We use ASA firewalls to limit traffic between the networks.
We use an on-premises deployment model.
We use ASA firewalls to limit traffic between the networks.
We use an on-premises deployment model.
I like that it is easy to change the settings.
Cisco ASDM is a problem because it is old.
I've been working with it for a year, but my company has been using Cisco firewalls for 15 years.
We use Cisco Secure Firewall ASA 5506 and 5508.
Cisco Secure Firewall ASA's stability is good.
I recently had a case with technical support that took a couple of weeks to resolve. We use Cisco Smart Licensing and are not connected to the net. It was a big problem to get it to work. Cisco's technical support did not know how it worked, and I had to tell them how it worked. We haven't had interactions with technical support where there were more positive outcomes.
On a scale from one to ten with ten being the best, I would rate technical support at two.
Negative
The initial deployment is easy for this solution.
Overall, I would rate this solution at seven out of ten because Cisco ASDM needs to be updated.
We use this solution to provide firewall solutions for clients. We have been transitioning from ASA to FTD, since FTD has come out with new versions or upgrades.
This solution is very flexible and offers different functionality including firewalls and VPN connectivity. It checks a lot of boxes. It is an easy solution to learn how to use and the positive impact on our organization was apparent as soon as we implemented it.
The CLI is the most valuable feature. We are moving towards FTD, which is more GUI based. The value of this solution lies in the fact that it is a standard platform that's been around for years and is always improving. This is important to us due to the necessity of ensuring cyber security.
We are replacing ASA with FTD which offers many new features.
We have been using this solution since 2009.
This is a stable solution.
This is a very scalable solution as long as you get the right hardware.
Over the last two years, getting a response from the support engineers has been challenging. This could be due to the impact of COVID.
We sell a lot of different firewall varieties including SonicWall, Cisco ASA, and FTD.
When setting up the solution for our clients, we ensure they have the bandwidth they need and consider what their throughput needs are. The solution does require maintenance in terms of patching. This requires approximately six team members depending on how many moving parts there are for clients.
We have seen a return on investment using this solution based on the fact that we are spending less money overall.
The pricing for this solution is pretty fair.
If it is possible, I would advise others to try out a demo with Cisco to test their firewalls. The biggest lesson I learned from using this solution is that there are many ways to achieve the same outcome.
I would rate this solution a nine out of ten.
We use this solution for company security and to define access and connection between different devices.
This solution made our organization more secure and gave us better control.
The access list is the most valuable feature of this solution.
This solution could be more granular and user-friendly.
I have been using this solution for 12 years.
This is a stable solution.
This is a scalable solution.
The technical support for this solution is good. I would rate it a seven out of ten.
Neutral
We use this solution together with Palo Alto, depending on the use case.
The initial setup is straightforward and the deployment only takes a few hours. Our deployment strategy was to keep it simple. A large deployment of this solution can require up to 10 resources.
The solution does require maintenance and we use an external service provider for this maintenance.
I would rate this solution an eight out of ten.
We use it for our VPN requirements. We wanted to allow people to work from home and we used the ASA to create VPNs through AnyConnect at the endpoints.
It has
The VPN feature is the most valuable to us because it accomplishes the task well. We're able to do everything we need to do.
I would like to see them update the GUI so that it doesn't look like it was made in 1995.
I've been using the Cisco ASA Firewall for between one and two years.
It's been very stable. I don't think we've ever had an issue with it failing entirely.
It scales well. We've had no issues ramping things up.
We're going to expand our usage of it. We rolled it out to about 200 users and now we're going to expand that to about 1,000 users out of our 3,000-user base. It has been really good.
The tech support is excellent. I've always gotten really good tech support from Cisco.
Positive
We did not have a previous solution.
The pricing could always be cheaper.
The solution always requires maintenance. I have about two people who are the "experts" and they help maintain it pretty well.
Cyber security resilience has been extremely important for our organization because of our customers' demands for security. The ASA has really helped to accomplish that with the VPN. My advice to leaders who are looking to build resilience is don't go cheap, and make sure you have backup solutions and high availability.
It's a good, robust firewall and VPN solution, with lots of knobs to turn. It is effective at what it does.
We use them for VPNs and as firewalls, of course. We wanted to protect the network and have secure communication with our peers.
They secure the network and ensure our network is always available.
They are easy to maintain.
I would like to see them add more next-generation features so that you don't need a lot of appliances to do just one task. It should be a single solution.
I have been using Cisco ASA Firewalls for nine years.
In terms of stability, it is a really good product and platform. Overall, it's great.
It's not really cost-effective when it comes to scalability. It is a really expensive product if you go to the modular firewalls. You need to get new appliances to get new features.
