I work for an engineering company that has multiple sites located in different locations, overseas and domestically in Pakistan. There are 30 to 35 sites connected to our network. We restrict the website at these locations using the Cisco Firepower module.
Specialist WINTEL Services at Descon Engineering Limited
Not completely integrated with Active Directory. I like its policy and objects feature.
Pros and Cons
- "The main thing that I love the most is its policy and objects. Whenever I try to give access to a user, I can create an object via group creation in the object fields. This way, I am not able to enter a user in the policy repeatedly."
- "The main thing that I love the most is its policy and objects; whenever I try to give access to a user, I can create an object via group creation in the object fields, so I do not have to enter a user in the policy repeatedly."
- "Cisco Firepower is not completely integrated with Active Directory. We are trying to use Active Directory to restrict users by using some security groups that are not integrated within the Cisco Firepower module. This is the main issue that we are facing."
- "I am happy with the web security. However, I am not happy with the groups, reports, and integration with Active Directory."
What is our primary use case?
What is most valuable?
The main thing that I love the most is its policy and objects. Whenever I try to give access to a user, I can create an object via group creation in the object fields. This way, I am not able to enter a user in the policy repeatedly.
What needs improvement?
Cisco Firepower is not completely integrated with Active Directory. We are trying to use Active Directory to restrict users by using some security groups that are not integrated within the Cisco Firepower module. This is the main issue that we are facing.
There are some other issues related to their reports where we want to extract some kind of user activity. When a user tries to connect to our website, we are unable to read its logs in a proper manner and the report is not per our requirement. These are two things that we are facing.
Per my requirements, this product needs improvement. For example, I want to use and integrate with Active Directory groups.
For how long have I used the solution?
We have been using it since last year.
Buyer's Guide
Cisco Secure Firewall
April 2026
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
886,719 professionals have used our research since 2012.
What do I think about the stability of the solution?
It is a stable product.
How are customer service and support?
I haven't tried to work with Cisco support.
Which solution did I use previously and why did I switch?
In the last 10 years, we were using the Barracuda Web Security. Compared with that product, I would give this solution six or seven out of 10 when compared to Barracuda. Barracuda has one of the best web security features, giving access to users by deploying a web agent on client computers at different sites.
Barracuda Web Security's hardware was obsolete so our management never tried to renew its license. That is why we are trying to use the Cisco Firepower module. We want to understand their web security gateways, web security logs, what it provides, and the kind of reporting it has. We are currently doing research and development regarding what features and facilities it provides us compared to our requirements.
What other advice do I have?
I am happy with the web security. However, I am not happy with the groups, reports, and integration with Active Directory.
We are using the web security, and only the web security feature. Therefore, if someone asked me to give them advice about the Cisco product, then I will definitely not recommend it since it is not fulfilling our requirement. We have different sites located domestically and at overseas sites, which is about 30 to 35 sites. It is not locating any of the clients. This is compared to the Barracuda web agent on the client computer, which is always connected to Barracuda with live IP addresses, pushing and pulling all the procedures and policies to that client and computer. This is why I will not recommend the product to anyone who has a similar situation to ours. .
I would love to use the product in the future, if my requirements are met.
I would rate the product as four out of 10.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Coordinador de TecnologÃa at a tech vendor with 1,001-5,000 employees
Provides us visibility and information about our Internet usage. However, it is complex to operate the solution.
Pros and Cons
- "The most valuable feature is the anti-malware protection. It protects the endpoints on my network."
- "The most valuable feature is the anti-malware protection; it protects the endpoints on my network."
- "The ease of use needs improvement. It is complex to operate the solution. The user interface is not friendly."
- "The ease of use needs improvement. It is complex to operate the solution. The user interface is not friendly."
What is our primary use case?
The primary use is as edge firewalls to the Internet.
We are only on-premise. There is still no cloud plan.
How has it helped my organization?
It provides visibility and information to the organization about what is being accessed on the Internet as well as the applications that it is protecting.
It is part of our security strategy.
