We primarily use the solution for basic firewall configurations such as NAT, FORWARD PORT and Block TCP-UDP Port.
We primarily use the solution for basic firewall configurations such as NAT, FORWARD PORT and Block TCP-UDP Port.
My company is very small just built last year, i now am using cisco asa 5510 for NAT and Port Forward and limit users access directly from internet only via Remote-VPN.
The ability to block threats is its most valuable aspect.
Most clients in Laos use the basic setup, which works quite well. It ensures that nothing can get onto the local network.
It's pretty reliable and allows for isolation capabilities within the network.
The ADSM is very good.
I like that I can use the command line. I use a lot of Cisco and often work with this. If you are comfortable with the command line, it's quite good.
The user interface isn't as good as it could be. They should work to improve it. It would make it easier for customer management if it was easier to use.
Cisco does not have a lot of web management. We have to use ASTM server management to make up for it.
I've been using the solution, give or take, for around five years at this point.
When we need assistance from technical support, we typically deal with the team in China. They've been very good. Whenever I have a problem, they can resolve it. They are knowledgeable and responsive. We're satisfied with the level of support we get.
We typically offer clients a few different solutions. For example, we may recommend Fortinet.
For a new user, the initial setup may be a bit difficult. For me, since I am comfortable with Cisco, it's pretty straightforward. A new connection has its own complexities. It may be a different thing on Java SDK. There may be some programs that may not be able to access it.
In Laos, clients don't have much wiggle room when it comes to cost. The economy right now isn't very good. Most just choose the basic solution in order to avoid pricey licensing fees.
subscription payment
We're just customers. We use it in our office and suggest it to clients. However, we don't have a business relationship with Cisco.
We try to adhere to our client's needs, and therefore, if they specify hardware they want to use, like Fortinet, we tend to accommodate them.
That said, if they ask my opinion, I usually recommend Cisco ASA.
I know a lot about the product and I'm good at controlling everything. I have a lot of knowledge and understanding after working with it so closely. That's why I tend to favor it when my customers ask for advice.
Overall, I would rate the solution seven out of ten. If the user interface were a bit better, I'd rate it higher.
It is primarily used as a firewall. I think that all firewalls basically work the same, but some have different configurations of the switches. Cisco ASA is very strong.
I think that there should be better security of other firewall appliances. Migration is another main issue. If you migrate from the ASA to the new Fire Power Threat Defense appliance, it is not an easy migration. You have to do some of the migration manually, and if you are relacing those firewalls it will take a long time. It should be a smoother migration process. Some of the new engineers are still not familiar with it, and I think that Cisco should rehire some of the engineers coming from Sourcefire to do so.
There is not much to say about the stability of the product. Migration is the painful aspect of the solution.
During the mitigation process, I used tech support. But, I still have not had a completely clean migration process.
I do not like to have too many vendors it becomes difficult to diagnose and deal with. If all the switches also ran the same, I would be OK. But, this does not usually happen. Often there are many configurations of switches and we end up switching on the switches.
Cisco has recently become very expensive. Other solutions on the market are cheaper than this solution.
We have also evaluated Fortinet and Sophos UTM as possible solutions.
These are very important in an enterprise environment.
It is small. Nobody knows where it is or what it is. It works silently. As there ar no issues, it is good for businesses and organizations.
I have used Cisco ASA for five years.
We have not had stability issues.
I would give them a high rating.
We were using TippingPoint as an IPS and ZyXEL ZyWALL as a VPN server.
Cisco has good documentation and it is easy for Cisco certified engineers.
The initial setup was straightforward.
Our experience last year showed us that there is no full security, so why should we pay more? Any security vendor with a user-friendly interface, with good support, on-time updates for known vulnerabilities, and reliable hardware, is acceptable for an organization.
We did not evaluate any alternatives.
The Cisco ASA product line will be replaced by Cisco FTD. Cisco FTD software is not ready for production, due to a lack of many basic NGFW features. Maybe only the high-performance Firepower 41xx/21xx/90xx Series is good as an IPS, because it is using a stable Sourcefire engine.
VPNs, reliability.
Connectivity with client Telcos works perfectly way and administration is simple.
I think it's the perfect Firewall for SME.
Five years.
No.
No.
10 out of 10.
Version 5515 is better than 5510 or 5505.
If you know how to use Cisco IOS, it's easy. Otherwise, you will find no way
of configuring it with ease.
Go for the complete bundle, it's a one time investment only. Otherwise, in the future you will have to buy other tools as licenses for some add-on services.
FortiGate 100D.
I would go for bundle licenses and hire a Cisco engineer for implementation.
