I worked for a Telecom provider, and we gave this solution to our customers.
Security Solution Architect at a financial services firm with 5,001-10,000 employees
Good documentation for the configuration
Pros and Cons
- "The most important feature is its categorization because on the site and social media you are unified in the way they are there."
- "I see room for improvement when it comes to integrating all the devices into a central management system. Cisco doesn't provide this, but there are some good products in the market that can provide it."
What is our primary use case?
What is most valuable?
The most important feature is its categorization because on the site and social media you are unified in the way they are there.
What needs improvement?
I see room for improvement when it comes to integrating all the devices into a central management system. Cisco doesn't provide this, but there are some good products in the market that can provide it.
Apart from the cost, I think Cisco is quite well-positioned in the market. Also, in terms of site capabilities, other companies are still in the lead.
The price, integration, and licensing models are quite odd.
For how long have I used the solution?
I have been using Sourcefire for two or three years.
Buyer's Guide
Cisco Secure Firewall
March 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,422 professionals have used our research since 2012.
What do I think about the stability of the solution?
We didn't have any problem with its stability.
What do I think about the scalability of the solution?
Scalability depends on the requirements of the license. The licensing scheme is complicated and not straightforward. I think there were around 200 users, sometimes more.
Which solution did I use previously and why did I switch?
We used to use Fortinet, but we switched because of the lack of integration.
How was the initial setup?
The initial setup was of a medium complexity. This was especially true when it came to integration of the data servers.
What about the implementation team?
We used a consultant. They were very helpful. The documentation was quite easy to find for configuring the devices. We thought the boxes would be more parceled or more completely behind, but it was not a problem. The data was there.
What other advice do I have?
I would recommend this solution. I would rate this solution as eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Works at IDF technology
Valuable features include AnyConnect, double translations, and an independent IPS module
Pros and Cons
- "Valuable features include AnyConnect, double translations, and an independent IPS module."
- "The licensing needs simplification."
- "The IPS module is combined with the main operating system."
What is our primary use case?
This solution is involved in the protection of the network perimeter and the VPN gateway.
How has it helped my organization?
It allows you to fine-tune and create flexible circuits, as well as unites a large number of different types of connections.
What is most valuable?
- AnyConnect
- Double translations
- Independent IPS module
- High performance
- Various methods of organizing a VPN
What needs improvement?
- Simplify licensing
- Do not combine the IPS module with the main operating system.
- In new products, leave the CLI.
For how long have I used the solution?
More than five years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Cisco Secure Firewall
March 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,422 professionals have used our research since 2012.
Senior Vice President at a transportation company with 51-200 employees
Enables securing of various network segments based on use, but there are integration issues
Pros and Cons
- "Valuable features include DMZ segmentation, and IDS and IPS."
- "Cisco suffers from some integration issues with other products... There is a problem with the Cisco Catalyst Switches in terms of assembling bursts and having them interact properly with the Cisco Firepower."
What is our primary use case?
We use it as a firewall and it has performed adequately.
How has it helped my organization?
It allows the securing of various network segments, based on use.
What is most valuable?
DMZ segmentation, and IDS and IPS.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
It is fairly stable. However, Cisco suffers from some integration issues with other products, but this product, as a standalone, is fine. There is a problem with the Cisco Catalyst Switches in terms of assembling bursts and having them interact properly with the Cisco Firepower.
What do I think about the scalability of the solution?
The scalability is good.
How are customer service and technical support?
Tech support has been good.
Which solution did I use previously and why did I switch?
We've been using Cisco. Prior to this it was Cisco ASA. This was the next evolution.
When selecting a vendor it is important that they have positive industry feedback, that they are a visionary leader.
How was the initial setup?
I was involved in the initial set up and it was complex.
What other advice do I have?
I give this solution a seven out of 10. Some of the tools are still a little bit difficult to use.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Engineer at a tech services company with 201-500 employees
Syslog generation and forwarding are good but it lacks many UTM features
Pros and Cons
- "One thing I like about the product is the logging features, the way it logs, the way it forwards the logs in Syslog."
- "It doesn't have a proper GUI to do troubleshooting, so most people have to rely on the command line."
- "It should have packets, deep level inspections and controls, like the features which other IPS solutions used to have."
- "Other firewalls, upgrading is a very easy task; from the graphical user interface, you just need to import the firmware versions into it and install it. In this firewall, you need to have a third-party solution in both. It's a process. It's a procedure, a hard procedure, actually, so there is no straightforward procedure for upgrading."
What is most valuable?
If you compare it with other products, other firewall products in the market, at this moment, it doesn't have that many features, no impressive feature in it, in fact.
The one thing I like about the product is the logging features, the way it logs, the way it forwards the logs in Syslog. It generates the particular Syslog. Compared to other products, that is the only feature, I feel, that is good. I have worked with other firewall products, so I know it very well. The logs are pretty good. Then it forwards. When it forwards the logs to a third-party syslog server, it then writes the Syslog very well. That is the only feature I like about it.
