We use it for VPN access for our two-factor authentication. We were looking to get access through AnyConnect, to gain access to devices behind boundaries and firewalls.
Senior network security, engineer and architect at a computer software company with 5,001-10,000 employees
Decreased our downtime and enables us to get users connected faster and more easily
Pros and Cons
- "AnyConnect has been very helpful, along with the ability to use LDAP for authentication."
- "The ASAs are being replaced with the new Firepowers and they have a different type of structure in the configuration to be able to migrate from one to the other."
What is our primary use case?
How has it helped my organization?
It has improved things greatly by giving us easier and better access, easier configuration, and allowing users to gain the access they need. We have also had less downtime using these firewalls.
What is most valuable?
AnyConnect has been very helpful, along with the ability to use LDAP for authentication. It's very robust and we are able to do many different things that we were looking to do.
What needs improvement?
The ASAs are being replaced with the new Firepowers and they have a different type of structure in the configuration to be able to migrate from one to the other.
Buyer's Guide
Cisco Secure Firewall
March 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,422 professionals have used our research since 2012.
For how long have I used the solution?
I have been using Cisco ASA Firewalls for 20 years.
What do I think about the stability of the solution?
The stability is very good. It has been a very stable environment. Since the new AnyConnect came out, it's been very easy to use and very much self-sufficient.
What do I think about the scalability of the solution?
You can vary scalability from very few users to thousands of users.
How are customer service and support?
Technical support has been very helpful at times, helping us to know what bugs and what things are getting fixed in the next releases.
How would you rate customer service and support?
Positive
How was the initial setup?
As an architecture team, we had a pretty good idea of what we wanted to do and how we wanted to do it, so it was pretty straightforward and easy. We have each one across many different avenues and many different boundaries, so each one took about a day to deploy.
We needed two to three people to deploy them and another one to go over some things to make sure everything was good to go.
There is routine maintenance, keeping it up to date and making sure the licensing versions are all good to go. We have a four-man team for maintenance and they work a regular shift of eight hours.
What about the implementation team?
We used a reseller, FedData. Our experience with them was good.
What was our ROI?
It took us about six months to see benefits from our ASA Firewalls. We've seen return on our investment in terms of the timeframe of downtime, and the ability to get users connected faster and more easily has been a big benefit.
What's my experience with pricing, setup cost, and licensing?
The pricing of the products isn't terrible. They're not too expensive. They're a little more expensive than other products, but you are getting the name, the company, and the support.
It's also nice that you can buy different avenues of licensing, depending on how you want to go about using them.
We buy a support license to get support if we have any issues or problems or need help on how we want to implement things.
Which other solutions did I evaluate?
We evaluated other options, but that was a long time ago. We went with Cisco because it is so robust as well as because they have been able to integrate their solutions into many different architectures. That makes their products easier to use.
What other advice do I have?
Each use case is different and things depend upon your cost analysis and how much you need. We have these firewalls in different avenues over about 30 different sites.
The biggest lesson from using the solution is being agile which has included learning to understand how to use the ASDM and figuring out how to configure everything—the little nuances—and what can and can't be done on the CLI.
These firewalls, along with the upcoming Firepower that they're being replaced by, are going to be very good assets for two-factor authentication and VPN access.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Cybersecurity Architect at a financial services firm with 5,001-10,000 employees
Provides our organization with a sense of security, reliability, and trustworthiness
Pros and Cons
- "The most valuable feature would be the IP blocking. It gets rid of things that you don't need in your environment."
- "The solution is overcomplicated in some senses. Simplifying it would be an improvement."
What is our primary use case?
It has been great for blocking incoming bad actors. The new Firepower modules have been a welcome additive to that.
How has it helped my organization?
Cybersecurity resilience has helped us be able to react and respond in a quick fashion to anything that may be happening or any anomalies within the environment.
The solution has provided us a sense of security, reliability, and trustworthiness.
What is most valuable?
The most valuable feature would be the IP blocking. It gets rid of things that you don't need in your environment.
Its resilience helps offer being able to react and self-heal.
What needs improvement?
