ASA5585-SSP-60 was deployed after a migration from Juniper SRX5600. The solution is used for the protection of the mobile data network. It is protecting 3G/4G Internet customers and the Private APN.
Security Governance at a comms service provider with 1,001-5,000 employees
It brought our network down several times due to a memory leakage bug. Protects 3G/4G Internet customers and the Private APN.
Pros and Cons
- "We have been using a 5520 for seven years in our datacenter and we are satisfied by this version."
- "The solution is used for the protection of the mobile data network. It is protecting 3G/4G Internet customers and the Private APN."
- "The throughput highlighted on the datasheet (10Gbps) should be reviewed. This throughput is only for a UDP running environment, which you will never find in the real world. Rather consider a multiprotocol throughput."
- "A memory leakage issue which literally freeze the nodes (we have an HA environment). The issue is still not solved and the only recommendation from Cisco is to reboot the node."
What is our primary use case?
How has it helped my organization?
So far, we are not satisfied by the move. The precedent solution is much more adapted to the Telco environment, although Cisco recommended this platform. Cisco ASA also brought our network down several times due to a memory leakage bug, which is still not resolved.
What is most valuable?
All features provided by the platform are quite the same for all other platforms. We rather missed some features we were used to, such as virtual routers
What needs improvement?
- VPN creation with Cisco is quite difficult: Some DH groups are not supported (compared to Juniper).
- Expected to see the enablement of virtual routing, which is key in a Telco environment. We need to provide this in LAN to LAN services with shared platforms (DNS, proxies, etc.).
- Application visibility
Buyer's Guide
Cisco Secure Firewall
July 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,524 professionals have used our research since 2012.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
Yes, a memory leakage issue which literally freeze the nodes (we have an HA environment). The issue is still not solved and the only recommendation from Cisco is to reboot the node.
What do I think about the scalability of the solution?
Yes, the throughput highlighted on the datasheet (10Gbps) should be reviewed. This throughput is only for a UDP running environment, which you will never find in the real world. Rather consider a multiprotocol throughput.
How are customer service and support?
Experience with technical support was mitigated.
Technically, they denied any issues on the node and call the memory leak issue, "A cosmetic issue." They were stating that memory disappearance reported by SNMP was an error and will have no impact on the traffic. They have reviewed this since we have recorded several blackouts during the year.
Which solution did I use previously and why did I switch?
We were using Juniper SRX5600. The switch was more a strategic decision than a technical one.
We are also using a 5520 for seven years in our datacenter and we are satisfied by this version.
How was the initial setup?
The initial setup was very complex. Migration from Juniper (with wide usage of VR) to Cisco is complex and you should make sure to master all the flows on the node. Also, Juniper is more permissive on asymmetric traffic, which Cisco will deny by default.
What about the implementation team?
Implementation was performed by a Cisco recommended local partner.
We were not satisfied at all (from the pre to post implementation). Their level of expertise was zero.
What was our ROI?
I do not know.
What's my experience with pricing, setup cost, and licensing?
Nothing to highlight at this level.
Which other solutions did I evaluate?
We did an evaluation with Check Point.
What other advice do I have?
It is definitely not for Telco.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

ESS Security with 201-500 employees
Allows us to implement active/backup HA with ASAv (Adaptive Security Virtual Appliance)
Pros and Cons
- "In v9.8 you are able to do active/backup HA with ASAv (Adaptive Security Virtual Appliance) deployed on MS Azure."
- "The relatively new Firepower Threat Defense image (mix of ASA and Sourcefire network security) fills a lot of gaps and features that were missing on ASA."
What is most valuable?
Starting in version 9.7 you could track a login history for audit purposes and, in 9.8, you are able to do active/backup HA with ASAv (Adaptive Security Virtual Appliance) deployed on MS Azure.
What needs improvement?
There is always room for improvement in virtually anything. However, the relatively new Firepower Threat Defense image (mix of ASA and Sourcefire network security) fills a lot of gaps and features that were missing on ASA. Moreover, with FMC (Firepower Management Console) you can complement it with even more admin and reporting capabilities for the entire platform.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
No stability issues.
What do I think about the scalability of the solution?
No scalability issues.
How is customer service and technical support?
Excellent.
How was the initial setup?
New version comes with initial setup tutorial, with very nice security policies baseline, set up by default.
What's my experience with pricing, setup cost, and licensing?
Be sure of what features you are going to utilize to add/remove some from new bundles.
What other advice do I have?
Best value will always be delivered by adding FMC (Firepower Management Console); at least their virtual edition.
