Jr. Engineer at a computer software company with 5,001-10,000 employees
Real User
User-friendly, easy to install with updates available online, and good support
Pros and Cons
  • "The interface is user-friendly."
  • "The cost is very high. Most organizations cannot afford it."

What is our primary use case?

In our organization, we are using it as an internal firewall.

What is most valuable?

It is already improved because all of the computer updates are available online. So, you can update, and I think that the ASA 5585 is already updated.

All of the licensing features can be upgrades.

The interface is user-friendly.

What needs improvement?

The cost is very high. Most organizations cannot afford it.

For how long have I used the solution?

We have been using the latest version of this solution for the last five years.

Buyer's Guide
Cisco Secure Firewall
May 2024
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
771,170 professionals have used our research since 2012.

What do I think about the stability of the solution?

It's a stable product.

What do I think about the scalability of the solution?

It's a scalable solution. We have more than 2000 users in our organization.

How are customer service and support?

Technical support is fine, we have no issues.

How was the initial setup?

The initial setup was very easy. Cisco documentation is online, so it was no problem at all.

It took approximately 30 minutes to install.

What's my experience with pricing, setup cost, and licensing?

If we compare it with FortiGate and the co-existing ASA, FortiGate is better in terms of price.

What other advice do I have?

This is a product that I can recommend to others.

I would rate this solution a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Group Information Technology Manager at a mining and metals company with 201-500 employees
Real User
Provides great VPN and firewall features; very stable
Pros and Cons
  • "VPN and firewall are good features."
  • "Lacks a good graphical user interface."

What is our primary use case?

I'm the group information technology manager and we are customers of Cisco. 

What is most valuable?

The best feature for me is the VPN and I also like the firewall. 

What needs improvement?

In terms of improvement, we'd like to see a good graphical user interface. I'd also like to see the initial setup simplified. In comparison, if I were to implement the Fortigate firewall from scratch, it's a fairly simple set up. That is not the case with the ASA firewall, where you really need to have the skill and know what you're doing.

For how long have I used the solution?

I've been using this solution for 18 years. 

What do I think about the stability of the solution?

The solution is stable, we haven't had any issues. If we need something, we go to a consultant. In terms of product stability, it works very well.

What do I think about the scalability of the solution?

We haven't made any changes since implementing and we haven't tried scaling.  

How are customer service and technical support?

We get our support from the resellers, not from Cisco. 

What other advice do I have?

For those who have the technical know-how with Cisco products, I would recommend going with the ASA firewall, but if you're new to the field and running a smaller business, deployment will be complicated. 

I would rate this solution a nine out of 10. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Cisco Secure Firewall
May 2024
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
771,170 professionals have used our research since 2012.
Senior Network Engineer at Johnson & Wales University
Real User
Very buggy, and was released before it was ready for market
Pros and Cons
  • "The firepower sensors have been great; they do a good job of dropping unwanted traffic."
  • "The software was very buggy, to the point it had to be removed."

What is our primary use case?

We had legacy Sourcefire Sensors and ASA state full firewalls.

Cisco offered the FTD NGFW solution, but the implementation of the two systems was not successful.

How has it helped my organization?

The firepower sensors have been great; they do a good job of dropping unwanted traffic.

What is most valuable?

The VDB updates run on schedule, so less hands-on configuration is needed.

What needs improvement?

The software was very buggy, to the point it had to be removed.

We are moving completely away from Cisco NGFW.  The product was pushed out before it was ready.

For how long have I used the solution?

We have been using this solution for twelve years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
IT Manager with 51-200 employees
User
Once configured to suit your needs, these firewalls are rock solid appliances
Pros and Cons
  • "Once configured to suit your needs, these firewalls are rock solid appliances."
  • "These firewalls are not for beginners."

These firewalls are used in enterprise level environments, which require granular control and customization to meet security and compliance guidelines for an organization. Once configured to suit your needs, they are rock solid appliances. 

These firewalls are not for beginners. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Presales Consultant at a tech services company with 51-200 employees
Consultant
One of the most valuable features is the correlation of events -- including the path that a file is taking in the network and its integration with the endpoint protection.

What is most valuable?

Classic ASA features such as NAT, Stateful Firewall, and VPN are basic functions for average organizations, but next generation features such as the granular control of port hopping applications, IPs, and malware protection are mandatory, considering current advanced security threats.

One of the most valuable features is the correlation of events, including the path that a file takes in the network and its integration with the endpoint protection. This gives you the chance to take some actions in the case a breach happens.

How has it helped my organization?

Visibility in the network traffic.

What needs improvement?

Management console – Firesight Management Center.

When deploying Cisco FMC versions 6.0 and 6.1, some issues may appear when trying to register ASA sensors. The problem needs Cisco TAC involvement, adding more effort and time. I guess this will be fixed in version 6.2.

For how long have I used the solution?

I've used this solution for three to five years.

What do I think about the stability of the solution?

Some releases of the unified image (FTD – Firepower Threat Defense – Cisco ASA + Sourcefire IPS) are not very stable, but things are getting improved.

What do I think about the scalability of the solution?

Some clustering functions are not available in the unified image.

How are customer service and technical support?

