We have the Cisco 5585-X in our data center for perimeter security, internet protection, and for applications behind Cisco ASA DMZs. The challenges we wanted to address were security and segregating the internal networks and the DMZs.
Network Engineer at a tech vendor with 5,001-10,000 employees
Provides us with a critical piece of our in-depth security stack
Pros and Cons
- "The Packet Tracer is a really good tool. If someone calls because they're having problems, you can easily create fake traffic without having to do an extended packet capture. You can see, straight away, if there's a firewall rule allowing that traffic in the direction you're trying to troubleshoot."
- "One of the challenges we've had with the Cisco ASA is the lack of a strong controller or central management console that is dependable and reliable all the time."
What is our primary use case?
How has it helped my organization?
Security-wise, it's given us the protection that we were looking for. Obviously, we're using an in-depth type of design, but the Cisco ASA has been critical in that stack for security.
What is most valuable?
The Packet Tracer is a really good tool. If someone calls because they're having problems, you can easily create fake traffic without having to do an extended packet capture. You can see, straight away, if there's a firewall rule allowing that traffic in the direction you're trying to troubleshoot. As a troubleshooting tool, Packet Tracer is one of the things that I like. It comes up in all my interviews. When I want to figure out if someone knows how to use the ASA, I ask them about use cases when they use the Packet Tracer.
What needs improvement?
One of the challenges we've had with the Cisco ASA is the lack of a strong controller or central management console that is dependable and reliable all the time. There was a time I was using what I think was called CMC, a Cisco product that was supposed to manage other Cisco products, although not the ASA. It wasn't very stable.
The controller is probably the biggest differentiator and why people are choosing other products. I don't see any other reason.
Buyer's Guide
Cisco Secure Firewall
December 2025
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,259 professionals have used our research since 2012.
For how long have I used the solution?
I've used the Cisco ASA going back to the 2014 or 2015 timeframe.
What do I think about the stability of the solution?
The ASA has been very stable for us. Since I deployed the ASA 5585 in our data center, we've not had to resolve anything and I don't even recall ever calling TAC for an issue. I can't complain about its stability as a product.
Our Cisco ASA deployment is an Active-Standby setup. That offers us resilience. We've never had a case where both of them have gone down. In fact, we have never even had the primary go down. We've mainly used that configuration when we're doing code upgrades or maintenance on the network so that we have full network connectivity. When we're working on the primary, we can switch over to the standby unit. That type of resiliency works well for our architecture.
How are customer service and support?
TAC is good, although we've had junior engineers who were not able to figure things out or fix things but, with escalations, we have eventually gotten to the right person. We also have the option to call our sales rep, but we have never used that option. It seems like things are working.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
In the old days, we used Check Point. We did an evaluation of the Cisco ASA and we liked it and we brought it on board.
At that time, it was easy for our junior operations engineers to learn about it because they were already familiar with Cisco's other products. It was easier to bring it in and fit it in without a lot of training. Also, the security features that we got were very good.
How was the initial setup?
The one we deployed in the data center was pretty straightforward. I also deployed the Cisco ASA for AnyConnect purposes and VPN. I didn't have to call TAC or any professional services. I did it myself.
What about the implementation team?
We used a Cisco reseller called LookingPoint. I would recommend them. We've done a lot of other projects with them as well.
What was our ROI?
It's a great investment and there's a lot of value for your money if you're a CSO or a C-leader. As an engineer, personally, I have seen it work great wonders for us. When we're doing code upgrades or other maintenance we are able to keep the business going 100 percent of the time. We have definitely seen return on our investment.
What's my experience with pricing, setup cost, and licensing?
I don't look at the pricing side of things, but from what I hear from people, it's a little pricey.
Which other solutions did I evaluate?
At the time, we looked at Juniper and at Palo Alto. We didn't get a feeling of confidence with Palo Alto. We didn't feel that it offered the visibility into traffic that we were looking for.
What other advice do I have?
We use Cisco AnyConnect and we've not had any issues with it. During COVID we had to scale up and buy licenses that supported the number of users we had, and we didn't have any problems with it.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at a university with 1,001-5,000 employees
Its cybersecurity resilience has been top-notch and paramount for our organization
Pros and Cons
- "Cybersecurity resilience has been paramount. Because there is a threat of losing everything if ransomware or another sort of attack were to happen, the cybersecurity resilience has been top-notch."