What is most valuable?
- Anti-malware protection
- Web Filtering
- VPN Remote-Access
The most valuable feature is the anti-malware protection. It protects the endpoints on my network.
We use the application visibility and control feature of Cisco firewalls.
What needs improvement?
The ease of use needs improvement. It is complex to operate the solution. The user interface is not friendly.
For how long have I used the solution?
I have been using it for eight to 10 years.
What do I think about the scalability of the solution?
We have 200 users using this solution.
How are customer service and support?
The technical support is good, but it could be better. I would rate them as six out of 10.
How would you rate customer service and support?
Neutral
How was the initial setup?
The setup is not too complex. We implemented it on all our ports.
What about the implementation team?
We have five people on our cybersecurity team.
Which other solutions did I evaluate?
The solution's ability to provide visibility into threats is fine, but the Fortinet and Check Point solutions have better dashboards and information about visibility.
What other advice do I have?
We are also using Cisco AnyConnect, Umbrella (as a cloud proxy), and ISE. We have between five or six antivirus, proxy, anti-malware, data loss prevention, VPN client, and firewall tools.
I would rate this Cisco product as six out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner & Reseller
Buyer's Guide
Cisco Secure Firewall
April 2026
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
886,719 professionals have used our research since 2012.
Network & Security Engineer at Oman LNG L.L.C.
Protects from different types of attacks and saves management and troubleshooting time
Pros and Cons
- "It has a good security level. It is a next-generation firewall. It can protect from different types of attacks. We have enabled IPS and IDS."
- "It is a good product; it is easy to manage, but you need to have good experience and good knowledge, and you need to configure it properly."
- "Cisco FMC only supports Cisco products. If you have a large network with Cisco firewalls and other vendors' firewalls, such as Palo Alto, you can only manage Cisco products through Cisco FMC."
What is our primary use case?
We are using Firepower for outbound/inbound traffic control and management as well as for our internal security. We are using it for LAN security and VMware network security. It is a hardware device, and it is deployed on-prem.
Our target is to make our network 100% secure from the outside and inside traffic. For that, we are using the latest versions, updates, patches, and licenses. We have security policies to enable ports only based on the requirements. Any unnecessary ports are disabled, which is as per the recommendation from Cisco. For day-to-day activity monitoring and day-to-day traffic vulnerabilities, we have monitoring tools and devices. If there is any vulnerability, we can catch it. We are constantly monitoring and checking our outside and inside traffic. These are the things that we are doing to meet our target of 100% security.
We have a number of security tools. We have the perimeter firewalls and core firewalls. For monitoring, we have many tools such as Tenable, Splunk, etc. We have Cisco Prime for monitoring internal traffic. For malware protection and IPS, we have endpoint security and firewalls. The outside to inside traffic is filtered by the perimeter firewall. After that, it goes to the core firewall, where it gets filtered. It is checked at port-level, website-level, and host-level security.
We have the endpoint security updated on all devices, and this security is managed by our antivirus server. For vulnerabilities, we have a Tenable server that is monitoring all devices. In case of any vulnerability or attacks, we get updated. We are also using Splunk as SIEM. From there, we can check the logs. If any device is attacked, we get to know the hostname or IP address. We can then check our monitoring tool and our database list. We can see how this attack happened. We have configured our network into security zones. We have zone-based security.
How has it helped my organization?
It integrates with other Cisco products. We use Cisco ASA and Cisco FTD, and we also use Cisco FMC for monitoring and creating policies. For internal network monitoring purposes, we use Cisco Prime. We also use Cisco ISE. For troubleshooting and monitoring, we can do a deep inspection in Cisco FMC. We can reach the host and website. We can also do web filtering and check at what time an activity happened or browsing was done. We can get information about the host, subnet, timing, source, and destination. We can easily identify these things about a threat and do reporting. We can also troubleshoot site-to-site VPN and client VPN. So, we can easily manage and troubleshoot these things.
