Starting in version 9.7 you could track a login history for audit purposes and, in 9.8, you are able to do active/backup HA with ASAv (Adaptive Security Virtual Appliance) deployed on MS Azure.
ESS Security with 201-500 employees
Allows us to implement active/backup HA with ASAv (Adaptive Security Virtual Appliance)
Pros and Cons
- "In v9.8 you are able to do active/backup HA with ASAv (Adaptive Security Virtual Appliance) deployed on MS Azure."
- "The relatively new Firepower Threat Defense image (mix of ASA and Sourcefire network security) fills a lot of gaps and features that were missing on ASA."
What is most valuable?
What needs improvement?
There is always room for improvement in virtually anything. However, the relatively new Firepower Threat Defense image (mix of ASA and Sourcefire network security) fills a lot of gaps and features that were missing on ASA. Moreover, with FMC (Firepower Management Console) you can complement it with even more admin and reporting capabilities for the entire platform.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
No stability issues.
Buyer's Guide
Cisco Secure Firewall
June 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
What do I think about the scalability of the solution?
No scalability issues.
How are customer service and support?
Excellent.
How was the initial setup?
New version comes with initial setup tutorial, with very nice security policies baseline, set up by default.
What's my experience with pricing, setup cost, and licensing?
Be sure of what features you are going to utilize to add/remove some from new bundles.
What other advice do I have?
Best value will always be delivered by adding FMC (Firepower Management Console); at least their virtual edition.
Disclosure: My company has a business relationship with this vendor other than being a customer. Distributor.
Consultant
Management Console and user profiling to define activities are key features
Pros and Cons
- "Management Console and user profiling to define activities."
- "As it’s a GenX firewall, expertise for both implementation and troubleshooting the pain points can be a challenge. This could be a concern when companies are thinking about buying this product."
How has it helped my organization?
It’s too early to say anything about this, as it’s still under implementation.
What is most valuable?
Management Console and user profiling to define activities.
What needs improvement?
As it’s a GenX firewall, expertise for both implementation and troubleshooting the pain points can be a challenge. This could be a concern when companies are thinking about buying this product.
For how long have I used the solution?
Still implementing.
What do I think about the stability of the solution?
Yes, unexpected failure and no RCA provided by the OEM.
What do I think about the scalability of the solution?
Still working on this.
How are customer service and technical support?
Technical support from OEM is a six out 10, as RCA report has still not been shared to date.
Which solution did I use previously and why did I switch?
Check Point. We moved to Firepower as an internal firewall to manage internal access and other network load.
How was the initial setup?
Straightforward, two-tire setup.
What's my experience with pricing, setup cost, and licensing?
All our requirements which we need performed by the firewall (e.g. VPN, URL white-listing, or IP based white-listing, etc.) have separate licenses and costs.
Which other solutions did I evaluate?
Yes, a couple of other of OEMs: Fortinet, Barracuda, etc.
What other advice do I have?
I rate it an eight out of 10, as it’s a new platform. Compared to Cisco ASA, it’s far better, per my usage to date.
Make sure you have an expert resource or subscribe to OEM technical support.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Cisco Secure Firewall
June 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Regional Manager - Pre Sales at a tech services company with 51-200 employees
Helps us to identify key, persistent threats so we can set policies accordingly
Pros and Cons
- "Its in-depth monitoring and analysis help us to make better decisions and policies."
- "Integration aspects and traffic shaping need improvement."
- "Initial setup can be complex. It is complex. We have to set up ASA, SFR module, and FMC separately, which sometimes requires extensive troubleshooting, even for smaller issues."
How has it helped my organization?
It helps us to identify key, persistent threats so we can set policies accordingly.
What is most valuable?
In-depth monitoring and analysis. It helps us to make better decisions and policies.
What needs improvement?
- Integration aspects
- Traffic shaping
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
Initially there were some stability issues, but in the long-run no.
What do I think about the scalability of the solution?
It requires additional licensing to enable 10G ports.
How is customer service and technical support?
Technical support is very good.
How was the initial setup?
It is complex. We have to set up ASA, SFR module, and FMC separately, which sometimes requires extensive troubleshooting, even for smaller issues.
Which other solutions did I evaluate?
We evaluated Huawei, briefly.
What other advice do I have?
It is a good datacenter firewall, as they have now overcome integration issues with latest versions.
Disclosure: My company has a business relationship with this vendor other than being a customer. Cisco Premier Partner.
Account Manager
Blocks malicious URLs, but bandwidth allocation and detection of new bugs need work
Pros and Cons
- "Malicious URLs are being blocked."
- "Bandwidth allocation needs improvement."