- "I would like it if they made the newer generation a bit simpler. You can do ASA code and FXOS. It is just a bit confusing with the newer generational equipment on what it can do."
What is our primary use case?
We pretty much use it as our edge firewall and data center firewall.
We have a colocation that is the center for all our campuses. That is where our edge firewall is. We use that for VPN as well, and it was a great thing during the pandemic because we were already ready to go with VPN. We didn't have to do anything extra on that part.
How has it helped my organization?
The solution has really enabled us to ensure our university is secure.
Cybersecurity resilience has been paramount. Because there is a threat of losing everything if ransomware or another sort of attack were to happen, the cybersecurity resilience has been top-notch.
What is most valuable?
The multi-context feature is the most valuable, especially in our data center. Having different needs for different departments is part of our organization. We can have five firewalls in one.
What needs improvement?
I would like it if they made the newer generation a bit simpler. You can do ASA code and FXOS. It is just a bit confusing with the newer generational equipment on what it can do.
For how long have I used the solution?
I have been using this solution for five years.
What do I think about the stability of the solution?
I would rate the stability as 10 out of 10.
We do maintenance for software updates, etc. I don't think we have had any major hardware failures.
What do I think about the scalability of the solution?
We haven't had to really scale up too much.
How are customer service and support?
The technical support is excellent. Every time that we have ever had an issue, we got a result very quickly. I would rate them as nine out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have always had ASA since I have been at the company. The ASAs were in place and we have upgraded to newer ASA Next-Generation Firewalls.
What's my experience with pricing, setup cost, and licensing?
I am not a huge fan of Cisco licensing in general. However, I wasn't really involved with the pricing. That decision was made a little higher than me.
Which other solutions did I evaluate?
We are in the middle of an upgrade to the newer Firepowers.
We have used Palo Alto for another solution and they have a better firewall. It is a whole new GUI to learn. With Palo Alto, you simply get one code, then that is your firewall. With the newer Firepowers, there are two or three different ways that you can run it. So, we currently have our data center running in ASA code, then we are doing it a different way with our edge ASA. My supervisor has complained about all the different ways that the new hardware can be configured and installed.
What other advice do I have?
Stay more up-to-date with equipment. The old equipment is what will get you, e.g., leaving Windows 7 machines on your network or 15-year-old switches.
Heavily research what can do cluster mode, HA pairs, etc. That is where we ran into the "gotchas". You have to run it in certain ways to have it clustered and run it another way to have it as an HA pair.
I would rate ASA Firewall as nine out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Cisco Secure Firewall
December 2025
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,259 professionals have used our research since 2012.
Senior Network Engineer at a manufacturing company with 1,001-5,000 employees
The VPN solution works much better than our previous solutions
Pros and Cons
- "So far, it has been very stable."
- "The user interface is a little clunky and difficult to work with. Some things aren't as easy as they should be."
What is our primary use case?
We are using it for border firewalls, VPN access, and site-to-site VPN tunnels.
It is deployed at a single location with about 2,500 users.
What is most valuable?
So far, the remote VPN access has been a perfect solution for our company.
What needs improvement?
The user interface is a little clunky and difficult to work with. Some things aren't as easy as they should be.
For how long have I used the solution?
I have been using it for five years.
What do I think about the stability of the solution?
So far, it has been very stable.
It does require maintenance. There is a team of two who manage it.
What do I think about the scalability of the solution?
We haven't scaled it much at this point.
How are customer service and support?
The technical support has been good so far. I would rate them as eight out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
The VPN solution works much better than our previous solutions.
We previously used Palo Alto. The switch was driven by Cisco's pitch.
How was the initial setup?
It was fairly straightforward. We stood it up side by side with our nesting firewalls. We did some testing during an outage window, then migrated it over.
What about the implementation team?
We used a partner, CDW, to help us with the deployment. Our experience with CDW was good.
Internally, it was just me for the deployment.
What's my experience with pricing, setup cost, and licensing?
The pricing seems fair. It is above average.
What other advice do I have?
Take the time to really learn it, then it becomes a lot easier to use.
I would rate the solution as eight out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior network security, engineer and architect at a computer software company with 5,001-10,000 employees
Decreased our downtime and enables us to get users connected faster and more easily
Pros and Cons
- "AnyConnect has been very helpful, along with the ability to use LDAP for authentication."
