Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Presales Consultant at a tech services company with 51-200 employees
Consultant
One of the most valuable features is the correlation of events -- including the path that a file is taking in the network and its integration with the endpoint protection.

What is most valuable?

Classic ASA features such as NAT, Stateful Firewall, and VPN are basic functions for average organizations, but next generation features such as the granular control of port hopping applications, IPs, and malware protection are mandatory, considering current advanced security threats.

One of the most valuable features is the correlation of events, including the path that a file takes in the network and its integration with the endpoint protection. This gives you the chance to take some actions in the case a breach happens.

How has it helped my organization?

Visibility in the network traffic.

What needs improvement?

Management console – Firesight Management Center.

When deploying Cisco FMC versions 6.0 and 6.1, some issues may appear when trying to register ASA sensors. The problem needs Cisco TAC involvement, adding more effort and time. I guess this will be fixed in version 6.2.

For how long have I used the solution?

I've used this solution for three to five years.

Buyer's Guide
Cisco Secure Firewall
September 2025
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,497 professionals have used our research since 2012.

What do I think about the stability of the solution?

Some releases of the unified image (FTD – Firepower Threat Defense – Cisco ASA + Sourcefire IPS) are not very stable, but things are getting improved.

What do I think about the scalability of the solution?

Some clustering functions are not available in the unified image.

How are customer service and support?

Excellent.

Which solution did I use previously and why did I switch?

Old ASA 5500. Natural upgrade to next generation functions.

How was the initial setup?

Initial setup is pretty straightforward.

What's my experience with pricing, setup cost, and licensing?

The licensing model has been simplified and is easy to understand. The price is higher compared to UTM solutions, such as Fortinet, but in the same range as Checkpoint and Palo Alto.

Which other solutions did I evaluate?

We also work with Palo Alto Networks, Fortinet, FireEye, and some other vendors.

What other advice do I have?

Take a look at the features included in the unified image. Some classic ASA functionality has not been integrated yet, go for non-unified image if the deployment requires something that is not available – classic ASA iOS plus Sourcefire code.

Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Sergei Chernooki - PeerSpot reviewer
IT SecOps Manager at a computer software company with 1,001-5,000 employees
Vendor
The best features are NAT, transport-layer inspections, and VPN

What is most valuable?

Cisco ASAs are great network firewalls and they can work for years after being configured. The best features are NAT, transport-layer inspections, and VPN.

How has it helped my organization?

With ASAs, we can keep operational expenses as low as possible. Disaster risks should be observed as usual, but this is definitely not the weak point.

What needs improvement?

I would like to see new SW versions being more stable and HW performance increase. However, the new 2000 series has high performance, but it is not shipped widely so far.

For how long have I used the solution?

I started using Cisco firewalls when old PIX models were produced. I then observed all model changes. This makes about 10 years of continuous experience.

What do I think about the stability of the solution?

There are no real stability issues, if upgrades are done carefully.

What do I think about the scalability of the solution?

I believe scalability issues are caused by poor design.

How are customer service and technical support?

Cisco technical support makes a good impression most of the time.

Which solution did I use previously and why did I switch?

Some of my customers switched from ZyXel to Cisco and this is an obvious decision for me. It will be much harder to imagine a customer replacing Check Point or Fortinet with Cisco.

How was the initial setup?

The initial setup should not be left to the customer. The best way to do this is to make a basic setup and integration along with cabling and power-up, then verifying requirements and adjusting the configuration.

What's my experience with pricing, setup cost, and licensing?

Basic features and IPs can work without subscriptions. All next-generation features require per-year payments. Enterprise customers usually agree with price and license fees, so I don't see any painful issues with pricing and licensing.

Which other solutions did I evaluate?

I compared Cisco with Fortinet, Checkpoint, and DIY solutions.

What other advice do I have?

All you need to succeed is careful design, professional setup, and a support contract.

Disclosure: My company has a business relationship with this vendor other than being a customer. We have been Cisco channel partners for over 15 years.
PeerSpot user
Buyer's Guide
Cisco Secure Firewall
September 2025
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,497 professionals have used our research since 2012.
PeerSpot user
Technical Specialist with 5,001-10,000 employees
Real User
The throughput and reliability of the product improve the network stability of our organization.

