Our primary use case is for handling office traffic VPN tunnels and filtering the traffic. All the traffic comes into the house and gets filtered in and out the Firepower interface. It's performed well.
Information Systems Manager at a non-profit with 1-10 employees
Traffic comes into the house and gets filtered in and out the Firepower interface
Pros and Cons
- "Because of the deeper inspection it provides we have better security and sections that allow users broader access."
- "Cisco should redo their website so it's actually usable in a faster way."
What is our primary use case?
How has it helped my organization?
Because of the deeper inspection it provides we have better security and sections that allow users broader access.
What is most valuable?
With this solution, you can have an inspection of each package and see what the threat level it's at. It has made the work more dynamic. We don't have to block as much like we had to in the old days.
What needs improvement?
They should develop a web interface that is actually useful. Currently, we still have an issue where you have to go in and do manual configuring by the command line if you want certain functions in it. This means that we need to find people at a higher technical level to be able to do changes in those things. It would be much easier if you had a more friendly user interface basis where you don't have to go in and do the command line off.
They should be a little bit faster sometimes in updating their threat protection. Cisco should redo their website so it's actually usable in a faster way.
Buyer's Guide
Cisco Secure Firewall
March 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,422 professionals have used our research since 2012.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
Stability is fantastic.
What do I think about the scalability of the solution?
We are a rather small firm so we don't have much growth leads but there is a wide range of firewalls that I can expand onto. We can also set up cluster solutions. It's rather indefinite in its expandable possibilities.
How are customer service and support?
I've only had to use their technical support once. Otherwise, I haven't had to use them.
Which solution did I use previously and why did I switch?
We were using SonicWall before.
How was the initial setup?
The initial setup is very complex but once it's done, it's fantastic.
What other advice do I have?
I would rate it a nine out of ten. Not a ten because of the horrible initial setup and because you can't handle all operations from one interface. You have to go back into the command line to even be able to type program language, even though you have a graphic user interface for it but it doesn't work properly.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Cyber Security Software Engineer at FireEye
Performance-wise, it is top-notch. However, it is a bit tough to navigate and see what is going on.
Pros and Cons
- "It is a comprehensive suite and complete package."
- "Cisco ASA should be easier to use. It is a bit tough to navigate and see what is going on."
What is our primary use case?
For the AWS version, Cisco is our primary use. We have our own appliances and products, which are indicated as Cisco ASA. So, we test these product against Cisco ASA using different types of rules for new cases. During the test process, we make sure the integration works.
We have been using the solution for two years.
How has it helped my organization?
Right now, it serves a purpose and has everything that we need. Performance-wise, it is top-notch.
What is most valuable?
It is a comprehensive suite and complete package. We have the following with the product:
- Interest point detection
- Firewall stuff
- VPN
- It's configurable.
- It guards with its own threat intelligence.
We find that virtual instances are helpful because they are easy to use on AWS Marketplace, as they are On Demand. We have a lot of traffic on AWS. Therefore, to monitor the traffic rather than using on-premise, we use virtual instances of Cisco ASA. This is pretty easy to use and we receive value off of it.
What needs improvement?
Cisco ASA should be easier to use. It is a bit tough to navigate and see what is going on. While I like the UI and dashboards of Cisco ASA, if you compare them to Palo Alto or Fortinet, they have much richer UIs. An analyst (or anyone) can see them, and say, "I have got all these important pointers on my dashboard." However, with Cisco ASA, we need to dig into many things and go to many views to see what is actually there.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
It is stable. We put a good amount of stress on it.
What do I think about the scalability of the solution?
Especially for the AWS version, we can spin up multiple instances and do load-balancing.
We have 15 to 20 Cisco ASA switches with a couple of physical appliances and twelve machines. Our team is using four to five machines.
How is customer service and technical support?
It is all self-guided, and we were already using the physical appliances. Therefore, we knew how to use the product.
What was our ROI?
Our individual release cycle has been quicker because the entire development and testing environment has been automated because of these virtual instances. It has aligned our development workflow. This is where we have seen the ROI increase.
For example, if you are working with a physical appliance, then you need to have a dedicated lab administrator to work with it, even to test a simple use case. This takes time because we would need to frequently reset that appliance and load all the data. It is no longer like that.
What's my experience with pricing, setup cost, and licensing?
Purchasing from the AWS Marketplace was easy. It was just point and click.
It is pay-as-you-go, so it much cheaper than buying in the plants.
Which other solutions did I evaluate?
We also checked Fortinet and Palo Alto, their AWS versions.
When compared products, Cisco ASA is easy on AWS. We received a trial version. It is easy to setup and evaluate.