Tech support is good but it could be improved on some points.
Neutral
I have used Fortinet, Check Point, and Palo Alto firewalls. Most of those solutions have everything integrated into them so you don't need multiple appliances. You get a single solution for your network. It would be better to have a centralized firewall, from Cisco, that can do everything.
The initial deployment was straightforward. The last implementation of an ASA took us about one to two weeks.
Our implementation strategy was to have good architecture and to have all the requirements for the project beforehand. Everything went really smoothly because of that.
We needed four or five people for deployment, including field techs and network engineers.
For clean and easy protection of an enterprise, it is a really good product. It can be also deployed as a virtualized solution in data centers.
We use it for our data center. We have clusters of the solution to protect the equipment in our data center. We also use it for site-to-site VPN hubs.
Cisco Firepower NGFW Firewall made our firewall response much faster when trying to respond to any services or networks that stand out. It makes us very responsive when any of the visualized logs are blocked in real-time.
The most valuable feature would be ASDM. The ability to go in, visualize and see the world base in a clear and consistent manner is very powerful.
The ability to better integrate with other tools would be an improvement.
I have been using this solution for six years.
It is highly stable.
It is highly scalable. It has some limitations, but for medium to large-sized deployments, it is excellent.
Technical support is outstanding. You can get same-day support.
We previously used Juniper SRX. We switched because we have a contract with Cisco. This was the cheaper option and was faster.
We have very much seen an ROI in terms of the saving on man time and the costs of standing up new equipment. Compared to what we had before, Cisco Firepower NGFW Firewall is faster.
I would rate this solution a nine on a scale from one to ten.
In the new design, I put Cisco Firepower NGFW Firewall as a LAN segment and as the data center firewall. In the old design, I just used FortiGate Firewall for configurations, and we are going to replace it. The complete solution will be replaced with a two-tiered data center.
I like that Cisco Firepower NGFW Firewall is reliable. Support is also good.
We only have an issue with time sync with Cisco ASA and NTP. If the time is out of sync, it will be a disaster for the failover.
I have been using Cisco Firepower NGFW Firewall for about 11 years.
Cisco Firepower NGFW Firewall is a stable solution.
Scalability is good, but just like the issue with Palo Alto and Fortigate, there is also an issue with Cisco Firepower NGFW Firewall. I can configure it easily because of my Cisco background, but others in my team aren't comfortable with it.
Technical support is good. They were both fast and reliable and quick in making decisions. We faced specific issues, and tech support was efficient and provided an immediate solution. Other firewall vendors are slow to respond, and I'm not satisfied. It's also easy to Google and find solutions to our problems. We can't do that for other firewalls.
On a scale from one to five, I would give technical support a five.
Positive
We used FortiGate Firewall, but we are replacing it with Cisco Firepower NGFW Firewall because we had issues with HP solutions. We also switched because I am Cisco certified, and my background and expertise are in Cisco.
The initial setup was straightforward.
We have seen a return on our investment.
I will tell potential users that the data center firewall is a good solution. But most of the companies are using other firewalls like Palo Alto and FortiGate. Most of the design architects prefer the parameters of the firewalls like we prefer the data center firewall.
On a scale from one to ten, I would give Cisco Firepower NGFW Firewall a ten.
We primarily use the solution for configuring the firewall.
It's an almost perfect solution.
The configuration is very easy.
The management aspect of the product is very straightforward.
The solution offers very good protection.
The user interface itself is very nice and quite intuitive.
It would be ideal if the solution offered more integration capabilities with other vendors. For example, if you had a web security appliance, it would be great to be able to integrate everything in order to better report security events.
While I can't think of specific features I'd like improved, overall, they could do more to continue to refine the solution.
It would be nice if you didn't have to configure using a command-line interface. It's a bit technical that way.
We first started using the solution in 2015. It's been five years at this point.
The solution is very stable. We've found it to be extremely reliable. There are not bugs or glitches. It doesn't crash or freeze.
The solution can scale well. that's not a problem at all. If a company needs to expand it to fit their needs, they can do so.
We've been in contact with technical support on multiple occasions and each time we've had a good experience. We're satisfied with their level of support. They are fairly good.
I have nothing bad to say about the deployment. It went pretty well, and we can configure everything as we need to.
I don't really handle the billing, so I'm unsure of the pricing. I work more on the technical side.
We're just customers. We don't have a business relationship with Cisco.
It's a very good solution. I'd recommend it to other users.
Overall, I'd rate it seven out of ten.
Although I can't speak to the pricing, I've found the solution works quite well for us. I'd rate it higher if it could integrate a bit better with other solutions.
