Cisco offers a threat-focused next-generation firewall (NGFW), the ASA 5500-X Series. The ASA 5500 Series platforms can run either the Cisco ASA Firewall or Cisco Firepower Threat Defense (FTD). The series features appliances in a variety of form factors, including standalone options for small and midsize businesses, ruggedized appliances for extreme environments, midsize appliances for security at the Internet edge, and high-performance appliances for enterprise data centers.
N/A
Cisco Firepower 4100 Series
Score 8.2 out of 10
N/A
The Cisco Firepower 4100 Series’ 1-rack-unit size is presented by the vendodr as ideal at the Internet edge and in high-performance environments. They further state that it shows what’s happening on your network, detects attacks earlier so you can act faster, and reduces management complexity.
N/A
Pricing
Cisco ASA 5500-X with FirePOWER Services
Cisco Firepower 4100 Series
Editions & Modules
No answers on this topic
Firepower 4100
50,000-250,000
per appliance
Offerings
Pricing Offerings
Cisco ASA 5500-X with FirePOWER Services
Cisco Firepower 4100 Series
Free Trial
No
No
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
Cisco ASA 5500-X pricing starts at ~$400 and scales up to $20,000 for higher capacity appliances.
We previously use Cisco ASA 5500 series but due to those devices are a little old, we changed to Cisco Firepower 4100 Series as more recent product from Cisco. One of the reasons to select Cisco Firepower 4100 Series was the configuration migration availability from ASA to …
This firewall is best suited for the network edge/perimeter deployment. The next gen features works very well and the remote access VPN is also very much suitable for the organizations which have a huge user base working remotely. The Remote Access VPN is very much customizable and the authentication integration option like LDAP and RADIUS provides and addon.
When we are asked by local partners which security equipment we use we always recommend our Cisco security products. The Firepower firewall is no exception and we can easily recommend this to others who need a fast, secure, and well built system that integrates well with all your existing hardware and software.
The failover process is clunky. When out Fortigate firewalls failed over, we lost 1 ping. When our Firepowers failover, whether it is on purpose or not, we experience a 2.5 minute complete outage.
Cisco could stand to improve their support documentation. I have found it difficult to find good directions for configuring these, especially when it comes to NAT and IPSEC tunnels.
Ever since we installed Cisco ASA 5500-X with FirePOWER Services we have never had to deal with an attack. We can see in the logs almost every day hackers attempting to break into our networks and failing. We also have the ability to blacklist every IP address that attempts to break into our firewalls
Cisco firepower provides automatation for an organisations security operations to detect and stop the most advanced threats fast. It also assists in preventing attacks in using intelligence and innovative solutions.
In general, the Cisco Firepower 4100 Series works well, great performance, support a high volume of traffic, configuration, users, the device is powerful and once you have something configured you can be sure that it will rarely fail but for day to day troubleshooting or modifications needed can be a little complicated due to you have to deploy every change you make in the device and is not as fast as other devices, in general a deploy takes 5 minutes.
We have never had an outage caused by firewall failure. We have had a few outages caused by the internet failing or cloud applications going offline but never a firewall breaking down. When making changes we have a very strong change control, major software updates are always carried out out of working hours. At places where we have two firewalls in HA, we are able to do upgrades in working ours and the users will never know that an upgrade is taking place, that how great these firewalls are
The Cisco ASA 5500X with Firepower performance needs consideration before deploying. Although the solution is Pay as you grow, adding additional features to the system has a negative impact on overall throughput. I would more like now only to deploy the Cisco FPR units as they have better performance and will last the test of time.
I would recommend the purchase of the Smartnet 24x7 service in the case of a unit and the Smartnet 8x5NBD in the case of only one appliance installed on site. This service is important to always have the latest firmware updates, corrective updates and especially the hardware warranty and maintenance service in case of problems. The service is done by phone or on the official Cisco website and I can say that it is very good and efficient.
We implemented a centralized management of all our Cisco ASA 5500-x with FirePOWER Services so that we can have a holistic view of all our sites in London and other European countries. This also helps when making changes, instead of login on to each firewall we can use Firepower Management Center (FMC) to central deploy changes across all devices
Previous],] I was using the [pfSense] in my organization but when i switched to [Cisco ASA 5500-X with FirePOWER Services] I realized there are lots of issue and missing security features in [pfSense]. The deployment and configuration is very easy as compare to [pfSense]. I highly recommend this product to everyone.
Cisco Firepower 4100 Series deployment is straightforward and easy to implement. It is also can support high availability and able to achieve redundancy. Besides, firmware upgrade is quite simple and the process does not take much effort as the upgrade will be automatically done by itself. Cisco Firepower 4100 Series is also very cost effective compared with other similar ranges of firewalls.
Security was enhanced on the data traffic shared with the vendors due to the use of VPNs
Inbound attacks were mostly blocked on the edge and saved a lot of resources (which could had been used in case of attacks getting successful on the application servers)