We also already had Cisco products. This provided a tighter integration with what we already had. Since most of our traffic stays in AWS, it made sense to use AWS Cisco ASAv.
What other advice do I have?
Once you deploy a virtual database or virtual machine for any product, like Cisco. The first thing to do with your data is test it. So, you need to be prepared with the test that you want to test before you deploy the instances. Because after deploying instances, you wait and see what the data come back with, how to configure it, and review what doesn't work. Therefore, you need to do some background homework before starting, such as what type of data you need to put into it, how to test it, and will the system process it.
We have used both the on-premise and AWS version. We started using AWS in the past six to seven months. Prior to that, we used the on-premise version. The AWS version is better as it is quick to spin up and configure. Also, with AWS, everything is preset, and it is more flexible.
We have it integrated with many other products, like threat intelligence and analytics. For example, all our logs go into Splunk, then we receive our analytics from there. We also have Splunk on AWS. Thus, all the data stays on the cloud, so there is no latency, etc.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Cisco Secure Firewall
March 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,422 professionals have used our research since 2012.
IT System Administrator at PFW HAVACILIK
Creates a unified strategy for event logging and correlation
Pros and Cons
- "Beats sophisticated cyber attacks with a superior security appliance."
- "The Cisco ASA device needs overall improvement, as configurations alone do not completely secure my network."
What is our primary use case?
IT landscape is dynamic, requiring security policy, controls, and visibility to be better than ever.
- 1Gbps
- Multi-service
- Beats sophisticated cyber attacks with a superior security appliance.
- IT landscape is dynamic.
- Requires security policy, controls, and visibility to be better than ever.
This applies to all ASA-related Management/to-the-box traffic, like SNMP, SSH, etc., with Firepower services combined with our proven network firewall along with the industry’s most effective next-generation IPS and advanced malware protection. Therefore, you can get more visibility, be more flexible, save more, and protect better.
How has it helped my organization?
Historic events related to security incidents. My organization must have a unified strategy for event logging and correlation.
What is most valuable?
The Cisco Product Security Incident Response creates and maintains publications, commonly referred to as PSIRT Advisories, for security-related issues in Cisco ASA.
What needs improvement?
The Cisco ASA device needs overall improvement, as configurations alone do not completely secure my network. The operational procedures in use on the network contribute as much to security as the configuration on devices.
For how long have I used the solution?
Still implementing.
How are customer service and technical support?
There is 24/7 support anytime, anywhere.
Which solution did I use previously and why did I switch?
Before, I did not manage my private network well (or professionally). For this reason, I have been updating products.
What's my experience with pricing, setup cost, and licensing?
Commercial leasing is the best option.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Account Manager
Blocks malicious URLs, but bandwidth allocation and detection of new bugs need work
Pros and Cons
- "Malicious URLs are being blocked."
- "Bandwidth allocation needs improvement."
- "Critical bugs need to be addressed before releasing the version."
- "Virtual patching would be helpful for servers that are not able to update patches due to compatibility issues."
How has it helped my organization?
Malicious URLs are being blocked.
What is most valuable?
Advanced malware protection, it blocks malicious attacks.
What needs improvement?
- Bandwidth allocation.
- SSL decryption (avoid installing the intermediate device certificate in the client) should happen from Firepower itself.
- Critical bugs need to be addressed before releasing the version.
- Need to reduce the time to for detection of new threats.
- Enable a feature for importing/exporting logs when required for analysis.
- Dynamic IP address in client systems mapping with respect to OS change or device change should be updated periodically in FireSIGHT management.
- Virtual patching would be helpful for servers that are not able to update patches due to compatibility issues.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
Yes, there were stability issues due to memory issues in the cluster environment and Firepower misbehaved due to non-responding of service/process.
What do I think about the scalability of the solution?
No scalability issues.
How are customer service and technical support?
Good support.
Which solution did I use previously and why did I switch?
We switched from our previous solution because of scalability issues.
How was the initial setup?
It was straightforward, even though we migrated from a third-party to Cisco.
What's my experience with pricing, setup cost, and licensing?
Price should be judged based on the above answers, among the most capable vendors.
Which other solutions did I evaluate?
FortiGate.
What other advice do I have?
We are using ASA5585-X with Firepower SSP-20 (ASA version 9.6(1)3, Firepower version 6.1.0.5).
When looking at different solutions, take a deep look at the features.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Networking Specialist at a insurance company with 1,001-5,000 employees
Provides management with the adaptive security device manager.
What is most valuable?
It is good for firewalls, management with the adaptive security device manager (ASDM), and tools such as packet tracers for troubleshooting.
