We tend to use the solution as it's forced on us by corporate. Our company wants us to use it.
Senior MIS Manager at a tech company with 201-500 employees
Stable with great security and good scalability
Pros and Cons
- "The solution is excellent for enterprise-level networks."
- "If the implementation was easier, it would be a lot better for us."
What is our primary use case?
What is most valuable?
The solution is stable. We haven't had any issues in that sense.
The security of the hardware is excellent. Cisco is very serious in its approach to security.
We have a high level of trust in Cisco and its products.
The solution is excellent for enterprise-level networks.
What needs improvement?
The solution is difficult to use. There's more required than a typical firewall. It's different than, for example, Palo Alto and Fortinet, which we find are easier to set up.
If the implementation was easier, it would be a lot better for us.
It would be such a great product for us if it was easier to manage.
For how long have I used the solution?
I've been working with the solution for more than ten years. It's been a long time. It's been over a decade at this point.
Buyer's Guide
Cisco Secure Firewall
January 2025
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
825,661 professionals have used our research since 2012.
What do I think about the stability of the solution?
The solution is quite stable. We have no problems with bugs or glitches. It doesn't crash or freeze. It's good.
What do I think about the scalability of the solution?
We've found the solution to be scalable. A company shouldn't have any issues with expanding it if it needs to.
We have about 300 users on the solution currently. We do plan to continue to use Cisco in the future.
How are customer service and support?
We use third-party technical support that's offered and we're quite satisfied with the level of attention we receive.
Which solution did I use previously and why did I switch?
I have knowledge of Palo Alto and Fortinet.
While those two are easier to set up and control, nothing compares to Cisco in terms of security. They're very strong in that regard. We also find Cisco to be more stable.
However, we only use Cisco firewalls in our organization. We don't use anything else.
How was the initial setup?
The implementation is not so straightforward. It's rather complex and we have a lot of trouble with it.
The implementation took us about one month.
We plan to implement an updated version next month as well.
We need three to eight people to handle the setup.
What about the implementation team?
I did not handle the implementation by myself. Rather, it's done by another team including the original support from Singapore and with license support from headquarters in Japan.
However, our team does handle the implementation in-house, and we can handle the setup for clients as well.
What's my experience with pricing, setup cost, and licensing?
We do need to purchase licenses. Those come from headquarters in Japan. They handle the details in terms of pricing. I'm not sure of the overall costs.
What other advice do I have?
We're both a customer of Cisco and a reseller.
This month we plan to upgrade from our existing hardware.
Overall, we've been happy with the results we've gotten. I would rate the solution at a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Jr. Engineer at a computer software company with 5,001-10,000 employees
User-friendly, easy to install with updates available online, and good support
Pros and Cons
- "The interface is user-friendly."
- "The cost is very high. Most organizations cannot afford it."
What is our primary use case?
In our organization, we are using it as an internal firewall.
What is most valuable?
It is already improved because all of the computer updates are available online. So, you can update, and I think that the ASA 5585 is already updated.
All of the licensing features can be upgrades.
The interface is user-friendly.
What needs improvement?
The cost is very high. Most organizations cannot afford it.
For how long have I used the solution?
We have been using the latest version of this solution for the last five years.
What do I think about the stability of the solution?
It's a stable product.
What do I think about the scalability of the solution?
It's a scalable solution. We have more than 2000 users in our organization.
How are customer service and technical support?
Technical support is fine, we have no issues.
How was the initial setup?
The initial setup was very easy. Cisco documentation is online, so it was no problem at all.
It took approximately 30 minutes to install.
What's my experience with pricing, setup cost, and licensing?
If we compare it with FortiGate and the co-existing ASA, FortiGate is better in terms of price.
What other advice do I have?
This is a product that I can recommend to others.
I would rate this solution a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Cisco Secure Firewall
January 2025
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
825,661 professionals have used our research since 2012.
Group Information Technology Manager at a mining and metals company with 201-500 employees
Provides great VPN and firewall features; very stable
Pros and Cons
- "VPN and firewall are good features."
- "Lacks a good graphical user interface."
What is our primary use case?
I'm the group information technology manager and we are customers of Cisco.
What is most valuable?
The best feature for me is the VPN and I also like the firewall.
What needs improvement?
In terms of improvement, we'd like to see a good graphical user interface. I'd also like to see the initial setup simplified. In comparison, if I were to implement the Fortigate firewall from scratch, it's a fairly simple set up. That is not the case with the ASA firewall, where you really need to have the skill and know what you're doing.
For how long have I used the solution?
I've been using this solution for 18 years.
What do I think about the stability of the solution?
The solution is stable, we haven't had any issues. If we need something, we go to a consultant. In terms of product stability, it works very well.
What do I think about the scalability of the solution?
We haven't made any changes since implementing and we haven't tried scaling.
How are customer service and technical support?
We get our support from the resellers, not from Cisco.
What other advice do I have?
For those who have the technical know-how with Cisco products, I would recommend going with the ASA firewall, but if you're new to the field and running a smaller business, deployment will be complicated.
I would rate this solution a nine out of 10.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Network Engineer at Johnson & Wales University
Very buggy, and was released before it was ready for market
Pros and Cons
- "The firepower sensors have been great; they do a good job of dropping unwanted traffic."
- "The software was very buggy, to the point it had to be removed."
What is our primary use case?
