Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Security Engineer at a tech services company with 201-500 employees
Real User
Syslog generation and forwarding are good but it lacks many UTM features
Pros and Cons
  • "One thing I like about the product is the logging features, the way it logs, the way it forwards the logs in Syslog."
  • "It doesn't have a proper GUI to do troubleshooting, so most people have to rely on the command line."
  • "It should have packets, deep level inspections and controls, like the features which other IPS solutions used to have."
  • "Other firewalls, upgrading is a very easy task; from the graphical user interface, you just need to import the firmware versions into it and install it. In this firewall, you need to have a third-party solution in both. It's a process. It's a procedure, a hard procedure, actually, so there is no straightforward procedure for upgrading."

What is most valuable?

If you compare it with other products, other firewall products in the market, at this moment, it doesn't have that many features, no impressive feature in it, in fact. 

The one thing I like about the product is the logging features, the way it logs, the way it forwards the logs in Syslog. It generates the particular Syslog. Compared to other products, that is the only feature, I feel, that is good. I have worked with other firewall products, so I know it very well. The logs are pretty good. Then it forwards. When it forwards the logs to a third-party syslog server, it then writes the Syslog very well. That is the only feature I like about it.

What needs improvement?

It doesn't have a proper GUI to do troubleshooting, so most people have to rely on the command line.

Its a sort of legacy product nowadays. The firewalls which are the next generation have loads of features added to them, and they are all in one box.

It should have packets, deep level inspections and controls, like the features which other IPS solutions have. It just doesn't have any. It's just a box which does firewalling. 

Threat management features also should be added into it. 

So, the first thing is that the GUI has to be improved. The second thing is that the UTM features have to be added to it in a much broader way; not by relating to other third-party solutions which is how it is done right now. It should have built-in UTM features like other firewalls have now. Plus it should have the ability to analyze any packets which have malicious behaviors. Currently it doesn't have anything like that. It's just a layer-3 firewall.

Regarding the GUI, it's a very childish sort of attempt. It hasn't been improved since I started working with it. Yes, it shows the logs as they are but it doesn't have any option to do proper reporting.

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

Stability is really good, actually.

Buyer's Guide
Cisco Secure Firewall
July 2025
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,524 professionals have used our research since 2012.

What do I think about the scalability of the solution?

Scalability is not that good, I think. Other firewalls, upgrading is a very easy task; from the graphical user interface, you just need to import the firmware versions into it and install it. In this firewall, you need to have a third-party solution in both. It's a process. It's a procedure, a hard procedure, actually, so there is no straightforward procedure for upgrading.

How are customer service and support?

I have never called the tech support, apart from a hardware issue, but that is done through the vendor, a third-party support team.

Which solution did I use previously and why did I switch?

I was actually using ASA and I switched to another one.

How was the initial setup?

I actually have lots of experience working on multiple firewalls and technical solutions, so for me I don't have any problem doing things by the command line. But for others, for a person who has two years of experience or one year of experience in general, they will definitely face issues working in the command line. You have to remember all of the commands, to search for the commands. If you're in a graphical user interface, you can go search somewhere and find some options. So I would say in that way it is complex.

What other advice do I have?

If I were to advise others who are looking into implementing this product I would say I don't think they will like it. They would be able to meet business requirements better with other products, other vendors' firewalls. That's what I think, that's what I know from my own experience, from dealing with customers.

If those features, which I mentioned above in the first few questions, if they can add those features into the firewall as a standalone box, it can definitely become a player on the stage. They already have a good platform, even if it's a legacy product, it has that bit of maturity. So if, on top of that very good platform, they can add those features - security, threat intelligence features - they can get back into the market.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Andrew S. Baker (ASB) - PeerSpot reviewer
Andrew S. Baker (ASB)Cybersecurity & IT Operations Professional (VirtualCxO) at BrainWave Consulting Company, LLC
Consultant

Hi Gary,

No, I hadn't seen that security product as yet. Interesting model they are trying to get on board with --- everyone wants to sell you a perpetual subscription...