Cisco FMC is the management tool that we use to manage our firewalls. It makes it easy to deploy the policies, identify issues, and troubleshoot them. We create policies in Cisco FMC and then deploy them to the firewall. If anything is wrong with the primary FMC, the control is switched to a secondary FMC. It is also disconnected from the firewall, and we can manage the firewall individually for the time being. There is no effect on the firewall and network traffic.
Cisco FMC saves our time in terms of management and troubleshooting. Instead of individually deploying a policy on each firewall, we can easily push a policy to as many firewalls as we want by using Cisco FMC. We just create a policy and then select the firewalls to which we want to push it. Similarly, if we want to upgrade our firewalls, instead of individually logging in to each firewall and taking a backup, we can use Cisco FMC to take a backup of all firewalls. After that, we can do the upgrade. If Cisco FMC or the firewall goes down, we can just upload the backup, and everything in the configuration will just come back.
We can also see the health status of our network by using Cisco FMC. On one screen, we can see the whole firewall activity. We can see policies, backups, and reports. If our management asks for information about how many rules are there, how many ports are open, how many matching policies are there, and which public IP is there, we can log in to Cisco FMC to see the complete configuration. We can also generate reports.
With Cisco FMC, we can create reports on a daily, weekly, or monthly basis. We can also get information about the high utilization of our internet bandwidth by email. In Cisco FMC, we can configure the option to alert us through email or SMS. It is very easy.
What is most valuable?
It has a good security level. It is a next-generation firewall. It can protect from different types of attacks. We have enabled IPS and IDS. To make out network fully secure, we have zone-based security and subnets.
It is user-friendly with a lot of features. It has a CLI, which is helpful for troubleshooting. It also has a GUI. It is easy to work with this firewall if you have worked with any Cisco firewall.
With Cisco FMC, we can see the network's health and status. We can create a dashboard to view the network configuration, security policies, and network interfaces that are running or are up or down. We can also see network utilization and bandwidth utilization. We can see if there are any attacks from the outside network to the inside network. We can arrange the icons in the dashboard. For troubleshooting, we can also log in to the FMC CLI, and based on the source and destination, we can ping the firewall and the source.
For how long have I used the solution?
I have been using this solution for three to four years.
What do I think about the stability of the solution?
It is stable, but it also depends on whether it is properly configured or maintained. If you don't apply the proper patches recommended by Cisco, you could face a lot of issues. If the firewall is up to date in terms of patches, it works smoothly and is stable.
What do I think about the scalability of the solution?
There are no issues in terms of the number of users. This is the main firewall for the organization. All users are behind this firewall. So, all departments and teams, such as HR, finance, application team, hardware teams, are behind this firewall. All users have to cross the firewall while accessing applications and websites. They cannot bypass the firewall.
How are customer service and support?
Their support is good. If we have an issue, we first try to resolve it at our level. If we are not able to resolve an issue, we call customer care or raise a ticket. They investigate and give us the solution. If there is a hardware issue or the device is defective, we will get that part as soon as possible. They replace that immediately. If it is not a hardware issue, they check the logs that we have submitted. Based on the investigation, they give a new patch in case of a bug. They arrange for a technical engineer to come online to guide us and provide instructions remotely. They provide immediate support. I would rate their support a nine out of 10.
We have HA/standby devices. We have almost 70 to 80 access switches, and we have 30 to 40 routers, hubs, and other monitoring tools and devices. We keep one or two devices as a standby. We have a standby for each Cisco tool. We have a standby for the core and distribution switches and firewalls. We have a standby firewall. When there is any hardware issue or other issue, the secondary firewall is used, and the workload moves to the secondary firewall. Meanwhile, we work with Cisco's support to resolve the issue.
Which solution did I use previously and why did I switch?
For the past four to five years, we have only had Cisco firewalls. However, for some of the branches, we are using Palo Alto firewalls. It depends on a client's requirements, applications, security, etc.
How was the initial setup?
