Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Business Development Director with 51-200 employees
Vendor
Jun 30, 2015
UTM features need to be improved, but it's a full inspection firewall.
Pros and Cons
  • "The fact that it's a full inspection firewall."
  • "It was mainly issues regarding the management and VPN setup."

What is most valuable?

The fact that it's a full inspection firewall.

How has it helped my organization?

In fact there is no relevant improvement, but this is the kind of device that every company must have.

What needs improvement?

  • Recognition of appliances
  • UTM features

For how long have I used the solution?

I've used it for five years.

Buyer's Guide
Cisco Secure Firewall
March 2026
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,976 professionals have used our research since 2012.

What was my experience with deployment of the solution?

It was mainly issues regarding the management and VPN setup.

What do I think about the stability of the solution?

No issues encountered.

What do I think about the scalability of the solution?

No issues encountered.

How are customer service and support?

Customer Service:

8/10.

Technical Support:

8/10.

Which solution did I use previously and why did I switch?

We previously used IPtables, and switched because there was a lack of technical support, RMA, etc.

How was the initial setup?

It was an easy initial set-up.

What about the implementation team?

We did it in-house.

Which other solutions did I evaluate?

No other options were looked at.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user264462 - PeerSpot reviewer
Technolgy Analyst/Lead at a tech services company with 10,001+ employees
Real User
Jun 30, 2015
It currently does not support VPN, but I like the documentation, reliability, and support.
Pros and Cons
  • "If it is for a banking domain, your organisation should use Cisco which can assure better security than any other vendors' products."
  • "ASA context should be able to support site-to-site VPN, but the current Cisco Context does not support VPN."

What is most valuable?

  • Site-to-site IPsec VPN
  • Remote IPsec VPN
  • Reverse route injection

How has it helped my organization?

Cisco Context gave us the feature of creating a virtual firewall, which is good. It provides us with maximum network isolation. Also impressive is the ISP redundancy.

What needs improvement?

WCCP, and URLs, in the Cisco ASA Context both need work. When changing from single mode to multiple mode or back, the commands must be done from the command line (CLI) and cannot be done via the ASDM GUI interface. ASA context should be able to support site-to-site VPN, but the current Cisco Context does not support VPN

For how long have I used the solution?

I've used them for six years.

What was my experience with deployment of the solution?

During the deployment of WCCP, we noted some loopholes like it only supports ports 80 & 443. Application which is running on multiple ports doesn't work with WCCP and to make it work we need to allow respective traffic outside the firewall.

What do I think about the stability of the solution?

Sometimes there is an issue with the site-to-site VPN.

What do I think about the scalability of the solution?

In certain cases, like an any access-list, if we add a URL the Cisco ASA access-list does not resolve that URL while this can be done in Juniper, and Fortinet.

How are customer service and technical support?

Customer Service:

9/10.

Technical Support:

9/10,

Which solution did I use previously and why did I switch?

I have migrated some set-ups from Cisco to Juniper, but not from Juniper to Cisco.

How was the initial setup?

We have multiple ASA firewalls for different clients now we migrated to Cisco Context.

What about the implementation team?

It was done in-house.

What was our ROI?

It's 8/10.

What other advice do I have?

If it is for a banking domain, your organisation should use Cisco which can assure better security than any other vendors' products. Also, they have the best documentation, reliability and support.

Disclosure: My company has a business relationship with this vendor other than being a customer. Channel partner
PeerSpot user
Buyer's Guide
Cisco Secure Firewall
March 2026
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,976 professionals have used our research since 2012.
it_user246819 - PeerSpot reviewer
Global Security Architect/Perimeter Systems Administration/Active Directory and System Administrator at a retailer with 1,001-5,000 employees
Vendor
May 29, 2015
The solution has worked very well for us, but the configuration/management interface is complex.
Pros and Cons
  • "The versatility of the product has allowed us to solve a number of perimeter requirements without having to seek out different products or companies for solutions."
  • "The configuration/management interface is complex and can be confusing."

What is most valuable?

  • Firewall mode
  • AnyConnect gateway
  • Client-less SSL VPN

How has it helped my organization?

The versatility of the product has allowed us to solve a number of perimeter requirements without having to seek out different products or companies for solutions. It has allowed for a single management mechanism, and by having a single platform solution, it has allowed for simpler training.

What needs improvement?

The configuration/management interface is complex and can be confusing. Technical documentation is often sparse and can be incomplete when covering specific implementations.

For how long have I used the solution?

I've used Cisco PIX and ASA firewalls since 2003.

What was my experience with deployment of the solution?

Not with the ASAs, with some early version PIX products.

What do I think about the stability of the solution?

Not with the ASAs, with some early version PIX products.

What do I think about the scalability of the solution?