See all 3 comments
it_user789333 - PeerSpot reviewer
President and CTO with 51-200 employees
Real User
Very good as a stateful inspection firewall, but weak in all other areas
Pros and Cons
  • "Strong in NAT and access-lists."
  • "Very good as a stateful inspection firewall."
  • "VPNs are weak as this product still does not support route-based VPNs."

What is our primary use case?

Firewall only - no advanced services. 

How has it helped my organization?

In the early days, before UTM and NGFW, this product was awesome. Cisco tried to add Firepower, but it requires a different management interface and is still too expensive.

What is most valuable?

  • Strong in NAT and access-lists 
  • Very good as a stateful inspection firewall, but weak in all other areas. 

What needs improvement?

  • Integrated threat management
  • Route-based VPNs: VPNs are weak as this product still does not support route-based VPNs. 
  • Single management interface
  • Better throughput for price point 

For how long have I used the solution?

More than five years.

What's my experience with pricing, setup cost, and licensing?

Price point is too high for features and throughput available.

What other advice do I have?

Overall, this is a legacy product. 

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Cisco Secure Firewall
July 2025
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,524 professionals have used our research since 2012.
PeerSpot user
Owner at David Strom Inc.
Writer
ExpertTop 20
Using Cisco ASA CX Firewall To Protect Your Network

Cisco ASA has better application granularity, a more flexible means of policy creation, and easier to use controls and more powerful reports than its predecessors. We tested the ASA-5525-X in January 2013 and found a much improved user interface and lots of content-aware features.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user623778 - PeerSpot reviewer
it_user623778Technical Lead at a tech vendor with 1,001-5,000 employees
Vendor

Any network engineer you name their career begins with working on Cisco products. Cisco ASA is very user friendly when we use ASDM for configuration.

See all 5 comments
PeerSpot user
Senior Consultant at Unify Square
Real User
An excellent firewall, and one of the best available choices for big size companies. As usual excellence requires money.
Pros and Cons
  • "ASA is stable and with a low level of work required on the maintenance side."
  • "You have to know the ASA command line very well because not all operations are available in the graphical interface"

What is our primary use case?

Cisco ASA is born as an hardware firewall. The user case is security check on company's external connections (Internet and VPN access).

Most recent versions include antivirus and intrusion prevention to add security layers (including the above scenarios and the internal network) 

How has it helped my organization?

Cisco ASA have been the main security device for many years, slowly replaced with Check Point on the main datacentre.

What is most valuable?

ASA is stable and with a low level of work required on the maintenance side. It is a dedicated firewall, so you do not have to manage additional topics like spam, web sites filtering and so on.The routing part is high level as usual with Cisco products.  

What needs improvement?

You have to know the ASA command line very well because not all operations are available in the graphical interface (or let's say that sometimes it is better to operate with the ASA CLI).If you are searching for an "all in one product" it is not for you

What do I think about the stability of the solution?

No, stability is a really strong point with ASA.

What do I think about the scalability of the solution?

No, an assessment about the workload is important to select the right device.

How are customer service and technical support?

Over many year, the only kind of support we needed directly from Cisco was (really seldom) for parts replacement

Which solution did I use previously and why did I switch?

The previous solution was based on software firewalls that where not able to perform as the Cisco ASA

How was the initial setup?

Setup of a firewall, on a medium / large deployment is always a complex work.

Cisco ASA (more than other vendors' solutions) require a lot of know-how and real world expertise to be configured properly.

What about the implementation team?

More than one external team (Cisco partners) has been involved over time.

All of them were outstanding in their work.

What was our ROI?

Positive. The devices serves thousands of users for many years, outliving other vendors solutions.

What's my experience with pricing, setup cost, and licensing?

Cisco devices are for sure costly and budget could be an important constrain on selecting them as our security solution. 

Which other solutions did I evaluate?

