment data, that they are protected.
Our security maturity is now at a good level compared to the past. To be accepted to drive Visa and Mastercard, you have to pass security assessment audits and we have managed to pass all of them now, for some years.
Apart from our firewall, we have three security tools. We have a NAC, we have a SIEM, and our syslogs.
How has it helped my organization?
It's easy now because we have many Cisco devices in a central point. We don't need to log in to each device and apply rules to them. We can do it from the management control and apply them to the specific firewalls that we want to apply them to.
In addition, compared to our previous firewall solution, the security is much better. Through our monitoring, we now see all the information that we require on security, in terms of PCI. We can see exactly what is happening in our environment. We know what is going, what is going in and out. If an incident happens, it provides a notification so that we can do an analysis.
What is most valuable?
Web filtering is a big improvement for us. The previous version we used, the AC520, did not have that feature included. It was not very easy for us, especially because the environment had to be isolated and we needed to get updates from outside, such as Windows patches. That feature has really helped us when we are going outside to pull those patches.
Another important feature for us is user access. Now, we can base access on rules and specify that this or that user has privilege on the NG firewall. That was not available before.
The IDS also makes it easy to detect abnormal traffic. When it sees such traffic in the environment, it sends a notification.
For how long have I used the solution?
We have been using Cisco Firepower NGFW Firewall for about two months.
What do I think about the stability of the solution?
The solution is stable. It's not hanging. With the firewalls from Cisco we are not facing a situation where devices are hanging because of too much traffic.
What do I think about the scalability of the solution?
The scalability is fine.
How are customer service and support?
We're getting support but there's a big delay until we get a response from their technical team. They're in the USA and we're in Africa, so that's the difficulty. When they're in the office, they respond.
Which solution did I use previously and why did I switch?
We migrated from Cisco AC520 to the Cisco NGFW. We have also used HPE and IBM switches, as well as FortiGate firewalls. We are now completely Cisco.
Previously, we were also using AlienVault and it was easy to integrate with Cisco devices.
How was the initial setup?
The initial setup is 50/50, between straightforward and complex. Migrating from Cisco to another Cisco product is okay, but migrating to Cisco from other network devices, like an IBM switch, is a bit tricky. You can't test the configuration to see if it's the same as what you're going to. But we managed with support from Cisco.
It took a month to complete the deployment.
Our implementation strategy was based on not upgrading everything at the same time. It was phased. We deployed a specific device and then we monitored everything to make sure everything looked okay, and then we moved on to the next one.
It requires a minimum of two people for deployment and maintenance, from our network and security teams.
What about the implementation team?
We used internal resources with support from Cisco.
What was our ROI?
We have gotten exactly what we're looking for, based on the company's requirements.
What's my experience with pricing, setup cost, and licensing?
The pricing is high.
Which other solutions did I evaluate?
Cisco NGFW's ability to provide visibility into threats is good compared to other solutions. The visibility is quite impressive and gives us what we're looking for, based on our security requirements.
What other advice do I have?
The scalability, the performance of the devices, the features, and the support, when looking at them combined, make the product a nine out 10.
We're planning the deployment of Cisco ISE soon, to be like our NAC.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Stable and easy to configure with useful high-availability and remote VPN features
Pros and Cons
- "The high-availability and remote VPN features are most valuable."
- "It doesn't have Layer 7 security."
What is our primary use case?
We provide IT solutions. We provide solutions to our customers based on their requirements. We support them from the beginning and do the installation and configuration in the head office and front office.
We installed Cisco ASA to support a customer in a WAN environment. They used it for site-to-site VPN and remote VPN. They used it for accessing remote office locations via the remote VPN feature. They had Cisco ASA 5500.
How has it helped my organization?
It made our customer's network more secure. They also have customers outside the office, and they are able to use the remote VPN feature to log in securely.
What is most valuable?
The high-availability and remote VPN features are most valuable.
It is easy to configure. It has a GUI and a CLI.
What needs improvement?
It doesn't have Layer 7 security.
For how long have I used the solution?
I used this solution for maybe a year.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
It is scalable.
How are customer service and support?
For any issues, we contact the local support. They are very easy to deal with.
Which solution did I use previously and why did I switch?
I have also worked with Fortigate.
How was the initial setup?
It was easy to configure. The site-to-site VPN configuration didn't take too much time. It was complete in three to four hours.
What's my experience with pricing, setup cost, and licensing?
