Try our new research platform with insights from 80,000+ expert users
Network and System Administrator at a pharma/biotech company with 501-1,000 employees
Real User
One of the features that should be improved is the URL filtering engine, but the stability of this product is one of the key functionalities in our deployment.

What is most valuable?

The ability to intercept unwanted traffic, and prevent attacks without interrupting everyday work, and the stability of this product are the key functionalities in our deployment.

How has it helped my organization?

This product, and our implementation, are not directly correlated with the core business of our company. It is designed to protect our company from outside threats and reduce impact on other network elements, such as the backend firewall, DMZ zone and VPN concentrators.

What needs improvement?

Cisco ASA lacks some functionalities, when compared with other vendors’ products. Cisco need to implement some more functionalities, like client-less VPN (HTML5), but I expect that Cisco will continue to add, and improve, features of the product. One of the features that should be improved is the URL filtering engine, as currently it has limited functionality. For full functionality, you will need an external URL filtering server, like Websense.

For how long have I used the solution?

We have used it for more than five years, and have implemented it for perimeter network protection. It is designed for basic network protection for our corporate environment.

Buyer's Guide
Cisco Secure Firewall
September 2025
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.

What was my experience with deployment of the solution?

No issues during the deployment, as we had good planning.

What do I think about the stability of the solution?

No issues with stability. The device is designed for hard work 24/7. I never have a lack of resources like RAM or CPU. The only reason I need to restart the device is during a software upgrade.

What do I think about the scalability of the solution?

In our deployment, we did not have a scalability issue.

How are customer service and support?

Customer Service:

It is very high.

Technical Support:

We did not have any technical problems with this product, so we have not had need of technical support

Which solution did I use previously and why did I switch?

We implemented ASA after a complete redesign of our network, and we believe that Cisco ASA is the right solution for our needs.

How was the initial setup?

The initial setup is straightforward, as there is a lot of documentation available on the Cisco site, and other sites, which makes planning and deployment pass without any problems. However, the ASA is a complex device, with a lot of features and further tuning is complex and you must have the right knowledge to do it. Configuration can be done through a Java based application called ASDM or through the CLI interface. Using ASDM is much more simple and easy, but ASDM is not compatible with the newer Java version, so before implementation you must read the compatibility notes. Also, keep in mind that when upgrading ASA software, you must also upgrade the ASDM package.

What about the implementation team?

Initial implementation was through a vendor. I would rate their experience and expertise as 9/10.

What was our ROI?

Calculating the ROI for network security or IT security is complex and dependent on many factors, like the implementation, role, expectation etc. IT security cannot be compromised, but on the other hand, we must ask how much is enough. In our case, we do not have a defined ROI for this product.

What's my experience with pricing, setup cost, and licensing?

The cost of the setup was only the product price, local vendor support for the implementation, and employee training. This product is set it and forget it, so we do not have day to day costs.

Which other solutions did I evaluate?

We did not evaluate other products. One reason was that we believe that the ASA is a reliable product and fits our needs. Another reason, was the lack of local support for other solutions.

What other advice do I have?

Unfortunately, the ASA 5500 is EoS and EoL, and I hope that Cisco’s NGF 5500-X series will be a worthy successor. This does not mean that Cisco will stop software support and will continue to release new software versions with new and improved features for the ASA 5500 series.

As with any other product, the main things for a successful implementation are to decide what you want to achieve, and what your main goal is, and then, you need good planning, not only for your current needs, but you also need to keep in mind further grow and needs. Good planning is, at least, 80% of successful implementation.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user240063 - PeerSpot reviewer
Network Security Engineer at a manufacturing company with 10,001+ employees
Real User
It is very scalable, but they need to improve the pricing.

What is most valuable?

It has very advanced security features including FirePOWER threat management, which is the most valuable, but also URL filtering, FireSIGHT, and advanced malware protection.

What needs improvement?

The cost of this product should be reconsidered.

For how long have I used the solution?

I've used it for almost a year.

What was my experience with deployment of the solution?

So far, I have found this model very smooth.

What do I think about the stability of the solution?

We had a slight issue with IPS, as the signature update was, sometimes, getting stuck.

What do I think about the scalability of the solution?

I believe this product is very scalable with our current needs and requirements.

Which solution did I use previously and why did I switch?

Yes, I used a normal model of Cisco ASA and found it a  very successful experience. Therefore we have it to a more advanced ASA box for improved, and more advanced, security management.

How was the initial setup?

Cisco implementations are always very straightforward.

Which other solutions did I evaluate?

Evaluation is mandatory in IT, and we have found this device has better features and reliability when compared to other products.