I didn't do the implementation. We have, however, upgraded to a higher version. From the Cisco side, we get the updates or patches using which we upgrade a device and do the configuration. We register the product model and serial number, and after that, we can download a patch. We also can get help from Cisco. It is easy to migrate or upgrade for us.
What about the implementation team?
We have vendor support. They are a partner of Cisco. When we buy the hardware devices, the vendor has the responsibility to do the implementation and configurations. We do coordinate with them in terms of providing the space and network details such as IP addresses, network type, subnets, etc. We also provide logical diagrams. We monitor the configuration, and after the configuration is done, we check how the network is working and performing.
We have an IT department that includes an applications group, a hardware group, and a security group. There are also Network Level 1, Level 2, and Level 3 teams. The Level 1 team only takes care of the network side. The Level 2 and Level 3 teams do almost similar work, but the Level 3 team is a bit at a higher level in IT security. The Level 2 and Level 3 teams take care of firewalls-level and security-level configuration, policy upgrade, etc. They manage all network devices. Overall, we have around 20 members in our department.
For the maintenance of Firepower, two guys are there. A Level 2 engineer takes care of policy creation and deployment for new networks. A Level 3 engineer takes care of a new firewall, upgrades, and network design and architecture.
What's my experience with pricing, setup cost, and licensing?
When we purchased the firewall, we had to take the security license for IPS, malware protection, and VPN. If we are using high availability, we have to take a license for that. We also have to pay for hardware support and technical support. Its licensing is on a yearly basis.
What other advice do I have?
It is a good product. It is easy to manage, but you need to have good experience and good knowledge, and you need to configure it properly.
Cisco FMC only supports Cisco products. If you have a large network with Cisco firewalls and other vendors' firewalls, such as Palo Alto, you can only manage Cisco products through Cisco FMC. Other vendors have their own management tools.
Most of the organizations nowadays are using the Cisco Firepower and Cisco ASA because of the high level of security. Cisco is known for its security. Cisco provides a lot of high-security firewalls such as Cisco ASA, Cisco FTD, Cisco Firepower. Cisco ASA 8500 came out first, and after that, new models such as Cisco FTD came.
I would rate Cisco Firepower NGFW Firewall a nine out of 10. It is excellent in terms of features, ability, and security. Whoever gets to work on Cisco Firepower, as well as Cisco ASA, will get good experience and understanding of security and will be able to work on other firewalls.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Director, IT Infrastructure Department at Zemen Bank S.C.
Provides role-based access, helps in securing our environment, and is easy to use
Pros and Cons
- "The remote access, VPN, and ACL features are valuable. We are using role-based access for individuals."
- "It is a security device, and it is useful for securing our environment."
- "Other products are becoming easier to access and configure. They are providing UI interfaces to configure, take backup, synchronize redundant machines, and so on. It is very easy to take backup and upgrade the images in those products. Cisco ASA should have such features. If one redundant machine is getting upgraded, the technology and support should be there to upgrade other redundant machines. In a single window, we should be able to do more in terms of backups, restores, and upgrades."
- "Cisco ASA doesn't provide training and certification for engineers without payments."
What is our primary use case?
We are using it as a firewall for our data center and headquarter. We are also using it for DR. We are using Cisco ASA 5500 Series.
How has it helped my organization?
It is a security device, and it is useful for securing our environment. It provides role-based access and other features and helps us in easily securing our environment.
It provides visibility. It has been helpful for packet inspection and logging activities for all kinds of packets, such as routing packets, denied packets, and permitted packets. All these activities are visible on Cisco ASA. There are different commands for logging and visibility.
We use Cisco ASA for the integration of the network. Our company is a financial company, and we are integrating different organizations and banks by using Cisco ASA. We are using role-based access. Any integration, any access, or any configuration is role-based.
What is most valuable?
The remote access, VPN, and ACL features are valuable. We are using role-based access for individuals.
IPS is also valuable for intrusion detection and prevention. It is a paid module that can be added. I'm using it for security, VLAN management, segregation management, and so on.