The solution is overcomplicated in some senses. Simplifying it would be an improvement.
For how long have I used the solution?
I have used the ASA solutions for a better part of 10 years.
What do I think about the stability of the solution?
The stability is unparalleled.
All solutions require maintenance, and we do that routinely. Anywhere from three to four people from the network teams to application owners are involved in the maintenance. This is a firewall in production, so we need to do maintenances after hours, but it would be nice if we didn't need to do it after hours
What do I think about the scalability of the solution?
Scalability is unparalleled. It is easy to scale.
We don't have plans to increase our usage at this time.
How are customer service and support?
In previous years, Cisco's tech support has been great. Although, I have seen it declining. I would rate their support as seven out of 10.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We have used the Check Point firewalls as well as several different vendors.
What was our ROI?
It secures the network. The ROI is really incalculable at this point as keeping our data secure is keeping the company's assets secure.
Which other solutions did I evaluate?
We did evaluate other vendors.
What other advice do I have?
You need to be always looking ahead and proactively developing to build resilience.
I would rate the solution as eight out of 10. It is a world-class firewall.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Cisco Secure Firewall
March 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,422 professionals have used our research since 2012.
Network Engineer at LEPL Smart Logic
Good protection and filtering capabilities, and everything can be easily done through the web user interface
Pros and Cons
- "I have experience with URL filtering, and it is very good for URL filtering. You can filter URLs based on the categories, and it does a good job. It can also do deep packet inspection."
- "When you make any changes, irrespective of whether they are big or small, Firepower takes too much time. It is very time-consuming. Even for small changes, you have to wait for 60 seconds or maybe more, which is not good. Similarly, when you have many IPS rules and policies, it slows down, and there is an impact on its performance."
What is our primary use case?
They were placed in a company on the perimeter near the ISP. There were two clusters. One cluster was at the front, and one cluster was near the data center to filter the traffic from the users to the data center and from the data center to the users and outside.
How has it helped my organization?
Our clients were completely satisfied with this firewall in terms of protection from attacks, filtering of the traffic that they wanted, being able to see inside the zip files, etc.
What is most valuable?
I have experience with URL filtering, and it is very good for URL filtering. You can filter URLs based on the categories, and it does a good job. It can also do deep packet inspection.
Its IPS engine also works very fine. I don't have much experience with it because I am an IT integrator, and we only configured it, but the company for which we configured these firewalls used this feature, and they say that IPS works very fine. They were also very pleased with its reporting. They said that its reporting is better than other firewalls they have had.
What needs improvement?
When you make any changes, irrespective of whether they are big or small, Firepower takes too much time. It is very time-consuming. Even for small changes, you have to wait for 60 seconds or maybe more, which is not good. Similarly, when you have many IPS rules and policies, it slows down, and there is an impact on its performance.
In terms of tracking users, the Palo Alto Networks firewall is better than Cisco Firepower.
For how long have I used the solution?
What do I think about the stability of the solution?
It is very stable because it is based on the Cisco ASA Firewall hardware, which is an old-generation firewall. I have had Cisco ASA Firewall for more than 10 years, and they have been working fine till now. So, Cisco Firepower NGFW Firewall's performance and stability are the best. I have never seen any issues or heard from anyone that it is bad.
What do I think about the scalability of the solution?
Its scalability is very good. It was a small implementation. Traffic was maximum of 150 megabits per second.
How are customer service and support?
I haven't worked with Cisco support.
Which solution did I use previously and why did I switch?
I have had experience with the Fortinet FortiGate firewall. It is very easy, and it does its job very well. Both Firepower and FortiGate do their job very well, but I like the Palo Alto Networks firewall the most. I have not experienced it in a real environment. I have placed it in my lab. It is a very complex firewall, and you need to know how to configure it, but it is the best firewall that I have seen in my life.
As compare to the Palo Alto Networks firewall, both Firepower and FortiGate are simpler. You can just learn which button to use and how to write rules, policies, etc. In Palo Alto, you can not guess this. You should know where each button is, how it works, and what it does. If you don't know, you cannot get the performance you want from Palo Alto. So, Firepower and FortiGate are easier to learn.
