We are a Cisco implementor in Venezuela.
Our primary use is to deal with incoming access. We open ports for web servers or special applications that our clients have inside their network. We also use it to provide site-to-site VPN access.
We are a Cisco implementor in Venezuela.
Our primary use is to deal with incoming access. We open ports for web servers or special applications that our clients have inside their network. We also use it to provide site-to-site VPN access.
The most valuable feature is the ability to block almost all of the ports.
All of the commands work the same way, whether in the graphical interface or when using the command line.
Cisco products have a lot of features.
The graphical interface should be improved to make the configuration easier, to do things with a single click.
There should be better integration with open-source products because some of our clients use them. It would be helpful if they integrated well.
I have been using the Cisco ASA Firewall for almost 10 years.
This is a very stable product.
The scalability is good and it can be used for organizations of all sizes.
Technical support is good and we haven't had any problems with documentation that is provided.
I also have experience with pfSense.
The initial setup is easy.
We have evaluated various open-source solutions for our clients.
The main difference with Cisco is that it is a big company, and their products are very easy to use. They have the best routers, switches, and firewalls.
Cisco ASA is a product that I can recommend for its stability.
I would rate this solution a nine out of ten.
We use Cisco ASAv as a firewall.
The best features are stability and scalability.
There are other solutions that are better such as Palo Alto.
The management test needs improvement. The ACM requires Java and you need to know which version of Java is compatible with your Cisco version. It needs a client.
The pricing could be reduced.
I would like to see the issue with the client resolved. You shouldn't have to use the ASDM to help manage the client. Also, it should be subscription-based similar to Palo Alto.
I have been working with Cisco ASAv for approximately eight years.
The stability is good, we have not had any issues.
Cisco ASAv is scalable.
We are satisfied with technical support. They are good.
We are also using Palo Alto. It's very easy to manage, especially the UI system. You can do anything you want.
Cisco is considered to be an expensive solution.
When comparing to other vendors, it's quite expensive.
I would rate Cisco ASAv a six out of ten.
Our primary use case is whatever is best for our customer. I'm the service provider. The customer's main purpose is to use the malware services protection and the firewall itself, as well as the application awareness feature.
My client company is Cisco Oriented. They wanted to leverage something which is equivalent that can give them the next gen features like application awareness and intrusion protection. That is a major reason they were looking forward to this. The original ASA firewall did not have these features. This was the major reason the customer moved on to Cisco Firepower Threat Defense (FTD). Now they can go ahead and leverage those functionalities.
Firepower is an okay product. However, it is better as a firewall than the IPS or other services it provides.
I was trying to learn how this product actually operates and one thing that I see from internal processing is that it does fire-walling and then sends it to the IPS model and any other model that needs to be performed. For example, content checking or filtering will be done in a field processing manner. That is something that causes delays in the network, from a security perspective. That is something that can be improved upon. Palo Alto already has implemented this as a pilot passed processing. They put the same stream of data across multiple modules at the same time and see if it is giving a positive result by using an XR function. Something similar can be done in Cisco Firepower. Instead of single processing or in a sequential manner, they can do something similar to pile processing. An internal function that is something that they can improve upon.
They can also improve on cost because Cisco is normally expensive and that's the reason customers do not buy them.
Also, if they could provide integration with Cisco Umbrella, that would actually improve the store next level. Integration is one thing that I would definitely want.
From a technical perspective, maybe they could simplify the CLI. That is one thing that I would like to be implemented because Cisco ASA or Cisco, in general, is usually good at simple CLIs. That is one thing that I saw lacking in FTD. Maybe because they got it from another vendor. They're trying to integrate the product.
Two years
From a stability diagnosis, once I did the deployment it did not give me any issue for at least six to eight months. Once it went to a stable support, I did not see major problems. I don't think there were issues with stability.