What is most valuable?

VPN (site to site VPN and remote access ), NAT policies, modular policy framework, detailed troubleshooting methods.

How has it helped my organization?

The throughput and reliability of the product improve the network stability of our organization.

What needs improvement?

Area : URL filtering and content filtering.

When Cisco ASA is presented as an enterprise firewall, that should be capable doing IPS/IDS, firewalling, VPN concentrator, application filtering, URL filtering and content filtering.

Of course, the last three technologies can do by a proxy. But nowadays, all next generation firewalls like Fortinet, Check Point, and Palo Alto are each bundling the UTM features into a single box with multiple separate content processors (hardware) to do these jobs.

This would enable single pane glass for management. No need to look at different devices for change management and troubleshooting.

I would say Cisco ASA is the best except for its URL and content filtering module. And these modules in ASA are not straightforward, rather complex in managing the device.

What was my experience with deployment of the solution?

I've been using this solution since 2007.

What do I think about the stability of the solution?

No.

What do I think about the scalability of the solution?

All product-based firewalls will encounter scalability issues. The firewall sizing is important during the sizing.

How are customer service and technical support?

Good.

Which solution did I use previously and why did I switch?

I used to work with most of the hardware firewalls, Cisco ASA is reliable and few technologies are good enough to compete for the market (VPN, Modular policy framework, NAT, etc.).

How was the initial setup?

Straightforward -- console or via the interface.

What's my experience with pricing, setup cost, and licensing?

Expensive when compared to other products.

Which other solutions did I evaluate?

Yes, all.

What other advice do I have?

If you are looking into implementing VPN or advanced features, I recommend using this product. URL or content filtering is not good as much as the NGFWs are.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Computer Networking Consultant and Contractor with 51-200 employees
Consultant
Initial setup was very straightforward because the training and certification provided by the vendor helped us to solve rapidly any configuration issues.​
Pros and Cons
  • "Stability, high availability of services, and very high MTBU were the most valuable features for me."
  • "The ability to integrate (as options) all-in-one features -- like anti-spam, anti-virus, etc."

How has it helped my organization?

I have 15 years’ experience with Cisco products and I've had very, very little problems with them. Also, for resolving appeared issues Cisco was a good partner.

Crescendo (www.crescendo.ro) is an IT&C integrator and this product (based on Cisco Partnership) helped us to grow our business, and Cisco ASA was one of most sold product in our solutions portfolio.

What is most valuable?

Stability, high availability of services, and very high MTBU were the most valuable features for me -- because in my work as network and security consultant, it is very important to guarantee to my customer the security of his business.

What needs improvement?

The ability to integrate (as options) all-in-one features -- like anti-spam, anti-virus, etc.

What do I think about the stability of the solution?

With Cisco ASA firewall, no.

What do I think about the scalability of the solution?

No. Based on their recent acquisition of Firepower, Cisco added "multi 10Gbps" NGFW performance in their solutions portfolio, which can be used by us, as a Gold Partner with Advance Security Architecture Specialization, in our network architecture proposals.

How are customer service and technical support?

Very satisfied.

Which solution did I use previously and why did I switch?

I haven' t used another solution.

How was the initial setup?

Initial setup was very straightforward because the training and certification provided by the vendor helped us to solve rapidly any configuration issues.

What's my experience with pricing, setup cost, and licensing?

To discuss with Cisco Systems or their partners to gain the optimal price and to not consider, without verifying, the false information that Cisco ASA is very expensive.

Which other solutions did I evaluate?

We evaluated other solutions, like Fortinet, HPE, Juniper, Check Point, but Cisco ASA was what we need.

What other advice do I have?

To test the product in their network and to evaluate other products. I am sure that the Cisco ASA Firewall will be the winner.

