Network Engineer at a university with 51-200 employees
Powerful firewall and VPN device that is highly stable with multiple contexts but has latency and NATing issues
What is most valuable?
-Powerful firewall provides multiple contexts.
-Highly stable firewall for campus traffic with no shutdown and zero maintenance compared to the Juniper SRX family which performs like a software firewall after 3 months of operation and did not allow the administrator to login.
-Easy to use both GUI and command line. Also it may be more easily used through a management application like Cisco ASDM
What needs improvement?
-Latency and delay due to configuration and monitoring of multiple VLANS and traffic
-Increases the delay as the firewall and IPS polices increase
-We faced usually a problem with NATING
What other advice do I have?
Cisco delivers a powerful firewall -- it’s not just a firewall but also a modular device that can deliver IPS hosting and wireless LAN controller as well. It also provides site to site VPN and remote access VPN services.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Infrastructure Expert at a tech company with 51-200 employees
The most powerful and expensive firewall
Valuable Features:
There are a lot of companies who create firewalls but there is not a single one which can compete with ASA.
It can have access control from layer 3 to layer 7.
The ASA 5510 is more than enough for small to medium business.
It has dedicated GUI interface which is known as ASDM, a beautiful tool to manage ASA.
You can use ASA to route traffic.
AAA service supports plenty of Authentication server types.
You can configure advanced NAT in this device.
It uses Modular Policy Framework (MPF) to inspect traffic.
You can inspect traffic at different layers separately.
You can use this as a transparent firewall & fail over is instant.
The virtualization works beautifully for this device.
VPN is another added advantage.All the types of VPNs are managed through ASA.
Room for Improvement:
The 5505 does not support multiple mode.
While running this device on multiple mode you cannot use dynamic routing protocols or multicast routing.
Also the IPSEC and SSL VPNs are not supported while running in multiple mode.
sometimes analysis might take too long while performing DPI in real-time traffic.
The product is expensive. A 5580 series costs more than $50000.
Other Advice:
Its very difficult to write something about this product as it has so many options.
I have studied 1000 pages about this product and most of the organizations use this firewall as it is the best in the world. I have never seen such a powerful device which can handle 2 million connections at 20Gbps speed. It can
also inspect 4 million packets per second.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Cisco Secure Firewall
June 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
Network Architect at a tech vendor with 10,001+ employees
Security solution that offers a broad range of protection and has given us better control over securing our organization
Pros and Cons
- "This solution made our organization more secure and gave us better control."
- "This solution could be more granular and user-friendly."
What is our primary use case?
We use this solution for company security and to define access and connection between different devices.
How has it helped my organization?
This solution made our organization more secure and gave us better control.
What is most valuable?
The access list is the most valuable feature of this solution.
What needs improvement?
This solution could be more granular and user-friendly.
For how long have I used the solution?
I have been using this solution for 12 years.
What do I think about the stability of the solution?
This is a stable solution.
What do I think about the scalability of the solution?
This is a scalable solution.
How are customer service and support?
The technical support for this solution is good. I would rate it a seven out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We use this solution together with Palo Alto, depending on the use case.
How was the initial setup?
The initial setup is straightforward and the deployment only takes a few hours. Our deployment strategy was to keep it simple. A large deployment of this solution can require up to 10 resources.
The solution does require maintenance and we use an external service provider for this maintenance.
What other advice do I have?
I would rate this solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Consultant at a tech services company with 51-200 employees
Quite stable with good technical support, but the reporting should be improved
Pros and Cons
- "The most valuable feature is the access control list (ACL)."
- "Report generation is an area that should be improved."
What is our primary use case?
We are a service provider and we work on a variety of different projects for many customers. We do not use this product ourselves. Rather, we deploy it for different customers.
The primary use case is to protect the organization from unauthorized use.
What is most valuable?
The most valuable feature is the access control list (ACL).
What needs improvement?
Report generation is an area that should be improved.
For how long have I used the solution?
I have been working with this product for two years.
What do I think about the stability of the solution?
This firewall is quite stable and we use it on a daily basis.
What do I think about the scalability of the solution?
The scalability is good.
Which solution did I use previously and why did I switch?
I have not worked with equipment from OEMs other than Cisco. It's the only vendor I use.
How was the initial setup?
The initial setup is straightforward. The length of time for deployment depends on whether it is the entire setup or just the basic installation.
What about the implementation team?
I deployed this product myself.
What other advice do I have?
This is a product that I can recommend for an internal firewall. It's good enough.
I would rate this solution a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: partner

Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Cisco Umbrella
Cisco Identity Services Engine (ISE)
Palo Alto Networks NG Firewalls
Check Point NGFW
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Fortinet FortiGate-VM
Sophos XGS
SonicWall NSa
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?
There are companies that can compete with Cisco. Gartner has provided a report from 2012 showing that the new leader in firewalls with a new behavioral approach to firewalls is Palo Alto Networks. Not saying that Gartner has the right reports all the time but this one was correct. So remember that Checkpoint also exists and have been giving Cisco a run for their money. The caveat with Checkpoint is that some ports like X11 have to be hard coded into the top of the ACL in both directions in order to allow the traffic.
Anyone on any given day can beat the number one provider. The shift is now towards behavioral firewalling against unapproved applications and provide protection to the user no matter where they are based on user and not where they are coming from. Stay tuned as more developments come in the security field.