What needs improvement?
It doesn't have a proper GUI to do troubleshooting, so most people have to rely on the command line.
Its a sort of legacy product nowadays. The firewalls which are the next generation have loads of features added to them, and they are all in one box.
It should have packets, deep level inspections and controls, like the features which other IPS solutions have. It just doesn't have any. It's just a box which does firewalling.
Threat management features also should be added into it.
So, the first thing is that the GUI has to be improved. The second thing is that the UTM features have to be added to it in a much broader way; not by relating to other third-party solutions which is how it is done right now. It should have built-in UTM features like other firewalls have now. Plus it should have the ability to analyze any packets which have malicious behaviors. Currently it doesn't have anything like that. It's just a layer-3 firewall.
Regarding the GUI, it's a very childish sort of attempt. It hasn't been improved since I started working with it. Yes, it shows the logs as they are but it doesn't have any option to do proper reporting.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
Stability is really good, actually.
What do I think about the scalability of the solution?
Scalability is not that good, I think. Other firewalls, upgrading is a very easy task; from the graphical user interface, you just need to import the firmware versions into it and install it. In this firewall, you need to have a third-party solution in both. It's a process. It's a procedure, a hard procedure, actually, so there is no straightforward procedure for upgrading.
How are customer service and technical support?
I have never called the tech support, apart from a hardware issue, but that is done through the vendor, a third-party support team.
Which solution did I use previously and why did I switch?
I was actually using ASA and I switched to another one.
How was the initial setup?
I actually have lots of experience working on multiple firewalls and technical solutions, so for me I don't have any problem doing things by the command line. But for others, for a person who has two years of experience or one year of experience in general, they will definitely face issues working in the command line. You have to remember all of the commands, to search for the commands. If you're in a graphical user interface, you can go search somewhere and find some options. So I would say in that way it is complex.
What other advice do I have?
If I were to advise others who are looking into implementing this product I would say I don't think they will like it. They would be able to meet business requirements better with other products, other vendors' firewalls. That's what I think, that's what I know from my own experience, from dealing with customers.
If those features, which I mentioned above in the first few questions, if they can add those features into the firewall as a standalone box, it can definitely become a player on the stage. They already have a good platform, even if it's a legacy product, it has that bit of maturity. So if, on top of that very good platform, they can add those features - security, threat intelligence features - they can get back into the market.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Presales Consultant at a tech services company with 51-200 employees
One of the most valuable features is the correlation of events -- including the path that a file is taking in the network and its integration with the endpoint protection.
What is most valuable?
Classic ASA features such as NAT, Stateful Firewall, and VPN are basic functions for average organizations, but next generation features such as the granular control of port hopping applications, IPs, and malware protection are mandatory, considering current advanced security threats.
One of the most valuable features is the correlation of events, including the path that a file takes in the network and its integration with the endpoint protection. This gives you the chance to take some actions in the case a breach happens.
How has it helped my organization?
Visibility in the network traffic.
What needs improvement?
Management console – Firesight Management Center.
When deploying Cisco FMC versions 6.0 and 6.1, some issues may appear when trying to register ASA sensors. The problem needs Cisco TAC involvement, adding more effort and time. I guess this will be fixed in version 6.2.
For how long have I used the solution?
I've used this solution for three to five years.
What do I think about the stability of the solution?
Some releases of the unified image (FTD – Firepower Threat Defense – Cisco ASA + Sourcefire IPS) are not very stable, but things are getting improved.
What do I think about the scalability of the solution?
Some clustering functions are not available in the unified image.
How are customer service and technical support?
Excellent.
Which solution did I use previously and why did I switch?
Old ASA 5500. Natural upgrade to next generation functions.
How was the initial setup?
Initial setup is pretty straightforward.
What's my experience with pricing, setup cost, and licensing?
The licensing model has been simplified and is easy to understand. The price is higher compared to UTM solutions, such as Fortinet, but in the same range as Checkpoint and Palo Alto.
Which other solutions did I evaluate?
We also work with Palo Alto Networks, Fortinet, FireEye, and some other vendors.
What other advice do I have?
Take a look at the features included in the unified image. Some classic ASA functionality has not been integrated yet, go for non-unified image if the deployment requires something that is not available – classic ASA iOS plus Sourcefire code.
Disclosure: My company has a business relationship with this vendor other than being a customer:
IT SecOps Manager at a computer software company with 1,001-5,000 employees
The best features are NAT, transport-layer inspections, and VPN
What is most valuable?
Cisco ASAs are great network firewalls and they can work for years after being configured. The best features are NAT, transport-layer inspections, and VPN.
How has it helped my organization?
With ASAs, we can keep operational expenses as low as possible. Disaster risks should be observed as usual, but this is definitely not the weak point.
What needs improvement?
I would like to see new SW versions being more stable and HW performance increase. However, the new 2000 series has high performance, but it is not shipped widely so far.
