PeerSpot user
Sales Manager at Entiresoft Technologies Pvt Ltd
Real User
VPN load balancing has been essential for my connections to integrate via multiple time zones
Pros and Cons
  • "VPN load balancing has been particularly essential for my connections to integrate via multiple time zones."
  • "I needed to be well-versed with all the command lines for Cisco ASA in order to fully utilize it. I missed this info and wasted some operational costs."

What is our primary use case?

I am using Cisco ASA as the firewall for my business to guard the boundary of my business. It has been very helpful in my sector of media with my clients, essentially focusing on how secure their data is, especially when we are working on a few projects which involve multiple citations across Europe. 

Our content, which is the main asset for our firm, is pretty elusive behind the firewall of Cisco ASA.

How has it helped my organization?

It has improved my client's trust. 

What is most valuable?

VPN load balancing: This has been particularly essential for my connections to integrate via multiple time zones.

What needs improvement?

I needed to be well-versed with all the command lines for Cisco ASA in order to fully utilize it. I missed this info and wasted some operational costs. I would like to advise others to please be wary from the start.

Buyer's Guide
Cisco Secure Firewall
May 2024
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
771,212 professionals have used our research since 2012.

For how long have I used the solution?

Less than one year.

What was our ROI?

It was initially heavy on my pocket, but it soon actualised its worth.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer847167 - PeerSpot reviewer
Network and Securirty Engineer at a tech vendor with 501-1,000 employees
User
Filtering is the best feature
Pros and Cons
  • "Filtering is the best feature."
  • "The IPS and GUI are outdated."
  • "It is slowly not supported and other vendors are a few years ahead of Cisco in development."

What is our primary use case?

We use it for security of branch offices and data centers. 

How has it helped my organization?

It works like a firewall for security reasons. 

What is most valuable?

Filtering is the best feature, as I have gotten used to using it.                               .

What needs improvement?

The IPS and GUI are outdated. It is finally getting IPS inside, which will be a big improvement. The GUI is outdated, and they are slowly improving it. We will see if they go in the correct direction. Unfortunately, they usually just follow other vendors.

It is slowly not supported and other vendors are a few years ahead of Cisco in development.  

For how long have I used the solution?

More than five years.

What other advice do I have?

Configuration on Firepower is currently madness as you have to redeploy it again with all its configurations if you use it as a module.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Cisco Secure Firewall
May 2024
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
771,212 professionals have used our research since 2012.
PeerSpot user
Security Engineer at a tech services company with 201-500 employees
Real User
Syslog generation and forwarding are good but it lacks many UTM features
Pros and Cons
  • "One thing I like about the product is the logging features, the way it logs, the way it forwards the logs in Syslog."
  • "It doesn't have a proper GUI to do troubleshooting, so most people have to rely on the command line."
  • "It should have packets, deep level inspections and controls, like the features which other IPS solutions used to have."
  • "Other firewalls, upgrading is a very easy task; from the graphical user interface, you just need to import the firmware versions into it and install it. In this firewall, you need to have a third-party solution in both. It's a process. It's a procedure, a hard procedure, actually, so there is no straightforward procedure for upgrading."

What is most valuable?

If you compare it with other products, other firewall products in the market, at this moment, it doesn't have that many features, no impressive feature in it, in fact. 

The one thing I like about the product is the logging features, the way it logs, the way it forwards the logs in Syslog. It generates the particular Syslog. Compared to other products, that is the only feature, I feel, that is good. I have worked with other firewall products, so I know it very well. The logs are pretty good. Then it forwards. When it forwards the logs to a third-party syslog server, it then writes the Syslog very well. That is the only feature I like about it.

What needs improvement?

It doesn't have a proper GUI to do troubleshooting, so most people have to rely on the command line.

Its a sort of legacy product nowadays. The firewalls which are the next generation have loads of features added to them, and they are all in one box.

It should have packets, deep level inspections and controls, like the features which other IPS solutions have. It just doesn't have any. It's just a box which does firewalling. 

Threat management features also should be added into it. 

So, the first thing is that the GUI has to be improved. The second thing is that the UTM features have to be added to it in a much broader way; not by relating to other third-party solutions which is how it is done right now. It should have built-in UTM features like other firewalls have now. Plus it should have the ability to analyze any packets which have malicious behaviors. Currently it doesn't have anything like that. It's just a layer-3 firewall.