Firepower is very good for a small implementation. If you are doing a Cisco setup, you can place kind of 16 devices in one cluster. When it comes to the real environment, you need to have maybe three devices in one cluster. If two of them are in one data center and the third one is in another data center, the third firewall does not work very well when it comes to traffic flow because of the MAC address. When you want to implement Firepower in small infrastructures, it is very good, but in big infrastructures, you would have some problems with it. So, I won't use it in a large environment with five gigabits per second traffic. I will use the Palo Alto firewall for a large environment.
How was the initial setup?
It is straightforward. For me, it is very simple. The menu is quite impressive. Everything that you want to do can be done from the web user interface. You don't need to access the CLI if you don't like it. It is very easy to make rules with its web user interface.
Its deployment took two days. In terms of the implementation strategy, the first cluster was in the data center, and its main job was to filter user traffic going to the data center. The second cluster was on the edge. Its main job was to mitigate attacks on the inside network and to capture the traffic that could have viruses, malicious activities, etc.
What about the implementation team?
I deployed it myself, and it took me two days to deploy two clusters of Cisco Firepower NGFW Firewall.
What was our ROI?
I think our client did get an ROI. They are very satisfied with what they can do with these firewalls. It fits all of their needs.
What's my experience with pricing, setup cost, and licensing?
Its price is in the middle range. Both Firepower and FortiGate are not cheap. Palo Alto and Check Point are the cheapest ones.
I don't remember any costs in addition to the standard licensing fees.
What other advice do I have?
Our client didn't implement dynamic policies for dynamic environments because they were a small company, and they didn't need that kind of segmentation. I am not sure if it reduced their firewall operational costs because they were a small company, and the traffic was not so high.
I would rate Cisco Firepower NGFW Firewall an eight out of 10.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Head of ICT Infrastructure and Security at City of Harare
Stable and reliable, requiring very little support
Pros and Cons
- "The features that are most valuable within the firewall are the IPS as well as the Unified Communications. We also really like the dynamic grouping."
- "An area for improvement is the graphical user interface. That is something that is coming up now. They could make the product more user-friendly. A better GUI is something that would make life much easier."
What is our primary use case?
We use it for intrusion prevention and in our VPN that is connected to our head office. It provides protection and security and node clustering. It gives us all the security features that we need within our environment.
What is most valuable?
The features that are most valuable within the firewall are the IPS as well as the Unified Communications. We also really like the dynamic grouping.
What needs improvement?
An area for improvement is the graphical user interface. That is something that is coming up now. They could make the product more user-friendly. A better GUI is something that would make life much easier. Traditionally, Cisco products have been command-line-based.
For how long have I used the solution?
The Cisco ASA Firewall has been in our environment for the past seven years.
What do I think about the stability of the solution?
The product is very stable. We've not had any challenges with it in all this time. It performs very well.
What do I think about the scalability of the solution?
We have 2,000 users who connect through this product. We are planning to increase use as we go, toward the end of the year.
How are customer service and technical support?
The technical support has been excellent. When there have been any issues, they've always been there for us.
How was the initial setup?
The initial configurations were straightforward, not complex at all. It took us just two days to finalize things.
What about the implementation team?
We did most of the setup in-house, but we also had assistance from our partner.
What's my experience with pricing, setup cost, and licensing?
We pay annually and there are no costs in addition to the standard fees.
Which other solutions did I evaluate?
When you compare Cisco ASA Firewall with Sophos, they are more or less the same in terms of functionality.
What other advice do I have?
Cisco ASA Firewall is very stable and very reliable. It requires very minimal support, once you configure it and put it in your environment. You don't need to attend to faults or issues. Once you install it and plug it in, it is good to go.
We have been using the ASA Firewall for a long time, and it is an advanced product for our current use. In terms of improvement, there's not much that can be done to it. It is a solid product, very effective, and it does its job well.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Sr Technical Consultant at a tech services company with 51-200 employees
Best documentation, good price, and very reliable with useful remote VPN, site-to-site VPN, and clustering features
Pros and Cons
- "The remote VPN and IPsec VPN or site-to-site VPN features are valuable. The clustering feature is also valuable. We have two ISP links. Whenever there is a failover, users don't even get to know. The transition is very smooth, and the users don't notice any latency. So, remote VPN, site-to-site VPN, and failover are three very powerful features of Cisco ASA."
