Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Senior Network Engineer at a tech services company with 1,001-5,000 employees
Consultant
The new NAT configuration is difficult to understand. The ASDM has significantly improved over the years.

What is most valuable?

The ASDM has significantly improved over the years. Real-time logging and filtering is useful. Firewall rules are easy to understand, and enable/disable.

What needs improvement?

Change from Java for ASDM to HTML5. Better options to enable/disable site-to-site VPN tunnels.

For how long have I used the solution?

8 years

What was my experience with deployment of the solution?

The new NAT configuration is difficult to understand especially for people familiar with the pre v8.3 code.

Buyer's Guide
Cisco Secure Firewall
June 2025
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.

How are customer service and support?

Customer Service:

Cisco TAC is good. They will set up a remote viewing session so they can work on the firewall as if they are sitting next to you.

Technical Support:

Typically fast and useful.

What about the implementation team?

In-house team.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user212700 - PeerSpot reviewer
Senior Network Engineer at a aerospace/defense firm with 51-200 employees
Vendor
Setup can be complex if you don't have previous experience with ASA but it's an excellent product.

What is most valuable?

The multi-context mode.

How has it helped my organization?

Being able to use the multi-context on the firewall to keep costs down.

What needs improvement?

No improvement needed.

For how long have I used the solution?

I've used it for four years.

What was my experience with deployment of the solution?

Yes but I was able to get the support that was needed to resolve any issues.

What do I think about the stability of the solution?

No issues encountered.

What do I think about the scalability of the solution?

No issues encountered.

How are customer service and technical support?

Customer Service:

9/10.

Technical Support:

8/10.

Which solution did I use previously and why did I switch?

Yes and we switched because we needed a fully redundant solution.

How was the initial setup?

If you have no experience with the device it may be complex but being trained on the device helps drastically.

What about the implementation team?

We used a mix of both - vendor help and in-house.

Which other solutions did I evaluate?

We also evaluated Juniper firewalls.

What other advice do I have?

Excellent product and excellent customer support.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Cisco Secure Firewall
June 2025
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
it_user212682 - PeerSpot reviewer
Network Consultant at a tech consulting company with 51-200 employees
Consultant
I'd like the ability to use IPS & CX modules simultaneously but overall it provides peace-of-mind against cyber-attacks.

What is most valuable?

The most valuable features are the IPS and Botnet software modules. These security features, working in tandem, truly provide a peace-of-mind against all levels of cyber-attacks.

How has it helped my organization?

Since the 5512-x is software license based, there is no need to purchase additional hardware to enable much needed features.

What needs improvement?

Since most features are license based and some licenses are time-based, there should be a way for the device to alert via SNMP that licenses are about to expire. Also, I would like to be able to use both the IPS and CX modules simultaneously, instead of one or the other.

For how long have I used the solution?

I have been using the 5512-x for almost one year now.

What was my experience with deployment of the solution?

Deployment of the 5512-x is very simple. The main issue I found was in deploying the firewall using the "new" style of configuring NAT statements.

What do I think about the stability of the solution?

I have not encountered any stability issues with the IOS version or the IPS version. I am currently running IOS 9.3.2 and IPS version 7.3(2)E4.

What do I think about the scalability of the solution?

The 5512-x with a BASE license does not have many options for scalability. However, the Security Plus option allows multiple contexts and ACTIVE/ACTIVE fail-over options. I currently do not use those features, but I can definitely see the need for both of these options.

How are customer service and technical support?

Customer Service:

Cisco customer services have always been excellent. I have never had any issues with them.

Technical Support:

Cisco TAC is always hit-or-miss. You either get a guru or a newbie, and there is nothing in between.

Which solution did I use previously and why did I switch?

The previous firewall was a Cisco SA520W. This device was great as it was a firewall, IPS and WLC all in one. I switched due to this device being EOL/EOS. Also, the main complaint about this device was that with the IPS enabled all traffic was slowed to a crawl. I would rate the SA520W as 3/10.

How was the initial setup?

The SA520W was a simple setup. There is no CLI option; it is all done within a straightforward GUI.

What about the implementation team?

All solutions are designed, configured, and maintained by me.

What was our ROI?

The ROI on the SA520W is 0. As this device is EOL/EOS.

What's my experience with pricing, setup cost, and licensing?

The original setup cost of the SA520W was approx. US$500. The setup for the 5512-x was approx. US$3000. For the 5512-x, additional costs were endured for the IPS and Botnet licenses approx. an additional US$1000/year. As for day-to-day costs, the 5512-x self-updates the security modules, so there is little interaction that I need to perform.

Which other solutions did I evaluate?

I was considering going to the ISA550W (the replacement for the SA520W) or a 5505. I ultimately went with the 5512-x due to its speed and software licensing model.