It’s a really good firewall which is easy to manage, but it is not a Next Gen firewall.
Firewall functionality is the main issue when buying this product. We use it to segment our DMZs, it is stateful firewalling, is highly reliable with zero outages, and impeccable failovers during upgrades.
The ASDM is the management tool to administer the ASAs via the GUI. It has an easy to use interface with very nice troubleshooting tools, such as Packet Tracer. This tool lets you simulate a traffic flow so you can see why flows don’t work.
How has it helped my organization?
It is a very reliable border firewall which makes it easy for us to organize and secure our DMZs.
What needs improvement?
- The SSL VPN portal could be better.
- The ASAs support both IPSEC as an SSL VPN.
- For IPSEC you need a Cisco VPN client.
- You can only have two SSL VPN sessions.
- For more SSL sessions you have to pay (750 IPSEC sessions are included with an ASA).
- With SSL, you connect through a browser, so it is clientless. The SSL portal offers a few functionalities which you can offer a user. Configuring this portal is not an easy task.
For how long have I used the solution?
We have been using the solution for almost five years.
What do I think about the stability of the solution?
We didn't encounter any issues with stability.
What do I think about the scalability of the solution?
Scalability is limited depending on the chosen model.
How are customer service and technical support?
I would give technical support a rating of 9/10. Cisco is one of the best, if not the best, in support.
Which solution did I use previously and why did I switch?
We chose FortiGate from Fortinet as our Next Gen Firewall solution because of the higher value for our money.
How was the initial setup?
The setup was easy with lots of documentation and configuration examples provided.
What's my experience with pricing, setup cost, and licensing?
You have to negotiate well.
Which other solutions did I evaluate?
We did not evaluate any alternative options for stateful firewalling.
What other advice do I have?
You will want to have Next Generation functionality, so choose FortiGate or Cisco Firepower.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Network Designer at ODI
You can extend your visibility in network infrastructure for monitoring.
What is most valuable?
The Advanced Malware Protection and Security Group Tag (SGT) are valuable features. You are able to integrate all the networks by using SGT with the pxGrid service. This is built-in technology in Cisco devices and services.
How has it helped my organization?
You can extend your visibility in network infrastructure for monitoring. You can absolutely give your users a better experience. When you use .1X for user authentication:
- Users login just one time
- You can control all user access to the internet, data center resources, and across the network.
What needs improvement?
After Firepower V6.1, Cisco added bandwidth shaping on the FTD product. This feature is a little bit weak. You cannot have customized shaping in different projects.
For how long have I used the solution?
I have used this product, as well as Cisco Firepower Threat Defense, for about two years.
What do I think about the stability of the solution?
I have heard about some bugs, but I have never encountered any.
What do I think about the scalability of the solution?
This product is very scalable in our experience.
How was the initial setup?
It is easy to initialize. For advanced configurations, it is sometimes complicated.
What's my experience with pricing, setup cost, and licensing?
The base license is delivered with the device. This license includes IPS and user authentication. You should buy a license for an IPS update. You should also buy another license for AMP and URL filtering.
These are the important licenses: BASE, IPS, AMP, and URL filtering. Apart from the base license, the other licenses are subscription based for one, three, or five years.
Which other solutions did I evaluate?
I evaluated many products, such as CheckPoint, Palo Alto, Fortinet Firewall, Sophos, and Cyberoam Firewall.
What other advice do I have?
This product is very usable when you need integrity in your network. This product is very functional when you use a Cisco Identity Services engine.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Engineer at a healthcare company with 1,001-5,000 employees
I especially value Change Management and Compliance. They are most valuable because we are required to comply with regulations - PCI and HIPAA.
What is most valuable?
I especially value Change Management and Compliance. They are most valuable because we are required to comply with regulations regarding credit card processing (PCI) and protecting patient data (HIPAA).
How has it helped my organization?
This product has made visible some areas that were previously hidden.
What needs improvement?
There are many areas for improvement despite the fact that we love the product, but because it is a newer version we’ve been working out lots of issues. Some of those issues are based on our environment.
For how long have I used the solution?
I have used the product for 1.5 years with nearly a year for this version.
What do I think about the stability of the solution?
We did not have any problem with the previous (v7) version but when we upgraded to (v8) the new version, we were well aware that there would be some bugs and issues that would require resolution.
What do I think about the scalability of the solution?
We have had no scalability issues.
How are customer service and technical support?
Tech Support is awesome. I never get someone who has no clue what they are doing. These guys are well trained and know their stuff.
Which solution did I use previously and why did I switch?