However, the core upgrades frequently come in, so you need to be carefully devising that support management. From a stability perspective, if you are happy with your current stuff and you do not require past updates it would be very stable. If you're using an IPS, the only challenge would be past management. With Cisco having cloud integration and just firing one command and getting things done, it is still okay. It is a good stable product.
We have only one or two firewalls as a site data center firewall.
From what I have studied, they are scalable. You can have eight firewalls integrated with the FTP devices. I don't think scalability would be an issue but I do not have a first-hand answer on that.
There are approximately 2,500 customer base users using Cisco Firepower. It's a data center firewall, so all the sites integrate for one data center.
You do not need extra staff to maintain Firepower. One field technician engineer, FTE would be sufficient and should not be a problem. I don't think extra staff would be needed. For support, for instance, you need one person.
They have very good documentation, so there's a small chance you will actually need technical support. I would give kudos to the Cisco documentation. That would be the answer.
I have not tried the support because most of it has been solved with the documentation. Nevertheless, Cisco support has typically been a pleasant experience. I don't think that would be a problem with this.
We did previously use a different solution. They had two different solutions. One was Cisco ASA itself and before that, they used Check Point.
We are a Cisco company and that's the reason they are moving from one Cisco product to another Cisco product, which was better than the previous one. So, that was a major reason for the switch. I would say the other vendors are improving. This company was just Cisco oriented so they wanted something Cisco.
The initial setup is a bit difficult. Other vendors are doing the app integration solution. The initial setup was medium in complexity.
You need to install the Firepower CLI. You need to log into that and then you'll need to sit down to connect to the ASA and configure the ASA level services. You also need a Firepower management station for it to work appropriately. The setup is serious and a bit complex.
In my scenario, because I had to learn the entire technology over there and then apply it, it took me around two weeks time to do it. Then the integration, improvisation, and stuff that normally happens took some extra time. You can safely say around two to four weeks period is what it normally takes for deployment. This is based on how the company evaluates the product. It depends on how much you know at that point.
Usually, for the deployment, the company works with Cisco, so they only use Cisco products. I am a DIY person, I did the deployment myself.
We normally license on a yearly basis.
The hardware procurement cost should be considered. If you're virtual maybe that cost is eradicated and just the licensing cost is applied. If you have hardware the cost must be covered by you.
All the shipping charges will be paid by you also.
I don't think there are any other hidden charges though.
We gave them Palo Alto as an alternative option. I think they were more into Cisco. They did not evaluate the Palo Alto though, they just opted for Cisco.
If you're really looking into Cisco Firepower, they have a good product, but I would say study hard and look around. If you want an easier product, you can always use Palo Alto. If you are a Cisco guy and you want to be with Cisco, you'll need to get an integration service engineer from the Cisco side. That will actually help you out a lot. Alternatively, maybe you can go for Palo Alto. That would be the best thing to do.
If you are not worried about the technical integration part and learning how it works and how well it can go with the environment, I would recommend you go ahead and take an integration engineer with you. Doing a POC could be troublesome for you. We have professional services. You can leverage that.
If you do not want to invest much money on all that stuff you can go ahead and hire someone who's already aware. Or if not, you can use any other vendor like Palo Alto.
Our primary use for the solution is for checking on and verifying the security of our customer data.
Our organization has been improved by the solution because we can be assured that the firewall is secure. It gives us more flexibility to monitor other things. Because we have safe firewalls, we don't have to worry about that and can direct resources elsewhere. If our internet goes down in one location we can bring it back up pretty easily.
The thing we've found most valuable is the efficiency. The firewalls are easy to configure and deploy. Overall it is an easy system to manage.
Another valuable feature is just how granular we can get with it so we can keep users seeing what they are supposed to and don't compromise security.
One way the product could be improved is if you could monitor more than one rule at a time. We only have the option to have one monitor window up at a time if you're trying to troubleshoot something you end up switching back-and-forth and don't get the bigger picture all at once.
It's reliable and it does its job. It gives you the freedom to do other things while you get indications of any issues. The multi-monitor would be a huge improvement.