What other advice do I have?

The next-gen firewalls are a great solution. Be aware of the additional hardware costs (120GB SSD) that are needed to implement some features like the CX module. Also, if you do not need ACTIVE/ACTIVE fail-over there is no real need for the Security plus license. And finally, understand the true speed of the model you choose with and without the IPS module enabled before making a final decision.

Disclosure: My company has a business relationship with this vendor other than being a customer: My company is a Cisco re-seller.
PeerSpot user
PeerSpot user
Security Consultant at Webernetz.net - Network Security Consulting
Consultant
Cisco ASA vs. Palo Alto Networks

Cisco ASA vs. Palo Alto: Management Goodies

You often have comparisons of both firewalls concerning security components. Of course, a firewall must block attacks, scan for viruses, build VPNs, etc. However, in this post I am discussing the advantages and disadvantages from both vendors concerning the management options: How to add and rename objects. How to update a device. How to find log entries. Etc.

Cisco ASA

  • Fast Management Suite: The ASDM GUI is really fast. You do not have to wait for the next window if you click on a certain button. It simply appears directly. On the Palo, each entry to add, e.g., an application inside a security rule, takes a few seconds.
  • Better “Preview CLI Commands”: I am always checking the CLI commands before I send them to the firewall. On the Cisco ASA, they are quite easy to understand. I know, Palo Alto also offers the “Preview Changes”, but it takes a bit more time to recognize all XML paths.
  • Better CLI Commands at all: For Cisco admins it is very easy to parse a “show run” and to paste some commands into another device. This is not that easy on a Palo Alto firewall. First, you must change the config-output format, and second, you cannot simply paste many lines into another device, since the ordering of these lines is NOT correct by default. That is, it simply doesn’t work.
  • ACL Hit Count: I like the hit counts per access list entry in the GUI. It quickly reveals which entries are used very often and which ones are never used. On the Palo, you can only highlight the never used ones. Furthermore, the CLI on the ASA splits each ACL into the real objects with individual counters. Great!
  • Many SNMP OIDs: There are many options to monitor the ASA via SNMP. On the Palo Alto, e.g., you can not monitor sub-interfaces. This is really bad. Only the bare metal ethernet ports reveal counters.