- "The ASAs are being replaced with the new Firepowers and they have a different type of structure in the configuration to be able to migrate from one to the other."
What is our primary use case?
We use it for VPN access for our two-factor authentication. We were looking to get access through AnyConnect, to gain access to devices behind boundaries and firewalls.
How has it helped my organization?
It has improved things greatly by giving us easier and better access, easier configuration, and allowing users to gain the access they need. We have also had less downtime using these firewalls.
What is most valuable?
AnyConnect has been very helpful, along with the ability to use LDAP for authentication. It's very robust and we are able to do many different things that we were looking to do.
What needs improvement?
The ASAs are being replaced with the new Firepowers and they have a different type of structure in the configuration to be able to migrate from one to the other.
For how long have I used the solution?
I have been using Cisco ASA Firewalls for 20 years.
What do I think about the stability of the solution?
The stability is very good. It has been a very stable environment. Since the new AnyConnect came out, it's been very easy to use and very much self-sufficient.
What do I think about the scalability of the solution?
You can vary scalability from very few users to thousands of users.
How are customer service and support?
Technical support has been very helpful at times, helping us to know what bugs and what things are getting fixed in the next releases.
How would you rate customer service and support?
Positive
How was the initial setup?
As an architecture team, we had a pretty good idea of what we wanted to do and how we wanted to do it, so it was pretty straightforward and easy. We have each one across many different avenues and many different boundaries, so each one took about a day to deploy.
We needed two to three people to deploy them and another one to go over some things to make sure everything was good to go.
There is routine maintenance, keeping it up to date and making sure the licensing versions are all good to go. We have a four-man team for maintenance and they work a regular shift of eight hours.
What about the implementation team?
We used a reseller, FedData. Our experience with them was good.
What was our ROI?
It took us about six months to see benefits from our ASA Firewalls. We've seen return on our investment in terms of the timeframe of downtime, and the ability to get users connected faster and more easily has been a big benefit.
What's my experience with pricing, setup cost, and licensing?
The pricing of the products isn't terrible. They're not too expensive. They're a little more expensive than other products, but you are getting the name, the company, and the support.
It's also nice that you can buy different avenues of licensing, depending on how you want to go about using them.
We buy a support license to get support if we have any issues or problems or need help on how we want to implement things.
Which other solutions did I evaluate?
We evaluated other options, but that was a long time ago. We went with Cisco because it is so robust as well as because they have been able to integrate their solutions into many different architectures. That makes their products easier to use.
What other advice do I have?
Each use case is different and things depend upon your cost analysis and how much you need. We have these firewalls in different avenues over about 30 different sites.
The biggest lesson from using the solution is being agile which has included learning to understand how to use the ASDM and figuring out how to configure everything—the little nuances—and what can and can't be done on the CLI.
These firewalls, along with the upcoming Firepower that they're being replaced by, are going to be very good assets for two-factor authentication and VPN access.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Network Architect at a tech services company with 10,001+ employees
A stable and secure solution that works well
Pros and Cons
- "Cisco tech is always good and helpful. I would rate them as 10 out of 10."
- "Cisco ASA is starting to get old and Firepower is taking over. All the good things happening are with Firepower."
What is our primary use case?
We are using it for security on everything from small customers to big data centers.
How has it helped my organization?
It is stable. We saw benefit from this in just a few days.
What is most valuable?
Cisco AnyConnect is my favorite. It is awesome. It also exists on Firepower and newer things.
What needs improvement?
Cisco ASA is starting to get old and Firepower is taking over. All the good things happening are with Firepower. Everything that I could wish for is in Firepower. We will probably not be doing too many new installations of ASAs since Firepower is mostly taking over.
For how long have I used the solution?
I have been using it for 15 to 20 years.
What do I think about the stability of the solution?
It is stable and secure. There are a few bugs, etc. Overall, we are very happy with it. We have never looked at anything else because it works so well. I would rate the stability as 10 out of 10. It is very good.
There is maintenance. We have to keep an eye out for software upgrades and forced changes to the configuration. We have a network operations team of 15 people who take care of these things from day to day.
What do I think about the scalability of the solution?
The solution's scalability is very good.
We use it on customers who have two employees up to customers with 5,000 employees. It is also used for customers who have one site or several sites. It is all over the place
How are customer service and support?