I'd definitely recommend the product. Even when you set it up for the first night, it definitely will tell you the status of the network. The important part in the setup is following the instructions to get it going.
The solution itself is good as far as stability.
The technical support is good and the response time quick. We had some firewalls down and gave them a call. They helped resolve the issue and it was all positive.
Previous to this we had just a normal firewall that I didn't like. It didn't provide enough.
The setup was straightforward, even without initially having all the information we needed. It was very intuitive. When I went in to get help, help was there.
We got the product from a reseller and we did the installation ourselves.
We certainly have seen a return on investment at the very least from being able to reallocate human resources.
Before selecting this as a solution we really didn't evaluate other options at all.
As far as rating this product, I would give it a nine out of ten. The only real drawbacks are the lack of multi-monitoring and not really having clear instructions prior to jumping in and implementing it.
We are using the Cisco ASA NGFW as a next-generation firewall. We are using the 5516-X version. Our primary use case of this is as an X firewall for external connections.
Cisco ASA NGFW significantly improves our bank. It protects any high-value products that we use from hackers, viruses, malware, and script-bots. It gives us metrics on network traffic as well as what kind of attacks we are getting from the outside.
The most valuable features are the firewall capabilities, filtering, and intrusion prevention.
I respect the capability of the Cisco firewall. We fully use it all as a complete firewall solution. Cisco also has excellent anti-malware detection and other similar features.
Cisco should improve its user interface design. There is a deep learning curve to the product if you are a newcomer.
Stability is excellent.
It can easily scale. If you want, you can scale it to a lot of traffic. It's an X file, so all of our users are going through it.
We only require one administrator for the solution. For deployment and maintenance, it depends on how many developers you have. We require two dedicated staff at a minimum.
Naturally, we employ both security technicians and administrators. Cisco ASA NGFW is being used at all our branches, and we'll continue using it in the future.
The technical support from Cisco is excellent.
We have only been using Cisco solutions.
The initial setup of the Cisco ASA NGFW is not easy, but at the same time also it is not complex. It's somewhere in the middle. It took about 4 weeks, then it was activated.
We used a reseller consultant for the deployment.
Our licensing costs for this solution is on a yearly basis. Just for the firewall, it's about $1.5 million USD.
We evaluated Palo Alto Networks, Fortinet FortiGate, and Checkpoint products.
For the Cisco ASA NGFW, it is a bit more expensive than other products, but their method is a lot more stable in my experience. It has all the features that you would need in a next-generation firewall. They are always developing new features and introducing them.
I don't have anything that I'm currently missing with Cisco. On a scale from one to ten, I would rate the product at eight.
Our primary use case is for handling office traffic VPN tunnels and filtering the traffic. All the traffic comes into the house and gets filtered in and out the Firepower interface. It's performed well.
Because of the deeper inspection it provides we have better security and sections that allow users broader access.
With this solution, you can have an inspection of each package and see what the threat level it's at. It has made the work more dynamic. We don't have to block as much like we had to in the old days.
They should develop a web interface that is actually useful. Currently, we still have an issue where you have to go in and do manual configuring by the command line if you want certain functions in it. This means that we need to find people at a higher technical level to be able to do changes in those things. It would be much easier if you had a more friendly user interface basis where you don't have to go in and do the command line off.
They should be a little bit faster sometimes in updating their threat protection. Cisco should redo their website so it's actually usable in a faster way.
Stability is fantastic.
We are a rather small firm so we don't have much growth leads but there is a wide range of firewalls that I can expand onto. We can also set up cluster solutions. It's rather indefinite in its expandable possibilities.
I've only had to use their technical support once. Otherwise, I haven't had to use them.
We were using SonicWall before.
The initial setup is very complex but once it's done, it's fantastic.
I would rate it a nine out of ten. Not a ten because of the horrible initial setup and because you can't handle all operations from one interface. You have to go back into the command line to even be able to type program language, even though you have a graphic user interface for it but it doesn't work properly.
