It helps us to identify key, persistent threats so we can set policies accordingly.
Regional Manager - Pre Sales at a tech services company with 51-200 employees
Helps us to identify key, persistent threats so we can set policies accordingly
Pros and Cons
- "Its in-depth monitoring and analysis help us to make better decisions and policies."
- "Its in-depth monitoring and analysis help us to make better decisions and policies."
- "Integration aspects and traffic shaping need improvement."
- "Initial setup can be complex. It is complex. We have to set up ASA, SFR module, and FMC separately, which sometimes requires extensive troubleshooting, even for smaller issues."
- "Initial setup can be complex. It is complex. We have to set up ASA, SFR module, and FMC separately, which sometimes requires extensive troubleshooting, even for smaller issues."
How has it helped my organization?
What is most valuable?
In-depth monitoring and analysis. It helps us to make better decisions and policies.
What needs improvement?
- Integration aspects
- Traffic shaping
For how long have I used the solution?
One to three years.
Buyer's Guide
Cisco Secure Firewall
March 2026
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,976 professionals have used our research since 2012.
What do I think about the stability of the solution?
Initially there were some stability issues, but in the long-run no.
What do I think about the scalability of the solution?
It requires additional licensing to enable 10G ports.
How are customer service and support?
Technical support is very good.
How was the initial setup?
It is complex. We have to set up ASA, SFR module, and FMC separately, which sometimes requires extensive troubleshooting, even for smaller issues.
Which other solutions did I evaluate?
We evaluated Huawei, briefly.
What other advice do I have?
It is a good datacenter firewall, as they have now overcome integration issues with latest versions.
Disclosure: My company has a business relationship with this vendor other than being a customer. Cisco Premier Partner.
Account Manager
Blocks malicious URLs, but bandwidth allocation and detection of new bugs need work
Pros and Cons
- "Malicious URLs are being blocked."
- "Advanced malware protection, it blocks malicious attacks."
- "Bandwidth allocation needs improvement."
- "Critical bugs need to be addressed before releasing the version."
- "Virtual patching would be helpful for servers that are not able to update patches due to compatibility issues."
- "Stability issues due to memory issues in the cluster environment and Firepower misbehaved due to non-responding of service/process."
How has it helped my organization?
Malicious URLs are being blocked.
What is most valuable?
Advanced malware protection, it blocks malicious attacks.
What needs improvement?
- Bandwidth allocation.
- SSL decryption (avoid installing the intermediate device certificate in the client) should happen from Firepower itself.
- Critical bugs need to be addressed before releasing the version.
- Need to reduce the time to for detection of new threats.
- Enable a feature for importing/exporting logs when required for analysis.
- Dynamic IP address in client systems mapping with respect to OS change or device change should be updated periodically in FireSIGHT management.
- Virtual patching would be helpful for servers that are not able to update patches due to compatibility issues.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
Yes, there were stability issues due to memory issues in the cluster environment and Firepower misbehaved due to non-responding of service/process.
What do I think about the scalability of the solution?
No scalability issues.
How are customer service and technical support?
Good support.
Which solution did I use previously and why did I switch?
We switched from our previous solution because of scalability issues.
How was the initial setup?
It was straightforward, even though we migrated from a third-party to Cisco.
What's my experience with pricing, setup cost, and licensing?
Price should be judged based on the above answers, among the most capable vendors.
Which other solutions did I evaluate?
FortiGate.
What other advice do I have?
We are using ASA5585-X with Firepower SSP-20 (ASA version 9.6(1)3, Firepower version 6.1.0.5).
When looking at different solutions, take a deep look at the features.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Cisco Secure Firewall
March 2026
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,976 professionals have used our research since 2012.
Solutions Architect at a tech services company with 51-200 employees
A multitude of valuable features but a little pricey
Pros and Cons
- "Signature-based detection; user-defined signatures with regular expressions; integrated URL and content filtering; custom URL categories filtering."
- "Secured our network from outside and inside intruders."
- "License capacity needs to be extended and the vendor needs to work on the pricing."
How has it helped my organization?
Secured our network from outside and inside intruders.
What is most valuable?
- Network attack detection
- DoS and DDoS attack prevention
- Signature-based detection
- User-defined signatures with regular expressions
- Integrated URL and content filtering
- Custom URL categories filtering
- Integarted antrivirus
- Protocols scanning
What needs improvement?
License capacity needs to be extended and the vendor needs to work on the pricing.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
No stability issues.
What do I think about the scalability of the solution?
No scalability issues.
How are customer service and technical support?
10 out of 10.
Which solution did I use previously and why did I switch?
