We use it for our university department firewall. It replaced our 12-year-old Cisco ASA 5520, which used to protect web servers, mail servers, SVN repositories, office computers, research computers, and computer labs. It was used for blocking the internet for exams. It was not used for IPS, so we did not buy the new threat protection or malware license. We connected it to a Layer 3 switch for faster Inter-VLAN routing.
Supervisor of Computer Operations at Neil McFadyen
Setting up rules for HTTPS and SSH access to the management interface are straightforward
Pros and Cons
- "I am used to the ASA syntax, therefore it is quite easy to make up new rules. I have found that DNS doctoring rules are useful."
- "I found that setting up rules for HTTPS and SSH access to the management interface are straightforward, including setting the cypher type."
- "10Gb interfaces should be available on more models."
- "It is surprising that you need to have a virtual appliance for the Firepower Management Center. It is not good if you have to setup a VMware server just for it."
- "It is confusing to have two management interfaces, e.g., ASDM and Firepower Management Center."
What is our primary use case?
How has it helped my organization?
It works better through specs than our old ASA 5520. It seems to perform the same functionality unless you buy the additional threat protection licenses, so this is a disappointment. I found a bug where the ASDM could not be used with Windows 2016, but it did work with Windows 10.
What is most valuable?
- Most of same old ASA 5520 config could be used for the new 5516-X model. The ASDM interface is improved and can also be configured to the Firepower settings.
- I am used to the ASA syntax, therefore it is quite easy to make up new rules. I have found that DNS doctoring rules are useful, and I am not sure how other firewalls handle the issue of internal versus external DNS, so this was a reason to keep the same type of firewall.
- Customizing logging event of syslog to feed into Splunk is very useful for management and monitoring just for the importance events instead of a huge stream of thousands of unneeded events.
- I found it quite easy to block computers from the internet, e.g, in a computer lab with students doing an exam using software for the course when needed.
- I use access to a list to block IPs which have attacked our web servers on the outside interface, since I do not have IPS.
- I found that setting up rules for HTTPS and SSH access to the management interface are straightforward, including setting the cypher type.
- It is very useful to use the command line interface for modifying or adding to the config because sometimes the ASDM interface is hard to find when the setting is more complicated.
- The text config file is great to have, to know what is in the config, instead of having to check every setting in the GUI.
- While the CLI is used the most, sometimes the ASDM is faster and easier to use to set some settings.
What needs improvement?
- It is confusing to have two management interfaces, e.g., ASDM and Firepower Management Center. It would be nice to have a Windows program instead of a virtual appliance for the Firepower Management Center. The ASA and Firepower module seem redundant, not sure which one to set the rules in, but maybe that was for backward compatibility. I am not sure that is very useful.
- It is surprising that you need to have a virtual appliance for the Firepower Management Center. It is not good if you have to setup a VMware server just for it.
- 10Gb interfaces should be available on more models.
Buyer's Guide
Cisco Secure Firewall
July 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,524 professionals have used our research since 2012.
For how long have I used the solution?
Still implementing.
What's my experience with pricing, setup cost, and licensing?
ASA pricing seems high compared to other firewalls, such as the Sophos XG models.
The licensing features are getting more complicated. These should be simplified.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Sales Manager at Entiresoft Technologies Pvt Ltd
VPN load balancing has been essential for my connections to integrate via multiple time zones
Pros and Cons
- "VPN load balancing has been particularly essential for my connections to integrate via multiple time zones."
- "I needed to be well-versed with all the command lines for Cisco ASA in order to fully utilize it. I missed this info and wasted some operational costs."
What is our primary use case?
I am using Cisco ASA as the firewall for my business to guard the boundary of my business. It has been very helpful in my sector of media with my clients, essentially focusing on how secure their data is, especially when we are working on a few projects which involve multiple citations across Europe.
Our content, which is the main asset for our firm, is pretty elusive behind the firewall of Cisco ASA.
How has it helped my organization?
It has improved my client's trust.
What is most valuable?
VPN load balancing: This has been particularly essential for my connections to integrate via multiple time zones.
What needs improvement?
I needed to be well-versed with all the command lines for Cisco ASA in order to fully utilize it. I missed this info and wasted some operational costs. I would like to advise others to please be wary from the start.
For how long have I used the solution?
Less than one year.
What was our ROI?
It was initially heavy on my pocket, but it soon actualised its worth.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Cisco Secure Firewall
July 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,524 professionals have used our research since 2012.
Senior Vice President at a transportation company with 51-200 employees
Enables securing of various network segments based on use, but there are integration issues
Pros and Cons
- "Valuable features include DMZ segmentation, and IDS and IPS."
- "Cisco suffers from some integration issues with other products... There is a problem with the Cisco Catalyst Switches in terms of assembling bursts and having them interact properly with the Cisco Firepower."
What is our primary use case?
We use it as a firewall and it has performed adequately.
How has it helped my organization?
It allows the securing of various network segments, based on use.
What is most valuable?
DMZ segmentation, and IDS and IPS.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
It is fairly stable. However, Cisco suffers from some integration issues with other products, but this product, as a standalone, is fine. There is a problem with the Cisco Catalyst Switches in terms of assembling bursts and having them interact properly with the Cisco Firepower.
What do I think about the scalability of the solution?
The scalability is good.
How are customer service and technical support?