It is easy to use. In our region and our country, Cisco is well known, and most of the companies are using Cisco products. We have been using Cisco devices for a while, and our company primarily has Cisco devices. So, we are familiar with it, which makes it very easy to use for us. Even when we compare it with other products, it is easier to use.
It is easy for us to manage it because it is a familiar product, and it has been a part of our environment. Now, other products are providing free training, free access, and free license, because of which things are changing. So, you can easily become familiar with other products.
What needs improvement?
Its licensing cost and payment model can be improved. Cisco doesn't provide training and certification for engineers without payments. Other companies, such as Huawei, provide the training for free. Their subscription and licenses are also free and flexible. Other products are breaking the market by providing such features.
It doesn't support all standard interfaces. It is also not suitable for big companies with high bandwidth traffic. Its capacity should be improved.
Other products are becoming easier to access and configure. They are providing UI interfaces to configure, take backup, synchronize redundant machines, and so on. It is very easy to take backup and upgrade the images in those products. Cisco ASA should have such features. If one redundant machine is getting upgraded, the technology and support should be there to upgrade other redundant machines. In a single window, we should be able to do more in terms of backups, restores, and upgrades.
For how long have I used the solution?
We have been using this solution for almost eight years.
What do I think about the stability of the solution?
It is stable. It needs to be configured based on the standards and functionality. We have one device that has been working for more than 10 years, which indicates it is stable, but it requires licenses to upgrade features.
What do I think about the scalability of the solution?
It doesn't have an expansion card. So, it may not scalable for huge buildings. It also lacks a lot of standard interfaces. Other products are providing capacity for a data center. Other technologies are expanding their interface bandwidth from 10 gigs. In my opinion, Cisco ASA doesn't have this capability.
How are customer service and support?
Their support is very good. We have a support license, so their support is very good. They are tracing us and following up with us to solve the problem on time.
How was the initial setup?
Its setup is easy. We are familiar with Cisco ASA and other Cisco products, and they are easy to configure. A lot of resources are available on the internet, so it is easy to set up for anyone with basic training. It is easy in different types of environments, such as universities and colleges.
It generally doesn't take more than a day, but it also depends on the size of the organization. If an organization is very big and if you need a line-by-line configuration for access role and VPN, it can take a bit more time.
Cisco is constantly upgrading and providing features based on current requests. We usually plan deployments at the end of the year and at the beginning of the year. Everyone plans for new products, new configurations, and new expansions based on that.
What was our ROI?
Any security product provides a return on investment. Any gap in security may cost an organization more.
What's my experience with pricing, setup cost, and licensing?
It is expensive. There is a cost for everything. There is per year license cost and support cost. There is also a cost for any training, any application, and any resource. Things are very costly to do with Cisco.
Other brands are cheaper. They are also more flexible in terms of training, subscription, and licensing. They give lots and lots of years free. They provide more than Cisco.
What other advice do I have?
I would advise understanding its features, advantages, and disadvantages as compared to other solutions. It is simple, but its cost is a negative point.
I would rate Cisco ASA Firewall an eight out of 10.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Network Security Engineer at a tech services company with 11-50 employees
Its Snort 3 IPS gives us flexibility and more granular control of access
Pros and Cons
- "Its Snort 3 IPS has better flexibility as far as being able to write rules. This gives me better granularity."
- "We have seen ROI with a better, more secure environment."
- "I would like it to have faster deployment times. A typical deployment could take two to three minutes. Sometimes, it depends on the situation. It is better than it was in the past, but it could always use improvement."
- "It needs better patching and testing as well as less bugs."
What is our primary use case?
We are using it for firewall and intrusion prevention.
I have deployed it into different environments: retail, commercial, law, real estate, and the public sector. Retail is the biggest environment that I have deployed this firewall into, with 43 different sensors and a range up to 10 GbE throughput.
I am using up to version 7.0 across the board as well as multiple models: 1000 Series or 2100 Series.
How has it helped my organization?
The integration of network and workload micro-segmentation help us provide unified segmentation policies across east-west and north-south traffic. It is important to have that visibility. If you can't detect it, then you can't protect it. That is the bottom line.