Disclosure: My company has a business relationship with this vendor other than being a customer. Distributor.
Buyer's Guide
Cisco Secure Firewall
July 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,524 professionals have used our research since 2012.
Consultant
Management Console and user profiling to define activities are key features
Pros and Cons
- "Management Console and user profiling to define activities."
- "As it’s a GenX firewall, expertise for both implementation and troubleshooting the pain points can be a challenge. This could be a concern when companies are thinking about buying this product."
How has it helped my organization?
It’s too early to say anything about this, as it’s still under implementation.
What is most valuable?
Management Console and user profiling to define activities.
What needs improvement?
As it’s a GenX firewall, expertise for both implementation and troubleshooting the pain points can be a challenge. This could be a concern when companies are thinking about buying this product.
For how long have I used the solution?
Still implementing.
What do I think about the stability of the solution?
Yes, unexpected failure and no RCA provided by the OEM.
What do I think about the scalability of the solution?
Still working on this.
How are customer service and technical support?
Technical support from OEM is a six out 10, as RCA report has still not been shared to date.
Which solution did I use previously and why did I switch?
Check Point. We moved to Firepower as an internal firewall to manage internal access and other network load.
How was the initial setup?
Straightforward, two-tire setup.
What's my experience with pricing, setup cost, and licensing?
All our requirements which we need performed by the firewall (e.g. VPN, URL white-listing, or IP based white-listing, etc.) have separate licenses and costs.
Which other solutions did I evaluate?
Yes, a couple of other of OEMs: Fortinet, Barracuda, etc.
What other advice do I have?
I rate it an eight out of 10, as it’s a new platform. Compared to Cisco ASA, it’s far better, per my usage to date.
Make sure you have an expert resource or subscribe to OEM technical support.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Regional Manager - Pre Sales at a tech services company with 51-200 employees
Helps us to identify key, persistent threats so we can set policies accordingly
Pros and Cons
- "Its in-depth monitoring and analysis help us to make better decisions and policies."
- "Integration aspects and traffic shaping need improvement."
- "Initial setup can be complex. It is complex. We have to set up ASA, SFR module, and FMC separately, which sometimes requires extensive troubleshooting, even for smaller issues."
How has it helped my organization?
It helps us to identify key, persistent threats so we can set policies accordingly.
What is most valuable?
In-depth monitoring and analysis. It helps us to make better decisions and policies.
What needs improvement?
- Integration aspects
- Traffic shaping
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
Initially there were some stability issues, but in the long-run no.
What do I think about the scalability of the solution?
It requires additional licensing to enable 10G ports.
How is customer service and technical support?
Technical support is very good.
How was the initial setup?
It is complex. We have to set up ASA, SFR module, and FMC separately, which sometimes requires extensive troubleshooting, even for smaller issues.
Which other solutions did I evaluate?
We evaluated Huawei, briefly.
What other advice do I have?
It is a good datacenter firewall, as they have now overcome integration issues with latest versions.
Disclosure: My company has a business relationship with this vendor other than being a customer. Cisco Premier Partner.
Account Manager
Blocks malicious URLs, but bandwidth allocation and detection of new bugs need work
Pros and Cons
- "Malicious URLs are being blocked."
- "Bandwidth allocation needs improvement."
- "Critical bugs need to be addressed before releasing the version."
- "Virtual patching would be helpful for servers that are not able to update patches due to compatibility issues."
How has it helped my organization?
Malicious URLs are being blocked.
What is most valuable?
Advanced malware protection, it blocks malicious attacks.
What needs improvement?
- Bandwidth allocation.
- SSL decryption (avoid installing the intermediate device certificate in the client) should happen from Firepower itself.
- Critical bugs need to be addressed before releasing the version.
- Need to reduce the time to for detection of new threats.
- Enable a feature for importing/exporting logs when required for analysis.
- Dynamic IP address in client systems mapping with respect to OS change or device change should be updated periodically in FireSIGHT management.
- Virtual patching would be helpful for servers that are not able to update patches due to compatibility issues.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
Yes, there were stability issues due to memory issues in the cluster environment and Firepower misbehaved due to non-responding of service/process.
What do I think about the scalability of the solution?
No scalability issues.
How are customer service and technical support?
Good support.
Which solution did I use previously and why did I switch?
We switched from our previous solution because of scalability issues.
How was the initial setup?
It was straightforward, even though we migrated from a third-party to Cisco.
What's my experience with pricing, setup cost, and licensing?