What other advice do I have?

I would suggest implementing this product ascand has advanced security features.

Disclosure: My company has a business relationship with this vendor other than being a customer. We are platinum partners
PeerSpot user
Buyer's Guide
Cisco Secure Firewall
September 2025
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
PeerSpot user
Sr. Network Engineer at a tech services company with 10,001+ employees
Real User
CLI of the firewall is valuable, but there are IOS related bugs in later versions.

What is most valuable?

  • Stateful inspection
  • CLI of the firewall

How has it helped my organization?

It has increased the security and works best for VPN users.

What needs improvement?

The product has been introduced with UTM i.e. FirePower, and I would like to use it and comment on it.

For how long have I used the solution?

I've used it for three years.

What was my experience with deployment of the solution?

Encountered IOS related bugs in later versions.

What do I think about the stability of the solution?

No issues encountered.

What do I think about the scalability of the solution?

No issues encountered.

How are customer service and technical support?

Customer Service:

10/10.

Technical Support:

It depends on the support contract that you have.

Which solution did I use previously and why did I switch?

I previously used CheckPoint, and switched because of the UTM features.

How was the initial setup?

It was straightforward.

What about the implementation team?

I implemented it myself.

Which other solutions did I evaluate?

I think evaluated other options with reference to our architecture.

What other advice do I have?

You should analyze the current setup and implement it as per the customers' requirement.

Disclosure: My company has a business relationship with this vendor other than being a customer. Platinum Partner
PeerSpot user
it_user222999 - PeerSpot reviewer
Network Security Engineer at a tech services company with 51-200 employees
Consultant
Debugging messages are a valuable feature, but IPS needs to be added to the IOS.

Valuable Features

  • Scalability
  • Debugging messages
  • Context modes

Improvements to My Organization

Context modes as this means there is no need to buy additional firewall for different customers.

Room for Improvement

IPS, IDS, anti-virus etc. should be added to IOS instead of separate cards.

Use of Solution

I've used it for three years.

Deployment Issues

No issues encountered.

Stability Issues

No issues encountered.

Scalability Issues

No issues encountered.

Customer Service and Technical Support

Customer Service:

Dedicated experts are available in support contract with Cisco.

Technical Support:

100% skilled engineers with knowledge are available 24/7.

Initial Setup

It is straightforward.

Implementation Team

We implemented it in-house.

Pricing, Setup Cost and Licensing

It is £2,000 to set up, and the running costs, depend on the customers' issue(s) or tickets raised.

Other Solutions Considered

  • Juniper
  • FortiGate

Other Advice

Its a nice professional product with lots of scalability. Easy to troubleshoot and there is tool called PACKET TRACER which simulates the packet and it will tell you whether a packet is allowed inbound or outbound for testing purposes.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
ICT Manager at a aerospace/defense firm
Real User
Site to site VPN is easy, but it's very expensive.

What is most valuable?

  • VPN
  • ASDM configuration

For FirePOWER:

  • IPS
  • AMP
  • URL filtering

How has it helped my organization?

It's pretty easy to connect between different branches using site to site VPN.

What needs improvement?

Cost, it's very expensive. To migrate from a Cisco ASA 5550 and not drop in performance, you have to go to a Cisco ASA 5555-X with FirePOWER. To fully use the Cisco FirePOWER IPS, AMP and URL filtering, you are forced to (MUST) buy the Cisco FireSIGHT management centre. You also have to buy licensing for Cisco AnyConnect VPN client

For how long have I used the solution?

I've been using it since October 2004, so for 10 years.

What was my experience with deployment of the solution?

Due to the cost, I am still waiting for more funds to deploy the final phase, FirePOWER IPS, AMP and URL filtering.

Cisco did an upgrade from v8.2 to v8.3 of the migration system. NAT configuration is different from 8.2 to 8.3. It's not easy to upgrade to 8.3 and above leading to running different software versions.

What do I think about the stability of the solution?

V8.2 is very stable. With the latest versions it's still early to tell.

What do I think about the scalability of the solution?

Upgrading from v8.2 to v8.3 is a nightmare. The risks of down time are so high that I am forced to run different versions. Stay with 8.2 on all NAT dependent on your ASA, but again it's all about the cost.

How are customer service and technical support?

Customer Service:

Excellent customer service. Cisco listens to their customers.

Technical Support:

Excellent customer service and documentation.

Which solution did I use previously and why did I switch?

We previously used Checkpoint, and I switched because Checkpoint was expensive but now it looks like Cisco is following the same route.

How was the initial setup?