Tech support has been good.
Which solution did I use previously and why did I switch?
We've been using Cisco. Prior to this it was Cisco ASA. This was the next evolution.
When selecting a vendor it is important that they have positive industry feedback, that they are a visionary leader.
How was the initial setup?
I was involved in the initial set up and it was complex.
What other advice do I have?
I give this solution a seven out of 10. Some of the tools are still a little bit difficult to use.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Tehcnician at Belize Telemedia Limited
ASDM has made configuring ASA easy. No need to memorize CLI commands.
Pros and Cons
- "ASDM provides GUI for configurations. The ASDM has made configuring ASA easy. No need to memorize CLI commands."
- "Ease of configuration: It has gotten a lot easier to configure compared to the original Cisco Pix."
- "The ASA has become a bit old and needs updating."
- "UTM features would be nice or some NextGen features."
What is our primary use case?
Remote network access: We primarily use ASA for VPN, NAT, PAT routing, SLA, and multiple ISP providers.
How has it helped my organization?
Ease of configuration: It has gotten a lot easier to configure compared to the original Cisco Pix.
What is most valuable?
ASDM provides GUI for configurations. ASDM has made configuring ASA easy. No need to memorize CLI commands.
What needs improvement?
- UTM features would be nice or some NextGen features.
- The ASA has become a bit old and needs updating.
For how long have I used the solution?
One to three years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Administrator at Modern Woodmen of America
Sourcefires' visibility and control have been a great addition to the product
Pros and Cons
- "Sourcefire has been a great addition. The visibility and control have been nice."
- "If Cisco could stop rebranding, combine all the CLIs/GUIs, and give a consistent experience, this would be great."
What is our primary use case?
The primary use case is for edge firewall at multiple locations and remote access VPN. We use these for security and have them integrated with Splunk/QRadar.
How has it helped my organization?
Edge security and Sourcefire have been nice. Sourcefire was a major improvement over the legacy IDS that it previously had.
What is most valuable?
Sourcefire has been a great addition. The visibility and control have been nice.
I also like the active/standby HA.
What needs improvement?
The solution has two separate GUIs and at least three different CLIs (ASA CLI, Sourcefire CLI, and Firepower Management Center CLI). In addition, ASDM plus Firepower Management Center GUIs. If Cisco could stop rebranding, combine all the CLIs/GUIs, and give a consistent experience, this would be great.
Also, AnyConnect is very difficult to manage and use.
For how long have I used the solution?
More than five years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Business Development Executive at CBI
Though not NextGen, it is a good firewall
Pros and Cons
- "The firewall and policy side are easy to use."
- "Make the IPS baked-in."
- "It is a good firewall, though not NextGen."
What is our primary use case?
The gateway firewall is where we use it the most.
How has it helped my organization?
The firewall and policy side are easy to use.
What is most valuable?
IDS.
What needs improvement?
Make the IPS baked-in. It is a good firewall, though not NextGen.
For how long have I used the solution?
One to three years.
Disclosure: My company has a business relationship with this vendor other than being a customer. CBI is a VAR for these products.
ICT Manager with 1-10 employees
A stable, reliable solution used to protect the network's perimeter
Pros and Cons
- "A stable, reliable solution used to protect the network's perimeter."
- "it is not very user-friendly for the administration."
What is our primary use case?
We use it to protect the perimeter of the network.
How has it helped my organization?
It is reliable, and does the job that it is supposed to be doing.
What is most valuable?
- IPS
- Antivirus
- IP filtering
What needs improvement?
it is not very user-friendly for the administration.
What do I think about the stability of the solution?
The Cisco solution that we have now is very stable. That is why we are interested in continuing with the Cisco solution and upgrading to the next generation.
What do I think about the scalability of the solution?
It can be used by multiple users.
How are customer service and technical support?
We use the technical support of Cisco through a partner, so I do not have direct access to the Cisco IT technical support.
Which solution did I use previously and why did I switch?
We just shortlisted Cisco and Fortinet.
What about the implementation team?
We needed a Cisco technician to do the initial setup. We had to outsource the implementation.
What other advice do I have?
We need to upgrade our security requirements due to the new security requirement applicable in Europe (from GDPR) and the cyber security guidelines for our vessel (we are a US shipping company).
Most important criteria when selecting a vendor: familiarity, reliability, and price.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Information Technology at Giumarra
It is worth every penny that we have invested in it
Pros and Cons
- "It is much better than most of the other firewalls that I have worked with."
- "It needs more tunneling capabilities."
What is our primary use case?
I have been using the 5510 a lot, and have been working with it for many years. I have also used the 5505 and other firewalls.
How has it helped my organization?
It is much better than most of the other firewalls that I have worked with.
What needs improvement?
It needs more tunneling capabilities.
For how long have I used the solution?
More than five years.
What was our ROI?
It is worth every penny that we have invested in it.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: July 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Cisco Umbrella
Cisco Identity Services Engine (ISE)
Palo Alto Networks NG Firewalls
Check Point NGFW
WatchGuard Firebox
Azure Firewall
SonicWall TZ
Cisco Secure Network Analytics
Juniper SRX Series Firewall
Sophos XGS
Fortinet FortiGate-VM
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?
Have you checked out Fortinet's Fortigate UTM appliances and Security Fabric? They wiill save you money and provide more security.