We did not use a previous solution. FireMon was implemented as part of a security mandate and we chose this product over its competitors.
How was the initial setup?
Setup was pretty simple, because we implemented the single server model.
What's my experience with pricing, setup cost, and licensing?
We purchased licenses for our High Availability (HA) devices as well but they were not really needed.
Which other solutions did I evaluate?
I was not the researcher and decision maker. I inherited the tool.
What other advice do I have?
To make sure they have the cooperation of the networking team that supports the firewalls. It has been difficult for us to get the tool working to its full potential because our network team is resistant to some of the things we want to monitor.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Security Consultant at Webernetz.net - Network Security Consulting
Cisco ASA vs. Palo Alto Networks
Cisco ASA vs. Palo Alto: Management Goodies
You often have comparisons of both firewalls concerning security components. Of course, a firewall must block attacks, scan for viruses, build VPNs, etc. However, in this post I am discussing the advantages and disadvantages from both vendors concerning the management options: How to add and rename objects. How to update a device. How to find log entries. Etc.
Cisco ASA
- Fast Management Suite: The ASDM GUI is really fast. You do not have to wait for the next window if you click on a certain button. It simply appears directly. On the Palo, each entry to add, e.g., an application inside a security rule, takes a few seconds.
- Better “Preview CLI Commands”: I am always checking the CLI commands before I send them to the firewall. On the Cisco ASA, they are quite easy to understand. I know, Palo Alto also offers the “Preview Changes”, but it takes a bit more time to recognize all XML paths.
- Better CLI Commands at all: For Cisco admins it is very easy to parse a “show run” and to paste some commands into another device. This is not that easy on a Palo Alto firewall. First, you must change the config-output format, and second, you cannot simply paste many lines into another device, since the ordering of these lines is NOT correct by default. That is, it simply doesn’t work.
- ACL Hit Count: I like the hit counts per access list entry in the GUI. It quickly reveals which entries are used very often and which ones are never used. On the Palo, you can only highlight the never used ones. Furthermore, the CLI on the ASA splits each ACL into the real objects with individual counters. Great!
- Many SNMP OIDs: There are many options to monitor the ASA via SNMP. On the Palo Alto, e.g., you can not monitor sub-interfaces. This is really bad. Only the bare metal ethernet ports reveal counters.
Palo Alto PA
- Out-of-Band Management Interface: Even the smallest PA-200 device has its own management interface with its own routing table (default route). This makes it easier to permit/deny admin accesses to this host. E.g., there is no confusion between an access to the SSL VPN and an access to the management GUI since they reside on different interfaces and IP addresses.
- Browser-based GUI: No Java, no client. Just a simple browser. It is also manageable through SSL VPN portals.
- In-Band Interface Management Profiles: On the ASA, every access through different interfaces and different protocols needs its own line to be configured (Management Access -> ASDM/HTTPS/Telnet/SSH). Management access is denied per default, while ping is allowed by default. Both must be set in different menus. Not on the Palo: Interface Mgmt with a few clicks and optional IP addresses, configurable on several interfaces.
- –> Single Security Policy: All interfaces AND site-to-site VPNs are in zones. All security policies between these zones are in one security policy. On the ASA, you don’t have the ACLs for the VPNs in the ACL view of the interfaces since you must specify extra ACLs to the group policy of the VPN.
- Zone Based Security Policies: A policy from zone A to zone B only takes effect for this pair of zones. The “incoming interface” policies on the ASA always have a destination of “any” zone. Though the destination addresses can be limited, it is more complicate to configure the policies if there are several interfaces in use (and not only inside and outside).
- Network Objects in Slash-Notation: Add a host or a network object by typing “1.2.3.0/24″. On the ASA, you have three fields for the same object: host or network, IP address of the network, and netmask (in 255.x.x.x notation!) for the network.
- Tags: A simple but useful feature are the coloured tags that can be used in policies and objects. With these tags, temporary policies or the like can easily be marked.
- –> Managing all Un-Commited Changes: One of the best features! Configuration changes can be done in any menu of the Palo Alto, showing the candidate config in all other menus right now, even without a commit. If you rename an object here, it is visible with this new name there. (Try to change the IP-address and the default gateway on a remote Cisco ASA firewall by one step. You won’t succeed until you are using the CLI.)
- Simple Renaming of almost Everything: (Except subinterfaces) Address objects, address groups, zones, security profiles, IPsec tunnels – everything can be renamed. Try to rename an IPsec connection profile on the ASA. Or an interface name. It won’t work or you will get tons of CLI changes.
- History of Configuration Changes: Ever tried to revert to the config from last day? No problem: Load configuration version.