It was not that complex because I was using Cisco routers and switches five years prior.

What about the implementation team?

It was an in-house implementation.

What was our ROI?

I can't tell right now as I am still investing.

What's my experience with pricing, setup cost, and licensing?

The initial investment on the Cisco ASAs was around one million South African Rand and there's a R200,000 annual maintenance cost with Cisco's partners.

Which other solutions did I evaluate?

No. I went straight to Cisco because of my experience with their CUCM IPT solutions, routers and switches.

What other advice do I have?

Budget a lot of money, especially on the initial setup and the annual licensing and maintenance cost.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Simon Chaba - PeerSpot reviewer
Simon ChabaICT Manager at a aerospace/defense firm
Real User

Yes, we have 3 x 1Gbps and 1 x 155Mbps. We have four internet breakouts in different cities around the country and three of them are 1Gbps each. The fourth internet breakout is 155Mbps. There's only 2 ASA which are still on 8.3 and all others have been upgraded to 9.1. The remaining two will be upgraded in a few weeks time. Cisco ASAs are reliable, very stable and the best. The Cisco Firepower works like magic, application visibility, URL filtering and the ability to drop p2p protocols like torrent, on the fly are some of the best capabilities of the product.

See all 3 comments
it_user234789 - PeerSpot reviewer
Chief Technical Officer at a comms service provider with 501-1,000 employees
Vendor
It has given us a very robust and well firewalled LAN.

What is most valuable?

  • Content filtering
  • VPN features
  • User interface is also very friendly

How has it helped my organization?

Users can VPN into the network from remote locations. It has given us a very robust and well firewalled LAN, that we use for authentication as well for our core network infrastructure.

For how long have I used the solution?

I've used it for seven years.

What was my experience with deployment of the solution?

No issues encountered.

What do I think about the stability of the solution?

It's a very stable product.

What do I think about the scalability of the solution?

No issues encountered.

How are customer service and technical support?

Customer Service:

It's good.

Technical Support:

It's good.

Which solution did I use previously and why did I switch?

No previous solution was used.

How was the initial setup?

It was a straightforward setup.

What about the implementation team?

Implementation was in-house as we have Cisco experts.

What's my experience with pricing, setup cost, and licensing?

The initial cost was approximately $6,000.

Which other solutions did I evaluate?

No other products were evaluated.

What other advice do I have?

ASA is a very reliable product and I have been using it since I cam across it. I strongly recommend the use of the product

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user224271 - PeerSpot reviewer
Senior Network Architect/Owner with 51-200 employees
Vendor
We have the ability to control our VPN users as well as use two-factor authentication if needed, but I would love to see application specific control.

Valuable Features

The features that we use are:

  • The stateful firewall
  • VPN with AnyConnect
  • Site-to-site IPSEC solutions
  • High availability

Improvements to My Organization

The ASA gives us a secure appliance at the perimeter and allows us to provide VPN connectivity to our users. We have the ability to control our VPN users as well as use two-factor authentication if needed (using an outside Radius source).

Room for Improvement

The ASA has room for improvement in the areas of layers four through seven. I would love to see application specific control, e.g.Facebook, Gmail, etc.

Use of Solution

I have used this solution for five years.

Deployment Issues

No issues with the deployment of the ASA as long as you are using it for what it is intended for.

Stability Issues

No issues encountered.

Scalability Issues

As long as you buy the correct model for your company, in regards to throughput, licenses etc., you will be fine.

Customer Service and Technical Support

Customer Service:

8/10.

Technical Support:

8/10.

Initial Setup

I believe it is straightforward, but again it depends on what you are trying to accomplish.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Federal Civ/Intel Engineering Lead at a tech vendor with 1,001-5,000 employees
Real User
Shortcomings of Cisco ASA 5500-X with FirePOWER Services

I started to title this a "Review" of the Cisco ASA with FirePOWER, but my objective is to highlight a few limitations of the integrated solution so that potential customers understand the product. It may turn out to be a review after all, but that's the focus.

Let's set some product context. Cisco completed its acquisition of Sourcefire on October 7, 2013, and its initial integration into the Cisco Security family on November 10, 2014. That makes this union very fresh--think of Cisco FirePOWER as newlyweds. They're starting to share the same roof, but carry a lot of individuality and his/her domain around with them.

Next, let's zoom in on the word, "Services", or as you may see elsewhere, "Module". Sourcefire makes a number of standalone, independent intrusion prevention system and application firewall appliances (i.e. 7000 series, 8000 series). When Cisco and Sourcefire united, they introduced the ability to put a dependent Sourcefire module into the Cisco ASA 5500-x next-generation firewall family. One Cisco partner described it as functioning like a virtual machine within the ASA (of sorts). Summation: it needs the host (ASA) to survive.

