Infrastructure Expert at a tech company with 51-200 employees
The most powerful and expensive firewall
What is most valuable?
There are a lot of companies who create firewalls but there is not a single one which can compete with ASA.
It can have access control from layer 3 to layer 7.
The ASA 5510 is more than enough for small to medium business.
It has dedicated GUI interface which is known as ASDM, a beautiful tool to manage ASA.
You can use ASA to route traffic.
AAA service supports plenty of Authentication server types.
You can configure advanced NAT in this device.
It uses Modular Policy Framework (MPF) to inspect traffic.
You can inspect traffic at different layers separately.
You can use this as a transparent firewall & fail over is instant.
The virtualization works beautifully for this device.
VPN is another added advantage.All the types of VPNs are managed through ASA.
What needs improvement?
The 5505 does not support multiple mode.
While running this device on multiple mode you cannot use dynamic routing protocols or multicast routing.
Also the IPSEC and SSL VPNs are not supported while running in multiple mode.
sometimes analysis might take too long while performing DPI in real-time traffic.
The product is expensive. A 5580 series costs more than $50000.
What other advice do I have?
Its very difficult to write something about this product as it has so many options.
I have studied 1000 pages about this product and most of the organizations use this firewall as it is the best in the world. I have never seen such a powerful device which can handle 2 million connections at 20Gbps speed. It can
also inspect 4 million packets per second.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Solutions Architect at a tech services company with 51-200 employees
A multitude of valuable features but a little pricey
Pros and Cons
- "Signature-based detection; user-defined signatures with regular expressions; integrated URL and content filtering; custom URL categories filtering."
How has it helped my organization?
Secured our network from outside and inside intruders.
What is most valuable?
- Network attack detection
- DoS and DDoS attack prevention
- Signature-based detection
- User-defined signatures with regular expressions
- Integrated URL and content filtering
- Custom URL categories filtering
- Integarted antrivirus
- Protocols scanning
What needs improvement?
License capacity needs to be extended and the vendor needs to work on the pricing.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
No stability issues.
What do I think about the scalability of the solution?
No scalability issues.
How are customer service and technical support?
10 out of 10.
Which solution did I use previously and why did I switch?
No, Cisco was part of our solution from the start.
How was the initial setup?
Straightforward.
What's my experience with pricing, setup cost, and licensing?
Value for your money, but bit a costly.
What other advice do I have?
Good product, give it a chance.
Disclosure: My company has a business relationship with this vendor other than being a customer: Solution Partner.
Buyer's Guide
Cisco Secure Firewall
November 2024
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
817,354 professionals have used our research since 2012.
Security Consultant at a tech services company with 51-200 employees
Quite stable with good technical support, but the reporting should be improved
Pros and Cons
- "The most valuable feature is the access control list (ACL)."
- "Report generation is an area that should be improved."
What is our primary use case?
We are a service provider and we work on a variety of different projects for many customers. We do not use this product ourselves. Rather, we deploy it for different customers.
The primary use case is to protect the organization from unauthorized use.
What is most valuable?
The most valuable feature is the access control list (ACL).
What needs improvement?
Report generation is an area that should be improved.
For how long have I used the solution?
I have been working with this product for two years.
What do I think about the stability of the solution?
This firewall is quite stable and we use it on a daily basis.
What do I think about the scalability of the solution?
The scalability is good.
Which solution did I use previously and why did I switch?
I have not worked with equipment from OEMs other than Cisco. It's the only vendor I use.
How was the initial setup?
The initial setup is straightforward. The length of time for deployment depends on whether it is the entire setup or just the basic installation.
What about the implementation team?
I deployed this product myself.
What other advice do I have?
This is a product that I can recommend for an internal firewall. It's good enough.
I would rate this solution a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
Technical Administrator at a tech services company
Since deployment, we have not encountered the attacks we had before
Pros and Cons
- "Manageability of Cisco ASA. It has a GUI interface, unlike the most of Cisco IOS. For beginners they can "sneak in" and apply the command and see the actual commands that the GUI launches. In addition, Cisco has the reputation regarding security."
What is our primary use case?
We have been using this model for three years, to place a firewall between ISPs and our corporate network. As of now, we have configured some SSL VPNs on our end for our convenience.
How has it helped my organization?