Regarding the GUI, it's a very childish sort of attempt. It hasn't been improved since I started working with it. Yes, it shows the logs as they are but it doesn't have any option to do proper reporting.

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

Stability is really good, actually.

What do I think about the scalability of the solution?

Scalability is not that good, I think. Other firewalls, upgrading is a very easy task; from the graphical user interface, you just need to import the firmware versions into it and install it. In this firewall, you need to have a third-party solution in both. It's a process. It's a procedure, a hard procedure, actually, so there is no straightforward procedure for upgrading.

How are customer service and technical support?

I have never called the tech support, apart from a hardware issue, but that is done through the vendor, a third-party support team.

Which solution did I use previously and why did I switch?

I was actually using ASA and I switched to another one.

How was the initial setup?

I actually have lots of experience working on multiple firewalls and technical solutions, so for me I don't have any problem doing things by the command line. But for others, for a person who has two years of experience or one year of experience in general, they will definitely face issues working in the command line. You have to remember all of the commands, to search for the commands. If you're in a graphical user interface, you can go search somewhere and find some options. So I would say in that way it is complex.

What other advice do I have?

If I were to advise others who are looking into implementing this product I would say I don't think they will like it. They would be able to meet business requirements better with other products, other vendors' firewalls. That's what I think, that's what I know from my own experience, from dealing with customers.

If those features, which I mentioned above in the first few questions, if they can add those features into the firewall as a standalone box, it can definitely become a player on the stage. They already have a good platform, even if it's a legacy product, it has that bit of maturity. So if, on top of that very good platform, they can add those features - security, threat intelligence features - they can get back into the market.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Andrew S. Baker (ASB) - PeerSpot reviewer
Andrew S. Baker (ASB)Cybersecurity & IT Operations Professional (VirtualCxO) at BrainWave Consulting Company, LLC
Consultant

Hi Gary,

No, I hadn't seen that security product as yet. Interesting model they are trying to get on board with --- everyone wants to sell you a perpetual subscription...

See all 3 comments
PeerSpot user
Network Security Consultant at a tech services company with 51-200 employees
Real User
Reliable product which I'd like to see include a web filtering functionality.

Valuable Features

It blocks all outside to inside traffic and only permits the specific internet traffic from the outside. VPN functionality is very useful, we can create remote access and tunnel VPN in the simplest way.

Improvements to My Organization

It blocked all kinds of internet attacks from outside like DOS or DDOS and avoided any down time. We created a remote tunnel from head office to data center network for easy access of servers that make working fast and they are easily manageable.

Room for Improvement

It would be great if they would add web filtering functionality to this product.

Use of Solution

5 years

Deployment Issues

No

Stability Issues

No

Scalability Issues

No

Customer Service and Technical Support

Customer Service:

Excellent

Technical Support:

Good

Initial Setup

It is a little difficult in newer IOS versions where the use of the NAT command is different. Otherwise its straightforward to configure.

Implementation Team

I deployed it in-house with my team.

ROI

This solution reduces any downtime therefore business continuity is not disturbed - that is ultimately ROI.

Pricing, Setup Cost and Licensing

It is one time cost of about $10,000 and there is no day to day cost.

Other Solutions Considered

Yes, I evaluated Fortigate, SonicWall and Juniper but found Cisco ASA to be the best solution for us above all of the others.

Other Advice

Cisco ASA is a reliable product and it benefits you a lot in your network.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user242529 - PeerSpot reviewer
Network Consultant at a tech services company with 51-200 employees
Consultant
SourceFIRE has improved the IPS functionality, however, it could use better troubleshooting capabilities.

What is most valuable?

With the ASA there are multiple products depending on your needs based on the two generations of the ASA. Roughly split-up there are 4 products.