Palo Alto PA

  • Out-of-Band Management Interface: Even the smallest PA-200 device has its own management interface with its own routing table (default route). This makes it easier to permit/deny admin accesses to this host. E.g., there is no confusion between an access to the SSL VPN and an access to the management GUI since they reside on different interfaces and IP addresses.
  • Browser-based GUI: No Java, no client. Just a simple browser. It is also manageable through SSL VPN portals.
  • In-Band Interface Management Profiles: On the ASA, every access through different interfaces and different protocols needs its own line to be configured (Management Access -> ASDM/HTTPS/Telnet/SSH). Management access is denied per default, while ping is allowed by default. Both must be set in different menus. Not on the Palo: Interface Mgmt with a few clicks and optional IP addresses, configurable on several interfaces.
  • –> Single Security Policy: All interfaces AND site-to-site VPNs are in zones. All security policies between these zones are in one security policy. On the ASA, you don’t have the ACLs for the VPNs in the ACL view of the interfaces since you must specify extra ACLs to the group policy of the VPN.
  • Zone Based Security Policies: A policy from zone A to zone B only takes effect for this pair of zones. The “incoming interface” policies on the ASA always have a destination of “any” zone. Though the destination addresses can be limited, it is more complicate to configure the policies if there are several interfaces in use (and not only inside and outside).
  • Network Objects in Slash-Notation: Add a host or a network object by typing “1.2.3.0/24″. On the ASA, you have three fields for the same object: host or network, IP address of the network, and netmask (in 255.x.x.x notation!) for the network.
  • Tags: A simple but useful feature are the coloured tags that can be used in policies and objects. With these tags, temporary policies or the like can easily be marked.
  • –> Managing all Un-Commited Changes: One of the best features! Configuration changes can be done in any menu of the Palo Alto, showing the candidate config in all other menus right now, even without a commit. If you rename an object here, it is visible with this new name there. (Try to change the IP-address and the default gateway on a remote Cisco ASA firewall by one step. You won’t succeed until you are using the CLI.)
  • Simple Renaming of almost Everything: (Except subinterfaces) Address objects, address groups, zones, security profiles, IPsec tunnels – everything can be renamed. Try to rename an IPsec connection profile on the ASA. Or an interface name. It won’t work or you will get tons of CLI changes.
  • History of Configuration Changes: Ever tried to revert to the config from last day? No problem: Load configuration version.
  • Configuration Log: Ever wondered who changed something? Here it is: Monitor -> Logs -> Configuration. An exact list of all configuration changes with the name of the administrator.
  • Config Audit: Comparison of two configurations, such as of the running-config and any other historical config on the device. Great feature to find certain configuration changes.
  • –> Traffic Log Filtering: This is one of the MAJOR advantages of a Palo Alto GUI. It is really simple to click some objects to filter the traffic log. Or to build more precise filters. “eq” and “neq” are your friends. ;) Forget the Real-Time Log Viewer from Cisco.
  • Adjust Columns: Or even the possibility to adjust the columns. On the ASDM GUI from Cisco, some pages are per default to small to show the relevant values, e.g., the Monitoring -> Routing -> Routes pane.
  • Application Command Center: A simple but useful monitoring tool within the GUI. You are searching for the IP that generates high traffic load during the last hour? Here you will find it. What source country is responsible for the attacks during the last week? Here you go.
  • –> Route-Based VPN: A site-to-site VPN connection is built by two gateways, independent of the traffic being routed through the tunnel. Numbered tunnel-interfaces can be used to ping the tunnel endpoint of the other side. The decision where to route the traffic is based on the routing table and not on a policy. The Cisco firewall uses policy-based VPNs in which the Proxy-IDs per connection define the tunneled networks. A bit unhandy.
  • –> IKE Policy per VPN: Every gateway has its own IKE profile configured. Different IKE settings can be used for different VPNs. The Cisco has global IKE parameters.
  • Own Zones for VPNs: Site-to-Site VPNs can be in extra zones. On the ASA, VPNs are always associated with the “outside” interface, which is complicated for using NAT policies.
  • Reasonable Default Crypto Settings: The default groups for the IPsec phase 1 and phase 2 crypto profiles have almost secure settings. Very good compared to the Cisco ASA, which really installs a view default profiles, e.g., an IKE policy with an encryption algorithm of “DES”. Yes, not 3DES, but only simple DES! Oh oh.
  • Retrieve License Keys from Server: Really cool feature. And very easy to use for the customer. Once the authorization code is added in the Palo Alto support portal, the firewall can retrieve its license via https. No need for any further activation keys.
  • Built-In Software Archive: Firmware versions can be downloaded directly through the GUI. No need for further logins, downloads from the vendor page and uploads to the unit. Just “Download” and “Install”.
  • Enough Disk Space for several Softwares: On my (small) Cisco ASA 5505, the built-in flash disk has only 128 MB. That is, I cannot even do a simple software upgrade because the free disk space does not fit for two ASA images. (I have an ASA and ASDM image as well as three AnyConnect images on the fash memory.) What a mess!
  • Sync Software to HA Member: Every software that is downloaded on the primary firewall can automatically be synced to the secondary device. This is not true on the Cisco ASA, which is really annoying when it comes to AnyConnect remote access VPN client images. If these are not uploaded manually on the second device, the other HA unit will not terminate VPN tunnels in case of a HA active-unit swap. Oh oh!
  • HA Status in GUI: With the High Availability widget, the status of the HA is visualized with green/orange/red bubbles. It shows which unit is the active/standby one. Since the PA has a real OoB management, the admin can access both devices simultaneously and can see which hardware is the active and the passive one. The Cisco ASA swaps its IP addresses and has no OoB management, so it is harder to see which hardware is the primary and the secondary one, since its IP addresses swap, too.
  • NTP Servers with Names: I know that NTP servers should be set via IP addresses to not rely on another service (DNS), but it is much more easier to use names such asde.pool.ntp.org or the like. This can be done on the Palo Alto, but not on the Cisco firewall.
  • No “bring to top” GUI: During the start of Cisco’s ASDM, it always brings its GUI to the top of all windows. In my opinion, this is annoying. During the 30-60 seconds until the whole device config is loaded into the GUI, I am working on other things. But these are generally disrupted from the highlighting of the ASDM GUI. This does not happen with the Palo Alto GUI which is in one tab of my browser.

(The major advantages are marked with an –> arrow.)

Summary

In summary, I really love the management GUI from the Palo Alto. Not hard due to the list of more than 20 advantages over the Cisco ASA platform. ;) Though it is slower than the ASDM GUI from Cisco, it offers much more useful capabilities for the daily work. Great!

Originally published on blog.webernetz.net.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user603888 - PeerSpot reviewer
it_user603888Sr. Information Security Officer (ISO) at a financial services firm with 501-1,000 employees
Vendor

Mostly Enterprise firms they're using both, would be Palo Alto using in core and gateway traffic.

