- Cisco IPSec VPn
- VPN Client
- Port Restrictions
IT Manager at a manufacturing company
Valuable features are Cisco IPSec VPn , VPN Client, Port Restrictions .
What is most valuable?
How has it helped my organization?
We could connect data securely from outside the company.
What needs improvement?
I need application user-IP blocking, Intrusion Prevention, QoS; I can't do these with Cisco and have to change it.
For how long have I used the solution?
Five years.
Buyer's Guide
Cisco Secure Firewall
June 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
What do I think about the stability of the solution?
No.
What do I think about the scalability of the solution?
No.
How are customer service and support?
I have never needed support from Cisco.
Which solution did I use previously and why did I switch?
I couldn’t meet all my needs with the Cisco 5505 so I changed it with a next-generation firewall.
How was the initial setup?
Actually it was simple, making port based policies more simple than PA.
What's my experience with pricing, setup cost, and licensing?
Cisco price-performance is very successful.
Which other solutions did I evaluate?
I evaluated Sophos UTM, Checkpoint, Cisco and PA. PA is the best fit for my company because Sophos acquired Cyberoam and their software wasn’t successful for domain user restrictions. Checkpoint was very slow for me and too many licences and it was complicated. Cisco acquired Sourcefire and they need to improve next-gen features. So I chose PA.
What other advice do I have?
I know that Cisco acquired Sourcefire and they re-introduced next-generation firewall features and I think they’ll improve NX features.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Network & Data Communication Engineer at a tech services company with 201-500 employees
Most valuable features are Security, Routing and NAT.
What is most valuable?
Security, Routing and NAT.
How has it helped my organization?
Gives flexibility and several deployment options.
What needs improvement?
Some default inspection rules need better tuning. Focus development on CLI version.
For how long have I used the solution?
11 years.
What do I think about the stability of the solution?
Rarely.
What do I think about the scalability of the solution?
Yes, before Clustering was introduced.
How are customer service and technical support?
Nine out of 10.
Which solution did I use previously and why did I switch?
Yes. We changed for no special reason, just to mix things up.
How was the initial setup?
Yes, but you need to read and understand how the device functions before deployment.
What's my experience with pricing, setup cost, and licensing?
Like with all vendors, know what options you require and request the proper license accordingly. Prices are on the same level as competitors.
Which other solutions did I evaluate?
Not really, as all firewalls do most of what enterprises look for. What matters most is the after sales support.
What other advice do I have?
Read, read, read and understand your requirements beforehand.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Cisco Secure Firewall
June 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Manager Network Security at a financial services firm with 5,001-10,000 employees
I love its CLI mode of working, it gives plenty of information with single line of command.
What is most valuable?
I love its CLI mode of working, it gives plenty of information with a single line of command.
This feature allows its administrator to perform advanced level tasks with much ease.
How has it helped my organization?
These products provide much stability which, in return, any organization demands to run its functions properly and smoothly.
What needs improvement?
This product lacks in GUI format; that needs to be more mature and composed.
For how long have I used the solution?
10 years +
What was my experience with deployment of the solution?
No issues.
What do I think about the stability of the solution?
Rarely, due to software issues.
What do I think about the scalability of the solution?
As of now, no.
How are customer service and technical support?
Excellent but if non-Indian engineer is assigned.
Which solution did I use previously and why did I switch?
We have almost 99% Cisco based infrastructure.
How was the initial setup?
Pretty straightforward.
Which other solutions did I evaluate?
Usually yes. We did like Huawei and Juniper.
What other advice do I have?
Cisco has done great job in introducing new features in their security product by acquiring specialized companies in the past. However, they still need to improve their unique feature products as they are in a challenger position, but not on top, at various product review portals.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Security Administrator at a tech company with 5,001-10,000 employees
It helped us and our customers to implement more granular and flexible connections to and from our/their environments.
Pros and Cons
- "The most valuables feature of this product are given by the comprehensive VPN solutions it offers and its tools for troubleshooting and debugging."
- "It should have an additional “operating mode”, like a “candidate configuration mode”, where you would have the possibility to test the changes you are going to implement and also the possibility to validate these changes."
How has it helped my organization?