Cisco tech is always good and helpful. I would rate them as 10 out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I didn't use another solution previously.
How was the initial setup?
All our deployments have been different. Some have been really easy and others have been really complex. It could go either way: some are complex and some are easy. The complex solutions could take days or a couple of weeks to deploy. Easy solutions take a day.
If it was a big project, there would be a pre-project identifying what we were going to do and making a plan for it, then we would realize that plan. If it was a smaller thing, we would just jump into it.
What about the implementation team?
It was deployed in-house. Depending on the solution and its complexity, it could take a single person to a team of 20 people to deploy it.
What was our ROI?
Our return on investment is having a network that we don't need to think too much about. It works, and that is it.
What's my experience with pricing, setup cost, and licensing?
Cisco is always expensive, but you get what you pay for. It is expensive for a reason. It is a good solution, and good solutions cost money.
AnyConnect is an extra license. If you want the IDS/IPS things, those are usually extra too.
Which other solutions did I evaluate?
I evaluated Check Point, Palo Alto, and Fortinet, but Cisco won the race. Since we were already running most of our other networking with Cisco, it felt natural to land on Cisco.
What other advice do I have?
I would rate the solution as 10 out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
VP Network Engineering at a computer software company with 501-1,000 employees
As both perimeter and internal firewalls, they provide traffic inspection, packet analysis, and decryption
Pros and Cons
- "It just works for us."
- "Cisco is still catching up with its Firepower Next-Generation firewalls."
What is our primary use case?
We use it for perimeter and internal firewalls. We wanted a firewall with traffic inspection, packet analysis, and decryption.
Our deployment is on-prem and hybrid. We don't use it in the cloud as we use other vendors for that.
How has it helped my organization?
I'm not sure the firewall has improved our organization because a firewall is a must. It's something that you pick up and then trust. It just works for us.
What needs improvement?
Cisco is still catching up with its Firepower Next-Generation firewalls. It's naturally growing and getting better.
For how long have I used the solution?
I've been using Cisco ASA Firewalls for 15 years.
What do I think about the stability of the solution?
It's stable.
What do I think about the scalability of the solution?
It's used around the world. We have 20 data centers and each data center handles six offices. We have Cisco in every single location. If something new comes up, we'll increase our usage of the product.
How are customer service and support?
Cisco's technical support is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We're a multi-vendor shop when it comes to firewalls, and we use Check Point and Palo Alto in addition to Cisco. We used to have Fortinet but that amounted to too many vendors.
When the Cisco product changed from legacy traffic inspection to the new Firepower it became a next-generation firewall. It was just a new product. That's why we decided to try it and stay with Cisco. It's like two different products: the legacy product and the new one. The legacy product was much simpler and the new one is, obviously, more complex.
How was the initial setup?
I'm a designer, so I don't do racking and stacking, but I'm hands-on when it comes to configuration. I have used this product for years, so for me, it's not like adding a brand new product. It is just a matter of adding features, a hardware refresh. I wouldn't call it a challenge.
For maintenance, we have two to three network engineers involved.
What's my experience with pricing, setup cost, and licensing?
The pricing of Cisco firewalls, in the security market, is fair. Their pricing of other products is questionable, but for firewalls, it's fine.
What other advice do I have?
Compare Cisco ASA with other vendors' products and compare the features one-on-one. Pay special attention to the security portion, such as traffic inspection. That's probably the most important aspect. And then look at performance.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Analytical Engineer at a pharma/biotech company with 10,001+ employees
Keeps away threats trying to come into my organization
Pros and Cons
- "With the pandemic, people began working from home. That was a pretty big move, having all our users working from a home. More capacity needed to be added to our remote VPN. ASA did this very well."
- "It can be improved when it comes to monitoring. Today, the logs from the firewalls could be improved a bit more without integrating with other devices."
What is our primary use case?
We are using it for our VPN. We have a remote VPN and then a VPLS connection. Overall, it is a pretty big design.
We were looking for an opportunity to integrate our Firepower with Cisco ASA.
We mainly have these appliances on the data center side and in our headquarters.
How has it helped my organization?
It did help my organization. The firewall pretty much covers most stuff. They have next-gen firewalls as well, which have more threat analysis and stuff like that.
The firewall solution is really important, not just for our company, but for every organization. It keeps away threats trying to come into my organization.
