Cisco offers a threat-focused next-generation firewall (NGFW), the ASA 5500-X Series. The ASA 5500 Series platforms can run either the Cisco ASA Firewall or Cisco Firepower Threat Defense (FTD). The series features appliances in a variety of form factors, including standalone options for small and midsize businesses, ruggedized appliances for extreme environments, midsize appliances for security at the Internet edge, and high-performance appliances for enterprise data centers.
N/A
Cisco Meraki MX
Score 9.0 out of 10
N/A
Cisco Meraki MX Firewalls is a combined UTM and Software-Defined WAN solution. Meraki is managed via the cloud, and provides core firewall services, including site-to-site VPN, plus network monitoring.
$595
per appliance
Pricing
Cisco ASA 5500-X with FirePOWER Services
Cisco Meraki MX
Editions & Modules
No answers on this topic
MX64
$595
per appliance
MX67
$695
per appliance
MX68
$995
per appliance
MX84
$1,995
per appliance
MX100
$4,995
per appliance
MX250
$9,995
per appliance
MX450
$19,995
per appliance
Offerings
Pricing Offerings
Cisco ASA 5500-X with FirePOWER Services
Cisco Meraki MX
Free Trial
No
Yes
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
Cisco ASA 5500-X pricing starts at ~$400 and scales up to $20,000 for higher capacity appliances.
I like how everything is separated within the Cisco ASA vs the Meraki MX. The Meraki MX doesn't allow for specific network objects or ACLs to be manually created like the Cisco ASA does. The Cisco ASA is easier to configure new network routes to an existing network compared to …
Meraki MX is a much robust product, however in terms of licenses, Meraki MX you need to pay a per-year basic subscription that in 3 years surpass the value of the ASA 5500-X with features that you may not need. This is for a branch firewall not for the Main firewall.
The [Cisco ASA 5500-X with FirePOWER Services] does compete okay when compared to other devices. This model is begging to age and does not perform as well as the newer models but that is to be expected. I think their interface is okay but again I think ASDM is aging more …
Meraki is just easier to use and deploy. It’s not the cheapest option, nor is it the most feature rich or performant firewall platform. But when you need something that works and meets PCI/HIPAA compliance, with very little effort to use, this is the ideal platform for you. …
Overall, for a new network admin or a non-IT person, the Cisco Meraki MX is much easier to configure for a single site than the Cisco ASA Firewalls. ASA can be quicker for those with a background in Cisco command line OS.
The enormous difference between Catalyst and Meraki products is the granular and simple deployment. The Cisco security appliance firewall gives one and you more granular activity whereas the Cisco Meraki MX is focused on plug and play and it gets one and you going. I like …
The main difference is the administration through the Meraki cloud, the ease of access to review the configuration at any time, and the scalability that Meraki provides in terms of the ease of adding new devices, today in addition to how well the devices work is It is important …
It’s very similar to Cisco ASA but there are differences in use, first and most important for me is the way you control and manage your network through Meraki Dashboard and online. You can do it in your home without a VPN. The second is that clients like banks and financial …
cisco ASA is a legacy firewalla that is very outdated.despite it's aN NGFW with advanced security features, we decided to use meraki because of the ease of use and the need of scalability. in these two criteria, ASA is very weak, so we dicided to try the meraki mx product …
Meraki MX helped me save time in configuration and it is easier to use and manage, it's simple and fast. I love it.
Verified User
Manager
Chose Cisco Meraki MX
I've used traditional ASAs with and without firepower, newer firepower only Cisco firewalls, and Fortinet FortiGate firewalls. I think Meraki stacks up pretty well to them with most features. I think managing the Meraki is much easier than all of them because of the …
This firewall is best suited for the network edge/perimeter deployment. The next gen features works very well and the remote access VPN is also very much suitable for the organizations which have a huge user base working remotely. The Remote Access VPN is very much customizable and the authentication integration option like LDAP and RADIUS provides and addon.
The Meraki MX lineup is well suited for organizations that need centralized management of multiple locations, as it allows for both quick deployment and simple/easy remote administration all from a single pane of glass. It also works very well for providing VPN access for remote workers and helps monitor end-device uptime. It does, however, fall a bit short in its firewall's customization, compared to traditional appliances (like our WatchGuard Firebox), so perhaps less suited for organizations that need more customization, as the Meraki MX lineup is primarily designed for simplicity and straightforward cloud-based management.
The Cisco Meraki MX series is phenomenal at allowing us to remotely manage networks. So the devices usually act as the brain behind our client's networks, which makes it really, really easy for our team to take a look at what's going on in those client network environments, resolve any issues, and make sure that our client's networks are staying secure.
Layer seven firewall rules. Just making them more granular. We've been in meetings with Cisco SES where I've said feature requests many times and that's one of the big ones where it's just a little cumbersome to implement layer seven rules right now.
Just making them more granular. We've been in meetings with Cisco SES where I've said feature requests many times and that's one of the big ones where it's just a little cumbersome to implement layer seven rules right now.