Our complete relationship is based on the following partner competencies:
Certifications:

• Gold Certified Partner
Specializations:
• Advanced Collaboration Architecture Specialization
• Advanced Data Center Architecture Specialization
• Advanced Enterprise Networks Architecture Specialization
• Advanced Security Architecture Specialization


Cloud Partners:
• Storage: EMC
• Virtualization: VMware
• Cloud Management: VMware
• Cloud Professional Services
• SaaS Simple Resale


Other Authorizations:
• Registered Partner
• Cisco Certified Refurbished Equipment
• Cisco Developer Network Cisco Products Marketplace
• Cisco Meeting Server formerly Acano
• PSPP Defense
• Smart Care Registered Partner
• ATP - Unified Contact Center Enterprise

Partner since:

• More than 10 years

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
NetworkE721d - PeerSpot reviewer
Network Engineer with 201-500 employees
Real User
Before anything, you need to know your infrastructure really well
Pros and Cons
  • "IPSec Tunnel and AnyConnect (of course), the context awareness was a good feature, but clumsy at the beginning. I think it's better now."
  • "ASDM can be improved."

How has it helped my organization?

The context aware module gave us good visibility and control over the ingress and egress communications. Allowing us to filter unnecessary communications like streaming video, allowing us to control bandwidth utilization.

What is most valuable?

IPSec Tunnel and AnyConnect (of course), the context awareness was a good feature, but clumsy at the beginning. I think it's better now.

The packet tracer command is a great tool for troubleshooting IPSec Tunnel, which I miss in the Palo Alto and other firewalls.

Also, the IP access list counter is a good feature while troubleshooting.

What needs improvement?

ASDM can be improved.

Also, a rollback option to a previous config in time will be a great option. Logging can be improved to a vast extent, I think Palo Alto has a pretty good logging structure.

What do I think about the stability of the solution?

Yep, more than once, but only on one box out of the three we purchased. Suppose we got a lemon, because once replaced, everything was fine.

What do I think about the scalability of the solution?

We never had an infrastructure that required scalability.

How is customer service and technical support?

An eight out of 10. TAC was very good but some engineers were quite slow and I ended up figuring out the issue myself.

But overall, I like Cisco TAC a 1000 times more than Juniper TAC. Arista is the best TAC so far in my experience, they have the best talent pool.

How was the initial setup?

Quite straightforward for the most part, since I had TAC on call while setting it up.

What's my experience with pricing, setup cost, and licensing?

Everything with Cisco is expensive. My advice is that there are a lot better options out in the market now.

Palo Alto is pretty decent for example, but support is the best with Cisco, hands down. All other TACs do not come close, except Arista, but they do not make firewalls.

Which other solutions did I evaluate?

None. My old company was a complete Cisco shop.

What other advice do I have?

Do look at Palo Alto for comparison, SonicWall is also on the market. But before anything, you need to know your infrastructure really well.

For example, we brought a PAN firewall for east-west traffic control so we could implement a zero trust network. But our business traffic is a bidding traffic which has extremely small packet size and huge connection size per seconds happening, which sent the PAN firewall into a tailspin. Since we bought the device without a POC, we had to eat the cost. So make sure to do a PoC with all the vendor equipment before you purchase it.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user700158 - PeerSpot reviewer
Senior Network Security Engineer at a university
Vendor
Spec the right hardware model and choose the right license for your needs.
Pros and Cons
  • "The AnyConnect remote access VPN gives us an easy way to deploy remote working for our users."
  • "The SSL VPN is, and always has been, painful to configure and the Java plugin does not guarantee a uniform deployment."

How has it helped my organization?

The AnyConnect remote access VPN gives us an easy way to deploy remote working for our users.

What is most valuable?

It all depends on the deployment scenario, as I have used ASA for specific purposes. In general, the stateful firewall feature, site to site VPN, and AnyConnect remote access VPN are always useful.

What needs improvement?

It's not perfect, and does have room for improvement with certain features.

The SSL VPN is, and always has been, painful to configure and the Java plugin does not guarantee a uniform deployment.

Certain documentation on the newer models of ASA (specifically, ASA 5500-X with FirePower services) is a little out of date and in some cases incorrect, although this may have been corrected since my last deployment.

What do I think about the stability of the solution?

I've never seen a firewall that didn't need an RMA at some point! And that is true of the ASA, however, the failure rate (in my experience) has always been very low with ASA's (and Cisco equipment in general).