When the choice was made, some comparison was made with other market leaders but integration with the existing Cisco network was a really important positive side in the final decision.

What other advice do I have?

ASA is one of the the state-of-the-art firewall devices for security.
It is affordable and not too complicated to use if you are doing standard operations (modifying ACLs, natting and so on) on an existing deployment.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user487374 - PeerSpot reviewer
it_user487374VP Product Management at PeerSpot
Real User

Did it replace a different product you had? Did you consider other products before choosing to go with this one?

PeerSpot user
Owner at David Strom Inc.
Writer
ExpertTop 20
Cisco has done a superior job at its next generation of firewall technology.

What is most valuable?

The user interface of the Prime Security Manager is, well, prime and one of the best pieces of software I have seen from them, and the features are on par if not better than what their competitors offer.

How has it helped my organization?

Cisco has done a nice job of integrating global IP reputation management into the firewall with its Security Intelligence and Operations module for insights and malware collection.

What needs improvement?

Prime manager is just for the CX line for now. CX features also add about a 30% overhead on throughput.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user682167 - PeerSpot reviewer
Network and System Engineer at a non-tech company with 201-500 employees
Real User
IPS features can be accessed from a separate interface

What is most valuable?

I enjoy the interface of Cisco products, especially the CLI version. I think the IPS feature in the product is best compared to products of other vendors. All the IPS features can be accessed from a separate interface, e.g., Cisco IDM.

How has it helped my organization?

We are an educational institute, and we are required to block many websites that are not suitable for students and teachers. Most of the sites, like YouTube uses an https version, thus blocking with IP address was becoming problematic. Moreover, certificate domains for Gmail and YouTube are the same. But the IPS feature in this product helps us to overcome this limitation.

What needs improvement?

Pricing of this product needs improvement.

For how long have I used the solution?

I have used this solution for two years.

What do I think about the stability of the solution?

I did not encounter any issues with stability.

What do I think about the scalability of the solution?

I did not encounter any issues with scalability.

How are customer service and technical support?

I would give technical support a rating of a nine out of 10.

Which solution did I use previously and why did I switch?

I worked with Cyberoam and Fortinet UTM at my previous job. When I joined my present company, they were already using the Cisco ASA solution. But my present company may switch to other vendors, especially Fortinet, because of the license renewal price.

How was the initial setup?

As I enjoy working on CLI, I would say that the initial setup was not complex.

What's my experience with pricing, setup cost, and licensing?

License and appliance costs are more expensive as compared to other vendors on the market.

What other advice do I have?

If your company is small or mid-range, it is better to go with other vendors, because of the pricing.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
IT Adviser/Manager with 51-200 employees
Real User
The Cisco ASDM management tool was helpful. I would like to see good reporting options.
Pros and Cons
  • "The ASA 55-x range is a solid and reliable firewall. It secures the traffic for normal purposes."
  • "Firewalls, in general, were not really designed for normal IT personnel, but for firewall and network experts. Therefore, they missed a lot of options and did not provide any good reporting or improvement options."

How has it helped my organization?

The ASA 55-x range is a solid and reliable firewall. It secures the traffic for normal purposes.

If you ask how a firewall can improve our business: It can’t. It is securing our business IT network.

But if you want to know what the ASA5520 can do to secure our network:
Not much more than any firewall. It is a solid port firewall, nothing more, nothing less.

What is most valuable?

The Cisco ASDM management tool was helpful.

What needs improvement?

Firewalls, in general, were not really designed for normal IT personnel, but for firewall and network experts. Therefore, they missed a lot of options and did not provide any good reporting or improvement options.

For example, to update or add a feature, you end up buying new support and licenses. The process is complex and changes so rapidly that you won't find a salesperson who will offer you the right products.

New generation firewalls are cloud managed or provide a good interface. They integrate into the environment. They are application aware and come with security features that are especially designed for the purpose.

What do I think about the stability of the solution?

There were no stability issues.