Ever since we installed Cisco ASA 5500-X with FirePOWER Services we have never had to deal with an attack. We can see in the logs almost every day hackers attempting to break into our networks and failing. We also have the ability to blacklist every IP address that attempts to break into our firewalls
The simplicity and ease of use for the Meraki Dashboard make it an easy choice for our organization to renew our Meraki Enterprise Agreement. We will likely continue using the Meraki MC67-C, MX450, and other MX models in their catalog until we shift away from Meraki completely
Cisco firepower provides automatation for an organisations security operations to detect and stop the most advanced threats fast. It also assists in preventing attacks in using intelligence and innovative solutions.
Some features simply aren't there, but the ones that are there are pretty easy to use. Sometimes it is easy to get lost when trying to find the specific device you want to work on, but that's mostly due to how rarely we have to go into the interface.
We have never had an outage caused by firewall failure. We have had a few outages caused by the internet failing or cloud applications going offline but never a firewall breaking down. When making changes we have a very strong change control, major software updates are always carried out out of working hours. At places where we have two firewalls in HA, we are able to do upgrades in working ours and the users will never know that an upgrade is taking place, that how great these firewalls are
Meraki MX devices support high availability (HA) configurations, which ensures minimal downtime if one device goes offline. This feature has helped us maintain a stable and reliable network, even in cases of hardware failures. ince Meraki is cloud-managed, we've noticed that the cloud infrastructure is generally highly reliable, with minimal service interruptions or downtime. This makes it easier to manage the network remotely without significant availability concerns. Meraki automatically pushes firmware updates and patches, which helps maintain system stability without requiring manual intervention. These updates are rolled out in a manner that ensures minimal disruption to service.
The Cisco ASA 5500X with Firepower performance needs consideration before deploying. Although the solution is Pay as you grow, adding additional features to the system has a negative impact on overall throughput. I would more like now only to deploy the Cisco FPR units as they have better performance and will last the test of time.
The interface is pretty responsive. The lower end devices are easy to overwhelm if you have a lot of throughput. Be sure the model you get is rated for the amount of traffic you will have. Overbuild if possible, otherwise you won't be fully leveraging the connection from your ISP.
I would recommend the purchase of the Smartnet 24x7 service in the case of a unit and the Smartnet 8x5NBD in the case of only one appliance installed on site. This service is important to always have the latest firmware updates, corrective updates and especially the hardware warranty and maintenance service in case of problems. The service is done by phone or on the official Cisco website and I can say that it is very good and efficient.
I haven't ever had a bad experience with Meraki support. On the few occasions where I wasn't understanding the UI or needed some clarification about what a setting actually would do, I contacted them and they were very quickly able to provide help. Returns are simple and fast, too. We had to return a defective device one time and they shipped the replacement before we had even un-racked the one that was faulty. Unlike many other vendors, they didn't ask use to a do long list of scripted diagnostics, they just took my word for it that the device was broken and sent out a replacement immediately
great when they offered it, really tested your knowledge with hands on and see what your peers from other orgs know. glad to see that we were ahead of the curve of what our peers knew
We implemented a centralized management of all our Cisco ASA 5500-x with FirePOWER Services so that we can have a holistic view of all our sites in London and other European countries. This also helps when making changes, instead of login on to each firewall we can use Firepower Management Center (FMC) to central deploy changes across all devices
Implementing Meraki MX devices in phases—starting with a pilot group or select branch offices—was invaluable. This allowed us to identify potential configuration issues, troubleshoot problems, and refine our setup before rolling it out company-wide. It also helped to get feedback from early users and adjust the deployment strategy accordingly. The SD-WAN capabilities in Meraki MX were essential for optimizing our WAN traffic and ensuring better application performance across various locations.
Previous],] I was using the [pfSense] in my organization but when i switched to [Cisco ASA 5500-X with FirePOWER Services] I realized there are lots of issue and missing security features in [pfSense]. The deployment and configuration is very easy as compare to [pfSense]. I highly recommend this product to everyone.
Cisco Meraki MX provides simplicity and scalability while cutting costs. With Meraki MX, you get a Security appliance, router, and Firewall in one appliance and managed with one GUI. These features enable the network engineers to maintain large-scale enterprises with a single dashboard from a remote site or anywhere with internet, all thanks to the Meraki cloud dashboard
When I first started with my company we had various infrastructure and a mix of tech. Since going to Cisco Meraki MX we have noticed better network performance and our new sites are much easier to bring online. Users have noticed an improvement in VPN connection and getting into all our systems.
Security was enhanced on the data traffic shared with the vendors due to the use of VPNs
Inbound attacks were mostly blocked on the edge and saved a lot of resources (which could had been used in case of attacks getting successful on the application servers)
From a positive impact? Basically it allows us to set up shop very quickly. It allowed us to add sites to our network very quickly. From a negative perspective, I think the only thing is that I can see from a negative perspective is I have a preference to working with ACLI in terms of how I engage with the youth tool At the moment, the only way to actually engage with a tool is on a gui and sometimes what I'd actually like is more detailed information in terms of actual configuration that you'll actually get out of ACLI.