Its price is moderate. It is not too expensive.
What other advice do I have?
I would rate Cisco ASA Firewall a nine out of 10.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at a tech services company with 51-200 employees
Capable of handling a lot of traffic, never had any downtime, and very easy to configure
Pros and Cons
- "The configuration was kind of straightforward from the command line and also from the ASDM. It was very easy to manage by using their software in Java."
- "One thing that we really would have loved to have was policy-based routing. We had a lot of connections, and sometimes, we would have liked to change the routing depending on the policies, but it was lacking this capability. We also wanted application filtering and DNS filtering."
What is our primary use case?
We were using ASA 5585 without firepower. We were using it just as a stateful firewall. We also had an IPS module on it. So, we were also using it for network segmentation and network address translations for hosting some of the services or giving access to the internet for our end users.
How has it helped my organization?
Initially, it was good. At the time we bought it, usually, IPS was in a different solution, and the firewall was in a different solution. You had to kind of correlate between the events to find the attacks or unwanted behavior in the network, but it had everything in a kind of single platform. So, the integration was great.
Our bandwidth was increasing, and the number of services that we were hosting was increasing. Our old solutions couldn't catch up with that. Cisco ASA was able to handle a lot of traffic or concurrent connections at that time. We had almost 5 million per week. We didn't have to worry about it not having enough memory and stuff like that. It was a powerful machine.
What is most valuable?
The configuration was kind of straightforward from the command line and also from the ASDM. It was very easy to manage by using their software in Java.
High throughput, high concurrent connections, easy site-to-site VPN were also valuable. It also had the capability to do double network translations, which is really useful when you are integrating with other vendors for site-to-site VPN.
What needs improvement?
When we bought it, it was really powerful, but with the emerging next-generation firewalls, it started to lack in capabilities. We couldn't put application filtering, and the IPS model was kind of outdated and wasn't as useful as the new one. For the current state of the network security, it was not enough.
One thing that we really would have loved to have was policy-based routing. We had a lot of connections, and sometimes, we would have liked to change the routing depending on the policies, but it was lacking this capability. We also wanted application filtering and DNS filtering.
For how long have I used the solution?
We have been using it for around eight years.
What do I think about the stability of the solution?
Its stability is really great. It is very stable. We didn't have to worry about it. In the IT world, every time you go on holiday, you think that something might break down, but that was not the case with Cisco ASA.
Initially, we had just a single firewall, and then we moved to high availability. Even when it was just one hardware without high availability, we didn't have any problems. Apart from the planned maintenance, we never had any downtime.
What do I think about the scalability of the solution?
We feel we didn't even try to make it scalable. We had 30,000 end users.
How are customer service and support?
We haven't interacted a lot with them because we have our own network department. We were just handling all the problem-solving. So, there were only a couple of cases. Initially, when one of the first devices came, we had some problems with RAM. So, we opened the ticket. It took a bit of time, and then they changed it. I would rate them an eight out of 10.
Which solution did I use previously and why did I switch?
Our bandwidth was increasing, and the number of services that we were hosting was increasing. Our old solutions couldn't catch up with that. We had some really old D-link firewalls. They were not enterprise-level firewalls.
After our IPS subscription ended, we couldn't renew it because Cisco was moving to the next-generation firewall platform. They didn't provide us with the new license. Therefore, we decided to move to Palo Alto. The procurement process is taking time, and we are waiting for them to arrive.
How was the initial setup?
It was straightforward. Cisco is still leading in the network area. So, there are lots of resources where you can find information. There are community forums and Cisco forums, where you can find answers to any questions. You don't even have to ask. You can just Google, and you will find the solution. Apart from that, Cisco provides a lot of certification that helps our main engineers in learning how to use it. So, the availability of their resources was great, and we just followed their best-case scenarios. We could easily configure it.
The deployment took around two or three weeks because we had different firewalls. We had a couple of them, and we migrated all to Cisco. We also had around 30,000 rules. So, the data input part took a lot of time, but the initial installation and the initial configuration were done in a matter of days.
It took us one week to set up the management plane. It had different ports for management and for the data. After finishing with the management part, we slowly moved segments to Cisco. We consolidated the rules from other firewalls for one zone. After Cisco verified that it was okay, we then moved on to the next segment.
What about the implementation team?
We did it ourselves. We had about five network admins for deployment and maintenance.
What was our ROI?