For the AWS version, Cisco is our primary use. We have our own appliances and products, which are indicated as Cisco ASA. So, we test these product against Cisco ASA using different types of rules for new cases. During the test process, we make sure the integration works.
We have been using the solution for two years.
Right now, it serves a purpose and has everything that we need. Performance-wise, it is top-notch.
It is a comprehensive suite and complete package. We have the following with the product:
We find that virtual instances are helpful because they are easy to use on AWS Marketplace, as they are On Demand. We have a lot of traffic on AWS. Therefore, to monitor the traffic rather than using on-premise, we use virtual instances of Cisco ASA. This is pretty easy to use and we receive value off of it.
Cisco ASA should be easier to use. It is a bit tough to navigate and see what is going on. While I like the UI and dashboards of Cisco ASA, if you compare them to Palo Alto or Fortinet, they have much richer UIs. An analyst (or anyone) can see them, and say, "I have got all these important pointers on my dashboard." However, with Cisco ASA, we need to dig into many things and go to many views to see what is actually there.
It is stable. We put a good amount of stress on it.
Especially for the AWS version, we can spin up multiple instances and do load-balancing.
We have 15 to 20 Cisco ASA switches with a couple of physical appliances and twelve machines. Our team is using four to five machines.
It is all self-guided, and we were already using the physical appliances. Therefore, we knew how to use the product.
Our individual release cycle has been quicker because the entire development and testing environment has been automated because of these virtual instances. It has aligned our development workflow. This is where we have seen the ROI increase.
For example, if you are working with a physical appliance, then you need to have a dedicated lab administrator to work with it, even to test a simple use case. This takes time because we would need to frequently reset that appliance and load all the data. It is no longer like that.
Purchasing from the AWS Marketplace was easy. It was just point and click.
It is pay-as-you-go, so it much cheaper than buying in the plants.
We also checked Fortinet and Palo Alto, their AWS versions.
When compared products, Cisco ASA is easy on AWS. We received a trial version. It is easy to setup and evaluate.
We also already had Cisco products. This provided a tighter integration with what we already had. Since most of our traffic stays in AWS, it made sense to use AWS Cisco ASAv.
Once you deploy a virtual database or virtual machine for any product, like Cisco. The first thing to do with your data is test it. So, you need to be prepared with the test that you want to test before you deploy the instances. Because after deploying instances, you wait and see what the data come back with, how to configure it, and review what doesn't work. Therefore, you need to do some background homework before starting, such as what type of data you need to put into it, how to test it, and will the system process it.
We have used both the on-premise and AWS version. We started using AWS in the past six to seven months. Prior to that, we used the on-premise version. The AWS version is better as it is quick to spin up and configure. Also, with AWS, everything is preset, and it is more flexible.
We have it integrated with many other products, like threat intelligence and analytics. For example, all our logs go into Splunk, then we receive our analytics from there. We also have Splunk on AWS. Thus, all the data stays on the cloud, so there is no latency, etc.
IT landscape is dynamic, requiring security policy, controls, and visibility to be better than ever.
This applies to all ASA-related Management/to-the-box traffic, like SNMP, SSH, etc., with Firepower services combined with our proven network firewall along with the industry’s most effective next-generation IPS and advanced malware protection. Therefore, you can get more visibility, be more flexible, save more, and protect better.
Historic events related to security incidents. My organization must have a unified strategy for event logging and correlation.
The Cisco Product Security Incident Response creates and maintains publications, commonly referred to as PSIRT Advisories, for security-related issues in Cisco ASA.
The Cisco ASA device needs overall improvement, as configurations alone do not completely secure my network. The operational procedures in use on the network contribute as much to security as the configuration on devices.
There is 24/7 support anytime, anywhere.
Before, I did not manage my private network well (or professionally). For this reason, I have been updating products.
Commercial leasing is the best option.