- "Cisco has the best documentation. You can easily find multiple documents by searching the web. Even a child can go online and find the required information."
- "There is huge scope for improvement in URL filtering. The database that they have is not accurate. Their content awareness and categorization for URL filtering are not that great. We faced many challenges with their categorization and content awareness. They should improve these categorization issues."
What is our primary use case?
We are using Cisco ASA Firewall 5525 for network security. We needed a network security solution that can take care of the network security and URL filtering. We also wanted to create site-to-site VPNs and have remote VPNs. For all these use cases, we got Cisco ASA, and we are pretty happy with it.
What is most valuable?
The remote VPN and IPsec VPN or site-to-site VPN features are valuable. The clustering feature is also valuable. We have two ISP links. Whenever there is a failover, users don't even get to know. The transition is very smooth, and the users don't notice any latency. So, remote VPN, site-to-site VPN, and failover are three very powerful features of Cisco ASA.
Cisco has the best documentation. You can easily find multiple documents by searching the web. Even a child can go online and find the required information.
What needs improvement?
There is huge scope for improvement in URL filtering. The database that they have is not accurate. Their content awareness and categorization for URL filtering are not that great. We faced many challenges with their categorization and content awareness. They should improve these categorization issues.
What do I think about the stability of the solution?
It is very reliable.
What do I think about the scalability of the solution?
It is scalable. Cisco is pretty popular with organizations, and many customers are using it. It is suitable for all kinds of customers. It can cater to small, medium, and large organizations.
How are customer service and technical support?
I have interacted with them many times. I have been on a call with their technical support continuously for 48 hours. They were very prompt. In terms of technical support and documentation for switching, firewall, and routing solutions, no one can match Cisco.
How was the initial setup?
Its initial setup was very straightforward. Its documentation is very easily available on the web, which is very useful.
What's my experience with pricing, setup cost, and licensing?
Their pricing is very aggressive and good. Even a small company can afford it. I am happy with its pricing. Its licensing is on a yearly basis.
What other advice do I have?
I would recommend this solution to others if they are not specifically looking for URL filtering and want to use it for their infrastructure. It is a perfect and very reliable solution, but it lacks when it comes to URL filtering.
I would rate Cisco ASA Firewall a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Acting Director, Office of Talent Management at a government with 10,001+ employees
The UI needs improvement, as does the SNMP configuration, but the feature set is good
Pros and Cons
- "The feature set is fine and is rarely a problem."
- "Cisco makes horrible UIs, so the interface is something that should be improved."
What is most valuable?
The feature set is fine and is rarely a problem.
What needs improvement?
Cisco makes horrible UIs, so the interface is something that should be improved. Usability is poor and it doesn't matter how good the feature set is. If the UI, whether the command-line interface or GUI, isn't good or isn't usable, then you're going to miss things. You may configure it wrong and you're going to have security issues.
Security vendors have this weird approach where they like to make their UIs a test of manhood, and frankly, that's a waste of my time.
The SNMP implementation is incredibly painful to use.
For how long have I used the solution?
I have been using Cisco Firepower NGFW Firewall within the past year.
Which solution did I use previously and why did I switch?
I work with a lot of different IT products including three different firewall solutions in the past 12 months.
What other advice do I have?
Everything has room for improvement.
I would rate this solution a five out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Administrator at a manufacturing company with 10,001+ employees
Accurate CLI, knowledgeable support team, valuable features
Pros and Cons
- "To be honest, all of the features that are provided, all the other vendor will also have. One feature we did find valuable was the CLI, it is more accurate. Additionally, I was happy with the customization, dashboards, access lists and interface."
- "It is hard to collaborate with our filtered environment."
What is our primary use case?
We utilize the solution for our IT security.
What is most valuable?