No, Cisco was part of our solution from the start.
How was the initial setup?
Straightforward.
What's my experience with pricing, setup cost, and licensing?
Value for your money, but bit a costly.
What other advice do I have?
Good product, give it a chance.
Disclosure: My company has a business relationship with this vendor other than being a customer. Solution Partner.
I.T Security Consultant
Once set up properly, it can run for a whole year without any major issues
Pros and Cons
- "The most stable firewall I’ve ever worked with. Once you get the ASA set up properly, it can run for a whole year without any major issues, apart from the normal daily administration."
- "Once you get the ASA set up properly, it can run for a whole year without any major issues, apart from the normal daily administration."
- "The ASA needs to incorporate the different modules you have to integrate to achieve UTM functions, especially for small businesses."
- "The ASA needs to incorporate the different modules you have to integrate to achieve UTM functions, especially for small businesses."
What is most valuable?
This is our perimeter router. We used it purposely for NAT and to port forward traffic. Other essential features of a firewall are handled separately by a UTM.
What needs improvement?
The ASA needs to incorporate the different modules you have to integrate to achieve UTM functions, especially for small businesses.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
No stability issues at all, the most stable firewall I’ve ever worked with.
What do I think about the scalability of the solution?
No scalability issues.
How are customer service and technical support?
Quite good.
Which solution did I use previously and why did I switch?
We’ve always used ASA from the get go. We added the UTM is to compliment it.
How was the initial setup?
Straightforward.
What's my experience with pricing, setup cost, and licensing?
Pricing is why we had to go for a UTM. For us to achieve what we needed, if we had gone with the ASA, the cost would have been high compared to getting one box (UTM).
Which other solutions did I evaluate?
Juniper, Check Point, Astaro
What other advice do I have?
Go for it. I really like how, once you get the ASA set up properly, it can run for a whole year without any major issues, apart from the normal daily administration.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Technical Administrator at a tech services company
Since deployment, we have not encountered the attacks we had before
Pros and Cons
- "Manageability of Cisco ASA. It has a GUI interface, unlike the most of Cisco IOS. For beginners they can "sneak in" and apply the command and see the actual commands that the GUI launches. In addition, Cisco has the reputation regarding security."
- "Since the deployment, we haven't seen the risk we encountered before."
- "There are more powerful firewalls, other than the Cisco NGFW, like Fortinet, Palo Alto and so on."
What is our primary use case?
We have been using this model for three years, to place a firewall between ISPs and our corporate network. As of now, we have configured some SSL VPNs on our end for our convenience.
How has it helped my organization?
Three years ago we encountered malicious attacks from the internet, most of which were Chinese attackers, so we deployed Cisco ASA to strengthen our network. Since the deployment, we haven't seen the risk we encountered before.
What is most valuable?
Manageability of Cisco ASA. It has a GUI interface, unlike the most of Cisco IOS. For beginners they can "sneak in" and apply the command and see the actual commands that the GUI launches. In addition, Cisco has the reputation regarding security.
What needs improvement?
There are more powerful firewalls, other than the Cisco NGFW, like Fortinet, Palo Alto and so on. I can't say Cisco is the leading firewall brand as of now, as the technology innovates.
What do I think about the stability of the solution?
No stability issues yet.
What do I think about the scalability of the solution?
No scalability issues yet.
How is customer service and technical support?
Awesome.
What other advice do I have?
I rate it an eight out of 10.
I am only handling or supporting the ASA 5520 model in our company.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Engineer at a tech services company with 201-500 employees
Syslog generation and forwarding are good but it lacks many UTM features
Pros and Cons
- "One thing I like about the product is the logging features, the way it logs, the way it forwards the logs in Syslog."
- "Stability is really good, actually."
- "It doesn't have a proper GUI to do troubleshooting, so most people have to rely on the command line."
- "It should have packets, deep level inspections and controls, like the features which other IPS solutions used to have."
- "Other firewalls, upgrading is a very easy task; from the graphical user interface, you just need to import the firmware versions into it and install it. In this firewall, you need to have a third-party solution in both. It's a process. It's a procedure, a hard procedure, actually, so there is no straightforward procedure for upgrading."
- "It just doesn't have any. It's just a box which does firewalling."
What is most valuable?
If you compare it with other products, other firewall products in the market, at this moment, it doesn't have that many features, no impressive feature in it, in fact.
The one thing I like about the product is the logging features, the way it logs, the way it forwards the logs in Syslog. It generates the particular Syslog. Compared to other products, that is the only feature, I feel, that is good. I have worked with other firewall products, so I know it very well. The logs are pretty good. Then it forwards. When it forwards the logs to a third-party syslog server, it then writes the Syslog very well. That is the only feature I like about it.