We had legacy Sourcefire Sensors and ASA state full firewalls.
Cisco offered the FTD NGFW solution, but the implementation of the two systems was not successful.
How has it helped my organization?
The firepower sensors have been great; they do a good job of dropping unwanted traffic.
What is most valuable?
The VDB updates run on schedule, so less hands-on configuration is needed.
What needs improvement?
The software was very buggy, to the point it had to be removed.
We are moving completely away from Cisco NGFW. The product was pushed out before it was ready.
For how long have I used the solution?
We have been using this solution for twelve years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Manager with 51-200 employees
Once configured to suit your needs, these firewalls are rock solid appliances
Pros and Cons
- "Once configured to suit your needs, these firewalls are rock solid appliances."
- "These firewalls are not for beginners."
These firewalls are used in enterprise level environments, which require granular control and customization to meet security and compliance guidelines for an organization. Once configured to suit your needs, they are rock solid appliances.
These firewalls are not for beginners.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Presales Consultant at a tech services company with 51-200 employees
One of the most valuable features is the correlation of events -- including the path that a file is taking in the network and its integration with the endpoint protection.
What is most valuable?
Classic ASA features such as NAT, Stateful Firewall, and VPN are basic functions for average organizations, but next generation features such as the granular control of port hopping applications, IPs, and malware protection are mandatory, considering current advanced security threats.
One of the most valuable features is the correlation of events, including the path that a file takes in the network and its integration with the endpoint protection. This gives you the chance to take some actions in the case a breach happens.
How has it helped my organization?
Visibility in the network traffic.
What needs improvement?
Management console – Firesight Management Center.
When deploying Cisco FMC versions 6.0 and 6.1, some issues may appear when trying to register ASA sensors. The problem needs Cisco TAC involvement, adding more effort and time. I guess this will be fixed in version 6.2.
For how long have I used the solution?
I've used this solution for three to five years.
What do I think about the stability of the solution?
Some releases of the unified image (FTD – Firepower Threat Defense – Cisco ASA + Sourcefire IPS) are not very stable, but things are getting improved.
What do I think about the scalability of the solution?
Some clustering functions are not available in the unified image.
How are customer service and technical support?
Excellent.
Which solution did I use previously and why did I switch?
Old ASA 5500. Natural upgrade to next generation functions.
How was the initial setup?
Initial setup is pretty straightforward.
What's my experience with pricing, setup cost, and licensing?
The licensing model has been simplified and is easy to understand. The price is higher compared to UTM solutions, such as Fortinet, but in the same range as Checkpoint and Palo Alto.
Which other solutions did I evaluate?
We also work with Palo Alto Networks, Fortinet, FireEye, and some other vendors.
What other advice do I have?
Take a look at the features included in the unified image. Some classic ASA functionality has not been integrated yet, go for non-unified image if the deployment requires something that is not available – classic ASA iOS plus Sourcefire code.
Disclosure: My company has a business relationship with this vendor other than being a customer:
IT Operation Manager
Provides software updates for known bugs and vulnerabilities.
What is most valuable?
- Hardware reliability
- Software stability
- Quick software updates for known bugs/vulnerabilities
These are very important in an enterprise environment.
How has it helped my organization?
It is small. Nobody knows where it is or what it is. It works silently. As there ar no issues, it is good for businesses and organizations.
What needs improvement?
- License politics
- License price
- Precise vendor roadmap for this product
For how long have I used the solution?
I have used Cisco ASA for five years.
What do I think about the stability of the solution?
We have not had stability issues.
How are customer service and technical support?
I would give them a high rating.
Which solution did I use previously and why did I switch?
We were using TippingPoint as an IPS and ZyXEL ZyWALL as a VPN server.
Cisco has good documentation and it is easy for Cisco certified engineers.
How was the initial setup?
The initial setup was straightforward.
What's my experience with pricing, setup cost, and licensing?
Our experience last year showed us that there is no full security, so why should we pay more? Any security vendor with a user-friendly interface, with good support, on-time updates for known vulnerabilities, and reliable hardware, is acceptable for an organization.
Which other solutions did I evaluate?
We did not evaluate any alternatives.
What other advice do I have?
The Cisco ASA product line will be replaced by Cisco FTD. Cisco FTD software is not ready for production, due to a lack of many basic NGFW features. Maybe only the high-performance Firepower 41xx/21xx/90xx Series is good as an IPS, because it is using a stable Sourcefire engine.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Network Engineer at a tech services company with 1,001-5,000 employees
The new NAT configuration is difficult to understand. The ASDM has significantly improved over the years.
Valuable Features
The ASDM has significantly improved over the years. Real-time logging and filtering is useful. Firewall rules are easy to understand, and enable/disable.
Room for Improvement
Change from Java for ASDM to HTML5. Better options to enable/disable site-to-site VPN tunnels.
Use of Solution
8 years
Deployment Issues
The new NAT configuration is difficult to understand especially for people familiar with the pre v8.3 code.
Customer Service and Technical Support
Customer Service:
Cisco TAC is good. They will set up a remote viewing session so they can work on the firewall as if they are sitting next to you.
Technical Support:Typically fast and useful.
Implementation Team
In-house team.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Palo Alto Networks NG Firewalls
Azure Firewall
Check Point NGFW
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Untangle NG Firewall
Fortinet FortiGate-VM
SonicWall NSa
Sophos XGS
Fortinet FortiOS
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?