This "Module" should actually be packaged and marketed as a "Starter Kit" or an entry-level, feature-limited offering (with no building-block upgrade path; it's a hardware ceiling). And perhaps it is by some Cisco VARs, but it's new, so I think many are still coming up to speed with what it brings to the table.

o justify my above assertion, I'll highlight four characteristics that have affected or disappointed me in my deployment, and that have motivated a new set of quotes to move to the hardware/standalone solution.

1. SSL Inspection

firepower_ssl_reqOftentimes you don't know what you don't know and thus you lack the wisdom to ask about it. That was me with this feature. I didn't know that the integrated module only supported a subset of features, so I didn't know to ask about its ability to decrypt inbound SSL traffic.

We host a number of public HTTPS services, though, so one goal of implementing FirePOWER was to protect against intrusion via that conduit.

While reading the Online Help and attempting configuration, I ran across references saying that it was only supported on "Series 3" devices, yet I couldn't quite find how Cisco categorized FirePOWER services. FireSight Management Center (a.k.a. "Defense Center") also gives the illusion of hope in this matter, because it reveals all features as configurable, being that it can manage the largest of Sourcefire appliances. The rubber meets the road, though, when you try to apply a policy with SSL inspection to unsupported devices. And yep, the module is one of those.

Summary: SSL traffic remains cloaked to FirePOWER services. IPS can only treat the headers (read: source/destination IP and port).

2. User Control

This one was less important to me, but still an unfortunate discovery. FirePOWER (all devices) support "User Awareness" through LDAP integration and user agents installed on endpoints, but the ability to control traffic based on the identity of the user as another hardware-only feature. Thus, you can see who is doing what, but control must be applied through hardware or traffic identity, not user.

3. Fail-Close Design

I may butcher the explanation here, but because of the integrated nature of the FirePOWER module and services, if FirePOWER inside of an ASA firewall goes down (crashes, restarts Snort, etc), traffic through the ASA stops. This is regardless of the "sfr fail-open" command, which only practically applies to standalone appliances.

I discovered this with Cisco TAC on a Webex where they put the Sourcefire into software bypass to troubleshoot traffic flow and attempt to take it out of line. That didn't work so well. Alarms and alerts started flying as the ASA clamped down on all new sessions (existing ones seemed to hold--very thankful as I was remote). Anyways, TAC didn't know of this design either until they asked engineering about a potential bug and were told it was "by design".

Major Warning/PSA: Adding FirePOWER Services to your ASA will introduce a new network availability risk. You will be very secure, though, since traffic will stop if the IPS is down. Blessing? Curse? Depends on you.

4. Bug: Active FTP is blocked by FirePOWER Services (CSCze96017)

Cisco was still working on this one when I closed my case regarding it, and their internally-published workaround wasn't accurate at the time. The practical impact, though, is that Active FTP traffic is blocked by Sourcefire due to network address translation (NAT) confusion. The ASA handles it fine, but when the FTP server initiates the new data channel outbound to the client, Sourcefire gets confused and blocks it.

The workaround, which sounds like it may become the "solution" (not fixable), is to deny FTP traffic in your Sourcefire policy:

access-list Outside_SFR extended deny tcp any any eq ftp access-list Outside_SFR extended permit ip any any
class-map Outside-class  match access-list Outside_SFR
policy-map Outside-policy  class Outside-class  sfr fail-open

Note: the last line still contains "sfr fail-open", but it won't apply until we replace the module with the full appliance.

This bug means that Sourcefire cannot inspect or provide any services (not even against IP headers) to FTP traffic. It will not show up in FireSight (Defense Center). Only the ASA will be able to treat it based on standard ACLs, etc.

Alright, let's end on a high note. Apart from those four things, the Cisco ASA with FirePOWER Services solution works well, provides great insight, applies Advanced Malware Protection strongly, and shuts down a ton of illegitimate connections before they can attACK ;).

If you're looking to get your feet wet, and if SSL inspection isn't critical, I recommend giving FirePOWER a shot.

Originally posted at: http://www.thegurleyman.com/shortcomings-of-cisco-asa-5500-x-with-firepower-services/

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user641307 - PeerSpot reviewer
it_user641307Dy Head IT with 501-1,000 employees
Real User

In our POC we have found that Cisco does not provide Centralized Firewall Policy Manager in cloud. We have to buy appliance only.

See all 4 comments
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.
Updated: September 2025
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.