We definitely got a return on investment with Cisco ASA. We have been using it for eight years, which is a long time for IT. We only had one capital expenditure. Apart from that, there were no other costs or unexpected failures. It supported us for a long time.
What's my experience with pricing, setup cost, and licensing?
When we bought it, it was really expensive. I'm not aware of the current pricing.
We had problems with licensing. After our IPS subscription ended, we couldn't renew it because Cisco was moving to the next-generation firewall platform. So, they didn't provide us with the new license.
Which other solutions did I evaluate?
I am not sure about it because back then, I was just an engineer. I didn't have decision-making authority, so I wasn't involved with it.
We recently have done pilots with Check Point and FortiGate for a couple of months. They were next-generation firewalls. So, they had much more capability than ASA, but because of being a pilot, we didn't get full-scale throughput like big enterprise-level firewalls. The throughput was not enough, and their memory cache was always filling up. They were smaller models, but both of them had the features that ASA was lacking. Traffic shaping in ASA is not as good, but these two had good traffic shaping.
What other advice do I have?
I wouldn't recommend this solution because it is already considered to be a legacy firewall.
I would rate Cisco ASA Firewall a strong eight out of 10. It is powerful, but it lacks some of the capabilities.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at a tech services company with 11-50 employees
One-time licensing, very stable, and very good for small companies that don't want to do deep packet inspection at higher layers
Pros and Cons
- "We find all of its features very useful. Its main features are policies and access lists. We use both of them, and we also use routing."
- "The virtual firewalls don't work very well with Cisco AnyConnect."
What is our primary use case?
I have used the Cisco ASA 5585-X Series hardware. The software was probably version 9. We implemented a cluster of two firewalls. In these firewalls, we had four virtual firewalls. One firewall was dedicated for Edge, near ISP, and one firewall was for the data center. One firewall was for the application dedicated to that company, and one firewall was dedicated only to that application.
How has it helped my organization?
Dynamic policies were useful in the data centers for our clients. They were making some changes to the networks and moving virtual machines from one site to another. With dynamic policies, we could do that easily.
What is most valuable?
We find all of its features very useful. Its main features are policies and access lists. We use both of them, and we also use routing.
It is very stable. It is a very good firewall for a company that doesn't want to look at packets higher than Layer 4.
What needs improvement?
The virtual firewalls don't work very well with Cisco AnyConnect.
There are two ways of managing it. You can manage it through the GUI-based software or command-line interface. I tried to use its GUI, but I couldn't understand it. It was hard for me. I know how to use the command line, so it was good for me. You should know how to use the command-line interface very well to make some changes to it. Its management through GUI is not easy.
What do I think about the stability of the solution?
It is very stable. It has been five years since I have configured them, and they have been up and running.
What do I think about the scalability of the solution?
It is not much scalable. It is only a Layer 4 firewall. It doesn't provide deep packet inspection, and it can see packets only up to TCP Layer 4. It can't see the upper layer packets. So, it is not very scalable, but in its range, it is a very good one. What it does, it does very well.
How are customer service and support?
I have not worked with Cisco support for this firewall.
How was the initial setup?
It is not straightforward. You should know what to do, and it needs to be done from the command line. So, you should know what to do and how to do it.
From what I remember, its deployment took a week or 10 days. When I was doing the deployment, that company was migrating from an old data center to a new one. We were doing configurations for the new data center. The main goal was that users shouldn't know, and they shouldn't lose connectivity to their old data center and the new one. So, it was a very complex case. That's why it took more time.
What was our ROI?
Our clients have seen an ROI because they paid only once, and they have been using their firewalls for five years. They didn't have to pay much for anything else.
What's my experience with pricing, setup cost, and licensing?
I like its licensing because you buy the license once, and it is yours. We don't have to go for a subscription. So, I liked how they licensed Cisco ASA Firewall. Our clients are also very satisfied with its licensing model.
Which other solutions did I evaluate?
You cannot compare Cisco ASA Firewall with any of the new-generation firewalls because they are at a higher level than Cisco ASA Firewall. They are at a different level.
What other advice do I have?
It is a very good firewall for small companies that don't want to do deep packet inspection at Layer 7. It is not easy, but you can manage it. You should know how to use the command-line interface. Otherwise, it would be difficult to work with it.
For Cisco ASA Firewall, there will be no improvements because they will not make these firewalls anymore. They want to make changes to the next-generation firewalls, and they are killing the old ones.