Three years ago we encountered malicious attacks from the internet, most of which were Chinese attackers, so we deployed Cisco ASA to strengthen our network. Since the deployment, we haven't seen the risk we encountered before.
What is most valuable?
Manageability of Cisco ASA. It has a GUI interface, unlike the most of Cisco IOS. For beginners they can "sneak in" and apply the command and see the actual commands that the GUI launches. In addition, Cisco has the reputation regarding security.
What needs improvement?
There are more powerful firewalls, other than the Cisco NGFW, like Fortinet, Palo Alto and so on. I can't say Cisco is the leading firewall brand as of now, as the technology innovates.
What do I think about the stability of the solution?
No stability issues yet.
What do I think about the scalability of the solution?
No scalability issues yet.
How is customer service and technical support?
Awesome.
What other advice do I have?
I rate it an eight out of 10.
I am only handling or supporting the ASA 5520 model in our company.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Manager at a manufacturing company
Valuable features are Cisco IPSec VPn , VPN Client, Port Restrictions .
What is most valuable?
- Cisco IPSec VPn
- VPN Client
- Port Restrictions
How has it helped my organization?
We could connect data securely from outside the company.
What needs improvement?
I need application user-IP blocking, Intrusion Prevention, QoS; I can't do these with Cisco and have to change it.
For how long have I used the solution?
Five years.
What do I think about the stability of the solution?
No.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
I have never needed support from Cisco.
Which solution did I use previously and why did I switch?
I couldn’t meet all my needs with the Cisco 5505 so I changed it with a next-generation firewall.
How was the initial setup?
Actually it was simple, making port based policies more simple than PA.
What's my experience with pricing, setup cost, and licensing?
Cisco price-performance is very successful.
Which other solutions did I evaluate?
I evaluated Sophos UTM, Checkpoint, Cisco and PA. PA is the best fit for my company because Sophos acquired Cyberoam and their software wasn’t successful for domain user restrictions. Checkpoint was very slow for me and too many licences and it was complicated. Cisco acquired Sourcefire and they need to improve next-gen features. So I chose PA.
What other advice do I have?
I know that Cisco acquired Sourcefire and they re-introduced next-generation firewall features and I think they’ll improve NX features.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network System Engineer with 51-200 employees
The filter with NAT mode is valuable but the security options needs to be improved.
What is most valuable?
The filter with NAT mode is valuable.
How has it helped my organization?
Not really, as we are a subcontractor we install and configure it for other companies.
What needs improvement?
Speed of execution and security options needs to be improved.
For how long have I used the solution?
I've used the devices for, more or less, one year.
What was my experience with deployment of the solution?
No issues so far.
What do I think about the stability of the solution?
No issues so far.
What do I think about the scalability of the solution?
No issues so far.
How are customer service and technical support?
Customer Service:
3.5/5.
Technical Support:3/5.
Which solution did I use previously and why did I switch?
Yes we did, but we switched due to Ciscos ASA's ability to support big data stream in some networks.
How was the initial setup?
It's not too complex, but it depends on the customers' network architecture.
What about the implementation team?
As a vendor, we find IT experts with CCIE certifications.
Which other solutions did I evaluate?
I haven't, and my first experience working with ASA, was a project with the specifications already defined
What other advice do I have?
You must specify your needs and choose the right options depending on the network requirements.
Disclosure: My company has a business relationship with this vendor other than being a customer: Vendor.
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Palo Alto Networks NG Firewalls
Azure Firewall
Check Point NGFW
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Untangle NG Firewall
Fortinet FortiGate-VM
SonicWall NSa
Sophos XGS
Fortinet FortiOS
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?
There are companies that can compete with Cisco. Gartner has provided a report from 2012 showing that the new leader in firewalls with a new behavioral approach to firewalls is Palo Alto Networks. Not saying that Gartner has the right reports all the time but this one was correct. So remember that Checkpoint also exists and have been giving Cisco a run for their money. The caveat with Checkpoint is that some ports like X11 have to be hard coded into the top of the ACL in both directions in order to allow the traffic.
Anyone on any given day can beat the number one provider. The shift is now towards behavioral firewalling against unapproved applications and provide protection to the user no matter where they are based on user and not where they are coming from. Stay tuned as more developments come in the security field.