Robustness
Reliability
No idea -- I learn a lot from them
From 2000 until 2014
Learning at the beginning
Nope -- If well planed you should be alright
Price maybe...
Excellent
Technical Support:Excellent
Not reliable for long term -- seem inferior quality
Depends on the product and the knowledge. Cisco firewalls can be difficult at first but once learned it's fine.
Me, I implemented the firewalls, Cisco switches and routers.
100% in some installations it exceeded the time predicted to keep up with the work load.
Netscreen, Netgear, Checkpoint, others..
Plan well the hardware requirements for future growth and heavy usage.
The ASDM has significantly improved over the years. Real-time logging and filtering is useful. Firewall rules are easy to understand, and enable/disable.
Change from Java for ASDM to HTML5. Better options to enable/disable site-to-site VPN tunnels.
8 years
The new NAT configuration is difficult to understand especially for people familiar with the pre v8.3 code.
Cisco TAC is good. They will set up a remote viewing session so they can work on the firewall as if they are sitting next to you.
Technical Support:Typically fast and useful.
In-house team.
We are an ISP, so it's primarily for customer firewalls that we help customers setup and maintain. While we do use Cisco ASA in our company, we mostly configure it for customers. Our customers use it as a company firewall and AnyConnect VPN solution.
A lot of people trust Cisco. Just by its name, they feel more secure. They know it's a quality solution, so they feel safer.
The most valuable feature must be AnyConnect. We have quite a few customers who use it. It is easy to use and the stablest thing that we have. We have experienced some issues on all our VPN clients, but AnyConnect has been the stablest one.
It is one of the easiest firewalls that I've worked with. Therefore, if you're not comfortable with command line, it probably is one of the best solutions on the market.
One of the problems that we have had is the solution requires Java to work. This has caused some problems with the application visibility and control. When the Java works, it is good, but Java wasn't a good choice. I don't like the Java implementation. It can be difficult to work with sometimes.
If you use Cisco ASDM with the command line configuration, it can look a bit messy. We have some people who use them both. If you use one, it's not a problem. If you use both, it can be an issue.
For five or six years.
We haven't had any issues with the firewalls.
The maturity of our company's security implementation is good. We are very satisfied as long as we maintain the software. It has needed to be updated quite a few times.
We don't have any firewalls that can handle more than a couple of gigabits, which is pretty small. I think the largest one we have is the 5525-X, though we haven't checked it for scalability.
In my company, there are probably 16 people (mostly network engineers) working with the solution: seven or eight from my group and the others from our IT department.
I haven't worked with Cisco's technical support. We haven't had real issues with these firewalls.
This was the first firewall solution that I worked with.
The initial setup has been pretty straightforward. We have set up a lot of them. The solution works.
The deployment takes about half an hour. It takes a little longer than if we were using their virtual firewalls, which we could implement in a minute.
We have a uniform implementation strategy for this solution. We made some basic configurations with a template which we just edited to fit a customer's needs.
We haven't notice any threats. The firewalls is doing its job because we haven't noticed any security issues.
The licensing is a bit off because the physical firewall is cheaper than the virtual one. We only have the physical ones as they are cheaper than the virtual ones. We only use the physical firewalls because of the price difference.
Our company has five or six tools that it uses for security. For firewalls, we have Check Point, Palo Alto, Juniper SRX, and CIsco ASA. Those are the primary ones. I think it's good there is some diversity.
The GUI for Cisco ASA is the easiest one to use, if you get it to work. Also, Cisco ASA is stable and easy to use, which are the most important things.
We use this solution with Cisco CPEs and background routers. These work well together.
We have some other VPN options and AnyConnect. We do have routers with firewalls integrated, using a lot of ISR 1100s. In the beginning, we had a few problems integrating them, but as the software got better, we have seen a lot of those problems disappear. The first software wasn't so good, but it is now.
We have disabled Firepower in all of our firewalls. We don't use Cisco Defense Orchestrator either. We have a pretty basic setup using Cisco ASDM or command line with integration to customers' AD.
I would rate the product as an eight (out of 10).
We had legacy Sourcefire Sensors and ASA state full firewalls.
Cisco offered the FTD NGFW solution, but the implementation of the two systems was not successful.
The firepower sensors have been great; they do a good job of dropping unwanted traffic.
The VDB updates run on schedule, so less hands-on configuration is needed.
The software was very buggy, to the point it had to be removed.
We are moving completely away from Cisco NGFW. The product was pushed out before it was ready.
Can you tell me, please, how does an ASA learn about the MAC address of the host? Thank you.