The solution has enabled us to implement dynamic policies for dynamic environments. These are important because they give us flexibility and more granular control of access.
What is most valuable?
- Ease of operability
- Security protection
It is usually a central gateway into an organization. Trying to keep it as secure as possible and have easy to use operability is always good. That way, you can manage the device.
The solution has very good visibility when doing deep packet inspection. It's great because I can get packet captures out of the device. Because if an intrusion fires, I can see the packet that it fired in. So, I can dive into it and look at what is going on, what fired it, or what caused it.
Cisco Secure Firewall is fine and works when it comes to integration of network and workload micro-segmentation.
The integration of network and workload micro-segmentation is very good when it comes to visibility in our environment. It is about how you set it up and the options that you set it up for, e.g., you can be as detailed as you like or not at all, which is good.
Its Snort 3 IPS has better flexibility as far as being able to write rules. This gives me better granularity.
What needs improvement?
It needs better patching and testing as well as less bugs. That would be nice.
I would like it to have faster deployment times. A typical deployment could take two to three minutes. Sometimes, it depends on the situation. It is better than it was in the past, but it could always use improvement.
For how long have I used the solution?
I have been using it for seven years.
What do I think about the stability of the solution?
Stability has been good so far. It has been much better than in the past. In the past, there were times where there were known issues or bugs.
What do I think about the scalability of the solution?
Scalability has been fine. I haven't had an issue with it. I just haven't had a need to deal with scalability yet.
How are customer service and technical support?
I would rate Cisco's support for this solution as nine out of 10 for this solution. The support has been very good. We got the job done. Sometimes, why it wasn't perfect, the challenge was getting a hold of someone.
Which solution did I use previously and why did I switch?
I have used this solution to replace different vendors, usually Cisco ASA that is reaching end of life.
How was the initial setup?
The initial setup is straightforward for me at this point. That is just because of the experience that I have in dealing with it. for a new person, it would be a little bit more complex. They have gotten better with some of the wizards. However, if you are not familiar with it, then that makes it a little more challenging.
What about the implementation team?
Depending on the situation, we will go through the typical setups. We know what we want to configure and sort of follow a template.
What was our ROI?
We have seen ROI with a better, more secure environment.
Cisco Secure Firewall has helped us to reduce our firewall operational costs. This is based on the fact that the newer models, where we have been replacing older models, have better throughput, capacity, and performance overall.
What's my experience with pricing, setup cost, and licensing?
Pricing is the same as other competitors. It is comparable. The licensing has gotten better. It has been easier with Smart Licensing.
There are additional costs, but that depends on the feature sets that you get. However, that is the same with any firewall vendor at this point.
Which other solutions did I evaluate?
I have also worked with Check Point and Palo Alto. The support is much better with Cisco than Check Point. Check Point had a little bit better of a central management station. Whereas, Cisco with the FMC is a little different as far as there are still some features that are being added to the FMC, which is good. As far as Palo Alto goes, they are quite comparable as far as their functionality and feature sets. Cisco wins for me because it has Snort, which is a known standard for IPS, which is good. Also, Cisco has the Talos group, which is the largest group out there for security hunting.
Check Point was the easiest as far as user-friendliness and its GUI. After that, Cisco and Palo Alto would be kind of tied for ease of use.
What other advice do I have?
Definitely do your research, e.g., how you want to set it up and how deep you want to go in with it. This will actually help you more. When we say Cisco Secure Firewall, is it Next-Generation, running ASA, or running Firepower? Or, does Meraki actually fit in there? So, there are different scales based on what you are trying to look for and how deep security-wise you want to go into it.
SecureX is a nice feature, but it has to be for the right environment. It is nice that we get it, but most people don't take advantage of it.
The dynamic policy capabilities can enable tight integration with Secure Workload at the application workload level, but I am not using much with Secure Workload at this point.