Price should be judged based on the above answers, among the most capable vendors.
Which other solutions did I evaluate?
FortiGate.
What other advice do I have?
We are using ASA5585-X with Firepower SSP-20 (ASA version 9.6(1)3, Firepower version 6.1.0.5).
When looking at different solutions, take a deep look at the features.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Solutions Architect at a tech services company with 51-200 employees
A multitude of valuable features but a little pricey
Pros and Cons
- "Signature-based detection; user-defined signatures with regular expressions; integrated URL and content filtering; custom URL categories filtering."
How has it helped my organization?
Secured our network from outside and inside intruders.
What is most valuable?
- Network attack detection
- DoS and DDoS attack prevention
- Signature-based detection
- User-defined signatures with regular expressions
- Integrated URL and content filtering
- Custom URL categories filtering
- Integarted antrivirus
- Protocols scanning
What needs improvement?
License capacity needs to be extended and the vendor needs to work on the pricing.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
No stability issues.
What do I think about the scalability of the solution?
No scalability issues.
How are customer service and technical support?
10 out of 10.
Which solution did I use previously and why did I switch?
No, Cisco was part of our solution from the start.
How was the initial setup?
Straightforward.
What's my experience with pricing, setup cost, and licensing?
Value for your money, but bit a costly.
What other advice do I have?
Good product, give it a chance.
Disclosure: My company has a business relationship with this vendor other than being a customer. Solution Partner.
I.T Security Consultant
Once set up properly, it can run for a whole year without any major issues
Pros and Cons
- "The most stable firewall I’ve ever worked with. Once you get the ASA set up properly, it can run for a whole year without any major issues, apart from the normal daily administration."
- "The ASA needs to incorporate the different modules you have to integrate to achieve UTM functions, especially for small businesses."
What is most valuable?
This is our perimeter router. We used it purposely for NAT and to port forward traffic. Other essential features of a firewall are handled separately by a UTM.
What needs improvement?
The ASA needs to incorporate the different modules you have to integrate to achieve UTM functions, especially for small businesses.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
No stability issues at all, the most stable firewall I’ve ever worked with.
What do I think about the scalability of the solution?
No scalability issues.
How are customer service and technical support?
Quite good.
Which solution did I use previously and why did I switch?
We’ve always used ASA from the get go. We added the UTM is to compliment it.
How was the initial setup?
Straightforward.
What's my experience with pricing, setup cost, and licensing?
Pricing is why we had to go for a UTM. For us to achieve what we needed, if we had gone with the ASA, the cost would have been high compared to getting one box (UTM).
Which other solutions did I evaluate?
Juniper, Check Point, Astaro
What other advice do I have?
Go for it. I really like how, once you get the ASA set up properly, it can run for a whole year without any major issues, apart from the normal daily administration.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Technical Administrator at a tech services company
Since deployment, we have not encountered the attacks we had before
Pros and Cons
- "Manageability of Cisco ASA. It has a GUI interface, unlike the most of Cisco IOS. For beginners they can "sneak in" and apply the command and see the actual commands that the GUI launches. In addition, Cisco has the reputation regarding security."
What is our primary use case?
We have been using this model for three years, to place a firewall between ISPs and our corporate network. As of now, we have configured some SSL VPNs on our end for our convenience.
How has it helped my organization?
Three years ago we encountered malicious attacks from the internet, most of which were Chinese attackers, so we deployed Cisco ASA to strengthen our network. Since the deployment, we haven't seen the risk we encountered before.
What is most valuable?
Manageability of Cisco ASA. It has a GUI interface, unlike the most of Cisco IOS. For beginners they can "sneak in" and apply the command and see the actual commands that the GUI launches. In addition, Cisco has the reputation regarding security.
What needs improvement?
There are more powerful firewalls, other than the Cisco NGFW, like Fortinet, Palo Alto and so on. I can't say Cisco is the leading firewall brand as of now, as the technology innovates.
What do I think about the stability of the solution?
No stability issues yet.
What do I think about the scalability of the solution?
No scalability issues yet.
How is customer service and technical support?
Awesome.
What other advice do I have?
I rate it an eight out of 10.
I am only handling or supporting the ASA 5520 model in our company.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: July 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Cisco Umbrella
Cisco Identity Services Engine (ISE)
Palo Alto Networks NG Firewalls
Check Point NGFW
WatchGuard Firebox
Azure Firewall
SonicWall TZ
Cisco Secure Network Analytics
Juniper SRX Series Firewall
Sophos XGS
Fortinet FortiGate-VM
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?