What needs improvement?
It doesn't have a proper GUI to do troubleshooting, so most people have to rely on the command line.
Its a sort of legacy product nowadays. The firewalls which are the next generation have loads of features added to them, and they are all in one box.
It should have packets, deep level inspections and controls, like the features which other IPS solutions have. It just doesn't have any. It's just a box which does firewalling.
Threat management features also should be added into it.
So, the first thing is that the GUI has to be improved. The second thing is that the UTM features have to be added to it in a much broader way; not by relating to other third-party solutions which is how it is done right now. It should have built-in UTM features like other firewalls have now. Plus it should have the ability to analyze any packets which have malicious behaviors. Currently it doesn't have anything like that. It's just a layer-3 firewall.
Regarding the GUI, it's a very childish sort of attempt. It hasn't been improved since I started working with it. Yes, it shows the logs as they are but it doesn't have any option to do proper reporting.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
Stability is really good, actually.
What do I think about the scalability of the solution?
Scalability is not that good, I think. Other firewalls, upgrading is a very easy task; from the graphical user interface, you just need to import the firmware versions into it and install it. In this firewall, you need to have a third-party solution in both. It's a process. It's a procedure, a hard procedure, actually, so there is no straightforward procedure for upgrading.
How are customer service and technical support?
I have never called the tech support, apart from a hardware issue, but that is done through the vendor, a third-party support team.
Which solution did I use previously and why did I switch?
I was actually using ASA and I switched to another one.
How was the initial setup?
I actually have lots of experience working on multiple firewalls and technical solutions, so for me I don't have any problem doing things by the command line. But for others, for a person who has two years of experience or one year of experience in general, they will definitely face issues working in the command line. You have to remember all of the commands, to search for the commands. If you're in a graphical user interface, you can go search somewhere and find some options. So I would say in that way it is complex.
What other advice do I have?
If I were to advise others who are looking into implementing this product I would say I don't think they will like it. They would be able to meet business requirements better with other products, other vendors' firewalls. That's what I think, that's what I know from my own experience, from dealing with customers.
If those features, which I mentioned above in the first few questions, if they can add those features into the firewall as a standalone box, it can definitely become a player on the stage. They already have a good platform, even if it's a legacy product, it has that bit of maturity. So if, on top of that very good platform, they can add those features - security, threat intelligence features - they can get back into the market.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
President and CTO with 51-200 employees
Very good as a stateful inspection firewall, but weak in all other areas
Pros and Cons
- "Strong in NAT and access-lists."
- "Very good as a stateful inspection firewall."
- "Very good as a stateful inspection firewall, but weak in all other areas."
- "VPNs are weak as this product still does not support route-based VPNs."
- "Overall, this is a legacy product."
What is our primary use case?
Firewall only - no advanced services.
How has it helped my organization?
In the early days, before UTM and NGFW, this product was awesome. Cisco tried to add Firepower, but it requires a different management interface and is still too expensive.
What is most valuable?
- Strong in NAT and access-lists
- Very good as a stateful inspection firewall, but weak in all other areas.
What needs improvement?
- Integrated threat management
- Route-based VPNs: VPNs are weak as this product still does not support route-based VPNs.
- Single management interface
- Better throughput for price point
For how long have I used the solution?
More than five years.
What's my experience with pricing, setup cost, and licensing?
Price point is too high for features and throughput available.
What other advice do I have?
Overall, this is a legacy product.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Owner at David Strom Inc.
Using Cisco ASA CX Firewall To Protect Your Network
Cisco ASA has better application granularity, a more flexible means of policy creation, and easier to use controls and more powerful reports than its predecessors. We tested the ASA-5525-X in January 2013 and found a much improved user interface and lots of content-aware features.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Any network engineer you name their career begins with working on Cisco products. Cisco ASA is very user friendly when we use ASDM for configuration.
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos Firewall
Cisco Umbrella
Cisco Identity Services Engine (ISE)
Palo Alto Networks NG Firewalls
WatchGuard Firebox
Check Point Quantum Force (NGFW)
Cisco Meraki MX
Azure Firewall
Check Point Harmony SASE (formerly Perimeter 81)
Cisco Secure Email
SonicWall TZ
Cisco Secure Network Analytics
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which Cisco firewall model is the latest: ASA or NGFW?
- Which is better - Fortinet FortiGate or Cisco ASA Firewall?












Hi Gary,
No, I hadn't seen that security product as yet. Interesting model they are trying to get on board with --- everyone wants to sell you a perpetual subscription...