I would rate Cisco ASA Firewall a 10 out of 10. I like it very much.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Network Engineer at a tech services company with 11-50 employees
Good protection and filtering capabilities, and everything can be easily done through the web user interface
Pros and Cons
- "I have experience with URL filtering, and it is very good for URL filtering. You can filter URLs based on the categories, and it does a good job. It can also do deep packet inspection."
- "When you make any changes, irrespective of whether they are big or small, Firepower takes too much time. It is very time-consuming. Even for small changes, you have to wait for 60 seconds or maybe more, which is not good. Similarly, when you have many IPS rules and policies, it slows down, and there is an impact on its performance."
What is our primary use case?
They were placed in a company on the perimeter near the ISP. There were two clusters. One cluster was at the front, and one cluster was near the data center to filter the traffic from the users to the data center and from the data center to the users and outside.
How has it helped my organization?
Our clients were completely satisfied with this firewall in terms of protection from attacks, filtering of the traffic that they wanted, being able to see inside the zip files, etc.
What is most valuable?
I have experience with URL filtering, and it is very good for URL filtering. You can filter URLs based on the categories, and it does a good job. It can also do deep packet inspection.
Its IPS engine also works very fine. I don't have much experience with it because I am an IT integrator, and we only configured it, but the company for which we configured these firewalls used this feature, and they say that IPS works very fine. They were also very pleased with its reporting. They said that its reporting is better than other firewalls they have had.
What needs improvement?
When you make any changes, irrespective of whether they are big or small, Firepower takes too much time. It is very time-consuming. Even for small changes, you have to wait for 60 seconds or maybe more, which is not good. Similarly, when you have many IPS rules and policies, it slows down, and there is an impact on its performance.
In terms of tracking users, the Palo Alto Networks firewall is better than Cisco Firepower.
For how long have I used the solution?
What do I think about the stability of the solution?
It is very stable because it is based on the Cisco ASA Firewall hardware, which is an old-generation firewall. I have had Cisco ASA Firewall for more than 10 years, and they have been working fine till now. So, Cisco Firepower NGFW Firewall's performance and stability are the best. I have never seen any issues or heard from anyone that it is bad.
What do I think about the scalability of the solution?
Its scalability is very good. It was a small implementation. Traffic was maximum of 150 megabits per second.
How are customer service and support?
I haven't worked with Cisco support.
Which solution did I use previously and why did I switch?
I have had experience with the Fortinet FortiGate firewall. It is very easy, and it does its job very well. Both Firepower and FortiGate do their job very well, but I like the Palo Alto Networks firewall the most. I have not experienced it in a real environment. I have placed it in my lab. It is a very complex firewall, and you need to know how to configure it, but it is the best firewall that I have seen in my life.
As compare to the Palo Alto Networks firewall, both Firepower and FortiGate are simpler. You can just learn which button to use and how to write rules, policies, etc. In Palo Alto, you can not guess this. You should know where each button is, how it works, and what it does. If you don't know, you cannot get the performance you want from Palo Alto. So, Firepower and FortiGate are easier to learn.
Firepower is very good for a small implementation. If you are doing a Cisco setup, you can place kind of 16 devices in one cluster. When it comes to the real environment, you need to have maybe three devices in one cluster. If two of them are in one data center and the third one is in another data center, the third firewall does not work very well when it comes to traffic flow because of the MAC address. When you want to implement Firepower in small infrastructures, it is very good, but in big infrastructures, you would have some problems with it. So, I won't use it in a large environment with five gigabits per second traffic. I will use the Palo Alto firewall for a large environment.
How was the initial setup?
It is straightforward. For me, it is very simple. The menu is quite impressive. Everything that you want to do can be done from the web user interface. You don't need to access the CLI if you don't like it. It is very easy to make rules with its web user interface.
Its deployment took two days. In terms of the implementation strategy, the first cluster was in the data center, and its main job was to filter user traffic going to the data center. The second cluster was on the edge. Its main job was to mitigate attacks on the inside network and to capture the traffic that could have viruses, malicious activities, etc.
What about the implementation team?
I deployed it myself, and it took me two days to deploy two clusters of Cisco Firepower NGFW Firewall.
What was our ROI?
I think our client did get an ROI. They are very satisfied with what they can do with these firewalls. It fits all of their needs.
What's my experience with pricing, setup cost, and licensing?
Its price is in the middle range. Both Firepower and FortiGate are not cheap. Palo Alto and Check Point are the cheapest ones.