  1. 5500 Series basic/standard firewall - This I would rate as 7/10 due to the fact that it's easy to use, manage and deploy. Its scalable SSL, and IPSec VPN options, and is lacking throughput
  2. 5500-X Series basic/standard firewall - This I would rate as 8/10 due to the fact that it's easy to use, manage and deploy. Its scalable SSL, and IPSec VPN options, and it has high throughput
  3. ASA5500 Series with firewall and CX - This I would rate as 5/10 due to fact that even though the firewall and VPN part is easy to manage and deploy, the CX is lacking in stability, and features. Also, it is rather complex to deploy. Add to this the CX lowers the throughput even further
  4. 5500-X Series with firewall and Sourcefire - This I would rate as 9/10 because it's easy to use, manage and deploy the firewall, VPN, and also the SourceFIRE. SourceFIRE works rather well and is by far the most advanced IPS system available. But it decreases the throughput more than you´d like

In general, I like both the SSL VPN and SourceFIRE. Firstly, for the VPN, both the client and client-less versions are very scalable, flexible, and dynamic in configuration and probably the best SSL VPN solution available in the marked. Secondly, SourceFIRE has improved the IPS functionality and stability of the ASA to a point where you can begin to enjoy the fruits of your solution and root out the bad seed in you network.

How has it helped my organization?

For many of my customers, the SourceFIRE solution has been an eye opener of exactly what their users are generating of traffic. Some customers, after reviewing the traffic application usage reports are astounded by the amount of traffic used, for example by Facebook and YouTube. My customers like the visibility into their network usage, and not necessarily wanting to block it, but just to know that they can control the network traffic and utilization if needed.

What needs improvement?

Definitely the throughput could use an upgrade when running the SourceFIRE/AMP with the ASA. Also, it could use better troubleshooting capabilities. You are, most of the time, bound to have access to TAC for troubleshooting advanced problems.

For how long have I used the solution?

Customers where I have deployed these solutions have had them for three plus years, and most of them have, at the present moment have first generation solutions, or are planning an upgrade to the second generation ones (NGFW or NGIPS),

What was my experience with deployment of the solution?

There are always issues when implementing key equipment like firewalls, especially if you are converting from an unfamiliar platform, activating SourceFIRE, or doing a general maintenance rule clear-up. If you don’t follow best practice, you can seriously impact network performance or unintentionally shut-down services.

What do I think about the stability of the solution?

In general the ASA has a great software stability reputation, and even though SourceFIRE for ASA is still young, the stability seems to be rather good. Of course you can’t avoid all issues, and you might have to reinstall the SourceFIRE software on the modules. If you're upgrading the ASA from pre code 8.3, you will need to redo the NAT and access rules of the ASA.

What do I think about the scalability of the solution?

License scalability for SourceFIRE is really not good if you have an ASA in HA as you need two licenses of everything, which is really bad as you wont get double SourceFIRE other than that you need to remember to buy your ASA based on the SourceFIRE's throughput and not the inspection throughput.

How are customer service and technical support?

Customer Service:

If you have a service contract with Cisco you can have TAC assistance, software upgrades and next-business-day RMA (or faster) otherwise you are left to yourself or your Cisco partner. Basically without a Cisco service contract, you can't get any help or software from Cisco.

Technical Support:

Should you have a Cisco service contract, you get access to TAC that will provide you technical assistance towards solving your issue. The TAC experience can vary a lot. In general I would rate it as very good, 4/5.

Which solution did I use previously and why did I switch?

Mainly customers switch from other vendor because of VPN features, ease-of-management, and good consultant/partner relationship.

How was the initial setup?

The initial setup is fairly easy and there are wizards for almost all the basic needs, including the initial setup and all types of VPN technologies that the ASA supports.

What about the implementation team?

I am the vendor, and I am an expert with ASA.

What other advice do I have?

Make sure you get the right product/license to do the job you need done. If you are in doubt ask a consultant or a Cisco Partner. I have seen cases where a firewall wasn't the right hardware for the job and you can't just switch off the firewall/inspector for some interfaces or networks.

Disclosure: My company has a business relationship with this vendor other than being a customer: Cisco Gold Partner
PeerSpot user
it_user222999 - PeerSpot reviewer
Network Security Engineer at a tech services company with 51-200 employees
Consultant
Debugging messages are a valuable feature, but IPS needs to be added to the IOS.

Valuable Features

  • Scalability
  • Debugging messages
  • Context modes

Improvements to My Organization

Context modes as this means there is no need to buy additional firewall for different customers.

Room for Improvement

IPS, IDS, anti-virus etc. should be added to IOS instead of separate cards.

Use of Solution

I've used it for three years.

Deployment Issues

No issues encountered.

Stability Issues

No issues encountered.

Scalability Issues

No issues encountered.