The ASAs offer several different technologies for HA and we have used all of them successfully.

How are customer service and technical support?

Customer Service:

It's excellent.

Technical Support:

Excellent, we have always been able to get the specific expertise needed to solve our challenges with the products.

Which solution did I use previously and why did I switch?

Checkpoint Firewalls - the primary reason we switched was cost and limited support options.

How was the initial setup?

It's pretty straightforward. I came at these products already having considerable firewall experience.

What about the implementation team?

It was all in-house, as we all had 10 years plus experience when we moved to PIX firewalls and then a few years later we brought in the ASAs.

Which other solutions did I evaluate?

  • Watchguard
  • Sonicwall
  • Checkpoint

What other advice do I have?

The product line offers tremendous capability. Please look into all of the solutions it can provide for you to maximize your investment.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Constructor of the computer systems at a security firm with 51-200 employees
Vendor
May 29, 2015
It can be controlled through different methods but the online regional support needs improving.
Pros and Cons
  • "I can tell that when we have started using the Cisco AnyConnect for remote access to business apps it makes the work for remote staff much simpler."
  • "When Cisco was installed, it did not go as expected."

What is most valuable?

  • Reliability
  • Security
  • Flexibility
  • Functionality
  • Availability - controllability anywhere and with different methods

How has it helped my organization?

I can tell that when we have started using the Cisco AnyConnect for remote access to business apps it makes the work for remote staff much simpler. It's also easier to provide remote IT support. Aside from this, the security officers can sleep better now.

What needs improvement?

The ASA is an almost perfect device.

For how long have I used the solution?

I've used it for two years.

What was my experience with deployment of the solution?

I have had no problems deploying it.

What do I think about the stability of the solution?

Occasionally, the packet rate falls unexpectedly.

What do I think about the scalability of the solution?

I currently do not need to scale on my network.

How are customer service and technical support?

Customer Service:

9/10 - the regional online support could be better.

Technical Support:

10/10.

Which solution did I use previously and why did I switch?

We use MySQL and Nagios devices alongside the ASA as our network infrastructure needs expanding and required more serious hardware solutions.

How was the initial setup?

When Cisco was installed, it did not go as expected.

What was our ROI?

It is not simple to calculate for IT hardware. To calculate the ROI for using the ASA, I would need to have a lot of statistics on the quality of services, both before and after.

What's my experience with pricing, setup cost, and licensing?

Cisco ASA 5512-X was bought for $3,000, and a further $1,000 was needed for installation and pre-configuration.

Which other solutions did I evaluate?

  • Fortinet
  • Juniper

What other advice do I have?

As a rule, any device upon delivery is obsolete. Pick up the solution for your business, based on your specific needs.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user243897 - PeerSpot reviewer
Cisco Systems Engineer at a tech services company with 1,001-5,000 employees
Consultant
May 27, 2015
Review about Cisco ASA
Pros and Cons
  • "With FirePOWER services, we have been able to have more insight of our network, something that we never had before, now we can see all the applications that our users are using the most and we can see if there is malware on our network."
  • "With FirePOWER services, we have been able to have more insight of our network, something that we never had before, now we can see all the applications that our users are using the most and we can see if there is malware on our network."
  • "The FirePOWER defense system has no integration with the firewall management of the ASA, I mean you can’t create ACLS, rules, VPNS NAT, and so on."
  • "The FirePOWER defense system has no integration with the firewall management of the ASA, I mean you can’t create ACLS, rules, VPNS NAT, and so on."

What is most valuable?

  • Network firewall
  • FirePOWER services (URL filtering, IPS)

How has it helped my organization?

With the new FirePOWER services, Cisco has given the ASA new valuable features like URL filtering and a more simple and efficient IPS. With FirePOWER services, we have been able to have more insight of our network, something that we never had before, now we can see all the applications that our users are using the most and we can see if there is malware on our network.

What needs improvement?

The FirePOWER defense system has no integration with the firewall management of the ASA, I mean you can’t create ACLS, rules, VPNS NAT, and so on. All of this has to be done with the ASDM which, from my point of view, is very complex if you are not used to it, you should be able to manage the entire solution from one central software like Defense system, but right now you can’t. This is one of the biggest problems I see right now

For how long have I used the solution?

I've used it for two years.

What was my experience with deployment of the solution?

The FirePOWER deployment has to be done from the management port of the ASA. This port has to be dedicated because all the communication from the defense system to the appliance goes by that port, so you need to have different networks (inside and management port) to be able to implement this feature. It would be nice again if you can just configure this from one single point and not two (defense system and ASDM).

What do I think about the stability of the solution?

No, I have never had any problems with Cisco equipment regarding stability.

What do I think about the scalability of the solution?

No issues encountered.