I don't remember any costs in addition to the standard licensing fees.
What other advice do I have?
Our client didn't implement dynamic policies for dynamic environments because they were a small company, and they didn't need that kind of segmentation. I am not sure if it reduced their firewall operational costs because they were a small company, and the traffic was not so high.
I would rate Cisco Firepower NGFW Firewall an eight out of 10.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Senior Systems Engineer at a tech services company with 201-500 employees
Helpful in creating policies for fast-changing environments and provides good visibility and protection
Pros and Cons
- "Feature-wise, we mostly use IPS because it is a security requirement to protect against attacks from outside and inside. This is where IPS helps us out a bunch."
- "The visibility for VPN is one big part. The policy administration could be improved in terms of customizations and flexibility for changing it to our needs."
What is our primary use case?
We use it to segment the east and the west traffic in our data center. We also use it on the internet edge and for VPN termination.
We use its multiple versions. We use the virtual and the physical ones. We have multiple Cisco Firepower 9300, and we also have a few Cisco Firepower 4100.
How has it helped my organization?
It helps in protecting against threats from outside and within our data center. With the enhancement in the newest version 7.0, visibility is where we always wanted it to be. The introduction of the Unified Events feature really helps us out daily.
It enables us to implement dynamic policies for dynamic environments. With the recently added Dynamic Attributes feature, we are able to create more dynamic and fast-changing policies. In our data center, workloads tend to go up and down very quickly, and that's why dynamic policies are important. Because the workloads in our data center are fast-moving, we need to be able to change our firewall policy accordingly and quickly. That's what makes it a very important feature for us.
Snort 3 IPS allows us to maintain performance while running more rules. Our performance has
definitely increased after migrating to Snort 3. Rules are easier to implement. We also like the underlying antivirus advancements that they made with the new architecture, which increases its benefit for us.
What is most valuable?
The VPN and the login enhancements that were introduced in version 7.0 are invaluable to us. That was something that was missing before.
Feature-wise, we mostly use IPS because it is a security requirement to protect against attacks from outside and inside. This is where IPS helps us out a bunch.
It is good in terms of the overall ease to use in managing it. Some of the things need some tuning, but overall, it is good.
What needs improvement?
The visibility for VPN is one big part. The policy administration could be improved in terms of customizations and flexibility for changing it to our needs.
For how long have I used the solution?
I have been using this solution for about six years.
What do I think about the stability of the solution?
Its stability is quite good. We couldn't find any issues.
What do I think about the scalability of the solution?
Its scalability is very good due to clustering.
In terms of our plans to increase its usage, it has everything we need. We don't plan to add anything more because it has all that we need as of now.
How are customer service and technical support?
Their support is not perfect. Sometimes, you get the feeling that some of the support engineers don't have a deep knowledge of the product, but there are some engineers who are able to help.
Which solution did I use previously and why did I switch?
Most of our clients were on Cisco ASA.
How was the initial setup?
I wouldn't call it extremely straightforward, but I wouldn't call it complex either. Its deployment took about a day.
In terms of the deployment strategy, we create our deployment plans for ourselves and our customers. The deployment plan depends on the environment.
What about the implementation team?
We deploy it ourselves.
What was our ROI?
It is very hard to say because we don't measure that. It is also very difficult to measure if it has helped in reducing our firewall operational costs.
What's my experience with pricing, setup cost, and licensing?
Its pricing is good and competitive. There is a maintenance cost.
It includes SecureX that makes it cost-effective as compared to the other solutions where you have to pay for XDR and SOAR capabilities.
What other advice do I have?
Technically, it is a very good firewall, but some improvements need to be done on the management side. I would advise getting a consultant or someone from Cisco to help you in implementing and using this firewall to its fullest extent.
We don't use workload integration as of now. We also don't use its dynamic policy capabilities to enable tight integration with a secure workload at the application workload level. Similarly, we don't use the solution's tags for VMware, AWS, or Azure for dynamic policies implementation in the cloud.
I would rate Cisco Firepower NGFW Firewall an eight out of 10.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Partner
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Cisco Umbrella
Cisco Identity Services Engine (ISE)
Palo Alto Networks NG Firewalls
WatchGuard Firebox
Cisco Meraki MX
Check Point Quantum Force (NGFW)
Azure Firewall
SonicWall TZ
Cisco Secure Network Analytics
Sophos XGS
Fortinet FortiGate-VM
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?