I would rate Cisco Secure Firewall as nine out of 10. I would not give it a 10 because of bugs.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Partner
Senior Network Engineer at BCD Travel
User friendly and easy to use GUI, but stability and scalability need improvement
Pros and Cons
- "If you compare the ASA and the FirePOWER, the best feature with FirePOWER is easy to use GUI. It has most of the same functionality in the Next-Generation FirePOWER, such as IPS, IPS policies, security intelligence, and integration and identification of all the devices or hardware you have in your network. Additionally, this solution is user-friendly."
- "If you compare the ASA and the FirePOWER, the best feature with FirePOWER is easy to use GUI, as it has most of the same functionality in the Next-Generation FirePOWER, such as IPS, IPS policies, security intelligence, and integration and identification of all the devices or hardware you have in your network, and additionally, this solution is user-friendly."
- "We cannot have virtual domains, which we can create with FortiGate. This is something they should add in the future. Additionally, there is a connection limit and the FMC could improve."
- "The solution is not stable."
What is our primary use case?
We are currently using this solution as a VPN and an internet firewall in some locations. In our data center, we are still using FortiGate as an internet firewall but we are evaluating other options.
What is most valuable?
If you compare the ASA and the FirePOWER, the best feature with FirePOWER is easy to use GUI. It has most of the same functionality in the Next-Generation FirePOWER, such as IPS, IPS policies, security intelligence, and integration and identification of all the devices or hardware you have in your network. Additionally, this solution is user-friendly.
What needs improvement?
We cannot have virtual domains, which we can create with FortiGate. This is something they should add in the future. Additionally, there is a connection limit and the FMC could improve.
For how long have I used the solution?
I have been using Cisco Firepower NGFW Firewall for approximately three years.
What do I think about the stability of the solution?
The solution is not stable. There seems to be always some issues. This is not ideal when you are running a system in a data center environment.
What do I think about the scalability of the solution?
There is room for improvement in the scalability of this solution.
How are customer service and technical support?
I was satisfied with the support we received.
How was the initial setup?
When I did the installation three or four years ago it was challenging.
What's my experience with pricing, setup cost, and licensing?
This solution is expensive and other solutions, such as FortiGate, are cheaper.
Which other solutions did I evaluate?
I have evaluated FortiGate firewalls and when comparing with this solution there is no clear better solution, they each have their pros and cons.
What other advice do I have?
I would recommend a Next-Generation firewall. FortiGate has a Next-Generation firewall but I have never used it. However, it would be similar to the Cisco Next-Generation FirePOWER, which has most of the capabilities, such as running all the BDP sessions and having security intelligence in one system.
I would recommend everyone to use this solution.
I rate Cisco Firepower NGFW Firewall a six out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Assistant Director IT at Punjab Education Foundation
Scalable and fast but the initial setup could be easier
Pros and Cons
- "The product is quite robust and durable."
- "Overall, the solution works very well."
- "The graphical interface could be improved. From what I have seen, Fortinet, for example, has a nicer GUI."
- "The solution is quite expensive. Fortinet and other competitors are about half the price."
What is our primary use case?
We primarily use the solution as a firewall for our data centers. We have a medium-sized data center right now. It's about six or seven servers. We actually store the data for students and schools and need to protect it.
What is most valuable?
Overall, the solution works very well.
The solution is quite fast. We found that the speed was good and the throughput was good.
The stability has been very good.
The solution can scale as necessary.
The product is quite robust and durable.
What needs improvement?
The solution lacks the abilities of an FTD type which are the abilities we need, and they are not in the firewall. We're looking for a next-generation firewall instead.
The graphical interface could be improved. From what I have seen, Fortinet, for example, has a nicer GUI.
The solution needs to be easier to use. Right now, it's overly complicated.
The initial setup is a bit complex.
The cost of the solution is very high.
The product should add free URL filtering. It's another product, or part of another product, however, it should be available as part of this offering as well.
For how long have I used the solution?
I've been using this solution for about seven or eight years at this point. It's been a while.
What do I think about the stability of the solution?