What do I think about the scalability of the solution?

You need to buy a new product if you want to scale. I once tried to put in another network card and ended up in a support nightmare. I had to buy more support, licenses, and it was more expensive than buying a new one.

How are customer service and technical support?

Customer Service:

Customer service is non-existent. You need to go through a very complex and annoying approval system before you can get any help. The support then gets asked a question and you get one word answers. It takes you hours to find out what version of an update you need to install, and then another day to find out how to install it.

Technical Support:

I would give technical support a rating of zero out of 10. It is clear that Cisco is not for the end-customer, but rather for resellers and providers. They might have better contracts and get more technical support.

Which solution did I use previously and why did I switch?

I usually have to take what is there. If I had a choice, I would now take something newer.

How was the initial setup?

You can start very easy and set up the network cards, but it also has many traps to find out the right setting for your environment.

For example, you need fixed network settings on your switch to connect with full duplex 100Mb/s. There is no autonegotiation nor other settings. This is the same problem with the WAN connection. You need to know exactly what to configure to match the WAN, or it will not work.

What about the implementation team?

I once had support from a reseller and once from a provider. Both depended on the level of the person you speak with. Most have some knowledge.

What was our ROI?

Once installed, they last a long time. I would recommend replacing them after some years to get better security features.

What's my experience with pricing, setup cost, and licensing?

If you look for user internet access, many new products can help with filtering and rules or procedures, like Meraki. This replaces the purpose of proxy servers.

If you have to secure web servers from the internet, you need a decent firewall with web features to process the requests and redirect traffic to web servers.

Cisco is no longer the only vendor offering these features. With Microsoft TMG out of the race, others have to push in. But firewalls are also no longer the first frontier of security. Cloud services are in there as well.

Which other solutions did I evaluate?

I had no choice.

What other advice do I have?

Get someone to help you plan and set up the firewall concept, as well as the initial setup and testing. Waiting for later is not the time to test or change anything without an outage.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Presales Consultant at a tech services company with 51-200 employees
Consultant
One of the most valuable features is the correlation of events -- including the path that a file is taking in the network and its integration with the endpoint protection.

What is most valuable?

Classic ASA features such as NAT, Stateful Firewall, and VPN are basic functions for average organizations, but next generation features such as the granular control of port hopping applications, IPs, and malware protection are mandatory, considering current advanced security threats.

One of the most valuable features is the correlation of events, including the path that a file takes in the network and its integration with the endpoint protection. This gives you the chance to take some actions in the case a breach happens.

How has it helped my organization?

Visibility in the network traffic.

What needs improvement?

Management console – Firesight Management Center.

When deploying Cisco FMC versions 6.0 and 6.1, some issues may appear when trying to register ASA sensors. The problem needs Cisco TAC involvement, adding more effort and time. I guess this will be fixed in version 6.2.

For how long have I used the solution?

I've used this solution for three to five years.

What do I think about the stability of the solution?

Some releases of the unified image (FTD – Firepower Threat Defense – Cisco ASA + Sourcefire IPS) are not very stable, but things are getting improved.

What do I think about the scalability of the solution?

Some clustering functions are not available in the unified image.

How are customer service and technical support?

Excellent.

Which solution did I use previously and why did I switch?

Old ASA 5500. Natural upgrade to next generation functions.

How was the initial setup?

Initial setup is pretty straightforward.

What's my experience with pricing, setup cost, and licensing?

The licensing model has been simplified and is easy to understand. The price is higher compared to UTM solutions, such as Fortinet, but in the same range as Checkpoint and Palo Alto.

Which other solutions did I evaluate?

We also work with Palo Alto Networks, Fortinet, FireEye, and some other vendors.

What other advice do I have?

Take a look at the features included in the unified image. Some classic ASA functionality has not been integrated yet, go for non-unified image if the deployment requires something that is not available – classic ASA iOS plus Sourcefire code.

Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.
Updated: July 2025
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.