- "Critical bugs need to be addressed before releasing the version."
- "Virtual patching would be helpful for servers that are not able to update patches due to compatibility issues."
How has it helped my organization?
Malicious URLs are being blocked.
What is most valuable?
Advanced malware protection, it blocks malicious attacks.
What needs improvement?
- Bandwidth allocation.
- SSL decryption (avoid installing the intermediate device certificate in the client) should happen from Firepower itself.
- Critical bugs need to be addressed before releasing the version.
- Need to reduce the time to for detection of new threats.
- Enable a feature for importing/exporting logs when required for analysis.
- Dynamic IP address in client systems mapping with respect to OS change or device change should be updated periodically in FireSIGHT management.
- Virtual patching would be helpful for servers that are not able to update patches due to compatibility issues.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
Yes, there were stability issues due to memory issues in the cluster environment and Firepower misbehaved due to non-responding of service/process.
What do I think about the scalability of the solution?
No scalability issues.
How are customer service and technical support?
Good support.
Which solution did I use previously and why did I switch?
We switched from our previous solution because of scalability issues.
How was the initial setup?
It was straightforward, even though we migrated from a third-party to Cisco.
What's my experience with pricing, setup cost, and licensing?
Price should be judged based on the above answers, among the most capable vendors.
Which other solutions did I evaluate?
FortiGate.
What other advice do I have?
We are using ASA5585-X with Firepower SSP-20 (ASA version 9.6(1)3, Firepower version 6.1.0.5).
When looking at different solutions, take a deep look at the features.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Solutions Architect at a tech services company with 51-200 employees
A multitude of valuable features but a little pricey
Pros and Cons
- "Signature-based detection; user-defined signatures with regular expressions; integrated URL and content filtering; custom URL categories filtering."
How has it helped my organization?
Secured our network from outside and inside intruders.
What is most valuable?
- Network attack detection
- DoS and DDoS attack prevention
- Signature-based detection
- User-defined signatures with regular expressions
- Integrated URL and content filtering
- Custom URL categories filtering
- Integarted antrivirus
- Protocols scanning
What needs improvement?
License capacity needs to be extended and the vendor needs to work on the pricing.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
No stability issues.
What do I think about the scalability of the solution?
No scalability issues.
How are customer service and technical support?
10 out of 10.
Which solution did I use previously and why did I switch?
No, Cisco was part of our solution from the start.
How was the initial setup?
Straightforward.
What's my experience with pricing, setup cost, and licensing?
Value for your money, but bit a costly.
What other advice do I have?
Good product, give it a chance.
Disclosure: My company has a business relationship with this vendor other than being a customer. Solution Partner.
I.T Security Consultant
Once set up properly, it can run for a whole year without any major issues
Pros and Cons
- "The most stable firewall I’ve ever worked with. Once you get the ASA set up properly, it can run for a whole year without any major issues, apart from the normal daily administration."
- "The ASA needs to incorporate the different modules you have to integrate to achieve UTM functions, especially for small businesses."
What is most valuable?
This is our perimeter router. We used it purposely for NAT and to port forward traffic. Other essential features of a firewall are handled separately by a UTM.
What needs improvement?
The ASA needs to incorporate the different modules you have to integrate to achieve UTM functions, especially for small businesses.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
No stability issues at all, the most stable firewall I’ve ever worked with.
What do I think about the scalability of the solution?
No scalability issues.
How are customer service and technical support?
Quite good.
Which solution did I use previously and why did I switch?
We’ve always used ASA from the get go. We added the UTM is to compliment it.
How was the initial setup?
Straightforward.
What's my experience with pricing, setup cost, and licensing?
Pricing is why we had to go for a UTM. For us to achieve what we needed, if we had gone with the ASA, the cost would have been high compared to getting one box (UTM).
Which other solutions did I evaluate?
Juniper, Check Point, Astaro
What other advice do I have?
Go for it. I really like how, once you get the ASA set up properly, it can run for a whole year without any major issues, apart from the normal daily administration.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Technical Administrator at a tech services company
Since deployment, we have not encountered the attacks we had before
Pros and Cons
- "Manageability of Cisco ASA. It has a GUI interface, unlike the most of Cisco IOS. For beginners they can "sneak in" and apply the command and see the actual commands that the GUI launches. In addition, Cisco has the reputation regarding security."
What is our primary use case?
We have been using this model for three years, to place a firewall between ISPs and our corporate network. As of now, we have configured some SSL VPNs on our end for our convenience.
How has it helped my organization?
Three years ago we encountered malicious attacks from the internet, most of which were Chinese attackers, so we deployed Cisco ASA to strengthen our network. Since the deployment, we haven't seen the risk we encountered before.