It helped us and our customers implement more granular and flexible connections to and from our/their environments, building a trust relation between all of us, having the confidence that our exchanged information is occurring in a highly secure manner.
What is most valuable?
The most valuables feature of this product are given by the comprehensive VPN solutions it offers and its tools for troubleshooting and debugging. You can provide complex and flexible way to securely access private environments. And its troubleshooting and debugging tools allow you to identify, in the fastest time possible, where some potential issues could have been occurred.
What needs improvement?
It should have an additional “operating mode”, like a “candidate configuration mode”, where you would have the possibility to test the changes you are going to implement and also the possibility to validate these changes.
In addition, a "testing" feature should be performed to let you know what would be the consequences of applying these new changes. Only after you would see the tests’ results (if they do not create any unwanted effect) would you go and commit them.
What do I think about the stability of the solution?
There were some issues with stability prior to code version 9.2.x, more related to Clientless SSL and Client RA VPN solutions. Some bugs affected the integrity of these type of features.
What do I think about the scalability of the solution?
There were no problems in terms of scaling an existing solution, though very expensive.
How are customer service and technical support?
I would give a rating of eight out of 10, compared to others vendors. The technical support is much better than most vendors, but let's say not as good as F5 Networks technical support.
Which solution did I use previously and why did I switch?
I've only worked for integrator or ISP organizations. Over the years I’ve worked with multiple solutions offered by different vendors due to my customers’ budgets or preferences. What makes it the best of all the solutions I’ve worked on is the stability and its hardware.
How was the initial setup?
The initial setup configurations differ from customer to customer, from very simple to highly complex solutions. Depends on the customer’s needs.
What's my experience with pricing, setup cost, and licensing?
I have to admit that the price is high. But I think it's worth it if the stability of your solution counts for you.
What other advice do I have?
Choose it if you aim to have a stable environment.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Gerente de Telecomunicaciones at a financial services firm with 1,001-5,000 employees
The front page of device manager is the most valuable feature. We suffered an attack and the firewall was down repeatedly.
What is most valuable?
The front page of device manager is the most valuable feature because it makes it easy to know the system status.
How has it helped my organization?
It’s hard to say because our equipment was EoS.
For how long have I used the solution?
I have used Cisco ASA for three years.
What do I think about the stability of the solution?
We suffered an attack and the firewall was down repeatedly.
What do I think about the scalability of the solution?
We have to buy more licenses to get more VPN connections.
How are customer service and technical support?
I rate support 7/10.
Which solution did I use previously and why did I switch?
We didn’t have a previous solution. I actually searched after another solution.
How was the initial setup?
Setup was complex because we had not taken a course previously.
What's my experience with pricing, setup cost, and licensing?
Sincerely, I prefer other products with no limit on licensing of VPNs, for example.
What other advice do I have?
You have to find more confidentiality, integrity and availability.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Sr. Security Analyst with 1,001-5,000 employees
Centralized policy creation simplifies matters more than previously. URL, Malware and IPS built-in has been a great help.
What is most valuable?
Centralized policy creation for URL, application, IPS, etc. It simplifies matters more than previously.
How has it helped my organization?
It provides centralized management. I would also add that URL, Malware and IPS built-in has been a great help as well. Where we used to need several products for all these features, we now only need the ASAs with the additional licensing. So now, it is more a matter of license management over hardware and licensing management.
What needs improvement?
More centralization and simplification of product lines would help most engineers, but I think licensing is the key here. Most organizations won’t pay the money to have ELA licensing, so all the individual licenses for these products can be overwhelming. Plus, they never really synch for expiration time.
This is mainly due to reliance on other Cisco products and licensing. For example, Palo Alto includes several features in one whereas Cisco requires multiples. However, I still think Cisco offers great products but to get a "10" they might consolidate devices or simplify licensing.
For how long have I used the solution?
I have used this for two years, but company has used Cisco solutions for many years.
What do I think about the stability of the solution?
We did somewhat have stability problems. Upgrading the ASA, ASDM, and SFR can be a pain if you have as many firewalls as we do (21). Once you can get them to fall under FPMC management it can be a little easier, but it is a battle to get to that point.
What do I think about the scalability of the solution?
There have been no scalability issues from my point of view. I was handed the solution, so some of the initial work was done.