For how long have I used the solution?
I started using Cisco firewalls when old PIX models were produced. I then observed all model changes. This makes about 10 years of continuous experience.
What do I think about the stability of the solution?
There are no real stability issues, if upgrades are done carefully.
What do I think about the scalability of the solution?
I believe scalability issues are caused by poor design.
How are customer service and technical support?
Cisco technical support makes a good impression most of the time.
Which solution did I use previously and why did I switch?
Some of my customers switched from ZyXel to Cisco and this is an obvious decision for me. It will be much harder to imagine a customer replacing Check Point or Fortinet with Cisco.
How was the initial setup?
The initial setup should not be left to the customer. The best way to do this is to make a basic setup and integration along with cabling and power-up, then verifying requirements and adjusting the configuration.
What's my experience with pricing, setup cost, and licensing?
Basic features and IPs can work without subscriptions. All next-generation features require per-year payments. Enterprise customers usually agree with price and license fees, so I don't see any painful issues with pricing and licensing.
Which other solutions did I evaluate?
I compared Cisco with Fortinet, Checkpoint, and DIY solutions.
What other advice do I have?
All you need to succeed is careful design, professional setup, and a support contract.
Disclosure: My company has a business relationship with this vendor other than being a customer: We have been Cisco channel partners for over 15 years.
Network Engineer at a tech vendor with 10,001+ employees
Some of the valuable features are detecting malware and blocking blacklisted URLs.
What is most valuable?
Some of the valuable features are detecting malware and blocking blacklisted URLs.
How has it helped my organization?
It has enhanced the security in every network over time.
What needs improvement?
As of now, I can't find any flaws with the device or any improvement that I can suggest.
For how long have I used the solution?
I have been working with the device for the past two years.
What was my experience with deployment of the solution?
The upgrade is a bit of a pain in the neck.
What do I think about the stability of the solution?
There were no issues with the stability
What do I think about the scalability of the solution?
Scalability has been all-star perfect.
How are customer service and technical support?
Customer Service:
I would give customer service a rating of 10/10.
Technical Support:I would give technical support a rating of 10/10.
Which solution did I use previously and why did I switch?
We have only used Cisco security devices.
How was the initial setup?
The setup was smooth and simple.
What about the implementation team?
We implemented it by ourselves and with some support from the Cisco TAC.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Security Coordinator at a energy/utilities company with 1,001-5,000 employees
We decided to go with Cisco because stability and reliability were major concerns for us.
What is most valuable?
Outstanding NGFW capabilities, Site to site VPNs and High Availability. Also the integration of FirePOWER services (Web Filtering/IPS/Malware Protection) are a huge step forwards for an already great platform.
How has it helped my organization?
We purchased a pair of ASAs to handle all perimeter traffic in and out of our network. This devices enabled us to secure all our perimeter traffic, WAN connections, Internet connectivity and Internet facing services. FirePOWER services enabled better control and visibility over the traffic traversing our perimeter. High Avalability helped us greatly improve the availability of the services by reducing downtime caused by both Incidents and planned maintenance operations.
What needs improvement?
Only problem in my opinion is ease of use. You really need to know your way around the CLI and complex feature set to get things working. The ASDM GUI is good for some things but for the most part you'll need to stick to the CLI which is a bit difficult specially if you don't have a lot of experience around Cisco equipment.
For how long have I used the solution?
We've operated this firewalls for around 2 years now.
What was my experience with deployment of the solution?
ASAs are as complex as they are powerful. Configuration and administration are not as straightforward as other solutions and will take some time and studying to get used to them.
What do I think about the stability of the solution?
In my experience with various Firewall solutions, the stability and reliability of Cisco ASAs is unparalleled.
What do I think about the scalability of the solution?
No
How are customer service and technical support?
Customer Service:
Cisco offers great customer service.
Technical Support:The best I have worked with.
Which solution did I use previously and why did I switch?
We used to have a SonicWall and an older ASA 5510 platform. Both were replaced by a Cisco ASA cluster using a pair of 5525x.
What's my experience with pricing, setup cost, and licensing?
ASAs are expensive. The initial cost is high compared to other similar solutions, and chances are the personnel that will operate them will require some training. But if you're aiming for stability and reliability, this is the best solution you will find.
Which other solutions did I evaluate?
We evaluated Fortinet and SonicWall, both great UTM vendors. Although those platforms are cheaper, we decided to go with Cisco because stability and reliability were mayor concerns for us, also the support is much better in my experience.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Great to know, sounds like you've really had a great experience with ASA. How do you expect these enhancements to help your productivity and/or security in the long term?

Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Palo Alto Networks NG Firewalls
Check Point NGFW
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
SonicWall NSa
Fortinet FortiGate-VM
Untangle NG Firewall
Sophos XGS
Fortinet FortiOS
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?
Hi Gary,
No, I hadn't seen that security product as yet. Interesting model they are trying to get on board with --- everyone wants to sell you a perpetual subscription...