See all 3 comments
it_user150300 - PeerSpot reviewer
Senior Network Engineer at a tech services company with 501-1,000 employees
Consultant
The features are quite powerful and it's easy to set-up

Valuable Features

Anyconnect VPN

Improvements to My Organization

The features are quite powerful, easy to set-up and for ease of use end user too is excellent. Moreover, this has been quite stable since the day we installed them.

Use of Solution

More than 5 years

Deployment Issues

No

Stability Issues

No

Scalability Issues

No

Customer Service and Technical Support

Customer Service: Very GoodTechnical Support: Excellent

Initial Setup

Yes, the document repository is pretty robust and easy to understand.

Implementation Team

In-house

Other Solutions Considered

Yes, Checkpoint & Juniper
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Senior Manager of Network at a tech company with 1,001-5,000 employees
Real User
Top 20
ASA5505 Multipurpose Robust Firewall for small office or small organization requiring for network security

Cisco ASA 5505 overview
Selecting a new fire wall is matter of individual requirements and preferences. For small office it is economical to have a single device having small switch and firewall capability. Cisco ASA 5505 is perfectly suitable for small office as it has 8 port connecting end device switch and two of which have PoE capability for connecting cisco ip phones or external wireless access point. Has a expansion slot for connecting IPS (Intrusion prevention System). Additional IPS card (AIP SSC-5), IPS protects form virus, worms Trojans, DDoS attacks. This all features makes it a truly multipurpose firewall for small office.

Pros:

1) Is small in size and light in weight, requires less space suitable for small office.
2) Has integrated 8 port Switch so no need to purchase additional switch.
3) Has 2 PoE ports, so IP phones or external wireless access points can be connected.
4) If IPS card is installed it gives protection form vires, Trojan and worms and DDoS.
5) It supports 3 vlan, traffics can be separated per vlan.
6) Can be easily configured through SDM
7) Last but not the least it is very robust system once installed it dose not need much attention.

Cons:
1) ASA5505 does not support expansion.
2) ASA5505 dose not support fail over ( Aacive / active or active/ standby)
3) ASA5505 does not support multimode.
4) Heavy CPU load and packet latency due to addition of IPS.
5) The ASA 5505 does not support Spanning Tree Protocol for loop detection in the network.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user1020 - PeerSpot reviewer
it_user1020Head of Data Center at a tech company with 51-200 employees
Real User

We have a 5520 with IPS installed. You are right about the CPU load with the IPS addition. It really maximizes the CPU utilization of the system, which can be a cause for concern. We've also have the IPS fail at some point due to a vulnerability. It was later patched with a firmware upgrade.

Fairly expensive, but will get the job done if you know how to configure it. Also recommend to have an HA set-up if protecting critical infrastructure. Might be expensive, but probably a good addition if you already have a Cisco-dominated environment. You should have it protecting you from the outside and use a separate in-line IPS if you want to protect the inside network.

See all 2 comments
it_user5274 - PeerSpot reviewer
Network Manager at a insurance company with 1,001-5,000 employees
Vendor
Good value compared to Check Point. But I had issues when integrating with Cisco IPS.

Valuable Features:

1. I have found tje Cisco ASA to be less expensive than Check Point firewalls. 2. It is smaller in size than Check Point firewall. 3. It is easy to operate and manage with both GUI and Command Line

Room for Improvement:

1. When I integrate Cisco ASA with Cisco IPS it creates lots of problem such as an increase in CPU utilization - as a result I have to stop the IPS service. 2. Cisco ASA does not provide a flash card for free so I cannot back up the firewall configuration for disaster recovery.

Other Advice:

In my opinion it is a nice firewall product at a low price and good value for medium and large enterprises.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user6381 - PeerSpot reviewer
Manager of Infrastructure at a manufacturing company with 51-200 employees
Vendor
Very stable, but high learning curve.

Valuable Features:

We choose Cisco ASA 5500 Series for our branch office primarily because it is a stable firewall. Many home and even business grade firewalls will often start acting up and have to be rebooted, but the ASA is completely rock-solid. ASA Firewall Chains STP and RST Protocol allows us to build redundant uplinks to STP compatible switches. It has 256 MB RAM and 128 MB of flash which is plenty for future upgrades. I personally like to have the multitude of VPN options such as - IPsec VPN, DMVPN, L2TP, SSL, Any Connect, etc. The IPsec VPN is supported on the iPhone, so it is cool to be able to access my home network from my phone.

Room for Improvement:

Extraordinary learning curve, especially if you do not have previous skill with Cisco PIX or routers. Even using the Java-based ASDM, it can take time to find your way. In addition, ASDM is not compatible with the latest version of Java (you will get an 'unconnected sockets' error). No support for DHCP reservations. I like to configure Servers and Printers this way, and cannot find any decent reason Cisco would not support it as they do on their routers and Layer 3 switches.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.