How are customer service and technical support?
I rate support 10/10. TAC has always done a great job with answering my questions and providing remote support when needed.
Which solution did I use previously and why did I switch?
Previously, I used ASAs without FirePower; and unsure what my company used prior to that.
How was the initial setup?
For me, setup was half-and-half. In one update run I missed the step that discusses how the ASA and ASDM need to be on a specific patch prior to upgrading the SFR. FPMC attempted to push the new update to the devices regardless of this mismatch that caused FPMC to loose communication. I had to downgrade the SFR all the way back to v5.4.1 before I could install the latest version. You also have to step through several updates before you are done, so that can be tedious as well.
What's my experience with pricing, setup cost, and licensing?
Read everything and track all your licenses. Research all options and maybe pick a few to PoC. It doesn’t hurt to trial others. Maybe they are a better fit for your environment.
Which other solutions did I evaluate?
We are moving forward with ELA 5.0 for all Cisco security devices. Prior to that decision, we did a PoC with Palo Alto 3020 and 220 firewalls and Panorama. Those are some great products, but we are so Cisco centric that the cost of ELA isn’t much more than we are spending now.
What other advice do I have?
Do research. FPMC is great for us but it requires a lot of time and attention.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Support Engineer
Its security features are the most valuable aspect. The equipment is too expensive.
What is most valuable?
Its security features are the most valuable aspect. It has the ability to detect and prevent intrusions.
How has it helped my organization?
The product has helped organizations secure their infrastructure and data. Most organizations are happy to adopt the technology.
What needs improvement?
The equipment is too expensive compared with other firewall products.
For how long have I used the solution?
I have used ASA for about three months. I just bought and configured it for a client.
What do I think about the stability of the solution?
Since I installed and configured it, the client has never called with complaints.
What do I think about the scalability of the solution?
I have not had scalability issues at all. Maybe it is because I have not used it quite extensively.
How are customer service and technical support?
I haven't had a chance to interact with the support team.
Which solution did I use previously and why did I switch?
The previous product was limited in throughput and security.
How was the initial setup?
The initial setup was quite complex.
What's my experience with pricing, setup cost, and licensing?
As much as there is value for money, there is a need to make it affordable.
Which other solutions did I evaluate?
I tried Sophos.
What other advice do I have?
It is a very good device to use for those who value their network security.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Member of the Board of Directors at a tech services company with 1,001-5,000 employees
Class-based policing is the most important part of the ASA, and was its differentiator.
What is most valuable?
Class-based policing is the most important part of the ASA, and was its differentiator.
How has it helped my organization?
It gave us more organized DMZs and logical segments.
What needs improvement?
I’m not a fan of the new modular licensing model. Cisco moved from a base license to an a la carte SaaS model a couple of years back, wherein the customer is required to pay for feature sets on a case-by-case basis. This makes it difficult for people who want to study and trial new technologies and features.
For how long have I used the solution?
I’ve been using ASA technology since it was PIX, so since 1999.
What do I think about the stability of the solution?
We have not had stability issues.
What do I think about the scalability of the solution?
We have not had scalability issues.
How are customer service and technical support?
Support with Cisco TAC, or with VARs like WWT and Trace3 is usually pretty good.
Which solution did I use previously and why did I switch?
I have used both ASA and PAN. Different strokes for different folks.
How was the initial setup?
Initial setup is straightforward. You can get as granular and complex as you want, but out of the box, ASAs provide a secure FW solution.
Which other solutions did I evaluate?
We evaluate all other options.
What other advice do I have?
ASAs are a solid solution. Cisco provides more training and learning materials than any other vendor, which is critical if an organization wants to take true ownership of a technological solution. Documentation and use cases alone tend to make me a fan of Cisco's way of engineering, and they have come a long way over the last few years when it comes to integrating their solutions into comprehensive security communications platforms using tools like PRIME and ISE. FirePOWER and AMP make Cisco an even better overall contender for top FW status.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Cisco Umbrella
Cisco Identity Services Engine (ISE)
Palo Alto Networks NG Firewalls
Check Point NGFW
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Sophos XGS
Fortinet FortiGate-VM
SonicWall NSa
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?
Cool review