How are customer service and technical support?

Customer Service:

8/10.

Technical Support:

6/10 - I mean you need luck when you open a case with Cisco to have someone with expertise on the product. I’ve had great TAC experiences and the worst ones too, if you have a loss of service they put you with people that know what they are doing, but if you want to configure something extra and you just ask the TAC how to do it, sometimes you get someone that appears to be learning the solution. Many times, I´ve been able to solve it by myself sooner than the TAC.

Which solution did I use previously and why did I switch?

We previously used Microsoft ISA and switched because it's no longer supported.

How was the initial setup?

In our case straightforward, because we do not have many rules on our firewall, but I’ve seen cases where the migration from one firewall to another can be very tedious.

What about the implementation team?

We did it in-house.

What other advice do I have?

If you are using Cisco, then you will be very familiar with the product, and maybe you won't encounter any problems at all. However, if Cisco is a new solution, you should ask for a demo to see the interface of the ASDM and the defense system in action, and then decide if this is the kind of insight you need of your network.

Disclosure: My company has a business relationship with this vendor other than being a customer. Premier partner.
PeerSpot user
it_user243879 - PeerSpot reviewer
Network Security Engineer at a tech services company with 1,001-5,000 employees
Consultant
May 25, 2015
There are some stability issues due to software bugs, but in the long run the devices are very stable.
Pros and Cons
  • "I have worked on the best firewalls in the market, and Cisco ASA is one of the best."
  • "One of the major disadvantages with the ASAs is the throughput, while the network evolves, the ASA was usually causing the bottle neck."

What is most valuable?

VPN - Both site to site (IPsec) and remote access (IPsec and SSL).

How has it helped my organization?

Through the use of VPNs, we were able to connect our branches together through the internet without the any additional cost.

What needs improvement?

  • Throughput
  • Price

For how long have I used the solution?

Since 2008, so seven years, and I have been a heavy/daily user, and all of my jobs were related to network security.

What was my experience with deployment of the solution?

No issues encountered.

What do I think about the stability of the solution?

Sometimes, due to software bugs, but in the long run the ASA is a very stable product when compared to other vendors firewall solutions.

What do I think about the scalability of the solution?

One of the major disadvantages with the ASAs is the throughput, while the network evolves, the ASA was usually causing the bottle neck.

How are customer service and technical support?

Customer Service:

It's very good when compared to other vendors.

Technical Support:

It's very good when compared to other vendors.

Which solution did I use previously and why did I switch?

Mainly switching from the old Cisco PIX to a new Cisco ASA. The reason for switching is to get a higher throughput, and due to the fact the that the Cisco PIX went EoL.

How was the initial setup?

It requires training, but after that it is straight forward.

What about the implementation team?

I work for a vendor, and we implement the solution for multiple customers.

Which other solutions did I evaluate?

Yes, and we chose Cisco ASA mainly due to the fact that they have a very good, reliable and very responsive technical customer support.

What other advice do I have?

I have worked on the best firewalls in the market, and Cisco ASA is one of the best.

The below screenshots are taken from a demo of ASDM.

Disclosure: My company has a business relationship with this vendor other than being a customer. Golden Cisco Partner
PeerSpot user
it_user242529 - PeerSpot reviewer
Network Consultant at a tech services company with 51-200 employees
Consultant
May 25, 2015
SourceFIRE has improved the IPS functionality, however, it could use better troubleshooting capabilities.
Pros and Cons
  • "In general the ASA has a great software stability reputation, and even though SourceFIRE for ASA is still young, the stability seems to be rather good."
  • "ASA5500 Series with firewall and CX - This I would rate as 5/10 due to fact that even though the firewall and VPN part is easy to manage and deploy, the CX is lacking in stability, and features."

What is most valuable?

With the ASA there are multiple products depending on your needs based on the two generations of the ASA. Roughly split-up there are 4 products.

  1. 5500 Series basic/standard firewall - This I would rate as 7/10 due to the fact that it's easy to use, manage and deploy. Its scalable SSL, and IPSec VPN options, and is lacking throughput
  2. 5500-X Series basic/standard firewall - This I would rate as 8/10 due to the fact that it's easy to use, manage and deploy. Its scalable SSL, and IPSec VPN options, and it has high throughput
  3. ASA5500 Series with firewall and CX - This I would rate as 5/10 due to fact that even though the firewall and VPN part is easy to manage and deploy, the CX is lacking in stability, and features. Also, it is rather complex to deploy. Add to this the CX lowers the throughput even further
  4. 5500-X Series with firewall and Sourcefire - This I would rate as 9/10 because it's easy to use, manage and deploy the firewall, VPN, and also the SourceFIRE. SourceFIRE works rather well and is by far the most advanced IPS system available. But it decreases the throughput more than you´d like

In general, I like both the SSL VPN and SourceFIRE. Firstly, for the VPN, both the client and client-less versions are very scalable, flexible, and dynamic in configuration and probably the best SSL VPN solution available in the marked. Secondly, SourceFIRE has improved the IPS functionality and stability of the ASA to a point where you can begin to enjoy the fruits of your solution and root out the bad seed in you network.