Customer Service and Technical Support

Customer Service:

Dedicated experts are available in support contract with Cisco.

Technical Support:

100% skilled engineers with knowledge are available 24/7.

Initial Setup

It is straightforward.

Implementation Team

We implemented it in-house.

Pricing, Setup Cost and Licensing

It is £2,000 to set up, and the running costs, depend on the customers' issue(s) or tickets raised.

Other Solutions Considered

  • Juniper
  • FortiGate

Other Advice

Its a nice professional product with lots of scalability. Easy to troubleshoot and there is tool called PACKET TRACER which simulates the packet and it will tell you whether a packet is allowed inbound or outbound for testing purposes.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user234789 - PeerSpot reviewer
Chief Technical Officer at a comms service provider with 501-1,000 employees
Vendor
It has given us a very robust and well firewalled LAN.

What is most valuable?

  • Content filtering
  • VPN features
  • User interface is also very friendly

How has it helped my organization?

Users can VPN into the network from remote locations. It has given us a very robust and well firewalled LAN, that we use for authentication as well for our core network infrastructure.

For how long have I used the solution?

I've used it for seven years.

What was my experience with deployment of the solution?

No issues encountered.

What do I think about the stability of the solution?

It's a very stable product.

What do I think about the scalability of the solution?

No issues encountered.

How are customer service and technical support?

Customer Service:

It's good.

Technical Support:

It's good.

Which solution did I use previously and why did I switch?

No previous solution was used.

How was the initial setup?

It was a straightforward setup.

What about the implementation team?

Implementation was in-house as we have Cisco experts.

What's my experience with pricing, setup cost, and licensing?

The initial cost was approximately $6,000.

Which other solutions did I evaluate?

No other products were evaluated.

What other advice do I have?

ASA is a very reliable product and I have been using it since I cam across it. I strongly recommend the use of the product

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Senior MIS Manager at a tech company with 201-500 employees
Real User
Stable with great security and good scalability
Pros and Cons
  • "The solution is excellent for enterprise-level networks."
  • "If the implementation was easier, it would be a lot better for us."

What is our primary use case?

We tend to use the solution as it's forced on us by corporate. Our company wants us to use it.

What is most valuable?

The solution is stable. We haven't had any issues in that sense.

The security of the hardware is excellent. Cisco is very serious in its approach to security.

We have a high level of trust in Cisco and its products.

The solution is excellent for enterprise-level networks.

What needs improvement?

The solution is difficult to use. There's more required than a typical firewall. It's different than, for example, Palo Alto and Fortinet, which we find are easier to set up. 

If the implementation was easier, it would be a lot better for us.

It would be such a great product for us if it was easier to manage.

For how long have I used the solution?

I've been working with the solution for more than ten years. It's been a long time. It's been over a decade at this point.

What do I think about the stability of the solution?

The solution is quite stable. We have no problems with bugs or glitches. It doesn't crash or freeze. It's good.

What do I think about the scalability of the solution?

We've found the solution to be scalable. A company shouldn't have any issues with expanding it if it needs to.

We have about 300 users on the solution currently. We do plan to continue to use Cisco in the future.

How are customer service and technical support?

We use third-party technical support that's offered and we're quite satisfied with the level of attention we receive.

Which solution did I use previously and why did I switch?

I have knowledge of Palo Alto and Fortinet.

While those two are easier to set up and control, nothing compares to Cisco in terms of security. They're very strong in that regard. We also find Cisco to be more stable.

However, we only use Cisco firewalls in our organization. We don't use anything else.

How was the initial setup?

The implementation is not so straightforward. It's rather complex and we have a lot of trouble with it.

The implementation took us about one month.

We plan to implement an updated version next month as well.

We need three to eight people to handle the setup.

What about the implementation team?

I did not handle the implementation by myself. Rather, it's done by another team including the original support from Singapore and with license support from headquarters in Japan.

However, our team does handle the implementation in-house, and we can handle the setup for clients as well.

What's my experience with pricing, setup cost, and licensing?

We do need to purchase licenses. Those come from headquarters in Japan. They handle the details in terms of pricing. I'm not sure of the overall costs.

What other advice do I have?

We're both a customer of Cisco and a reseller.

This month we plan to upgrade from our existing hardware.

Overall, we've been happy with the results we've gotten. I would rate the solution at a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2024
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.