Excellent.

Which solution did I use previously and why did I switch?

Old ASA 5500. Natural upgrade to next generation functions.

How was the initial setup?

Initial setup is pretty straightforward.

What's my experience with pricing, setup cost, and licensing?

The licensing model has been simplified and is easy to understand. The price is higher compared to UTM solutions, such as Fortinet, but in the same range as Checkpoint and Palo Alto.

Which other solutions did I evaluate?

We also work with Palo Alto Networks, Fortinet, FireEye, and some other vendors.

What other advice do I have?

Take a look at the features included in the unified image. Some classic ASA functionality has not been integrated yet, go for non-unified image if the deployment requires something that is not available – classic ASA iOS plus Sourcefire code.

Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
IT Operation Manager
Real User
Provides software updates for known bugs and vulnerabilities.

What is most valuable?

  • Hardware reliability
  • Software stability
  • Quick software updates for known bugs/vulnerabilities

These are very important in an enterprise environment.

How has it helped my organization?

It is small. Nobody knows where it is or what it is. It works silently. As there ar no issues, it is good for businesses and organizations.

What needs improvement?

  • License politics
  • License price
  • Precise vendor roadmap for this product

For how long have I used the solution?

I have used Cisco ASA for five years.

What do I think about the stability of the solution?

We have not had stability issues.

How are customer service and technical support?

I would give them a high rating.

Which solution did I use previously and why did I switch?

We were using TippingPoint as an IPS and ZyXEL ZyWALL as a VPN server.
Cisco has good documentation and it is easy for Cisco certified engineers.

How was the initial setup?

The initial setup was straightforward.

What's my experience with pricing, setup cost, and licensing?

Our experience last year showed us that there is no full security, so why should we pay more? Any security vendor with a user-friendly interface, with good support, on-time updates for known vulnerabilities, and reliable hardware, is acceptable for an organization.

Which other solutions did I evaluate?

We did not evaluate any alternatives.

What other advice do I have?

The Cisco ASA product line will be replaced by Cisco FTD. Cisco FTD software is not ready for production, due to a lack of many basic NGFW features. Maybe only the high-performance Firepower 41xx/21xx/90xx Series is good as an IPS, because it is using a stable Sourcefire engine.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Senior Network Engineer at a tech services company with 1,001-5,000 employees
Consultant
The new NAT configuration is difficult to understand. The ASDM has significantly improved over the years.

Valuable Features

The ASDM has significantly improved over the years. Real-time logging and filtering is useful. Firewall rules are easy to understand, and enable/disable.

Room for Improvement

Change from Java for ASDM to HTML5. Better options to enable/disable site-to-site VPN tunnels.

Use of Solution

8 years

Deployment Issues

The new NAT configuration is difficult to understand especially for people familiar with the pre v8.3 code.

Customer Service and Technical Support

Customer Service:

Cisco TAC is good. They will set up a remote viewing session so they can work on the firewall as if they are sitting next to you.

Technical Support:

Typically fast and useful.

Implementation Team

In-house team.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Senior Manager of Network at a tech company with 1,001-5,000 employees
Real User
ASA5505 Multipurpose Robust Firewall for small office or small organization requiring for network security

Cisco ASA 5505 overview
Selecting a new fire wall is matter of individual requirements and preferences. For small office it is economical to have a single device having small switch and firewall capability. Cisco ASA 5505 is perfectly suitable for small office as it has 8 port connecting end device switch and two of which have PoE capability for connecting cisco ip phones or external wireless access point. Has a expansion slot for connecting IPS (Intrusion prevention System). Additional IPS card (AIP SSC-5), IPS protects form virus, worms Trojans, DDoS attacks. This all features makes it a truly multipurpose firewall for small office.

Pros:

1) Is small in size and light in weight, requires less space suitable for small office.
2) Has integrated 8 port Switch so no need to purchase additional switch.
3) Has 2 PoE ports, so IP phones or external wireless access points can be connected.
4) If IPS card is installed it gives protection form vires, Trojan and worms and DDoS.
5) It supports 3 vlan, traffics can be separated per vlan.
6) Can be easily configured through SDM
7) Last but not the least it is very robust system once installed it dose not need much attention.

Cons:
1) ASA5505 does not support expansion.
2) ASA5505 dose not support fail over ( Aacive / active or active/ standby)
3) ASA5505 does not support multimode.
4) Heavy CPU load and packet latency due to addition of IPS.
5) The ASA 5505 does not support Spanning Tree Protocol for loop detection in the network.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user1020 - PeerSpot reviewer
it_user1020Head of Data Center at a tech company with 51-200 employees
Vendor

We have a 5520 with IPS installed. You are right about the CPU load with the IPS addition. It really maximizes the CPU utilization of the system, which can be a cause for concern. We've also have the IPS fail at some point due to a vulnerability. It was later patched with a firmware upgrade.

Fairly expensive, but will get the job done if you know how to configure it. Also recommend to have an HA set-up if protecting critical infrastructure. Might be expensive, but probably a good addition if you already have a Cisco-dominated environment. You should have it protecting you from the outside and use a separate in-line IPS if you want to protect the inside network.

See all 2 comments
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2024
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.