With the pandemic, people began working from home. That was a pretty big move, having all our users working from a home. More capacity needed to be added to our remote VPN. ASA did this very well.
What is most valuable?
The most valuable features are the remote VPN and site-to-site VPN tunnels.
I use the solution to write policies and analyze the data coming in via the firewalls.
What needs improvement?
It can be improved when it comes to monitoring. Today, the logs from the firewalls could be improved a bit more without integrating with other devices.
I would like to see more identity awareness.
For how long have I used the solution?
I have been using it for over six years.
What do I think about the stability of the solution?
The stability is pretty good. They are keeping up the good work and making updates to the current platform.
How are customer service and support?
The support is good. They have been there every time that we need them. I would rate them as nine out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have used Check Point and Palo Alto. We are still using those but for more internal stuff. For external use, we are using the Cisco client.
How was the initial setup?
The initial deployment was straightforward. We have worldwide data centers. For one data center, it took three days from design to implementation.
What about the implementation team?
It was a self-deployment. It took eight people to deploy.
What's my experience with pricing, setup cost, and licensing?
It was pretty good and not expensive on the subscription side. Cisco is doing a good job on this.
Which other solutions did I evaluate?
We also evaluated Zscaler, which is more cloud-based. It was pretty new and has a lack of support on the system side.
What other advice do I have?
They have been keeping up by adding more features to the next-gen and cooperating with other vendors.
I would rate this solution as nine out of 10. It is pretty good compared to its competitors. Cisco is doing well. They have kept up their old traditional routing and fiber policies while bringing on new next-gen features.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at a printing company with 11-50 employees
It is secure and very reliable
Pros and Cons
- "The TAC is always very helpful. We pay for Tier 1 support, so we get whatever we need from them. They always give us a solution. If they can't give us an answer that day, they get back to us within at least 24 hours with a solution or fix. I have never had a problem with the TAC. I would rate them as 10 out of 10."
- "We wanted to integrate Firepower with our solution, but it didn't have the capability to accommodate our bandwidth since they only had two 10 gig interfaces on the box. We run way more than that through our network because we are a service provider, providing Internet to our customers."
What is our primary use case?
We use it as a security solution. It is our firewall.
We run three data centers and have three ASAs at each data center.
What is most valuable?
It is pretty user-friendly and straightforward to use.
It is secure and very reliable.
I like the heartbeat between the two devices that we have. Because if something fails, it immediately fails over.
For how long have I used the solution?
I have been using ASAs for 15 years at two different companies.
What do I think about the stability of the solution?
Cybersecurity resilience has been outstanding because it is very stable. There are not a whole lot of upgrades that we need to do for the firmware.
Four engineers support it. From time to time, there are firmware upgrades that we need to keep up to date with. Sometimes, we need to run debugs to figure out what's going on with it, and if it needs a patch, then we will figure it out. Usually, Cisco has been really good about getting us that.
What do I think about the scalability of the solution?
Scalability is actually pretty exponential. In the grand scheme of things, we are a small network. We only have 15,000 subscribers. However, if we need to expand, it is reasonable.
How are customer service and support?
The TAC is always very helpful. We pay for Tier 1 support, so we get whatever we need from them. They always give us a solution. If they can't give us an answer that day, they get back to us within at least 24 hours with a solution or fix. I have never had a problem with the TAC. I would rate them as 10 out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We haven't really used anything different. The only thing that we run inline with Cisco ASAs is Barracuda Networks. We kind of run that in tandem with this firewall, and it works really well.
Which other solutions did I evaluate?
We wanted to integrate Firepower with our solution, but it didn't have the capability to accommodate our bandwidth since they only had two 10 gig interfaces on the box. We run way more than that through our network because we are a service provider, providing Internet to our customers.
What other advice do I have?
Do your homework and know what you are doing. Know how to use your product, stay current, and hire smart people.
I would rate the solution as eight out of 10.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Cisco Umbrella
Cisco Identity Services Engine (ISE)
Palo Alto Networks NG Firewalls
WatchGuard Firebox
Cisco Meraki MX
Check Point Quantum Force (NGFW)
Azure Firewall
SonicWall TZ
Cisco Secure Network Analytics
Sophos XGS
Fortinet FortiGate-VM
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?