To be honest, all of the features that are provided, all the other vendor will also have. One feature we did find valuable was the CLI, it is more accurate. Additionally, I was happy with the customization, dashboards, access lists and interface.
We frequently use the Bottleneck feature we purchased specialized from Cisco.
What needs improvement?
It is hard to collaborate with our filtered environment.
If Cisco could combine the Bottleneck feature of ASA, their platform called Umbrella, and the other team they have that has similar malware protection into one, this would be perfect.
For how long have I used the solution?
I have been using the solution for almost three years.
What do I think about the stability of the solution?
The solution is stable. However, It does have some bugs, but Cisco always fixes them really quickly. Sometimes we have to restart and it would be better if the bugs could be fixed without having to reload.
What do I think about the scalability of the solution?
The scalability is not perfect.
How are customer service and technical support?
The support has been great and responsive. Most of their engineers are very professional and knowledgeable.
How was the initial setup?
The setup is easy to do if you are familiar with these type of installs, if not then it could be difficult.
What's my experience with pricing, setup cost, and licensing?
We have a perpetual license for all of our firewalls. For some of the features, we purchase them on demand. The pricing is decent but it could always be cheaper, we would be happier.
Which other solutions did I evaluate?
We will probably change to a higher version in the near future or migrate to a next-generation firewall which would include IPI and some other new features. This makes sense because our current firewall ends the support in several years.
Cisco FirePower, the next-generation firewall, is much better for stability.
What other advice do I have?
I have used many versions of the software over the years, versions 8.6 to 9.1 and 9.9 to 9.12.
Keep in mind before purchasing the solution, if you do need to scale the solution then ASA is probably not right for you.
I rate Cisco ASA Firewall an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Sr Network Administrator at Orient Petroleum Inc
Reliable and user-friendly with good technical support
Pros and Cons
- "The user interface is easy to navigate."
- "The annual subscription cost is a bit high. They should try to make it comparable to other offerings. We have a number of Chinese products here in Pakistan, which are already, very cheap and have less annual maintenance costs compared to Cisco."
What is our primary use case?
We are primarily using the solution to protect our network.
What is most valuable?
The security the solution offers is very good. Security-wise, it's the top in the world.
The product has excellent technical support.
The user interface is easy to navigate.
Everything is user friendly.
What needs improvement?
The annual subscription cost is a bit high. They should try to make it comparable to other offerings. We have a number of Chinese products here in Pakistan, which are already very cheap and have less annual maintenance costs compared to Cisco.
For how long have I used the solution?
I've been using the solution for a few years now.
What do I think about the stability of the solution?
The solution is reliable. We have been using it for more than a couple of years and we haven't had any problems. There's been no downtime and no hardware failures. It's pretty stable.
What do I think about the scalability of the solution?
We've never tried to scale. We have a pretty small set up in our country. It's unlikely we will have to scale.
Currently, we have between 200 and 300 people on the solution.
How are customer service and technical support?
The technical support has been very good. They are helpful and knowledgeable. We're quite satisfied with their level of service.
Which solution did I use previously and why did I switch?
This is the first product of this nature that we have implemented. We didn't previously use a different solution.
How was the initial setup?
Initially, the preliminary set up took us some time. However, we did have some local expertise in Pakistan. Once, when we were stuck on something, we could manage to get help from Cisco online. It wasn't that tricky or complex. In the end, it was straightforward.
What about the implementation team?
We had some assistance with a local expert as well as Cisco.
What's my experience with pricing, setup cost, and licensing?
There's an annual subscription. It's not cheap. It's quite pricey if you compare it to other competitors in Pakistan. There aren't any extra costs beyond the yearly licensing.
We pay about $200 yearly and we have two firewalls.
What other advice do I have?
We are the customer. We are in the oil and gas business. We don't have a business relationship with Cisco.
I'd recommend the solution to others straight away. It's more or less a very standard option here in Pakistan.
Overall, on a scale from one to ten, I'd rate the solution at an eight.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Palo Alto Networks NG Firewalls
Check Point NGFW
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
SonicWall NSa
Fortinet FortiGate-VM
Untangle NG Firewall
Sophos XGS
Fortinet FortiOS
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?