- Configuration Log: Ever wondered who changed something? Here it is: Monitor -> Logs -> Configuration. An exact list of all configuration changes with the name of the administrator.
- Config Audit: Comparison of two configurations, such as of the running-config and any other historical config on the device. Great feature to find certain configuration changes.
-
–> Traffic Log Filtering: This is one of the MAJOR advantages of a Palo Alto GUI. It is really simple to click some objects to filter the traffic log. Or to build more precise filters. “eq” and “neq” are your friends.
Forget the Real-Time Log Viewer from Cisco.
- Adjust Columns: Or even the possibility to adjust the columns. On the ASDM GUI from Cisco, some pages are per default to small to show the relevant values, e.g., the Monitoring -> Routing -> Routes pane.
- Application Command Center: A simple but useful monitoring tool within the GUI. You are searching for the IP that generates high traffic load during the last hour? Here you will find it. What source country is responsible for the attacks during the last week? Here you go.
- –> Route-Based VPN: A site-to-site VPN connection is built by two gateways, independent of the traffic being routed through the tunnel. Numbered tunnel-interfaces can be used to ping the tunnel endpoint of the other side. The decision where to route the traffic is based on the routing table and not on a policy. The Cisco firewall uses policy-based VPNs in which the Proxy-IDs per connection define the tunneled networks. A bit unhandy.
- –> IKE Policy per VPN: Every gateway has its own IKE profile configured. Different IKE settings can be used for different VPNs. The Cisco has global IKE parameters.
- Own Zones for VPNs: Site-to-Site VPNs can be in extra zones. On the ASA, VPNs are always associated with the “outside” interface, which is complicated for using NAT policies.
- Reasonable Default Crypto Settings: The default groups for the IPsec phase 1 and phase 2 crypto profiles have almost secure settings. Very good compared to the Cisco ASA, which really installs a view default profiles, e.g., an IKE policy with an encryption algorithm of “DES”. Yes, not 3DES, but only simple DES! Oh oh.
- Retrieve License Keys from Server: Really cool feature. And very easy to use for the customer. Once the authorization code is added in the Palo Alto support portal, the firewall can retrieve its license via https. No need for any further activation keys.
- Built-In Software Archive: Firmware versions can be downloaded directly through the GUI. No need for further logins, downloads from the vendor page and uploads to the unit. Just “Download” and “Install”.
- Enough Disk Space for several Softwares: On my (small) Cisco ASA 5505, the built-in flash disk has only 128 MB. That is, I cannot even do a simple software upgrade because the free disk space does not fit for two ASA images. (I have an ASA and ASDM image as well as three AnyConnect images on the fash memory.) What a mess!
- Sync Software to HA Member: Every software that is downloaded on the primary firewall can automatically be synced to the secondary device. This is not true on the Cisco ASA, which is really annoying when it comes to AnyConnect remote access VPN client images. If these are not uploaded manually on the second device, the other HA unit will not terminate VPN tunnels in case of a HA active-unit swap. Oh oh!
- HA Status in GUI: With the High Availability widget, the status of the HA is visualized with green/orange/red bubbles. It shows which unit is the active/standby one. Since the PA has a real OoB management, the admin can access both devices simultaneously and can see which hardware is the active and the passive one. The Cisco ASA swaps its IP addresses and has no OoB management, so it is harder to see which hardware is the primary and the secondary one, since its IP addresses swap, too.
- NTP Servers with Names: I know that NTP servers should be set via IP addresses to not rely on another service (DNS), but it is much more easier to use names such asde.pool.ntp.org or the like. This can be done on the Palo Alto, but not on the Cisco firewall.
- No “bring to top” GUI: During the start of Cisco’s ASDM, it always brings its GUI to the top of all windows. In my opinion, this is annoying. During the 30-60 seconds until the whole device config is loaded into the GUI, I am working on other things. But these are generally disrupted from the highlighting of the ASDM GUI. This does not happen with the Palo Alto GUI which is in one tab of my browser.
(The major advantages are marked with an –> arrow.)
Summary
In summary, I really love the management GUI from the Palo Alto. Not hard due to the list of more than 20 advantages over the Cisco ASA platform. Though it is slower than the ASDM GUI from Cisco, it offers much more useful capabilities for the daily work. Great!
Originally published on blog.webernetz.net.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Palo Alto Networks NG Firewalls
Check Point NGFW
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
SonicWall NSa
Fortinet FortiGate-VM
Untangle NG Firewall
Sophos XGS
Fortinet FortiOS
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?
Mostly Enterprise firms they're using both, would be Palo Alto using in core and gateway traffic.