The stability is excellent and the performance is good. There are no bugs or glitches. It doesn't crash or freeze. It's reliable.
What do I think about the scalability of the solution?
The product can scale nicely. If a company would like to expand it, it can do so.
We have about 10,000 schools use the solution in general, and 1,000 to 2,000 that use it simultaneously daily.
How are customer service and technical support?
I don't directly deal with technical support. Typically, that's something that others on the team deal with. We have our own team within the company that, if I run into issues, I would reach out to first. I can't speak to how helpful or responsive they are. I've never had a chance to contact them.
Which solution did I use previously and why did I switch?
I have not used other firewalls.
How was the initial setup?
The initial setup is not easy or straightforward. It's a bit complex and a little difficult.
We have three engineers on staff. They are capable of handling any maintenance.
What's my experience with pricing, setup cost, and licensing?
The solution is quite expensive. Fortinet and other competitors are about half the price. Cisco is very expensive in comparison. They need to work to be more competitive.
Which other solutions did I evaluate?
We're currently looking into a new firewall - something that is Next Generation. We don't know what it will be yet, however, we are considering Cisco, Fortinet, or Palo Alto.
It's my understanding that Fortinet is better in graphics and has a better user experience than Cisco, however, I haven't had a chance to test anything out.
What other advice do I have?
We're just a customer and an end-user.
We no longer have an SLA for this solution. We're potentially looking for something new.
I'd recommend the solution to others. It works well. It's durable and fast and you don't have to check up on it daily as it is rather reliable. That said, it is pricey.
In general, I would rate the solution at a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Information Security Analyst at a manufacturing company with 10,001+ employees
Useful access controls, reliable, and good support
Pros and Cons
- "I have found the most valuable feature to be the access control and IPsec VPN."
- "I have found the most valuable feature to be the access control and IPsec VPN."
- "When comparing the graphical interface of this solution to other vendors it is more difficult to configure. There is a higher learning curve for administrators in this solution."
- "When comparing the graphical interface of this solution to other vendors it is more difficult to configure."
What is our primary use case?
I am using this solution for monitoring incoming and outgoing network traffic. This includes many types of traffic, such as VPN users.
What is most valuable?
I have found the most valuable feature to be the access control and IPsec VPN. There are a lot of people moving towards the next-generation versions of firewalls which have some advanced features such as this one. You can define rules based on the application instead of how they are traditionally are done. There are more general and traffic controls, and additional features for intrusion prevention for malware analysis.
What needs improvement?
When comparing the graphical interface of this solution to other vendors it is more difficult to configure. There is a higher learning curve for administrators in this solution.
A lot of vendors, such as Palo Alto, are going toward cloud-based systems and Cisco should follow.
For how long have I used the solution?
I have been using this solution for approximately two years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
Since this is a hardware solution it does not scale as well as cloud versions. We have approximately 20,000 people using this solution in my organization.
How are customer service and technical support?
The support of this solution is very good.
What about the implementation team?
We have security specialists to manage the solution.
Which other solutions did I evaluate?
I have previously used FortiGate and Palo Alto solutions. When comparing them to this solution they have more standard features in their normal firewall this one does not.
What other advice do I have?
My advice to those wanting to implement the solution is to look at their use case and see if it meets those requirements for what they are looking for. There are a lot of security features that people may not be aware of and do not use. Explore the solution and all its features which will help you understand the configurations.
I rate Cisco ASA Firewall an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2026
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos Firewall
Cisco Umbrella
Cisco Identity Services Engine (ISE)
Palo Alto Networks NG Firewalls
WatchGuard Firebox
Check Point Quantum Force (NGFW)
Cisco Meraki MX
Check Point Harmony SASE (formerly Perimeter 81)
Azure Firewall
Cisco Secure Network Analytics
Cisco Secure Email
SonicWall TZ
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which Cisco firewall model is the latest: ASA or NGFW?
- Which is better - Fortinet FortiGate or Cisco ASA Firewall?