What do I think about the scalability of the solution?

Nope.

How are customer service and technical support?

With Cisco TAC, you can always get an answer to technical issues, and with the thriving Cisco support forum, you can always get answers to questions even if you don't have TAC.

Which solution did I use previously and why did I switch?

Not in my current organization.

How was the initial setup?

I would say it's only complex if you're not familiar with either the CLI or ASDM.

So for me, it was easy, for those without Cisco CLI (or ASDM) experience, deployment can be a little daunting.

That being said, there are plenty of configuration documents available on the Cisco website that will "hold your hand" through any deployment.

What's my experience with pricing, setup cost, and licensing?

Hardware and licensing can be expensive, and licensing can be a complicated affair. I would strongly recommend you speak with your distributor to ensure you choose the right license for your needs, and read the hardware comparison guide to make sure you spec the correct hardware for your specific needs.

Which other solutions did I evaluate?

It's great buying the latest and greatest equipment, but no so great if your engineers don't know how to operate it!

From experience, hardware purchasing is normally dependent on the technical expertise of engineers, so if all your engineers are Cisco trained, it makes no sense to buy another vendor firewall.

What other advice do I have?

Spec the right hardware model and choose the right license for your needs.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Senior IT Networking and Security Manager at a tech services company with 10,001+ employees
Real User
It is supported on many platforms and helps us gain access to the network.

What is most valuable?

There are a lot of features which are good and can be implemented, especially in the latest IOS version of the product.

They saved me a lot of time thinking how to solve different scenarios with other solutions.

Cisco AnyConnect for remote access is one of them. It is supported on most of the platforms, which business users use. They can gain access to the network, via functions like PBR, Security groups, contexts, and DNS doctoring. This gives a lot of flexibility to the product.

How has it helped my organization?

It gave us a more secure environment and a lot of flexibility to the business.

What needs improvement?

The next generations part of these products need a better approach. A lot of vendors are definitely a step or two in front of them.

For how long have I used the solution?

I have worked with these types of firewalls for more than 10 years.

What do I think about the stability of the solution?

I can say that this product is one of the most stable products I have ever worked with.

What do I think about the scalability of the solution?

In terms of scalability, this always depends on how the product was chosen and what purpose it will work for. I haven't experienced any issues with the scalability of the product.

How are customer service and technical support?

In terms of technical support, it depends on the different cases. I would surely give Cisco technical support a rating of 9/10.

Which solution did I use previously and why did I switch?

I used to work with open source solutions, but the support and complication behind them was definitely not OK. If you want to have flexibility and stability, you have to move on to something that receives more development in that specific area.

How was the initial setup?

The initial setup was straightforward and there was a lot of documentation that can help out with specific cases.

What's my experience with pricing, setup cost, and licensing?

This is definitely not a cheap solution, but I think it is worth the investment.

Which other solutions did I evaluate?

We evaluated other solutions like Juniper, but we chose Cisco, since our network was becoming more and more Cisco oriented.

What other advice do I have?

I would recommend that you understand the needs of the business case before choosing the product and start implementing it. It is very important to choose the right licenses from the beginning.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Network Engineer at a tech vendor with 10,001+ employees
Vendor
Some of the valuable features are detecting malware and blocking blacklisted URLs.

What is most valuable?

Some of the valuable features are detecting malware and blocking blacklisted URLs.

How has it helped my organization?

It has enhanced the security in every network over time.

What needs improvement?

As of now, I can't find any flaws with the device or any improvement that I can suggest.

For how long have I used the solution?

I have been working with the device for the past two years.

What was my experience with deployment of the solution?

The upgrade is a bit of a pain in the neck.

What do I think about the stability of the solution?

There were no issues with the stability

What do I think about the scalability of the solution?

Scalability has been all-star perfect.

How are customer service and technical support?

Customer Service:

I would give customer service a rating of 10/10.

Technical Support:

I would give technical support a rating of 10/10.

Which solution did I use previously and why did I switch?

We have only used Cisco security devices.

How was the initial setup?

The setup was smooth and simple.

What about the implementation team?

We implemented it by ourselves and with some support from the Cisco TAC.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.
Updated: September 2025
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.