What is most valuable?
Manageability of Cisco ASA. It has a GUI interface, unlike the most of Cisco IOS. For beginners they can "sneak in" and apply the command and see the actual commands that the GUI launches. In addition, Cisco has the reputation regarding security.
What needs improvement?
There are more powerful firewalls, other than the Cisco NGFW, like Fortinet, Palo Alto and so on. I can't say Cisco is the leading firewall brand as of now, as the technology innovates.
What do I think about the stability of the solution?
No stability issues yet.
What do I think about the scalability of the solution?
No scalability issues yet.
How is customer service and technical support?
Awesome.
What other advice do I have?
I rate it an eight out of 10.
I am only handling or supporting the ASA 5520 model in our company.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Engineer at a tech services company with 201-500 employees
Syslog generation and forwarding are good but it lacks many UTM features
Pros and Cons
- "One thing I like about the product is the logging features, the way it logs, the way it forwards the logs in Syslog."
- "It doesn't have a proper GUI to do troubleshooting, so most people have to rely on the command line."
- "It should have packets, deep level inspections and controls, like the features which other IPS solutions used to have."
- "Other firewalls, upgrading is a very easy task; from the graphical user interface, you just need to import the firmware versions into it and install it. In this firewall, you need to have a third-party solution in both. It's a process. It's a procedure, a hard procedure, actually, so there is no straightforward procedure for upgrading."
What is most valuable?
If you compare it with other products, other firewall products in the market, at this moment, it doesn't have that many features, no impressive feature in it, in fact.
The one thing I like about the product is the logging features, the way it logs, the way it forwards the logs in Syslog. It generates the particular Syslog. Compared to other products, that is the only feature, I feel, that is good. I have worked with other firewall products, so I know it very well. The logs are pretty good. Then it forwards. When it forwards the logs to a third-party syslog server, it then writes the Syslog very well. That is the only feature I like about it.
What needs improvement?
It doesn't have a proper GUI to do troubleshooting, so most people have to rely on the command line.
Its a sort of legacy product nowadays. The firewalls which are the next generation have loads of features added to them, and they are all in one box.
It should have packets, deep level inspections and controls, like the features which other IPS solutions have. It just doesn't have any. It's just a box which does firewalling.
Threat management features also should be added into it.
So, the first thing is that the GUI has to be improved. The second thing is that the UTM features have to be added to it in a much broader way; not by relating to other third-party solutions which is how it is done right now. It should have built-in UTM features like other firewalls have now. Plus it should have the ability to analyze any packets which have malicious behaviors. Currently it doesn't have anything like that. It's just a layer-3 firewall.
Regarding the GUI, it's a very childish sort of attempt. It hasn't been improved since I started working with it. Yes, it shows the logs as they are but it doesn't have any option to do proper reporting.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
Stability is really good, actually.
What do I think about the scalability of the solution?
Scalability is not that good, I think. Other firewalls, upgrading is a very easy task; from the graphical user interface, you just need to import the firmware versions into it and install it. In this firewall, you need to have a third-party solution in both. It's a process. It's a procedure, a hard procedure, actually, so there is no straightforward procedure for upgrading.
How are customer service and technical support?
I have never called the tech support, apart from a hardware issue, but that is done through the vendor, a third-party support team.
Which solution did I use previously and why did I switch?
I was actually using ASA and I switched to another one.
How was the initial setup?
I actually have lots of experience working on multiple firewalls and technical solutions, so for me I don't have any problem doing things by the command line. But for others, for a person who has two years of experience or one year of experience in general, they will definitely face issues working in the command line. You have to remember all of the commands, to search for the commands. If you're in a graphical user interface, you can go search somewhere and find some options. So I would say in that way it is complex.
What other advice do I have?
If I were to advise others who are looking into implementing this product I would say I don't think they will like it. They would be able to meet business requirements better with other products, other vendors' firewalls. That's what I think, that's what I know from my own experience, from dealing with customers.
If those features, which I mentioned above in the first few questions, if they can add those features into the firewall as a standalone box, it can definitely become a player on the stage. They already have a good platform, even if it's a legacy product, it has that bit of maturity. So if, on top of that very good platform, they can add those features - security, threat intelligence features - they can get back into the market.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Cisco Umbrella
Cisco Identity Services Engine (ISE)
Palo Alto Networks NG Firewalls
Check Point NGFW
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Sophos XGS
Fortinet FortiGate-VM
SonicWall NSa
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?
Hi Gary,
No, I hadn't seen that security product as yet. Interesting model they are trying to get on board with --- everyone wants to sell you a perpetual subscription...