How has it helped my organization?

For many of my customers, the SourceFIRE solution has been an eye opener of exactly what their users are generating of traffic. Some customers, after reviewing the traffic application usage reports are astounded by the amount of traffic used, for example by Facebook and YouTube. My customers like the visibility into their network usage, and not necessarily wanting to block it, but just to know that they can control the network traffic and utilization if needed.

What needs improvement?

Definitely the throughput could use an upgrade when running the SourceFIRE/AMP with the ASA. Also, it could use better troubleshooting capabilities. You are, most of the time, bound to have access to TAC for troubleshooting advanced problems.

For how long have I used the solution?

Customers where I have deployed these solutions have had them for three plus years, and most of them have, at the present moment have first generation solutions, or are planning an upgrade to the second generation ones (NGFW or NGIPS),

What was my experience with deployment of the solution?

There are always issues when implementing key equipment like firewalls, especially if you are converting from an unfamiliar platform, activating SourceFIRE, or doing a general maintenance rule clear-up. If you don’t follow best practice, you can seriously impact network performance or unintentionally shut-down services.

What do I think about the stability of the solution?

In general the ASA has a great software stability reputation, and even though SourceFIRE for ASA is still young, the stability seems to be rather good. Of course you can’t avoid all issues, and you might have to reinstall the SourceFIRE software on the modules. If you're upgrading the ASA from pre code 8.3, you will need to redo the NAT and access rules of the ASA.

What do I think about the scalability of the solution?

License scalability for SourceFIRE is really not good if you have an ASA in HA as you need two licenses of everything, which is really bad as you wont get double SourceFIRE other than that you need to remember to buy your ASA based on the SourceFIRE's throughput and not the inspection throughput.

How are customer service and technical support?

Customer Service:

If you have a service contract with Cisco you can have TAC assistance, software upgrades and next-business-day RMA (or faster) otherwise you are left to yourself or your Cisco partner. Basically without a Cisco service contract, you can't get any help or software from Cisco.

Technical Support:

Should you have a Cisco service contract, you get access to TAC that will provide you technical assistance towards solving your issue. The TAC experience can vary a lot. In general I would rate it as very good, 4/5.

Which solution did I use previously and why did I switch?

Mainly customers switch from other vendor because of VPN features, ease-of-management, and good consultant/partner relationship.

How was the initial setup?

The initial setup is fairly easy and there are wizards for almost all the basic needs, including the initial setup and all types of VPN technologies that the ASA supports.

What about the implementation team?

I am the vendor, and I am an expert with ASA.

What other advice do I have?

Make sure you get the right product/license to do the job you need done. If you are in doubt ask a consultant or a Cisco Partner. I have seen cases where a firewall wasn't the right hardware for the job and you can't just switch off the firewall/inspector for some interfaces or networks.

Disclosure: My company has a business relationship with this vendor other than being a customer. Cisco Gold Partner
PeerSpot user
PeerSpot user
Network Security Administrator at a tech company with 5,001-10,000 employees
Vendor
May 21, 2015
There were some issues with the ASDM client during deployment but high availability is a valuable feature.
Pros and Cons
  • "It provided more secure access to the resources of my organization and created a more stable environment for the business activities between us and our partners."
  • "There were a few problems with the interaction between the ASDM client and ASA device."

What is most valuable?

  • Modular scalability
  • High availability
  • VPN services

How has it helped my organization?

It provided more secure access to the resources of my organization and created a more stable environment for the business activities between us and our partners.

What needs improvement?

Security through integrated cloud and software based services.

For how long have I used the solution?

I've used it for two years.

What was my experience with deployment of the solution?

There were a few problems with the interaction between the ASDM client and ASA device.

What do I think about the stability of the solution?

No issues encountered.

What do I think about the scalability of the solution?

No issues encountered.

How are customer service and technical support?

Customer Service:

10/10.

Technical Support:

9/10.

Which solution did I use previously and why did I switch?

I previously used a Fortinet solution. I switched to Cisco because Fortinet lacked
stability and robust troubleshooting features.

How was the initial setup?

It was complex because I had to put the ASA directly into the production environment.

What about the implementation team?

I implemented the solution in-house.

Which other solutions did I evaluate?

I also evaluated Juniper and CheckPoint solutions.

What other advice do I have?

You should try it without restraints, and it is worth every penny.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2026
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.